-# NetHack 3.5 Arch.des $Date$ $Revision$
+# NetHack 3.5 Arch.des $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Arch.des $Date: 2009/05/06 10:44:15 $ $Revision: 1.6 $
# SCCS Id: @(#)Arch.des 3.5 1997/01/31
# Copyright (c) 1989 by Jean-Christophe Collet
# Copyright (c) 1991 by M. Stephenson
-# NetHack 3.5 Barb.des $Date$ $Revision$
+# NetHack 3.5 Barb.des $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Barb.des $Date: 2009/05/06 10:44:15 $ $Revision: 1.4 $
# SCCS Id: @(#)Barb.des 3.5 1991/12/22
# Copyright (c) 1989 by Jean-Christophe Collet
# Copyright (c) 1991 by M. Stephenson
-# NetHack 3.5 Caveman.des $Date$ $Revision$
+# NetHack 3.5 Caveman.des $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Caveman.des $Date: 2009/05/06 10:44:15 $ $Revision: 1.4 $
# SCCS Id: @(#)Caveman.des 3.5 1995/10/07
# Copyright (c) 1989 by Jean-Christophe Collet
# Copyright (c) 1991 by M. Stephenson
-# NetHack 3.5 Healer.des $Date$ $Revision$
+# NetHack 3.5 Healer.des $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Healer.des $Date: 2009/05/06 10:44:16 $ $Revision: 1.5 $
# SCCS Id: @(#)Healer.des 3.5 1995/04/16
# Copyright (c) 1989 by Jean-Christophe Collet
# Copyright (c) 1991, 1993 by M. Stephenson, P. Winner
-# NetHack 3.5 Knight.des $Date$ $Revision$
+# NetHack 3.5 Knight.des $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Knight.des $Date: 2009/05/06 10:44:16 $ $Revision: 1.4 $
# SCCS Id: @(#)Knight.des 3.5 1995/04/16
# Copyright (c) 1989 by Jean-Christophe Collet
# Copyright (c) 1991,92 by M. Stephenson
-# NetHack 3.5 Monk.des $Date$ $Revision$
+# NetHack 3.5 Monk.des $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Monk.des $Date: 2009/05/06 10:44:16 $ $Revision: 1.6 $
# SCCS Id: @(#)Monk.des 3.5 2002/04/08
# Copyright (c) 1989 by Jean-Christophe Collet
# Copyright (c) 1991-2 by M. Stephenson
-# NetHack 3.5 Priest.des $Date$ $Revision$
+# NetHack 3.5 Priest.des $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Priest.des $Date: 2009/05/06 10:44:17 $ $Revision: 1.5 $
# SCCS Id: @(#)Priest.des 3.5 2002/04/08
# Copyright (c) 1989 by Jean-Christophe Collet
# Copyright (c) 1991-2 by M. Stephenson
-# NetHack 3.5 Ranger.des $Date$ $Revision$
+# NetHack 3.5 Ranger.des $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Ranger.des $Date: 2009/05/06 10:44:17 $ $Revision: 1.4 $
# SCCS Id: @(#)Ranger.des 3.5 2001/02/01
# Copyright (c) 1989 by Jean-Christophe Collet
# Copyright (c) 1991 by M. Stephenson
-# NetHack 3.5 Rogue.des $Date$ $Revision$
+# NetHack 3.5 Rogue.des $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Rogue.des $Date: 2009/05/06 10:44:17 $ $Revision: 1.6 $
# SCCS Id: @(#)Rogue.des 3.5 2002/02/15
# Copyright (c) 1992 by Dean Luick
# NetHack may be freely redistributed. See license for details.
-# NetHack 3.5 Samurai.des $Date$ $Revision$
+# NetHack 3.5 Samurai.des $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Samurai.des $Date: 2009/05/06 10:44:17 $ $Revision: 1.6 $
# SCCS Id: @(#)Samurai.des 3.5 2002/04/08
# Copyright (c) 1989 by Jean-Christophe Collet
# Copyright (c) 1991-92 by M. Stephenson, P. Winner
-# NetHack 3.5 Tourist.des $Date$ $Revision$
+# NetHack 3.5 Tourist.des $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Tourist.des $Date: 2009/05/06 10:44:17 $ $Revision: 1.4 $
# SCCS Id: @(#)Tourist.des 3.5 1992/09/26
# Copyright (c) 1989 by Jean-Christophe Collet
# Copyright (c) 1991,92 by M. Stephenson, P. Winner
-# NetHack 3.5 Valkyrie.des $Date$ $Revision$
+# NetHack 3.5 Valkyrie.des $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Valkyrie.des $Date: 2009/05/06 10:44:17 $ $Revision: 1.6 $
# SCCS Id: @(#)Valkyrie.des 3.5 2007/08/01
# Copyright (c) 1989 by Jean-Christophe Collet
# Copyright (c) 1991-2 by M. Stephenson
-# NetHack 3.5 Wizard.des $Date$ $Revision$
+# NetHack 3.5 Wizard.des $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Wizard.des $Date: 2009/05/06 10:44:17 $ $Revision: 1.5 $
# SCCS Id: @(#)Wizard.des 3.5 1992/07/11
# Copyright (c) 1992 by David Cohrs
# NetHack may be freely redistributed. See license for details.
-# NetHack 3.5 bigroom.des $Date$ $Revision$
+# NetHack 3.5 bigroom.des $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 bigroom.des $Date: 2009/05/06 10:44:18 $ $Revision: 1.4 $
# SCCS Id: @(#)bigroom.des 3.5 1990/04/15
# Copyright (c) 1989 by Jean-Christophe Collet
# Copyright (c) 1990 by M. Stephenson
-# NetHack 3.5 castle.des $Date$ $Revision$
+# NetHack 3.5 castle.des $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 castle.des $Date: 2009/05/06 10:44:18 $ $Revision: 1.5 $
# SCCS Id: @(#)castle.des 3.5 2002/05/02
# Copyright (c) 1989 by Jean-Christophe Collet
# NetHack may be freely redistributed. See license for details.
-# NetHack 3.5 data.base $Date$ $Revision$
+# NetHack 3.5 data.base $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 data.base $Date: 2014/10/09 02:04:43 $ $Revision: 1.50 $
# Copyright (c) 1994, 1995, 1996 by the NetHack Development Team
# Copyright (c) 1994 by Boudewijn Wayers
# NetHack may be freely redistributed. See license for details.
-# NetHack 3.5 dungeon.def $Date$ $Revision$
+# NetHack 3.5 dungeon.def $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 dungeon.def $Date: 2009/05/06 10:44:21 $ $Revision: 1.6 $
# SCCS Id: @(#)dungeon.def 3.5 2006/03/18
# Copyright (c) 1990-95 by M. Stephenson
# NetHack may be freely redistributed. See license for details.
-# NetHack 3.5 endgame.des $Date$ $Revision$
+# NetHack 3.5 endgame.des $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 endgame.des $Date: 2009/05/06 10:44:22 $ $Revision: 1.6 $
# SCCS Id: @(#)endgame.des 3.5 2007/03/02
# Copyright (c) 1989 by Jean-Christophe Collet
# Copyright (c) 1992,1993 by Izchak Miller, David Cohrs,
-# NetHack 3.5 gehennom.des $Date$ $Revision$
+# NetHack 3.5 gehennom.des $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 gehennom.des $Date: 2009/05/06 10:44:23 $ $Revision: 1.5 $
# SCCS Id: @(#)gehennom.des 3.5 2005/02/02
# Copyright (c) 1989 by Jean-Christophe Collet
# Copyright (c) 1992 by M. Stephenson and Izchak Miller
-# NetHack 3.5 knox.des $Date$ $Revision$
+# NetHack 3.5 knox.des $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 knox.des $Date: 2009/05/06 10:44:23 $ $Revision: 1.5 $
# SCCS Id: @(#)knox.des 3.5 2006/03/20
# Copyright (c) 1989 by Jean-Christophe Collet
# Copyright (c) 1992 by Izchak Miller
-# NetHack 3.5 medusa.des $Date$ $Revision$
+# NetHack 3.5 medusa.des $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 medusa.des $Date: 2009/05/06 10:44:23 $ $Revision: 1.5 $
# SCCS Id: @(#)medusa.des 3.5 1996/05/11
# Copyright (c) 1989 by Jean-Christophe Collet
# Copyright (c) 1990, 1991 by M. Stephenson
-# NetHack 3.5 mines.des $Date$ $Revision$
+# NetHack 3.5 mines.des $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 mines.des $Date: 2009/05/06 10:44:23 $ $Revision: 1.17 $
# SCCS Id: @(#)mines.des 3.5 2002/05/02
# Copyright (c) 1989-95 by Jean-Christophe Collet
# Copyright (c) 1991-95 by M. Stephenson
-# NetHack 3.5 oracle.des $Date$ $Revision$
+# NetHack 3.5 oracle.des $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 oracle.des $Date: 2009/05/06 10:44:23 $ $Revision: 1.4 $
# SCCS Id: @(#)oracle.des 3.5 1995/10/07
# NetHack may be freely redistributed. See license for details.
#
-# NetHack 3.5 quest.txt $Date$ $Revision$
+# NetHack 3.5 quest.txt $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 quest.txt $Date: 2009/05/06 10:44:23 $ $Revision: 1.23 $
# SCCS Id: @(#)quest.txt 3.5 2005/12/03
# Copyright (c) 1991 by M. Stephenson
# NetHack may be freely redistributed. See license for details.
-# NetHack 3.5 sokoban.des $Date$ $Revision$
+# NetHack 3.5 sokoban.des $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 sokoban.des $Date: 2009/05/06 10:44:24 $ $Revision: 1.5 $
# SCCS Id: @(#)sokoban.des 3.5 1999/03/15
# Copyright (c) 1998-1999 by Kevin Hugo
# NetHack may be freely redistributed. See license for details.
-# NetHack 3.5 tower.des $Date$ $Revision$
+# NetHack 3.5 tower.des $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 tower.des $Date: 2009/05/06 10:44:25 $ $Revision: 1.4 $
# SCCS Id: @(#)tower.des 3.5 1990/02/26
# Copyright (c) 1989 by Jean-Christophe Collet
# NetHack may be freely redistributed. See license for details.
-# NetHack 3.5 yendor.des $Date$ $Revision$
+# NetHack 3.5 yendor.des $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 yendor.des $Date: 2009/05/06 10:44:25 $ $Revision: 1.5 $
# SCCS Id: @(#)yendor.des 3.5 1996/10/20
# Copyright (c) 1989 by Jean-Christophe Collet
# Copyright (c) 1992 by M. Stephenson and Izchak Miller
-.\" $Revision$ $Date$
+.\" $NHDT-Branch$:$NHDT-Revision$ $NHDT-Date$
+.\" $Revision: 1.130 $ $Date: 2012/05/02 00:38:30 $
.ds h0 "NetHack Guidebook
.ds h1
.ds h2 %
.TH DGN_COMP 6 "12 Dec 1995"
-.\" NetHack 3.5 dgn_comp.6 $Date$ $Revision$
+.\" NetHack 3.5 dgn_comp.6 $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+.\" NetHack 3.5 dgn_comp.6 $Date: 2009/05/06 10:44:28 $ $Revision: 1.2 $
.UC 4
.SH NAME
dgn_comp \- NetHack dungeon compiler
.TH DLB 6 "28 Oct 1993"
-.\" NetHack 3.5 dlb.6 $Date$ $Revision$
+.\" NetHack 3.5 dlb.6 $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+.\" NetHack 3.5 dlb.6 $Date: 2009/05/06 10:44:28 $ $Revision: 1.3 $
.UC 4
.SH NAME
dlb \- NetHack data librarian
-$RCSfile$ $Revision$ $Date$
+$NHDT-Branch$:$NHDT-Revision$ $NHDT-Date$
+$RCSfile: fixes30.0,v $ $Revision: 1.2 $ $Date: 2003/05/11 15:09:24 $
[This is a partial list supplied by Ken Arromdee long after the fact]
-$RCSfile$ $Revision$ $Date$
+$NHDT-Branch$:$NHDT-Revision$ $NHDT-Date$
+$RCSfile: fixes34.1,v $ $Revision: 1.331 $ $Date: 2003/02/20 00:19:46 $
General Fixes and Modified Features
-----------------------------------
-$RCSfile$ $Revision$ $Date$
+$NHDT-Branch$:$NHDT-Revision$ $NHDT-Date$
+$RCSfile: fixes34.2,v $ $Revision: 1.132 $ $Date: 2003/08/26 15:11:58 $
General Fixes and Modified Features
-----------------------------------
-$RCSfile$ $Revision$ $Date$
+$NHDT-Branch$:$NHDT-Revision$ $NHDT-Date$
+$RCSfile: fixes34.3,v $ $Revision: 1.103 $ $Date: 2003/12/06 14:08:46 $
General Fixes and Modified Features
-----------------------------------
-$rcsfile: fixes35.0,v $ $Revision$ $Date$
+$NHDT-Branch$:$NHDT-Revision$ $NHDT-Date$
+$rcsfile: fixes35.0,v $ $Revision: 1.445 $ $Date: 2014/11/18 03:10:36 $
General Fixes and Modified Features
-----------------------------------
.TH LEV_COMP 6 "16 May 1996"
-.\" NetHack 3.5 lev_comp.6 $Date$ $Revision$
+.\" NetHack 3.5 lev_comp.6 $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+.\" NetHack 3.5 lev_comp.6 $Date: 2009/05/06 10:44:28 $ $Revision: 1.2 $
.UC 4
.SH NAME
lev_comp \- NetHack special levels compiler
.TH MAKEDEFS 6 "29 Apr 2010"
-.\" NetHack 3.5 makedefs.6 $Date$ $Revision$
+.\" NetHack 3.5 makedefs.6 $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+.\" NetHack 3.5 makedefs.6 $Date: 2010/05/01 20:57:12 $ $Revision: 1.1 $
.UC 4
.SH NAME
makedefs \- NetHack miscellaneous build-time functions
.TH NETHACK 6 "6 March 2004"
-.\" NetHack 3.5 nethack.6 $Date$ $Revision$
+.\" NetHack 3.5 nethack.6 $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+.\" NetHack 3.5 nethack.6 $Date: 2009/05/06 10:44:28 $ $Revision: 1.7 $
.SH NAME
nethack \- Exploring The Mazes of Menace
.SH SYNOPSIS
.TH RECOVER 6 "9 January 1993"
-.\" NetHack 3.5 recover.6 $Date$ $Revision$
+.\" NetHack 3.5 recover.6 $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+.\" NetHack 3.5 recover.6 $Date: 2009/05/06 10:44:29 $ $Revision: 1.3 $
.UC 4
.SH NAME
recover \- recover a NetHack game interrupted by disaster
-NetHack 3.5 window.doc $Date$ $Revision$
+NetHack 3.5 window.doc $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+NetHack 3.5 window.doc $Date: 2012/01/23 10:41:55 $ $Revision: 1.36 $
Introduction
-/* NetHack 3.5 align.h $Date$ $Revision$ */
+/* NetHack 3.5 align.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 align.h $Date: 2009/05/06 10:44:33 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)align.h 3.5 1991/12/29 */
/* Copyright (c) Mike Stephenson, Izchak Miller 1991. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 amiconf.h $Date$ $Revision$ */
+/* NetHack 3.5 amiconf.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 amiconf.h $Date: 2012/01/10 17:47:16 $ $Revision: 1.8 $ */
/* Copyright (c) Kenneth Lorber, Bethesda, Maryland, 1990, 1991, 1992, 1993. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 artifact.h $Date$ $Revision$ */
+/* NetHack 3.5 artifact.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 artifact.h $Date: 2011/04/07 18:10:44 $ $Revision: 1.6 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 artilist.h $Date$ $Revision$ */
+/* NetHack 3.5 artilist.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 artilist.h $Date: 2011/04/07 18:10:44 $ $Revision: 1.8 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 attrib.h $Date$ $Revision$ */
+/* NetHack 3.5 attrib.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 attrib.h $Date: 2009/05/06 10:44:34 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)attrib.h 3.5 1990/22/02 */
/* Copyright 1988, Mike Stephenson */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 beconf.h $Date$ $Revision$ */
+/* NetHack 3.5 beconf.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 beconf.h $Date: 2009/05/06 10:44:34 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)beconf.h 3.5 1998/07/08 */
/* Copyright (c) Dean Luick 1996. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 botl.h $Date$ $Revision$ */
+/* NetHack 3.5 botl.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 botl.h $Date: 2012/01/10 17:47:16 $ $Revision: 1.6 $ */
/* Copyright (c) Michael Allison, 2003 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 color.h $Date$ $Revision$ */
+/* NetHack 3.5 color.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 color.h $Date: 2009/05/06 10:44:34 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)color.h 3.5 1992/02/02 */
/* Copyright (c) Steve Linhart, Eric Raymond, 1989. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 config.h $Date$ $Revision$ */
+/* NetHack 3.5 config.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 config.h $Date: 2012/01/27 20:15:26 $ $Revision: 1.37 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 config1.h $Date$ $Revision$ */
+/* NetHack 3.5 config1.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 config1.h $Date: 2011/05/23 03:27:07 $ $Revision: 1.13 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 context.h $Date$ $Revision$ */
+/* NetHack 3.5 context.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 context.h $Date: 2012/01/10 17:47:16 $ $Revision: 1.15 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 coord.h $Date$ $Revision$ */
+/* NetHack 3.5 coord.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 coord.h $Date: 2012/01/10 17:47:16 $ $Revision: 1.5 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 decl.h $Date$ $Revision$ */
+/* NetHack 3.5 decl.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 decl.h $Date: 2011/12/29 20:06:27 $ $Revision: 1.44 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 def_os2.h $Date$ $Revision$ */
+/* NetHack 3.5 def_os2.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 def_os2.h $Date: 2009/05/06 10:44:37 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)def_os2.h 3.5 1993/01/19 */
/* Copyright (c) Timo Hakulinen, 1990, 1991, 1992, 1993. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 dgn_file.h $Date$ $Revision$ */
+/* NetHack 3.5 dgn_file.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 dgn_file.h $Date: 2009/05/06 10:44:38 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)dgn_file.h 3.5 1993/01/17 */
/* Copyright (c) 1989 by M. Stephenson */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 display.h $Date$ $Revision$ */
+/* NetHack 3.5 display.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 display.h $Date: 2009/05/06 10:44:38 $ $Revision: 1.14 $ */
/* SCCS Id: @(#)display.h 3.5 2005/06/21 */
/* Copyright (c) Dean Luick, with acknowledgements to Kevin Darcy */
/* and Dave Cohrs, 1990. */
-/* NetHack 3.5 dlb.h $Date$ $Revision$ */
+/* NetHack 3.5 dlb.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 dlb.h $Date: 2009/05/06 10:44:38 $ $Revision: 1.6 $ */
/* SCCS Id: @(#)dlb.h 3.5 1997/07/29 */
/* Copyright (c) Kenneth Lorber, Bethesda, Maryland, 1993. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 dungeon.h $Date$ $Revision$ */
+/* NetHack 3.5 dungeon.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 dungeon.h $Date: 2012/04/14 08:31:03 $ $Revision: 1.11 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 engrave.h $Date$ $Revision$ */
+/* NetHack 3.5 engrave.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 engrave.h $Date: 2009/05/06 10:44:39 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)engrave.h 3.5 1991/07/31 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 extern.h $Date$ $Revision$ */
+/* NetHack 3.5 extern.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 extern.h $Date: 2013/11/05 00:57:53 $ $Revision: 1.380 $ */
/* Copyright (c) Steve Creps, 1988. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 flag.h $Date$ $Revision$ */
+/* NetHack 3.5 flag.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 flag.h $Date: 2012/04/09 02:56:32 $ $Revision: 1.59 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 func_tab.h $Date$ $Revision$ */
+/* NetHack 3.5 func_tab.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 func_tab.h $Date: 2009/05/06 10:44:44 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)func_tab.h 3.5 1992/04/03 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 global.h $Date$ $Revision$ */
+/* NetHack 3.5 global.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 global.h $Date: 2012/01/29 03:00:14 $ $Revision: 1.31 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 hack.h $Date$ $Revision$ */
+/* NetHack 3.5 hack.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 hack.h $Date: 2009/05/06 10:44:46 $ $Revision: 1.49 $ */
/* SCCS Id: @(#)hack.h 3.5 2008/03/19 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 lev.h $Date$ $Revision$ */
+/* NetHack 3.5 lev.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 lev.h $Date: 2009/05/06 10:44:48 $ $Revision: 1.7 $ */
/* SCCS Id: @(#)lev.h 3.5 2006/07/08 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mac-carbon.h $Date$ $Revision$ */
+/* NetHack 3.5 mac-carbon.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mac-carbon.h $Date: 2009/05/06 10:44:49 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)mac-carbon.h 3.5 2003/06/01 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 2003. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mac-qt.h $Date$ $Revision$ */
+/* NetHack 3.5 mac-qt.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mac-qt.h $Date: 2009/05/06 10:44:50 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)mac-qt.h 3.5 2003/06/01 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 2003. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mac-term.h $Date$ $Revision$ */
+/* NetHack 3.5 mac-term.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mac-term.h $Date: 2009/05/06 10:44:50 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)mac-term.h 3.5 2003/06/01 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 2003. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 macconf.h $Date$ $Revision$ */
+/* NetHack 3.5 macconf.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 macconf.h $Date: 2009/05/06 10:44:51 $ $Revision: 1.8 $ */
/* SCCS Id: @(#)macconf.h 3.5 1999/10/25 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 macpopup.h $Date$ $Revision$ */
+/* NetHack 3.5 macpopup.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 macpopup.h $Date: 2009/05/06 10:44:51 $ $Revision: 1.6 $ */
/* SCCS Id: @(#)macpopup.h 3.5 1999/10/25 */
/* Copyright (c) Nethack Develpment Team, 1999. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mactty.h $Date$ $Revision$ */
+/* NetHack 3.5 mactty.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mactty.h $Date: 2009/05/06 10:44:51 $ $Revision: 1.6 $ */
/* SCCS Id: @(#)mactty.h 3.5 1993/03/01 */
/* Copyright (c) Jon W{tte 1993. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 macwin.h $Date$ $Revision$ */
+/* NetHack 3.5 macwin.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 macwin.h $Date: 2009/05/06 10:44:52 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)macwin.h 3.5 1996/01/15 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mail.h $Date$ $Revision$ */
+/* NetHack 3.5 mail.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mail.h $Date: 2009/05/06 10:44:52 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)mail.h 3.5 1991/10/11 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mextra.h $Date$ $Revision$ */
+/* NetHack 3.5 mextra.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mextra.h $Date: 2011/04/15 01:55:40 $ $Revision: 1.12 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mfndpos.h $Date$ $Revision$ */
+/* NetHack 3.5 mfndpos.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mfndpos.h $Date: 2009/05/06 10:44:53 $ $Revision: 1.6 $ */
/* SCCS Id: @(#)mfndpos.h 3.5 2002/04/06 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 micro.h $Date$ $Revision$ */
+/* NetHack 3.5 micro.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 micro.h $Date: 2009/05/06 10:44:53 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)micro.h 3.5 1990/02/22 */
/* micro.h - function declarations for various microcomputers */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mkroom.h $Date$ $Revision$ */
+/* NetHack 3.5 mkroom.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mkroom.h $Date: 2012/02/15 01:55:31 $ $Revision: 1.8 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 monattk.h $Date$ $Revision$ */
+/* NetHack 3.5 monattk.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 monattk.h $Date: 2009/05/06 10:44:54 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)monattk.h 3.5 2002/03/24 */
/* NetHack may be freely redistributed. See license for details. */
/* Copyright 1988, M. Stephenson */
-/* NetHack 3.5 mondata.h $Date$ $Revision$ */
+/* NetHack 3.5 mondata.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mondata.h $Date: 2009/05/06 10:44:54 $ $Revision: 1.18 $ */
/* SCCS Id: @(#)mondata.h 3.5 2007/04/27 */
/* Copyright (c) 1989 Mike Threepoint */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 monflag.h $Date$ $Revision$ */
+/* NetHack 3.5 monflag.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 monflag.h $Date: 2009/05/06 10:44:54 $ $Revision: 1.6 $ */
/* SCCS Id: @(#)monflag.h 3.5 1996/05/04 */
/* Copyright (c) 1989 Mike Threepoint */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 monst.h $Date$ $Revision$ */
+/* NetHack 3.5 monst.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 monst.h $Date: 2009/05/06 10:44:55 $ $Revision: 1.14 $ */
/* SCCS Id: @(#)monst.h 3.5 2006/09/06 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 monsym.h $Date$ $Revision$ */
+/* NetHack 3.5 monsym.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 monsym.h $Date: 2009/05/06 10:44:55 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)monsym.h 3.5 2007/04/07 */
/* Monster symbols and creation information rev 1.0 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mttypriv.h $Date$ $Revision$ */
+/* NetHack 3.5 mttypriv.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mttypriv.h $Date: 2009/05/06 10:44:55 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)mttypriv.h 3.5 1993/03/01 */
/* Copyright (c) Jon W{tte 1993. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 ntconf.h $Date$ $Revision$ */
+/* NetHack 3.5 ntconf.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 ntconf.h $Date: 2012/01/15 19:11:38 $ $Revision: 1.35 $ */
/* SCCS Id: @(#)ntconf.h 3.5 2002/03/10 */
/* Copyright (c) NetHack PC Development Team 1993, 1994. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 obj.h $Date$ $Revision$ */
+/* NetHack 3.5 obj.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 obj.h $Date: 2012/01/10 17:47:16 $ $Revision: 1.31 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 objclass.h $Date$ $Revision$ */
+/* NetHack 3.5 objclass.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 objclass.h $Date: 2009/05/06 10:44:58 $ $Revision: 1.9 $ */
/* SCCS Id: @(#)objclass.h 3.5 1996/06/16 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 os2conf.h $Date$ $Revision$ */
+/* NetHack 3.5 os2conf.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 os2conf.h $Date: 2009/05/06 10:44:58 $ $Revision: 1.6 $ */
/* SCCS Id: @(#)os2conf.h 3.5 2007/01/08 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* Copyright (c) Timo Hakulinen, 1990, 1991, 1992, 1993, 1996. */
-/* NetHack 3.5 patchlevel.h $Date$ $Revision$ */
+/* NetHack 3.5 patchlevel.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 patchlevel.h $Date: 2012/04/14 08:31:03 $ $Revision: 1.93 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 pcconf.h $Date$ $Revision$ */
+/* NetHack 3.5 pcconf.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 pcconf.h $Date: 2009/05/06 10:45:00 $ $Revision: 1.11 $ */
/* SCCS Id: @(#)pcconf.h 3.5 1995/10/11 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 permonst.h $Date$ $Revision$ */
+/* NetHack 3.5 permonst.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 permonst.h $Date: 2009/05/06 10:45:00 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)permonst.h 3.5 2006/01/04 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 prop.h $Date$ $Revision$ */
+/* NetHack 3.5 prop.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 prop.h $Date: 2011/10/01 00:25:52 $ $Revision: 1.7 $ */
/* Copyright (c) 1989 Mike Threepoint */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 qt_clust.h $Date$ $Revision$ */
+/* NetHack 3.5 qt_clust.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 qt_clust.h $Date: 2009/05/06 10:45:01 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)qt_clust.h 3.5 1999/11/19 */
/* Copyright (c) Warwick Allison, 1999. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 qt_kde0.h $Date$ $Revision$ */
+/* NetHack 3.5 qt_kde0.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 qt_kde0.h $Date: 2009/05/06 10:45:01 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)qt_kde0.h 3.5 1999/11/19 */
/* Copyright (c) Warwick Allison, 1999. */
/* NetHack may be freely redistributed. See license for details. */
-// NetHack 3.5 qt_win.h $Date$ $Revision$
+// NetHack 3.5 qt_win.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+// NetHack 3.5 qt_win.h $Date: 2012/01/24 04:26:17 $ $Revision: 1.11 $
// Copyright (c) Warwick Allison, 1999.
// NetHack may be freely redistributed. See license for details.
//
-/* NetHack 3.5 qtext.h $Date$ $Revision$ */
+/* NetHack 3.5 qtext.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 qtext.h $Date: 2009/05/06 10:45:02 $ $Revision: 1.7 $ */
/* SCCS Id: @(#)qtext.h 3.5 1997/02/02 */
/* Copyright (c) Mike Stephenson 1991. */
/* NetHack may be freely redistributed. See license for details. */
/**********************************************************************
-** $Id$
+** $NHDT-Branch$:$NHDT-Revision$ $NHDT-Date$
+** $Id: qttableview.h,v 1.2 2002/03/09 03:13:13 jwalz Exp $
**
** Definition of QtTableView class
**
-/* NetHack 3.5 quest.h $Date$ $Revision$ */
+/* NetHack 3.5 quest.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 quest.h $Date: 2009/05/06 10:45:03 $ $Revision: 1.6 $ */
/* SCCS Id: @(#)quest.h 3.5 1992/11/15 */
/* Copyright (c) Mike Stephenson 1991. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 rect.h $Date$ $Revision$ */
+/* NetHack 3.5 rect.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 rect.h $Date: 2009/05/06 10:45:03 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)rect.h 3.5 1990/02/22 */
/* Copyright (c) 1990 by Jean-Christophe Collet */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 region.h $Date$ $Revision$ */
+/* NetHack 3.5 region.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 region.h $Date: 2009/05/06 10:45:04 $ $Revision: 1.9 $ */
/* SCCS Id: @(#)region.h 3.5 2006/06/27 */
/* Copyright (c) 1996 by Jean-Christophe Collet */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 rm.h $Date$ $Revision$ */
+/* NetHack 3.5 rm.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 rm.h $Date: 2012/02/16 23:06:00 $ $Revision: 1.23 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 skills.h $Date$ $Revision$ */
+/* NetHack 3.5 skills.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 skills.h $Date: 2009/05/06 10:45:05 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)skills.h 3.5 2006/12/14 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985-1999. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 sp_lev.h $Date$ $Revision$ */
+/* NetHack 3.5 sp_lev.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 sp_lev.h $Date: 2009/05/06 10:45:06 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)sp_lev.h 3.5 2007/08/01 */
/* Copyright (c) 1989 by Jean-Christophe Collet */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 spell.h $Date$ $Revision$ */
+/* NetHack 3.5 spell.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 spell.h $Date: 2009/05/06 10:45:09 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)spell.h 3.5 2006/02/11 */
/* Copyright 1986, M. Stephenson */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 sys.h $Date$ $Revision$ */
+/* NetHack 3.5 sys.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 sys.h $Date: 2012/01/27 20:15:26 $ $Revision: 1.9 $ */
/* Copyright (c) Kenneth Lorber, Kensington, Maryland, 2008. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 system.h $Date$ $Revision$ */
+/* NetHack 3.5 system.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 system.h $Date: 2009/05/06 10:45:10 $ $Revision: 1.7 $ */
/* SCCS Id: @(#)system.h 3.5 2003/11/30 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 tcap.h $Date$ $Revision$ */
+/* NetHack 3.5 tcap.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 tcap.h $Date: 2009/05/06 10:45:11 $ $Revision: 1.6 $ */
/* SCCS Id: @(#)tcap.h 3.5 1992/10/21 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1989. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 tile2x11.h $Date$ $Revision$ */
+/* NetHack 3.5 tile2x11.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 tile2x11.h $Date: 2009/05/06 10:45:11 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)tile2x11.h 3.5 1995/01/25 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 timeout.h $Date$ $Revision$ */
+/* NetHack 3.5 timeout.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 timeout.h $Date: 2009/05/06 10:45:12 $ $Revision: 1.6 $ */
/* SCCS Id: @(#)timeout.h 3.5 1999/02/13 */
/* Copyright 1994, Dean Luick */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 tosconf.h $Date$ $Revision$ */
+/* NetHack 3.5 tosconf.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 tosconf.h $Date: 2009/05/06 10:45:12 $ $Revision: 1.3 $ */
/* SCCS Id: @(#)tosconf.h 3.5 1990/02/22 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 tradstdc.h $Date$ $Revision$ */
+/* NetHack 3.5 tradstdc.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 tradstdc.h $Date: 2012/01/11 18:23:26 $ $Revision: 1.15 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 trampoli.h $Date$ $Revision$ */
+/* NetHack 3.5 trampoli.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 trampoli.h $Date: 2009/05/06 10:45:13 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)trampoli.h 3.5 1995/06/01 */
/* Copyright (c) 1989, by Norm Meluch and Stephen Spackman */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 trap.h $Date$ $Revision$ */
+/* NetHack 3.5 trap.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 trap.h $Date: 2009/05/06 10:45:14 $ $Revision: 1.7 $ */
/* SCCS Id: @(#)trap.h 3.5 2000/08/30 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 unixconf.h $Date$ $Revision$ */
+/* NetHack 3.5 unixconf.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 unixconf.h $Date: 2011/04/19 02:02:06 $ $Revision: 1.15 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 vision.h $Date$ $Revision$ */
+/* NetHack 3.5 vision.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 vision.h $Date: 2009/05/06 10:45:15 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)vision.h 3.5 2007/05/11 */
/* Copyright (c) Dean Luick, with acknowledgements to Dave Cohrs, 1990. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 vmsconf.h $Date$ $Revision$ */
+/* NetHack 3.5 vmsconf.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 vmsconf.h $Date: 2011/09/01 01:46:55 $ $Revision: 1.14 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 wceconf.h $Date$ $Revision$ */
+/* NetHack 3.5 wceconf.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 wceconf.h $Date: 2009/10/22 02:59:14 $ $Revision: 1.12 $ */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 winGnome.h $Date$ $Revision$ */
+/* NetHack 3.5 winGnome.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 winGnome.h $Date: 2009/05/06 10:45:16 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)winGnome.h 3.4. 2000/07/16 */
/* Copyright (C) 1998 by Erik Andersen <andersee@debian.org> */
/* Copyright (C) 1998 by Anthony Taylor <tonyt@ptialaska.net> */
-/* NetHack 3.5 winX.h $Date$ $Revision$ */
+/* NetHack 3.5 winX.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 winX.h $Date: 2012/01/24 04:26:18 $ $Revision: 1.9 $ */
/* Copyright (c) Dean Luick, 1992 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 winami.h $Date$ $Revision$ */
+/* NetHack 3.5 winami.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 winami.h $Date: 2009/05/06 10:45:17 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)winami.h 3.5 1993/01/17 */
/* Copyright (c) Kenneth Lorber, Bethesda, Maryland, 1991. */
/* Copyright (c) Gregg Wonderly, Naperville, Illinois, 1992, 1993. */
-/* NetHack 3.5 wingem.h $Date$ $Revision$ */
+/* NetHack 3.5 wingem.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 wingem.h $Date: 2012/01/24 04:26:18 $ $Revision: 1.7 $ */
/* Copyright (c) Christian Bressler, 1999 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 winprocs.h $Date$ $Revision$ */
+/* NetHack 3.5 winprocs.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 winprocs.h $Date: 2012/01/23 10:45:26 $ $Revision: 1.29 $ */
/* Copyright (c) David Cohrs, 1992 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 wintty.h $Date$ $Revision$ */
+/* NetHack 3.5 wintty.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 wintty.h $Date: 2012/01/23 10:45:26 $ $Revision: 1.12 $ */
/* Copyright (c) David Cohrs, 1991,1992 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 wintype.h $Date$ $Revision$ */
+/* NetHack 3.5 wintype.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 wintype.h $Date: 2009/05/06 10:45:19 $ $Revision: 1.10 $ */
/* SCCS Id: @(#)wintype.h 3.5 2006/07/08 */
/* Copyright (c) David Cohrs, 1991 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 xwindow.h $Date$ $Revision$ */
+/* NetHack 3.5 xwindow.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 xwindow.h $Date: 2009/05/06 10:45:19 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)xwindow.h 3.5 1992/03/07 */
/* Copyright (c) Dean Luick, 1992 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 xwindowp.h $Date$ $Revision$ */
+/* NetHack 3.5 xwindowp.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 xwindowp.h $Date: 2009/05/06 10:45:19 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)xwindowp.h 3.5 1992/03/07 */
/* Copyright (c) Dean Luick, 1992 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 you.h $Date$ $Revision$ */
+/* NetHack 3.5 you.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 you.h $Date: 2012/04/14 08:31:03 $ $Revision: 1.13 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 youprop.h $Date$ $Revision$ */
+/* NetHack 3.5 youprop.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 youprop.h $Date: 2011/10/15 03:00:42 $ $Revision: 1.13 $ */
/* Copyright (c) 1989 Mike Threepoint */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 allmain.c $Date$ $Revision$ */
+/* NetHack 3.5 allmain.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 allmain.c $Date: 2012/05/16 01:47:18 $ $Revision: 1.43 $ */
/* SCCS Id: @(#)allmain.c 3.5 2007/03/12 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 alloc.c $Date$ $Revision$ */
+/* NetHack 3.5 alloc.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 alloc.c $Date: 2012/01/29 03:00:17 $ $Revision: 1.8 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 apply.c $Date$ $Revision$ */
+/* NetHack 3.5 apply.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 apply.c $Date: 2012/05/01 02:22:32 $ $Revision: 1.168 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 artifact.c $Date$ $Revision$ */
+/* NetHack 3.5 artifact.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 artifact.c $Date: 2013/11/07 01:03:16 $ $Revision: 1.77 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 attrib.c $Date$ $Revision$ */
+/* NetHack 3.5 attrib.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 attrib.c $Date: 2011/10/01 00:25:55 $ $Revision: 1.30 $ */
/* Copyright 1988, 1989, 1990, 1992, M. Stephenson */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 ball.c $Date$ $Revision$ */
+/* NetHack 3.5 ball.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 ball.c $Date: 2011/08/30 22:13:26 $ $Revision: 1.17 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 bones.c $Date$ $Revision$ */
+/* NetHack 3.5 bones.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 bones.c $Date: 2012/02/16 02:40:24 $ $Revision: 1.39 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985,1993. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 botl.c $Date$ $Revision$ */
+/* NetHack 3.5 botl.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 botl.c $Date: 2012/01/10 17:47:19 $ $Revision: 1.36 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 cmd.c $Date$ $Revision$ */
+/* NetHack 3.5 cmd.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 cmd.c $Date: 2013/03/16 01:44:28 $ $Revision: 1.162 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 dbridge.c $Date$ $Revision$ */
+/* NetHack 3.5 dbridge.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 dbridge.c $Date: 2012/02/01 00:49:16 $ $Revision: 1.21 $ */
/* Copyright (c) 1989 by Jean-Christophe Collet */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 decl.c $Date$ $Revision$ */
+/* NetHack 3.5 decl.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 decl.c $Date: 2012/04/09 02:56:30 $ $Revision: 1.37 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 detect.c $Date$ $Revision$ */
+/* NetHack 3.5 detect.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 detect.c $Date: 2012/04/16 02:05:40 $ $Revision: 1.47 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 dig.c $Date$ $Revision$ */
+/* NetHack 3.5 dig.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 dig.c $Date: 2012/02/16 03:01:37 $ $Revision: 1.67 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 display.c $Date$ $Revision$ */
+/* NetHack 3.5 display.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 display.c $Date: 2011/12/05 03:17:36 $ $Revision: 1.34 $ */
/* Copyright (c) Dean Luick, with acknowledgements to Kevin Darcy */
/* and Dave Cohrs, 1990. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 dlb.c $Date$ $Revision$ */
+/* NetHack 3.5 dlb.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 dlb.c $Date: 2012/02/16 03:01:37 $ $Revision: 1.10 $ */
/* Copyright (c) Kenneth Lorber, Bethesda, Maryland, 1993. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 do.c $Date$ $Revision$ */
+/* NetHack 3.5 do.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 do.c $Date: 2014/11/18 03:10:39 $ $Revision: 1.101 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 do_name.c $Date$ $Revision$ */
+/* NetHack 3.5 do_name.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 do_name.c $Date: 2012/01/29 03:00:17 $ $Revision: 1.49 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 do_wear.c $Date$ $Revision$ */
+/* NetHack 3.5 do_wear.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 do_wear.c $Date: 2012/02/05 04:26:48 $ $Revision: 1.69 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 dog.c $Date$ $Revision$ */
+/* NetHack 3.5 dog.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 dog.c $Date: 2011/04/15 01:55:42 $ $Revision: 1.37 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 dogmove.c $Date$ $Revision$ */
+/* NetHack 3.5 dogmove.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 dogmove.c $Date: 2012/02/10 09:29:28 $ $Revision: 1.35 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 dokick.c $Date$ $Revision$ */
+/* NetHack 3.5 dokick.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 dokick.c $Date: 2012/05/06 02:29:33 $ $Revision: 1.78 $ */
/* Copyright (c) Izchak Miller, Mike Stephenson, Steve Linhart, 1989. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 dothrow.c $Date$ $Revision$ */
+/* NetHack 3.5 dothrow.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 dothrow.c $Date: 2013/11/05 00:57:55 $ $Revision: 1.89 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 drawing.c $Date$ $Revision$ */
+/* NetHack 3.5 drawing.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 drawing.c $Date: 2009/05/06 10:46:09 $ $Revision: 1.28 $ */
/* SCCS Id: @(#)drawing.c 3.5 2007/07/30 */
/* Copyright (c) NetHack Development Team 1992. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 dungeon.c $Date$ $Revision$ */
+/* NetHack 3.5 dungeon.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 dungeon.c $Date: 2012/04/14 08:31:05 $ $Revision: 1.34 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 eat.c $Date$ $Revision$ */
+/* NetHack 3.5 eat.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 eat.c $Date: 2012/02/01 00:49:16 $ $Revision: 1.116 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 end.c $Date$ $Revision$ */
+/* NetHack 3.5 end.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 end.c $Date: 2012/04/09 02:56:30 $ $Revision: 1.79 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 engrave.c $Date$ $Revision$ */
+/* NetHack 3.5 engrave.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 engrave.c $Date: 2012/12/20 01:48:36 $ $Revision: 1.39 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 exper.c $Date$ $Revision$ */
+/* NetHack 3.5 exper.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 exper.c $Date: 2009/05/06 10:46:24 $ $Revision: 1.19 $ */
/* SCCS Id: @(#)exper.c 3.5 2005/09/19 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 explode.c $Date$ $Revision$ */
+/* NetHack 3.5 explode.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 explode.c $Date: 2013/11/05 00:57:55 $ $Revision: 1.34 $ */
/* Copyright (C) 1990 by Ken Arromdee */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 extralev.c $Date$ $Revision$ */
+/* NetHack 3.5 extralev.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 extralev.c $Date: 2010/01/10 02:35:19 $ $Revision: 1.5 $ */
/* Copyright 1988, 1989 by Ken Arromdee */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 files.c $Date$ $Revision$ */
+/* NetHack 3.5 files.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 files.c $Date: 2012/03/10 02:49:08 $ $Revision: 1.124 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 fountain.c $Date$ $Revision$ */
+/* NetHack 3.5 fountain.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 fountain.c $Date: 2011/08/20 00:22:20 $ $Revision: 1.32 $ */
/* Copyright Scott R. Turner, srt@ucla, 10/27/86 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 hack.c $Date$ $Revision$ */
+/* NetHack 3.5 hack.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 hack.c $Date: 2013/10/26 21:33:47 $ $Revision: 1.120 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 hacklib.c $Date$ $Revision$ */
+/* NetHack 3.5 hacklib.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 hacklib.c $Date: 2009/05/06 10:46:32 $ $Revision: 1.23 $ */
/* SCCS Id: @(#)hacklib.c 3.5 2007/04/30 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* Copyright (c) Robert Patrick Rankin, 1991 */
-/* NetHack 3.5 invent.c $Date$ $Revision$ */
+/* NetHack 3.5 invent.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 invent.c $Date: 2013/11/05 00:57:55 $ $Revision: 1.125 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 light.c $Date$ $Revision$ */
+/* NetHack 3.5 light.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 light.c $Date: 2009/05/06 10:46:38 $ $Revision: 1.15 $ */
/* SCCS Id: @(#)light.c 3.5 2009/01/20 */
/* Copyright (c) Dean Luick, 1994 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 lock.c $Date$ $Revision$ */
+/* NetHack 3.5 lock.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 lock.c $Date: 2014/09/20 00:32:01 $ $Revision: 1.39 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mail.c $Date$ $Revision$ */
+/* NetHack 3.5 mail.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mail.c $Date: 2009/05/06 10:46:41 $ $Revision: 1.12 $ */
/* SCCS Id: @(#)mail.c 3.5 2008/01/30 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 makemon.c $Date$ $Revision$ */
+/* NetHack 3.5 makemon.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 makemon.c $Date: 2012/01/29 00:34:33 $ $Revision: 1.69 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mapglyph.c $Date$ $Revision$ */
+/* NetHack 3.5 mapglyph.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mapglyph.c $Date: 2009/05/06 10:46:45 $ $Revision: 1.24 $ */
/* SCCS Id: @(#)mapglyph.c 3.5 2006/10/01 */
/* Copyright (c) David Cohrs, 1991 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mcastu.c $Date$ $Revision$ */
+/* NetHack 3.5 mcastu.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mcastu.c $Date: 2011/12/30 23:14:58 $ $Revision: 1.37 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhitm.c $Date$ $Revision$ */
+/* NetHack 3.5 mhitm.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhitm.c $Date: 2011/04/07 20:59:40 $ $Revision: 1.57 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhitu.c $Date$ $Revision$ */
+/* NetHack 3.5 mhitu.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhitu.c $Date: 2012/02/05 04:26:48 $ $Revision: 1.104 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 minion.c $Date$ $Revision$ */
+/* NetHack 3.5 minion.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 minion.c $Date: 2009/05/06 10:46:52 $ $Revision: 1.26 $ */
/* SCCS Id: @(#)minion.c 3.5 2008/11/14 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mklev.c $Date$ $Revision$ */
+/* NetHack 3.5 mklev.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mklev.c $Date: 2012/02/15 01:55:33 $ $Revision: 1.20 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mkmap.c $Date$ $Revision$ */
+/* NetHack 3.5 mkmap.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mkmap.c $Date: 2009/05/06 10:46:55 $ $Revision: 1.12 $ */
/* SCCS Id: @(#)mkmap.c 3.5 2008/02/29 */
/* Copyright (c) J. C. Collet, M. Stephenson and D. Cohrs, 1992 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mkmaze.c $Date$ $Revision$ */
+/* NetHack 3.5 mkmaze.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mkmaze.c $Date: 2009/05/06 10:46:56 $ $Revision: 1.18 $ */
/* SCCS Id: @(#)mkmaze.c 3.5 2007/06/18 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mkobj.c $Date$ $Revision$ */
+/* NetHack 3.5 mkobj.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mkobj.c $Date: 2012/03/10 02:49:08 $ $Revision: 1.70 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mkroom.c $Date$ $Revision$ */
+/* NetHack 3.5 mkroom.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mkroom.c $Date: 2012/01/10 17:47:19 $ $Revision: 1.15 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mon.c $Date$ $Revision$ */
+/* NetHack 3.5 mon.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mon.c $Date: 2012/05/16 02:15:10 $ $Revision: 1.126 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mondata.c $Date$ $Revision$ */
+/* NetHack 3.5 mondata.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mondata.c $Date: 2011/10/02 02:18:54 $ $Revision: 1.44 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 monmove.c $Date$ $Revision$ */
+/* NetHack 3.5 monmove.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 monmove.c $Date: 2011/08/30 22:13:27 $ $Revision: 1.46 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 monst.c $Date$ $Revision$ */
+/* NetHack 3.5 monst.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 monst.c $Date: 2011/09/02 21:44:09 $ $Revision: 1.38 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mplayer.c $Date$ $Revision$ */
+/* NetHack 3.5 mplayer.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mplayer.c $Date: 2009/05/06 10:47:09 $ $Revision: 1.11 $ */
/* SCCS Id: @(#)mplayer.c 3.5 2006/12/15 */
/* Copyright (c) Izchak Miller, 1992. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mthrowu.c $Date$ $Revision$ */
+/* NetHack 3.5 mthrowu.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mthrowu.c $Date: 2011/12/30 23:47:06 $ $Revision: 1.43 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 muse.c $Date$ $Revision$ */
+/* NetHack 3.5 muse.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 muse.c $Date: 2012/04/12 23:26:47 $ $Revision: 1.49 $ */
/* Copyright (C) 1990 by Ken Arromdee */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 music.c $Date$ $Revision$ */
+/* NetHack 3.5 music.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 music.c $Date: 2011/12/30 23:47:06 $ $Revision: 1.27 $ */
/* Copyright (c) 1989 by Jean-Christophe Collet */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 o_init.c $Date$ $Revision$ */
+/* NetHack 3.5 o_init.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 o_init.c $Date: 2011/10/02 21:27:24 $ $Revision: 1.11 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 objects.c $Date$ $Revision$ */
+/* NetHack 3.5 objects.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 objects.c $Date: 2011/07/28 04:00:20 $ $Revision: 1.23 $ */
/* Copyright (c) Mike Threepoint, 1989. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 objnam.c $Date$ $Revision$ */
+/* NetHack 3.5 objnam.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 objnam.c $Date: 2011/10/27 02:24:54 $ $Revision: 1.101 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 options.c $Date$ $Revision$ */
+/* NetHack 3.5 options.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 options.c $Date: 2012/04/09 02:56:30 $ $Revision: 1.153 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 pager.c $Date$ $Revision$ */
+/* NetHack 3.5 pager.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 pager.c $Date: 2012/01/15 09:27:06 $ $Revision: 1.41 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 pickup.c $Date$ $Revision$ */
+/* NetHack 3.5 pickup.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 pickup.c $Date: 2012/02/16 03:01:38 $ $Revision: 1.123 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 pline.c $Date$ $Revision$ */
+/* NetHack 3.5 pline.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 pline.c $Date: 2013/02/09 01:33:37 $ $Revision: 1.30 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 polyself.c $Date$ $Revision$ */
+/* NetHack 3.5 polyself.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 polyself.c $Date: 2013/03/16 01:44:28 $ $Revision: 1.88 $ */
/* Copyright (C) 1987, 1988, 1989 by Ken Arromdee */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 potion.c $Date$ $Revision$ */
+/* NetHack 3.5 potion.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 potion.c $Date: 2013/11/05 00:57:55 $ $Revision: 1.91 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 pray.c $Date$ $Revision$ */
+/* NetHack 3.5 pray.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 pray.c $Date: 2012/05/07 01:44:38 $ $Revision: 1.62 $ */
/* Copyright (c) Benson I. Margulies, Mike Stephenson, Steve Linhart, 1989. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 priest.c $Date$ $Revision$ */
+/* NetHack 3.5 priest.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 priest.c $Date: 2012/02/16 02:40:24 $ $Revision: 1.27 $ */
/* Copyright (c) Izchak Miller, Steve Linhart, 1989. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 quest.c $Date$ $Revision$ */
+/* NetHack 3.5 quest.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 quest.c $Date: 2009/05/06 10:47:33 $ $Revision: 1.10 $ */
/* SCCS Id: @(#)quest.c 3.5 2006/08/05 */
/* Copyright 1991, M. Stephenson */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 questpgr.c $Date$ $Revision$ */
+/* NetHack 3.5 questpgr.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 questpgr.c $Date: 2012/02/02 09:18:14 $ $Revision: 1.14 $ */
/* Copyright 1991, M. Stephenson */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 read.c $Date$ $Revision$ */
+/* NetHack 3.5 read.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 read.c $Date: 2012/04/06 08:35:00 $ $Revision: 1.78 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 rect.c $Date$ $Revision$ */
+/* NetHack 3.5 rect.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 rect.c $Date: 2009/05/06 10:47:37 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)rect.c 3.5 1990/02/22 */
/* Copyright (c) 1990 by Jean-Christophe Collet */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 region.c $Date$ $Revision$ */
+/* NetHack 3.5 region.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 region.c $Date: 2012/05/07 01:44:38 $ $Revision: 1.26 $ */
/* Copyright (c) 1996 by Jean-Christophe Collet */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 restore.c $Date$ $Revision$ */
+/* NetHack 3.5 restore.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 restore.c $Date: 2012/02/16 02:40:24 $ $Revision: 1.71 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 rip.c $Date$ $Revision$ */
+/* NetHack 3.5 rip.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 rip.c $Date: 2012/03/10 02:49:08 $ $Revision: 1.11 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 rnd.c $Date$ $Revision$ */
+/* NetHack 3.5 rnd.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 rnd.c $Date: 2009/05/06 10:47:41 $ $Revision: 1.7 $ */
/* SCCS Id: @(#)rnd.c 3.5 2004/08/27 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 role.c $Date$ $Revision$ */
+/* NetHack 3.5 role.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 role.c $Date: 2012/02/16 03:01:38 $ $Revision: 1.18 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985-1999. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 rumors.c $Date$ $Revision$ */
+/* NetHack 3.5 rumors.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 rumors.c $Date: 2012/05/11 22:36:33 $ $Revision: 1.17 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 save.c $Date$ $Revision$ */
+/* NetHack 3.5 save.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 save.c $Date: 2012/02/16 02:40:24 $ $Revision: 1.53 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 shk.c $Date$ $Revision$ */
+/* NetHack 3.5 shk.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 shk.c $Date: 2012/07/03 22:54:49 $ $Revision: 1.91 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 shknam.c $Date$ $Revision$ */
+/* NetHack 3.5 shknam.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 shknam.c $Date: 2011/04/15 01:55:42 $ $Revision: 1.24 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 sit.c $Date$ $Revision$ */
+/* NetHack 3.5 sit.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 sit.c $Date: 2012/02/06 04:17:25 $ $Revision: 1.31 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 sounds.c $Date$ $Revision$ */
+/* NetHack 3.5 sounds.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 sounds.c $Date: 2012/03/10 02:49:08 $ $Revision: 1.39 $ */
/* Copyright (c) 1989 Janet Walz, Mike Threepoint */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 sp_lev.c $Date$ $Revision$ */
+/* NetHack 3.5 sp_lev.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 sp_lev.c $Date: 2011/01/05 01:28:36 $ $Revision: 1.23 $ */
/* Copyright (c) 1989 by Jean-Christophe Collet */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 spell.c $Date$ $Revision$ */
+/* NetHack 3.5 spell.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 spell.c $Date: 2011/12/29 22:01:25 $ $Revision: 1.44 $ */
/* Copyright (c) M. Stephenson 1988 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 steal.c $Date$ $Revision$ */
+/* NetHack 3.5 steal.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 steal.c $Date: 2012/02/05 04:26:48 $ $Revision: 1.41 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 steed.c $Date$ $Revision$ */
+/* NetHack 3.5 steed.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 steed.c $Date: 2012/01/04 18:52:36 $ $Revision: 1.36 $ */
/* Copyright (c) Kevin Hugo, 1998-1999. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 sys.c $Date$ $Revision$ */
+/* NetHack 3.5 sys.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 sys.c $Date: 2012/03/10 02:22:07 $ $Revision: 1.12 $ */
/* Copyright (c) Kenneth Lorber, Kensington, Maryland, 2008. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 teleport.c $Date$ $Revision$ */
+/* NetHack 3.5 teleport.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 teleport.c $Date: 2012/01/04 18:52:36 $ $Revision: 1.45 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 timeout.c $Date$ $Revision$ */
+/* NetHack 3.5 timeout.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 timeout.c $Date: 2012/04/16 00:57:37 $ $Revision: 1.48 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 topten.c $Date$ $Revision$ */
+/* NetHack 3.5 topten.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 topten.c $Date: 2012/01/24 04:26:15 $ $Revision: 1.23 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 track.c $Date$ $Revision$ */
+/* NetHack 3.5 track.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 track.c $Date: 2009/05/06 10:48:00 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)track.c 3.5 87/08/08 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 trap.c $Date$ $Revision$ */
+/* NetHack 3.5 trap.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 trap.c $Date: 2013/03/14 01:58:21 $ $Revision: 1.179 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 u_init.c $Date$ $Revision$ */
+/* NetHack 3.5 u_init.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 u_init.c $Date: 2011/10/01 00:25:56 $ $Revision: 1.18 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 uhitm.c $Date$ $Revision$ */
+/* NetHack 3.5 uhitm.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 uhitm.c $Date: 2012/05/01 02:22:33 $ $Revision: 1.116 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 vault.c $Date$ $Revision$ */
+/* NetHack 3.5 vault.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 vault.c $Date: 2011/10/13 00:31:10 $ $Revision: 1.28 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 version.c $Date$ $Revision$ */
+/* NetHack 3.5 version.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 version.c $Date: 2012/01/04 18:52:36 $ $Revision: 1.26 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 vision.c $Date$ $Revision$ */
+/* NetHack 3.5 vision.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 vision.c $Date: 2009/05/06 10:48:10 $ $Revision: 1.12 $ */
/* SCCS Id: @(#)vision.c 3.5 2007/11/05 */
/* Copyright (c) Dean Luick, with acknowledgements to Dave Cohrs, 1990. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 weapon.c $Date$ $Revision$ */
+/* NetHack 3.5 weapon.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 weapon.c $Date: 2011/12/18 05:16:28 $ $Revision: 1.38 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 were.c $Date$ $Revision$ */
+/* NetHack 3.5 were.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 were.c $Date: 2011/02/28 11:29:27 $ $Revision: 1.14 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 wield.c $Date$ $Revision$ */
+/* NetHack 3.5 wield.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 wield.c $Date: 2009/05/06 10:48:14 $ $Revision: 1.31 $ */
/* SCCS Id: @(#)wield.c 3.5 2009/01/20 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 windows.c $Date$ $Revision$ */
+/* NetHack 3.5 windows.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 windows.c $Date: 2012/01/23 10:45:28 $ $Revision: 1.23 $ */
/* Copyright (c) D. Cohrs, 1993. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 wizard.c $Date$ $Revision$ */
+/* NetHack 3.5 wizard.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 wizard.c $Date: 2009/05/06 10:48:16 $ $Revision: 1.32 $ */
/* SCCS Id: @(#)wizard.c 3.5 2008/11/14 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 worm.c $Date$ $Revision$ */
+/* NetHack 3.5 worm.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 worm.c $Date: 2009/05/06 10:48:17 $ $Revision: 1.12 $ */
/* SCCS Id: @(#)worm.c 3.5 2009/03/05 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 worn.c $Date$ $Revision$ */
+/* NetHack 3.5 worn.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 worn.c $Date: 2013/11/05 00:57:56 $ $Revision: 1.32 $ */
/* SCCS Id: @(#)worn.c 3.5 2009/02/28 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 write.c $Date$ $Revision$ */
+/* NetHack 3.5 write.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 write.c $Date: 2010/12/28 19:54:41 $ $Revision: 1.9 $ */
/* NetHack may be freely redistributed. See license for details. */
#include "hack.h"
-/* NetHack 3.5 zap.c $Date$ $Revision$ */
+/* NetHack 3.5 zap.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 zap.c $Date: 2013/11/05 00:57:56 $ $Revision: 1.183 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 amidos.c $Date$ $Revision$ */
+/* NetHack 3.5 amidos.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 amidos.c $Date: 2009/05/06 10:48:29 $ $Revision: 1.6 $ */
/* SCCS Id: @(#)amidos.c 3.5 2000/01/12
/* Copyright (c) Olaf Seibert, Nijmegen, The Netherlands, 1988,1990. */
/* Copyright (c) Kenneth Lorber, Bethesda, Maryland, 1991,1992,1993,1996. */
-/* NetHack 3.5 amidos.p $Date$ $Revision$ */
+/* NetHack 3.5 amidos.p $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 amidos.p $Date: 2009/05/06 10:48:29 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)amidos.p 3.5 1993/01/08
/* Copyright (c) Kenneth Lorber, Bethesda, Maryland, 1992, 1993. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 amigst.c $Date$ $Revision$ */
+/* NetHack 3.5 amigst.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 amigst.c $Date: 2009/05/06 10:48:29 $ $Revision: 1.3 $ */
/* SCCS Id: @(#)amigst.c 3.5 1993/01/08
/* Copyright (c) Gregg Wonderly, Naperville, IL, 1992, 1993 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 amimenu.c $Date$ $Revision$ */
+/* NetHack 3.5 amimenu.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 amimenu.c $Date: 2009/05/06 10:48:29 $ $Revision: 1.3 $ */
/* SCCS Id: @(#)amimenu.c 3.5 1996/02/04 */
/* Copyright (c) Olaf 'Rhialto' Seibert, 1989 */
/* Copyright (c) Kenneth Lorber, Bethesda, Maryland, 1992, 1993, 1996 */
-/* NetHack 3.5 amirip.c $Date$ $Revision$ */
+/* NetHack 3.5 amirip.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 amirip.c $Date: 2012/01/24 04:26:20 $ $Revision: 1.7 $ */
/* Copyright (c) Kenneth Lorber, Bethesda, Maryland 1991,1992,1993,1995,1996. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 amisnd.c $Date$ $Revision$ */
+/* NetHack 3.5 amisnd.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 amisnd.c $Date: 2009/05/06 10:48:30 $ $Revision: 1.3 $ */
/* SCCS Id: @(#)amisnd.c 3.5 2000/01/12*/
/* Copyright (c) 1992, 1993, 1995 by Gregg Wonderly */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 amistack.c $Date$ $Revision$ */
+/* NetHack 3.5 amistack.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 amistack.c $Date: 2009/05/06 10:48:30 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)amistack.c 3.5 2000/05/03 */
/* Copyright (c) Janne Salmijärvi, Tampere, Finland, 2000 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 amitty.c $Date$ $Revision$ */
+/* NetHack 3.5 amitty.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 amitty.c $Date: 2009/05/06 10:48:30 $ $Revision: 1.3 $ */
/* SCCS Id: @(#)amitty.c 3.5 2000/01/12
/* Copyright (c) Kenneth Lorber, Bethesda, Maryland 1993,1996 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 amiwind.c $Date$ $Revision$ */
+/* NetHack 3.5 amiwind.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 amiwind.c $Date: 2009/05/06 10:48:30 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)amiwind.c 3.5 2000/01/12
/* Copyright (c) Olaf Seibert (KosmoSoft), 1989, 1992 */
/* Copyright (c) Kenneth Lorber, Bethesda, Maryland 1993,1996 */
-/* NetHack 3.5 amiwind.p $Date$ $Revision$ */
+/* NetHack 3.5 amiwind.p $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 amiwind.p $Date: 2009/05/06 10:48:31 $ $Revision: 1.3 $ */
/* SCCS Id: @(#)amiwind.p 3.5 1993/01/08 */
/* Copyright (c) Gregg Wonderly, Naperville, IL, 1992, 1993 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 cvtsnd.c $Date$ $Revision$ */
+/* NetHack 3.5 cvtsnd.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 cvtsnd.c $Date: 2009/05/06 10:48:31 $ $Revision: 1.3 $ */
/* SCCS Id: @(#)cvtsnd.c 3.5 1995/09/10 */
/* Copyright (c) 1995, Andrew Church, Olney, Maryland */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 txt2iff.c $Date$ $Revision$ */
+/* NetHack 3.5 txt2iff.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 txt2iff.c $Date: 2009/05/06 10:48:31 $ $Revision: 1.3 $ */
/* SCCS Id: @(#)txt2iff.c 3.5 1995/07/28 */
/* Copyright (c) 1995 by Gregg Wonderly, Naperville, Illinois */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 winami.c $Date$ $Revision$ */
+/* NetHack 3.5 winami.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 winami.c $Date: 2012/01/10 17:47:21 $ $Revision: 1.13 $ */
/* Copyright (c) Gregg Wonderly, Naperville, Illinois, 1991,1992,1993,1996. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 winami.p $Date$ $Revision$ */
+/* NetHack 3.5 winami.p $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 winami.p $Date: 2009/05/06 10:48:33 $ $Revision: 1.3 $ */
/* SCCS Id: @(#)winami.p 3.5 1993/01/08 */
/* Copyright (c) Gregg Wonderly, Naperville, IL, 1992, 1993 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 winchar.c $Date$ $Revision$ */
+/* NetHack 3.5 winchar.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 winchar.c $Date: 2009/05/06 10:48:33 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)winchar.c 3.5 1993/07/22 */
/* Copyright (c) Olaf Seibert (KosmoSoft), 1989, 1992 */
/* Copyright (c) Kenneth Lorber, Bethesda, Maryland 1993 */
-/* NetHack 3.5 windefs.h $Date$ $Revision$ */
+/* NetHack 3.5 windefs.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 windefs.h $Date: 2009/05/06 10:48:34 $ $Revision: 1.3 $ */
/* SCCS Id: @(#)windefs.h 3.5 1993/04/02 */
/* Copyright (c) Gregg Wonderly, Naperville, Illinois, 1991,1992,1993. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 winext.h $Date$ $Revision$ */
+/* NetHack 3.5 winext.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 winext.h $Date: 2009/05/06 10:48:35 $ $Revision: 1.3 $ */
/* SCCS Id: @(#)winext.h 3.5 2000/01/12 */
/* Copyright (c) Gregg Wonderly, Naperville, Illinois, 1991,1992,1993. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 winfuncs.c $Date$ $Revision$ */
+/* NetHack 3.5 winfuncs.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 winfuncs.c $Date: 2012/01/10 17:47:21 $ $Revision: 1.8 $ */
/* Copyright (c) Gregg Wonderly, Naperville, Illinois, 1991,1992,1993,1996. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 winkey.c $Date$ $Revision$ */
+/* NetHack 3.5 winkey.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 winkey.c $Date: 2009/05/06 10:48:37 $ $Revision: 1.3 $ */
/* SCCS Id: @(#)winkey.c 3.5 1993/04/02 */
/* Copyright (c) Gregg Wonderly, Naperville, Illinois, 1991,1992,1993. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 winmenu.c $Date$ $Revision$ */
+/* NetHack 3.5 winmenu.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 winmenu.c $Date: 2009/05/06 10:48:38 $ $Revision: 1.3 $ */
/* SCCS Id: @(#)winmenu.c 3.5 1996/02/17 */
/* Copyright (c) Gregg Wonderly, Naperville, Illinois, 1991,1992,1993,1996. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 winproto.h $Date$ $Revision$ */
+/* NetHack 3.5 winproto.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 winproto.h $Date: 2012/01/24 04:26:20 $ $Revision: 1.4 $ */
/* Copyright (c) Gregg Wonderly, Naperville, Illinois, 1991,1992,1993. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 winreq.c $Date$ $Revision$ */
+/* NetHack 3.5 winreq.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 winreq.c $Date: 2009/05/06 10:48:41 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)winreq.c 3.5 1993/04/02 */
/* Copyright (c) Gregg Wonderly, Naperville, Illinois, 1991,1992,1993. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 winstr.c $Date$ $Revision$ */
+/* NetHack 3.5 winstr.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 winstr.c $Date: 2009/05/06 10:48:42 $ $Revision: 1.3 $ */
/* SCCS Id: @(#)winstr.c 3.5 1993/04/02 */
/* Copyright (c) Gregg Wonderly, Naperville, Illinois, 1991,1992,1993. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 xpm2iff.c $Date$ $Revision$ */
+/* NetHack 3.5 xpm2iff.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 xpm2iff.c $Date: 2009/05/06 10:48:44 $ $Revision: 1.3 $ */
/* SCCS Id: @(#)xpm2iff.c 3.5 1995/08/04 */
/* Copyright (c) 1995 by Gregg Wonderly, Naperville, Illinois */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 tos.c $Date$ $Revision$ */
+/* NetHack 3.5 tos.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 tos.c $Date: 2009/05/06 10:48:51 $ $Revision: 1.3 $ */
/* SCCS Id: @(#)tos.c 3.5 1990/14/08
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 bemain.c $Date$ $Revision$ */
+/* NetHack 3.5 bemain.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 bemain.c $Date: 2009/05/06 10:48:59 $ $Revision: 1.11 $ */
/* SCCS Id: @(#)bemain.c 3.5 2008/01/30 */
/* Copyright (c) Dean Luick, 1996. */
/* NetHack may be freely redistributed. See license for details. */
-# NetHack 3.5 NHDeflts $Date$ $Revision$
+# NetHack 3.5 NHDeflts $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 NHDeflts $Date: 2009/05/06 10:49:09 $ $Revision: 1.4 $
# SCCS Id: @(#)NetHack Defaults 3.5 2002/03/15
# Copyright (c) 2002 by Dean Luick, Mark Modrall, and Kevin Hugo
# NetHack may be freely redistributed. See license for details.
-/* NetHack 3.5 dprintf.c $Date$ $Revision$ */
+/* NetHack 3.5 dprintf.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 dprintf.c $Date: 2009/05/06 10:49:10 $ $Revision: 1.3 $ */
/* SCCS Id: @(#)dprintf.c 3.5 1994/01/29 */
/* Copyright (c) Jon W{tte, 1993. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 maccurs.c $Date$ $Revision$ */
+/* NetHack 3.5 maccurs.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 maccurs.c $Date: 2009/05/06 10:49:10 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)maccurs.c 3.5 1993/01/24 */
/* Copyright (c) Jon W{tte, 1992. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 macerrs.c $Date$ $Revision$ */
+/* NetHack 3.5 macerrs.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 macerrs.c $Date: 2009/05/06 10:49:10 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)macerrs.c 3.5 1993/01/24 */
/* Copyright (c) Michael Hamel, 1991 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 macfile.c $Date$ $Revision$ */
+/* NetHack 3.5 macfile.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 macfile.c $Date: 2009/05/06 10:49:10 $ $Revision: 1.7 $ */
/* SCCS Id: @(#)macfile.c 3.5 1993/01/24 */
/* Copyright (c) Jon W{tte, Hao-Yang Wang, Jonathan Handler 1992. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 macmain.c $Date$ $Revision$ */
+/* NetHack 3.5 macmain.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 macmain.c $Date: 2009/05/06 10:49:11 $ $Revision: 1.15 $ */
/* SCCS Id: @(#)macmain.c 3.5 2008/01/30 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 macmenu.c $Date$ $Revision$ */
+/* NetHack 3.5 macmenu.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 macmenu.c $Date: 2009/05/06 10:49:13 $ $Revision: 1.7 $ */
/* SCCS Id: @(#)macmenu.c 3.5 1999/11/24 */
/* Copyright (c) Macintosh NetHack Port Team, 1993. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 macsnd.c $Date$ $Revision$ */
+/* NetHack 3.5 macsnd.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 macsnd.c $Date: 2009/05/06 10:49:14 $ $Revision: 1.6 $ */
/* SCCS Id: @(#)macsnd.c 3.5 1992/11/28 */
/* Copyright (c) 1992 by Jon Watte */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mactopl.c $Date$ $Revision$ */
+/* NetHack 3.5 mactopl.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mactopl.c $Date: 2009/05/06 10:49:14 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)mactopl.c 3.5 1991/07/23 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mactty.c $Date$ $Revision$ */
+/* NetHack 3.5 mactty.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mactty.c $Date: 2009/05/06 10:49:14 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)mactty.c 3.5 1993/03/01 */
/* Copyright (c) Jon W{tte 1993. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 macunix.c $Date$ $Revision$ */
+/* NetHack 3.5 macunix.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 macunix.c $Date: 2009/05/06 10:49:16 $ $Revision: 1.6 $ */
/* SCCS Id: @(#)macunix.c 3.5 1994/11/07 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 macwin.c $Date$ $Revision$ */
+/* NetHack 3.5 macwin.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 macwin.c $Date: 2012/01/10 17:47:23 $ $Revision: 1.22 $ */
/* Copyright (c) Jon W{tte, Hao-Yang Wang, Jonathan Handler 1992. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mgetline.c $Date$ $Revision$ */
+/* NetHack 3.5 mgetline.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mgetline.c $Date: 2009/05/06 10:49:18 $ $Revision: 1.6 $ */
/* SCCS Id: @(#)getline.c 3.5 1990/22/02 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mmodal.c $Date$ $Revision$ */
+/* NetHack 3.5 mmodal.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mmodal.c $Date: 2009/05/06 10:49:18 $ $Revision: 1.7 $ */
/* SCCS Id: @(#)mmodal.c 3.5 1993/01/24 */
/* Copyright (c) Jon W{tte, Hao-Yang Wang, Jonathan Handler 1992. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mrecover.c $Date$ $Revision$ */
+/* NetHack 3.5 mrecover.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mrecover.c $Date: 2009/05/06 10:49:19 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)mrecover.c 3.5 1996/07/24 */
/* Copyright (c) David Hairston, 1993. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mttymain.c $Date$ $Revision$ */
+/* NetHack 3.5 mttymain.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mttymain.c $Date: 2009/05/06 10:49:20 $ $Revision: 1.8 $ */
/* SCCS Id: @(#)mttymain.c 3.5 1993/02/26 */
/* Copyright (c) Jon W{tte, 1993 */
/* NetHack may be freely redistributed. See license for details. */
NetHack 3.5 on a DOS system
======================================================
(or, How to make PC NetHack 3.5)
- Last revision: $Date$
+ Last revision: $NHDT-Date$
+ Last revision: $Date: 2005/01/02 17:16:53 $
Credit for a runnable full PC NetHack 3.5 goes to the PC Development team
of Paul Winner, Kevin Smolkowski, Michael Allison, Yitzhak Sapir, Bill Dyer,
-# NetHack 3.5 Makefile.BC $Date$ $Revision$
+# NetHack 3.5 Makefile.BC $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Makefile.BC $Date: 2012/01/10 17:47:26 $ $Revision: 1.14 $
# Copyright (c) Yitzhak Sapir, 1999-2006.
# NetHack may be freely distributed. See license for details.
#
-# NetHack 3.5 Makefile.GCC $Date$ $Revision$
+# NetHack 3.5 Makefile.GCC $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Makefile.GCC $Date: 2012/01/10 17:47:26 $ $Revision: 1.25 $
# Copyright (c) NetHack PC Development Team 1996-2006.
# PC NetHack 3.5 Makefile for djgpp V2
#
-# NetHack 3.5 Makefile.MSC $Date$ $Revision$
+# NetHack 3.5 Makefile.MSC $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Makefile.MSC $Date: 2012/01/22 06:27:07 $ $Revision: 1.18 $
# Copyright (c) NetHack PC Development Team 1997 - 2012.
# PC NetHack 3.4x Makefile for MSC V1.52c (16 bit compiler)
#
-/* NetHack 3.5 msdos.c $Date$ $Revision$ */
+/* NetHack 3.5 msdos.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 msdos.c $Date: 2012/01/22 06:27:07 $ $Revision: 1.7 $ */
/* Copyright (c) NetHack PC Development Team 1990 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 ovlinit.c $Date$ $Revision$ */
+/* NetHack 3.5 ovlinit.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 ovlinit.c $Date: 2009/05/06 10:49:38 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)ovlinit.c 3.5 1994/03/20 */
/* Copyright (c) NetHack PC Development Team 1995 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 pckeys.c $Date$ $Revision$ */
+/* NetHack 3.5 pckeys.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 pckeys.c $Date: 2009/05/06 10:49:39 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)pckeys.c 3.5 1996/05/11 */
/* Copyright (c) NetHack PC Development Team 1996 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 pctiles.c $Date$ $Revision$ */
+/* NetHack 3.5 pctiles.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 pctiles.c $Date: 2009/05/06 10:49:39 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)pctiles.c 3.5 1995/07/31 */
/* Copyright (c) NetHack PC Development Team 1993, 1994 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 pctiles.h $Date$ $Revision$ */
+/* NetHack 3.5 pctiles.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 pctiles.h $Date: 2009/05/06 10:49:40 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)pctiles.h 3.5 1994/04/04 */
/* Copyright (c) NetHack PC Development Team 1993, 1994 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 pcvideo.h $Date$ $Revision$ */
+/* NetHack 3.5 pcvideo.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 pcvideo.h $Date: 2009/05/06 10:49:40 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)pcvideo.h 3.5 1994/06/07 */
/* Copyright (c) NetHack PC Development Team 1993, 1994 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 portio.h $Date$ $Revision$ */
+/* NetHack 3.5 portio.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 portio.h $Date: 2009/05/06 10:49:41 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)portio.h 3.5 1995/08/05 */
/* Copyright (c) NetHack PC Development Team 1995 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 schema1.BC $Date$ $Revision$ */
+/* NetHack 3.5 schema1.BC $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 schema1.BC $Date: 2009/05/06 10:49:41 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)schema1.BC 3.5 2008/01/30 */
/* Copyright (c) Yitzhak Sapir, 1999 */
/* */
-/* NetHack 3.5 schema2.BC $Date$ $Revision$ */
+/* NetHack 3.5 schema2.BC $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 schema2.BC $Date: 2009/05/06 10:49:42 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)schema2.BC 3.5 2008/01/30 */
/* Copyright (c) Yitzhak Sapir, 1999 */
/* */
@echo off
-REM NetHack 3.5 setup.bat $Date$ $Revision$
+REM NetHack 3.5 setup.bat $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+REM NetHack 3.5 setup.bat $Date: 2012/01/22 06:27:07 $ $Revision: 1.3 $
REM Copyright (c) NetHack PC Development Team 1990 - 2012
REM NetHack may be freely redistributed. See license for details.
-/* NetHack 3.5 sound.c $Date$ $Revision$ */
+/* NetHack 3.5 sound.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 sound.c $Date: 2009/05/06 10:49:43 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)sound.c 3.5 1996/02/19 */
/* Copyright (c) NetHack PC Development Team 1993,1995 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 tile2bin.c $Date$ $Revision$ */
+/* NetHack 3.5 tile2bin.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 tile2bin.c $Date: 2009/05/06 10:49:47 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)tile2bin.c 3.5 1995/01/26 */
/* Copyright (c) NetHack PC Development Team 1993, 1994, 1995 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 video.c $Date$ $Revision$ */
+/* NetHack 3.5 video.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 video.c $Date: 2009/05/06 10:49:49 $ $Revision: 1.6 $ */
/* SCCS Id: @(#)video.c 3.5 2001/04/07 */
/* Copyright (c) NetHack PC Development Team 1993, 1994, 2001 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 vidtxt.c $Date$ $Revision$ */
+/* NetHack 3.5 vidtxt.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 vidtxt.c $Date: 2009/05/06 10:49:49 $ $Revision: 1.6 $ */
/* SCCS Id: @(#)vidtxt.c 3.5 1994/04/04 */
/* Copyright (c) NetHack PC Development Team 1993 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 vidvga.c $Date$ $Revision$ */
+/* NetHack 3.5 vidvga.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 vidvga.c $Date: 2009/05/06 10:49:50 $ $Revision: 1.9 $ */
/* SCCS Id: @(#)vidvga.c 3.5 2006/07/08 */
/* Copyright (c) NetHack PC Development Team 1995 */
/* NetHack may be freely redistributed. See license for details. */
-# NetHack 3.5 Makefile.os2 $Date$ $Revision$
+# NetHack 3.5 Makefile.os2 $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Makefile.os2 $Date: 2012/01/10 17:47:28 $ $Revision: 1.16 $
# OS/2 NetHack 3.5 Makefile for OS/2 versions 1.x and 2.x
# Copyright (C) 1990, 1991, 1992, 1993, 1996 Timo Hakulinen
#
-/* NetHack 3.5 os2.c $Date$ $Revision$ */
+/* NetHack 3.5 os2.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 os2.c $Date: 2009/05/06 10:50:12 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)os2.c 3.5 1996/02/29 */
/* Copyright (c) Timo Hakulinen, 1990, 1991, 1992, 1993, 1996. */
/* NetHack may be freely redistributed. See license for details. */
-# NetHack 3.5 Makefile.lib $Date$ $Revision$
+# NetHack 3.5 Makefile.lib $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Makefile.lib $Date: 2009/05/06 10:50:26 $ $Revision: 1.4 $
# SCCS Id: @(#)Makefile.lib 3.5 1990/22/02
# Nethack makefile for Fred fish termlib -- Norman Meluch
#
-/* NetHack 3.5 ioctl.c $Date$ $Revision$ */
+/* NetHack 3.5 ioctl.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 ioctl.c $Date: 2011/06/16 15:10:14 $ $Revision: 1.8 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 nhlan.c $Date$ $Revision$ */
+/* NetHack 3.5 nhlan.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 nhlan.c $Date: 2009/05/06 10:50:26 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)nhlan.c 3.5 1999/11/21 */
/* Copyright (c) Michael Allison, 1997 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 pcmain.c $Date$ $Revision$ */
+/* NetHack 3.5 pcmain.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 pcmain.c $Date: 2012/01/20 03:41:31 $ $Revision: 1.48 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 pcsys.c $Date$ $Revision$ */
+/* NetHack 3.5 pcsys.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 pcsys.c $Date: 2012/01/22 06:33:47 $ $Revision: 1.18 $ */
/* SCCS Id: @(#)pcsys.c 3.5 2002/01/22 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 pctty.c $Date$ $Revision$ */
+/* NetHack 3.5 pctty.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 pctty.c $Date: 2009/05/06 10:50:30 $ $Revision: 1.6 $ */
/* SCCS Id: @(#)pctty.c 3.5 1990/22/02
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 pcunix.c $Date$ $Revision$ */
+/* NetHack 3.5 pcunix.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 pcunix.c $Date: 2009/05/06 10:50:30 $ $Revision: 1.27 $ */
/* SCCS Id: @(#)pcunix.c 3.5 1994/11/07 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 tclib.c $Date$ $Revision$ */
+/* NetHack 3.5 tclib.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 tclib.c $Date: 2009/05/06 10:50:31 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)tclib.c 3.5 1996/02/25 */
/* Copyright (c) Robert Patrick Rankin, 1995 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 unixtty.c $Date$ $Revision$ */
+/* NetHack 3.5 unixtty.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 unixtty.c $Date: 2012/01/23 07:11:09 $ $Revision: 1.10 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
# NetHack Makefile.
-# NetHack 3.5 Makefile.dat $Date$ $Revision$
+# NetHack 3.5 Makefile.dat $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Makefile.dat $Date: 2012/01/10 17:47:30 $ $Revision: 1.11 $
# Root of source tree:
NHSROOT=..
# NetHack Makefile.
-# NetHack 3.5 Makefile.doc $Date$ $Revision$
+# NetHack 3.5 Makefile.doc $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Makefile.doc $Date: 2010/05/01 23:10:22 $ $Revision: 1.11 $
# Root of source tree:
NHSROOT=..
# NetHack Makefile.
-# NetHack 3.5 Makefile.src $Date$ $Revision$
+# NetHack 3.5 Makefile.src $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Makefile.src $Date: 2012/01/20 03:41:33 $ $Revision: 1.37 $
# Root of source tree:
NHSROOT=..
# NetHack Makefile.
-# NetHack 3.5 Makefile.top $Date$ $Revision$
+# NetHack 3.5 Makefile.top $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Makefile.top $Date: 2012/01/10 17:47:30 $ $Revision: 1.19 $
# Root of source tree:
NHSROOT=.
# Makefile for NetHack's utility programs.
-# NetHack 3.5 Makefile.utl $Date$ $Revision$
+# NetHack 3.5 Makefile.utl $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Makefile.utl $Date: 2012/01/10 17:47:30 $ $Revision: 1.18 $
# Root of source tree:
NHSROOT=..
#
-# NetHack 3.5 linux $Date$ $Revision$
+# NetHack 3.5 linux $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 linux $Date: 2010/01/15 19:54:37 $ $Revision: 1.8 $
# Copyright (c) Kenneth Lorber, Kensington, Maryland, 2007.
# NetHack may be freely redistributed. See license for details.
#
#
-# NetHack 3.5 linux-x11 $Date$ $Revision$
+# NetHack 3.5 linux-x11 $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 linux-x11 $Date: 2009/12/23 20:02:29 $ $Revision: 1.5 $
# Copyright (c) Kenneth Lorber, Kensington, Maryland, 2007.
# NetHack may be freely redistributed. See license for details.
#
#
-# NetHack 3.5 macosx $Date$ $Revision$
+# NetHack 3.5 macosx $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 macosx $Date: 2009/12/23 20:02:29 $ $Revision: 1.9 $
# Copyright (c) Kenneth Lorber, Kensington, Maryland, 2007.
# NetHack may be freely redistributed. See license for details.
#
#!/bin/sh
-# NetHack 3.5 macosx.sh $Date$ $Revision$
+# NetHack 3.5 macosx.sh $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 macosx.sh $Date: 2011/10/17 01:29:17 $ $Revision: 1.5 $
# Copyright (c) Kenneth Lorber, Kensington, Maryland, 2007.
# NetHack may be freely redistributed. See license for details.
#
#
-# NetHack 3.5 macosx10.5 $Date$ $Revision$
+# NetHack 3.5 macosx10.5 $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 macosx10.5 $Date: 2011/10/17 01:29:17 $ $Revision: 1.11 $
# Copyright (c) Kenneth Lorber, Kensington, Maryland, 2009.
# NetHack may be freely redistributed. See license for details.
#
#
-# NetHack 3.5 macosx10.7 $Date$ $Revision$
+# NetHack 3.5 macosx10.7 $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 macosx10.7 $Date: 2012/01/18 22:32:24 $ $Revision: 1.4 $
# Copyright (c) Kenneth Lorber, Kensington, Maryland, 2009.
# NetHack may be freely redistributed. See license for details.
#
#
-# NetHack 3.5 unix $Date$ $Revision$
+# NetHack 3.5 unix $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 unix $Date: 2009/12/23 20:02:29 $ $Revision: 1.5 $
# Copyright (c) Kenneth Lorber, Kensington, Maryland, 2007.
# NetHack may be freely redistributed. See license for details.
#
#!/bin/sh
-# NetHack 3.5 mkmkfile.sh $Date$ $Revision$
+# NetHack 3.5 mkmkfile.sh $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 mkmkfile.sh $Date: 2011/12/27 00:34:52 $ $Revision: 1.5 $
# Copyright (c) Kenneth Lorber, Kensington, Maryland, 2007.
# NetHack may be freely redistributed. See license for details.
#!/bin/sh
-# NetHack 3.5 nethack.sh $Date$ $Revision$
+# NetHack 3.5 nethack.sh $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 nethack.sh $Date: 2009/05/06 10:50:54 $ $Revision: 1.9 $
# SCCS Id: @(#)nethack.sh 3.5 2007/12/12
HACKDIR=/usr/games/lib/nethackdir
#!/bin/sh
-# NetHack 3.5 setup.sh $Date$ $Revision$
+# NetHack 3.5 setup.sh $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 setup.sh $Date: 2011/12/27 00:34:52 $ $Revision: 1.6 $
# Copyright (c) Kenneth Lorber, Kensington, Maryland, 2007.
# NetHack may be freely redistributed. See license for details.
#
#
-# NetHack 3.5 sysconf $Date$ $Revision$
+# NetHack 3.5 sysconf $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 sysconf $Date: 2012/01/27 20:15:31 $ $Revision: 1.6 $
#
# Sample sysconf file.
# The sysconf file is only used if NetHack is compiled with SYSCF defined.
-/* NetHack 3.5 unixmain.c $Date$ $Revision$ */
+/* NetHack 3.5 unixmain.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 unixmain.c $Date: 2012/01/27 20:15:31 $ $Revision: 1.42 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 unixres.c $Date$ $Revision$ */
+/* NetHack 3.5 unixres.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 unixres.c $Date: 2009/05/06 10:50:57 $ $Revision: 1.8 $ */
/* SCCS Id: @(#)unixres.c 3.5 2001/07/08 */
/* Copyright (c) Slash'EM development team, 2001. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 unixunix.c $Date$ $Revision$ */
+/* NetHack 3.5 unixunix.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 unixunix.c $Date: 2012/01/27 20:15:31 $ $Revision: 1.16 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
# NetHack Makefile (VMS) - data files: special levels and other data.
-# NetHack 3.5 Makefile.dat $Date$ $Revision$
+# NetHack 3.5 Makefile.dat $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Makefile.dat $Date: 2011/05/23 03:27:10 $ $Revision: 1.5 $
# Copy this file to [.dat]Makefile.; no editing needed.
# NetHack Makefile (VMS) - for the [Unix] documentation.
-# NetHack 3.5 Makefile.doc $Date$ $Revision$
+# NetHack 3.5 Makefile.doc $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Makefile.doc $Date: 2011/05/23 03:27:10 $ $Revision: 1.5 $
# Copy this file to [.doc]Makefile. and edit it if needed.
# NetHack Makefile (VMS) - for building nethack itself.
-# NetHack 3.5 Makefile.src $Date$ $Revision$
+# NetHack 3.5 Makefile.src $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Makefile.src $Date: 2011/10/11 02:37:18 $ $Revision: 1.23 $
# Copy this file to [.src]Makefile. and then edit it as needed.
# The default configuration is for building with DEC C (aka Compaq C).
# NetHack Makefile (VMS) - top level for making & installing everything.
-# NetHack 3.5 Makefile.top $Date$ $Revision$
+# NetHack 3.5 Makefile.top $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Makefile.top $Date: 2011/05/23 03:27:10 $ $Revision: 1.6 $
# Copy this file to <top>Makefile.; edit the appropriate values for
# GAMEDIR ("playground" location) and GAMEOWNER (UIC or identifier
# NetHack Makefile (VMS) - for utility programs.
-# NetHack 3.5 Makefile.utl $Date$ $Revision$
+# NetHack 3.5 Makefile.utl $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Makefile.utl $Date: 2011/05/23 03:27:10 $ $Revision: 1.10 $
# Copy this file to [.util]Makefile. and then edit it as needed.
# The default configuration is for building with DEC C (aka Compaq C).
-/* NetHack 3.5 lev_lex.h $Date$ $Revision$ */
+/* NetHack 3.5 lev_lex.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 lev_lex.h $Date: 2009/05/06 10:51:24 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)lev_lex.h 3.5 1999/08/08 */
/* "vms/lev_lex.h" copied into "util/stdio.h" for use in *_lex.c only!
* This is an awful kludge to allow util/*_lex.c made by SunOS's `lex'
-/* NetHack 3.5 oldcrtl.c $Date$ $Revision$ */
+/* NetHack 3.5 oldcrtl.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 oldcrtl.c $Date: 2009/05/06 10:51:24 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)oldcrtl.c 3.5 1995/06/01 */
/* Pat Rankin May'90 */
/* VMS NetHack support, not needed for vms 4.6,4.7,5.x,or later */
-/* NetHack 3.5 vmsfiles.c $Date$ $Revision$ */
+/* NetHack 3.5 vmsfiles.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 vmsfiles.c $Date: 2009/05/06 10:51:25 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)vmsfiles.c 3.5 2007/10/27 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 vmsmail.c $Date$ $Revision$ */
+/* NetHack 3.5 vmsmail.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 vmsmail.c $Date: 2009/05/06 10:51:25 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)vmsmail.c 3.5 2006/04/14 */
/* Copyright (c) Robert Patrick Rankin, 1991. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 vmsmain.c $Date$ $Revision$ */
+/* NetHack 3.5 vmsmain.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 vmsmain.c $Date: 2011/04/23 01:51:01 $ $Revision: 1.22 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
/* main.c - VMS NetHack */
-/* NetHack 3.5 vmsmisc.c $Date$ $Revision$ */
+/* NetHack 3.5 vmsmisc.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 vmsmisc.c $Date: 2011/09/01 01:47:00 $ $Revision: 1.6 $ */
/* NetHack may be freely redistributed. See license for details. */
#include "config.h"
-/* NetHack 3.5 vmstty.c $Date$ $Revision$ */
+/* NetHack 3.5 vmstty.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 vmstty.c $Date: 2011/04/13 01:48:13 $ $Revision: 1.10 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
/* tty.c - (VMS) version */
-/* NetHack 3.5 vmsunix.c $Date$ $Revision$ */
+/* NetHack 3.5 vmsunix.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 vmsunix.c $Date: 2011/09/01 01:47:00 $ $Revision: 1.8 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
Instructions for compiling and installing
NetHack 3.5 on a Windows CE or PocketPC system
========================================================================
- Last revision: $Date$
+ Last revision: $NHDT-Date$
+ Last revision: $Date: 2005/01/02 20:55:41 $
Credit for the porting of NetHack to Windows CE goes to Alex Kompel who
initially developed and contributed the port.
-# NetHack 3.5 bootstrp.mak $Date$ $Revision$
+# NetHack 3.5 bootstrp.mak $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 bootstrp.mak $Date: 2012/01/10 17:47:33 $ $Revision: 1.10 $
# Copyright (c) Michael Allison
#
# NetHack Windows CE bootstrap file for MS Visual C++ V6.x and
-/* NetHack 3.5 celib.c $Date$ $Revision$ */
+/* NetHack 3.5 celib.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 celib.c $Date: 2009/10/22 02:59:30 $ $Revision: 1.6 $ */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-@REM NetHack 3.5 cesetup.bat $Date$ $Revision$ */
+@REM NetHack 3.5 cesetup.bat $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+@REM NetHack 3.5 cesetup.bat $Date: 2009/10/22 02:59:30 $ $Revision: 1.9 $ */
@REM Copyright (c) Alex Kompel, 2002
@REM NetHack may be freely redistributed. See license for details.
@REM Win32 nhsetup batch file, see Install.ce for details
-/* NetHack 3.5 cesound.c $Date$ $Revision$ */
-/* SCCS Id: @(#)cesound.c 3.5 $Date$ */
+/* NetHack 3.5 cesound.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 cesound.c $Date: 2009/05/06 10:52:00 $ $Revision: 1.4 $ */
+/* SCCS Id: @(#)cesound.c 3.5 $NHDT-Date$ */
+/* SCCS Id: @(#)cesound.c 3.5 $Date: 2009/05/06 10:52:00 $ */
/* Copyright (c) NetHack PC Development Team 1993 */
/* NetHack may be freely redistributed. See license for details. */
/* */
-/* NetHack 3.5 mhaskyn.c $Date$ $Revision$ */
+/* NetHack 3.5 mhaskyn.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhaskyn.c $Date: 2009/05/06 10:52:00 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)mhaskyn.c 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhaskyn.h $Date$ $Revision$ */
+/* NetHack 3.5 mhaskyn.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhaskyn.h $Date: 2009/05/06 10:52:03 $ $Revision: 1.3 $ */
/* SCCS Id: @(#)mhaskyn.h 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhcmd.c $Date$ $Revision$ */
+/* NetHack 3.5 mhcmd.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhcmd.c $Date: 2009/10/22 02:59:30 $ $Revision: 1.8 $ */
/* NetHack may be freely redistributed. See license for details. */
#include "winMS.h"
-/* NetHack 3.5 mhcolor.c $Date$ $Revision$ */
+/* NetHack 3.5 mhcolor.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhcolor.c $Date: 2009/05/06 10:52:03 $ $Revision: 1.3 $ */
/* SCCS Id: @(#)mhcolor.c 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhcolor.h $Date$ $Revision$ */
+/* NetHack 3.5 mhcolor.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhcolor.h $Date: 2009/05/06 10:52:04 $ $Revision: 1.3 $ */
/* SCCS Id: @(#)mhcolor.h 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhdlg.c $Date$ $Revision$ */
+/* NetHack 3.5 mhdlg.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhdlg.c $Date: 2009/10/13 01:55:10 $ $Revision: 1.8 $ */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhdlg.h $Date$ $Revision$ */
+/* NetHack 3.5 mhdlg.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhdlg.h $Date: 2009/05/06 10:52:06 $ $Revision: 1.3 $ */
/* SCCS Id: @(#)mhdlg.h 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhfont.c $Date$ $Revision$ */
+/* NetHack 3.5 mhfont.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhfont.c $Date: 2009/05/06 10:52:08 $ $Revision: 1.6 $ */
/* SCCS Id: @(#)mhfont.c 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhfont.h $Date$ $Revision$ */
+/* NetHack 3.5 mhfont.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhfont.h $Date: 2009/05/06 10:52:08 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)mhfont.h 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhinput.c $Date$ $Revision$ */
+/* NetHack 3.5 mhinput.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhinput.c $Date: 2009/05/06 10:52:10 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)mhinput.c 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhinput.h $Date$ $Revision$ */
+/* NetHack 3.5 mhinput.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhinput.h $Date: 2009/05/06 10:52:10 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)mhinput.h 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhmain.c $Date$ $Revision$ */
+/* NetHack 3.5 mhmain.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhmain.c $Date: 2011/10/11 02:37:20 $ $Revision: 1.14 $ */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhmain.h $Date$ $Revision$ */
+/* NetHack 3.5 mhmain.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhmain.h $Date: 2009/05/06 10:52:13 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)mhmain.h 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhmap.c $Date$ $Revision$ */
+/* NetHack 3.5 mhmap.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhmap.c $Date: 2009/10/13 01:55:11 $ $Revision: 1.10 $ */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhmap.h $Date$ $Revision$ */
+/* NetHack 3.5 mhmap.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhmap.h $Date: 2009/10/13 01:55:12 $ $Revision: 1.6 $ */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhmsg.h $Date$ $Revision$ */
+/* NetHack 3.5 mhmsg.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhmsg.h $Date: 2009/05/06 10:52:21 $ $Revision: 1.3 $ */
/* SCCS Id: @(#)mhmsg.h 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhmsgwnd.c $Date$ $Revision$ */
+/* NetHack 3.5 mhmsgwnd.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhmsgwnd.c $Date: 2009/10/13 01:55:12 $ $Revision: 1.7 $ */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhmsgwnd.h $Date$ $Revision$ */
+/* NetHack 3.5 mhmsgwnd.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhmsgwnd.h $Date: 2009/05/06 10:52:26 $ $Revision: 1.3 $ */
/* SCCS Id: @(#)mhmsgwnd.h 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhrip.c $Date$ $Revision$ */
+/* NetHack 3.5 mhrip.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhrip.c $Date: 2009/05/06 10:52:26 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)mhrip.c 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhrip.h $Date$ $Revision$ */
+/* NetHack 3.5 mhrip.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhrip.h $Date: 2009/05/06 10:52:28 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)mhrip.h 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhstatus.c $Date$ $Revision$ */
+/* NetHack 3.5 mhstatus.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhstatus.c $Date: 2009/05/06 10:52:28 $ $Revision: 1.7 $ */
/* SCCS Id: @(#)mhstatus.c 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhstatus.h $Date$ $Revision$ */
+/* NetHack 3.5 mhstatus.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhstatus.h $Date: 2009/05/06 10:52:29 $ $Revision: 1.3 $ */
/* SCCS Id: @(#)mhstatus.h 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhtext.c $Date$ $Revision$ */
+/* NetHack 3.5 mhtext.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhtext.c $Date: 2009/10/22 02:59:34 $ $Revision: 1.8 $ */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhtext.h $Date$ $Revision$ */
+/* NetHack 3.5 mhtext.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhtext.h $Date: 2009/05/06 10:52:32 $ $Revision: 1.3 $ */
/* SCCS Id: @(#)mhtext.h 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhtxtbuf.c $Date$ $Revision$ */
+/* NetHack 3.5 mhtxtbuf.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhtxtbuf.c $Date: 2009/10/13 01:55:12 $ $Revision: 1.6 $ */
/* Copyright (C) 2003 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhtxtbuf.h $Date$ $Revision$ */
+/* NetHack 3.5 mhtxtbuf.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhtxtbuf.h $Date: 2009/10/13 01:55:12 $ $Revision: 1.5 $ */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mswproc.c $Date$ $Revision$ */
+/* NetHack 3.5 mswproc.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mswproc.c $Date: 2012/01/24 04:26:22 $ $Revision: 1.19 $ */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 winMS.h $Date$ $Revision$ */
+/* NetHack 3.5 winMS.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 winMS.h $Date: 2012/01/24 04:26:22 $ $Revision: 1.9 $ */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 winhack.c $Date$ $Revision$ */
+/* NetHack 3.5 winhack.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 winhack.c $Date: 2009/10/22 02:59:35 $ $Revision: 1.11 $ */
/* Copyright (C) 2001 by Alex Kompel */
// winhack.cpp : Defines the entry point for the application.
//
NetHack 3.5 on a Windows system
(Windows XP and Windows 2003 or later only)
==============================================================
- Last revision: $Date$
+ Last revision: $NHDT-Date$
+ Last revision: $Date: 2012/01/15 17:43:54 $
Credit for the porting of NetHack to the Win32 Console Subsystem goes to
the NT Porting Team started by Michael Allison.
-# NetHack 3.5 Makefile.bcc $Date$ $Revision$
+# NetHack 3.5 Makefile.bcc $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Makefile.bcc $Date: 2011/10/11 02:37:22 $ $Revision: 1.46 $
# Copyright (c) NetHack PC Development Team 1993-2010
#
#
-# NetHack 3.5 Makefile.gcc $Date$ $Revision$
+# NetHack 3.5 Makefile.gcc $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Makefile.gcc $Date: 2011/10/11 02:37:22 $ $Revision: 1.38 $
# Copyright (c) NetHack PC Development Team 1993-2010
#
# NetHack 3.5.x Makefile for MinGW
-# NetHack 3.5 Makefile.msc $Date$ $Revision$
+# NetHack 3.5 Makefile.msc $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 Makefile.msc $Date: 2012/04/14 00:38:09 $ $Revision: 1.54 $
# Copyright (c) NetHack PC Development Team 1993-2012
#
# NetHack 3.5.x Makefile for MS Visual Studio Visual C++ compiler
-/* NetHack 3.5 console.rc $Date$ $Revision$ */
-/* SCCS Id: @(#)console.rc 3.5 $Date$ */
+/* NetHack 3.5 console.rc $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 console.rc $Date: 2009/05/06 10:53:27 $ $Revision: 1.7 $ */
+/* SCCS Id: @(#)console.rc 3.5 $NHDT-Date$ */
+/* SCCS Id: @(#)console.rc 3.5 $Date: 2009/05/06 10:53:27 $ */
/* Copyright (c) Yitzhak Sapir, 2002. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 nh340key.c $Date$ $Revision$ */
-/* SCCS Id: @(#)nh340key.c 3.5 $Date$ */
+/* NetHack 3.5 nh340key.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 nh340key.c $Date: 2009/05/06 10:53:29 $ $Revision: 1.7 $ */
+/* SCCS Id: @(#)nh340key.c 3.5 $NHDT-Date$ */
+/* SCCS Id: @(#)nh340key.c 3.5 $Date: 2009/05/06 10:53:29 $ */
/* Copyright (c) NetHack PC Development Team 2003 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 nhdefkey.c $Date$ $Revision$ */
-/* SCCS Id: @(#)nhdefkey.c 3.5 $Date$ */
+/* NetHack 3.5 nhdefkey.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 nhdefkey.c $Date: 2009/05/06 10:53:29 $ $Revision: 1.10 $ */
+/* SCCS Id: @(#)nhdefkey.c 3.5 $NHDT-Date$ */
+/* SCCS Id: @(#)nhdefkey.c 3.5 $Date: 2009/05/06 10:53:29 $ */
/* Copyright (c) NetHack PC Development Team 2003 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 nhraykey.c $Date$ $Revision$ */
-/* SCCS Id: @(#)nhraykey.c 3.5 $Date$ */
+/* NetHack 3.5 nhraykey.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 nhraykey.c $Date: 2009/05/06 10:53:31 $ $Revision: 1.8 $ */
+/* SCCS Id: @(#)nhraykey.c 3.5 $NHDT-Date$ */
+/* SCCS Id: @(#)nhraykey.c 3.5 $Date: 2009/05/06 10:53:31 $ */
/* Copyright (c) NetHack PC Development Team 2003 */
/* NetHack may be freely redistributed. See license for details. */
-@REM NetHack 3.5 nhsetup.bat $Date$ $Revision$ */
+@REM NetHack 3.5 nhsetup.bat $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+@REM NetHack 3.5 nhsetup.bat $Date: 2010/09/05 14:22:16 $ $Revision: 1.21 $ */
@REM Copyright (c) NetHack PC Development Team 1993-2010
@REM NetHack may be freely redistributed. See license for details.
@REM Win32 setup batch file, see Install.nt for details
-/* NetHack 3.5 ntsound.c $Date$ $Revision$ */
-/* SCCS Id: @(#)ntsound.c 3.5 $Date$ */
+/* NetHack 3.5 ntsound.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 ntsound.c $Date: 2009/05/06 10:53:33 $ $Revision: 1.7 $ */
+/* SCCS Id: @(#)ntsound.c 3.5 $NHDT-Date$ */
+/* SCCS Id: @(#)ntsound.c 3.5 $Date: 2009/05/06 10:53:33 $ */
/* Copyright (c) NetHack PC Development Team 1993 */
/* NetHack may be freely redistributed. See license for details. */
/* */
-/* NetHack 3.5 nttty.c $Date$ $Revision$ */
-/* SCCS Id: @(#)nttty.c 3.5 $Date$ */
+/* NetHack 3.5 nttty.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 nttty.c $Date: 2009/05/06 10:53:34 $ $Revision: 1.54 $ */
+/* SCCS Id: @(#)nttty.c 3.5 $NHDT-Date$ */
+/* SCCS Id: @(#)nttty.c 3.5 $Date: 2009/05/06 10:53:34 $ */
/* Copyright (c) NetHack PC Development Team 1993 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 win32api.h $Date$ $Revision$ */
-/* SCCS Id: @(#)win32api.h 3.5 $Date$ */
+/* NetHack 3.5 win32api.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 win32api.h $Date: 2009/05/06 10:53:39 $ $Revision: 1.6 $ */
+/* SCCS Id: @(#)win32api.h 3.5 $NHDT-Date$ */
+/* SCCS Id: @(#)win32api.h 3.5 $Date: 2009/05/06 10:53:39 $ */
/* Copyright (c) NetHack PC Development Team 1996 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 winnt.c $Date$ $Revision$ */
-/* SCCS Id: @(#)winnt.c 3.5 $Date$ */
+/* NetHack 3.5 winnt.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 winnt.c $Date: 2012/01/15 19:11:41 $ $Revision: 1.18 $ */
+/* SCCS Id: @(#)winnt.c 3.5 $NHDT-Date$ */
+/* SCCS Id: @(#)winnt.c 3.5 $Date: 2012/01/15 19:11:41 $ */
/* Copyright (c) NetHack PC Development Team 1993, 1994 */
/* NetHack may be freely redistributed. See license for details. */
%{
-/* NetHack 3.5 dgn_comp.l $Date$ $Revision$ */
+/* NetHack 3.5 dgn_comp.l $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 dgn_comp.l $Date: 2009/05/06 10:54:26 $ $Revision: 1.7 $ */
/* SCCS Id: @(#)dgn_lex.c 3.5 2002/03/27 */
/* Copyright (c) 1989 by Jean-Christophe Collet */
/* Copyright (c) 1990 by M. Stephenson */
%{
-/* NetHack 3.5 dgn_comp.y $Date$ $Revision$ */
+/* NetHack 3.5 dgn_comp.y $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 dgn_comp.y $Date: 2009/05/06 10:54:26 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)dgn_comp.c 3.5 1996/06/22 */
/* Copyright (c) 1989 by Jean-Christophe Collet */
/* Copyright (c) 1990 by M. Stephenson */
-/* NetHack 3.5 dgn_main.c $Date$ $Revision$ */
+/* NetHack 3.5 dgn_main.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 dgn_main.c $Date: 2009/05/06 10:54:27 $ $Revision: 1.7 $ */
/* SCCS Id: @(#)dgn_main.c 3.5 1994/09/23 */
/* Copyright (c) 1989 by Jean-Christophe Collet */
/* Copyright (c) 1990 by M. Stephenson */
-/* NetHack 3.5 dlb_main.c $Date$ $Revision$ */
+/* NetHack 3.5 dlb_main.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 dlb_main.c $Date: 2012/01/16 03:56:08 $ $Revision: 1.6 $ */
/* Copyright (c) Kenneth Lorber, Bethesda, Maryland, 1993. */
/* NetHack may be freely redistributed. See license for details. */
%{
-/* NetHack 3.5 lev_comp.l $Date$ $Revision$ */
+/* NetHack 3.5 lev_comp.l $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 lev_comp.l $Date: 2009/05/06 10:54:31 $ $Revision: 1.9 $ */
/* SCCS Id: @(#)lev_lex.c 3.5 2002/03/27 */
/* Copyright (c) 1989 by Jean-Christophe Collet */
/* NetHack may be freely redistributed. See license for details. */
%{
-/* NetHack 3.5 lev_comp.y $Date$ $Revision$ */
+/* NetHack 3.5 lev_comp.y $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 lev_comp.y $Date: 2009/05/06 10:54:31 $ $Revision: 1.8 $ */
/* SCCS Id: @(#)lev_yacc.c 3.5 2007/08/01 */
/* Copyright (c) 1989 by Jean-Christophe Collet */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 lev_main.c $Date$ $Revision$ */
+/* NetHack 3.5 lev_main.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 lev_main.c $Date: 2012/01/12 04:48:12 $ $Revision: 1.20 $ */
/* SCCS Id: @(#)lev_main.c 3.5 2007/01/17 */
/* Copyright (c) 1989 by Jean-Christophe Collet */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 makedefs.c $Date$ $Revision$ */
+/* NetHack 3.5 makedefs.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 makedefs.c $Date: 2012/01/15 09:27:03 $ $Revision: 1.50 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* Copyright (c) M. Stephenson, 1990, 1991. */
/* Copyright (c) Dean Luick, 1990. */
/*
- * NetHack 3.5 mdgrep.h $Date$ $Revision$
+ * NetHack 3.5 mdgrep.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+ * NetHack 3.5 mdgrep.h $Date: 2010/05/01 20:57:17 $ $Revision: 1.5 $
* Copyright (c) Kenneth Lorber, Kensington, Maryland, 2008
* NetHack may be freely redistributed. See license for details.
*
#!perl
-# NetHack 3.5 mdgrep.pl $NHDT-Date: 1423877528 2015/02/14 01:32:08 $ $NHDT-Revision: 1.7 $
+# NetHack 3.5 mdgrep.pl $NHDT-Date: 1423877528 2015/02/14 01:32:08 $ $NHDT-Branch$:$NHDT-Revision: 1.7 $
# Copyright (c) Kenneth Lorber, Kensington, Maryland
# NetHack may be freely redistributed. See license for details.
sub start_file {
($rev) = ('$NHDT-Revision: 1.7 $') =~ m/: (.*) .$/;
my $date = '$NHDT-Date: 1423877529 2015/02/14 01:32:09 $';
+ my $branch = '$NHDT-Branch$';
my $revision = '$NHDT-Revision: 1.7 $';
open(OUT, ">$outfile") || die "open $outfile: $!";
# NB: Date and Revision below will be modified when mdgrep.h is written to
# before generating mdgrep.h and committing that file).
print OUT <<E_O_M;
/*
- * NetHack 3.5 $outfile $date $revision
+ * NetHack 3.5 $outfile $date $branch:$revision
* Copyright (c) Kenneth Lorber, Kensington, Maryland, 2008
* NetHack may be freely redistributed. See license for details.
*
-/* NetHack 3.5 panic.c $Date$ $Revision$ */
+/* NetHack 3.5 panic.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 panic.c $Date: 2009/05/06 10:54:39 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)panic.c 3.5 1994/03/02 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 recover.c $Date$ $Revision$ */
+/* NetHack 3.5 recover.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 recover.c $Date: 2009/05/06 10:54:40 $ $Revision: 1.11 $ */
/* SCCS Id: @(#)recover.c 3.5 1999/10/23 */
/* Copyright (c) Janet Walz, 1992. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 qt_clust.cpp $Date$ $Revision$ */
+/* NetHack 3.5 qt_clust.cpp $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 qt_clust.cpp $Date: 2009/05/06 10:55:03 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)qt_clust.cpp 3.5 1999/11/19 */
/* Copyright (c) Warwick Allison, 1999. */
/* NetHack may be freely redistributed. See license for details. */
-// NetHack 3.5 qt_win.cpp $Date$ $Revision$
+// NetHack 3.5 qt_win.cpp $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+// NetHack 3.5 qt_win.cpp $Date: 2012/01/24 04:26:24 $ $Revision: 1.59 $
// Copyright (c) Warwick Allison, 1999.
// NetHack may be freely redistributed. See license for details.
/**********************************************************************
-** $Id$
+** $NHDT-Branch$:$NHDT-Revision$ $NHDT-Date$
+** $Id: qttableview.cpp,v 1.2 2002/03/09 03:13:15 jwalz Exp $
**
** Implementation of QtTableView class
**
-/* NetHack 3.5 tileedit.cpp $Date$ $Revision$ */
+/* NetHack 3.5 tileedit.cpp $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 tileedit.cpp $Date: 2009/05/06 10:55:09 $ $Revision: 1.6 $ */
/* SCCS Id: @(#)tileedit.cpp 3.5 1999/11/19 */
/* Copyright (c) Warwick Allison, 1999. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 tileedit.h $Date$ $Revision$ */
+/* NetHack 3.5 tileedit.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 tileedit.h $Date: 2009/05/06 10:55:10 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)tileedit.h 3.5 1999/11/19 */
/* Copyright (c) Warwick Allison, 1999. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 Window.c $Date$ $Revision$ */
+/* NetHack 3.5 Window.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 Window.c $Date: 2009/05/06 10:55:43 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)Window.c 3.5 1993/02/02 */
/* Copyright (c) Dean Luick, 1992 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 nh32icon $Date$ $Revision$ */
+/* NetHack 3.5 nh32icon $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 nh32icon $Date: 2009/05/06 10:55:43 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)nh32icon 3.5 2002/02/12 */
/* Copyright (C) 1993,1995 by Robert Patrick Rankin */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 nh56icon $Date$ $Revision$ */
+/* NetHack 3.5 nh56icon $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 nh56icon $Date: 2009/05/06 10:55:43 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)nh56icon 3.5 2002/02/12 */
/* Copyright (c) 1993,1995 by M. Stephenson */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 nh72icon $Date$ $Revision$ */
+/* NetHack 3.5 nh72icon $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 nh72icon $Date: 2009/05/06 10:55:43 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)nh72icon 3.5 1993/01/21 */
/* Copyright (c) 1993 by M. Stephenson */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 winX.c $Date$ $Revision$ */
+/* NetHack 3.5 winX.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 winX.c $Date: 2012/01/24 04:26:26 $ $Revision: 1.27 $ */
/* Copyright (c) Dean Luick, 1992 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 winmap.c $Date$ $Revision$ */
+/* NetHack 3.5 winmap.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 winmap.c $Date: 2009/05/06 10:55:49 $ $Revision: 1.14 $ */
/* SCCS Id: @(#)winmap.c 3.5 2005/11/12 */
/* Copyright (c) Dean Luick, 1992 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 winmenu.c $Date$ $Revision$ */
+/* NetHack 3.5 winmenu.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 winmenu.c $Date: 2009/05/06 10:55:53 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)winmenu.c 3.5 1996/08/15 */
/* Copyright (c) Dean Luick, 1992 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 winmesg.c $Date$ $Revision$ */
+/* NetHack 3.5 winmesg.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 winmesg.c $Date: 2009/05/06 10:55:57 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)winmesg.c 3.5 1996/04/05 */
/* Copyright (c) Dean Luick, 1992 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 winmisc.c $Date$ $Revision$ */
+/* NetHack 3.5 winmisc.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 winmisc.c $Date: 2009/05/06 10:55:57 $ $Revision: 1.7 $ */
/* SCCS Id: @(#)winmisc.c 3.5 2000/05/21 */
/* Copyright (c) Dean Luick, 1992 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 winstat.c $Date$ $Revision$ */
+/* NetHack 3.5 winstat.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 winstat.c $Date: 2009/05/06 10:55:59 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)winstat.c 3.5 1996/04/05 */
/* Copyright (c) Dean Luick, 1992 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 wintext.c $Date$ $Revision$ */
+/* NetHack 3.5 wintext.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 wintext.c $Date: 2012/01/24 04:26:27 $ $Revision: 1.7 $ */
/* SCCS Id: @(#)wintext.c 3.5 1996/04/05 */
/* Copyright (c) Dean Luick, 1992 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 winval.c $Date$ $Revision$ */
+/* NetHack 3.5 winval.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 winval.c $Date: 2009/05/06 10:56:06 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)winval.c 3.5 1992/3/7 */
/* Copyright (c) Dean Luick, 1992 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 wc_chainin.c $Date$ $Revision$ */
+/* NetHack 3.5 wc_chainin.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 wc_chainin.c $Date: 2012/01/23 10:45:31 $ $Revision: 1.2 $ */
/* Copyright (c) Kenneth Lorber, 2012 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 wc_chainout.c $Date$ $Revision$ */
+/* NetHack 3.5 wc_chainout.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 wc_chainout.c $Date: 2012/01/23 10:45:31 $ $Revision: 1.2 $ */
/* Copyright (c) Kenneth Lorber, 2012 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 wc_trace.c $Date$ $Revision$ */
+/* NetHack 3.5 wc_trace.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 wc_trace.c $Date: 2012/01/23 10:45:31 $ $Revision: 1.2 $ */
/* Copyright (c) Kenneth Lorber, 2012 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gr_rect.c $Date$ $Revision$ */
+/* NetHack 3.5 gr_rect.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gr_rect.c $Date: 2009/05/06 10:56:40 $ $Revision: 1.3 $ */
/* SCCS Id: @(#)gr_rect.c 3.5 2001/12/10 */
/* Copyright (c) Christian Bressler, 2001 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 tile2img.c $Date$ $Revision$ */
+/* NetHack 3.5 tile2img.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 tile2img.c $Date: 2009/05/06 10:56:40 $ $Revision: 1.2 $ */
/* SCCS Id: @(#)tile2bmp.c 3.2 95/09/06 */
/* Copyright (c) NetHack PC Development Team 1995 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 wingem.c $Date$ $Revision$ */
+/* NetHack 3.5 wingem.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 wingem.c $Date: 2012/01/24 04:26:29 $ $Revision: 1.16 $ */
/* Copyright (c) Christian Bressler, 1999 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 wingem1.c $Date$ $Revision$ */
+/* NetHack 3.5 wingem1.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 wingem1.c $Date: 2009/05/06 10:56:42 $ $Revision: 1.8 $ */
/* SCCS Id: @(#)wingem1.c 3.5 1999/12/10 */
/* Copyright (c) Christian Bressler 1999 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 xpm2img.c $Date$ $Revision$ */
+/* NetHack 3.5 xpm2img.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 xpm2img.c $Date: 2009/05/06 10:56:48 $ $Revision: 1.3 $ */
/* SCCS Id: @(#)xpm2img.c 3.5 2002/03/17 */
/* Copyright (c) Christian Bressler 2002 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gn_xpms.h $Date$ $Revision$ */
+/* NetHack 3.5 gn_xpms.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gn_xpms.h $Date: 2009/05/06 10:57:19 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)gnxpms.h 3.5 2000/07/16 */
/* Copyright (C) 1998 by Erik Andersen <andersee@debian.org> */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gnaskstr.c $Date$ $Revision$ */
+/* NetHack 3.5 gnaskstr.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gnaskstr.c $Date: 2009/05/06 10:57:24 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)gnaskstr.c 3.5 2000/07/16 */
/* Copyright (C) 1998 by Erik Andersen <andersee@debian.org> */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gnaskstr.h $Date$ $Revision$ */
+/* NetHack 3.5 gnaskstr.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gnaskstr.h $Date: 2009/05/06 10:57:24 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)gnaskstr.h 3.5 2000/07/16 */
/* Copyright (C) 1998 by Erik Andersen <andersee@debian.org> */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gnbind.c $Date$ $Revision$ */
+/* NetHack 3.5 gnbind.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gnbind.c $Date: 2012/01/24 04:26:31 $ $Revision: 1.25 $ */
/* Copyright (C) 1998 by Erik Andersen <andersee@debian.org> */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gnbind.h $Date$ $Revision$ */
+/* NetHack 3.5 gnbind.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gnbind.h $Date: 2012/01/24 04:26:31 $ $Revision: 1.6 $ */
/* SCCS Id: @(#)gnbind.h 3.5 2000/07/16 */
/* Copyright (C) 1998 by Erik Andersen <andersee@debian.org> */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gnglyph.c $Date$ $Revision$ */
+/* NetHack 3.5 gnglyph.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gnglyph.c $Date: 2009/05/06 10:57:29 $ $Revision: 1.6 $ */
/* SCCS Id: @(#)gnglyph.c 3.5 2000/07/16 */
/* Copyright (C) 1998 by Erik Andersen <andersee@debian.org> */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gnglyph.h $Date$ $Revision$ */
+/* NetHack 3.5 gnglyph.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gnglyph.h $Date: 2009/05/06 10:57:30 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)gnglyph.h 3.5 2000/07/16 */
/* Copyright (C) 1998 by Erik Andersen <andersee@debian.org> */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gnmain.c $Date$ $Revision$ */
+/* NetHack 3.5 gnmain.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gnmain.c $Date: 2009/05/06 10:57:32 $ $Revision: 1.9 $ */
/* SCCS Id: @(#)gnmain.c 3.5 2008/01/30 */
/* Copyright (C) 1998 by Erik Andersen <andersee@debian.org> */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gnmain.h $Date$ $Revision$ */
+/* NetHack 3.5 gnmain.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gnmain.h $Date: 2009/05/06 10:57:32 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)gnmain.h 3.5 2000/07/16 */
/* Copyright (C) 1998 by Erik Andersen <andersee@debian.org> */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gnmap.c $Date$ $Revision$ */
+/* NetHack 3.5 gnmap.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gnmap.c $Date: 2009/05/06 10:57:34 $ $Revision: 1.6 $ */
/* SCCS Id: @(#)gnmap.c 3.5 2000/07/16 */
/* Copyright (C) 1998 by Erik Andersen <andersee@debian.org> */
/* Copyright (C) 1998 by Anthony Taylor <tonyt@ptialaska.net> */
-/* NetHack 3.5 gnmap.h $Date$ $Revision$ */
+/* NetHack 3.5 gnmap.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gnmap.h $Date: 2009/05/06 10:57:35 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)gnmap.h 3.5 2000/07/16 */
/* Copyright (C) 1998 by Erik Andersen <andersee@debian.org> */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gnmenu.c $Date$ $Revision$ */
+/* NetHack 3.5 gnmenu.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gnmenu.c $Date: 2009/05/06 10:57:36 $ $Revision: 1.6 $ */
/* SCCS Id: @(#)gnmenu.c 3.5 2000/07/16 */
/* Copyright (C) 1998 by Erik Andersen <andersee@debian.org> */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gnmenu.h $Date$ $Revision$ */
+/* NetHack 3.5 gnmenu.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gnmenu.h $Date: 2009/05/06 10:57:39 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)gnmenu.h 3.5 2000/07/16 */
/* Copyright (C) 1998 by Erik Andersen <andersee@debian.org> */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gnmesg.c $Date$ $Revision$ */
+/* NetHack 3.5 gnmesg.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gnmesg.c $Date: 2009/05/06 10:57:39 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)gnmesg.c 3.5 2000/07/16 */
/* Copyright (C) 1998 by Erik Andersen <andersee@debian.org> */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gnmesg.h $Date$ $Revision$ */
+/* NetHack 3.5 gnmesg.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gnmesg.h $Date: 2009/05/06 10:57:39 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)gnmesg.h 3.5 2000/07/16 */
/* Copyright (C) 1998 by Erik Andersen <andersee@debian.org> */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gnomeprv.h $Date$ $Revision$ */
+/* NetHack 3.5 gnomeprv.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gnomeprv.h $Date: 2009/05/06 10:57:40 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)gnomeprv.h 3.5 2000/07/16 */
/* Copyright (C) 1998 by Erik Andersen <andersee@debian.org> */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gnopts.c $Date$ $Revision$ */
+/* NetHack 3.5 gnopts.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gnopts.c $Date: 2009/05/06 10:57:40 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)gnopts.c 3.5 2000/07/16 */
/* Copyright (C) 1998 by Erik Andersen <andersee@debian.org> */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gnopts.h $Date$ $Revision$ */
+/* NetHack 3.5 gnopts.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gnopts.h $Date: 2009/05/06 10:57:42 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)gnopts.h 3.5 2000/07/16 */
/* Copyright (C) 1998 by Erik Andersen <andersee@debian.org> */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gnplayer.c $Date$ $Revision$ */
+/* NetHack 3.5 gnplayer.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gnplayer.c $Date: 2009/05/06 10:57:42 $ $Revision: 1.6 $ */
/* SCCS Id: @(#)gnplayer.c 3.5 2000/07/16 */
/* Copyright (C) 1998 by Erik Andersen <andersee@debian.org> */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gnplayer.h $Date$ $Revision$ */
+/* NetHack 3.5 gnplayer.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gnplayer.h $Date: 2009/05/06 10:57:44 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)gnplayer.h 3.5 2000/07/16 */
/* Copyright (C) 1998 by Erik Andersen <andersee@debian.org> */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gnsignal.c $Date$ $Revision$ */
+/* NetHack 3.5 gnsignal.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gnsignal.c $Date: 2009/05/06 10:57:45 $ $Revision: 1.7 $ */
/* SCCS Id: @(#)gnsignal.c 3.5 2005/11/19 */
/* Copyright (C) 1998 by Anthony Taylor <tonyt@ptialaska.net> */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gnsignal.h $Date$ $Revision$ */
+/* NetHack 3.5 gnsignal.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gnsignal.h $Date: 2009/05/06 10:57:51 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)gnsignal.h 3.5 2000/07/16 */
/* Copyright (C) 1998 by Anthony Taylor <tonyt@ptialaska.net> */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gnstatus.c $Date$ $Revision$ */
+/* NetHack 3.5 gnstatus.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gnstatus.c $Date: 2009/05/06 10:57:54 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)gnstatus.c 3.5 2000/07/16 */
/* Copyright (C) 1998 by Erik Andersen <andersee@debian.org> */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gnstatus.h $Date$ $Revision$ */
+/* NetHack 3.5 gnstatus.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gnstatus.h $Date: 2009/05/06 10:57:57 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)gnstatus.h 3.5 2000/07/16 */
/* Copyright (C) 1998 by Erik Andersen <andersee@debian.org> */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gntext.c $Date$ $Revision$ */
+/* NetHack 3.5 gntext.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gntext.c $Date: 2009/05/06 10:58:00 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)gntext.c 3.5 2000/07/16 */
/* Copyright (C) 1998 by Erik Andersen <andersee@debian.org> */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gntext.h $Date$ $Revision$ */
+/* NetHack 3.5 gntext.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gntext.h $Date: 2009/05/06 10:58:03 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)gntext.h 3.5 2000/07/16 */
/* Copyright (C) 1998 by Erik Andersen <andersee@debian.org> */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gnyesno.c $Date$ $Revision$ */
+/* NetHack 3.5 gnyesno.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gnyesno.c $Date: 2009/05/06 10:58:06 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)gnyesno.c 3.5 2000/07/16 */
/* Copyright (C) 1998 by Erik Andersen <andersee@debian.org> */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 gnyesno.h $Date$ $Revision$ */
+/* NetHack 3.5 gnyesno.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 gnyesno.h $Date: 2009/05/06 10:58:08 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)gnyesno.h 3.5 2000/07/16 */
/* Copyright (C) 1998 by Erik Andersen <andersee@debian.org> */
/* NetHack may be freely redistributed. See license for details. */
#!/usr/bin/osascript
-# NetHack 3.5.0 NetHackGuidebook.applescript $Date$ $Revision$
+# NetHack 3.5.0 NetHackGuidebook.applescript $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5.0 NetHackGuidebook.applescript $Date: 2011/10/17 01:29:20 $ $Revision: 1.2 $
# Copyright (c) Kenneth Lorber, Kensington, Maryland, 2011
# NetHack may be freely redistributed. See license for details.
#!/usr/bin/osascript
-# NetHack 3.5 NetHackRecover.applescript $Date$ $Revision$
+# NetHack 3.5 NetHackRecover.applescript $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 NetHackRecover.applescript $Date: 2011/10/17 01:29:20 $ $Revision: 1.3 $
# Copyright (c) Kenneth Lorber, Kensington, Maryland, 2009
# NetHack may be freely redistributed. See license for details.
#!/usr/bin/osascript
-# NetHack 3.5.0 NetHackTerm.applescript $Date$ $Revision$
+# NetHack 3.5.0 NetHackTerm.applescript $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5.0 NetHackTerm.applescript $Date: 2011/10/17 01:29:20 $ $Revision: 1.2 $
# Copyright (c) Kenneth Lorber, Kensington, Maryland, 2011
# NetHack may be freely redistributed. See license for details.
#!/usr/bin/perl
-# NetHack 3.5 recover.pl $Date$ $Revision$
+# NetHack 3.5 recover.pl $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+# NetHack 3.5 recover.pl $Date: 2011/10/17 01:29:20 $ $Revision: 1.3 $
# Copyright (c) Kenneth Lorber, Kensington, Maryland, 2009
# NetHack may be freely redistributed. See license for details.
-/* NetHack 3.5 ppmwrite.c $Date$ $Revision$ */
+/* NetHack 3.5 ppmwrite.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 ppmwrite.c $Date: 2009/05/06 10:59:00 $ $Revision: 1.2 $ */
/* this produces a raw ppm file, with a 15-character header of
* "P6 3-digit-width 3-digit-height 255\n"
*/
-/* NetHack 3.5 thintile.c $Date$ $Revision$ */
+/* NetHack 3.5 thintile.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 thintile.c $Date: 2012/01/10 17:47:40 $ $Revision: 1.5 $ */
/* Copyright (c) NetHack Development Team 1995 */
/* NetHack may be freely redistributed. See license for details. */
-NetHack 3.5 tile.doc $Date$ $Revision$
+NetHack 3.5 tile.doc $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$
+NetHack 3.5 tile.doc $Date: 2009/05/06 10:59:00 $ $Revision: 1.2 $
Window ports can optionally make use of the tiles (pictures for NetHack
symbols) found in this directory. They are distributed in a text format
-/* NetHack 3.5 tile.h $Date$ $Revision$ */
+/* NetHack 3.5 tile.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 tile.h $Date: 2009/05/06 21:59:39 $ $Revision: 1.6 $ */
typedef unsigned char pixval;
typedef struct pixel_s {
-/* NetHack 3.5 tile2bmp.c $Date$ $Revision$ */
+/* NetHack 3.5 tile2bmp.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 tile2bmp.c $Date: 2009/05/06 10:59:00 $ $Revision: 1.6 $ */
/* SCCS Id: @(#)tile2bmp.c 3.5 2002/03/14 */
/* Copyright (c) NetHack PC Development Team 1995 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 tilemap.c $Date$ $Revision$ */
+/* NetHack 3.5 tilemap.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 tilemap.c $Date: 2009/05/06 10:59:02 $ $Revision: 1.7 $ */
/* SCCS Id: @(#)tilemap.c 3.5 2000/06/04 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 tiletext.c $Date$ $Revision$ */
+/* NetHack 3.5 tiletext.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 tiletext.c $Date: 2009/05/06 10:59:03 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)tiletext.c 3.5 1999/10/24 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 getline.c $Date$ $Revision$ */
+/* NetHack 3.5 getline.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 getline.c $Date: 2011/12/11 01:54:56 $ $Revision: 1.18 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 termcap.c $Date$ $Revision$ */
+/* NetHack 3.5 termcap.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 termcap.c $Date: 2009/05/06 10:59:19 $ $Revision: 1.13 $ */
/* SCCS Id: @(#)termcap.c 3.5 2007/12/12 */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 topl.c $Date$ $Revision$ */
+/* NetHack 3.5 topl.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 topl.c $Date: 2012/01/23 06:29:37 $ $Revision: 1.24 $ */
/* Copyright (c) Stichting Mathematisch Centrum, Amsterdam, 1985. */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 wintty.c $Date$ $Revision$ */
+/* NetHack 3.5 wintty.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 wintty.c $Date: 2012/01/22 06:27:09 $ $Revision: 1.66 $ */
/* Copyright (c) David Cohrs, 1991 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhaskyn.c $Date$ $Revision$ */
+/* NetHack 3.5 mhaskyn.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhaskyn.c $Date: 2009/05/06 10:59:46 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)mhaskyn.c 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhaskyn.h $Date$ $Revision$ */
+/* NetHack 3.5 mhaskyn.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhaskyn.h $Date: 2009/05/06 10:59:46 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)mhaskyn.h 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhdlg.c $Date$ $Revision$ */
+/* NetHack 3.5 mhdlg.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhdlg.c $Date: 2012/01/11 01:45:02 $ $Revision: 1.18 $ */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhdlg.h $Date$ $Revision$ */
+/* NetHack 3.5 mhdlg.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhdlg.h $Date: 2012/01/11 01:15:36 $ $Revision: 1.5 $ */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhfont.c $Date$ $Revision$ */
+/* NetHack 3.5 mhfont.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhfont.c $Date: 2009/05/06 10:59:46 $ $Revision: 1.17 $ */
/* SCCS Id: @(#)mhfont.c 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhfont.h $Date$ $Revision$ */
+/* NetHack 3.5 mhfont.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhfont.h $Date: 2009/05/06 10:59:46 $ $Revision: 1.8 $ */
/* SCCS Id: @(#)mhfont.h 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhinput.c $Date$ $Revision$ */
+/* NetHack 3.5 mhinput.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhinput.c $Date: 2009/05/06 10:59:48 $ $Revision: 1.7 $ */
/* SCCS Id: @(#)mhinput.c 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhinput.h $Date$ $Revision$ */
+/* NetHack 3.5 mhinput.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhinput.h $Date: 2009/05/06 10:59:49 $ $Revision: 1.6 $ */
/* SCCS Id: @(#)mhinput.h 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhmain.c $Date$ $Revision$ */
+/* NetHack 3.5 mhmain.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhmain.c $Date: 2012/01/11 01:53:44 $ $Revision: 1.49 $ */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhmain.h $Date$ $Revision$ */
+/* NetHack 3.5 mhmain.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhmain.h $Date: 2009/05/06 10:59:52 $ $Revision: 1.10 $ */
/* SCCS Id: @(#)mhmain.h 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhmap.c $Date$ $Revision$ */
+/* NetHack 3.5 mhmap.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhmap.c $Date: 2012/01/11 01:45:02 $ $Revision: 1.37 $ */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhmap.h $Date$ $Revision$ */
+/* NetHack 3.5 mhmap.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhmap.h $Date: 2009/05/06 10:59:56 $ $Revision: 1.10 $ */
/* SCCS Id: @(#)mhmap.h 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhmenu.c $Date$ $Revision$ */
+/* NetHack 3.5 mhmenu.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhmenu.c $Date: 2012/01/11 01:53:44 $ $Revision: 1.36 $ */
/* Copyright (c) Alex Kompel, 2002 */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhmenu.h $Date$ $Revision$ */
+/* NetHack 3.5 mhmenu.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhmenu.h $Date: 2009/05/06 11:00:00 $ $Revision: 1.4 $ */
/* SCCS Id: @(#)mhmenu.h 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhmsg.h $Date$ $Revision$ */
+/* NetHack 3.5 mhmsg.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhmsg.h $Date: 2009/05/06 11:00:00 $ $Revision: 1.9 $ */
/* SCCS Id: @(#)mhmsg.h 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhmsgwnd.c $Date$ $Revision$ */
+/* NetHack 3.5 mhmsgwnd.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhmsgwnd.c $Date: 2012/01/11 01:45:02 $ $Revision: 1.25 $ */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhmsgwnd.h $Date$ $Revision$ */
+/* NetHack 3.5 mhmsgwnd.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhmsgwnd.h $Date: 2009/05/06 11:00:10 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)mhmsgwnd.h 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhrip.c $Date$ $Revision$ */
+/* NetHack 3.5 mhrip.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhrip.c $Date: 2012/01/11 01:45:02 $ $Revision: 1.13 $ */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhrip.h $Date$ $Revision$ */
+/* NetHack 3.5 mhrip.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhrip.h $Date: 2009/05/06 11:00:15 $ $Revision: 1.6 $ */
/* SCCS Id: @(#)mhrip.h 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhsplash.c $Date$ $Revision$ */
+/* NetHack 3.5 mhsplash.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhsplash.c $Date: 2012/01/11 01:15:37 $ $Revision: 1.17 $ */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhstatus.c $Date$ $Revision$ */
+/* NetHack 3.5 mhstatus.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhstatus.c $Date: 2012/01/11 01:45:02 $ $Revision: 1.14 $ */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhstatus.h $Date$ $Revision$ */
+/* NetHack 3.5 mhstatus.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhstatus.h $Date: 2009/05/06 11:00:19 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)mhstatus.h 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhtext.c $Date$ $Revision$ */
+/* NetHack 3.5 mhtext.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhtext.c $Date: 2012/01/11 01:53:44 $ $Revision: 1.17 $ */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mhtext.h $Date$ $Revision$ */
+/* NetHack 3.5 mhtext.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mhtext.h $Date: 2009/05/06 11:00:26 $ $Revision: 1.5 $ */
/* SCCS Id: @(#)mhtext.h 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 mswproc.c $Date$ $Revision$ */
+/* NetHack 3.5 mswproc.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 mswproc.c $Date: 2012/01/24 04:26:33 $ $Revision: 1.71 $ */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 winMS.h $Date$ $Revision$ */
+/* NetHack 3.5 winMS.h $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 winMS.h $Date: 2012/01/24 04:26:33 $ $Revision: 1.28 $ */
/* SCCS Id: @(#)winMS.h 3.5 2005/01/23 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */
-/* NetHack 3.5 winhack.c $Date$ $Revision$ */
+/* NetHack 3.5 winhack.c $NHDT-Date$ $NHDT-Branch$:$NHDT-Revision$ */
+/* NetHack 3.5 winhack.c $Date: 2009/05/06 11:00:43 $ $Revision: 1.32 $ */
/* SCCS Id: @(#)winhack.c 3.5 2006/04/01 */
/* Copyright (C) 2001 by Alex Kompel */
/* NetHack may be freely redistributed. See license for details. */