xref: /dragonfly/games/hack/hack.sh (revision d5d36918)
1#!/bin/sh
2#	$NetBSD: hack.sh,v 1.3 2003/04/02 18:36:40 jsm Exp $
3
4#
5# Copyright (c) 1985, Stichting Centrum voor Wiskunde en Informatica,
6# Amsterdam
7# All rights reserved.
8#
9# Redistribution and use in source and binary forms, with or without
10# modification, are permitted provided that the following conditions are
11# met:
12#
13# - Redistributions of source code must retain the above copyright notice,
14# this list of conditions and the following disclaimer.
15#
16# - Redistributions in binary form must reproduce the above copyright
17# notice, this list of conditions and the following disclaimer in the
18# documentation and/or other materials provided with the distribution.
19#
20# - Neither the name of the Stichting Centrum voor Wiskunde en
21# Informatica, nor the names of its contributors may be used to endorse or
22# promote products derived from this software without specific prior
23# written permission.
24#
25# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
26# IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
27# TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
28# PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER
29# OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
30# EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
31# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
32# PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
33# LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
34# NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
35# SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36#
37
38#
39# Copyright (c) 1982 Jay Fenlason <hack@gnu.org>
40# All rights reserved.
41#
42# Redistribution and use in source and binary forms, with or without
43# modification, are permitted provided that the following conditions
44# are met:
45# 1. Redistributions of source code must retain the above copyright
46#    notice, this list of conditions and the following disclaimer.
47# 2. Redistributions in binary form must reproduce the above copyright
48#    notice, this list of conditions and the following disclaimer in the
49#    documentation and/or other materials provided with the distribution.
50# 3. The name of the author may not be used to endorse or promote products
51#    derived from this software without specific prior written permission.
52#
53# THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
54# INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
55# AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL
56# THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
57# EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
58# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
59# OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
60# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
61# OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
62# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
63#
64
65HACKDIR=/usr/games/lib/hackdir
66HACK=$HACKDIR/hack
67MAXNROFPLAYERS=4
68
69cd $HACKDIR
70case $1 in
71	-s*)
72		exec $HACK $@
73		;;
74	*)
75		exec $HACK $@ $MAXNROFPLAYERS
76		;;
77esac
78