diff options
Diffstat (limited to 'unprotbas.1')
-rw-r--r-- | unprotbas.1 | 58 |
1 files changed, 14 insertions, 44 deletions
diff --git a/unprotbas.1 b/unprotbas.1 index 34fe14f..06e8af7 100644 --- a/unprotbas.1 +++ b/unprotbas.1 @@ -27,31 +27,27 @@ level margin: \\n[rst2man-indent\\n[rst2man-indent-level]] .\" new: \\n[rst2man-indent\\n[rst2man-indent-level]] .in \\n[rst2man-indent\\n[rst2man-indent-level]]u .. -.TH "UNPROTBAS" 1 "2024-05-30" "0.2.1" "Urchlay's Atari 8-bit Tools" +.TH "UNPROTBAS" 1 "2024-06-03" "0.2.1" "Urchlay's Atari 8-bit Tools" .SH NAME -unprotbas \- Unprotect or create LIST-protected Atari 8-bit BASIC programs +unprotbas \- Unprotect LIST-protected Atari 8-bit BASIC programs .SH SYNOPSIS .sp unprotbas [\fB\-v\fP] [\fB\-f\fP] [\fB\-n\fP] [\fB\-g\fP] [\fB\-c\fP] [\fB\-r\fP | \fB\-w\fP] \fBinput\-file\fP \fBoutput\-file\fP -.sp -unprotbas [\fB\-v\fP] [\fB\-p\fP | \fB\-pc\fP | \fB\-pv\fP] [\fB\-x\fP[\fIr|NN\fP] \fBinput\-file\fP \fBoutput\-file\fP .SH DESCRIPTION .sp -\fBunprotbas\fP modifies a LIST\-protected Atari 8\-bit BASIC program, -creating a new non\-protected copy. See \fBDETAILS\fP, below, to -understand how the protection and unprotection works. It\(aqs also -capable of LIST\-protecting an unprotected program (see the \fB\-p\fP -option). +\fBunprotbas\fP modifies a tokenized LIST\-protected Atari 8\-bit BASIC +program, creating a new non\-protected copy. See \fBDETAILS\fP, below, +to understand how the protection and unprotection works. .sp \fBinput\-file\fP must be a tokenized (SAVEd) Atari BASIC program. Use \fI\-\fP to read from standard input, but \fBunprotbas\fP will refuse to read from standard input if it\(aqs a terminal. .sp -\fBoutput\-file\fP will be the unprotected (or protected, with -\fB\-p\fP) tokenized BASIC program. If it already exists, it will be -overwritten. Use \fI\-\fP to write to standard output, but \fBunprotbas\fP -will refuse to write to standard output if it\(aqs a terminal (since -tokenized BASIC is binary data and may confuse the terminal). +\fBoutput\-file\fP will be the unprotected tokenized BASIC program. If it +already exists, it will be overwritten. Use \fI\-\fP to write to standard +output, but \fBunprotbas\fP will refuse to write to standard output if +it\(aqs a terminal (since tokenized BASIC is binary data and may confuse +the terminal). .SH OPTIONS .sp Options may appear in any order. The first non\-option argument is used @@ -106,43 +102,17 @@ already exists, it will be overwritten. Read variable names from \fBvarnames.txt\fP, and use them instead of generating the names. See \fBVARIABLE NAMES\fP, below. .UNINDENT -.SS Protection Options -.INDENT 0.0 -.TP -.B \fB\-p\fP, \fB\-pc\fP, \fB\-pv\fP -LIST\-protect the program, rather than unprotecting it. \fB\-pc\fP sets -an invalid (0) next\-line pointer on the last line of code. \fB\-pv\fP -replaces the variable names with the Atari EOL character (\fB$9B\fP). -\fB\-p\fP does both. None of the other options except \fB\-v\fP (verbose) -and \fB\-x\fP can be used with these. -.TP -.B \fB\-xr\fP, \fB\-xNN\fP -Character to use for variable name protection, with \fB\-p\fP or -\fB\-pv\fP\&. \fINN\fP is the character code in hex, e.g. \fB\-x20\fP to use -a space. Default is \fB9b\fP (the EOL character). \fB\-xr\fP means random -codes. Do not put a space between the \fB\-x\fP and the hex digits or \fBr\fP\&. -This option only works if \fB\-p\fP or \fB\-pv\fP is used. -.TP -.B \fB\-s\fP -Shrink variable name table to one byte per variable name, with -\fB\-p\fP or \fB\-pv\fP\&. Programs protected this way are very similar to -ones protected with \fBPROTECT.BAS\fP\&. -.UNINDENT .SH EXIT STATUS .INDENT 0.0 .TP .B 0 \fBinput\-file\fP was protected, unprotection was successful. -With \fB\-p\fP, \fB\-pc\fP, \fB\-pv\fP: \fBinput\-file\fP was not -protected, protection was successful. .TP .B 1 I/O error, or \fBinput\-file\fP isn\(aqt a valid BASIC program. .TP .B 2 \fBinput\-file\fP is already an unprotected BASIC program. -With \fB\-p\fP, \fB\-pc\fP, \fB\-pv\fP: \fBinput\-file\fP is already a -protected BASIC program. .UNINDENT .SH DETAILS .sp @@ -212,7 +182,7 @@ The program \fBPROTECT.BAS\fP, found on Disk 2 of the Holmes Archive, creates protected BASIC programs that only use variable name scrambling. .sp -\fBunprotbas \-pv\fP also does variable name scrambling. +\fBprotbas\fP(1) also does variable name scrambling. .TP .B Bad next\-line pointer Every line of tokenized BASIC contains a line length byte, which @@ -255,9 +225,7 @@ The program \fBUNPROTEC\fP, from the \fIPirate\(aqs Treasure Chest\fP, can fix bad pointers in protected programs, though it doesn\(aqt do anything about variable name scrambling. .sp -\fBunprotbas \-pc\fP also does this type of protection. It works by -adding a line 32767 to the program, with a bad next\-line pointer. -This will fail if there\(aqs already a line 32767. +\fBprotbas\fP also does this type of protection. .UNINDENT .sp One more thing \fBunprotbas\fP can do is remove extra data from the end @@ -381,8 +349,10 @@ Watson <\fI\%urchlay@slackware.uk\fP>; Urchlay on irc.libera.chat \fI##atari\fP\ \fBdasm2atasm\fP(1), \fBf2toxex\fP(1), \fBfenders\fP(1), +\fBprotbas\fP(1), \fBrom2cart\fP(1), \fBunmac65\fP(1), +\fBunprotbas\fP(1), \fBxexamine\fP(1), \fBxexcat\fP(1), \fBxexsplit\fP(1), |