Decompile language files

This commit is contained in:
Ryan Dwyer 2019-09-07 22:07:13 +10:00
parent c9dec5deac
commit 0de8b2ab59
275 changed files with 15642 additions and 35 deletions

141
Makefile
View File

@ -9,12 +9,6 @@ RELEASE=final
ROMID := $(REGION)-$(RELEASE)
E_DIR := extracted/$(ROMID)
B_DIR := build/$(ROMID)
SETUP_FILES := $(wildcard src/setup/*.c)
SETUP_H_FILES := $(wildcard src/include/*.h)
B_BIN_FILES := $(patsubst src/setup/%.c, $(B_DIR)/files/U%, $(SETUP_FILES))
E_BIN_FILES := $(patsubst src/setup/%.c, $(E_DIR)/files/U%, $(SETUP_FILES))
B_BINZ_FILES := $(patsubst src/setup/%.c, $(B_DIR)/files/U%Z, $(SETUP_FILES))
E_BINZ_FILES := $(patsubst src/setup/%.c, $(E_DIR)/files/U%Z, $(SETUP_FILES))
QEMU_IRIX := tools/irix/qemu-irix
IRIX_ROOT := tools/irix/root
@ -27,7 +21,7 @@ endif
CFLAGS := -Wo,-loopunroll,0 -Wab,-r4300_mul -non_shared -G 0 -Xcpluscomm -woff 819,820,852,821 -signed -I . -I include -mips2
default: $(B_BIN_FILES) $(B_DIR)/Uglobals
default: all
################################################################################
# Extract related
@ -35,42 +29,105 @@ default: $(B_BIN_FILES) $(B_DIR)/Uglobals
extract:
tools/extract $(ROMID)
################################################################################
# Test related
test: $(B_BIN_FILES)
@diff -q --exclude='A*' --exclude='C*' --exclude='G*' --exclude='L*' --exclude='P*' --exclude='*Z' --exclude=bgdata --exclude=ob $(E_DIR)/files $(B_DIR)/files
@cmp -b --ignore-initial=0x1be00 --bytes=0x4ff0 $(E_DIR)/Uglobals $(B_DIR)/Uglobals
testall:
REGION=ntsc RELEASE=final make test
REGION=ntsc RELEASE=1.0 make test
REGION=ntsc RELEASE=beta make test
REGION=pal RELEASE=final make test
REGION=pal RELEASE=beta make test
REGION=jap RELEASE=final make test
################################################################################
# Stage setup files
$(B_DIR)/files/%.o: src/setup/%.c $(SETUP_H_FILES)
mkdir -p $(B_DIR)/files
SETUP_C_FILES := $(wildcard src/setup/*.c)
SETUP_H_FILES := $(wildcard src/include/*.h)
B_SETUP_BIN_FILES := $(patsubst src/setup/%.c, $(B_DIR)/files/setup/U%.bin, $(SETUP_C_FILES))
E_SETUP_BIN_FILES := $(patsubst src/setup/%.c, $(E_DIR)/files/setup/U%.bin, $(SETUP_C_FILES))
B_SETUP_BINZ_FILES := $(patsubst src/setup/%.c, $(B_DIR)/files/U%Z, $(SETUP_C_FILES))
E_SETUP_BINZ_FILES := $(patsubst src/setup/%.c, $(E_DIR)/files/U%Z, $(SETUP_C_FILES))
setup: $(B_SETUP_BINZ_FILES)
$(B_DIR)/files/setup/%.o: src/setup/%.c $(SETUP_H_FILES)
mkdir -p $(B_DIR)/files/setup
$(QEMU_IRIX) -silent -L $(IRIX_ROOT) $(IRIX_ROOT)/usr/bin/cc -c $(CFLAGS) -o $@ -O2 $<
$(B_DIR)/files/%.elf: $(B_DIR)/files/%.o
$(B_DIR)/files/setup/%.elf: $(B_DIR)/files/setup/%.o
cp $< build/setup.tmp.o
$(TOOLCHAIN)-ld -T setup.ld -o $@
rm -f build/setup.tmp.o
$(B_DIR)/files/U%: $(B_DIR)/files/%.elf
$(B_DIR)/files/setup/U%.bin: $(B_DIR)/files/setup/%.elf
$(TOOLCHAIN)-objcopy $< $@ -O binary
$(B_DIR)/files/U%Z: $(B_DIR)/files/U%
$(B_DIR)/files/U%Z: $(B_DIR)/files/setup/U%.bin
tools/rarezip $< > $@
################################################################################
# Lang files
LANG_C_EJP_FILES := $(wildcard src/lang/*E.c) $(wildcard src/lang/*J.c) $(wildcard src/lang/*P.c)
LANG_C_STR_FILES := $(wildcard src/lang/*_str.c)
B_LANG_BIN_FILES := $(patsubst src/lang/%.c, $(B_DIR)/files/lang/L%.bin, $(LANG_C_EJP_FILES)) \
$(patsubst src/lang/%.c, $(B_DIR)/files/lang/L%_f.bin, $(LANG_C_STR_FILES)) \
$(patsubst src/lang/%.c, $(B_DIR)/files/lang/L%_g.bin, $(LANG_C_STR_FILES)) \
$(patsubst src/lang/%.c, $(B_DIR)/files/lang/L%_i.bin, $(LANG_C_STR_FILES)) \
$(patsubst src/lang/%.c, $(B_DIR)/files/lang/L%_s.bin, $(LANG_C_STR_FILES))
B_LANG_BINZ_FILES := $(patsubst src/lang/%.c, $(B_DIR)/files/L%, $(LANG_C_EJP_FILES)) \
$(patsubst src/lang/%.c, $(B_DIR)/files/L%_fZ, $(LANG_C_STR_FILES)) \
$(patsubst src/lang/%.c, $(B_DIR)/files/L%_gZ, $(LANG_C_STR_FILES)) \
$(patsubst src/lang/%.c, $(B_DIR)/files/L%_iZ, $(LANG_C_STR_FILES)) \
$(patsubst src/lang/%.c, $(B_DIR)/files/L%_sZ, $(LANG_C_STR_FILES))
E_LANG_BIN_FILES := $(patsubst $(B_DIR), $(E_DIR), $(B_LANG_BIN_FILES))
E_LANG_BINZ_FILES := $(patsubst $(B_DIR), $(E_DIR), $(B_LANG_BINZ_FILES))
lang: $(B_LANG_BINZ_FILES)
$(B_DIR)/files/lang/%.o: src/lang/%.c
mkdir -p $(B_DIR)/files/lang
$(QEMU_IRIX) -silent -L $(IRIX_ROOT) $(IRIX_ROOT)/usr/bin/cc -c $(CFLAGS) -o $@ -O2 $<
$(B_DIR)/files/lang/%.elf: $(B_DIR)/files/lang/%.o
cp $< build/setup.tmp.o
$(TOOLCHAIN)-ld -T setup.ld -o $@
rm -f build/setup.tmp.o
$(B_DIR)/files/lang/L%.bin: $(B_DIR)/files/lang/%.elf
$(TOOLCHAIN)-objcopy $< $@ -O binary
# Specific E/J/P and str_f/g/i/s
$(B_DIR)/files/lang/%E.bin: $(B_DIR)/files/lang/%E.elf
$(TOOLCHAIN)-objcopy $< $@ -O binary
$(B_DIR)/files/lang/%J.bin: $(B_DIR)/files/lang/%J.elf
$(TOOLCHAIN)-objcopy $< $@ -O binary
$(B_DIR)/files/lang/%P.bin: $(B_DIR)/files/lang/%P.elf
$(TOOLCHAIN)-objcopy $< $@ -O binary
$(B_DIR)/files/lang/L%_str_f.bin: $(B_DIR)/files/lang/%_str.elf
$(TOOLCHAIN)-objcopy $< $@ -O binary
$(B_DIR)/files/lang/L%_str_g.bin: $(B_DIR)/files/lang/L%_str_f.bin
cp $< $@
$(B_DIR)/files/lang/L%_str_i.bin: $(B_DIR)/files/lang/L%_str_f.bin
cp $< $@
$(B_DIR)/files/lang/L%_str_s.bin: $(B_DIR)/files/lang/L%_str_f.bin
cp $< $@
# End specific
$(B_DIR)/files/L%E: $(B_DIR)/files/lang/L%E.bin
tools/rarezip $< > $@
$(B_DIR)/files/L%J: $(B_DIR)/files/lang/L%J.bin
tools/rarezip $< > $@
$(B_DIR)/files/L%P: $(B_DIR)/files/lang/L%P.bin
tools/rarezip $< > $@
$(B_DIR)/files/L%Z: $(B_DIR)/files/lang/L%.bin
tools/rarezip $< > $@
################################################################################
# Globals file
globals: $(B_DIR)/Uglobals
$(B_DIR)/globals.o: src/globals.c $(SETUP_H_FILES)
mkdir -p $(B_DIR)
$(QEMU_IRIX) -silent -L $(IRIX_ROOT) $(IRIX_ROOT)/usr/bin/cc -c $(CFLAGS) -o $@ -O2 $<
@ -83,10 +140,38 @@ $(B_DIR)/globals.elf: $(B_DIR)/globals.o
$(B_DIR)/Uglobals: $(B_DIR)/globals.elf
$(TOOLCHAIN)-objcopy $< $@ -O binary
################################################################################
# Test related
test: $(B_SETUP_BINZ_FILES) $(B_LANG_BINZ_FILES)
@rm -f $(B_DIR)/files/lang/*.{elf,o}
@diff -rq --exclude='*.bin' \
--exclude=chrs \
--exclude=guns \
--exclude=props \
--exclude='A*' \
--exclude='C*' \
--exclude='G*' \
--exclude='P*' \
--exclude=bgdata \
--exclude=ob \
$(E_DIR)/files $(B_DIR)/files
@cmp -b --ignore-initial=0x1be00 --bytes=0x4ff0 $(E_DIR)/Uglobals $(B_DIR)/Uglobals
testall:
REGION=ntsc RELEASE=final make test
REGION=ntsc RELEASE=1.0 make test
REGION=ntsc RELEASE=beta make test
REGION=pal RELEASE=final make test
REGION=pal RELEASE=beta make test
REGION=jap RELEASE=final make test
################################################################################
# Miscellaneous
rom: $(B_BINZ_FILES)
all: setup lang globals
rom: $(B_SETUP_BINZ_FILES)
tools/inject pd.$(ROMID).z64
clean:

View File

@ -1,6 +1,6 @@
# Perfect Dark Decompilation (WIP)
This repository contains a work-in-progress decompilation of Perfect Dark for the Nintendo 64. So far only the stage setup files are decompiled.
This repository contains a work-in-progress decompilation of Perfect Dark for the Nintendo 64. So far only the stage setup files and lang files are decompiled.
## I have no idea what you're talking about

116
src/lang/ameE.c Normal file
View File

@ -0,0 +1,116 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n",
/*0x01*/ "LUCERNE TOWER\n",
/*0x02*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n",
/*0x03*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n",
/*0x04*/ " NULL3",
/*0x05*/ " NULL4",
/*0x06*/ " NULL5",
/*0x07*/ " NULL6",
/*0x08*/ " NULL7",
/*0x09*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.",
/*0x0a*/ "0230 Hours 15 AUG 2023\n",
/*0x0b*/ "Obtain De Vries' necklace.\n",
/*0x0c*/ "Cassandra De Vries'\n",
/*0x0d*/ "Necklace\n",
/*0x0e*/ "De Vries' necklace\n",
/*0x0f*/ "Picked up De Vries' necklace.\n",
/*0x10*/ "Disable internal security hub\n",
/*0x11*/ "Obtain keycode necklace\n",
/*0x12*/ "Download project files\n",
/*0x13*/ "Disable external comms hub\n",
/*0x14*/ "Gain entrance to laboratory\n",
/*0x15*/ "Who are you and what are you doing here?\n",
/*0x16*/ "Look out! She's got a gun.\n",
/*0x17*/ "You won't shoot me, foolish child!\n",
/*0x18*/ "Don't you know who I am?\n",
/*0x19*/ "Let's see how you deal with security.\n",
/*0x1a*/ "PLEASE!!!! Don't kill me!\n",
/*0x1b*/ "If I were you, I'd leave... NOW!\n",
/*0x1c*/ "Badly placed ECM Mine.\n",
/*0x1d*/ "ECM Mine placed correctly.\n",
/*0x1e*/ "MISSION FAILED - objectives incomplete.\n",
/*0x1f*/ " MISSION SUCCESSFUL \n",
/*0x20*/ "CANNOT complete all objectives.\n",
/*0x21*/ "Time to erase those files.\n",
/*0x22*/ "Computer executive erased.\n",
/*0x23*/ "I'll do what you want!\n",
/*0x24*/ "HELP - Intruder!\n",
/*0x25*/ "You talk too much.\n",
/*0x26*/ "HELP, HELP!\n",
/*0x27*/ "I'll do what you want...\n",
/*0x28*/ "Logging on now...\n",
/*0x29*/ "Okay, I'm in...\n",
/*0x2a*/ "Goodbye, Dr. Caroll.\n",
/*0x2b*/ "You've written your last bug, traitor!\n",
/*0x2c*/ "File download initiated.\n",
/*0x2d*/ "File download completed.\n",
/*0x2e*/ "ACCESS DENIED - password needed.\n",
/*0x2f*/ "Door unlocked.\n",
/*0x30*/ "DOH!\n",
/*0x31*/ "Unable to download - Data Uplink needed.\n",
/*0x32*/ "LIGHTS NOW ON\n",
/*0x33*/ "LIGHTS NOW OFF\n",
/*0x34*/ "Erase Dr. Caroll conversation...\n",
/*0x35*/ "Don't shoot, don't shoot!\n",
/*0x36*/ "Critical mission object destroyed.\n",
/*0x37*/ "Unacceptable civilian casualties.\n",
/*0x38*/ "MISSION FAILED \n - objectives cannot be completed.\n",
/*0x39*/ "Critical mission personnel killed.\n",
/*0x3a*/ "Obtain ECM Mines.\n",
/*0x3b*/ "Dr. Caroll's\n",
/*0x3c*/ "ECM Mine\n",
/*0x3d*/ "An ECM Mine\n",
/*0x3e*/ "Picked up an ECM Mine.\n",
/*0x3f*/ "Obtain Data Uplink.\n",
/*0x40*/ "\n",
/*0x41*/ "Data Uplink\n",
/*0x42*/ "A Data Uplink\n",
/*0x43*/ "Picked up a Data Uplink.\n",
/*0x44*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n",
/*0x45*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n",
/*0x46*/ "I'll begin at once. Goodbye.\n",
/*0x47*/ "Move it!\n",
/*0x48*/ "I've got a password problem, and you're \nthe man to help me with it.\n",
/*0x49*/ "Don't shoot, don't shoot!\n",
/*0x4a*/ "Datalink broken - connection terminated.\n",
/*0x4b*/ "Datalink error - incomplete file download.\n",
/*0x4c*/ "Internal security system temporarily disabled.\n",
/*0x4d*/ "External communications hub disabled.\n",
/*0x4e*/ "Laboratory lift located.\n",
/*0x4f*/ "Security... Help me!\n",
/*0x50*/ "ECM Mine needed to disable security hub.\n",
/*0x51*/ "ECM Mine needed to disable comms hub.\n",
/*0x52*/ "Dummy\n",
/*0x53*/ "How dare you disturb me!\n",
/*0x54*/ "You will regret this intrusion, girl!\n",
/*0x55*/ "If I were you, I'd leave...NOW!\n",
/*0x56*/ "Please don't kill me!\n",
/*0x57*/ "Don't shoot!\n",
/*0x58*/ "Obtain CamSpy.\n",
/*0x59*/ "Dr. Caroll's\n",
/*0x5a*/ "CamSpy\n",
/*0x5b*/ "A CamSpy\n",
/*0x5c*/ "Picked up a CamSpy.\n",
/*0x5d*/ "We're getting a positive reading - \nthe internal comms hub is nearby.\n",
/*0x5e*/ "You're on the same floor as \nCassandra's office.\n",
/*0x5f*/ "The other hub has got to be in the \nSecurity Room.\n",
/*0x60*/ "The basement elevator must be around \nthere somewhere.\n",
/*0x61*/ "Security system is now back online.\n",
/*0x62*/ "You vandal, you've broken it!\n",
/*0x63*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n",
/*0x64*/ "Why the big hurry?\n",
/*0x65*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n",
/*0x66*/ "Are they all expendable?\n",
/*0x67*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive... If you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n",
/*0x68*/ "What's the target location?\n",
/*0x69*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n",
/*0x6a*/ "How will I recognize him?\n",
/*0x6b*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n",
/*0x6c*/ "Right, I'm in...\n",
/*0x6d*/ "I...I'm logging on now.\n",
/*0x6e*/ NULL,
/*0x6f*/ NULL,
};

116
src/lang/ameJ.c Normal file
View File

@ -0,0 +1,116 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the Communication blackout by placing another ECM mine on the equipment in the Security room at the base of the building, this will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown but it should be found somewhere on the foyer level.\n\nEND\n",
/*0x01*/ "LUCERNE TOWER\n",
/*0x02*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the Communication blackout by placing another ECM mine on the equipment in the Security room at the base of the building, this will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown but it should be found somewhere on the foyer level.\n\nEND\n",
/*0x03*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown but it should be found somewhere on the foyer level.\n\nEND\n",
/*0x04*/ " NULL3",
/*0x05*/ " NULL4",
/*0x06*/ " NULL5",
/*0x07*/ " NULL6",
/*0x08*/ " NULL7",
/*0x09*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.",
/*0x0a*/ "02:30am 15 AUG 2023\n",
/*0x0b*/ "Obtain De Vries' necklace\n",
/*0x0c*/ "Cassandra De Vries'\n",
/*0x0d*/ "Necklace\n",
/*0x0e*/ "De Vries' necklace\n",
/*0x0f*/ "Picked up De Vries' necklace.\n",
/*0x10*/ "Disable Internal Security Hub\n",
/*0x11*/ "Obtain Keycode Necklace\n",
/*0x12*/ "Download Project Files\n",
/*0x13*/ "Disable External Comms Hub\n",
/*0x14*/ "Gain Entrance to Laboratory\n",
/*0x15*/ "Who are you and what are you doing here?\n",
/*0x16*/ "Look out! She's got a gun.\n",
/*0x17*/ "You won't shoot me foolish child!\n",
/*0x18*/ "Don't you know who I am?\n",
/*0x19*/ "Lets see how you deal with security.\n",
/*0x1a*/ "PLEASE!!!! Dont kill me!\n",
/*0x1b*/ "If I were you, I'd leave.... NOW!\n",
/*0x1c*/ "Badly placed ECM mine\n",
/*0x1d*/ "ECM mine placed correctly\n",
/*0x1e*/ "MISSION FAILED - Objectives Incomplete\n",
/*0x1f*/ " MISSION SUCCESSFUL \n",
/*0x20*/ "CANNOT complete all objectives\n",
/*0x21*/ "Time to erase those files.\n",
/*0x22*/ "Computer Executive Erased\n",
/*0x23*/ "I'll do what you want!\n",
/*0x24*/ "HELP - Intruder!\n",
/*0x25*/ "You talk too much\n",
/*0x26*/ "HELP, HELP!\n",
/*0x27*/ "I'll do what you want...\n",
/*0x28*/ "Logging on now...\n",
/*0x29*/ "Okay, I'm in...\n",
/*0x2a*/ "Goodbye Dr Caroll\n",
/*0x2b*/ "You've written your last bug traitor\n",
/*0x2c*/ "File Download Initiated\n",
/*0x2d*/ "File Download Completed\n",
/*0x2e*/ "ACCESS DENIED - Password Needed\n",
/*0x2f*/ "Door Unlocked\n",
/*0x30*/ "DOH!\n",
/*0x31*/ "Unable to Download - Data Uplink Needed\n",
/*0x32*/ "LIGHTS NOW ON\n",
/*0x33*/ "LIGHTS NOW OFF\n",
/*0x34*/ "Erase Dr Caroll Conversation...\n",
/*0x35*/ "Don't Shoot, Don't Shoot!\n",
/*0x36*/ "Critical Mission Object Destroyed \n",
/*0x37*/ "Unacceptable civilian casualties\n",
/*0x38*/ "MISSION FAILED \n - Objectives cannot be completed\n",
/*0x39*/ "Critical Mission Personnel Killed \n",
/*0x3a*/ "Obtain ECM Mines\n",
/*0x3b*/ "Dr Carolls\n",
/*0x3c*/ "ECM Mine\n",
/*0x3d*/ "An ECM Mine\n",
/*0x3e*/ "Picked up an ECM Mine\n",
/*0x3f*/ "Obtain Data Uplink\n",
/*0x40*/ "\n",
/*0x41*/ "Data Uplink\n",
/*0x42*/ "A Data Uplink\n",
/*0x43*/ "Picked up a Data Uplink\n",
/*0x44*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n",
/*0x45*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n",
/*0x46*/ "I'll begin at once. Goodbye.\n",
/*0x47*/ "Move It!\n",
/*0x48*/ "I've got a password problem and you're\nthe man to help me with it\n",
/*0x49*/ "Don't Shoot, Dont Shoot!\n",
/*0x4a*/ "Datalink Broken - Connection Terminated\n",
/*0x4b*/ "Datalink Error - Incomplete File Download\n",
/*0x4c*/ "Internal Security System Temporarily Disabled\n",
/*0x4d*/ "External Communications Hub Disabled\n",
/*0x4e*/ "Laboratory Lift Located\n",
/*0x4f*/ "Security... Help me!\n",
/*0x50*/ "ECM Mine Needed To Disable Security Hub\n",
/*0x51*/ "ECM Mine Needed To Disable Comms Hub\n",
/*0x52*/ "Dummy\n",
/*0x53*/ "How dare you disturb me!\n",
/*0x54*/ "You will regret this intrusion, girl\n",
/*0x55*/ "If I were you I'd leave....NOW!\n",
/*0x56*/ "Please don't kill me\n",
/*0x57*/ "Don't shoot!\n",
/*0x58*/ "Obtain Eye Spy\n",
/*0x59*/ "Dr Carolls\n",
/*0x5a*/ "Eye Spy\n",
/*0x5b*/ "An Eye Spy\n",
/*0x5c*/ "Picked up an Eye Spy\n",
/*0x5d*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n",
/*0x5e*/ "You're on the same floor as \nCassandra's office.\n",
/*0x5f*/ "The other hub has got to be in the\nsecurity room.\n",
/*0x60*/ "The basement elevator must be around\nthere somewhere.\n",
/*0x61*/ "Security System Has Been Brought Back Online\n",
/*0x62*/ "You Vandal, You've Broken It!\n",
/*0x63*/ "2023 AD, 22:14 Lucerne Tower - Datadyne HQ\n",
/*0x64*/ "Why the big hurry?",
/*0x65*/ "If Dr. Caroll is not extracted tonight, dataDyne will put him through mind conditioning, and we'll lose our best chance of finding out what dataDyne are up to.",
/*0x66*/ "Are they all expendable?",
/*0x67*/ "Don't joke! You have to be careful, Joanna. Code keys will only operate while the owner is alive; if you kill them, the key is useless. Armed guards are a different matter, of course.",
/*0x68*/ "What's the target location?",
/*0x69*/ "Work your way down the building to the ground level. Dr. Caroll will be in a research lab somewhere in the underground facility.",
/*0x6a*/ "How will I recognise him?",
/*0x6b*/ "We don't have an image record, and we can't find any official files. all we have is the name. Good luck, Perfect Dark.",
/*0x6c*/ NULL,
/*0x6d*/ NULL,
/*0x6e*/ NULL,
/*0x6f*/ NULL,
};

116
src/lang/ameP.c Normal file
View File

@ -0,0 +1,116 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n",
/*0x01*/ "LUCERNE TOWER\n",
/*0x02*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n",
/*0x03*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n",
/*0x04*/ " NULL3",
/*0x05*/ " NULL4",
/*0x06*/ " NULL5",
/*0x07*/ " NULL6",
/*0x08*/ " NULL7",
/*0x09*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.",
/*0x0a*/ "0230 Hours 15 AUG 2023\n",
/*0x0b*/ "Obtain De Vries' necklace.\n",
/*0x0c*/ "Cassandra De Vries'\n",
/*0x0d*/ "Necklace\n",
/*0x0e*/ "De Vries' necklace\n",
/*0x0f*/ "Picked up De Vries' necklace.\n",
/*0x10*/ "Disable internal security hub\n",
/*0x11*/ "Obtain keycode necklace\n",
/*0x12*/ "Download project files\n",
/*0x13*/ "Disable external comms hub\n",
/*0x14*/ "Gain entrance to laboratory\n",
/*0x15*/ "Who are you and what are you doing here?\n",
/*0x16*/ "Look out! She's got a gun.\n",
/*0x17*/ "You won't shoot me, foolish child!\n",
/*0x18*/ "Don't you know who I am?\n",
/*0x19*/ "Let's see how you deal with security.\n",
/*0x1a*/ "PLEASE!!!! Don't kill me!\n",
/*0x1b*/ "If I were you, I'd leave... NOW!\n",
/*0x1c*/ "Badly placed ECM Mine.\n",
/*0x1d*/ "ECM Mine placed correctly.\n",
/*0x1e*/ "MISSION FAILED - objectives incomplete.\n",
/*0x1f*/ " MISSION SUCCESSFUL \n",
/*0x20*/ "CANNOT complete all objectives.\n",
/*0x21*/ "Time to erase those files.\n",
/*0x22*/ "Computer executive erased.\n",
/*0x23*/ "I'll do what you want!\n",
/*0x24*/ "HELP - Intruder!\n",
/*0x25*/ "You talk too much.\n",
/*0x26*/ "HELP, HELP!\n",
/*0x27*/ "I'll do what you want...\n",
/*0x28*/ "Logging on now...\n",
/*0x29*/ "Okay, I'm in...\n",
/*0x2a*/ "Goodbye, Dr. Caroll.\n",
/*0x2b*/ "You've written your last bug, traitor!\n",
/*0x2c*/ "File download initiated.\n",
/*0x2d*/ "File download completed.\n",
/*0x2e*/ "ACCESS DENIED - password needed.\n",
/*0x2f*/ "Door unlocked.\n",
/*0x30*/ "DOH!\n",
/*0x31*/ "Unable to download - Data Uplink needed.\n",
/*0x32*/ "LIGHTS NOW ON\n",
/*0x33*/ "LIGHTS NOW OFF\n",
/*0x34*/ "Erase Dr. Caroll conversation...\n",
/*0x35*/ "Don't shoot, don't shoot!\n",
/*0x36*/ "Critical mission object destroyed.\n",
/*0x37*/ "Unacceptable civilian casualties.\n",
/*0x38*/ "MISSION FAILED \n - objectives cannot be completed.\n",
/*0x39*/ "Critical mission personnel killed.\n",
/*0x3a*/ "Obtain ECM Mines.\n",
/*0x3b*/ "Dr. Caroll's\n",
/*0x3c*/ "ECM Mine\n",
/*0x3d*/ "An ECM Mine\n",
/*0x3e*/ "Picked up an ECM Mine.\n",
/*0x3f*/ "Obtain Data Uplink.\n",
/*0x40*/ "\n",
/*0x41*/ "Data Uplink\n",
/*0x42*/ "A Data Uplink\n",
/*0x43*/ "Picked up a Data Uplink.\n",
/*0x44*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n",
/*0x45*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n",
/*0x46*/ "I'll begin at once. Goodbye.\n",
/*0x47*/ "Move it!\n",
/*0x48*/ "I've got a password problem, and you're\nthe man to help me with it.\n",
/*0x49*/ "Don't shoot, don't shoot!\n",
/*0x4a*/ "Datalink broken - connection terminated.\n",
/*0x4b*/ "Datalink error - incomplete file download.\n",
/*0x4c*/ "Internal security system temporarily disabled.\n",
/*0x4d*/ "External communications hub disabled.\n",
/*0x4e*/ "Laboratory lift located.\n",
/*0x4f*/ "Security... Help me!\n",
/*0x50*/ "ECM Mine needed to disable security hub.\n",
/*0x51*/ "ECM Mine needed to disable comms hub.\n",
/*0x52*/ "Dummy\n",
/*0x53*/ "How dare you disturb me!\n",
/*0x54*/ "You will regret this intrusion, girl!\n",
/*0x55*/ "If I were you, I'd leave...NOW!\n",
/*0x56*/ "Please don't kill me!\n",
/*0x57*/ "Don't shoot!\n",
/*0x58*/ "Obtain CamSpy.\n",
/*0x59*/ "Dr. Caroll's\n",
/*0x5a*/ "CamSpy\n",
/*0x5b*/ "A CamSpy\n",
/*0x5c*/ "Picked up a CamSpy.\n",
/*0x5d*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n",
/*0x5e*/ "You're on the same floor as \nCassandra's office.\n",
/*0x5f*/ "The other hub has got to be in the\nSecurity Room.\n",
/*0x60*/ "The basement elevator must be around\nthere somewhere.\n",
/*0x61*/ "Security system is now back online.\n",
/*0x62*/ "You vandal, you've broken it!\n",
/*0x63*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n",
/*0x64*/ "Why the big hurry?\n",
/*0x65*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n",
/*0x66*/ "Are they all expendable?\n",
/*0x67*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive; if you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n",
/*0x68*/ "What's the target location?\n",
/*0x69*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n",
/*0x6a*/ "How will I recognize him?\n",
/*0x6b*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n",
/*0x6c*/ "Right, I'm in...\n",
/*0x6d*/ "I...I'm logging on now.\n",
/*0x6e*/ NULL,
/*0x6f*/ NULL,
};

116
src/lang/ame_str.c Normal file
View File

@ -0,0 +1,116 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n",
/*0x01*/ "LUCERNE TOWER\n",
/*0x02*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n",
/*0x03*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n",
/*0x04*/ " NULL3",
/*0x05*/ " NULL4",
/*0x06*/ " NULL5",
/*0x07*/ " NULL6",
/*0x08*/ " NULL7",
/*0x09*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.",
/*0x0a*/ "0230 Hours 15 AUG 2023\n",
/*0x0b*/ "Obtain De Vries' necklace.\n",
/*0x0c*/ "Cassandra De Vries'\n",
/*0x0d*/ "Necklace\n",
/*0x0e*/ "De Vries' necklace\n",
/*0x0f*/ "Picked up De Vries' necklace.\n",
/*0x10*/ "Disable internal security hub\n",
/*0x11*/ "Obtain keycode necklace\n",
/*0x12*/ "Download project files\n",
/*0x13*/ "Disable external comms hub\n",
/*0x14*/ "Gain entrance to laboratory\n",
/*0x15*/ "Who are you and what are you doing here?\n",
/*0x16*/ "Look out! She's got a gun.\n",
/*0x17*/ "You won't shoot me, foolish child!\n",
/*0x18*/ "Don't you know who I am?\n",
/*0x19*/ "Let's see how you deal with security.\n",
/*0x1a*/ "PLEASE!!!! Don't kill me!\n",
/*0x1b*/ "If I were you, I'd leave... NOW!\n",
/*0x1c*/ "Badly placed ECM Mine.\n",
/*0x1d*/ "ECM Mine placed correctly.\n",
/*0x1e*/ "MISSION FAILED - objectives incomplete.\n",
/*0x1f*/ " MISSION SUCCESSFUL \n",
/*0x20*/ "CANNOT complete all objectives.\n",
/*0x21*/ "Time to erase those files.\n",
/*0x22*/ "Computer executive erased.\n",
/*0x23*/ "I'll do what you want!\n",
/*0x24*/ "HELP - Intruder!\n",
/*0x25*/ "You talk too much.\n",
/*0x26*/ "HELP, HELP!\n",
/*0x27*/ "I'll do what you want...\n",
/*0x28*/ "Logging on now...\n",
/*0x29*/ "Okay, I'm in...\n",
/*0x2a*/ "Goodbye, Dr. Caroll.\n",
/*0x2b*/ "You've written your last bug, traitor!\n",
/*0x2c*/ "File download initiated.\n",
/*0x2d*/ "File download completed.\n",
/*0x2e*/ "ACCESS DENIED - password needed.\n",
/*0x2f*/ "Door unlocked.\n",
/*0x30*/ "DOH!\n",
/*0x31*/ "Unable to download - Data Uplink needed.\n",
/*0x32*/ "LIGHTS NOW ON\n",
/*0x33*/ "LIGHTS NOW OFF\n",
/*0x34*/ "Erase Dr. Caroll conversation...\n",
/*0x35*/ "Don't shoot, don't shoot!\n",
/*0x36*/ "Critical mission object destroyed.\n",
/*0x37*/ "Unacceptable civilian casualties.\n",
/*0x38*/ "MISSION FAILED \n - objectives cannot be completed.\n",
/*0x39*/ "Critical mission personnel killed.\n",
/*0x3a*/ "Obtain ECM Mines.\n",
/*0x3b*/ "Dr. Caroll's\n",
/*0x3c*/ "ECM Mine\n",
/*0x3d*/ "An ECM Mine\n",
/*0x3e*/ "Picked up an ECM Mine.\n",
/*0x3f*/ "Obtain Data Uplink.\n",
/*0x40*/ "\n",
/*0x41*/ "Data Uplink\n",
/*0x42*/ "A Data Uplink\n",
/*0x43*/ "Picked up a Data Uplink.\n",
/*0x44*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n",
/*0x45*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n",
/*0x46*/ "I'll begin at once. Goodbye.\n",
/*0x47*/ "Move it!\n",
/*0x48*/ "I've got a password problem, and you're\nthe man to help me with it.\n",
/*0x49*/ "Don't shoot, don't shoot!\n",
/*0x4a*/ "Datalink broken - connection terminated.\n",
/*0x4b*/ "Datalink error - incomplete file download.\n",
/*0x4c*/ "Internal security system temporarily disabled.\n",
/*0x4d*/ "External communications hub disabled.\n",
/*0x4e*/ "Laboratory lift located.\n",
/*0x4f*/ "Security... Help me!\n",
/*0x50*/ "ECM Mine needed to disable security hub.\n",
/*0x51*/ "ECM Mine needed to disable comms hub.\n",
/*0x52*/ "Dummy\n",
/*0x53*/ "How dare you disturb me!\n",
/*0x54*/ "You will regret this intrusion, girl!\n",
/*0x55*/ "If I were you, I'd leave...NOW!\n",
/*0x56*/ "Please don't kill me!\n",
/*0x57*/ "Don't shoot!\n",
/*0x58*/ "Obtain CamSpy.\n",
/*0x59*/ "Dr. Caroll's\n",
/*0x5a*/ "CamSpy\n",
/*0x5b*/ "A CamSpy\n",
/*0x5c*/ "Picked up a CamSpy.\n",
/*0x5d*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n",
/*0x5e*/ "You're on the same floor as \nCassandra's office.\n",
/*0x5f*/ "The other hub has got to be in the\nSecurity Room.\n",
/*0x60*/ "The basement elevator must be around\nthere somewhere.\n",
/*0x61*/ "Security system is now back online.\n",
/*0x62*/ "You vandal, you've broken it!\n",
/*0x63*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n",
/*0x64*/ "Why the big hurry?\n",
/*0x65*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n",
/*0x66*/ "Are they all expendable?\n",
/*0x67*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive; if you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n",
/*0x68*/ "What's the target location?\n",
/*0x69*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n",
/*0x6a*/ "How will I recognize him?\n",
/*0x6b*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n",
/*0x6c*/ "Right, I'm in...\n",
/*0x6d*/ "I...I'm logging on now.\n",
/*0x6e*/ NULL,
/*0x6f*/ NULL,
};

3
src/lang/archE.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/archJ.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/archP.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/arch_str.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/arecE.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/arecJ.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/arecP.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/arec_str.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

80
src/lang/arkE.c Normal file
View File

@ -0,0 +1,80 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n",
/*0x01*/ "LUCERNE TOWER\n",
/*0x02*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n",
/*0x03*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n",
/*0x04*/ NULL,
/*0x05*/ NULL,
/*0x06*/ NULL,
/*0x07*/ NULL,
/*0x08*/ NULL,
/*0x09*/ "Access foyer elevator\n",
/*0x0a*/ "Reactivate office elevator\n",
/*0x0b*/ "Destroy dataDyne hovercopter\n",
/*0x0c*/ "Defeat Cassandra's bodyguards\n",
/*0x0d*/ "Rendezvous at helipad\n",
/*0x0e*/ "Accessing elevator controls...\n",
/*0x0f*/ "LIGHTS ARE NOW ON!\n",
/*0x10*/ "Dr. Caroll has been killed!\n",
/*0x11*/ "Dr. Caroll is under attack!\n",
/*0x12*/ "Dr. Caroll has been damaged!\n",
/*0x13*/ "Too late! She's here...\n",
/*0x14*/ "You've become quite an annoyance...\n",
/*0x15*/ "Good night, Ms. Dark.\n",
/*0x16*/ "LIGHTS NOW ON\n",
/*0x17*/ "LIGHTS NOW OFF\n",
/*0x18*/ "MISSION FAILED\n",
/*0x19*/ "MISSION SUCCESSFUL\n",
/*0x1a*/ "Helichopper warning goes here.\n",
/*0x1b*/ "Obtain Night Vision.\n",
/*0x1c*/ "Cassandra De Vries'\n",
/*0x1d*/ "Night Vision\n",
/*0x1e*/ "Night Vision\n",
/*0x1f*/ "Picked up Night Vision.\n",
/*0x20*/ "We meet again, girl!\n",
/*0x21*/ "Foyer elevator accessed.\n",
/*0x22*/ "Office elevator door has been unlocked.\n",
/*0x23*/ "DataDyne Hovercopter eliminated.\n",
/*0x24*/ "Cassandra's bodyguards have been defeated.\n",
/*0x25*/ "That's not how it goes.\n",
/*0x26*/ "Yes, it is.\n",
/*0x27*/ "Give it to me - you're doing it wrong.\n",
/*0x28*/ "Stop annoying me.\n",
/*0x29*/ "Will you just hurry up!\n",
/*0x2a*/ "Oh, no...too late.\n",
/*0x2b*/ "She's here...\n",
/*0x2c*/ "Get her!\n",
/*0x2d*/ "Critical mission object destroyed. \n",
/*0x2e*/ "Obtain CamSpy.\n",
/*0x2f*/ "Dr. Caroll's\n",
/*0x30*/ "CamSpy\n",
/*0x31*/ "A CamSpy\n",
/*0x32*/ "Picked up a CamSpy.\n",
/*0x33*/ "They've locked down the ground floor - \nget to the elevator!\n",
/*0x34*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n",
/*0x35*/ "I can't leave any bodyguards standing.\n",
/*0x36*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n",
/*0x37*/ "Obtain alpha key card.\n",
/*0x38*/ "Guard's\n",
/*0x39*/ "Office key card\n",
/*0x3a*/ "Office key card\n",
/*0x3b*/ "Picked up Cassandra's office key card.\n",
/*0x3c*/ "Sound the alarm - she's here!\n",
/*0x3d*/ "Lights out!\n",
/*0x3e*/ "What the...?\n",
/*0x3f*/ "Going somewhere?\n",
/*0x40*/ "Something I can do for you, old woman?\n",
/*0x41*/ "Return our sapient immediately! You don't \nknow what you're doing.\n",
/*0x42*/ "Yes I do. I'm leaving.\n",
/*0x43*/ "One more chance! Give it back, and you \ncould come and work for me.\n",
/*0x44*/ "Sorry! Gotta shoot.\n",
/*0x45*/ "You must get the sapient back. We cannot \nproceed without it.\n",
/*0x46*/ "I know that!\n",
/*0x47*/ "I also know who to talk to... \nMr. Carrington.\n",
/*0x48*/ "Elevator door is inactive on this floor.\n",
/*0x49*/ NULL,
/*0x4a*/ NULL,
/*0x4b*/ NULL,
};

80
src/lang/arkJ.c Normal file
View File

@ -0,0 +1,80 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nThe alarm has been given and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return To Helipad For Evac\n\nGet to the Helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n",
/*0x01*/ "LUCERNE TOWER\n",
/*0x02*/ "|Background - \n\nThe alarm has been given and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return To Helipad For Evac\n\nGet to the Helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n",
/*0x03*/ "|Background - \n\nThe alarm has been given and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return To Helipad For Evac\n\nGet to the Helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n",
/*0x04*/ NULL,
/*0x05*/ NULL,
/*0x06*/ NULL,
/*0x07*/ NULL,
/*0x08*/ NULL,
/*0x09*/ "Access Foyer Elevator\n",
/*0x0a*/ "Reactivate Office Elevator\n",
/*0x0b*/ "Destroy Datadyne Hovercopter\n",
/*0x0c*/ "Defeat Cassandras Bodyguards\n",
/*0x0d*/ "Rendezvous at Helipad\n",
/*0x0e*/ "Accessing elevator controls....\n",
/*0x0f*/ "LIGHTS ARE NOW ON !\n",
/*0x10*/ "Dr Caroll has been killed\n",
/*0x11*/ "Dr Caroll is under attack!\n",
/*0x12*/ "Dr Caroll has been damaged\n",
/*0x13*/ "Too late! She's here...\n",
/*0x14*/ "You've become quite an annoyance..\n",
/*0x15*/ "Goodnight Ms Dark\n",
/*0x16*/ "LIGHTS NOW ON\n",
/*0x17*/ "LIGHTS NOW OFF\n",
/*0x18*/ "MISSION FAILED\n",
/*0x19*/ "MISSION SUCCESSFUL\n",
/*0x1a*/ "Helichopper warning goes here\n",
/*0x1b*/ "Obtain Night Sight\n",
/*0x1c*/ "Cassandra De Vries'\n",
/*0x1d*/ "Night Sight\n",
/*0x1e*/ "Night Sight\n",
/*0x1f*/ "Picked up Night Sight\n",
/*0x20*/ "We meet again girl!\n",
/*0x21*/ "Foyer Elevator Accessed\n",
/*0x22*/ "Office Elevator Door Has Been Unlocked\n",
/*0x23*/ "Datadyne Hovercopter Eliminated\n",
/*0x24*/ "Cassandras Bodyguards Have Been Defeated\n",
/*0x25*/ "That's not how it goes\n",
/*0x26*/ "Yes it is\n",
/*0x27*/ "Give it to me, you're doing it wrong\n",
/*0x28*/ "Stop annoying me\n",
/*0x29*/ "Will you just hurry up\n",
/*0x2a*/ "Oh No....Too Late\n",
/*0x2b*/ "She's Here...\n",
/*0x2c*/ "Get Her\n",
/*0x2d*/ "Critical Mission Object Destroyed \n",
/*0x2e*/ "Obtain Eye Spy\n",
/*0x2f*/ "Dr Carolls\n",
/*0x30*/ "Eye Spy\n",
/*0x31*/ "An Eye Spy\n",
/*0x32*/ "Picked up an Eye Spy\n",
/*0x33*/ "They've locked down the ground floor - \nget to the elevator!\n",
/*0x34*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n",
/*0x35*/ "I can't leave any bodyguards standing.\n",
/*0x36*/ "Don't keep the Jumpship waiting - \nget back to the landing pad.\n",
/*0x37*/ "Obtain Alpha Keycard\n",
/*0x38*/ "Guards\n",
/*0x39*/ "Office Keycard\n",
/*0x3a*/ "Office Keycard\n",
/*0x3b*/ "Picked up Cassandra's Office Keycard.\n",
/*0x3c*/ "Sound the alarm, she's here!",
/*0x3d*/ "Lights out!",
/*0x3e*/ "What the...?",
/*0x3f*/ "Going somewhere?",
/*0x40*/ "Something I can do for you, old woman?",
/*0x41*/ "Return our sapient immediately! You don't know what you're doing.",
/*0x42*/ "Yes I do, I'm leaving.",
/*0x43*/ "One more chance! Give it back, and you could come and work for me.",
/*0x44*/ "Sorry! Gotta shoot.",
/*0x45*/ "You must get the sapient back. We cannot proceed without it.",
/*0x46*/ "I know that!",
/*0x47*/ "I also know who to talk to... Mr. Carrington.",
/*0x48*/ NULL,
/*0x49*/ NULL,
/*0x4a*/ NULL,
/*0x4b*/ NULL,
};

80
src/lang/arkP.c Normal file
View File

@ -0,0 +1,80 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n",
/*0x01*/ "LUCERNE TOWER\n",
/*0x02*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n",
/*0x03*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n",
/*0x04*/ NULL,
/*0x05*/ NULL,
/*0x06*/ NULL,
/*0x07*/ NULL,
/*0x08*/ NULL,
/*0x09*/ "Access foyer elevator\n",
/*0x0a*/ "Reactivate office elevator\n",
/*0x0b*/ "Destroy dataDyne hovercopter\n",
/*0x0c*/ "Defeat Cassandra's bodyguards\n",
/*0x0d*/ "Rendezvous at helipad\n",
/*0x0e*/ "Accessing elevator controls...\n",
/*0x0f*/ "LIGHTS ARE NOW ON!\n",
/*0x10*/ "Dr. Caroll has been killed!\n",
/*0x11*/ "Dr. Caroll is under attack!\n",
/*0x12*/ "Dr. Caroll has been damaged!\n",
/*0x13*/ "Too late! She's here...\n",
/*0x14*/ "You've become quite an annoyance...\n",
/*0x15*/ "Good night, Ms. Dark.\n",
/*0x16*/ "LIGHTS NOW ON\n",
/*0x17*/ "LIGHTS NOW OFF\n",
/*0x18*/ "MISSION FAILED\n",
/*0x19*/ "MISSION SUCCESSFUL\n",
/*0x1a*/ "Helichopper warning goes here.\n",
/*0x1b*/ "Obtain Night Sight.\n",
/*0x1c*/ "Cassandra De Vries'\n",
/*0x1d*/ "Night Sight\n",
/*0x1e*/ "Night Sight\n",
/*0x1f*/ "Picked up Night Sight.\n",
/*0x20*/ "We meet again, girl!\n",
/*0x21*/ "Foyer elevator accessed.\n",
/*0x22*/ "Office elevator door has been unlocked.\n",
/*0x23*/ "DataDyne Hovercopter eliminated.\n",
/*0x24*/ "Cassandra's bodyguards have been defeated.\n",
/*0x25*/ "That's not how it goes.\n",
/*0x26*/ "Yes, it is.\n",
/*0x27*/ "Give it to me - you're doing it wrong.\n",
/*0x28*/ "Stop annoying me.\n",
/*0x29*/ "Will you just hurry up!\n",
/*0x2a*/ "Oh, no...too late.\n",
/*0x2b*/ "She's here...\n",
/*0x2c*/ "Get her!\n",
/*0x2d*/ "Critical mission object destroyed. \n",
/*0x2e*/ "Obtain CamSpy.\n",
/*0x2f*/ "Dr. Caroll's\n",
/*0x30*/ "CamSpy\n",
/*0x31*/ "A CamSpy\n",
/*0x32*/ "Picked up a CamSpy.\n",
/*0x33*/ "They've locked down the ground floor - \nget to the elevator!\n",
/*0x34*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n",
/*0x35*/ "I can't leave any bodyguards standing.\n",
/*0x36*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n",
/*0x37*/ "Obtain alpha key card.\n",
/*0x38*/ "Guard's\n",
/*0x39*/ "Office key card\n",
/*0x3a*/ "Office key card\n",
/*0x3b*/ "Picked up Cassandra's office key card.\n",
/*0x3c*/ "Sound the alarm - she's here!\n",
/*0x3d*/ "Lights out!\n",
/*0x3e*/ "What the...?\n",
/*0x3f*/ "Going somewhere?\n",
/*0x40*/ "Something I can do for you, old woman?\n",
/*0x41*/ "Return our sapient immediately! You don't\nknow what you're doing.\n",
/*0x42*/ "Yes I do. I'm leaving.\n",
/*0x43*/ "One more chance! Give it back, and you\ncould come and work for me.\n",
/*0x44*/ "Sorry! Gotta shoot.\n",
/*0x45*/ "You must get the sapient back. We cannot \nproceed without it.\n",
/*0x46*/ "I know that!\n",
/*0x47*/ "I also know who to talk to...\nMr. Carrington.\n",
/*0x48*/ "Elevator door is inactive on this floor.\n",
/*0x49*/ NULL,
/*0x4a*/ NULL,
/*0x4b*/ NULL,
};

80
src/lang/ark_str.c Normal file
View File

@ -0,0 +1,80 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n",
/*0x01*/ "LUCERNE TOWER\n",
/*0x02*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n",
/*0x03*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n",
/*0x04*/ NULL,
/*0x05*/ NULL,
/*0x06*/ NULL,
/*0x07*/ NULL,
/*0x08*/ NULL,
/*0x09*/ "Access foyer elevator\n",
/*0x0a*/ "Reactivate office elevator\n",
/*0x0b*/ "Destroy dataDyne hovercopter\n",
/*0x0c*/ "Defeat Cassandra's bodyguards\n",
/*0x0d*/ "Rendezvous at helipad\n",
/*0x0e*/ "Accessing elevator controls...\n",
/*0x0f*/ "LIGHTS ARE NOW ON!\n",
/*0x10*/ "Dr. Caroll has been killed!\n",
/*0x11*/ "Dr. Caroll is under attack!\n",
/*0x12*/ "Dr. Caroll has been damaged!\n",
/*0x13*/ "Too late! She's here...\n",
/*0x14*/ "You've become quite an annoyance...\n",
/*0x15*/ "Good night, Ms. Dark.\n",
/*0x16*/ "LIGHTS NOW ON\n",
/*0x17*/ "LIGHTS NOW OFF\n",
/*0x18*/ "MISSION FAILED\n",
/*0x19*/ "MISSION SUCCESSFUL\n",
/*0x1a*/ "Helichopper warning goes here.\n",
/*0x1b*/ "Obtain Night Sight.\n",
/*0x1c*/ "Cassandra De Vries'\n",
/*0x1d*/ "Night Sight\n",
/*0x1e*/ "Night Sight\n",
/*0x1f*/ "Picked up Night Sight.\n",
/*0x20*/ "We meet again, girl!\n",
/*0x21*/ "Foyer elevator accessed.\n",
/*0x22*/ "Office elevator door has been unlocked.\n",
/*0x23*/ "DataDyne Hovercopter eliminated.\n",
/*0x24*/ "Cassandra's bodyguards have been defeated.\n",
/*0x25*/ "That's not how it goes.\n",
/*0x26*/ "Yes, it is.\n",
/*0x27*/ "Give it to me - you're doing it wrong.\n",
/*0x28*/ "Stop annoying me.\n",
/*0x29*/ "Will you just hurry up!\n",
/*0x2a*/ "Oh, no...too late.\n",
/*0x2b*/ "She's here...\n",
/*0x2c*/ "Get her!\n",
/*0x2d*/ "Critical mission object destroyed. \n",
/*0x2e*/ "Obtain CamSpy.\n",
/*0x2f*/ "Dr. Caroll's\n",
/*0x30*/ "CamSpy\n",
/*0x31*/ "A CamSpy\n",
/*0x32*/ "Picked up a CamSpy.\n",
/*0x33*/ "They've locked down the ground floor - \nget to the elevator!\n",
/*0x34*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n",
/*0x35*/ "I can't leave any bodyguards standing.\n",
/*0x36*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n",
/*0x37*/ "Obtain alpha key card.\n",
/*0x38*/ "Guard's\n",
/*0x39*/ "Office key card\n",
/*0x3a*/ "Office key card\n",
/*0x3b*/ "Picked up Cassandra's office key card.\n",
/*0x3c*/ "Sound the alarm - she's here!\n",
/*0x3d*/ "Lights out!\n",
/*0x3e*/ "What the...?\n",
/*0x3f*/ "Going somewhere?\n",
/*0x40*/ "Something I can do for you, old woman?\n",
/*0x41*/ "Return our sapient immediately! You don't\nknow what you're doing.\n",
/*0x42*/ "Yes I do. I'm leaving.\n",
/*0x43*/ "One more chance! Give it back, and you\ncould come and work for me.\n",
/*0x44*/ "Sorry! Gotta shoot.\n",
/*0x45*/ "You must get the sapient back. We cannot \nproceed without it.\n",
/*0x46*/ "I know that!\n",
/*0x47*/ "I also know who to talk to...\nMr. Carrington.\n",
/*0x48*/ "Elevator door is inactive on this floor.\n",
/*0x49*/ NULL,
/*0x4a*/ NULL,
/*0x4b*/ NULL,
};

3
src/lang/ashE.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/ashJ.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/ashP.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/ash_str.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

20
src/lang/ateE.c Normal file
View File

@ -0,0 +1,20 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n",
/*0x01*/ "LUCERNE TOWER\n",
/*0x02*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n",
/*0x03*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n",
/*0x04*/ "Defeat dataDyne guard\n",
/*0x05*/ "Defeat Jonathan Dark\n",
/*0x06*/ "Defeat Trent Easton\n",
/*0x07*/ "THE DUEL\n",
/*0x08*/ "Defeat your opponent.\n",
/*0x09*/ "Well done! You were too quick for him!\n",
/*0x0a*/ "Well done! You were too quick for him!\n",
/*0x0b*/ "Well done! You were too quick for him!\n",
/*0x0c*/ "Opponent skill level: AGENT\n",
/*0x0d*/ "Opponent skill level: SPECIAL AGENT\n",
/*0x0e*/ "Opponent skill level: PERFECT AGENT\n",
/*0x0f*/ NULL,
};

20
src/lang/ateJ.c Normal file
View File

@ -0,0 +1,20 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "Joanna's Graduation Test - The Duel\n",
/*0x01*/ "Defeat Your Opponent In A Duel.\n",
/*0x02*/ "Defeat Your Opponent In A Duel.\n",
/*0x03*/ "Defeat Your Opponent In A Duel.\n",
/*0x04*/ "Defeat Your Opponent.\n",
/*0x05*/ "Defeat Your Opponent.\n",
/*0x06*/ "Defeat Your Opponent.\n",
/*0x07*/ "THE DUEL\n",
/*0x08*/ "Defeat Your Opponent.\n",
/*0x09*/ "Well Done! You Were Too Quick For Him!.\n",
/*0x0a*/ "Well Done! You Were Too Quick For Him!.\n",
/*0x0b*/ "Well Done! You Were Too Quick For Him!.\n",
/*0x0c*/ "Opponent Skill Level: AGENT\n",
/*0x0d*/ "Opponent Skill Level: SPECIAL AGENT\n",
/*0x0e*/ "Opponent Skill Level: PERFECT AGENT\n",
/*0x0f*/ NULL,
};

20
src/lang/ateP.c Normal file
View File

@ -0,0 +1,20 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n",
/*0x01*/ "LUCERNE TOWER\n",
/*0x02*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n",
/*0x03*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n",
/*0x04*/ "Defeat dataDyne guard\n",
/*0x05*/ "Defeat Jonathan Dark\n",
/*0x06*/ "Defeat Trent Easton\n",
/*0x07*/ "THE DUEL\n",
/*0x08*/ "Defeat your opponent.\n",
/*0x09*/ "Well done! You were too quick for him!\n",
/*0x0a*/ "Well done! You were too quick for him!\n",
/*0x0b*/ "Well done! You were too quick for him!\n",
/*0x0c*/ "Opponent skill level: AGENT\n",
/*0x0d*/ "Opponent skill level: SPECIAL AGENT\n",
/*0x0e*/ "Opponent skill level: PERFECT AGENT\n",
/*0x0f*/ NULL,
};

20
src/lang/ate_str.c Normal file
View File

@ -0,0 +1,20 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n",
/*0x01*/ "LUCERNE TOWER\n",
/*0x02*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n",
/*0x03*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n",
/*0x04*/ "Defeat dataDyne guard\n",
/*0x05*/ "Defeat Jonathan Dark\n",
/*0x06*/ "Defeat Trent Easton\n",
/*0x07*/ "THE DUEL\n",
/*0x08*/ "Defeat your opponent.\n",
/*0x09*/ "Well done! You were too quick for him!\n",
/*0x0a*/ "Well done! You were too quick for him!\n",
/*0x0b*/ "Well done! You were too quick for him!\n",
/*0x0c*/ "Opponent skill level: AGENT\n",
/*0x0d*/ "Opponent skill level: SPECIAL AGENT\n",
/*0x0e*/ "Opponent skill level: PERFECT AGENT\n",
/*0x0f*/ NULL,
};

52
src/lang/aztE.c Normal file
View File

@ -0,0 +1,52 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n",
/*0x01*/ "CRASH SITE\n",
/*0x02*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n",
/*0x03*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "Retrieve Presidential medical scanner\n",
/*0x06*/ "Activate distress beacon\n",
/*0x07*/ "Shut down enemy jamming device\n",
/*0x08*/ "Retire Presidential clone\n",
/*0x09*/ "Locate and rescue President\n",
/*0x0a*/ "There's the escape pod.\n",
/*0x0b*/ "Maybe there's a beacon in there.\n",
/*0x0c*/ "The jamming... It's coming from that ship.\n",
/*0x0d*/ "Elvis... He'll be able to protect the President.\n",
/*0x0e*/ "Distress beacon has been activated.\n",
/*0x0f*/ "Critical mission object has been destroyed.\n",
/*0x10*/ "Obtain Presidential Scanner.\n",
/*0x11*/ "\n",
/*0x12*/ "\n",
/*0x13*/ "A Presidential Scanner\n",
/*0x14*/ "Picked up a Presidential Scanner.\n",
/*0x15*/ "Jamming device has been shut down.\n",
/*0x16*/ "President has been killed.\n",
/*0x17*/ "Presidential clone has been eliminated.\n",
/*0x18*/ "You'll never save him now!\n",
/*0x19*/ "President has been rescued.\n",
/*0x1a*/ "Obtain Night Vision.\n",
/*0x1b*/ "Cassandra De Vries'\n",
/*0x1c*/ "Night Vision\n",
/*0x1d*/ "Night Vision\n",
/*0x1e*/ "Picked up Night Vision.\n",
/*0x1f*/ "Take this; you should find it useful!\n",
/*0x20*/ "Ahhh... uuhhhh...\n",
/*0x21*/ "Ahhh... uhh... owww...\n",
/*0x22*/ "Agent Dark! Please report!\n",
/*0x23*/ "Perfect Dark, come in!\n",
/*0x24*/ "A-agent Dark reporting in...\n",
/*0x25*/ "Agent Dark! Please reply!\n",
/*0x26*/ "Something's jamming my transmissions... It's coming from that other craft.\n",
/*0x27*/ "I'd better find the jamming device and check that Elvis is okay. Not forgetting the President, of course.\n",
/*0x28*/ "How are you feeling, Mr. President?\n",
/*0x29*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n",
/*0x2a*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n",
/*0x2b*/ "It's a U.S. government deep sea research vessel, one of a kind... The only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n",
/*0x2c*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n",
/*0x2d*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n",
/*0x2e*/ "Just try it, you Scandinavian freak!\n",
/*0x2f*/ "Noooooooo!!!\n",
};

52
src/lang/aztJ.c Normal file
View File

@ -0,0 +1,52 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nFollowing Elvis' last-ditch manoeuvre, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history, and is able to maintain a check n his state of health. You will need it if you are to ensure his wellbeing.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shutdown Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have to identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate And Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n",
/*0x01*/ "CRASH SITE\n",
/*0x02*/ "|Background - \n\nFollowing Elvis' last-ditch manoeuvre, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history, and is able to maintain a check n his state of health. You will need it if you are to ensure his wellbeing.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shutdown Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Locate And Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past\n\nEND\n",
/*0x03*/ "|Background - \n\nFollowing Elvis' last-ditch manoeuvre, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history, and is able to maintain a check n his state of health. You will need it if you are to ensure his wellbeing.\n\n|Objective Two: - Shutdown Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Three: - Locate And Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past\n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "Retrieve Presidential Medical Scanner\n",
/*0x06*/ "Activate Distress Beacon\n",
/*0x07*/ "Shutdown Enemy Jamming Device\n",
/*0x08*/ "Retire Presidential Clone\n",
/*0x09*/ "Locate And Rescue President\n",
/*0x0a*/ "There's the escape pod.\n",
/*0x0b*/ "Maybe there's a beacon in there.\n",
/*0x0c*/ "The jamming... it's coming from that ship.\n",
/*0x0d*/ "Elvis... he'll be able to protect the president.\n",
/*0x0e*/ "Distress Beacon Has Been Activated.\n",
/*0x0f*/ "Critical Mission Object Has Been Destroyed.\n",
/*0x10*/ "Obtain Presidential Scanner\n",
/*0x11*/ "\n",
/*0x12*/ "\n",
/*0x13*/ "A Presidential Scanner\n",
/*0x14*/ "Picked up a Presidential Scanner\n",
/*0x15*/ "Jamming Device Has Been Shut Down.\n",
/*0x16*/ "President Has Been Killed.\n",
/*0x17*/ "Presidential Clone Has Been Eliminated.\n",
/*0x18*/ "You'll never save him now!\n",
/*0x19*/ "President Has Been Rescued.\n",
/*0x1a*/ "Obtain Night Sight\n",
/*0x1b*/ "Cassandra De Vries'\n",
/*0x1c*/ "Night Sight\n",
/*0x1d*/ "Night Sight\n",
/*0x1e*/ "Picked up Night Sight\n",
/*0x1f*/ "Take This, You Should Find It Useful!\n",
/*0x20*/ "Ahhh... uuhhhh...",
/*0x21*/ "Ahhh... uhh... owww...",
/*0x22*/ "Agent Dark! Please report!",
/*0x23*/ "Perfect Dark, come in!",
/*0x24*/ "A-agent Dark reporting in...",
/*0x25*/ "Agent Dark! Please reply!",
/*0x26*/ "Something's jamming my transmissions... maybe it's coming from that other craft.",
/*0x27*/ "I'd better find that jamming device, and check that Elvis is okay. Not forgetting the President, of course.",
/*0x28*/ "How are you feeling, Mr. President?",
/*0x29*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...",
/*0x2a*/ "Just one thing, sir? What is the Pelagic 2 that Trent wanted so badly?",
/*0x2b*/ "It's a US government Deep Sea Research Vessel, one of a kind... the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.",
/*0x2c*/ "Trent has a lot to answer for, but I don't think we'll find him now.",
/*0x2d*/ "You have failed, Easton. You are a flawed device, and we need you no longer.",
/*0x2e*/ "Just try it, you scandinavian freak!",
/*0x2f*/ "Noooooooo!!!",
};

52
src/lang/aztP.c Normal file
View File

@ -0,0 +1,52 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n",
/*0x01*/ "CRASH SITE\n",
/*0x02*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n",
/*0x03*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "Retrieve Presidential medical scanner\n",
/*0x06*/ "Activate distress beacon\n",
/*0x07*/ "Shut down enemy jamming device\n",
/*0x08*/ "Retire Presidential clone\n",
/*0x09*/ "Locate and rescue President\n",
/*0x0a*/ "There's the escape pod.\n",
/*0x0b*/ "Maybe there's a beacon in there.\n",
/*0x0c*/ "The jamming... It's coming from that ship.\n",
/*0x0d*/ "Elvis... He'll be able to protect the President.\n",
/*0x0e*/ "Distress beacon has been activated.\n",
/*0x0f*/ "Critical mission object has been destroyed.\n",
/*0x10*/ "Obtain Presidential Scanner.\n",
/*0x11*/ "\n",
/*0x12*/ "\n",
/*0x13*/ "A Presidential Scanner\n",
/*0x14*/ "Picked up a Presidential Scanner.\n",
/*0x15*/ "Jamming device has been shut down.\n",
/*0x16*/ "President has been killed.\n",
/*0x17*/ "Presidential clone has been eliminated.\n",
/*0x18*/ "You'll never save him now!\n",
/*0x19*/ "President has been rescued.\n",
/*0x1a*/ "Obtain Night Sight.\n",
/*0x1b*/ "Cassandra De Vries'\n",
/*0x1c*/ "Night Sight\n",
/*0x1d*/ "Night Sight\n",
/*0x1e*/ "Picked up Night Sight.\n",
/*0x1f*/ "Take this; you should find it useful!\n",
/*0x20*/ "Ahhh... uuhhhh...\n",
/*0x21*/ "Ahhh... uhh... owww...\n",
/*0x22*/ "Agent Dark! Please report!\n",
/*0x23*/ "Perfect Dark, come in!\n",
/*0x24*/ "A-agent Dark reporting in...\n",
/*0x25*/ "Agent Dark! Please reply!\n",
/*0x26*/ "Something's jamming my transmissions... Maybe it's coming from that other craft.\n",
/*0x27*/ "I'd better find that jamming device and check that Elvis is okay. Not forgetting the President, of course.\n",
/*0x28*/ "How are you feeling, Mr. President?\n",
/*0x29*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n",
/*0x2a*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n",
/*0x2b*/ "It's a U.S. government deep sea research vessel, one of a kind...the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n",
/*0x2c*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n",
/*0x2d*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n",
/*0x2e*/ "Just try it, you Scandinavian freak!\n",
/*0x2f*/ "Noooooooo!!!\n",
};

52
src/lang/azt_str.c Normal file
View File

@ -0,0 +1,52 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n",
/*0x01*/ "CRASH SITE\n",
/*0x02*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n",
/*0x03*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "Retrieve Presidential medical scanner\n",
/*0x06*/ "Activate distress beacon\n",
/*0x07*/ "Shut down enemy jamming device\n",
/*0x08*/ "Retire Presidential clone\n",
/*0x09*/ "Locate and rescue President\n",
/*0x0a*/ "There's the escape pod.\n",
/*0x0b*/ "Maybe there's a beacon in there.\n",
/*0x0c*/ "The jamming... It's coming from that ship.\n",
/*0x0d*/ "Elvis... He'll be able to protect the President.\n",
/*0x0e*/ "Distress beacon has been activated.\n",
/*0x0f*/ "Critical mission object has been destroyed.\n",
/*0x10*/ "Obtain Presidential Scanner.\n",
/*0x11*/ "\n",
/*0x12*/ "\n",
/*0x13*/ "A Presidential Scanner\n",
/*0x14*/ "Picked up a Presidential Scanner.\n",
/*0x15*/ "Jamming device has been shut down.\n",
/*0x16*/ "President has been killed.\n",
/*0x17*/ "Presidential clone has been eliminated.\n",
/*0x18*/ "You'll never save him now!\n",
/*0x19*/ "President has been rescued.\n",
/*0x1a*/ "Obtain Night Sight.\n",
/*0x1b*/ "Cassandra De Vries'\n",
/*0x1c*/ "Night Sight\n",
/*0x1d*/ "Night Sight\n",
/*0x1e*/ "Picked up Night Sight.\n",
/*0x1f*/ "Take this; you should find it useful!\n",
/*0x20*/ "Ahhh... uuhhhh...\n",
/*0x21*/ "Ahhh... uhh... owww...\n",
/*0x22*/ "Agent Dark! Please report!\n",
/*0x23*/ "Perfect Dark, come in!\n",
/*0x24*/ "A-agent Dark reporting in...\n",
/*0x25*/ "Agent Dark! Please reply!\n",
/*0x26*/ "Something's jamming my transmissions... Maybe it's coming from that other craft.\n",
/*0x27*/ "I'd better find that jamming device and check that Elvis is okay. Not forgetting the President, of course.\n",
/*0x28*/ "How are you feeling, Mr. President?\n",
/*0x29*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n",
/*0x2a*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n",
/*0x2b*/ "It's a U.S. government deep sea research vessel, one of a kind...the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n",
/*0x2c*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n",
/*0x2d*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n",
/*0x2e*/ "Just try it, you Scandinavian freak!\n",
/*0x2f*/ "Noooooooo!!!\n",
};

3
src/lang/catE.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/catJ.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/catP.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/cat_str.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

72
src/lang/caveE.c Normal file
View File

@ -0,0 +1,72 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n",
/*0x01*/ "PRESIDENTIAL TERMINAL \nUS AIRBASE, ALASKA\n",
/*0x02*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n",
/*0x03*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "Obtain disguise and enter base\n",
/*0x06*/ "Check in equipment\n",
/*0x07*/ "Subvert security monitoring system\n",
/*0x08*/ "Obtain flight plans from safe\n",
/*0x09*/ "Board Air Force One\n",
/*0x0a*/ "Obtain suitcase.\n",
/*0x0b*/ "\n",
/*0x0c*/ "Suitcase\n",
/*0x0d*/ "Suitcase\n",
/*0x0e*/ "Picked up a suitcase.\n",
/*0x0f*/ "Obtain air stewardess uniform.\n",
/*0x10*/ "\n",
/*0x11*/ "Disguise\n",
/*0x12*/ "Disguise\n",
/*0x13*/ "Picked up a stewardess uniform.\n",
/*0x14*/ "Obtain flight plans from safe.\n",
/*0x15*/ "\n",
/*0x16*/ "Flight Plans\n",
/*0x17*/ "Flight Plans\n",
/*0x18*/ "Picked up the flight plans.\n",
/*0x19*/ "Look out - it's an intruder...\n",
/*0x1a*/ "Innocent civilians have been killed.\n",
/*0x1b*/ "Is he OK?\n",
/*0x1c*/ "I'll go and get some help.\n",
/*0x1d*/ "Good afternoon.\n",
/*0x1e*/ "OK, you know the way from here.\n",
/*0x1f*/ "You'll have to check that weapon in here.\n",
/*0x20*/ "Oh, my God!\n",
/*0x21*/ "Weapons are not allowed in the base.\n",
/*0x22*/ "Right, I'm calling security.\n",
/*0x23*/ "System shutdown initiated...\n",
/*0x24*/ "Security systems have been shut down.\n",
/*0x25*/ "Weapons have been detected.\n",
/*0x26*/ "Suitcase has been deposited.\n",
/*0x27*/ "Suitcase has been scanned.\n",
/*0x28*/ "Hey, you - this is a restricted area.\n",
/*0x29*/ "Are you new around here?\n",
/*0x2a*/ "Hey - give me back my case.\n",
/*0x2b*/ "You get security - I'll deal with her...\n",
/*0x2c*/ "Upstairs...there's an intruder.\n",
/*0x2d*/ "Laser grid access denied.\n",
/*0x2e*/ "Laser grid system has been overloaded.\n",
/*0x2f*/ "Too many neutral casualties inflicted.\n",
/*0x30*/ "Stop them from getting the safe...\n",
/*0x31*/ "Disguise worn.\n",
/*0x32*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n",
/*0x33*/ "Use that case to conceal your equipment.\n",
/*0x34*/ "The case will get stopped unless you do something.\n",
/*0x35*/ "So that's Air Force One? ... Huh, smaller \nthan I thought.\n",
/*0x36*/ "Stop them - they're breaking into the safe...\n",
/*0x37*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n",
/*0x38*/ "Excellent, Joanna. That cable car is your way in... Our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n",
/*0x39*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n",
/*0x3a*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n",
/*0x3b*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n",
/*0x3c*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n",
/*0x3d*/ "Lift inoperative - security system is active.\n",
/*0x3e*/ "Critical mission personnel disabled.\n",
/*0x3f*/ "Critical mission object destroyed.\n",
/*0x40*/ "Entrance to base secured.\n",
/*0x41*/ "We're taking over!!\n",
/*0x42*/ "Hover trolley has been shut down.\n",
/*0x43*/ "Equipment cannot be checked in.\n",
};

72
src/lang/caveJ.c Normal file
View File

@ -0,0 +1,72 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nTrent Easton has flown to meet the President at the Airbase in Alaska, preparing for the President's foreign visit. from the evidence gathered in Chicago we assume that this is the start of his move against the President, and as such it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the Airbase. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise And Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the airbase. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later when you are aboard Air Force One. First, though, you need to find a case to put the equipment inside.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the Security screening system will need a different approach. If it detects the weapon in your equipment then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Item From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n",
/*0x01*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n",
/*0x02*/ "|Background - \n\nTrent Easton has flown to meet the President at the Airbase in Alaska, preparing for the President's foreign visit. from the evidence gathered in Chicago we assume that this is the start of his move against the President, and as such it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the Airbase. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise And Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the airbase. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later when you are aboard Air Force One. First, though, you need to find a case to put the equipment inside.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the Security screening system will need a different approach. If it detects the weapon in your equipment then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n",
/*0x03*/ "|Background - \n\nTrent Easton has flown to meet the President at the Airbase in Alaska, preparing for the President's foreign visit. from the evidence gathered in Chicago we assume that this is the start of his move against the President, and as such it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the Airbase. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise And Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the airbase. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the Security screening system will need a different approach. If it detects the weapon in your equipment then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "Obtain Disguise And Enter Base\n",
/*0x06*/ "Check In Equipment\n",
/*0x07*/ "Subvert Security Monitoring System\n",
/*0x08*/ "Obtain Item From Safe\n",
/*0x09*/ "Board Air Force One\n",
/*0x0a*/ "Obtain suitcase\n",
/*0x0b*/ "\n",
/*0x0c*/ "Suitcase\n",
/*0x0d*/ "Suitcase\n",
/*0x0e*/ "Picked up a suitcase.\n",
/*0x0f*/ "Obtain air stewardess uniform.\n",
/*0x10*/ "\n",
/*0x11*/ "Disguise\n",
/*0x12*/ "Disguise\n",
/*0x13*/ "Picked up a stewardess uniform.\n",
/*0x14*/ "Obtain safe item\n",
/*0x15*/ "\n",
/*0x16*/ "Safe Item\n",
/*0x17*/ "Safe Item\n",
/*0x18*/ "Picked up a safe item\n",
/*0x19*/ "Look out - it's an intruder...\n",
/*0x1a*/ "Innocent Civilians Have Been Killed\n",
/*0x1b*/ "Is he Ok?\n",
/*0x1c*/ "I'll go and get some help\n",
/*0x1d*/ "Good afternoon\n",
/*0x1e*/ "Ok, You know the way from here\n",
/*0x1f*/ "Please holster your weapon, miss\n",
/*0x20*/ "Oh my god!\n",
/*0x21*/ "Weapons are not allowed in the base\n",
/*0x22*/ "Right, I'm calling security\n",
/*0x23*/ "System Shutdown Initiated...\n",
/*0x24*/ "Security Systems Have Been Shut Down\n",
/*0x25*/ "Weapons Have Been Detected\n",
/*0x26*/ "Suitcase has been deposited\n",
/*0x27*/ "Suitcase has been scanned\n",
/*0x28*/ "Hey you - this is a restricted area\n",
/*0x29*/ "Are you new around here?\n",
/*0x2a*/ "Hey - give me back my case\n",
/*0x2b*/ "You get security, I'll deal with her...\n",
/*0x2c*/ "Upstairs...there's an intruder\n",
/*0x2d*/ "Lasergrid access denied\n",
/*0x2e*/ "Laser grid system has been overloaded\n",
/*0x2f*/ "Too many neutral casualties inflicted\n",
/*0x30*/ "Stop them from getting the safe....\n",
/*0x31*/ "Disguise worn.\n",
/*0x32*/ "Now's your chance! Grab the stewardess' \nbag and get her uniform.\n",
/*0x33*/ "Use that case to conceal your equipment.\n",
/*0x34*/ "The bag will get stopped unless you do something.\n",
/*0x35*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n",
/*0x36*/ "Stop them, they're breaking into the safe...\n",
/*0x37*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.",
/*0x38*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by airbase troops. I don't have to remind you that...",
/*0x39*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?",
/*0x3a*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.",
/*0x3b*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?",
/*0x3c*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.",
/*0x3d*/ NULL,
/*0x3e*/ NULL,
/*0x3f*/ NULL,
/*0x40*/ NULL,
/*0x41*/ NULL,
/*0x42*/ NULL,
/*0x43*/ NULL,
};

72
src/lang/caveP.c Normal file
View File

@ -0,0 +1,72 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n",
/*0x01*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n",
/*0x02*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n",
/*0x03*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "Obtain disguise and enter base\n",
/*0x06*/ "Check in equipment\n",
/*0x07*/ "Subvert security monitoring system\n",
/*0x08*/ "Obtain flight plans from safe\n",
/*0x09*/ "Board Air Force One\n",
/*0x0a*/ "Obtain suitcase.\n",
/*0x0b*/ "\n",
/*0x0c*/ "Suitcase\n",
/*0x0d*/ "Suitcase\n",
/*0x0e*/ "Picked up a suitcase.\n",
/*0x0f*/ "Obtain air stewardess uniform.\n",
/*0x10*/ "\n",
/*0x11*/ "Disguise\n",
/*0x12*/ "Disguise\n",
/*0x13*/ "Picked up a stewardess uniform.\n",
/*0x14*/ "Obtain flight plans from safe.\n",
/*0x15*/ "\n",
/*0x16*/ "Flight Plans\n",
/*0x17*/ "Flight Plans\n",
/*0x18*/ "Picked up the flight plans.\n",
/*0x19*/ "Look out - it's an intruder...\n",
/*0x1a*/ "Innocent civilians have been killed.\n",
/*0x1b*/ "Is he OK?\n",
/*0x1c*/ "I'll go and get some help.\n",
/*0x1d*/ "Good afternoon.\n",
/*0x1e*/ "OK, you know the way from here.\n",
/*0x1f*/ "Please holster your weapon, miss.\n",
/*0x20*/ "Oh, my God!\n",
/*0x21*/ "Weapons are not allowed in the base.\n",
/*0x22*/ "Right, I'm calling security.\n",
/*0x23*/ "System shutdown initiated...\n",
/*0x24*/ "Security systems have been shut down.\n",
/*0x25*/ "Weapons have been detected.\n",
/*0x26*/ "Suitcase has been deposited.\n",
/*0x27*/ "Suitcase has been scanned.\n",
/*0x28*/ "Hey, you - this is a restricted area.\n",
/*0x29*/ "Are you new around here?\n",
/*0x2a*/ "Hey - give me back my case.\n",
/*0x2b*/ "You get security - I'll deal with her...\n",
/*0x2c*/ "Upstairs...there's an intruder.\n",
/*0x2d*/ "Laser grid access denied.\n",
/*0x2e*/ "Laser grid system has been overloaded.\n",
/*0x2f*/ "Too many neutral casualties inflicted.\n",
/*0x30*/ "Stop them from getting the safe...\n",
/*0x31*/ "Disguise worn.\n",
/*0x32*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n",
/*0x33*/ "Use that case to conceal your equipment.\n",
/*0x34*/ "The case will get stopped unless you do something.\n",
/*0x35*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n",
/*0x36*/ "Stop them - they're breaking into the safe...\n",
/*0x37*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n",
/*0x38*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n",
/*0x39*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n",
/*0x3a*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n",
/*0x3b*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n",
/*0x3c*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n",
/*0x3d*/ "Lift inoperative - security system is active.\n",
/*0x3e*/ "Critical mission personnel disabled.\n",
/*0x3f*/ "Critical mission object destroyed.\n",
/*0x40*/ "Entrance to base secured.\n",
/*0x41*/ "We're taking over!!\n",
/*0x42*/ "Hover trolley has been shut down.\n",
/*0x43*/ "Equipment cannot be checked in.\n",
};

72
src/lang/cave_str.c Normal file
View File

@ -0,0 +1,72 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n",
/*0x01*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n",
/*0x02*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n",
/*0x03*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "Obtain disguise and enter base\n",
/*0x06*/ "Check in equipment\n",
/*0x07*/ "Subvert security monitoring system\n",
/*0x08*/ "Obtain flight plans from safe\n",
/*0x09*/ "Board Air Force One\n",
/*0x0a*/ "Obtain suitcase.\n",
/*0x0b*/ "\n",
/*0x0c*/ "Suitcase\n",
/*0x0d*/ "Suitcase\n",
/*0x0e*/ "Picked up a suitcase.\n",
/*0x0f*/ "Obtain air stewardess uniform.\n",
/*0x10*/ "\n",
/*0x11*/ "Disguise\n",
/*0x12*/ "Disguise\n",
/*0x13*/ "Picked up a stewardess uniform.\n",
/*0x14*/ "Obtain flight plans from safe.\n",
/*0x15*/ "\n",
/*0x16*/ "Flight Plans\n",
/*0x17*/ "Flight Plans\n",
/*0x18*/ "Picked up the flight plans.\n",
/*0x19*/ "Look out - it's an intruder...\n",
/*0x1a*/ "Innocent civilians have been killed.\n",
/*0x1b*/ "Is he OK?\n",
/*0x1c*/ "I'll go and get some help.\n",
/*0x1d*/ "Good afternoon.\n",
/*0x1e*/ "OK, you know the way from here.\n",
/*0x1f*/ "Please holster your weapon, miss.\n",
/*0x20*/ "Oh, my God!\n",
/*0x21*/ "Weapons are not allowed in the base.\n",
/*0x22*/ "Right, I'm calling security.\n",
/*0x23*/ "System shutdown initiated...\n",
/*0x24*/ "Security systems have been shut down.\n",
/*0x25*/ "Weapons have been detected.\n",
/*0x26*/ "Suitcase has been deposited.\n",
/*0x27*/ "Suitcase has been scanned.\n",
/*0x28*/ "Hey, you - this is a restricted area.\n",
/*0x29*/ "Are you new around here?\n",
/*0x2a*/ "Hey - give me back my case.\n",
/*0x2b*/ "You get security - I'll deal with her...\n",
/*0x2c*/ "Upstairs...there's an intruder.\n",
/*0x2d*/ "Laser grid access denied.\n",
/*0x2e*/ "Laser grid system has been overloaded.\n",
/*0x2f*/ "Too many neutral casualties inflicted.\n",
/*0x30*/ "Stop them from getting the safe...\n",
/*0x31*/ "Disguise worn.\n",
/*0x32*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n",
/*0x33*/ "Use that case to conceal your equipment.\n",
/*0x34*/ "The case will get stopped unless you do something.\n",
/*0x35*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n",
/*0x36*/ "Stop them - they're breaking into the safe...\n",
/*0x37*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n",
/*0x38*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n",
/*0x39*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n",
/*0x3a*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n",
/*0x3b*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n",
/*0x3c*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n",
/*0x3d*/ "Lift inoperative - security system is active.\n",
/*0x3e*/ "Critical mission personnel disabled.\n",
/*0x3f*/ "Critical mission object destroyed.\n",
/*0x40*/ "Entrance to base secured.\n",
/*0x41*/ "We're taking over!!\n",
/*0x42*/ "Hover trolley has been shut down.\n",
/*0x43*/ "Equipment cannot be checked in.\n",
};

3
src/lang/cradE.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/cradJ.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/cradP.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/crad_str.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/crypE.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/crypJ.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/crypP.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/cryp_str.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

52
src/lang/damE.c Normal file
View File

@ -0,0 +1,52 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n",
/*0x01*/ "Cetan Ship\n",
/*0x02*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n",
/*0x03*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "Deactivate GPS and autopilot\n",
/*0x06*/ "Disable primary power source\n",
/*0x07*/ "Secure laboratories and research data\n",
/*0x08*/ "Activate Moon Pool lift\n",
/*0x09*/ "Rendezvous and escape with Elvis\n",
/*0x0a*/ "Cripple the engines and the ship will \ndrift... Perfect!\n",
/*0x0b*/ "This must be where the sub's controlled from.\n",
/*0x0c*/ "Without the autopilot and the GPS, the ship \nwill wander off station.\n",
/*0x0d*/ "They'll be unable to conduct any operations \nwithout any power.\n",
/*0x0e*/ "Autopilot system has been deactivated.\n",
/*0x0f*/ "GPS system has been deactivated.\n",
/*0x10*/ "Critical mission object has been destroyed.\n",
/*0x11*/ "Reactor shutdown control hatch opened.\n",
/*0x12*/ "Reactor has been shut down.\n",
/*0x13*/ "Diving control center has been located.\n",
/*0x14*/ "Critical mission personnel killed.\n",
/*0x15*/ "Research data has been secured.\n",
/*0x16*/ "\n",
/*0x17*/ "\n",
/*0x18*/ "Research data disk\n",
/*0x19*/ "A research data disk\n",
/*0x1a*/ "Picked up a research data disk.\n",
/*0x1b*/ "Critical mission personnel have been killed.\n",
/*0x1c*/ "Lift door has been unlocked.\n",
/*0x1d*/ "Lift has been activated.\n",
/*0x1e*/ "Operation denied - hangar doors still closed.\n",
/*0x1f*/ "Unlocking sequence has been reset.\n",
/*0x20*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n",
/*0x21*/ "Elvis has been killed.\n",
/*0x22*/ "Joanna... What took you so long? Follow me - \nlet's get out of this old tub.\n",
/*0x23*/ "Civilians have been killed.\n",
/*0x24*/ "Critical mission object has been destroyed.\n",
/*0x25*/ "Alarm has been activated.\n",
/*0x26*/ "Alarm has been deactivated.\n",
/*0x27*/ "Right. The diving operation has been disrupted on the surface. \nTime for a swim.\n",
/*0x28*/ "I hope the government don't want to use this ship anytime soon.\n",
/*0x29*/ "Do you think we were a little heavy-handed?\n",
/*0x2a*/ "Naaahhhh.\n",
/*0x2b*/ "Pull the plug on that now.\n",
/*0x2c*/ "Switch this thing off.\n",
/*0x2d*/ "I'll shut it down.\n",
/*0x2e*/ "Please don't hurt me.\n",
/*0x2f*/ "Die, you traitors.\n",
};

52
src/lang/damJ.c Normal file
View File

@ -0,0 +1,52 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic 2 and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and their strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and their allies. Disrupt the operation as extensively as possible but remember our minimum force rules for non-combatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the Primary Power Source will help cause the ship to wander from the operating location, but it will also cause blackouts in non-essential sections of the ship.\n\n|Objective Two: - Secure Laboratories And Research Data\n\nWe want any information that dataDyne have amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS And AutoPilot\n\ngetting both the GPS location system and the ship's Autopilot offline will cause the ship to drift off station; if only one is shut down it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous And Escape With Elvis\n\nfind Elvis and return to the Moon pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n",
/*0x01*/ "Cetan Ship\n",
/*0x02*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic 2 and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and their strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and their allies. Disrupt the operation as extensively as possible but remember our minimum force rules for non-combatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the Primary Power Source will help cause the ship to wander from the operating location, but it will also cause blackouts in non-essential sections of the ship.\n\n|Objective Two: - Deactivate GPS And AutoPilot\n\ngetting both the GPS location system and the ship's Autopilot offline will cause the ship to drift off station; if only one is shut down it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous And Escape With Elvis\n\nfind Elvis and return to the Moon pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n",
/*0x03*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic 2 and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and their strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and their allies. Disrupt the operation as extensively as possible but remember our minimum force rules for non-combatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the Primary Power Source will help cause the ship to wander from the operating location, but it will also cause blackouts in non-essential sections of the ship.\n\n|Objective Two: - Deactivate GPS And AutoPilot\n\ngetting both the GPS location system and the ship's Autopilot offline will cause the ship to drift off station; if only one is shut down it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous And Escape With Elvis\n\nfind Elvis and return to the Moon pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "Deactivate GPS And AutoPilot\n",
/*0x06*/ "Disable Primary Power Source\n",
/*0x07*/ "Secure Laboratories And Research Data\n",
/*0x08*/ "Activate Moon Pool Lift\n",
/*0x09*/ "Rendezvous And Escape With Elvis\n",
/*0x0a*/ "Cripple the engines and the ship will \ndrift... Perfect!\n",
/*0x0b*/ "This must be where the sub's controlled from.\n",
/*0x0c*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n",
/*0x0d*/ "They'll be unable to conduct any operations\nwithout any power.\n",
/*0x0e*/ "Autopilot System Has Been Deactivated.\n",
/*0x0f*/ "GPS System Has Been Deactivated.\n",
/*0x10*/ "Critical Mission Object Has Been Destroyed.\n",
/*0x11*/ "Reactor Shutdown Control Hatch Opened.\n",
/*0x12*/ "Reactor Has Been Shut Down.\n",
/*0x13*/ "Diving Control Centre Has Been Located.\n",
/*0x14*/ "Critical Mission Personnel Killed.\n",
/*0x15*/ "Research Data Has Been Secured.\n",
/*0x16*/ "\n",
/*0x17*/ "\n",
/*0x18*/ "Research Data Disk\n",
/*0x19*/ "A Research Data Disk\n",
/*0x1a*/ "Picked up a Research Data Disk\n",
/*0x1b*/ "Critical Mission Personnel Have Been Killed.\n",
/*0x1c*/ "LIft Door Has Been Unlocked.\n",
/*0x1d*/ "LIft Has Been Activated.\n",
/*0x1e*/ "Operation Denied - Hangar Doors Still Closed.\n",
/*0x1f*/ "Unlocking Sequence Has Been Reset.\n",
/*0x20*/ "You go on ahead Jo, I'll secure the perimeter.\nWe'll meet up later.\n",
/*0x21*/ "Elvis Has Been Killed.\n",
/*0x22*/ "Joanna..what took you so long?. Follow me,\nlets get out of this old tub.\n",
/*0x23*/ "Civilians Have Been Killed.\n",
/*0x24*/ "Critical Mission Objects Has Been Destroyed.\n",
/*0x25*/ "Alarm Has Been Activated.\n",
/*0x26*/ "Alarm Has Been De-Activated.\n",
/*0x27*/ "Right. The diving operation has been disrupted on the surface. Time for a swim.",
/*0x28*/ "I hope the government don't want to use this ship anytime soon.",
/*0x29*/ "Do you think we were a little heavy-handed?",
/*0x2a*/ "Naaahhhh.",
/*0x2b*/ NULL,
/*0x2c*/ NULL,
/*0x2d*/ NULL,
/*0x2e*/ NULL,
/*0x2f*/ NULL,
};

52
src/lang/damP.c Normal file
View File

@ -0,0 +1,52 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n",
/*0x01*/ "Cetan Ship\n",
/*0x02*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n",
/*0x03*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "Deactivate GPS and autopilot\n",
/*0x06*/ "Disable primary power source\n",
/*0x07*/ "Secure laboratories and research data\n",
/*0x08*/ "Activate Moon Pool lift\n",
/*0x09*/ "Rendezvous and escape with Elvis\n",
/*0x0a*/ "Cripple the engines and the ship will \ndrift... Perfect!\n",
/*0x0b*/ "This must be where the sub's controlled from.\n",
/*0x0c*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n",
/*0x0d*/ "They'll be unable to conduct any operations\nwithout any power.\n",
/*0x0e*/ "Autopilot system has been deactivated.\n",
/*0x0f*/ "GPS system has been deactivated.\n",
/*0x10*/ "Critical mission object has been destroyed.\n",
/*0x11*/ "Reactor shutdown control hatch opened.\n",
/*0x12*/ "Reactor has been shut down.\n",
/*0x13*/ "Diving control center has been located.\n",
/*0x14*/ "Critical mission personnel killed.\n",
/*0x15*/ "Research data has been secured.\n",
/*0x16*/ "\n",
/*0x17*/ "\n",
/*0x18*/ "Research data disk\n",
/*0x19*/ "A research data disk\n",
/*0x1a*/ "Picked up a research data disk.\n",
/*0x1b*/ "Critical mission personnel have been killed.\n",
/*0x1c*/ "Lift door has been unlocked.\n",
/*0x1d*/ "Lift has been activated.\n",
/*0x1e*/ "Operation denied - hangar doors still closed.\n",
/*0x1f*/ "Unlocking sequence has been reset.\n",
/*0x20*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n",
/*0x21*/ "Elvis has been killed.\n",
/*0x22*/ "Joanna... What took you so long? Follow me -\nlet's get out of this old tub.\n",
/*0x23*/ "Civilians have been killed.\n",
/*0x24*/ "Critical mission object has been destroyed.\n",
/*0x25*/ "Alarm has been activated.\n",
/*0x26*/ "Alarm has been deactivated.\n",
/*0x27*/ "Right. The diving operation has been disrupted on the surface.\n",
/*0x28*/ "I hope the government don't want to use this ship anytime soon.\n",
/*0x29*/ "Do you think we were a little heavy-handed?\n",
/*0x2a*/ "Naaahhhh.\n",
/*0x2b*/ "Pull the plug on that now.\n",
/*0x2c*/ "Switch this thing off.\n",
/*0x2d*/ "I'll shut it down.\n",
/*0x2e*/ "Please don't hurt me.\n",
/*0x2f*/ "Die, you traitors.\n",
};

52
src/lang/dam_str.c Normal file
View File

@ -0,0 +1,52 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n",
/*0x01*/ "Cetan Ship\n",
/*0x02*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n",
/*0x03*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "Deactivate GPS and autopilot\n",
/*0x06*/ "Disable primary power source\n",
/*0x07*/ "Secure laboratories and research data\n",
/*0x08*/ "Activate Moon Pool lift\n",
/*0x09*/ "Rendezvous and escape with Elvis\n",
/*0x0a*/ "Cripple the engines and the ship will \ndrift... Perfect!\n",
/*0x0b*/ "This must be where the sub's controlled from.\n",
/*0x0c*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n",
/*0x0d*/ "They'll be unable to conduct any operations\nwithout any power.\n",
/*0x0e*/ "Autopilot system has been deactivated.\n",
/*0x0f*/ "GPS system has been deactivated.\n",
/*0x10*/ "Critical mission object has been destroyed.\n",
/*0x11*/ "Reactor shutdown control hatch opened.\n",
/*0x12*/ "Reactor has been shut down.\n",
/*0x13*/ "Diving control center has been located.\n",
/*0x14*/ "Critical mission personnel killed.\n",
/*0x15*/ "Research data has been secured.\n",
/*0x16*/ "\n",
/*0x17*/ "\n",
/*0x18*/ "Research data disk\n",
/*0x19*/ "A research data disk\n",
/*0x1a*/ "Picked up a research data disk.\n",
/*0x1b*/ "Critical mission personnel have been killed.\n",
/*0x1c*/ "Lift door has been unlocked.\n",
/*0x1d*/ "Lift has been activated.\n",
/*0x1e*/ "Operation denied - hangar doors still closed.\n",
/*0x1f*/ "Unlocking sequence has been reset.\n",
/*0x20*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n",
/*0x21*/ "Elvis has been killed.\n",
/*0x22*/ "Joanna... What took you so long? Follow me -\nlet's get out of this old tub.\n",
/*0x23*/ "Civilians have been killed.\n",
/*0x24*/ "Critical mission object has been destroyed.\n",
/*0x25*/ "Alarm has been activated.\n",
/*0x26*/ "Alarm has been deactivated.\n",
/*0x27*/ "Right. The diving operation has been disrupted on the surface.\n",
/*0x28*/ "I hope the government don't want to use this ship anytime soon.\n",
/*0x29*/ "Do you think we were a little heavy-handed?\n",
/*0x2a*/ "Naaahhhh.\n",
/*0x2b*/ "Pull the plug on that now.\n",
/*0x2c*/ "Switch this thing off.\n",
/*0x2d*/ "I'll shut it down.\n",
/*0x2e*/ "Please don't hurt me.\n",
/*0x2f*/ "Die, you traitors.\n",
};

88
src/lang/depoE.c Normal file
View File

@ -0,0 +1,88 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the CamSpy. Once shut down, the CamSpy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n",
/*0x01*/ "G5 BUILDING\n",
/*0x02*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n",
/*0x03*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n",
/*0x04*/ NULL,
/*0x05*/ NULL,
/*0x06*/ NULL,
/*0x07*/ NULL,
/*0x08*/ NULL,
/*0x09*/ "Disable damping field generator\n",
/*0x0a*/ "Deactivate laser grid systems\n",
/*0x0b*/ "Holograph meeting conspirators\n",
/*0x0c*/ "Retrieve Dr. Caroll backup from safe\n",
/*0x0d*/ "Exit building\n",
/*0x0e*/ "Obtain alpha key card.\n",
/*0x0f*/ "Guard's\n",
/*0x10*/ "Level 1 key card\n",
/*0x11*/ "Guard's key card\n",
/*0x12*/ "Picked up guard's key card.\n",
/*0x13*/ "Obtain alpha key card.\n",
/*0x14*/ "Guard's\n",
/*0x15*/ "Level 2 key card\n",
/*0x16*/ "Guard's key card\n",
/*0x17*/ "Picked up guard's key card.\n",
/*0x18*/ "Mission critical object destroyed.\n",
/*0x19*/ "Damping field generator shut down.\n",
/*0x1a*/ "Generator cannot be restarted.\n",
/*0x1b*/ "Laser grid unit shut down.\n",
/*0x1c*/ "Laser grid unit activated.\n",
/*0x1d*/ "All laser grid systems shut down.\n",
/*0x1e*/ "Obtain DAT tape.\n",
/*0x1f*/ "Dr. Caroll's\n",
/*0x20*/ "Backup disk\n",
/*0x21*/ "Backup disk\n",
/*0x22*/ "Picked up backup disk.\n",
/*0x23*/ "Door Decoder attached to access pad.\n",
/*0x24*/ "Initiating cracking routines.\n",
/*0x25*/ "Door Decoder finished - door unlocked.\n",
/*0x26*/ "INTRUDER ALERT - all security to the vault.\n",
/*0x27*/ "Door Decoder placed correctly.\n",
/*0x28*/ "Door Decoder incorrectly positioned.\n",
/*0x29*/ "Conspirators have been alerted.\n",
/*0x2a*/ "Alarm activated.\n",
/*0x2b*/ "Alarm deactivated.\n",
/*0x2c*/ "Safe door is locked.\n",
/*0x2d*/ "Door Decoder attached.\n",
/*0x2e*/ "Obtain Door Exploder.\n",
/*0x2f*/ "Dr. Caroll's\n",
/*0x30*/ "Door Exploder\n",
/*0x31*/ "Door Exploder\n",
/*0x32*/ "Picked up Door Exploder.\n",
/*0x33*/ "Objectives incomplete - MISSION FAILED.\n",
/*0x34*/ "MISSION SUCCESSFUL\n",
/*0x35*/ "Communications bug placed correctly.\n",
/*0x36*/ "Communications bug placed incorrectly.\n",
/*0x37*/ "Obtain CamSpy.\n",
/*0x38*/ "Dr. Caroll's\n",
/*0x39*/ "CamSpy\n",
/*0x3a*/ "A CamSpy\n",
/*0x3b*/ "Picked up a CamSpy.\n",
/*0x3c*/ "There's no way through while those \nlasers are active.\n",
/*0x3d*/ "That must be the meeting room up ahead. \nTime to use the CamSpy.\n",
/*0x3e*/ "The safe's heavily encrypted. \nThe decoder's gonna take a little longer.\n",
/*0x3f*/ "Time to leave! Let's get to the door I set \nup earlier.\n",
/*0x40*/ "Mission critical object destroyed.\n",
/*0x41*/ "Stand back, Joanna. We'll create your escape \nroute.\n",
/*0x42*/ "\n",
/*0x43*/ "\n",
/*0x44*/ "Detonator\n",
/*0x45*/ "Detonator\n",
/*0x46*/ "Picked up Detonator.\n",
/*0x47*/ "CamSpy has been destroyed - abort mission.\n",
/*0x48*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n",
/*0x49*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n",
/*0x4a*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n",
/*0x4b*/ "The President turned down your request for \nthe loan of the Pelagic II?\n",
/*0x4c*/ "Could it be you overestimated your \ninfluence over him?\n",
/*0x4d*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n",
/*0x4e*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n",
/*0x4f*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n",
/*0x50*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n",
/*0x51*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n",
/*0x52*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51... that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n",
/*0x53*/ "Area 51? But what about the President?\n",
};

88
src/lang/depoJ.c Normal file
View File

@ -0,0 +1,88 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the operation of any recording equipment. Locate it and shut it down.\n\n|Objective Two: - De-activate Laser Grid Systems\n\nAn examination of the power grid of the G5 building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Record Meeting\n\nThe Eye-Spy device is an excellent way to record the meeting without alerting the De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 building. If we can obtain it it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside and you may save yourself some time.\n\nEND\n",
/*0x01*/ "G5 BUILDING\n",
/*0x02*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly softly, Joanna.\n\n|Objective One: - De-activate Laser Grid Systems\n\nAn examination of the power grid of the G5 building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Record Meeting\n\nThe Eye-Spy device is an excellent way to record the meeting without alerting the De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 building. If we can obtain it it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside and you may save yourself some time.\n\nEND\n",
/*0x03*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly softly, Joanna.\n\n|Objective One: - Record Meeting\n\nThe Eye-Spy device is an excellent way to record the meeting without alerting the De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 building. If we can obtain it it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside and you may save yourself some time.\n\nEND\n",
/*0x04*/ NULL,
/*0x05*/ NULL,
/*0x06*/ NULL,
/*0x07*/ NULL,
/*0x08*/ NULL,
/*0x09*/ "Disable Damping Field Generator\n",
/*0x0a*/ "De-activate Laser Grid Systems\n",
/*0x0b*/ "Photograph Meeting Conspirators\n",
/*0x0c*/ "Retrieve Dr Caroll Backup From Safe\n",
/*0x0d*/ "Exit Building\n",
/*0x0e*/ "Obtain Alpha Keycard\n",
/*0x0f*/ "Guards\n",
/*0x10*/ "Level 1 Keycard\n",
/*0x11*/ "Guards Keycard\n",
/*0x12*/ "Picked up Guards Keycard.\n",
/*0x13*/ "Obtain Alpha Keycard\n",
/*0x14*/ "Guards\n",
/*0x15*/ "Level 2 Keycard\n",
/*0x16*/ "Guards Keycard\n",
/*0x17*/ "Picked up Guards Keycard.\n",
/*0x18*/ "Mission Critical Object Destroyed\n",
/*0x19*/ "Damping Field Generator Shut Down\n",
/*0x1a*/ "Generator Cannot Be Restarted\n",
/*0x1b*/ "Laser Grid Unit Shut Down\n",
/*0x1c*/ "Laser Grid Unit Activated\n",
/*0x1d*/ "All Laser Grid Systems Shut Down\n",
/*0x1e*/ "Obtain Dat Tape\n",
/*0x1f*/ "Dr Carolls\n",
/*0x20*/ "Backup Disk\n",
/*0x21*/ "Backup Disk\n",
/*0x22*/ "Picked up Backup Disc\n",
/*0x23*/ "Door Decoder Attached To Access Pad\n",
/*0x24*/ "Initiating Cracking Routines\n",
/*0x25*/ "Door Decoder Finished - Door Unlocked\n",
/*0x26*/ "INTRUDER ALERT - all security to the safe\n",
/*0x27*/ "Door Decoder Placed Correctly\n",
/*0x28*/ "Door Decoder Incorrectly Positioned\n",
/*0x29*/ "Conspirators Have Been Alerted\n",
/*0x2a*/ "Alarm Activated\n",
/*0x2b*/ "Alarm Deactivated\n",
/*0x2c*/ "Safe Door Is Locked\n",
/*0x2d*/ "Door Decoder attached\n",
/*0x2e*/ "Obtain Door Exploder\n",
/*0x2f*/ "Dr Carolls\n",
/*0x30*/ "Door Exploder\n",
/*0x31*/ "Door Exploder\n",
/*0x32*/ "Picked up Door Exploder\n",
/*0x33*/ "Objectives Incomplete - MISSION FAILED\n",
/*0x34*/ "MISSION SUCCESSFUL\n",
/*0x35*/ "Communications Bug Placed Correctly\n",
/*0x36*/ "Communications Bug Placed Incorrectly\n",
/*0x37*/ "Obtain Eye Spy\n",
/*0x38*/ "Dr Carolls\n",
/*0x39*/ "Eye Spy\n",
/*0x3a*/ "An Eye Spy\n",
/*0x3b*/ "Picked up an Eye Spy\n",
/*0x3c*/ "There's no way through while those \nlasers are active.\n",
/*0x3d*/ "I can't go any further, but the Eye-Spy can.\n",
/*0x3e*/ "A safe that big will be heavily encrypted.\nThe decoder will take longer than usual.\n",
/*0x3f*/ "Time to leave! Let's get to the door I set \nup earlier.\n",
/*0x40*/ "Mission Critical Object Destroyed\n",
/*0x41*/ "Stand back Joanna, we'll create your escape\nroute.\n",
/*0x42*/ "\n",
/*0x43*/ "\n",
/*0x44*/ "Detonator\n",
/*0x45*/ "Detonator\n",
/*0x46*/ "Picked up Detonator\n",
/*0x47*/ "EyeSpy Has Been Destroyed - Abort Mission\n",
/*0x48*/ "We've recovered the sapient from Carrington and altered its programming. It no longer has a personality, so there will be no further incidents.",
/*0x49*/ "This will reduce its efficency. My team will have to take it to the core themselves. This will endanger them. You should have anticipated that the sapient might develop a troublesome moral code.",
/*0x4a*/ "No-one could have predicted that! And I resent being singled out for blame! What about him?",
/*0x4b*/ "The President turned down your request for the loan of the Pelagic 2?",
/*0x4c*/ "Could it be you over-estimated your influence over him?",
/*0x4d*/ "No! Perhaps I underestimated his resolve. We have a contingency plan ready to go, and will move as soon as the presidential entourage arrives at the airbase. All I need from the President is a tissue sample.",
/*0x4e*/ "Ha! Assuming you don't get any interference. If Carrington has pieced together enough of this he will have called for reinforcements.",
/*0x4f*/ "There will be no outside help for Mr. Carrington. The technology you gave us is installed in Nevada and fully operational. We can intercept any craft they use.",
/*0x50*/ "Then the devices we gave you are working correctly? Good. Because we believe that anything which does not work correctly should be destroyed. Consider that as you follow your 'back-up plans'.",
/*0x51*/ "Agent Dark reporting in! Prepare to receive a download of the meeting data. Priority request for an Institute Support Team to protect the President before he goes to Alaska.",
/*0x52*/ "No time for that now, Agent Dark. There's been a development during radio silence. The craft carrying those 'friends' I was talking about was shot down over Nevada. The weapon responsible was fired from Area 51; that's where the survivors and debris will have been taken. You're to prep for immediate despatch when you return here. Carrington out.",
/*0x53*/ "Area 51? But what about the President?",
};

88
src/lang/depoP.c Normal file
View File

@ -0,0 +1,88 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the cam spy. Once shut down, the cam spy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n",
/*0x01*/ "G5 BUILDING\n",
/*0x02*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n",
/*0x03*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n",
/*0x04*/ NULL,
/*0x05*/ NULL,
/*0x06*/ NULL,
/*0x07*/ NULL,
/*0x08*/ NULL,
/*0x09*/ "Disable damping field generator\n",
/*0x0a*/ "Deactivate laser grid systems\n",
/*0x0b*/ "Holograph meeting conspirators\n",
/*0x0c*/ "Retrieve Dr. Caroll backup from safe\n",
/*0x0d*/ "Exit building\n",
/*0x0e*/ "Obtain alpha key card.\n",
/*0x0f*/ "Guard's\n",
/*0x10*/ "Level 1 key card\n",
/*0x11*/ "Guard's key card\n",
/*0x12*/ "Picked up guard's key card.\n",
/*0x13*/ "Obtain alpha key card.\n",
/*0x14*/ "Guard's\n",
/*0x15*/ "Level 2 key card\n",
/*0x16*/ "Guard's key card\n",
/*0x17*/ "Picked up guard's key card.\n",
/*0x18*/ "Mission critical object destroyed.\n",
/*0x19*/ "Damping field generator shut down.\n",
/*0x1a*/ "Generator cannot be restarted.\n",
/*0x1b*/ "Laser grid unit shut down.\n",
/*0x1c*/ "Laser grid unit activated.\n",
/*0x1d*/ "All laser grid systems shut down.\n",
/*0x1e*/ "Obtain DAT tape.\n",
/*0x1f*/ "Dr. Caroll's\n",
/*0x20*/ "Backup disk\n",
/*0x21*/ "Backup disk\n",
/*0x22*/ "Picked up backup disk.\n",
/*0x23*/ "Door Decoder attached to access pad.\n",
/*0x24*/ "Initiating cracking routines.\n",
/*0x25*/ "Door Decoder finished - door unlocked.\n",
/*0x26*/ "INTRUDER ALERT - all security to the vault.\n",
/*0x27*/ "Door Decoder placed correctly.\n",
/*0x28*/ "Door Decoder incorrectly positioned.\n",
/*0x29*/ "Conspirators have been alerted.\n",
/*0x2a*/ "Alarm activated.\n",
/*0x2b*/ "Alarm deactivated.\n",
/*0x2c*/ "Safe door is locked.\n",
/*0x2d*/ "Door Decoder attached.\n",
/*0x2e*/ "Obtain Door Exploder.\n",
/*0x2f*/ "Dr. Caroll's\n",
/*0x30*/ "Door Exploder\n",
/*0x31*/ "Door Exploder\n",
/*0x32*/ "Picked up Door Exploder.\n",
/*0x33*/ "Objectives incomplete - MISSION FAILED.\n",
/*0x34*/ "MISSION SUCCESSFUL\n",
/*0x35*/ "Communications bug placed correctly.\n",
/*0x36*/ "Communications bug placed incorrectly.\n",
/*0x37*/ "Obtain CamSpy.\n",
/*0x38*/ "Dr. Caroll's\n",
/*0x39*/ "CamSpy\n",
/*0x3a*/ "A CamSpy\n",
/*0x3b*/ "Picked up a CamSpy.\n",
/*0x3c*/ "There's no way through while those \nlasers are active.\n",
/*0x3d*/ "That must be the meeting room up ahead.\nTime to use the CamSpy.\n",
/*0x3e*/ "The safe's heavily encrypted.\nThe decoder's gonna take a little longer.\n",
/*0x3f*/ "Time to leave! Let's get to the door I set \nup earlier.\n",
/*0x40*/ "Mission critical object destroyed.\n",
/*0x41*/ "Stand back, Joanna. We'll create your escape\nroute.\n",
/*0x42*/ "\n",
/*0x43*/ "\n",
/*0x44*/ "Detonator\n",
/*0x45*/ "Detonator\n",
/*0x46*/ "Picked up Detonator.\n",
/*0x47*/ "CamSpy has been destroyed - abort mission.\n",
/*0x48*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n",
/*0x49*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n",
/*0x4a*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n",
/*0x4b*/ "The President turned down your request for \nthe loan of the Pelagic II?\n",
/*0x4c*/ "Could it be you overestimated your \ninfluence over him?\n",
/*0x4d*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n",
/*0x4e*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n",
/*0x4f*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n",
/*0x50*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe that \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n",
/*0x51*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n",
/*0x52*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51; that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n",
/*0x53*/ "Area 51? But what about the President?\n",
};

88
src/lang/depo_str.c Normal file
View File

@ -0,0 +1,88 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the cam spy. Once shut down, the cam spy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n",
/*0x01*/ "G5 BUILDING\n",
/*0x02*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n",
/*0x03*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n",
/*0x04*/ NULL,
/*0x05*/ NULL,
/*0x06*/ NULL,
/*0x07*/ NULL,
/*0x08*/ NULL,
/*0x09*/ "Disable damping field generator\n",
/*0x0a*/ "Deactivate laser grid systems\n",
/*0x0b*/ "Holograph meeting conspirators\n",
/*0x0c*/ "Retrieve Dr. Caroll backup from safe\n",
/*0x0d*/ "Exit building\n",
/*0x0e*/ "Obtain alpha key card.\n",
/*0x0f*/ "Guard's\n",
/*0x10*/ "Level 1 key card\n",
/*0x11*/ "Guard's key card\n",
/*0x12*/ "Picked up guard's key card.\n",
/*0x13*/ "Obtain alpha key card.\n",
/*0x14*/ "Guard's\n",
/*0x15*/ "Level 2 key card\n",
/*0x16*/ "Guard's key card\n",
/*0x17*/ "Picked up guard's key card.\n",
/*0x18*/ "Mission critical object destroyed.\n",
/*0x19*/ "Damping field generator shut down.\n",
/*0x1a*/ "Generator cannot be restarted.\n",
/*0x1b*/ "Laser grid unit shut down.\n",
/*0x1c*/ "Laser grid unit activated.\n",
/*0x1d*/ "All laser grid systems shut down.\n",
/*0x1e*/ "Obtain DAT tape.\n",
/*0x1f*/ "Dr. Caroll's\n",
/*0x20*/ "Backup disk\n",
/*0x21*/ "Backup disk\n",
/*0x22*/ "Picked up backup disk.\n",
/*0x23*/ "Door Decoder attached to access pad.\n",
/*0x24*/ "Initiating cracking routines.\n",
/*0x25*/ "Door Decoder finished - door unlocked.\n",
/*0x26*/ "INTRUDER ALERT - all security to the vault.\n",
/*0x27*/ "Door Decoder placed correctly.\n",
/*0x28*/ "Door Decoder incorrectly positioned.\n",
/*0x29*/ "Conspirators have been alerted.\n",
/*0x2a*/ "Alarm activated.\n",
/*0x2b*/ "Alarm deactivated.\n",
/*0x2c*/ "Safe door is locked.\n",
/*0x2d*/ "Door Decoder attached.\n",
/*0x2e*/ "Obtain Door Exploder.\n",
/*0x2f*/ "Dr. Caroll's\n",
/*0x30*/ "Door Exploder\n",
/*0x31*/ "Door Exploder\n",
/*0x32*/ "Picked up Door Exploder.\n",
/*0x33*/ "Objectives incomplete - MISSION FAILED.\n",
/*0x34*/ "MISSION SUCCESSFUL\n",
/*0x35*/ "Communications bug placed correctly.\n",
/*0x36*/ "Communications bug placed incorrectly.\n",
/*0x37*/ "Obtain CamSpy.\n",
/*0x38*/ "Dr. Caroll's\n",
/*0x39*/ "CamSpy\n",
/*0x3a*/ "A CamSpy\n",
/*0x3b*/ "Picked up a CamSpy.\n",
/*0x3c*/ "There's no way through while those \nlasers are active.\n",
/*0x3d*/ "That must be the meeting room up ahead.\nTime to use the CamSpy.\n",
/*0x3e*/ "The safe's heavily encrypted.\nThe decoder's gonna take a little longer.\n",
/*0x3f*/ "Time to leave! Let's get to the door I set \nup earlier.\n",
/*0x40*/ "Mission critical object destroyed.\n",
/*0x41*/ "Stand back, Joanna. We'll create your escape\nroute.\n",
/*0x42*/ "\n",
/*0x43*/ "\n",
/*0x44*/ "Detonator\n",
/*0x45*/ "Detonator\n",
/*0x46*/ "Picked up Detonator.\n",
/*0x47*/ "CamSpy has been destroyed - abort mission.\n",
/*0x48*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n",
/*0x49*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n",
/*0x4a*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n",
/*0x4b*/ "The President turned down your request for \nthe loan of the Pelagic II?\n",
/*0x4c*/ "Could it be you overestimated your \ninfluence over him?\n",
/*0x4d*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n",
/*0x4e*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n",
/*0x4f*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n",
/*0x50*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe that \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n",
/*0x51*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n",
/*0x52*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51; that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n",
/*0x53*/ "Area 51? But what about the President?\n",
};

3
src/lang/destE.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/destJ.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/destP.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/dest_str.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

132
src/lang/dishE.c Normal file
View File

@ -0,0 +1,132 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ NULL,
/*0x01*/ NULL,
/*0x02*/ NULL,
/*0x03*/ NULL,
/*0x04*/ NULL,
/*0x05*/ NULL,
/*0x06*/ NULL,
/*0x07*/ NULL,
/*0x08*/ "Collect Night Vision from table to begin.\n",
/*0x09*/ "Activate the Night Vision.\nLocate the light switch.\nTurn the lights back on.\n",
/*0x0a*/ "Collect Data Uplink from table to begin.\n",
/*0x0b*/ "Stand next to the terminal and use the Uplink.\n",
/*0x0c*/ "You need to be holding the Data Uplink.\n",
/*0x0d*/ "Connection established...\n",
/*0x0e*/ "Terminal has been successfully hacked.\n",
/*0x0f*/ "Connection broken - too far from PC.\n",
/*0x10*/ "Collect ECM Mine from table to begin.\n",
/*0x11*/ "Locate Hub and throw ECM Mine onto Hub.\n",
/*0x12*/ "ECM Mine has been placed incorrectly.\n",
/*0x13*/ "ECM Mine has been placed correctly.\n",
/*0x14*/ "Collect CamSpy from table to begin.\n",
/*0x15*/ "Locate Info Room PC and holograph it.\n",
/*0x16*/ "Info Room PC successfully holographed.\n",
/*0x17*/ "Lights have been reactivated.\n",
/*0x18*/ "Collect Door Decoder from table to begin.\n",
/*0x19*/ "Use Decoder on door pad to unlock it.\n",
/*0x1a*/ "You need to be holding the Door Decoder.\n",
/*0x1b*/ "Decoder attached. Initiating cracking routines...\n",
/*0x1c*/ "Decoding complete. Door has been unlocked.\n",
/*0x1d*/ "Collect Tracker from table to begin.\n",
/*0x1e*/ "Locate IR Scanner using Tracker.\n",
/*0x1f*/ "IR Scanner has been successfully located.\n",
/*0x20*/ "Collect IR Scanner from table to begin.\n",
/*0x21*/ "Locate secret door using IR Scanner.\n",
/*0x22*/ "Secret door has been successfully located.\n",
/*0x23*/ "Collect X-Ray Scanner from table to begin.\n",
/*0x24*/ "Find hidden switches to shut down laser grid.\n",
/*0x25*/ "All laser grids have been deactivated.\n",
/*0x26*/ "Collect Disguise from table to begin.\n",
/*0x27*/ "Fool someone into giving you Cloaking Device.\n",
/*0x28*/ "Cloaking Device successfully retrieved.\n",
/*0x29*/ "Laser Grid 1 has been deactivated.\n",
/*0x2a*/ "Laser Grid 2 has been deactivated.\n",
/*0x2b*/ "I'm here to pick up the equipment.\n",
/*0x2c*/ "Go away, Joanna. You're not fooling anybody!\n",
/*0x2d*/ "Here you go. Don't drop it now.\n",
/*0x2e*/ "Cloaking Device has been secured successfully.\n",
/*0x2f*/ "You're meant to use the Disguise, remember?\n",
/*0x30*/ "You'll have to do better than that, Joanna.\n",
/*0x31*/ "Joanna, where did you spring from?\n",
/*0x32*/ "You have been detected by the camera.\n",
/*0x33*/ "Collect Cloaking Device from table to begin.\n",
/*0x34*/ "Use Cloaking Device and locate Carrington.\n",
/*0x35*/ "I think we can safely say your training\nis now complete!\n",
/*0x36*/ "Mission complete - Device Training passed!\n",
/*0x37*/ "Mission failed - you have been detected.\n",
/*0x38*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n",
/*0x39*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n",
/*0x3a*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n",
/*0x3b*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n",
/*0x3c*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n",
/*0x3d*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n",
/*0x3e*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n",
/*0x3f*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n",
/*0x40*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n",
/*0x41*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n",
/*0x42*/ "Joanna, it's good to see you.\n",
/*0x43*/ "Come with me.\nI'll walk you round the training rooms.\n",
/*0x44*/ "The information center is through this door.\n",
/*0x45*/ "In here we have the device lab.\n",
/*0x46*/ "This leads to the simulant training room.\n",
/*0x47*/ "This is the firing range, Jo.\n",
/*0x48*/ "This corridor leads down to the hangar.\n",
/*0x49*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n",
/*0x4a*/ "Press B Button when crate grabbed to release it.\n",
/*0x4b*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n",
/*0x4c*/ "Double tap B Button when on Hovbike to dismount.\n",
/*0x4d*/ "OPENING DOORS\nPress B Button next to door to open it.\n",
/*0x4e*/ "B Button will also activate any object nearby.\n",
/*0x4f*/ "ELEVATORS\nPress B Button next to door to call elevator.\n",
/*0x50*/ "Cannot exit while training is in progress.\n",
/*0x51*/ "Switch Code 1 has been obtained.\n",
/*0x52*/ "Switch Code 2 has been obtained.\n",
/*0x53*/ "Switch Code 3 has been obtained.\n",
/*0x54*/ "Switch Code 4 has been obtained.\n",
/*0x55*/ "LOOK UP\n- Press Down C Button to look up at the target.\n",
/*0x56*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n",
/*0x57*/ "Holoprogram 2 has been completed successfully.\n",
/*0x58*/ "Holoprogram 4 has been completed successfully.\n",
/*0x59*/ "Holoprogram 5 has been completed successfully.\n",
/*0x5a*/ "Guard has been successfully disarmed.\n",
/*0x5b*/ "Guard has been successfully knocked out.\n",
/*0x5c*/ "Disarm this live target if you can.\n",
/*0x5d*/ "Knock out this target - stealth is the key.\n",
/*0x5e*/ "And the final guard...\n",
/*0x5f*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n",
/*0x60*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n",
/*0x61*/ "Holoprogram 3 has been completed successfully.\n",
/*0x62*/ "Activate all the switches.\n",
/*0x63*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n",
/*0x64*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n",
/*0x65*/ "Code 1 has been obtained.\n",
/*0x66*/ "Code 2 has been obtained.\n",
/*0x67*/ "Code 3 has been obtained.\n",
/*0x68*/ "Code 4 has been obtained.\n",
/*0x69*/ "Training failed - you must face forward.\n",
/*0x6a*/ "Holoprogram 1 has been completed successfully.\n",
/*0x6b*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n",
/*0x6c*/ "Now try against a moving target...\n",
/*0x6d*/ "And finally against a target that fights back.\n",
/*0x6e*/ "Defeat all enemies without getting hit.\n",
/*0x6f*/ "Training failed - you have been hit.\n",
/*0x70*/ "Holoprogram 6 has been completed successfully.\n",
/*0x71*/ "Holoprogram 7 has been completed successfully.\n",
/*0x72*/ "TERMINALS\n- Press B Button next to terminal to use it.\n",
/*0x73*/ "Now activate the red terminals on the wall.\n",
/*0x74*/ "PP7\n",
/*0x75*/ "TT33\n",
/*0x76*/ "Skorpion\n",
/*0x77*/ "AK47\n",
/*0x78*/ "Uzi 9mm\n",
/*0x79*/ "MP5K\n",
/*0x7a*/ "M-16\n",
/*0x7b*/ "FNP90\n",
/*0x7c*/ "Okay, Jo, I'll leave you to prepare for the mission.\n",
/*0x7d*/ NULL,
/*0x7e*/ NULL,
/*0x7f*/ NULL,
};

132
src/lang/dishJ.c Normal file
View File

@ -0,0 +1,132 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ NULL,
/*0x01*/ NULL,
/*0x02*/ NULL,
/*0x03*/ NULL,
/*0x04*/ NULL,
/*0x05*/ NULL,
/*0x06*/ NULL,
/*0x07*/ NULL,
/*0x08*/ "Collect Night Sight From Table To Begin\n",
/*0x09*/ "Activate The Night Sight\nLocate The Light Switch\nTurn The Lights Back On\n",
/*0x0a*/ "Collect Data Uplink From Table To Begin\n",
/*0x0b*/ "Stand next to the terminal and use the uplink\n",
/*0x0c*/ "You Need To Be Holding The Data Uplink\n",
/*0x0d*/ "Connection Established...\n",
/*0x0e*/ "Terminal Has Been Successfully Hacked\n",
/*0x0f*/ "Connection Broken - Too Far From PC\n",
/*0x10*/ "Collect ECM Mine From Table To Begin\n",
/*0x11*/ "Locate Hub And Throw ECM Mine Onto Hub\n",
/*0x12*/ "ECM Mine Has Been Placed Incorrectly\n",
/*0x13*/ "ECM Mine Has Been Placed Correctly\n",
/*0x14*/ "Collect Eye-Spy From Table To Begin\n",
/*0x15*/ "Locate Info Room PC and Holograph It\n",
/*0x16*/ "Info Room PC Successfully Holographed\n",
/*0x17*/ "Lights Have Been Re-activated\n",
/*0x18*/ "Collect Door Decoder From Table To Begin\n",
/*0x19*/ "Use Decoder On Door Pad To Unlock It\n",
/*0x1a*/ "You Need To Be Holding The Door Decoder\n",
/*0x1b*/ "Decoder Attached. Initiating Cracking Routines..\n",
/*0x1c*/ "Decoding Complete. Door Has Been Unlocked.\n",
/*0x1d*/ "Collect Tracker From Table To Begin\n",
/*0x1e*/ "Locate IR Scanner Using Tracker\n",
/*0x1f*/ "IR Scanner Has Been Successfully Located\n",
/*0x20*/ "Collect IR Scanner From Table To Begin\n",
/*0x21*/ "Locate Secret Door Using IR Scanner\n",
/*0x22*/ "Secret Door Has Been Successfully Located\n",
/*0x23*/ "Collect XRay Scanner From Table To Begin\n",
/*0x24*/ "Find Hidden Switches To Shutdown Laser Grid\n",
/*0x25*/ "All Laser Grids Have Been Deactivated\n",
/*0x26*/ "Collect Disguise From Table To Begin\n",
/*0x27*/ "Fool Someone Into Giving You Cloaking Device\n",
/*0x28*/ "Cloaking Device Successfully Retrieved\n",
/*0x29*/ "Laser Grid 1 Has Been Deactivated\n",
/*0x2a*/ "Laser Grid 2 Has Been Deactivated\n",
/*0x2b*/ "I'm Here To Pick The Equipment\n",
/*0x2c*/ "Go away Joanna, you don't fool me!\n",
/*0x2d*/ "Here you go. Don't drop it now.\n",
/*0x2e*/ "Cloaking Device Has Been Secured Successfully\n",
/*0x2f*/ "You're Meant To Use The Disguise, remember?\n",
/*0x30*/ "You'll Have To Try Harder Than That Joanna\n",
/*0x31*/ "Joanna - Where Did You Spring From?\n",
/*0x32*/ "You Have Been Detected By The Camera\n",
/*0x33*/ "Collect Cloaking Device From Table To Begin\n",
/*0x34*/ "Use Cloaking Device And Locate Carrington\n",
/*0x35*/ "I think we can safely say you're training\nis now complete!\n",
/*0x36*/ "Mission Accomplished - Device Training Complete!\n",
/*0x37*/ "Mission Failed - You Have Been Detected\n",
/*0x38*/ "Select The Uplink\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Data Uplink And Release A\n",
/*0x39*/ "Select The EyeSpy\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Eye-Spy And Release A\n",
/*0x3a*/ "Select The Night Vision\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Night Vision And Release A\n",
/*0x3b*/ "Select The Door Decoder\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight DoorDecoder And Release A\n",
/*0x3c*/ "Select The X-Ray Scanner\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight X-Ray Scanner And Release A\n",
/*0x3d*/ "Select The Disguise\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Disguise And Release A\n",
/*0x3e*/ "Select The IR Scanner\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight IR Scanner And Release A\n",
/*0x3f*/ "Select The Tracker\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Tracker And Release A\n",
/*0x40*/ "Select The Cloaking Device\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Device And Release A\n",
/*0x41*/ "Select The ECM Mine\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight ECM Mine And Release A\n",
/*0x42*/ "Joanna, It's good to see you.\n",
/*0x43*/ "Come with me Joanna.\nI'll walk you to the training room.\n",
/*0x44*/ "The information centre is through this door.\n",
/*0x45*/ "In here we have the device lab.\n",
/*0x46*/ "This leads to the simulant training room.\n",
/*0x47*/ "This is the firing range Jo.\n",
/*0x48*/ "This corridor leads down to the hangar.\n",
/*0x49*/ "HOVERCRATE\nPress B next to Hovcrate to grab it...\n",
/*0x4a*/ "Press B when crate grabbed to release it.\n",
/*0x4b*/ "HOVERBIKE\nDouble Tap B next to Hovbike to ride it...\n",
/*0x4c*/ "Double Tap B when on Hovbike to dismount.\n",
/*0x4d*/ "OPENING DOORS\nPress B next to door to open it.\n",
/*0x4e*/ "B will also activate any object nearby.\n",
/*0x4f*/ "ELEVATORS\nPress B next to door to call elevator.\n",
/*0x50*/ "Cannot Exit While Training Is In Progress\n",
/*0x51*/ "Switch Code 1 Has Been Obtained.\n",
/*0x52*/ "Switch Code 2 Has Been Obtained.\n",
/*0x53*/ "Switch Code 3 Has Been Obtained.\n",
/*0x54*/ "Switch Code 4 Has Been Obtained.\n",
/*0x55*/ "LOOK UP\n- Press Down C To Look Up At The Target.\n",
/*0x56*/ "LOOK DOWN\n- Press Up C To Look Down At The Target.\n",
/*0x57*/ "Holoprogram 2 Has Been Completed Successfully.\n",
/*0x58*/ "Holoprogram 4 Has Been Completed Successfully.\n",
/*0x59*/ "Holoprogram 5 Has Been Completed Successfully.\n",
/*0x5a*/ "Guard Has Been Successfully Disarmed.\n",
/*0x5b*/ "Guard Has Been Successfully Knocked Out.\n",
/*0x5c*/ "Disarm This Live Target If You Can.\n",
/*0x5d*/ "Knock Out This Target - Stealth Is The Key.\n",
/*0x5e*/ "and the final guard....\n",
/*0x5f*/ "DUCK\n- Hold R Then Press Down C To Duck.\n",
/*0x60*/ "CROUCH\n- When Ducking, Hold R Then Press Down C To Duck.\n",
/*0x61*/ "Holoprogram 3 Has Been Completed Successfully.\n",
/*0x62*/ "Activate All The Switches.\n",
/*0x63*/ "Activate All Of The Wall Switches.\n- Be Quick, As They Will Quickly Reset.\n",
/*0x64*/ "Get The Access Codes By Examining Terminals.\n- Use The Codes On The Wall Terminals.\n",
/*0x65*/ "Code 1 Has Been Obtained.\n",
/*0x66*/ "Code 2 Has Been Obtained.\n",
/*0x67*/ "Code 3 Has Been Obtained.\n",
/*0x68*/ "Code 4 Has Been Obtained.\n",
/*0x69*/ "Training Failed - You Must Face Forward.\n",
/*0x6a*/ "Holoprogram 1 Has Been Completed Successfully.\n",
/*0x6b*/ "Unarmed Combat - Knock Out The Target.\n- Press Z repeatedly to punch.\n",
/*0x6c*/ "Now Try Against A Moving Target...\n",
/*0x6d*/ "And Finally Against A Target That Fights Back.\n",
/*0x6e*/ "Defeat All Enemies Without Getting Hit.\n",
/*0x6f*/ "Training Failed - You Have Been Hit.\n",
/*0x70*/ "Holoprogram 6 Has Been Completed Successfully.\n",
/*0x71*/ "Holoprogram 7 Has Been Completed Successfully.\n",
/*0x72*/ "TERMINALS\n- Press B next to terminal to use it.\n",
/*0x73*/ "Now Activate The Red Terminals On The Wall.\n",
/*0x74*/ NULL,
/*0x75*/ NULL,
/*0x76*/ NULL,
/*0x77*/ NULL,
/*0x78*/ NULL,
/*0x79*/ NULL,
/*0x7a*/ NULL,
/*0x7b*/ NULL,
/*0x7c*/ NULL,
/*0x7d*/ NULL,
/*0x7e*/ NULL,
/*0x7f*/ NULL,
};

132
src/lang/dishP.c Normal file
View File

@ -0,0 +1,132 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ NULL,
/*0x01*/ NULL,
/*0x02*/ NULL,
/*0x03*/ NULL,
/*0x04*/ NULL,
/*0x05*/ NULL,
/*0x06*/ NULL,
/*0x07*/ NULL,
/*0x08*/ "Collect Night Sight from table to begin.\n",
/*0x09*/ "Activate the Night Sight.\nLocate the light switch.\nTurn the lights back on.\n",
/*0x0a*/ "Collect Data Uplink from table to begin.\n",
/*0x0b*/ "Stand next to the terminal and use the Uplink.\n",
/*0x0c*/ "You need to be holding the Data Uplink.\n",
/*0x0d*/ "Connection established...\n",
/*0x0e*/ "Terminal has been successfully hacked.\n",
/*0x0f*/ "Connection broken - too far from PC.\n",
/*0x10*/ "Collect ECM Mine from table to begin.\n",
/*0x11*/ "Locate Hub and throw ECM Mine onto Hub.\n",
/*0x12*/ "ECM Mine has been placed incorrectly.\n",
/*0x13*/ "ECM Mine has been placed correctly.\n",
/*0x14*/ "Collect CamSpy from table to begin.\n",
/*0x15*/ "Locate Info Room PC and holograph it.\n",
/*0x16*/ "Info Room PC successfully holographed.\n",
/*0x17*/ "Lights have been reactivated.\n",
/*0x18*/ "Collect Door Decoder from table to begin.\n",
/*0x19*/ "Use Decoder on door pad to unlock it.\n",
/*0x1a*/ "You need to be holding the Door Decoder.\n",
/*0x1b*/ "Decoder attached. Initiating cracking routines...\n",
/*0x1c*/ "Decoding complete. Door has been unlocked.\n",
/*0x1d*/ "Collect Tracker from table to begin.\n",
/*0x1e*/ "Locate IR Scanner using Tracker.\n",
/*0x1f*/ "IR Scanner has been successfully located.\n",
/*0x20*/ "Collect IR Scanner from table to begin.\n",
/*0x21*/ "Locate secret door using IR Scanner.\n",
/*0x22*/ "Secret door has been successfully located.\n",
/*0x23*/ "Collect X-Ray Scanner from table to begin.\n",
/*0x24*/ "Find hidden switches to shut down laser grid.\n",
/*0x25*/ "All laser grids have been deactivated.\n",
/*0x26*/ "Collect Disguise from table to begin.\n",
/*0x27*/ "Fool someone into giving you Cloaking Device.\n",
/*0x28*/ "Cloaking Device successfully retrieved.\n",
/*0x29*/ "Laser Grid 1 has been deactivated.\n",
/*0x2a*/ "Laser Grid 2 has been deactivated.\n",
/*0x2b*/ "I'm here to pick up the equipment.\n",
/*0x2c*/ "Go away, Joanna. You're not fooling anybody!\n",
/*0x2d*/ "Here you go. Don't drop it now.\n",
/*0x2e*/ "Cloaking Device has been secured successfully.\n",
/*0x2f*/ "You're meant to use the Disguise, remember?\n",
/*0x30*/ "You'll have to do better than that, Joanna.\n",
/*0x31*/ "Joanna, where did you spring from?\n",
/*0x32*/ "You have been detected by the camera.\n",
/*0x33*/ "Collect Cloaking Device from table to begin.\n",
/*0x34*/ "Use Cloaking Device and locate Carrington.\n",
/*0x35*/ "I think we can safely say your training\nis now complete!\n",
/*0x36*/ "Mission complete - Device Training passed!\n",
/*0x37*/ "Mission failed - you have been detected.\n",
/*0x38*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n",
/*0x39*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n",
/*0x3a*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n",
/*0x3b*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n",
/*0x3c*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n",
/*0x3d*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n",
/*0x3e*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n",
/*0x3f*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n",
/*0x40*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n",
/*0x41*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n",
/*0x42*/ "Joanna, it's good to see you.\n",
/*0x43*/ "Come with me.\nI'll walk you round the training rooms.\n",
/*0x44*/ "The information center is through this door.\n",
/*0x45*/ "In here we have the device lab.\n",
/*0x46*/ "This leads to the simulant training room.\n",
/*0x47*/ "This is the firing range, Jo.\n",
/*0x48*/ "This corridor leads down to the hangar.\n",
/*0x49*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n",
/*0x4a*/ "Press B Button when crate grabbed to release it.\n",
/*0x4b*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n",
/*0x4c*/ "Double tap B Button when on Hovbike to dismount.\n",
/*0x4d*/ "OPENING DOORS\nPress B Button next to door to open it.\n",
/*0x4e*/ "B Button will also activate any object nearby.\n",
/*0x4f*/ "ELEVATORS\nPress B Button next to door to call elevator.\n",
/*0x50*/ "Cannot exit while training is in progress.\n",
/*0x51*/ "Switch Code 1 has been obtained.\n",
/*0x52*/ "Switch Code 2 has been obtained.\n",
/*0x53*/ "Switch Code 3 has been obtained.\n",
/*0x54*/ "Switch Code 4 has been obtained.\n",
/*0x55*/ "LOOK UP\n- Press Down C Button to look up at the target.\n",
/*0x56*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n",
/*0x57*/ "Holoprogram 2 has been completed successfully.\n",
/*0x58*/ "Holoprogram 4 has been completed successfully.\n",
/*0x59*/ "Holoprogram 5 has been completed successfully.\n",
/*0x5a*/ "Guard has been successfully disarmed.\n",
/*0x5b*/ "Guard has been successfully knocked out.\n",
/*0x5c*/ "Disarm this live target if you can.\n",
/*0x5d*/ "Knock out this target - stealth is the key.\n",
/*0x5e*/ "And the final guard...\n",
/*0x5f*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n",
/*0x60*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n",
/*0x61*/ "Holoprogram 3 has been completed successfully.\n",
/*0x62*/ "Activate all the switches.\n",
/*0x63*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n",
/*0x64*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n",
/*0x65*/ "Code 1 has been obtained.\n",
/*0x66*/ "Code 2 has been obtained.\n",
/*0x67*/ "Code 3 has been obtained.\n",
/*0x68*/ "Code 4 has been obtained.\n",
/*0x69*/ "Training failed - you must face forward.\n",
/*0x6a*/ "Holoprogram 1 has been completed successfully.\n",
/*0x6b*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n",
/*0x6c*/ "Now try against a moving target...\n",
/*0x6d*/ "And finally against a target that fights back.\n",
/*0x6e*/ "Defeat all enemies without getting hit.\n",
/*0x6f*/ "Training failed - you have been hit.\n",
/*0x70*/ "Holoprogram 6 has been completed successfully.\n",
/*0x71*/ "Holoprogram 7 has been completed successfully.\n",
/*0x72*/ "TERMINALS\n- Press B Button next to terminal to use it.\n",
/*0x73*/ "Now activate the red terminals on the wall.\n",
/*0x74*/ "PP7\n",
/*0x75*/ "TT33\n",
/*0x76*/ "Skorpion\n",
/*0x77*/ "AK47\n",
/*0x78*/ "Uzi 9mm\n",
/*0x79*/ "MP5K\n",
/*0x7a*/ "M-16\n",
/*0x7b*/ "FNP90\n",
/*0x7c*/ NULL,
/*0x7d*/ NULL,
/*0x7e*/ NULL,
/*0x7f*/ NULL,
};

132
src/lang/dish_str.c Normal file
View File

@ -0,0 +1,132 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ NULL,
/*0x01*/ NULL,
/*0x02*/ NULL,
/*0x03*/ NULL,
/*0x04*/ NULL,
/*0x05*/ NULL,
/*0x06*/ NULL,
/*0x07*/ NULL,
/*0x08*/ "Collect Night Sight from table to begin.\n",
/*0x09*/ "Activate the Night Sight.\nLocate the light switch.\nTurn the lights back on.\n",
/*0x0a*/ "Collect Data Uplink from table to begin.\n",
/*0x0b*/ "Stand next to the terminal and use the Uplink.\n",
/*0x0c*/ "You need to be holding the Data Uplink.\n",
/*0x0d*/ "Connection established...\n",
/*0x0e*/ "Terminal has been successfully hacked.\n",
/*0x0f*/ "Connection broken - too far from PC.\n",
/*0x10*/ "Collect ECM Mine from table to begin.\n",
/*0x11*/ "Locate Hub and throw ECM Mine onto Hub.\n",
/*0x12*/ "ECM Mine has been placed incorrectly.\n",
/*0x13*/ "ECM Mine has been placed correctly.\n",
/*0x14*/ "Collect CamSpy from table to begin.\n",
/*0x15*/ "Locate Info Room PC and holograph it.\n",
/*0x16*/ "Info Room PC successfully holographed.\n",
/*0x17*/ "Lights have been reactivated.\n",
/*0x18*/ "Collect Door Decoder from table to begin.\n",
/*0x19*/ "Use Decoder on door pad to unlock it.\n",
/*0x1a*/ "You need to be holding the Door Decoder.\n",
/*0x1b*/ "Decoder attached. Initiating cracking routines...\n",
/*0x1c*/ "Decoding complete. Door has been unlocked.\n",
/*0x1d*/ "Collect Tracker from table to begin.\n",
/*0x1e*/ "Locate IR Scanner using Tracker.\n",
/*0x1f*/ "IR Scanner has been successfully located.\n",
/*0x20*/ "Collect IR Scanner from table to begin.\n",
/*0x21*/ "Locate secret door using IR Scanner.\n",
/*0x22*/ "Secret door has been successfully located.\n",
/*0x23*/ "Collect X-Ray Scanner from table to begin.\n",
/*0x24*/ "Find hidden switches to shut down laser grid.\n",
/*0x25*/ "All laser grids have been deactivated.\n",
/*0x26*/ "Collect Disguise from table to begin.\n",
/*0x27*/ "Fool someone into giving you Cloaking Device.\n",
/*0x28*/ "Cloaking Device successfully retrieved.\n",
/*0x29*/ "Laser Grid 1 has been deactivated.\n",
/*0x2a*/ "Laser Grid 2 has been deactivated.\n",
/*0x2b*/ "I'm here to pick up the equipment.\n",
/*0x2c*/ "Go away, Joanna. You're not fooling anybody!\n",
/*0x2d*/ "Here you go. Don't drop it now.\n",
/*0x2e*/ "Cloaking Device has been secured successfully.\n",
/*0x2f*/ "You're meant to use the Disguise, remember?\n",
/*0x30*/ "You'll have to do better than that, Joanna.\n",
/*0x31*/ "Joanna, where did you spring from?\n",
/*0x32*/ "You have been detected by the camera.\n",
/*0x33*/ "Collect Cloaking Device from table to begin.\n",
/*0x34*/ "Use Cloaking Device and locate Carrington.\n",
/*0x35*/ "I think we can safely say your training\nis now complete!\n",
/*0x36*/ "Mission complete - Device Training passed!\n",
/*0x37*/ "Mission failed - you have been detected.\n",
/*0x38*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n",
/*0x39*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n",
/*0x3a*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n",
/*0x3b*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n",
/*0x3c*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n",
/*0x3d*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n",
/*0x3e*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n",
/*0x3f*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n",
/*0x40*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n",
/*0x41*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n",
/*0x42*/ "Joanna, it's good to see you.\n",
/*0x43*/ "Come with me.\nI'll walk you round the training rooms.\n",
/*0x44*/ "The information center is through this door.\n",
/*0x45*/ "In here we have the device lab.\n",
/*0x46*/ "This leads to the simulant training room.\n",
/*0x47*/ "This is the firing range, Jo.\n",
/*0x48*/ "This corridor leads down to the hangar.\n",
/*0x49*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n",
/*0x4a*/ "Press B Button when crate grabbed to release it.\n",
/*0x4b*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n",
/*0x4c*/ "Double tap B Button when on Hovbike to dismount.\n",
/*0x4d*/ "OPENING DOORS\nPress B Button next to door to open it.\n",
/*0x4e*/ "B Button will also activate any object nearby.\n",
/*0x4f*/ "ELEVATORS\nPress B Button next to door to call elevator.\n",
/*0x50*/ "Cannot exit while training is in progress.\n",
/*0x51*/ "Switch Code 1 has been obtained.\n",
/*0x52*/ "Switch Code 2 has been obtained.\n",
/*0x53*/ "Switch Code 3 has been obtained.\n",
/*0x54*/ "Switch Code 4 has been obtained.\n",
/*0x55*/ "LOOK UP\n- Press Down C Button to look up at the target.\n",
/*0x56*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n",
/*0x57*/ "Holoprogram 2 has been completed successfully.\n",
/*0x58*/ "Holoprogram 4 has been completed successfully.\n",
/*0x59*/ "Holoprogram 5 has been completed successfully.\n",
/*0x5a*/ "Guard has been successfully disarmed.\n",
/*0x5b*/ "Guard has been successfully knocked out.\n",
/*0x5c*/ "Disarm this live target if you can.\n",
/*0x5d*/ "Knock out this target - stealth is the key.\n",
/*0x5e*/ "And the final guard...\n",
/*0x5f*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n",
/*0x60*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n",
/*0x61*/ "Holoprogram 3 has been completed successfully.\n",
/*0x62*/ "Activate all the switches.\n",
/*0x63*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n",
/*0x64*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n",
/*0x65*/ "Code 1 has been obtained.\n",
/*0x66*/ "Code 2 has been obtained.\n",
/*0x67*/ "Code 3 has been obtained.\n",
/*0x68*/ "Code 4 has been obtained.\n",
/*0x69*/ "Training failed - you must face forward.\n",
/*0x6a*/ "Holoprogram 1 has been completed successfully.\n",
/*0x6b*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n",
/*0x6c*/ "Now try against a moving target...\n",
/*0x6d*/ "And finally against a target that fights back.\n",
/*0x6e*/ "Defeat all enemies without getting hit.\n",
/*0x6f*/ "Training failed - you have been hit.\n",
/*0x70*/ "Holoprogram 6 has been completed successfully.\n",
/*0x71*/ "Holoprogram 7 has been completed successfully.\n",
/*0x72*/ "TERMINALS\n- Press B Button next to terminal to use it.\n",
/*0x73*/ "Now activate the red terminals on the wall.\n",
/*0x74*/ "PP7\n",
/*0x75*/ "TT33\n",
/*0x76*/ "Skorpion\n",
/*0x77*/ "AK47\n",
/*0x78*/ "Uzi 9mm\n",
/*0x79*/ "MP5K\n",
/*0x7a*/ "M-16\n",
/*0x7b*/ "FNP90\n",
/*0x7c*/ NULL,
/*0x7d*/ NULL,
/*0x7e*/ NULL,
/*0x7f*/ NULL,
};

112
src/lang/earE.c Normal file
View File

@ -0,0 +1,112 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n",
/*0x01*/ "BASEMENT LABORATORY\n",
/*0x02*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n",
/*0x03*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n",
/*0x04*/ NULL,
/*0x05*/ NULL,
/*0x06*/ NULL,
/*0x07*/ NULL,
/*0x08*/ NULL,
/*0x09*/ "Locate Dr. Caroll\n",
/*0x0a*/ "Shut down experiments\n",
/*0x0b*/ "Start security maintenance cycle\n",
/*0x0c*/ "Obtain experimental technologies\n",
/*0x0d*/ "Holograph radioactive isotope\n",
/*0x0e*/ "Machinery scream sound Fx.\n",
/*0x0f*/ "Maintenance robots activated.\n",
/*0x10*/ "Maintenance robots reprogrammed.\n",
/*0x11*/ "Security doors unlocked.\n",
/*0x12*/ "Maintenance cycle activated.\n",
/*0x13*/ "Routine cleaning cycle activated.\n",
/*0x14*/ "Operation not allowed - robots busy.\n",
/*0x15*/ "Maintenance robots deactivated.\n",
/*0x16*/ "Critical mission object destroyed.\n",
/*0x17*/ "Maintenance robot system offline.\n",
/*0x18*/ "MISSION FAILED \n - objectives cannot be completed.\n",
/*0x19*/ "Who are you?\n",
/*0x1a*/ "Unacceptable scientist casualties.\n",
/*0x1b*/ "Terminal is not active.\n",
/*0x1c*/ "Powering down active systems.\n",
/*0x1d*/ "Experiment has been shut down.\n",
/*0x1e*/ "Alarm activated.\n",
/*0x1f*/ "Alarm deactivated.\n",
/*0x20*/ "Don't shoot me - I'll help you.\n",
/*0x21*/ "What the hell are you doing in my lab?\n",
/*0x22*/ "Let me help you.\n",
/*0x23*/ "Accidents will happen.\n",
/*0x24*/ "ACCESS DENIED - security code required.\n",
/*0x25*/ "Searching for password.\n",
/*0x26*/ ".",
/*0x27*/ "Password located - bypassing lock.\n",
/*0x28*/ "Contact broken - reestablish link.\n",
/*0x29*/ "Security door already unlocked.\n",
/*0x2a*/ "Experiment already powered down.\n",
/*0x2b*/ "Strange - the experiment's already off!\n",
/*0x2c*/ "It appears someone has broken my PC.\n",
/*0x2d*/ "Obtain Night Vision.\n",
/*0x2e*/ "Cassandra De Vries'\n",
/*0x2f*/ "Night Vision\n",
/*0x30*/ "De Vries' briefcase\n",
/*0x31*/ "Picked up Night Vision.\n",
/*0x32*/ "Obtain shield tech item.\n",
/*0x33*/ "Cassandra De Vries'\n",
/*0x34*/ "Shield tech item\n",
/*0x35*/ "De Vries' briefcase\n",
/*0x36*/ "Picked up shield tech item.\n",
/*0x37*/ "Obtain Data Uplink.\n",
/*0x38*/ "\n",
/*0x39*/ "Data Uplink\n",
/*0x3a*/ "A Data Uplink\n",
/*0x3b*/ "Picked up a Data Uplink.\n",
/*0x3c*/ "Connection established.\n",
/*0x3d*/ "Maintenance hatch is now open.\n",
/*0x3e*/ "Maintenance hatch is already open.\n",
/*0x3f*/ "WARNING - radioactive matter detected.\n",
/*0x40*/ "What are you doing in my lab?\n",
/*0x41*/ "I haven't seen you before...\n",
/*0x42*/ "Who the hell are you?\n",
/*0x43*/ "Shut down the experiment.\n",
/*0x44*/ "Pull the plug on that, NOW.\n",
/*0x45*/ "Switch this thing off.\n",
/*0x46*/ "I'll shut it down.\n",
/*0x47*/ "Please don't hurt me.\n",
/*0x48*/ "Allow me to assist you.\n",
/*0x49*/ "My experiments!\n",
/*0x4a*/ "There, the experiment is down.\n",
/*0x4b*/ "Leave this area NOW!\n",
/*0x4c*/ "Security!\n",
/*0x4d*/ "I'm calling security.\n",
/*0x4e*/ "Accidents will happen.\n",
/*0x4f*/ "How did that happen?\n",
/*0x50*/ "Looks like it's off already.\n",
/*0x51*/ "Have you been tampering with this?\n",
/*0x52*/ "Someone's broken my equipment.\n",
/*0x53*/ "What's happened to the terminal?\n",
/*0x54*/ "You vandal - you've broken it.\n",
/*0x55*/ "Connection broken - experiments still active.\n",
/*0x56*/ "Experimental item 1 acquired.\n",
/*0x57*/ "Experimental item 2 acquired.\n",
/*0x58*/ "Experimental item 3 acquired.\n",
/*0x59*/ "Obtain CamSpy.\n",
/*0x5a*/ "Dr. Caroll's\n",
/*0x5b*/ "CamSpy\n",
/*0x5c*/ "A CamSpy\n",
/*0x5d*/ "Picked up a CamSpy.\n",
/*0x5e*/ "That's the highest security sector - Dr. Caroll \nhas got to be nearby.\n",
/*0x5f*/ "Something around here's using a lot of power.\n",
/*0x60*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n",
/*0x61*/ "Get out, Jo! The levels are too high. \nUse the CamSpy.\n",
/*0x62*/ "Secret weapons compartment opened.\n",
/*0x63*/ "Enemy detected - weapon cache locked.\n",
/*0x64*/ "Dr. Caroll?\n",
/*0x65*/ "Dr. Caroll, are you here?\n",
/*0x66*/ "Well, is it safe to come out?\n",
/*0x67*/ "Yes, all clear.\n",
/*0x68*/ "Wh..what... you're...\n",
/*0x69*/ "Very professionally done, my dear, but there's \nno time to waste! We must leave immediately!\n",
/*0x6a*/ "Come on. I have vital information, and you \nmust protect me.\n",
/*0x6b*/ NULL,
};

112
src/lang/earJ.c Normal file
View File

@ -0,0 +1,112 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are non-combatants; don't kill them.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the EyeSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle On The Security Systems\n\nRe-program the cleaning robots in the service area to start work on the security systems. This will permit you to get further into the laboratory complex, though you will have to stay close to the robot you re-program if you want to remain unharmed.\n\n|Objective Three: - Shut Down The Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items Of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. Inbetween the sectors are systems designed to keep out those without clearance, such as yourself. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n",
/*0x01*/ "BASEMENT LABORATORY\n",
/*0x02*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are non-combatants; don't kill them.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the EyeSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle On The Security Systems\n\nRe-program the cleaning robots in the service area to start work on the security systems. This will permit you to get further into the laboratory complex, though you will have to stay close to the robot you re-program if you want to remain unharmed.\n\n|Objective Three: - Shut Down The Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. Inbetween the sectors are systems designed to keep out those without clearance, such as yourself. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n",
/*0x03*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are non-combatants; don't kill them.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the EyeSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. Inbetween the sectors are systems designed to keep out those without clearance, such as yourself. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n",
/*0x04*/ NULL,
/*0x05*/ NULL,
/*0x06*/ NULL,
/*0x07*/ NULL,
/*0x08*/ NULL,
/*0x09*/ "Locate Dr Caroll\n",
/*0x0a*/ "Shut Down Experiments\n",
/*0x0b*/ "Start Security Maintenance Cycle\n",
/*0x0c*/ "Obtain Experimental Technologies\n",
/*0x0d*/ "Holograph Radioactive Isotope\n",
/*0x0e*/ "Machinery Scream Sound Fx\n",
/*0x0f*/ "Maintenance Robots Activated\n",
/*0x10*/ "Maintenance Robots Re-programmed\n",
/*0x11*/ "Security Doors Unlocked\n",
/*0x12*/ "Maintenance Cycle Activated\n",
/*0x13*/ "Routine Cleaning Cycle Activated\n",
/*0x14*/ "Operation Not Allowed - Robots Busy\n",
/*0x15*/ "Maintenance Robots De-activated\n",
/*0x16*/ "Critical Mission Object Destroyed\n",
/*0x17*/ "Maintenance Robot System Offline\n",
/*0x18*/ "MISSION FAILED \n - Objectives cannot be completed\n",
/*0x19*/ "Who are you?\n",
/*0x1a*/ "Unacceptable Scientist Casualties\n",
/*0x1b*/ "Terminal Is Not Active\n",
/*0x1c*/ "Powering Down Active Systems\n",
/*0x1d*/ "Experiment Has Been Shut Down\n",
/*0x1e*/ "Alarm Activated\n",
/*0x1f*/ "Alarm De-activated\n",
/*0x20*/ "Don't Shoot Me - I'll Help you\n",
/*0x21*/ "What the hell are you doing in my lab?\n",
/*0x22*/ "Let me help you\n",
/*0x23*/ "Accidents will happen\n",
/*0x24*/ "ACCESS DENIED - Security Code Required\n",
/*0x25*/ "Searching for password\n",
/*0x26*/ ".",
/*0x27*/ "Password Located - Bypassing Lock\n",
/*0x28*/ "Contact Broken - Re-establish link\n",
/*0x29*/ "Security Door Already Unlocked\n",
/*0x2a*/ "Experiment already powered down\n",
/*0x2b*/ "Strange - the experiments already off!\n",
/*0x2c*/ "It appears someone has broken my PC\n",
/*0x2d*/ "Obtain Night Sight\n",
/*0x2e*/ "Cassandra De Vries'\n",
/*0x2f*/ "Night Sight\n",
/*0x30*/ "De Vries' briefcase\n",
/*0x31*/ "Picked up Night Sight\n",
/*0x32*/ "Obtain Shield Tech Item\n",
/*0x33*/ "Cassandra De Vries'\n",
/*0x34*/ "Shield Tech Item\n",
/*0x35*/ "De Vries' briefcase\n",
/*0x36*/ "Picked up Shield Tech Item\n",
/*0x37*/ "Obtain Data Uplink\n",
/*0x38*/ "\n",
/*0x39*/ "Data Uplink\n",
/*0x3a*/ "A Data Uplink\n",
/*0x3b*/ "Picked up a Data Uplink\n",
/*0x3c*/ "Connection Established\n",
/*0x3d*/ "Maintenance Hatch Is Now Open\n",
/*0x3e*/ "Maintenance Hatch Is Already Open\n",
/*0x3f*/ "WARNING - Radioactive Matter Detected\n",
/*0x40*/ "What are you doing in my lab?\n",
/*0x41*/ "I haven't seen you before...\n",
/*0x42*/ "Who the hell are you?\n",
/*0x43*/ "Shut down the experiment.\n",
/*0x44*/ "Pull the plug on that, NOW.\n",
/*0x45*/ "Switch this thing off.\n",
/*0x46*/ "I'll shut it down.\n",
/*0x47*/ "Please don't hurt me.\n",
/*0x48*/ "Allow me to assist you.\n",
/*0x49*/ "My experiments!\n",
/*0x4a*/ "There, the experiment is down.\n",
/*0x4b*/ "Leave this area NOW!\n",
/*0x4c*/ "Security!\n",
/*0x4d*/ "I'm calling security\n",
/*0x4e*/ "Accidents will happen\n",
/*0x4f*/ "How did that happen?\n",
/*0x50*/ "Looks like it's off already\n",
/*0x51*/ "Have you been tampering with this?\n",
/*0x52*/ "Someones broken my equipment.\n",
/*0x53*/ "Whats happened to the terminal?\n",
/*0x54*/ "You vandal, you've broken it.\n",
/*0x55*/ "Connection Broken - Experiments still active.\n",
/*0x56*/ "Experimental Item 1 aquired.\n",
/*0x57*/ "Experimental Item 2 aquired.\n",
/*0x58*/ "Experimental Item 3 aquired.\n",
/*0x59*/ "Obtain Eye Spy\n",
/*0x5a*/ "Dr Carolls\n",
/*0x5b*/ "Eye Spy\n",
/*0x5c*/ "An Eye Spy\n",
/*0x5d*/ "Picked up an Eye Spy\n",
/*0x5e*/ "That's the highest security sector - Dr Caroll\nhas got to be nearby.\n",
/*0x5f*/ "Something around here's using a lot of power.\n",
/*0x60*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n",
/*0x61*/ "Get out, Jo! The levels are too high.\nUse the Eye-Spy.\n",
/*0x62*/ "Secret Weapons Compartment Opened.\n",
/*0x63*/ "Access Denied - Weapons Compartment Locked.\n",
/*0x64*/ "Dr. Caroll?",
/*0x65*/ "Dr. Caroll, are you here?",
/*0x66*/ "Well, is it safe to come out?",
/*0x67*/ "Yes, all clear.",
/*0x68*/ "Wh..what... you're...",
/*0x69*/ "Very professionally done my dear, but there's no time to waste! we must leave immediately!",
/*0x6a*/ "Come on, I have vital information and you must protect me.",
/*0x6b*/ NULL,
};

112
src/lang/earP.c Normal file
View File

@ -0,0 +1,112 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n",
/*0x01*/ "BASEMENT LABORATORY\n",
/*0x02*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n",
/*0x03*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n",
/*0x04*/ NULL,
/*0x05*/ NULL,
/*0x06*/ NULL,
/*0x07*/ NULL,
/*0x08*/ NULL,
/*0x09*/ "Locate Dr. Caroll\n",
/*0x0a*/ "Shut down experiments\n",
/*0x0b*/ "Start security maintenance cycle\n",
/*0x0c*/ "Obtain experimental technologies\n",
/*0x0d*/ "Holograph radioactive isotope\n",
/*0x0e*/ "Machinery scream sound Fx.\n",
/*0x0f*/ "Maintenance robots activated.\n",
/*0x10*/ "Maintenance robots reprogrammed.\n",
/*0x11*/ "Security doors unlocked.\n",
/*0x12*/ "Maintenance cycle activated.\n",
/*0x13*/ "Routine cleaning cycle activated.\n",
/*0x14*/ "Operation not allowed - robots busy.\n",
/*0x15*/ "Maintenance robots deactivated.\n",
/*0x16*/ "Critical mission object destroyed.\n",
/*0x17*/ "Maintenance robot system offline.\n",
/*0x18*/ "MISSION FAILED \n - objectives cannot be completed.\n",
/*0x19*/ "Who are you?\n",
/*0x1a*/ "Unacceptable scientist casualties.\n",
/*0x1b*/ "Terminal is not active.\n",
/*0x1c*/ "Powering down active systems.\n",
/*0x1d*/ "Experiment has been shut down.\n",
/*0x1e*/ "Alarm activated.\n",
/*0x1f*/ "Alarm deactivated.\n",
/*0x20*/ "Don't shoot me - I'll help you.\n",
/*0x21*/ "What the hell are you doing in my lab?\n",
/*0x22*/ "Let me help you.\n",
/*0x23*/ "Accidents will happen.\n",
/*0x24*/ "ACCESS DENIED - security code required.\n",
/*0x25*/ "Searching for password.\n",
/*0x26*/ ".",
/*0x27*/ "Password located - bypassing lock.\n",
/*0x28*/ "Contact broken - reestablish link.\n",
/*0x29*/ "Security door already unlocked.\n",
/*0x2a*/ "Experiment already powered down.\n",
/*0x2b*/ "Strange - the experiment's already off!\n",
/*0x2c*/ "It appears someone has broken my PC.\n",
/*0x2d*/ "Obtain Night Sight.\n",
/*0x2e*/ "Cassandra De Vries'\n",
/*0x2f*/ "Night Sight\n",
/*0x30*/ "De Vries' briefcase\n",
/*0x31*/ "Picked up Night Sight.\n",
/*0x32*/ "Obtain shield tech item.\n",
/*0x33*/ "Cassandra De Vries'\n",
/*0x34*/ "Shield tech item\n",
/*0x35*/ "De Vries' briefcase\n",
/*0x36*/ "Picked up shield tech item.\n",
/*0x37*/ "Obtain Data Uplink.\n",
/*0x38*/ "\n",
/*0x39*/ "Data Uplink\n",
/*0x3a*/ "A Data Uplink\n",
/*0x3b*/ "Picked up a Data Uplink.\n",
/*0x3c*/ "Connection established.\n",
/*0x3d*/ "Maintenance hatch is now open.\n",
/*0x3e*/ "Maintenance hatch is already open.\n",
/*0x3f*/ "WARNING - radioactive matter detected.\n",
/*0x40*/ "What are you doing in my lab?\n",
/*0x41*/ "I haven't seen you before...\n",
/*0x42*/ "Who the hell are you?\n",
/*0x43*/ "Shut down the experiment.\n",
/*0x44*/ "Pull the plug on that, NOW.\n",
/*0x45*/ "Switch this thing off.\n",
/*0x46*/ "I'll shut it down.\n",
/*0x47*/ "Please don't hurt me.\n",
/*0x48*/ "Allow me to assist you.\n",
/*0x49*/ "My experiments!\n",
/*0x4a*/ "There, the experiment is down.\n",
/*0x4b*/ "Leave this area NOW!\n",
/*0x4c*/ "Security!\n",
/*0x4d*/ "I'm calling security.\n",
/*0x4e*/ "Accidents will happen.\n",
/*0x4f*/ "How did that happen?\n",
/*0x50*/ "Looks like it's off already.\n",
/*0x51*/ "Have you been tampering with this?\n",
/*0x52*/ "Someone's broken my equipment.\n",
/*0x53*/ "What's happened to the terminal?\n",
/*0x54*/ "You vandal - you've broken it.\n",
/*0x55*/ "Connection broken - experiments still active.\n",
/*0x56*/ "Experimental item 1 acquired.\n",
/*0x57*/ "Experimental item 2 acquired.\n",
/*0x58*/ "Experimental item 3 acquired.\n",
/*0x59*/ "Obtain CamSpy.\n",
/*0x5a*/ "Dr. Caroll's\n",
/*0x5b*/ "CamSpy\n",
/*0x5c*/ "A CamSpy\n",
/*0x5d*/ "Picked up a CamSpy.\n",
/*0x5e*/ "That's the highest security sector - Dr. Caroll\nhas got to be nearby.\n",
/*0x5f*/ "Something around here's using a lot of power.\n",
/*0x60*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n",
/*0x61*/ "Get out, Jo! The levels are too high.\nUse the CamSpy.\n",
/*0x62*/ "Secret weapons compartment opened.\n",
/*0x63*/ "Enemy detected - weapon cache locked.\n",
/*0x64*/ "Dr. Caroll?\n",
/*0x65*/ "Dr. Caroll, are you here?\n",
/*0x66*/ "Well, is it safe to come out?\n",
/*0x67*/ "Yes, all clear.\n",
/*0x68*/ "Wh..what... you're...\n",
/*0x69*/ "Very professionally done, my dear, but there's\nno time to waste! We must leave immediately!\n",
/*0x6a*/ "Come on. I have vital information, and you\nmust protect me.\n",
/*0x6b*/ NULL,
};

112
src/lang/ear_str.c Normal file
View File

@ -0,0 +1,112 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n",
/*0x01*/ "BASEMENT LABORATORY\n",
/*0x02*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n",
/*0x03*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n",
/*0x04*/ NULL,
/*0x05*/ NULL,
/*0x06*/ NULL,
/*0x07*/ NULL,
/*0x08*/ NULL,
/*0x09*/ "Locate Dr. Caroll\n",
/*0x0a*/ "Shut down experiments\n",
/*0x0b*/ "Start security maintenance cycle\n",
/*0x0c*/ "Obtain experimental technologies\n",
/*0x0d*/ "Holograph radioactive isotope\n",
/*0x0e*/ "Machinery scream sound Fx.\n",
/*0x0f*/ "Maintenance robots activated.\n",
/*0x10*/ "Maintenance robots reprogrammed.\n",
/*0x11*/ "Security doors unlocked.\n",
/*0x12*/ "Maintenance cycle activated.\n",
/*0x13*/ "Routine cleaning cycle activated.\n",
/*0x14*/ "Operation not allowed - robots busy.\n",
/*0x15*/ "Maintenance robots deactivated.\n",
/*0x16*/ "Critical mission object destroyed.\n",
/*0x17*/ "Maintenance robot system offline.\n",
/*0x18*/ "MISSION FAILED \n - objectives cannot be completed.\n",
/*0x19*/ "Who are you?\n",
/*0x1a*/ "Unacceptable scientist casualties.\n",
/*0x1b*/ "Terminal is not active.\n",
/*0x1c*/ "Powering down active systems.\n",
/*0x1d*/ "Experiment has been shut down.\n",
/*0x1e*/ "Alarm activated.\n",
/*0x1f*/ "Alarm deactivated.\n",
/*0x20*/ "Don't shoot me - I'll help you.\n",
/*0x21*/ "What the hell are you doing in my lab?\n",
/*0x22*/ "Let me help you.\n",
/*0x23*/ "Accidents will happen.\n",
/*0x24*/ "ACCESS DENIED - security code required.\n",
/*0x25*/ "Searching for password.\n",
/*0x26*/ ".",
/*0x27*/ "Password located - bypassing lock.\n",
/*0x28*/ "Contact broken - reestablish link.\n",
/*0x29*/ "Security door already unlocked.\n",
/*0x2a*/ "Experiment already powered down.\n",
/*0x2b*/ "Strange - the experiment's already off!\n",
/*0x2c*/ "It appears someone has broken my PC.\n",
/*0x2d*/ "Obtain Night Sight.\n",
/*0x2e*/ "Cassandra De Vries'\n",
/*0x2f*/ "Night Sight\n",
/*0x30*/ "De Vries' briefcase\n",
/*0x31*/ "Picked up Night Sight.\n",
/*0x32*/ "Obtain shield tech item.\n",
/*0x33*/ "Cassandra De Vries'\n",
/*0x34*/ "Shield tech item\n",
/*0x35*/ "De Vries' briefcase\n",
/*0x36*/ "Picked up shield tech item.\n",
/*0x37*/ "Obtain Data Uplink.\n",
/*0x38*/ "\n",
/*0x39*/ "Data Uplink\n",
/*0x3a*/ "A Data Uplink\n",
/*0x3b*/ "Picked up a Data Uplink.\n",
/*0x3c*/ "Connection established.\n",
/*0x3d*/ "Maintenance hatch is now open.\n",
/*0x3e*/ "Maintenance hatch is already open.\n",
/*0x3f*/ "WARNING - radioactive matter detected.\n",
/*0x40*/ "What are you doing in my lab?\n",
/*0x41*/ "I haven't seen you before...\n",
/*0x42*/ "Who the hell are you?\n",
/*0x43*/ "Shut down the experiment.\n",
/*0x44*/ "Pull the plug on that, NOW.\n",
/*0x45*/ "Switch this thing off.\n",
/*0x46*/ "I'll shut it down.\n",
/*0x47*/ "Please don't hurt me.\n",
/*0x48*/ "Allow me to assist you.\n",
/*0x49*/ "My experiments!\n",
/*0x4a*/ "There, the experiment is down.\n",
/*0x4b*/ "Leave this area NOW!\n",
/*0x4c*/ "Security!\n",
/*0x4d*/ "I'm calling security.\n",
/*0x4e*/ "Accidents will happen.\n",
/*0x4f*/ "How did that happen?\n",
/*0x50*/ "Looks like it's off already.\n",
/*0x51*/ "Have you been tampering with this?\n",
/*0x52*/ "Someone's broken my equipment.\n",
/*0x53*/ "What's happened to the terminal?\n",
/*0x54*/ "You vandal - you've broken it.\n",
/*0x55*/ "Connection broken - experiments still active.\n",
/*0x56*/ "Experimental item 1 acquired.\n",
/*0x57*/ "Experimental item 2 acquired.\n",
/*0x58*/ "Experimental item 3 acquired.\n",
/*0x59*/ "Obtain CamSpy.\n",
/*0x5a*/ "Dr. Caroll's\n",
/*0x5b*/ "CamSpy\n",
/*0x5c*/ "A CamSpy\n",
/*0x5d*/ "Picked up a CamSpy.\n",
/*0x5e*/ "That's the highest security sector - Dr. Caroll\nhas got to be nearby.\n",
/*0x5f*/ "Something around here's using a lot of power.\n",
/*0x60*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n",
/*0x61*/ "Get out, Jo! The levels are too high.\nUse the CamSpy.\n",
/*0x62*/ "Secret weapons compartment opened.\n",
/*0x63*/ "Enemy detected - weapon cache locked.\n",
/*0x64*/ "Dr. Caroll?\n",
/*0x65*/ "Dr. Caroll, are you here?\n",
/*0x66*/ "Well, is it safe to come out?\n",
/*0x67*/ "Yes, all clear.\n",
/*0x68*/ "Wh..what... you're...\n",
/*0x69*/ "Very professionally done, my dear, but there's\nno time to waste! We must leave immediately!\n",
/*0x6a*/ "Come on. I have vital information, and you\nmust protect me.\n",
/*0x6b*/ NULL,
};

56
src/lang/eldE.c Normal file
View File

@ -0,0 +1,56 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n",
/*0x01*/ "CARRINGTON VILLA\n",
/*0x02*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n",
/*0x03*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "Save the negotiator\n",
/*0x06*/ "Eliminate rooftop snipers\n",
/*0x07*/ "Activate wind generator\n",
/*0x08*/ "Locate and eliminate dataDyne hackers\n",
/*0x09*/ "Rescue Carrington\n",
/*0x0a*/ "Capture dataDyne guard\n",
/*0x0b*/ "Negotiator has been killed.\n",
/*0x0c*/ "Snipers have been eliminated.\n",
/*0x0d*/ "Negotiator has escaped to safety.\n",
/*0x0e*/ "Cooling systems have been activated.\n",
/*0x0f*/ "Cooling systems have been deactivated.\n",
/*0x10*/ "Power systems have been activated.\n",
/*0x11*/ "Power systems have been deactivated.\n",
/*0x12*/ "Windmill has been reactivated.\n",
/*0x13*/ "Windmill has been deactivated.\n",
/*0x14*/ "Electricity has been restored to the villa.\n",
/*0x15*/ "Critical mission object has been destroyed.\n",
/*0x16*/ "Joanna! It's Grimshaw. We've got hackers at \nthe villa! You've got to stop them\n before they get to our files.\n",
/*0x17*/ "Hackers have uploaded vital data.\n",
/*0x18*/ "Hackers have been eliminated.\n",
/*0x19*/ "Carrington has been rescued.\n",
/*0x1a*/ "All objectives not completed - mission failed.\n",
/*0x1b*/ "PC gun\n",
/*0x1c*/ "Sniper rifle\n",
/*0x1d*/ "Enemy guard has been subdued.\n",
/*0x1e*/ "Obtain door key.\n",
/*0x1f*/ "Guard's\n",
/*0x20*/ "Door Key\n",
/*0x21*/ "Door Key\n",
/*0x22*/ "Picked up a door key.\n",
/*0x23*/ "If I get the wind generator back online, \nI'll get power to the lower basement.\n",
/*0x24*/ "I've got to be quick, or they'll kill \nthe negotiator!\n",
/*0x25*/ "Here's where they must be holding Daniel.\n",
/*0x26*/ "Those hackers have to be stopped before \nI rescue Daniel.\n",
/*0x27*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n",
/*0x28*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n",
/*0x29*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n",
/*0x2a*/ "Sir? Are you injured?\n",
/*0x2b*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n",
/*0x2c*/ "It's not your fault, sir. I should have \nbeen quicker.\n",
/*0x2d*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n",
/*0x2e*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n",
/*0x2f*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n",
/*0x30*/ "Operation denied - windmill is active.\n",
/*0x31*/ "Mission unsuccessful - enemy guard not captured.\n",
/*0x32*/ NULL,
/*0x33*/ NULL,
};

56
src/lang/eldJ.c Normal file
View File

@ -0,0 +1,56 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made you would need to respond swiftly. Make sure that the terminals are not damaged as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if possible, or if you're really good get them to give up.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out, and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n",
/*0x01*/ "CARRINGTON VILLA\n",
/*0x02*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne don't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out, and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n",
/*0x03*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne don't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out, and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "Save the Negotiator\n",
/*0x06*/ "Eliminate Rooftop Snipers\n",
/*0x07*/ "Activate Wind Generator\n",
/*0x08*/ "Locate and Eliminate Datadyne Hackers\n",
/*0x09*/ "Rescue Carrington\n",
/*0x0a*/ "Capture Datadyne Guard\n",
/*0x0b*/ "Negotiator has been killed\n",
/*0x0c*/ "Snipers have been eliminated\n",
/*0x0d*/ "Negotiator has escaped to safety.\n",
/*0x0e*/ "Cooling Systems Have Been Activated.\n",
/*0x0f*/ "Cooling Systems Have Been De-Activated.\n",
/*0x10*/ "Power Systems Have Been Activated.\n",
/*0x11*/ "Power Systems Have Been De-Activated.\n",
/*0x12*/ "Windmill Has Been Re-Activated.\n",
/*0x13*/ "Windmill Has Been De-Activated.\n",
/*0x14*/ "Electicity Has Been Restored To The Villa.\n",
/*0x15*/ "Critical Mission Object Has Been Destroyed.\n",
/*0x16*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n",
/*0x17*/ "Hackers have uploaded vital data.\n",
/*0x18*/ "Hackers have been eliminated.\n",
/*0x19*/ "Carrington Has Been Rescued\n",
/*0x1a*/ "All objectives not completed - mission failed.\n",
/*0x1b*/ "PC gun\n",
/*0x1c*/ "Sniper RIfle\n",
/*0x1d*/ "Enemy guard has been subdued.\n",
/*0x1e*/ "Obtain Door Key\n",
/*0x1f*/ "Guards\n",
/*0x20*/ "Door Key\n",
/*0x21*/ "Door Key\n",
/*0x22*/ "Picked up a door key.\n",
/*0x23*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n",
/*0x24*/ "I've got to be quick or they'll kill\nthe negotiator!\n",
/*0x25*/ "Here's where they must be holding Daniel.\n",
/*0x26*/ "Those hackers have to be stopped before\nI rescue Daniel.\n",
/*0x27*/ "Agent Dark Mission Log, 1846 hours. Last night we got a call from Cassandra de Vries. A dataDyne team have taken Daniel Carrington hostage at his private villa on the coast, and they say they will spare his life in exchange for the AI.",
/*0x28*/ "Unfortunately we don't have it. Daniel and Dr. Caroll were at the villa to discuss 'matters of mutual interest'. It looks like Daniel found a way to hide Dr. Caroll inside the villa when the dataDyne hit squad arrived.",
/*0x29*/ "Hopefully our phoney negotiator ploy will give me a chance to surprise the dataDyne squad. This time it's not just my life on the line.",
/*0x2a*/ "Sir? Are you injured?",
/*0x2b*/ "No Joanna, I'm okay, but those dataDyne thugs made me tell them where I'd hidden Dr. Caroll. If only I'd held out for a few minutes more...",
/*0x2c*/ "It's not your fault sir. I should have been quicker.",
/*0x2d*/ "Don't blame yourself, Joanna. Dr. Caroll told me that he expected this to happen. Actually, when they recaptured him, the dataDyne team got over-confident and let slip a few facts when they thought I was unconscious. They mentioned a meeting in the G5 building in Chicago, Illinois tonight. I want you to be there, but that doesn't leave you a lot of time to get ready.",
/*0x2e*/ "That won't be a problem, sir. So, did Dr. Caroll have any useful information for you?",
/*0x2f*/ "Oh, yes, indeed. He certainly did, and I'll brief you when you're on route to Chicago. We might still be able to help him, even after those butchers remove his personality. He thinks they'll keep a copy of it in a safe place. It's about time I called in some friends to deal with dataDyne.",
/*0x30*/ NULL,
/*0x31*/ NULL,
/*0x32*/ NULL,
/*0x33*/ NULL,
};

56
src/lang/eldP.c Normal file
View File

@ -0,0 +1,56 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n",
/*0x01*/ "CARRINGTON VILLA\n",
/*0x02*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n",
/*0x03*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "Save the negotiator\n",
/*0x06*/ "Eliminate rooftop snipers\n",
/*0x07*/ "Activate wind generator\n",
/*0x08*/ "Locate and eliminate dataDyne hackers\n",
/*0x09*/ "Rescue Carrington\n",
/*0x0a*/ "Capture dataDyne guard\n",
/*0x0b*/ "Negotiator has been killed.\n",
/*0x0c*/ "Snipers have been eliminated.\n",
/*0x0d*/ "Negotiator has escaped to safety.\n",
/*0x0e*/ "Cooling systems have been activated.\n",
/*0x0f*/ "Cooling systems have been deactivated.\n",
/*0x10*/ "Power systems have been activated.\n",
/*0x11*/ "Power systems have been deactivated.\n",
/*0x12*/ "Windmill has been reactivated.\n",
/*0x13*/ "Windmill has been deactivated.\n",
/*0x14*/ "Electricity has neen restored to the Villa.\n",
/*0x15*/ "Critical mission object has been destroyed.\n",
/*0x16*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n",
/*0x17*/ "Hackers have uploaded vital data.\n",
/*0x18*/ "Hackers have been eliminated.\n",
/*0x19*/ "Carrington has been rescued.\n",
/*0x1a*/ "All objectives not completed - mission failed.\n",
/*0x1b*/ "PC gun\n",
/*0x1c*/ "Sniper rifle\n",
/*0x1d*/ "Enemy guard has been subdued.\n",
/*0x1e*/ "Obtain door key.\n",
/*0x1f*/ "Guard's\n",
/*0x20*/ "Door Key\n",
/*0x21*/ "Door Key\n",
/*0x22*/ "Picked up a door key.\n",
/*0x23*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n",
/*0x24*/ "I've got to be quick, or they'll kill\nthe negotiator!\n",
/*0x25*/ "Here's where they must be holding Daniel.\n",
/*0x26*/ "Those hackers have to be stopped before\nI rescue Daniel.\n",
/*0x27*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n",
/*0x28*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n",
/*0x29*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n",
/*0x2a*/ "Sir? Are you injured?\n",
/*0x2b*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n",
/*0x2c*/ "It's not your fault, sir. I should have \nbeen quicker.\n",
/*0x2d*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n",
/*0x2e*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n",
/*0x2f*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n",
/*0x30*/ "Operation denied - windmill is active.\n",
/*0x31*/ NULL,
/*0x32*/ NULL,
/*0x33*/ NULL,
};

56
src/lang/eld_str.c Normal file
View File

@ -0,0 +1,56 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n",
/*0x01*/ "CARRINGTON VILLA\n",
/*0x02*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n",
/*0x03*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "Save the negotiator\n",
/*0x06*/ "Eliminate rooftop snipers\n",
/*0x07*/ "Activate wind generator\n",
/*0x08*/ "Locate and eliminate dataDyne hackers\n",
/*0x09*/ "Rescue Carrington\n",
/*0x0a*/ "Capture dataDyne guard\n",
/*0x0b*/ "Negotiator has been killed.\n",
/*0x0c*/ "Snipers have been eliminated.\n",
/*0x0d*/ "Negotiator has escaped to safety.\n",
/*0x0e*/ "Cooling systems have been activated.\n",
/*0x0f*/ "Cooling systems have been deactivated.\n",
/*0x10*/ "Power systems have been activated.\n",
/*0x11*/ "Power systems have been deactivated.\n",
/*0x12*/ "Windmill has been reactivated.\n",
/*0x13*/ "Windmill has been deactivated.\n",
/*0x14*/ "Electricity has neen restored to the Villa.\n",
/*0x15*/ "Critical mission object has been destroyed.\n",
/*0x16*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n",
/*0x17*/ "Hackers have uploaded vital data.\n",
/*0x18*/ "Hackers have been eliminated.\n",
/*0x19*/ "Carrington has been rescued.\n",
/*0x1a*/ "All objectives not completed - mission failed.\n",
/*0x1b*/ "PC gun\n",
/*0x1c*/ "Sniper rifle\n",
/*0x1d*/ "Enemy guard has been subdued.\n",
/*0x1e*/ "Obtain door key.\n",
/*0x1f*/ "Guard's\n",
/*0x20*/ "Door Key\n",
/*0x21*/ "Door Key\n",
/*0x22*/ "Picked up a door key.\n",
/*0x23*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n",
/*0x24*/ "I've got to be quick, or they'll kill\nthe negotiator!\n",
/*0x25*/ "Here's where they must be holding Daniel.\n",
/*0x26*/ "Those hackers have to be stopped before\nI rescue Daniel.\n",
/*0x27*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n",
/*0x28*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n",
/*0x29*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n",
/*0x2a*/ "Sir? Are you injured?\n",
/*0x2b*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n",
/*0x2c*/ "It's not your fault, sir. I should have \nbeen quicker.\n",
/*0x2d*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n",
/*0x2e*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n",
/*0x2f*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n",
/*0x30*/ "Operation denied - windmill is active.\n",
/*0x31*/ NULL,
/*0x32*/ NULL,
/*0x33*/ NULL,
};

248
src/lang/gunE.c Normal file
View File

@ -0,0 +1,248 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "\n",
/*0x01*/ "Kill count",
/*0x02*/ "Died once\n",
/*0x03*/ "Died",
/*0x04*/ "times",
/*0x05*/ "Suicide count",
/*0x06*/ "Unarmed\n",
/*0x07*/ "Falcon 2\n",
/*0x08*/ "Falcon 2 (silencer)\n",
/*0x09*/ "Falcon 2 (scope)\n",
/*0x0a*/ "MagSec 4\n",
/*0x0b*/ "Mauler\n",
/*0x0c*/ "DY357 Magnum\n",
/*0x0d*/ "DY357-LX\n",
/*0x0e*/ "Phoenix\n",
/*0x0f*/ "CMP150\n",
/*0x10*/ "AR34\n",
/*0x11*/ "Dragon\n",
/*0x12*/ "SuperDragon\n",
/*0x13*/ "K7 Avenger\n",
/*0x14*/ "Cyclone\n",
/*0x15*/ "MagSec SMG\n",
/*0x16*/ "RC-P120\n",
/*0x17*/ "Callisto NTG\n",
/*0x18*/ "Laptop Gun\n",
/*0x19*/ "Shotgun\n",
/*0x1a*/ "Reaper\n",
/*0x1b*/ "Rocket Launcher\n",
/*0x1c*/ "Devastator\n",
/*0x1d*/ "Slayer\n",
/*0x1e*/ "MaianGrenade\n",
/*0x1f*/ "FarSight XR-20\n",
/*0x20*/ "Sniper Rifle\n",
/*0x21*/ "Crossbow\n",
/*0x22*/ "Tranquilizer\n",
/*0x23*/ "Combat Knife\n",
/*0x24*/ "Grenade\n",
/*0x25*/ "N-Bomb\n",
/*0x26*/ "Timed Mine\n",
/*0x27*/ "Proximity Mine\n",
/*0x28*/ "Remote Mine\n",
/*0x29*/ "ECM Mine\n",
/*0x2a*/ "FlashBang\n",
/*0x2b*/ "Disguise\n",
/*0x2c*/ "Rocket\n",
/*0x2d*/ "Homing Rocket\n",
/*0x2e*/ "Grenade Round\n",
/*0x2f*/ "Laser\n",
/*0x30*/ "Bolt\n",
/*0x31*/ "Psychosis Gun\n",
/*0x32*/ "PP9i\n",
/*0x33*/ "CC13\n",
/*0x34*/ "KL01313\n",
/*0x35*/ "KF7 Special\n",
/*0x36*/ "ZZT (9mm)\n",
/*0x37*/ "DMC\n",
/*0x38*/ "AR53\n",
/*0x39*/ "RC-P45\n",
/*0x3a*/ "Tester\n",
/*0x3b*/ "Night Vision\n",
/*0x3c*/ "CamSpy\n",
/*0x3d*/ "DrugSpy\n",
/*0x3e*/ "BombSpy\n",
/*0x3f*/ "Door Decoder\n",
/*0x40*/ "Explosives\n",
/*0x41*/ "X-Ray Scanner\n",
/*0x42*/ "Alien Medpack\n",
/*0x43*/ "Suitcase\n",
/*0x44*/ "Disguise\n",
/*0x45*/ "IR Scanner\n",
/*0x46*/ "R-Tracker\n",
/*0x47*/ "Briefcase\n",
/*0x48*/ "Suicide Pill\n",
/*0x49*/ "Cloaking Device\n",
/*0x4a*/ "Combat Boost\n",
/*0x4b*/ "Data Uplink\n",
/*0x4c*/ "Horizon Scanner\n",
/*0x4d*/ "Falcon 2 (s)\n",
/*0x4e*/ "Falcon 2 (+)\n",
/*0x4f*/ "FarSight\n",
/*0x50*/ "R-Launcher\n",
/*0x51*/ "Proxy Mine\n",
/*0x52*/ "Psychosis\n",
/*0x53*/ "Knife\n",
/*0x54*/ "DY357\n",
/*0x55*/ "Single Shot\n",
/*0x56*/ "Rapid Fire\n",
/*0x57*/ "Burst Fire\n",
/*0x58*/ "Reapage\n",
/*0x59*/ "Shotgun Fire\n",
/*0x5a*/ "Rail-gun effect\n",
/*0x5b*/ "Rocket Launch\n",
/*0x5c*/ "Targeted Rocket\n",
/*0x5d*/ "Fly-By-Wire Rocket\n",
/*0x5e*/ "Pistol Whip\n",
/*0x5f*/ "Explosive Shells\n",
/*0x60*/ "Guided Shots\n",
/*0x61*/ "Magazine Discharge\n",
/*0x62*/ "Grenade Launcher\n",
/*0x63*/ "Wall Hugger\n",
/*0x64*/ "Punch\n",
/*0x65*/ "Disarm\n",
/*0x66*/ "Follow Lock-On\n",
/*0x67*/ "Use Scope\n",
/*0x68*/ "Half Magazine Discharge\n",
/*0x69*/ "Double Blast\n",
/*0x6a*/ "Grinder\n",
/*0x6b*/ "Sedate\n",
/*0x6c*/ "Lethal Injection\n",
/*0x6d*/ "Knife Slash\n",
/*0x6e*/ "Throw Poison Knife\n",
/*0x6f*/ "Target Locator\n",
/*0x70*/ "Instant Kill\n",
/*0x71*/ "Boost\n",
/*0x72*/ "Revert\n",
/*0x73*/ "High Impact Shells\n",
/*0x74*/ "Cloak\n",
/*0x75*/ "Deploy as Sentry Gun\n",
/*0x76*/ "Proximity Self Destruct\n",
/*0x77*/ "Threat Detector\n",
/*0x78*/ "Timed Explosive\n",
/*0x79*/ "Proximity Explosive\n",
/*0x7a*/ "Remote Explosive\n",
/*0x7b*/ "Detonate\n",
/*0x7c*/ "4-Second Fuse\n",
/*0x7d*/ "Proximity Pinball\n",
/*0x7e*/ "Timed Detonation\n",
/*0x7f*/ "Proximity Detonation\n",
/*0x80*/ "3-Round Burst\n",
/*0x81*/ "Charge-Up Shot\n",
/*0x82*/ "Crouch\n",
/*0x83*/ "Infect\n",
/*0x84*/ "Pulse Fire\n",
/*0x85*/ "Short Range Stream\n",
/*0x86*/ "Impact Detonation\n",
/*0x87*/ "Light Amplifier\n",
/*0x88*/ "Mobile Camera\n",
/*0x89*/ "X-Ray Vision\n",
/*0x8a*/ "Thermal Imager\n",
/*0x8b*/ "Zoom\n",
/*0x8c*/ "Jamming Device\n",
/*0x8d*/ "Connect\n",
/*0x8e*/ "Identify Targets\n",
/*0x8f*/ "Wear Disguise\n",
/*0x90*/ "Place Explosives\n",
/*0x91*/ "Telescopic Sight\n",
/*0x92*/ "Silencer\n",
/*0x93*/ "Magazine Extension\n",
/*0x94*/ "Laser Sight\n",
/*0x95*/ "dataDyne\n",
/*0x96*/ "Carrington\n",
/*0x97*/ "Chesluk Industries\n",
/*0x98*/ "Skedar\n",
/*0x99*/ "Maian\n",
/*0x9a*/ "JonesCorp\n",
/*0x9b*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n",
/*0x9c*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n",
/*0x9d*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n",
/*0x9e*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n",
/*0x9f*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n",
/*0xa0*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n",
/*0xa1*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n",
/*0xa2*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n",
/*0xa3*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n",
/*0xa4*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n",
/*0xa5*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n",
/*0xa6*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n",
/*0xa7*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n",
/*0xa8*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n",
/*0xa9*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n",
/*0xaa*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n",
/*0xab*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n",
/*0xac*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n",
/*0xad*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n",
/*0xae*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n",
/*0xaf*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n",
/*0xb0*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n",
/*0xb1*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n",
/*0xb2*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n",
/*0xb3*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfect accuracy.\n",
/*0xb4*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n",
/*0xb5*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n",
/*0xb6*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, giving a wounded enemy at most 6 seconds to live. A dataDyne weapon through and through.\n",
/*0xb7*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n",
/*0xb8*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n",
/*0xb9*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n",
/*0xba*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n",
/*0xbb*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n",
/*0xbc*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n",
/*0xbd*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n",
/*0xbe*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n",
/*0xbf*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n",
/*0xc0*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. It has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n",
/*0xc1*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n",
/*0xc2*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n",
/*0xc3*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n",
/*0xc4*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n",
/*0xc5*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n",
/*0xc6*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n",
/*0xc7*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n",
/*0xc8*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n",
/*0xc9*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n",
/*0xca*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n",
/*0xcb*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n",
/*0xcc*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n",
/*0xcd*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n",
/*0xce*/ "Uses quantum communication technology to provide supremely accurate targeting infomation to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n",
/*0xcf*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n",
/*0xd0*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n",
/*0xd1*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n",
/*0xd2*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n",
/*0xd3*/ "Not your normal outfit. Wear it to pretend not to be you.\n",
/*0xd4*/ "PROXY\n",
/*0xd5*/ "TIMED\n",
/*0xd6*/ "REMOTE\n",
/*0xd7*/ "AUTOGUN\n",
/*0xd8*/ "IMPACT\n",
/*0xd9*/ "Big King Rocket\n",
/*0xda*/ "Data Uplink\n",
/*0xdb*/ "President Scanner\n",
/*0xdc*/ "AutoSurgeon\n",
/*0xdd*/ "Skedar Bomb\n",
/*0xde*/ "Comms Rider\n",
/*0xdf*/ "Tracer Bug\n",
/*0xe0*/ "Target Amplifier\n",
/*0xe1*/ "Flight Plans\n",
/*0xe2*/ "Research Tape\n",
/*0xe3*/ "Backup Disk\n",
/*0xe4*/ "Key Card\n",
/*0xe5*/ "Briefcase\n",
/*0xe6*/ "Necklace\n",
/*0xe7*/ "PresidentScan\n",
/*0xe8*/ "Boost\n",
/*0xe9*/ "XRayScan\n",
/*0xea*/ "HorizonScan\n",
/*0xeb*/ "Target Amp\n",
/*0xec*/ "In this version of the CamSpy the recording device has been replaced by a highly powerful plastic explosive.\n",
/*0xed*/ "This version of the CamSpy uses a paralysing nerve toxin to induce near-instant catatonia in targets.\n",
/*0xee*/ "Cassandra De Vries' necklace. Fitted with a proximity key tag to allow access to restricted areas. Mk3 model only functions while owner is alive. Security class AA-1 (gamma).",
/*0xef*/ "Cassandra De Vries' replacement necklace. Username: %s Password: %s\n",
/*0xf0*/ "Shield\n",
/*0xf1*/ "The shield protects the user by detecting an attack and momentarily generating a concentrated forcefield to repel the attack. The shield has a limited reservoir of energy, so it can only protect the user to a certain extent. Shields are usually activated whenever the user is carrying them, although this particular shield appears to be a non-functional, near-complete prototype.\n",
/*0xf2*/ NULL,
/*0xf3*/ NULL,
};

248
src/lang/gunJ.c Normal file
View File

@ -0,0 +1,248 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "\n",
/*0x01*/ "Kill count",
/*0x02*/ "Died once\n",
/*0x03*/ "Died",
/*0x04*/ "times",
/*0x05*/ "Suicide count",
/*0x06*/ "Unarmed\n",
/*0x07*/ "Falcon 2\n",
/*0x08*/ "Falcon 2 (silencer)\n",
/*0x09*/ "Falcon 2 (scope)\n",
/*0x0a*/ "MagSec 4\n",
/*0x0b*/ "Mauler\n",
/*0x0c*/ "DY357 Magnum\n",
/*0x0d*/ "DY357-LX\n",
/*0x0e*/ "Phoenix\n",
/*0x0f*/ "CMP150\n",
/*0x10*/ "AR34\n",
/*0x11*/ "Dragon\n",
/*0x12*/ "SuperDragon\n",
/*0x13*/ "Avenger\n",
/*0x14*/ "Cyclone\n",
/*0x15*/ "MagSec SMG\n",
/*0x16*/ "RC-P120\n",
/*0x17*/ "Callisto NTG\n",
/*0x18*/ "Laptop Gun\n",
/*0x19*/ "Shotgun\n",
/*0x1a*/ "Reaper\n",
/*0x1b*/ "Rocket Launcher\n",
/*0x1c*/ "Devastator\n",
/*0x1d*/ "Slayer\n",
/*0x1e*/ "MaianGrenade\n",
/*0x1f*/ "FarSight XR-20\n",
/*0x20*/ "Sniper Rifle\n",
/*0x21*/ "Crossbow\n",
/*0x22*/ "Tranquilizer\n",
/*0x23*/ "Combat Knife\n",
/*0x24*/ "Grenade\n",
/*0x25*/ "N-Bomb\n",
/*0x26*/ "Timed Mine\n",
/*0x27*/ "Proximity Mine\n",
/*0x28*/ "Remote Mine\n",
/*0x29*/ "ECM Mine\n",
/*0x2a*/ "FlashBang\n",
/*0x2b*/ "Disguise\n",
/*0x2c*/ "Rocket\n",
/*0x2d*/ "Homing Rocket\n",
/*0x2e*/ "Grenade Round\n",
/*0x2f*/ "Laser\n",
/*0x30*/ "Bolt\n",
/*0x31*/ "Psychosis Gun\n",
/*0x32*/ "PP7\n",
/*0x33*/ "DD44\n",
/*0x34*/ "Klobb\n",
/*0x35*/ "KF7 Soviet\n",
/*0x36*/ "ZMG (9mm)\n",
/*0x37*/ "D5K\n",
/*0x38*/ "AR33\n",
/*0x39*/ "RC-P90\n",
/*0x3a*/ "Tester\n",
/*0x3b*/ "Night Sight\n",
/*0x3c*/ "CamSpy\n",
/*0x3d*/ "DrugSpy\n",
/*0x3e*/ "BombSpy\n",
/*0x3f*/ "Door Decoder\n",
/*0x40*/ "Explosives\n",
/*0x41*/ "X-Ray Scanner\n",
/*0x42*/ "Alien Medpack\n",
/*0x43*/ "Suitcase\n",
/*0x44*/ "Disguise\n",
/*0x45*/ "I-R Scanner\n",
/*0x46*/ "R-Tracker\n",
/*0x47*/ "Briefcase\n",
/*0x48*/ "Suicide Pill\n",
/*0x49*/ "Cloaking Device\n",
/*0x4a*/ "Combat Boost\n",
/*0x4b*/ "Data Uplink\n",
/*0x4c*/ "Horizon Scanner\n",
/*0x4d*/ "Falcon 2 (s)\n",
/*0x4e*/ "Falcon 2 (+)\n",
/*0x4f*/ "FarSight\n",
/*0x50*/ "R-Launcher\n",
/*0x51*/ "Proxy Mine\n",
/*0x52*/ "Psychosis\n",
/*0x53*/ "Knife\n",
/*0x54*/ "DY357\n",
/*0x55*/ "Single Shot\n",
/*0x56*/ "Rapid Fire\n",
/*0x57*/ "Burst Fire\n",
/*0x58*/ "Reapage\n",
/*0x59*/ "Shotgun Fire\n",
/*0x5a*/ "Rail-gun effect\n",
/*0x5b*/ "Rocket Launch\n",
/*0x5c*/ "Targetted Rocket\n",
/*0x5d*/ "Fly By Wire Rocket\n",
/*0x5e*/ "Pistol Whip\n",
/*0x5f*/ "Explosive Shells\n",
/*0x60*/ "Guided Shots\n",
/*0x61*/ "Magazine Discharge\n",
/*0x62*/ "Grenade Launcher\n",
/*0x63*/ "Wall Hugger\n",
/*0x64*/ "Punch\n",
/*0x65*/ "Disarm\n",
/*0x66*/ "Follow Lock-On\n",
/*0x67*/ "Use Scope\n",
/*0x68*/ "Half Magazine Discharge\n",
/*0x69*/ "Double Blast\n",
/*0x6a*/ "Grinder\n",
/*0x6b*/ "Drug\n",
/*0x6c*/ "Lethal Injection\n",
/*0x6d*/ "Knife Slash\n",
/*0x6e*/ "Throw Poison Knife\n",
/*0x6f*/ "Target Locator\n",
/*0x70*/ "Instant Kill\n",
/*0x71*/ "Boost\n",
/*0x72*/ "Revert\n",
/*0x73*/ "High Impact Shells\n",
/*0x74*/ "Cloak\n",
/*0x75*/ "Deploy as Sentry Gun\n",
/*0x76*/ "Proximity Self Destruct\n",
/*0x77*/ "Threat Detector\n",
/*0x78*/ "Timed Explosive\n",
/*0x79*/ "Proximity Explosive\n",
/*0x7a*/ "Remote Explosive\n",
/*0x7b*/ "Detonate\n",
/*0x7c*/ "4-Second Fuse\n",
/*0x7d*/ "Proximity Pinball\n",
/*0x7e*/ "Timed Detonation\n",
/*0x7f*/ "Proximity Detonation\n",
/*0x80*/ "3-Round Burst\n",
/*0x81*/ "Charge-Up Shot\n",
/*0x82*/ "Crouch\n",
/*0x83*/ "Infect\n",
/*0x84*/ "Pulse Fire\n",
/*0x85*/ "Short Range Stream\n",
/*0x86*/ "Impact Detonation\n",
/*0x87*/ "Light Amplifier\n",
/*0x88*/ "Mobile Camera\n",
/*0x89*/ "X-Ray Vision\n",
/*0x8a*/ "Thermal Imager\n",
/*0x8b*/ "Zoom\n",
/*0x8c*/ "Jamming Device\n",
/*0x8d*/ "Connect\n",
/*0x8e*/ "Identify Targets\n",
/*0x8f*/ "Wear Disguise\n",
/*0x90*/ "Place Explosives\n",
/*0x91*/ "Telescopic Sight\n",
/*0x92*/ "Silencer\n",
/*0x93*/ "Magazine Extension\n",
/*0x94*/ "Laser Sight\n",
/*0x95*/ "dataDyne\n",
/*0x96*/ "Carrington\n",
/*0x97*/ "Chesluk Industries\n",
/*0x98*/ "Skedar\n",
/*0x99*/ "Maian\n",
/*0x9a*/ "JonesCorp\n",
/*0x9b*/ "Even without a weapon you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapon against them.\n",
/*0x9c*/ "Accurate and trustworthy, This gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n",
/*0x9d*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n",
/*0x9e*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n",
/*0x9f*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n",
/*0xa0*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n",
/*0xa1*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n",
/*0xa2*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n",
/*0xa3*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n",
/*0xa4*/ "A dataDyne classic, and a bestseller, this sub-machinegun boasts a 32 rnd mag and a special feature - the ability to designate and lock-on to targets in the line of sight. It turns an average marksman into an excellent one, provided they are clever enough to operate the gun. Average fire rate: 900rpm.\n",
/*0xa5*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750rpm.\n",
/*0xa6*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700rpm.\n",
/*0xa7*/ "A variant of the Dragon assault rifle, instead of a proximity explosive it has a small grenade launcher. Excellent support weapon. Average fire rate: 700rpm.\n",
/*0xa8*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns and similar hazards. Average fire rate: 950rpm.\n",
/*0xa9*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900rpm. unloads at 2000rpm\n",
/*0xaa*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate, and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100rpm.\n",
/*0xab*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other smg, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900rpm. s/f:300rpm\n",
/*0xac*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000rpm.\n",
/*0xad*/ "A dataDyne weapon manufactured for security forces. A nine cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n",
/*0xae*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800rpm.\n",
/*0xaf*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked-on to the unfortunate target.\n",
/*0xb0*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades in a sticky substance; when fired, the bomb attaches itself to wall or ceiling, then after a few seconds it detaches to fall to the ground, where it detonates.\n",
/*0xb1*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n",
/*0xb2*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track lifesources, though the device does not pan as fast as a running enemy can move.\n",
/*0xb3*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n",
/*0xb4*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute Agent's wrist. It folds up to aid concealment, and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n",
/*0xb5*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n",
/*0xb6*/ "A large and vicious combat knife. It contains a phial of poison that shatters when thrown, usually killing the target in approximately 6 seconds. A dataDyne weapon through and through.\n",
/*0xb7*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n",
/*0xb8*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact, or be set to proximity detonation.\n",
/*0xb9*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n",
/*0xba*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n",
/*0xbb*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n",
/*0xbc*/ "A focussed white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n",
/*0xbd*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n",
/*0xbe*/ "Geneered stimulants designed for combat applications. When administered they seem to slow down the passage of time to give a reaction window.\n",
/*0xbf*/ "The latest of a line of so-called 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n",
/*0xc0*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function, and an onboard facility for spectroscopic holography.\n",
/*0xc1*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n",
/*0xc2*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n",
/*0xc3*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n",
/*0xc4*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n",
/*0xc5*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n",
/*0xc6*/ "A powerful tracking device that can be customised to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n",
/*0xc7*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health, and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n",
/*0xc8*/ "A safe-cracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this of course depends on the individual lock.\n",
/*0xc9*/ "Maian medical marvel, can auto-diagnose and perform surgical proceedures without the need of incisions. Only drawback is that it only works on Maians. The other only drawback is the lack of a bedside manner.\n",
/*0xca*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n",
/*0xcb*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n",
/*0xcc*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n",
/*0xcd*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n",
/*0xce*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimise collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n",
/*0xcf*/ "Details of the flight path and communication codes and frequencies for Air Force One, also current encryption keys.\n",
/*0xd0*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic 2. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n",
/*0xd1*/ "The last personality-state recording of the Artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for Case Study, Theoretical Projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n",
/*0xd2*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n",
/*0xd3*/ "Not your normal outfit. Wear it to pretend not to be you.\n",
/*0xd4*/ "PROXY\n",
/*0xd5*/ "TIMED\n",
/*0xd6*/ "REMOTE\n",
/*0xd7*/ "AUTOGUN\n",
/*0xd8*/ "IMPACT\n",
/*0xd9*/ "Big King Rocket\n",
/*0xda*/ "Data Uplink\n",
/*0xdb*/ "President Scanner\n",
/*0xdc*/ "AutoSurgeon\n",
/*0xdd*/ "Skedar Bomb\n",
/*0xde*/ "Comms Rider\n",
/*0xdf*/ "Tracer Bug\n",
/*0xe0*/ "Target Amplifier\n",
/*0xe1*/ "Safe Item\n",
/*0xe2*/ "Research Tape\n",
/*0xe3*/ "Backup Tape\n",
/*0xe4*/ "Keycard\n",
/*0xe5*/ "Briefcase\n",
/*0xe6*/ "Necklace\n",
/*0xe7*/ "PresidentScan\n",
/*0xe8*/ NULL,
/*0xe9*/ NULL,
/*0xea*/ NULL,
/*0xeb*/ NULL,
/*0xec*/ NULL,
/*0xed*/ NULL,
/*0xee*/ NULL,
/*0xef*/ NULL,
/*0xf0*/ NULL,
/*0xf1*/ NULL,
/*0xf2*/ NULL,
/*0xf3*/ NULL,
};

248
src/lang/gunP.c Normal file
View File

@ -0,0 +1,248 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "\n",
/*0x01*/ "Kill count",
/*0x02*/ "Died once\n",
/*0x03*/ "Died",
/*0x04*/ "times",
/*0x05*/ "Suicide count",
/*0x06*/ "Unarmed\n",
/*0x07*/ "Falcon 2\n",
/*0x08*/ "Falcon 2 (silencer)\n",
/*0x09*/ "Falcon 2 (scope)\n",
/*0x0a*/ "MagSec 4\n",
/*0x0b*/ "Mauler\n",
/*0x0c*/ "DY357 Magnum\n",
/*0x0d*/ "DY357-LX\n",
/*0x0e*/ "Phoenix\n",
/*0x0f*/ "CMP150\n",
/*0x10*/ "AR34\n",
/*0x11*/ "Dragon\n",
/*0x12*/ "SuperDragon\n",
/*0x13*/ "K7 Avenger\n",
/*0x14*/ "Cyclone\n",
/*0x15*/ "MagSec SMG\n",
/*0x16*/ "RC-P120\n",
/*0x17*/ "Callisto NTG\n",
/*0x18*/ "Laptop Gun\n",
/*0x19*/ "Shotgun\n",
/*0x1a*/ "Reaper\n",
/*0x1b*/ "Rocket Launcher\n",
/*0x1c*/ "Devastator\n",
/*0x1d*/ "Slayer\n",
/*0x1e*/ "MaianGrenade\n",
/*0x1f*/ "FarSight XR-20\n",
/*0x20*/ "Sniper Rifle\n",
/*0x21*/ "Crossbow\n",
/*0x22*/ "Tranquilizer\n",
/*0x23*/ "Combat Knife\n",
/*0x24*/ "Grenade\n",
/*0x25*/ "N-Bomb\n",
/*0x26*/ "Timed Mine\n",
/*0x27*/ "Proximity Mine\n",
/*0x28*/ "Remote Mine\n",
/*0x29*/ "ECM Mine\n",
/*0x2a*/ "FlashBang\n",
/*0x2b*/ "Disguise\n",
/*0x2c*/ "Rocket\n",
/*0x2d*/ "Homing Rocket\n",
/*0x2e*/ "Grenade Round\n",
/*0x2f*/ "Laser\n",
/*0x30*/ "Bolt\n",
/*0x31*/ "Psychosis Gun\n",
/*0x32*/ "PP9i\n",
/*0x33*/ "CC13\n",
/*0x34*/ "Klobb\n",
/*0x35*/ "KF7 Special\n",
/*0x36*/ "ZZT (9mm)\n",
/*0x37*/ "D5K\n",
/*0x38*/ "AR53\n",
/*0x39*/ "RC-P45\n",
/*0x3a*/ "Tester\n",
/*0x3b*/ "Night Sight\n",
/*0x3c*/ "CamSpy\n",
/*0x3d*/ "DrugSpy\n",
/*0x3e*/ "BombSpy\n",
/*0x3f*/ "Door Decoder\n",
/*0x40*/ "Explosives\n",
/*0x41*/ "X-Ray Scanner\n",
/*0x42*/ "Alien Medpack\n",
/*0x43*/ "Suitcase\n",
/*0x44*/ "Disguise\n",
/*0x45*/ "IR Scanner\n",
/*0x46*/ "R-Tracker\n",
/*0x47*/ "Briefcase\n",
/*0x48*/ "Suicide Pill\n",
/*0x49*/ "Cloaking Device\n",
/*0x4a*/ "Combat Boost\n",
/*0x4b*/ "Data Uplink\n",
/*0x4c*/ "Horizon Scanner\n",
/*0x4d*/ "Falcon 2 (s)\n",
/*0x4e*/ "Falcon 2 (+)\n",
/*0x4f*/ "FarSight\n",
/*0x50*/ "R-Launcher\n",
/*0x51*/ "Proxy Mine\n",
/*0x52*/ "Psychosis\n",
/*0x53*/ "Knife\n",
/*0x54*/ "DY357\n",
/*0x55*/ "Single Shot\n",
/*0x56*/ "Rapid Fire\n",
/*0x57*/ "Burst Fire\n",
/*0x58*/ "Reapage\n",
/*0x59*/ "Shotgun Fire\n",
/*0x5a*/ "Rail-gun effect\n",
/*0x5b*/ "Rocket Launch\n",
/*0x5c*/ "Targetted Rocket\n",
/*0x5d*/ "Fly-By-Wire Rocket\n",
/*0x5e*/ "Pistol Whip\n",
/*0x5f*/ "Explosive Shells\n",
/*0x60*/ "Guided Shots\n",
/*0x61*/ "Magazine Discharge\n",
/*0x62*/ "Grenade Launcher\n",
/*0x63*/ "Wall Hugger\n",
/*0x64*/ "Punch\n",
/*0x65*/ "Disarm\n",
/*0x66*/ "Follow Lock-On\n",
/*0x67*/ "Use Scope\n",
/*0x68*/ "Half Magazine Discharge\n",
/*0x69*/ "Double Blast\n",
/*0x6a*/ "Grinder\n",
/*0x6b*/ "Sedate\n",
/*0x6c*/ "Lethal Injection\n",
/*0x6d*/ "Knife Slash\n",
/*0x6e*/ "Throw Poison Knife\n",
/*0x6f*/ "Target Locator\n",
/*0x70*/ "Instant Kill\n",
/*0x71*/ "Boost\n",
/*0x72*/ "Revert\n",
/*0x73*/ "High Impact Shells\n",
/*0x74*/ "Cloak\n",
/*0x75*/ "Deploy as Sentry Gun\n",
/*0x76*/ "Proximity Self Destruct\n",
/*0x77*/ "Threat Detector\n",
/*0x78*/ "Timed Explosive\n",
/*0x79*/ "Proximity Explosive\n",
/*0x7a*/ "Remote Explosive\n",
/*0x7b*/ "Detonate\n",
/*0x7c*/ "4-Second Fuse\n",
/*0x7d*/ "Proximity Pinball\n",
/*0x7e*/ "Timed Detonation\n",
/*0x7f*/ "Proximity Detonation\n",
/*0x80*/ "3-Round Burst\n",
/*0x81*/ "Charge-Up Shot\n",
/*0x82*/ "Crouch\n",
/*0x83*/ "Infect\n",
/*0x84*/ "Pulse Fire\n",
/*0x85*/ "Short Range Stream\n",
/*0x86*/ "Impact Detonation\n",
/*0x87*/ "Light Amplifier\n",
/*0x88*/ "Mobile Camera\n",
/*0x89*/ "X-Ray Vision\n",
/*0x8a*/ "Thermal Imager\n",
/*0x8b*/ "Zoom\n",
/*0x8c*/ "Jamming Device\n",
/*0x8d*/ "Connect\n",
/*0x8e*/ "Identify Targets\n",
/*0x8f*/ "Wear Disguise\n",
/*0x90*/ "Place Explosives\n",
/*0x91*/ "Telescopic Sight\n",
/*0x92*/ "Silencer\n",
/*0x93*/ "Magazine Extension\n",
/*0x94*/ "Laser Sight\n",
/*0x95*/ "dataDyne\n",
/*0x96*/ "Carrington\n",
/*0x97*/ "Chesluk Industries\n",
/*0x98*/ "Skedar\n",
/*0x99*/ "Maian\n",
/*0x9a*/ "JonesCorp\n",
/*0x9b*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n",
/*0x9c*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n",
/*0x9d*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n",
/*0x9e*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n",
/*0x9f*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n",
/*0xa0*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n",
/*0xa1*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n",
/*0xa2*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n",
/*0xa3*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n",
/*0xa4*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n",
/*0xa5*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n",
/*0xa6*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n",
/*0xa7*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n",
/*0xa8*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n",
/*0xa9*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n",
/*0xaa*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n",
/*0xab*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n",
/*0xac*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n",
/*0xad*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n",
/*0xae*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n",
/*0xaf*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n",
/*0xb0*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n",
/*0xb1*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n",
/*0xb2*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n",
/*0xb3*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n",
/*0xb4*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n",
/*0xb5*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n",
/*0xb6*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, usually killing the target in approximately six seconds. A dataDyne weapon through and through.\n",
/*0xb7*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n",
/*0xb8*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n",
/*0xb9*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n",
/*0xba*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n",
/*0xbb*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n",
/*0xbc*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n",
/*0xbd*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n",
/*0xbe*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n",
/*0xbf*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n",
/*0xc0*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n",
/*0xc1*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n",
/*0xc2*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n",
/*0xc3*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n",
/*0xc4*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n",
/*0xc5*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n",
/*0xc6*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n",
/*0xc7*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n",
/*0xc8*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n",
/*0xc9*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n",
/*0xca*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n",
/*0xcb*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n",
/*0xcc*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n",
/*0xcd*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n",
/*0xce*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n",
/*0xcf*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n",
/*0xd0*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n",
/*0xd1*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n",
/*0xd2*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n",
/*0xd3*/ "Not your normal outfit. Wear it to pretend not to be you.\n",
/*0xd4*/ "PROXY\n",
/*0xd5*/ "TIMED\n",
/*0xd6*/ "REMOTE\n",
/*0xd7*/ "AUTOGUN\n",
/*0xd8*/ "IMPACT\n",
/*0xd9*/ "Big King Rocket\n",
/*0xda*/ "Data Uplink\n",
/*0xdb*/ "President Scanner\n",
/*0xdc*/ "AutoSurgeon\n",
/*0xdd*/ "Skedar Bomb\n",
/*0xde*/ "Comms Rider\n",
/*0xdf*/ "Tracer Bug\n",
/*0xe0*/ "Target Amplifier\n",
/*0xe1*/ "Flight Plans\n",
/*0xe2*/ "Research Tape\n",
/*0xe3*/ "Backup Disk\n",
/*0xe4*/ "Key Card\n",
/*0xe5*/ "Briefcase\n",
/*0xe6*/ "Necklace\n",
/*0xe7*/ "PresidentScan\n",
/*0xe8*/ NULL,
/*0xe9*/ NULL,
/*0xea*/ NULL,
/*0xeb*/ NULL,
/*0xec*/ NULL,
/*0xed*/ NULL,
/*0xee*/ NULL,
/*0xef*/ NULL,
/*0xf0*/ NULL,
/*0xf1*/ NULL,
/*0xf2*/ NULL,
/*0xf3*/ NULL,
};

248
src/lang/gun_str.c Normal file
View File

@ -0,0 +1,248 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "\n",
/*0x01*/ "Kill count",
/*0x02*/ "Died once\n",
/*0x03*/ "Died",
/*0x04*/ "times",
/*0x05*/ "Suicide count",
/*0x06*/ "Unarmed\n",
/*0x07*/ "Falcon 2\n",
/*0x08*/ "Falcon 2 (silencer)\n",
/*0x09*/ "Falcon 2 (scope)\n",
/*0x0a*/ "MagSec 4\n",
/*0x0b*/ "Mauler\n",
/*0x0c*/ "DY357 Magnum\n",
/*0x0d*/ "DY357-LX\n",
/*0x0e*/ "Phoenix\n",
/*0x0f*/ "CMP150\n",
/*0x10*/ "AR34\n",
/*0x11*/ "Dragon\n",
/*0x12*/ "SuperDragon\n",
/*0x13*/ "K7 Avenger\n",
/*0x14*/ "Cyclone\n",
/*0x15*/ "MagSec SMG\n",
/*0x16*/ "RC-P120\n",
/*0x17*/ "Callisto NTG\n",
/*0x18*/ "Laptop Gun\n",
/*0x19*/ "Shotgun\n",
/*0x1a*/ "Reaper\n",
/*0x1b*/ "Rocket Launcher\n",
/*0x1c*/ "Devastator\n",
/*0x1d*/ "Slayer\n",
/*0x1e*/ "MaianGrenade\n",
/*0x1f*/ "FarSight XR-20\n",
/*0x20*/ "Sniper Rifle\n",
/*0x21*/ "Crossbow\n",
/*0x22*/ "Tranquilizer\n",
/*0x23*/ "Combat Knife\n",
/*0x24*/ "Grenade\n",
/*0x25*/ "N-Bomb\n",
/*0x26*/ "Timed Mine\n",
/*0x27*/ "Proximity Mine\n",
/*0x28*/ "Remote Mine\n",
/*0x29*/ "ECM Mine\n",
/*0x2a*/ "FlashBang\n",
/*0x2b*/ "Disguise\n",
/*0x2c*/ "Rocket\n",
/*0x2d*/ "Homing Rocket\n",
/*0x2e*/ "Grenade Round\n",
/*0x2f*/ "Laser\n",
/*0x30*/ "Bolt\n",
/*0x31*/ "Psychosis Gun\n",
/*0x32*/ "PP9i\n",
/*0x33*/ "CC13\n",
/*0x34*/ "Klobb\n",
/*0x35*/ "KF7 Special\n",
/*0x36*/ "ZZT (9mm)\n",
/*0x37*/ "D5K\n",
/*0x38*/ "AR53\n",
/*0x39*/ "RC-P45\n",
/*0x3a*/ "Tester\n",
/*0x3b*/ "Night Sight\n",
/*0x3c*/ "CamSpy\n",
/*0x3d*/ "DrugSpy\n",
/*0x3e*/ "BombSpy\n",
/*0x3f*/ "Door Decoder\n",
/*0x40*/ "Explosives\n",
/*0x41*/ "X-Ray Scanner\n",
/*0x42*/ "Alien Medpack\n",
/*0x43*/ "Suitcase\n",
/*0x44*/ "Disguise\n",
/*0x45*/ "IR Scanner\n",
/*0x46*/ "R-Tracker\n",
/*0x47*/ "Briefcase\n",
/*0x48*/ "Suicide Pill\n",
/*0x49*/ "Cloaking Device\n",
/*0x4a*/ "Combat Boost\n",
/*0x4b*/ "Data Uplink\n",
/*0x4c*/ "Horizon Scanner\n",
/*0x4d*/ "Falcon 2 (s)\n",
/*0x4e*/ "Falcon 2 (+)\n",
/*0x4f*/ "FarSight\n",
/*0x50*/ "R-Launcher\n",
/*0x51*/ "Proxy Mine\n",
/*0x52*/ "Psychosis\n",
/*0x53*/ "Knife\n",
/*0x54*/ "DY357\n",
/*0x55*/ "Single Shot\n",
/*0x56*/ "Rapid Fire\n",
/*0x57*/ "Burst Fire\n",
/*0x58*/ "Reapage\n",
/*0x59*/ "Shotgun Fire\n",
/*0x5a*/ "Rail-gun effect\n",
/*0x5b*/ "Rocket Launch\n",
/*0x5c*/ "Targetted Rocket\n",
/*0x5d*/ "Fly-By-Wire Rocket\n",
/*0x5e*/ "Pistol Whip\n",
/*0x5f*/ "Explosive Shells\n",
/*0x60*/ "Guided Shots\n",
/*0x61*/ "Magazine Discharge\n",
/*0x62*/ "Grenade Launcher\n",
/*0x63*/ "Wall Hugger\n",
/*0x64*/ "Punch\n",
/*0x65*/ "Disarm\n",
/*0x66*/ "Follow Lock-On\n",
/*0x67*/ "Use Scope\n",
/*0x68*/ "Half Magazine Discharge\n",
/*0x69*/ "Double Blast\n",
/*0x6a*/ "Grinder\n",
/*0x6b*/ "Sedate\n",
/*0x6c*/ "Lethal Injection\n",
/*0x6d*/ "Knife Slash\n",
/*0x6e*/ "Throw Poison Knife\n",
/*0x6f*/ "Target Locator\n",
/*0x70*/ "Instant Kill\n",
/*0x71*/ "Boost\n",
/*0x72*/ "Revert\n",
/*0x73*/ "High Impact Shells\n",
/*0x74*/ "Cloak\n",
/*0x75*/ "Deploy as Sentry Gun\n",
/*0x76*/ "Proximity Self Destruct\n",
/*0x77*/ "Threat Detector\n",
/*0x78*/ "Timed Explosive\n",
/*0x79*/ "Proximity Explosive\n",
/*0x7a*/ "Remote Explosive\n",
/*0x7b*/ "Detonate\n",
/*0x7c*/ "4-Second Fuse\n",
/*0x7d*/ "Proximity Pinball\n",
/*0x7e*/ "Timed Detonation\n",
/*0x7f*/ "Proximity Detonation\n",
/*0x80*/ "3-Round Burst\n",
/*0x81*/ "Charge-Up Shot\n",
/*0x82*/ "Crouch\n",
/*0x83*/ "Infect\n",
/*0x84*/ "Pulse Fire\n",
/*0x85*/ "Short Range Stream\n",
/*0x86*/ "Impact Detonation\n",
/*0x87*/ "Light Amplifier\n",
/*0x88*/ "Mobile Camera\n",
/*0x89*/ "X-Ray Vision\n",
/*0x8a*/ "Thermal Imager\n",
/*0x8b*/ "Zoom\n",
/*0x8c*/ "Jamming Device\n",
/*0x8d*/ "Connect\n",
/*0x8e*/ "Identify Targets\n",
/*0x8f*/ "Wear Disguise\n",
/*0x90*/ "Place Explosives\n",
/*0x91*/ "Telescopic Sight\n",
/*0x92*/ "Silencer\n",
/*0x93*/ "Magazine Extension\n",
/*0x94*/ "Laser Sight\n",
/*0x95*/ "dataDyne\n",
/*0x96*/ "Carrington\n",
/*0x97*/ "Chesluk Industries\n",
/*0x98*/ "Skedar\n",
/*0x99*/ "Maian\n",
/*0x9a*/ "JonesCorp\n",
/*0x9b*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n",
/*0x9c*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n",
/*0x9d*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n",
/*0x9e*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n",
/*0x9f*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n",
/*0xa0*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n",
/*0xa1*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n",
/*0xa2*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n",
/*0xa3*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n",
/*0xa4*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n",
/*0xa5*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n",
/*0xa6*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n",
/*0xa7*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n",
/*0xa8*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n",
/*0xa9*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n",
/*0xaa*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n",
/*0xab*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n",
/*0xac*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n",
/*0xad*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n",
/*0xae*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n",
/*0xaf*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n",
/*0xb0*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n",
/*0xb1*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n",
/*0xb2*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n",
/*0xb3*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n",
/*0xb4*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n",
/*0xb5*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n",
/*0xb6*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, usually killing the target in approximately six seconds. A dataDyne weapon through and through.\n",
/*0xb7*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n",
/*0xb8*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n",
/*0xb9*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n",
/*0xba*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n",
/*0xbb*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n",
/*0xbc*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n",
/*0xbd*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n",
/*0xbe*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n",
/*0xbf*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n",
/*0xc0*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n",
/*0xc1*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n",
/*0xc2*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n",
/*0xc3*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n",
/*0xc4*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n",
/*0xc5*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n",
/*0xc6*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n",
/*0xc7*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n",
/*0xc8*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n",
/*0xc9*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n",
/*0xca*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n",
/*0xcb*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n",
/*0xcc*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n",
/*0xcd*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n",
/*0xce*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n",
/*0xcf*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n",
/*0xd0*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n",
/*0xd1*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n",
/*0xd2*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n",
/*0xd3*/ "Not your normal outfit. Wear it to pretend not to be you.\n",
/*0xd4*/ "PROXY\n",
/*0xd5*/ "TIMED\n",
/*0xd6*/ "REMOTE\n",
/*0xd7*/ "AUTOGUN\n",
/*0xd8*/ "IMPACT\n",
/*0xd9*/ "Big King Rocket\n",
/*0xda*/ "Data Uplink\n",
/*0xdb*/ "President Scanner\n",
/*0xdc*/ "AutoSurgeon\n",
/*0xdd*/ "Skedar Bomb\n",
/*0xde*/ "Comms Rider\n",
/*0xdf*/ "Tracer Bug\n",
/*0xe0*/ "Target Amplifier\n",
/*0xe1*/ "Flight Plans\n",
/*0xe2*/ "Research Tape\n",
/*0xe3*/ "Backup Disk\n",
/*0xe4*/ "Key Card\n",
/*0xe5*/ "Briefcase\n",
/*0xe6*/ "Necklace\n",
/*0xe7*/ "PresidentScan\n",
/*0xe8*/ NULL,
/*0xe9*/ NULL,
/*0xea*/ NULL,
/*0xeb*/ NULL,
/*0xec*/ NULL,
/*0xed*/ NULL,
/*0xee*/ NULL,
/*0xef*/ NULL,
/*0xf0*/ NULL,
/*0xf1*/ NULL,
/*0xf2*/ NULL,
/*0xf3*/ NULL,
};

68
src/lang/impE.c Normal file
View File

@ -0,0 +1,68 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n",
/*0x01*/ "CARRINGTON INSTITUTE\n",
/*0x02*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n",
/*0x03*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "Reactivate automatic defenses\n",
/*0x06*/ "Release hostages\n",
/*0x07*/ "Retrieve experimental weapon\n",
/*0x08*/ "Destroy sensitive information\n",
/*0x09*/ "Deactivate bomb\n",
/*0x0a*/ "Obtain sensitive info.\n",
/*0x0b*/ "Guard's\n",
/*0x0c*/ "Sensitive info\n",
/*0x0d*/ "Sensitive info\n",
/*0x0e*/ "Picked up sensitive info.\n",
/*0x0f*/ "Automatic gun activated.\n",
/*0x10*/ "Too many hostages killed.\n",
/*0x11*/ "Hostages have been saved.\n",
/*0x12*/ "Sensitive information has been destroyed.\n",
/*0x13*/ "Carrington has been killed.\n",
/*0x14*/ "Joanna - we're under attack.\n",
/*0x15*/ "Get the guns back on line - hurry.\n",
/*0x16*/ "The Skedar have taken hostages.\n",
/*0x17*/ "Get up to the offices and save them.\n",
/*0x18*/ "They're using a new form of shield technology.\n",
/*0x19*/ "Foster was working on a new weapon which may \nbe useful.\n",
/*0x1a*/ "Damn it. My office... If they get access...\n",
/*0x1b*/ "Get there first, Jo, and destroy the files.\n",
/*0x1c*/ "Things are desperate. They've planted a bomb.\n",
/*0x1d*/ "Find it and get it out of the building.\n",
/*0x1e*/ "Access denied - authorization failure.\n",
/*0x1f*/ "Emergency overrides have been engaged.\n",
/*0x20*/ "Well done, Joanna. We're nearly clear...\n",
/*0x21*/ "The last dropship is waiting for you. Hurry.\n",
/*0x22*/ "Critical mission object has been destroyed.\n",
/*0x23*/ "The autodefenses will really help me out.\n",
/*0x24*/ "So this is what Foster was working on.\n",
/*0x25*/ "I'll have to go carefully... The hostages are \ncounting on me.\n",
/*0x26*/ "Well, at least I won't know if I'm doing \nanything wrong.\n",
/*0x27*/ "The bomb has been detonated...\n",
/*0x28*/ "You have been given a Devastator.\n",
/*0x29*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n",
/*0x2a*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n",
/*0x2b*/ "But you know how it is, Joanna... I had to make sure my hair was just right, and then there was the suit...\n",
/*0x2c*/ "They should keep you away from mirrors. Nervous?\n",
/*0x2d*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n",
/*0x2e*/ "Where did that come from?\n",
/*0x2f*/ "It was up on ground level...\n",
/*0x30*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n",
/*0x31*/ "Get clear! I'll hold them off... You can come back and get me later!\n",
/*0x32*/ "At least, I hope you can.\n",
/*0x33*/ "You need the Data Uplink.\n",
/*0x34*/ "Connection has been made.\n",
/*0x35*/ "Bypassing security systems.\n",
/*0x36*/ "Virus has been downloaded successfully.\n",
/*0x37*/ "Ship's engines have been activated.\n",
/*0x38*/ "Connection to ship has been broken.\n",
/*0x39*/ "Obtain Data Uplink.\n",
/*0x3a*/ "\n",
/*0x3b*/ "Data Uplink\n",
/*0x3c*/ "A Data Uplink\n",
/*0x3d*/ "Picked up a Data Uplink.\n",
/*0x3e*/ NULL,
/*0x3f*/ NULL,
};

68
src/lang/impJ.c Normal file
View File

@ -0,0 +1,68 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organised response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defences\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them they will help thin the attackers out.\n\n|Objective Two: - Minimise Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs thoughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachinegun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research'.\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. They could use it to wreak havoc on our allies.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb somewhere in the building! It is unlikely to be a subtle device, so merely getting it out of the Institute won't help. It needs to be deactivated. \n\nEND\n",
/*0x01*/ "CARRINGTON INSTITUTE\n",
/*0x02*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organised response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defences\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them they will help thin the attackers out.\n\n|Objective Two: - Minimise Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs thoughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachinegun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research'.\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb somewhere in the building! It is unlikely to be a subtle device, so merely getting it out of the Institute won't help. It needs to be deactivated. \n\nEND\n",
/*0x03*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organised response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimise Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs thoughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachinegun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research'.\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb somewhere in the building! It is unlikely to be a subtle device, so merely getting it out of the Institute won't help. It needs to be deactivated. \n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "Reactivate Automatic Defences\n",
/*0x06*/ "Minimise Hostage Casualties\n",
/*0x07*/ "Retrieve Experimental Weapon\n",
/*0x08*/ "Destroy Sensitive Information\n",
/*0x09*/ "Deactivate Bomb\n",
/*0x0a*/ "Obtain Sensitive Info\n",
/*0x0b*/ "Guards\n",
/*0x0c*/ "Sensitive Info\n",
/*0x0d*/ "Sensitive Info\n",
/*0x0e*/ "Picked up Sensitive Info.\n",
/*0x0f*/ "Automatic gun activated\n",
/*0x10*/ "Too many hostages killed\n",
/*0x11*/ "Hostages have been saved\n",
/*0x12*/ "Sensitive information has been destroyed\n",
/*0x13*/ "Carrington has been Killed\n",
/*0x14*/ "Joanna - we're under attack.\n",
/*0x15*/ "Get the guns back on line, hurry.\n",
/*0x16*/ "The Skedar have taken hostages.\n",
/*0x17*/ "Get up to the offices and save them.\n",
/*0x18*/ "They're using a new form of shield technology.\n",
/*0x19*/ "Foster was working on a new weapon which may \nbe useful.\n",
/*0x1a*/ "Damn it. My office.. if they get access...\n",
/*0x1b*/ "Get there first, Jo, and destroy the files.\n",
/*0x1c*/ "Things are desperate. They've planted a bomb.\n",
/*0x1d*/ "Find it and get it out of the building.\n",
/*0x1e*/ "Access Denied - Authorization failiure.\n",
/*0x1f*/ "Emergency Overrides Have Been Engaged.\n",
/*0x20*/ "Well done Joanna, we're nearly clear...\n",
/*0x21*/ "The last dropship is waiting for you. Hurry.\n",
/*0x22*/ "Critical Mission Object Has Been Destroyed\n",
/*0x23*/ "The autodefences will really help me out.\n",
/*0x24*/ "So this is what Foster was working on.\n",
/*0x25*/ "I'll have to go carefully.. the hostages are\ncounting on me.\n",
/*0x26*/ "Well, at least I won't know if i'm doing\nanything wrong.\n",
/*0x27*/ "The bomb has been detonated...\n",
/*0x28*/ "You Have Been Given A Grenade Launcher\n",
/*0x29*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.",
/*0x2a*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!",
/*0x2b*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...",
/*0x2c*/ "They should keep you away from mirrors. Nervous?",
/*0x2d*/ "Very. I've waited for this moment for so many years. Contact, friendly contact between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House and it will finally happen...",
/*0x2e*/ "Where did that come from?",
/*0x2f*/ "It was up on ground level...",
/*0x30*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!",
/*0x31*/ "Get clear! I'll hold them off, you can come back and get me later!",
/*0x32*/ "At least, I hope you can.",
/*0x33*/ NULL,
/*0x34*/ NULL,
/*0x35*/ NULL,
/*0x36*/ NULL,
/*0x37*/ NULL,
/*0x38*/ NULL,
/*0x39*/ NULL,
/*0x3a*/ NULL,
/*0x3b*/ NULL,
/*0x3c*/ NULL,
/*0x3d*/ NULL,
/*0x3e*/ NULL,
/*0x3f*/ NULL,
};

68
src/lang/impP.c Normal file
View File

@ -0,0 +1,68 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n",
/*0x01*/ "CARRINGTON INSTITUTE\n",
/*0x02*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n",
/*0x03*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "Reactivate automatic defenses\n",
/*0x06*/ "Minimize hostage casualties\n",
/*0x07*/ "Retrieve experimental weapon\n",
/*0x08*/ "Destroy sensitive information\n",
/*0x09*/ "Deactivate bomb\n",
/*0x0a*/ "Obtain sensitive info.\n",
/*0x0b*/ "Guard's\n",
/*0x0c*/ "Sensitive info\n",
/*0x0d*/ "Sensitive info\n",
/*0x0e*/ "Picked up sensitive info.\n",
/*0x0f*/ "Automatic gun activated.\n",
/*0x10*/ "Too many hostages killed.\n",
/*0x11*/ "Hostages have been saved.\n",
/*0x12*/ "Sensitive information has been destroyed.\n",
/*0x13*/ "Carrington has been killed.\n",
/*0x14*/ "Joanna - we're under attack.\n",
/*0x15*/ "Get the guns back on line - hurry.\n",
/*0x16*/ "The Skedar have taken hostages.\n",
/*0x17*/ "Get up to the offices and save them.\n",
/*0x18*/ "They're using a new form of shield technology.\n",
/*0x19*/ "Foster was working on a new weapon which may \nbe useful.\n",
/*0x1a*/ "Damn it. My office... If they get access...\n",
/*0x1b*/ "Get there first, Jo, and destroy the files.\n",
/*0x1c*/ "Things are desperate. They've planted a bomb.\n",
/*0x1d*/ "Find it and get it out of the building.\n",
/*0x1e*/ "Access denied - authorization failure.\n",
/*0x1f*/ "Emergency overrides have been engaged.\n",
/*0x20*/ "Well done, Joanna. We're nearly clear...\n",
/*0x21*/ "The last dropship is waiting for you. Hurry.\n",
/*0x22*/ "Critical mission object has been destroyed.\n",
/*0x23*/ "The autodefenses will really help me out.\n",
/*0x24*/ "So this is what Foster was working on.\n",
/*0x25*/ "I'll have to go carefully... The hostages are\ncounting on me.\n",
/*0x26*/ "Well, at least I won't know if I'm doing\nanything wrong.\n",
/*0x27*/ "The bomb has been detonated...\n",
/*0x28*/ "You have been given a Devastator.\n",
/*0x29*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n",
/*0x2a*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n",
/*0x2b*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...\n",
/*0x2c*/ "They should keep you away from mirrors. Nervous?\n",
/*0x2d*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n",
/*0x2e*/ "Where did that come from?\n",
/*0x2f*/ "It was up on ground level...\n",
/*0x30*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n",
/*0x31*/ "Get clear! I'll hold them off; you can come back and get me later!\n",
/*0x32*/ "At least, I hope you can.\n",
/*0x33*/ "You need the Data Uplink.\n",
/*0x34*/ "Connection has been made.\n",
/*0x35*/ "Bypassing security systems.\n",
/*0x36*/ "Virus has been downloaded successfully.\n",
/*0x37*/ "Ship's engines have been activated.\n",
/*0x38*/ "Connection to ship has been broken.\n",
/*0x39*/ "Obtain Data Uplink.\n",
/*0x3a*/ "\n",
/*0x3b*/ "Data Uplink\n",
/*0x3c*/ "A Data Uplink\n",
/*0x3d*/ "Picked up a Data Uplink.\n",
/*0x3e*/ NULL,
/*0x3f*/ NULL,
};

68
src/lang/imp_str.c Normal file
View File

@ -0,0 +1,68 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n",
/*0x01*/ "CARRINGTON INSTITUTE\n",
/*0x02*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n",
/*0x03*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "Reactivate automatic defenses\n",
/*0x06*/ "Minimize hostage casualties\n",
/*0x07*/ "Retrieve experimental weapon\n",
/*0x08*/ "Destroy sensitive information\n",
/*0x09*/ "Deactivate bomb\n",
/*0x0a*/ "Obtain sensitive info.\n",
/*0x0b*/ "Guard's\n",
/*0x0c*/ "Sensitive info\n",
/*0x0d*/ "Sensitive info\n",
/*0x0e*/ "Picked up sensitive info.\n",
/*0x0f*/ "Automatic gun activated.\n",
/*0x10*/ "Too many hostages killed.\n",
/*0x11*/ "Hostages have been saved.\n",
/*0x12*/ "Sensitive information has been destroyed.\n",
/*0x13*/ "Carrington has been killed.\n",
/*0x14*/ "Joanna - we're under attack.\n",
/*0x15*/ "Get the guns back on line - hurry.\n",
/*0x16*/ "The Skedar have taken hostages.\n",
/*0x17*/ "Get up to the offices and save them.\n",
/*0x18*/ "They're using a new form of shield technology.\n",
/*0x19*/ "Foster was working on a new weapon which may \nbe useful.\n",
/*0x1a*/ "Damn it. My office... If they get access...\n",
/*0x1b*/ "Get there first, Jo, and destroy the files.\n",
/*0x1c*/ "Things are desperate. They've planted a bomb.\n",
/*0x1d*/ "Find it and get it out of the building.\n",
/*0x1e*/ "Access denied - authorization failure.\n",
/*0x1f*/ "Emergency overrides have been engaged.\n",
/*0x20*/ "Well done, Joanna. We're nearly clear...\n",
/*0x21*/ "The last dropship is waiting for you. Hurry.\n",
/*0x22*/ "Critical mission object has been destroyed.\n",
/*0x23*/ "The autodefenses will really help me out.\n",
/*0x24*/ "So this is what Foster was working on.\n",
/*0x25*/ "I'll have to go carefully... The hostages are\ncounting on me.\n",
/*0x26*/ "Well, at least I won't know if I'm doing\nanything wrong.\n",
/*0x27*/ "The bomb has been detonated...\n",
/*0x28*/ "You have been given a Devastator.\n",
/*0x29*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n",
/*0x2a*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n",
/*0x2b*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...\n",
/*0x2c*/ "They should keep you away from mirrors. Nervous?\n",
/*0x2d*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n",
/*0x2e*/ "Where did that come from?\n",
/*0x2f*/ "It was up on ground level...\n",
/*0x30*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n",
/*0x31*/ "Get clear! I'll hold them off; you can come back and get me later!\n",
/*0x32*/ "At least, I hope you can.\n",
/*0x33*/ "You need the Data Uplink.\n",
/*0x34*/ "Connection has been made.\n",
/*0x35*/ "Bypassing security systems.\n",
/*0x36*/ "Virus has been downloaded successfully.\n",
/*0x37*/ "Ship's engines have been activated.\n",
/*0x38*/ "Connection to ship has been broken.\n",
/*0x39*/ "Obtain Data Uplink.\n",
/*0x3a*/ "\n",
/*0x3b*/ "Data Uplink\n",
/*0x3c*/ "A Data Uplink\n",
/*0x3d*/ "Picked up a Data Uplink.\n",
/*0x3e*/ NULL,
/*0x3f*/ NULL,
};

3
src/lang/junE.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/junJ.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/junP.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/jun_str.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/lamE.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/lamJ.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/lamP.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/lam_str.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

60
src/lang/leeE.c Normal file
View File

@ -0,0 +1,60 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n",
/*0x01*/ "SKEDAR ASSAULT SHIP\n",
/*0x02*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n",
/*0x03*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "Disable shield system\n",
/*0x06*/ "Open hangar doors\n",
/*0x07*/ "Access navigational systems\n",
/*0x08*/ "Sabotage engine systems\n",
/*0x09*/ "Gain control of bridge\n",
/*0x0a*/ "Ship's shields have been lowered.\n",
/*0x0b*/ "Hangar doors have been opened.\n",
/*0x0c*/ "Elvis has been killed.\n",
/*0x0d*/ "Navigational information has been retrieved.\n",
/*0x0e*/ "Lift has been activated.\n",
/*0x0f*/ "All hangar Skedar have been killed.\n",
/*0x10*/ "Outside, Joanna. Get the shields down and \nwe can help you.\n",
/*0x11*/ "You've got to open the hangar doors so we can dock.\n",
/*0x12*/ "Okay, we're in. I'll meet you in the hangar.\n",
/*0x13*/ "Good to see you, Joanna.\n",
/*0x14*/ "Take this - you should find it useful...\n",
/*0x15*/ "Received AR34 assault rifle.\n",
/*0x16*/ "Time to head upwards. I'll take this lift; \nyou take the other one.\n",
/*0x17*/ "Engines have been disabled.\n",
/*0x18*/ "Look out, Joanna! I think we've made them angry...\n",
/*0x19*/ "Bridge has been captured.\n",
/*0x1a*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n",
/*0x1b*/ "I've got to get those shields down to let Elvis \nin. I need all the help I can get.\n",
/*0x1c*/ "Now only the hangar bay doors are in the way.\n",
/*0x1d*/ "This machine contains the Skedar star maps.\n",
/*0x1e*/ "If we control the bridge, then the ship is ours.\n",
/*0x1f*/ "Time to head upwards...\n",
/*0x20*/ "Oohhh... I'd better not be where I think I am.\n",
/*0x21*/ "And it's worse than that, my dear. Just look who you've got for company.\n",
/*0x22*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n",
/*0x23*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n",
/*0x24*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n",
/*0x25*/ "Why are you doing this, Cassandra?\n",
/*0x26*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n",
/*0x27*/ "Eeeeaaarrrrggghhh!!!\n",
/*0x28*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n",
/*0x29*/ "Hmmmm?\n",
/*0x2a*/ "I don't... I don't believe it!\n",
/*0x2b*/ "Elvis? What is it?\n",
/*0x2c*/ "Where are you going?\n",
/*0x2d*/ "We have to get down to the surface! Follow me!\n",
/*0x2e*/ "We have to get out of here!\n",
/*0x2f*/ "Hangar doors locked - shields still active.\n",
/*0x30*/ "Critical mission object destroyed.\n",
/*0x31*/ "Ammo depleted - consoles can't be destroyed.\n",
/*0x32*/ "Obtain De Vries' necklace.\n",
/*0x33*/ "Cassandra De Vries'\n",
/*0x34*/ "Necklace\n",
/*0x35*/ "De Vries' necklace\n",
/*0x36*/ "Picked up De Vries' necklace.\n",
/*0x37*/ NULL,
};

60
src/lang/leeJ.c Normal file
View File

@ -0,0 +1,60 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar Assault Ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the Assault Ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking manoeuvres from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the Starmap so that he can find out where the Assault Ship is heading. There might also be the locations of Skedar strongholds within the Starmap - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the Assault Ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control Of Bridge\n\nOnce the Bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n",
/*0x01*/ "SKEDAR ASSAULT SHIP\n",
/*0x02*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar Assault Ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the Assault Ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking manoeuvres from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the Starmap so that he can find out where the Assault Ship is heading. There might also be the locations of Skedar strongholds within the Starmap - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the Assault Ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control Of Bridge\n\nOnce the Bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n",
/*0x03*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar Assault Ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the Assault Ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking manoeuvres from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the Starmap so that he can find out where the Assault Ship is heading. There might also be the locations of Skedar strongholds within the Starmap - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control Of Bridge\n\nOnce the Bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "Disable Shield System\n",
/*0x06*/ "Open Hangar Doors\n",
/*0x07*/ "Access Navigational Systems\n",
/*0x08*/ "Sabotage Engine Systems\n",
/*0x09*/ "Gain Control Of Bridge\n",
/*0x0a*/ "Ships Shields Have Been Lowered\n",
/*0x0b*/ "Hangar doors have been opened\n",
/*0x0c*/ "Elvis has been killed\n",
/*0x0d*/ "Navigational Information Has Been Retrieved\n",
/*0x0e*/ "Lift has been activated\n",
/*0x0f*/ "All hanagar skedar have been killed.\n",
/*0x10*/ "We're outside Joanna. Get the shields down and\nwe can help you.\n",
/*0x11*/ "You've got to open the hangar doors so we can dock.\n",
/*0x12*/ "Okay, we're in. I'll meet you in the hangar.\n",
/*0x13*/ "Good to see you Joanna.\n",
/*0x14*/ "Take this, you should find it useful...\n",
/*0x15*/ "Recieved AR34 Assault RIfle\n",
/*0x16*/ "Time to head upwards. I'll take this lift,\nyou take the other one\n",
/*0x17*/ "Engines have been disabled.\n",
/*0x18*/ "Heads up Jo. I think we've made them angry...\n",
/*0x19*/ "Bridge has been captured.\n",
/*0x1a*/ "Okay Jo, you head upwards. I'll stop any pursuit.\n",
/*0x1b*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n",
/*0x1c*/ "Now only the hangar bay doors are in the way.\n",
/*0x1d*/ "This machine contains the Skedar star maps.\n",
/*0x1e*/ "If we control the bridge then the ship is ours.\n",
/*0x1f*/ "Time to head upwards....\n",
/*0x20*/ "Oohhh... I'd better not be where I think I am.",
/*0x21*/ "And it's worse than that, my dear. Just look who you've got for company.",
/*0x22*/ "You! I thought you'd managed to escape. We found no trace of you at all.",
/*0x23*/ "You couldn't find me. But there was no hiding from the Skedar. As you and Mr. Carrington just discovered.",
/*0x24*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.",
/*0x25*/ "Why are you doing this, Cassandra?",
/*0x26*/ "The Skedar used me, Joanna. You are my best chance for revenge.",
/*0x27*/ "Eeeeaaarrrrggghhh!!!",
/*0x28*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.",
/*0x29*/ "Hmmmm?",
/*0x2a*/ "I don't... I don't believe it!",
/*0x2b*/ "Elvis? what is it?",
/*0x2c*/ "Where are you going?",
/*0x2d*/ "We have to get down to the surface! Follow me!",
/*0x2e*/ NULL,
/*0x2f*/ NULL,
/*0x30*/ NULL,
/*0x31*/ NULL,
/*0x32*/ NULL,
/*0x33*/ NULL,
/*0x34*/ NULL,
/*0x35*/ NULL,
/*0x36*/ NULL,
/*0x37*/ NULL,
};

60
src/lang/leeP.c Normal file
View File

@ -0,0 +1,60 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n",
/*0x01*/ "SKEDAR ASSAULT SHIP\n",
/*0x02*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n",
/*0x03*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "Disable shield system\n",
/*0x06*/ "Open hangar doors\n",
/*0x07*/ "Access navigational systems\n",
/*0x08*/ "Sabotage engine systems\n",
/*0x09*/ "Gain control of bridge\n",
/*0x0a*/ "Ship's shields have been lowered.\n",
/*0x0b*/ "Hangar doors have been opened.\n",
/*0x0c*/ "Elvis has been killed.\n",
/*0x0d*/ "Navigational information has been retrieved.\n",
/*0x0e*/ "Lift has been activated.\n",
/*0x0f*/ "All hangar Skedar have been killed.\n",
/*0x10*/ "Outside, Joanna. Get the shields down and\nwe can help you.\n",
/*0x11*/ "You've got to open the hangar doors so we can dock.\n",
/*0x12*/ "Okay, we're in. I'll meet you in the hangar.\n",
/*0x13*/ "Good to see you, Joanna.\n",
/*0x14*/ "Take this - you should find it useful...\n",
/*0x15*/ "Received AR34 assault rifle.\n",
/*0x16*/ "Time to head upwards. I'll take this lift;\nyou take the other one.\n",
/*0x17*/ "Engines have been disabled.\n",
/*0x18*/ "Look out Joanna! I think we've made them angry...\n",
/*0x19*/ "Bridge has been captured.\n",
/*0x1a*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n",
/*0x1b*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n",
/*0x1c*/ "Now only the hangar bay doors are in the way.\n",
/*0x1d*/ "This machine contains the Skedar star maps.\n",
/*0x1e*/ "If we control the bridge, then the ship is ours.\n",
/*0x1f*/ "Time to head upwards...\n",
/*0x20*/ "Oohhh... I'd better not be where I think I am.\n",
/*0x21*/ "And it's worse than that, my dear. Just look who you've got for company.\n",
/*0x22*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n",
/*0x23*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n",
/*0x24*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n",
/*0x25*/ "Why are you doing this, Cassandra?\n",
/*0x26*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n",
/*0x27*/ "Eeeeaaarrrrggghhh!!!\n",
/*0x28*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n",
/*0x29*/ "Hmmmm?\n",
/*0x2a*/ "I don't... I don't believe it!\n",
/*0x2b*/ "Elvis? What is it?\n",
/*0x2c*/ "Where are you going?\n",
/*0x2d*/ "We have to get down to the surface! Follow me!\n",
/*0x2e*/ "We have to get out of here!\n",
/*0x2f*/ "Hangar doors locked - shields still active.\n",
/*0x30*/ "Critical mission object destroyed.\n",
/*0x31*/ "Ammo depleted - consoles can't be destroyed.\n",
/*0x32*/ NULL,
/*0x33*/ NULL,
/*0x34*/ NULL,
/*0x35*/ NULL,
/*0x36*/ NULL,
/*0x37*/ NULL,
};

60
src/lang/lee_str.c Normal file
View File

@ -0,0 +1,60 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n",
/*0x01*/ "SKEDAR ASSAULT SHIP\n",
/*0x02*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n",
/*0x03*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "Disable shield system\n",
/*0x06*/ "Open hangar doors\n",
/*0x07*/ "Access navigational systems\n",
/*0x08*/ "Sabotage engine systems\n",
/*0x09*/ "Gain control of bridge\n",
/*0x0a*/ "Ship's shields have been lowered.\n",
/*0x0b*/ "Hangar doors have been opened.\n",
/*0x0c*/ "Elvis has been killed.\n",
/*0x0d*/ "Navigational information has been retrieved.\n",
/*0x0e*/ "Lift has been activated.\n",
/*0x0f*/ "All hangar Skedar have been killed.\n",
/*0x10*/ "Outside, Joanna. Get the shields down and\nwe can help you.\n",
/*0x11*/ "You've got to open the hangar doors so we can dock.\n",
/*0x12*/ "Okay, we're in. I'll meet you in the hangar.\n",
/*0x13*/ "Good to see you, Joanna.\n",
/*0x14*/ "Take this - you should find it useful...\n",
/*0x15*/ "Received AR34 assault rifle.\n",
/*0x16*/ "Time to head upwards. I'll take this lift;\nyou take the other one.\n",
/*0x17*/ "Engines have been disabled.\n",
/*0x18*/ "Look out Joanna! I think we've made them angry...\n",
/*0x19*/ "Bridge has been captured.\n",
/*0x1a*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n",
/*0x1b*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n",
/*0x1c*/ "Now only the hangar bay doors are in the way.\n",
/*0x1d*/ "This machine contains the Skedar star maps.\n",
/*0x1e*/ "If we control the bridge, then the ship is ours.\n",
/*0x1f*/ "Time to head upwards...\n",
/*0x20*/ "Oohhh... I'd better not be where I think I am.\n",
/*0x21*/ "And it's worse than that, my dear. Just look who you've got for company.\n",
/*0x22*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n",
/*0x23*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n",
/*0x24*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n",
/*0x25*/ "Why are you doing this, Cassandra?\n",
/*0x26*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n",
/*0x27*/ "Eeeeaaarrrrggghhh!!!\n",
/*0x28*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n",
/*0x29*/ "Hmmmm?\n",
/*0x2a*/ "I don't... I don't believe it!\n",
/*0x2b*/ "Elvis? What is it?\n",
/*0x2c*/ "Where are you going?\n",
/*0x2d*/ "We have to get down to the surface! Follow me!\n",
/*0x2e*/ "We have to get out of here!\n",
/*0x2f*/ "Hangar doors locked - shields still active.\n",
/*0x30*/ "Critical mission object destroyed.\n",
/*0x31*/ "Ammo depleted - consoles can't be destroyed.\n",
/*0x32*/ NULL,
/*0x33*/ NULL,
/*0x34*/ NULL,
/*0x35*/ NULL,
/*0x36*/ NULL,
/*0x37*/ NULL,
};

3
src/lang/lenE.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/lenJ.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/lenP.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

3
src/lang/len_str.c Normal file
View File

@ -0,0 +1,3 @@
#include <ultra64.h>
char *lang[] = { NULL };

112
src/lang/lipE.c Normal file
View File

@ -0,0 +1,112 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals, it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n",
/*0x01*/ "AREA 51 - MEDLABS\n",
/*0x02*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n",
/*0x03*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "\n",
/*0x06*/ "\n",
/*0x07*/ "\n",
/*0x08*/ "\n",
/*0x09*/ "Obtain and use lab technician disguise\n",
/*0x0a*/ "Destroy computer records\n",
/*0x0b*/ "Locate conspiracy evidence\n",
/*0x0c*/ "Gain access to autopsy lab\n",
/*0x0d*/ "Rescue the crash Survivor\n",
/*0x0e*/ "Research records destroyed.\n",
/*0x0f*/ "Obtain lab clothes.\n",
/*0x10*/ "Lab Tech's\n",
/*0x11*/ "Lab clothes\n",
/*0x12*/ "Lab clothes\n",
/*0x13*/ "Picked up lab clothes.\n",
/*0x14*/ "Access to door control systems denied.\n",
/*0x15*/ "Access to light control systems denied.\n",
/*0x16*/ "Access to security control systems denied.\n",
/*0x17*/ "Virus downloaded to console.\n",
/*0x18*/ "Obtain Data Uplink.\n",
/*0x19*/ "Lab Tech's\n",
/*0x1a*/ "Data Uplink\n",
/*0x1b*/ "Data Uplink\n",
/*0x1c*/ "Picked up Data Uplink.\n",
/*0x1d*/ "Laboratory accessed successfully.\n",
/*0x1e*/ "Data Uplink connected.\n",
/*0x1f*/ "Data Uplink connection broken.\n",
/*0x20*/ "Obtain medlab 2 key card.\n",
/*0x21*/ "Guard's\n",
/*0x22*/ "Medlab 2 key card\n",
/*0x23*/ "Medlab 2 key card\n",
/*0x24*/ "Picked up medlab 2 key card.\n",
/*0x25*/ "Who are you?\n",
/*0x26*/ "Hey - you've got my clothes.\n",
/*0x27*/ "Help - help!\n",
/*0x28*/ "Don't shoot me!\n",
/*0x29*/ "Oh, my God - a gun!\n",
/*0x2a*/ "There's an intruder in the complex.\n",
/*0x2b*/ "Give me back my clothes - or else!\n",
/*0x2c*/ "Right - you've asked for it!\n",
/*0x2d*/ "Give me my clothes.\n",
/*0x2e*/ "I don't have much time!!!\n",
/*0x2f*/ "The enemy has discovered the disguise.\n",
/*0x30*/ "Virus has already been downloaded.\n",
/*0x31*/ "Initiating virus download.\n",
/*0x32*/ "So, you got here at last.\n",
/*0x33*/ "Hey, you're not... SECURITY ALERT!\n",
/*0x34*/ "No guns allowed in here - put your weapon away.\n",
/*0x35*/ "I won't tell you again - lose the weapon.\n",
/*0x36*/ "Right - I'm calling security.\n",
/*0x37*/ "Everyone's been waiting for you...\n",
/*0x38*/ "Critical mission personnel killed.\n",
/*0x39*/ "Cannot gain access to autopsy lab.\n",
/*0x3a*/ "Hey, that's not Harry. It's an intruder.\n",
/*0x3b*/ "Obtain op room key card.\n",
/*0x3c*/ "Guard's\n",
/*0x3d*/ "Op room key card\n",
/*0x3e*/ "Op room key card\n",
/*0x3f*/ "Picked up operation room key card.\n",
/*0x40*/ "Elvis has been killed.\n",
/*0x41*/ "Get the hell out of here!\n",
/*0x42*/ "Containment unit raised up.\n",
/*0x43*/ "Containment unit lowered down.\n",
/*0x44*/ "Mission critical equipment destroyed.\n",
/*0x45*/ "Obtain X-Ray Scanner.\n",
/*0x46*/ "\n",
/*0x47*/ "X-Ray Scanner\n",
/*0x48*/ "X-Ray Scanner\n",
/*0x49*/ "Picked up X-Ray Scanner.\n",
/*0x4a*/ "Scanner target acquired.\n",
/*0x4b*/ "Target ID confirmed - XT origin.\n",
/*0x4c*/ "Scanner lock lost.\n",
/*0x4d*/ "Disguise has been worn.\n",
/*0x4e*/ "The showers... Now, if I can convince someone \nto part with their uniform...\n",
/*0x4f*/ "The temperature's dropping... You must be \nclose to the cryo room.\n",
/*0x50*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n",
/*0x51*/ "There he is, Jo! Hurry or you'll be too late!\n",
/*0x52*/ "Leave this area now.\n",
/*0x53*/ "Should you be in here?\n",
/*0x54*/ "Holy...\n",
/*0x55*/ "It's a spy!\n",
/*0x56*/ "Warn the others...\n",
/*0x57*/ "Imposter!\n",
/*0x58*/ "Lighting systems overloaded.\n",
/*0x59*/ "Alternative entrance to medlabs created.\n",
/*0x5a*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n",
/*0x5b*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n",
/*0x5c*/ "In that crate.\n",
/*0x5d*/ "Cute. Very cute.\n",
/*0x5e*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n",
/*0x5f*/ "Certainly. Any other pearls of wisdom?\n",
/*0x60*/ "That crate...\n",
/*0x61*/ "Yes?\n",
/*0x62*/ "It really doesn't like being shot.\n",
/*0x63*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n",
/*0x64*/ "Put your hands up and step away from the \nalien.\n",
/*0x65*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n",
/*0x66*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n",
/*0x67*/ "Director Easton will hear about this, \nyoung lady.\n",
/*0x68*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n",
/*0x69*/ "Automatic Defenses Disabled.\n",
/*0x6a*/ NULL,
/*0x6b*/ NULL,
};

112
src/lang/lipJ.c Normal file
View File

@ -0,0 +1,112 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that but it won't last forever, so make good use of it. Wipe out their records and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. Install a virus using the Data Uplink device, but be alert for the possibility that this may set off an alarm.\n\n|Objective Three: - Locate Conspiracy Evidence\n\nJohnathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue The Crash Survivor\n\nOnce you are in the Lab you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive, or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n",
/*0x01*/ "AREA 51 - MEDLABS\n",
/*0x02*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that but it won't last forever, so make good use of it. Wipe out their records and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJohnathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue The Crash Survivor\n\nOnce you are in the Lab you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive, or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n",
/*0x03*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that but it won't last forever, so make good use of it. Wipe out their records and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue The Crash Survivor\n\nOnce you are in the Lab you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive, or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "\n",
/*0x06*/ "\n",
/*0x07*/ "\n",
/*0x08*/ "\n",
/*0x09*/ "Obtain Laboratory Technician Disguise\n",
/*0x0a*/ "Destroy Computer Records\n",
/*0x0b*/ "Locate Conspiracy Evidence\n",
/*0x0c*/ "Gain Access To Autopsy Lab\n",
/*0x0d*/ "Rescue Elvis\n",
/*0x0e*/ "Research Records Destroyed\n",
/*0x0f*/ "Obtain Lab CLothes\n",
/*0x10*/ "Lab Techs\n",
/*0x11*/ "Lab Clothes\n",
/*0x12*/ "Lab Clothes\n",
/*0x13*/ "Picked up Lab Clothes\n",
/*0x14*/ "Access To Door Control Systems Denied\n",
/*0x15*/ "Access To Light Control Systems Denied\n",
/*0x16*/ "Access To Security Control Systems Denied\n",
/*0x17*/ "Virus Downloaded To Console\n",
/*0x18*/ "Obtain Data Uplink\n",
/*0x19*/ "Lab Techs\n",
/*0x1a*/ "Data Uplink\n",
/*0x1b*/ "Data Uplink\n",
/*0x1c*/ "Picked up Data Uplink\n",
/*0x1d*/ "Laboratory Accessed Successfully\n",
/*0x1e*/ "Data Uplink Connected\n",
/*0x1f*/ "Data Uplink Connection Broken\n",
/*0x20*/ "Obtain Medlab2 Keycard\n",
/*0x21*/ "Guards\n",
/*0x22*/ "Medlab 2 Keycard\n",
/*0x23*/ "Medlab 2 Keycard\n",
/*0x24*/ "Picked up Medlab 2 Keycard.\n",
/*0x25*/ "Who are you?\n",
/*0x26*/ "Hey - you've got my clothes\n",
/*0x27*/ "Help - Help\n",
/*0x28*/ "Don't shoot me\n",
/*0x29*/ "Oh my god - a gun!\n",
/*0x2a*/ "There's an intruder in the complex\n",
/*0x2b*/ "Give me back my clothes - or else\n",
/*0x2c*/ "Right - you've asked for it!\n",
/*0x2d*/ "Give me my clothes\n",
/*0x2e*/ "I don't have much time before the body's discovered\n",
/*0x2f*/ "The enemy has discovered the disguise\n",
/*0x30*/ "Virus has already been downloaded\n",
/*0x31*/ "Initiating virus download\n",
/*0x32*/ "So, you've got here at last.\n",
/*0x33*/ "Hey, you're not.... SECURITY ALERT\n",
/*0x34*/ "Not guns allowed in here - put away you're weapon.\n",
/*0x35*/ "I won't ask you again - ditch the weapon\n",
/*0x36*/ "Right - I'm calling security.\n",
/*0x37*/ "Everyone's been waiting for you...\n",
/*0x38*/ "Critical Mission Personnel Killed.\n",
/*0x39*/ "Cannot gain access to autopsy lab.\n",
/*0x3a*/ "Hey, that's not Harry. It's an intruder.\n",
/*0x3b*/ "Obtain Op-room Keycard\n",
/*0x3c*/ "Guards\n",
/*0x3d*/ "Oproom Keycard\n",
/*0x3e*/ "Oproom Keycard\n",
/*0x3f*/ "Picked up Operation Room Keycard.\n",
/*0x40*/ "Elvis has been Killed.\n",
/*0x41*/ "Get The Hell Out Of Here!\n",
/*0x42*/ "Containment Unit Raised Up\n",
/*0x43*/ "Containment Unit Lowered Down\n",
/*0x44*/ "Mission Critical Equipment Destroyed\n",
/*0x45*/ "Obtain X-ray scanner\n",
/*0x46*/ "\n",
/*0x47*/ "X-ray scanner\n",
/*0x48*/ "X-ray scanner\n",
/*0x49*/ "Picked up X-ray scanner.\n",
/*0x4a*/ "Scanner Target Aquired\n",
/*0x4b*/ "Target ID confirmed - XT origin\n",
/*0x4c*/ "Scanner lock lost.\n",
/*0x4d*/ "Disguise has been worn.\n",
/*0x4e*/ "The showers... now, if I can convince someone\nto part with their uniform...\n",
/*0x4f*/ "The temperature's dropping... you must be \nclose to the cryo room.\n",
/*0x50*/ "The air's heavily recycled round here - must\n be near the autopsy lab.\n",
/*0x51*/ "There he is, Jo! Hurry or you'll be too late!\n",
/*0x52*/ "Leave this area now.\n",
/*0x53*/ "Should you be in here?\n",
/*0x54*/ "Holy.....\n",
/*0x55*/ "It's a spy!\n",
/*0x56*/ "Warn the others...\n",
/*0x57*/ "Impostor!\n",
/*0x58*/ "Lighting Systems Overloaded.\n",
/*0x59*/ "The problem you have is that there is no way to sneak into the research section. The only way in available to you is a weak section of wall I've marked in the room beyond the stores. It can be destroyed with explosives.",
/*0x5a*/ "Doesn't sound like a problem to me. Where are these explosives?",
/*0x5b*/ "In that crate.",
/*0x5c*/ "Cute. Very cute.",
/*0x5d*/ "By the way, the stores are crawling with guards. It may go against your nature, but try sneaking through rather than blasting everything.",
/*0x5e*/ "Certainly. Any other pearls of wisdom?",
/*0x5f*/ "That crate...",
/*0x60*/ "Yes?",
/*0x61*/ "It really doesn't like being shot.",
/*0x62*/ "Great. Now, if I can just fight the urge to report him to Base Security...",
/*0x63*/ "Put your hands up and step away from the alien.",
/*0x64*/ "What the hell do you think you're doing? This is supposed to be a sealed room! Don't you know anything about autopsy procedures?",
/*0x65*/ "Don't make me tell you again, Doctor. And turn that laser off.",
/*0x66*/ "Director Easton will hear about this, young lady.",
/*0x67*/ "Of course he's going to hear of it, you moron. I've just got into his top secret base and now I'm stealing his alien.",
/*0x68*/ "You can't take that! It's government property! This is intolerable! It's... it's... unprofessional!!",
/*0x69*/ NULL,
/*0x6a*/ NULL,
/*0x6b*/ NULL,
};

112
src/lang/lipP.c Normal file
View File

@ -0,0 +1,112 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n",
/*0x01*/ "AREA 51 - MEDLABS\n",
/*0x02*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n",
/*0x03*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "\n",
/*0x06*/ "\n",
/*0x07*/ "\n",
/*0x08*/ "\n",
/*0x09*/ "Obtain and use lab technician disguise\n",
/*0x0a*/ "Destroy computer records\n",
/*0x0b*/ "Locate conspiracy evidence\n",
/*0x0c*/ "Gain access to autopsy lab\n",
/*0x0d*/ "Rescue the crash Survivor\n",
/*0x0e*/ "Research records destroyed.\n",
/*0x0f*/ "Obtain lab clothes.\n",
/*0x10*/ "Lab Tech's\n",
/*0x11*/ "Lab clothes\n",
/*0x12*/ "Lab clothes\n",
/*0x13*/ "Picked up lab clothes.\n",
/*0x14*/ "Access to door control systems denied.\n",
/*0x15*/ "Access to light control systems denied.\n",
/*0x16*/ "Access to security control systems denied.\n",
/*0x17*/ "Virus downloaded to console.\n",
/*0x18*/ "Obtain Data Uplink.\n",
/*0x19*/ "Lab Tech's\n",
/*0x1a*/ "Data Uplink\n",
/*0x1b*/ "Data Uplink\n",
/*0x1c*/ "Picked up Data Uplink.\n",
/*0x1d*/ "Laboratory accessed successfully.\n",
/*0x1e*/ "Data Uplink connected.\n",
/*0x1f*/ "Data Uplink connection broken.\n",
/*0x20*/ "Obtain medlab 2 key card.\n",
/*0x21*/ "Guard's\n",
/*0x22*/ "Medlab 2 key card\n",
/*0x23*/ "Medlab 2 key card\n",
/*0x24*/ "Picked up medlab 2 key card.\n",
/*0x25*/ "Who are you?\n",
/*0x26*/ "Hey - you've got my clothes.\n",
/*0x27*/ "Help - help!\n",
/*0x28*/ "Don't shoot me!\n",
/*0x29*/ "Oh, my God - a gun!\n",
/*0x2a*/ "There's an intruder in the complex.\n",
/*0x2b*/ "Give me back my clothes - or else!\n",
/*0x2c*/ "Right - you've asked for it!\n",
/*0x2d*/ "Give me my clothes.\n",
/*0x2e*/ "I don't have much time!!!\n",
/*0x2f*/ "The enemy has discovered the disguise.\n",
/*0x30*/ "Virus has already been downloaded.\n",
/*0x31*/ "Initiating virus download.\n",
/*0x32*/ "So, you got here at last.\n",
/*0x33*/ "Hey, you're not... SECURITY ALERT!\n",
/*0x34*/ "No guns allowed in here - put your weapon away.\n",
/*0x35*/ "I won't tell you again - lose the weapon.\n",
/*0x36*/ "Right - I'm calling security.\n",
/*0x37*/ "Everyone's been waiting for you...\n",
/*0x38*/ "Critical mission personnel killed.\n",
/*0x39*/ "Cannot gain access to autopsy lab.\n",
/*0x3a*/ "Hey, that's not Harry. It's an intruder.\n",
/*0x3b*/ "Obtain op room key card.\n",
/*0x3c*/ "Guard's\n",
/*0x3d*/ "Op room key card\n",
/*0x3e*/ "Op room key card\n",
/*0x3f*/ "Picked up operation room key card.\n",
/*0x40*/ "Elvis has been killed.\n",
/*0x41*/ "Get the hell out of here!\n",
/*0x42*/ "Containment unit raised up.\n",
/*0x43*/ "Containment unit lowered down.\n",
/*0x44*/ "Mission critical equipment destroyed.\n",
/*0x45*/ "Obtain X-Ray Scanner.\n",
/*0x46*/ "\n",
/*0x47*/ "X-Ray Scanner\n",
/*0x48*/ "X-Ray Scanner\n",
/*0x49*/ "Picked up X-Ray Scanner.\n",
/*0x4a*/ "Scanner target acquired.\n",
/*0x4b*/ "Target ID confirmed - XT origin.\n",
/*0x4c*/ "Scanner lock lost.\n",
/*0x4d*/ "Disguise has been worn.\n",
/*0x4e*/ "The showers... Now, if I can convince someone\nto part with their uniform...\n",
/*0x4f*/ "The temperature's dropping... You must be \nclose to the cryo room.\n",
/*0x50*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n",
/*0x51*/ "There he is, Jo! Hurry or you'll be too late!\n",
/*0x52*/ "Leave this area now.\n",
/*0x53*/ "Should you be in here?\n",
/*0x54*/ "Holy...\n",
/*0x55*/ "It's a spy!\n",
/*0x56*/ "Warn the others...\n",
/*0x57*/ "Imposter!\n",
/*0x58*/ "Lighting systems overloaded.\n",
/*0x59*/ "Alternative entrance to medlabs created.\n",
/*0x5a*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n",
/*0x5b*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n",
/*0x5c*/ "In that crate.\n",
/*0x5d*/ "Cute. Very cute.\n",
/*0x5e*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n",
/*0x5f*/ "Certainly. Any other pearls of wisdom?\n",
/*0x60*/ "That crate...\n",
/*0x61*/ "Yes?\n",
/*0x62*/ "It really doesn't like being shot.\n",
/*0x63*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n",
/*0x64*/ "Put your hands up and step away from the \nalien.\n",
/*0x65*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n",
/*0x66*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n",
/*0x67*/ "Director Easton will hear about this, \nyoung lady.\n",
/*0x68*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n",
/*0x69*/ NULL,
/*0x6a*/ NULL,
/*0x6b*/ NULL,
};

112
src/lang/lip_str.c Normal file
View File

@ -0,0 +1,112 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n",
/*0x01*/ "AREA 51 - MEDLABS\n",
/*0x02*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n",
/*0x03*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "\n",
/*0x06*/ "\n",
/*0x07*/ "\n",
/*0x08*/ "\n",
/*0x09*/ "Obtain and use lab technician disguise\n",
/*0x0a*/ "Destroy computer records\n",
/*0x0b*/ "Locate conspiracy evidence\n",
/*0x0c*/ "Gain access to autopsy lab\n",
/*0x0d*/ "Rescue the crash Survivor\n",
/*0x0e*/ "Research records destroyed.\n",
/*0x0f*/ "Obtain lab clothes.\n",
/*0x10*/ "Lab Tech's\n",
/*0x11*/ "Lab clothes\n",
/*0x12*/ "Lab clothes\n",
/*0x13*/ "Picked up lab clothes.\n",
/*0x14*/ "Access to door control systems denied.\n",
/*0x15*/ "Access to light control systems denied.\n",
/*0x16*/ "Access to security control systems denied.\n",
/*0x17*/ "Virus downloaded to console.\n",
/*0x18*/ "Obtain Data Uplink.\n",
/*0x19*/ "Lab Tech's\n",
/*0x1a*/ "Data Uplink\n",
/*0x1b*/ "Data Uplink\n",
/*0x1c*/ "Picked up Data Uplink.\n",
/*0x1d*/ "Laboratory accessed successfully.\n",
/*0x1e*/ "Data Uplink connected.\n",
/*0x1f*/ "Data Uplink connection broken.\n",
/*0x20*/ "Obtain medlab 2 key card.\n",
/*0x21*/ "Guard's\n",
/*0x22*/ "Medlab 2 key card\n",
/*0x23*/ "Medlab 2 key card\n",
/*0x24*/ "Picked up medlab 2 key card.\n",
/*0x25*/ "Who are you?\n",
/*0x26*/ "Hey - you've got my clothes.\n",
/*0x27*/ "Help - help!\n",
/*0x28*/ "Don't shoot me!\n",
/*0x29*/ "Oh, my God - a gun!\n",
/*0x2a*/ "There's an intruder in the complex.\n",
/*0x2b*/ "Give me back my clothes - or else!\n",
/*0x2c*/ "Right - you've asked for it!\n",
/*0x2d*/ "Give me my clothes.\n",
/*0x2e*/ "I don't have much time!!!\n",
/*0x2f*/ "The enemy has discovered the disguise.\n",
/*0x30*/ "Virus has already been downloaded.\n",
/*0x31*/ "Initiating virus download.\n",
/*0x32*/ "So, you got here at last.\n",
/*0x33*/ "Hey, you're not... SECURITY ALERT!\n",
/*0x34*/ "No guns allowed in here - put your weapon away.\n",
/*0x35*/ "I won't tell you again - lose the weapon.\n",
/*0x36*/ "Right - I'm calling security.\n",
/*0x37*/ "Everyone's been waiting for you...\n",
/*0x38*/ "Critical mission personnel killed.\n",
/*0x39*/ "Cannot gain access to autopsy lab.\n",
/*0x3a*/ "Hey, that's not Harry. It's an intruder.\n",
/*0x3b*/ "Obtain op room key card.\n",
/*0x3c*/ "Guard's\n",
/*0x3d*/ "Op room key card\n",
/*0x3e*/ "Op room key card\n",
/*0x3f*/ "Picked up operation room key card.\n",
/*0x40*/ "Elvis has been killed.\n",
/*0x41*/ "Get the hell out of here!\n",
/*0x42*/ "Containment unit raised up.\n",
/*0x43*/ "Containment unit lowered down.\n",
/*0x44*/ "Mission critical equipment destroyed.\n",
/*0x45*/ "Obtain X-Ray Scanner.\n",
/*0x46*/ "\n",
/*0x47*/ "X-Ray Scanner\n",
/*0x48*/ "X-Ray Scanner\n",
/*0x49*/ "Picked up X-Ray Scanner.\n",
/*0x4a*/ "Scanner target acquired.\n",
/*0x4b*/ "Target ID confirmed - XT origin.\n",
/*0x4c*/ "Scanner lock lost.\n",
/*0x4d*/ "Disguise has been worn.\n",
/*0x4e*/ "The showers... Now, if I can convince someone\nto part with their uniform...\n",
/*0x4f*/ "The temperature's dropping... You must be \nclose to the cryo room.\n",
/*0x50*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n",
/*0x51*/ "There he is, Jo! Hurry or you'll be too late!\n",
/*0x52*/ "Leave this area now.\n",
/*0x53*/ "Should you be in here?\n",
/*0x54*/ "Holy...\n",
/*0x55*/ "It's a spy!\n",
/*0x56*/ "Warn the others...\n",
/*0x57*/ "Imposter!\n",
/*0x58*/ "Lighting systems overloaded.\n",
/*0x59*/ "Alternative entrance to medlabs created.\n",
/*0x5a*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n",
/*0x5b*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n",
/*0x5c*/ "In that crate.\n",
/*0x5d*/ "Cute. Very cute.\n",
/*0x5e*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n",
/*0x5f*/ "Certainly. Any other pearls of wisdom?\n",
/*0x60*/ "That crate...\n",
/*0x61*/ "Yes?\n",
/*0x62*/ "It really doesn't like being shot.\n",
/*0x63*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n",
/*0x64*/ "Put your hands up and step away from the \nalien.\n",
/*0x65*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n",
/*0x66*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n",
/*0x67*/ "Director Easton will hear about this, \nyoung lady.\n",
/*0x68*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n",
/*0x69*/ NULL,
/*0x6a*/ NULL,
/*0x6b*/ NULL,
};

80
src/lang/lueE.c Normal file
View File

@ -0,0 +1,80 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n",
/*0x01*/ "AREA 51 - EXTERIOR\n",
/*0x02*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n",
/*0x03*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "\n",
/*0x06*/ "\n",
/*0x07*/ "\n",
/*0x08*/ "\n",
/*0x09*/ "Shut down air intercept radar\n",
/*0x0a*/ "Plant comms device on antenna\n",
/*0x0b*/ "Disable all robot interceptors\n",
/*0x0c*/ "Gain access to hangar lift\n",
/*0x0d*/ "Make contact with CI spy\n",
/*0x0e*/ "Obtain grenades.\n",
/*0x0f*/ "Dr. Caroll's\n",
/*0x10*/ "Grenade\n",
/*0x11*/ "A grenade\n",
/*0x12*/ "Picked up a grenade.\n",
/*0x13*/ "Robot interceptor disabled.\n",
/*0x14*/ "All robot interceptors disabled.\n",
/*0x15*/ "Obtain comms rider.\n",
/*0x16*/ "Dr. Caroll's\n",
/*0x17*/ "Comms rider\n",
/*0x18*/ "Comms rider\n",
/*0x19*/ "Picked up comms rider.\n",
/*0x1a*/ "Communications bug placed correctly.\n",
/*0x1b*/ "Communications bug placed incorrectly.\n",
/*0x1c*/ "Antenna has been destroyed.\n",
/*0x1d*/ "Antenna raised.\n",
/*0x1e*/ "Antenna lowered.\n",
/*0x1f*/ "Obtain lift key card.\n",
/*0x20*/ "Dr. Caroll's\n",
/*0x21*/ "Lift key card\n",
/*0x22*/ "Lift key card\n",
/*0x23*/ "Picked up lift key card.\n",
/*0x24*/ "Lift access denied - key card needed.\n",
/*0x25*/ "Key card accepted - lift operational.\n",
/*0x26*/ "Lift is fully operational.\n",
/*0x27*/ "Hangar has been accessed.\n",
/*0x28*/ "Met up with CI agent.\n",
/*0x29*/ "Air intercept radar shut down.\n",
/*0x2a*/ "Critical mission object destroyed.\n",
/*0x2b*/ "Main gate has been opened.\n",
/*0x2c*/ "Main gate has been closed.\n",
/*0x2d*/ "Access denied.\n",
/*0x2e*/ "Explosive has been placed.\n",
/*0x2f*/ "Intruder detected - security system online.\n",
/*0x30*/ "Obtain explosive.\n",
/*0x31*/ "Dr. Caroll's\n",
/*0x32*/ "Explosives\n",
/*0x33*/ "Explosives\n",
/*0x34*/ "Picked up explosives.\n",
/*0x35*/ "The air intercept radar is controlled from that \nbunker.\n",
/*0x36*/ "There's the antenna, but... I can't throw a bug \nthat high!\n",
/*0x37*/ "The hangar lift is on the other side \nof that huge door.\n",
/*0x38*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n",
/*0x39*/ "Lift access terminals destroyed.\n",
/*0x3a*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n",
/*0x3b*/ "This is your entry point... A deserted helipad \non the edge of the base.\n",
/*0x3c*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall... \nWatch out for these guards.\n",
/*0x3d*/ "Here is the communications antenna. \nAttach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n",
/*0x3e*/ "Oh, my God!\n",
/*0x3f*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n",
/*0x40*/ "But who was...?\n",
/*0x41*/ "Any questions? No. Good. Away you go to \nthe hangar.\n",
/*0x42*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n",
/*0x43*/ "Agent Dark! Over here!\n",
/*0x44*/ "There you are! I was beginning to wonder \nif...\n",
/*0x45*/ "If what?\n",
/*0x46*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n",
/*0x47*/ "I was tidying up one of your loose ends.\n",
/*0x48*/ "My loose ends?\n",
/*0x49*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n",
/*0x4a*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n",
/*0x4b*/ "Foreign object detected - security alerted.\n",
};

80
src/lang/lueJ.c Normal file
View File

@ -0,0 +1,80 @@
#include <ultra64.h>
char *lang[] = {
/*0x00*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft as well which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider On Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down the robot interceptors themselves will be a problem. Take out as many of the grounded units out as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a keycard to operate the lift, and that a maintenance technicians will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is unfortunately as specific as we can be.\n\nEND\n",
/*0x01*/ "AREA 51 - EXTERIOR\n",
/*0x02*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft as well which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider On Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a keycard to operate the lift, and that a maintenance technicians will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is unfortunately as specific as we can be.\n\nEND\n",
/*0x03*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft as well which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Plant Comms Rider On Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a keycard to operate the lift, and that a maintenance technicians will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is unfortunately as specific as we can be.\n\nEND\n",
/*0x04*/ "\n",
/*0x05*/ "\n",
/*0x06*/ "\n",
/*0x07*/ "\n",
/*0x08*/ "\n",
/*0x09*/ "Shutdown Air Intercept Radar\n",
/*0x0a*/ "Plant Comms Device On Antenna\n",
/*0x0b*/ "Disable All Robot Interceptors\n",
/*0x0c*/ "Gain Access To Hangar Lift\n",
/*0x0d*/ "Make Contact With C.I. Spy\n",
/*0x0e*/ "Obtain Grenades\n",
/*0x0f*/ "Dr Carolls\n",
/*0x10*/ "Grenade\n",
/*0x11*/ "An Grenade\n",
/*0x12*/ "Picked up a Grenade\n",
/*0x13*/ "Robot Interceptor Disabled\n",
/*0x14*/ "All Robot Interceptors Disabled\n",
/*0x15*/ "Obtain Comms Rider\n",
/*0x16*/ "Dr Carolls\n",
/*0x17*/ "Comms Rider\n",
/*0x18*/ "Comms Rider\n",
/*0x19*/ "Picked up Comms Rider\n",
/*0x1a*/ "Communications Bug Placed Correctly\n",
/*0x1b*/ "Communications Bug Placed Incorrectly\n",
/*0x1c*/ "Antenna Has Been Destroyed\n",
/*0x1d*/ "Antenna Raised\n",
/*0x1e*/ "Antenna Lowered\n",
/*0x1f*/ "Obtain Lift Keycard\n",
/*0x20*/ "Dr Carolls\n",
/*0x21*/ "Lift Keycard\n",
/*0x22*/ "Lift Keycard\n",
/*0x23*/ "Picked up Lift Keycard\n",
/*0x24*/ "Lift Access Denied - Keycard Needed\n",
/*0x25*/ "Keycard Accepted - Lift Operational\n",
/*0x26*/ "Lift Is Fully Operational\n",
/*0x27*/ "Hangar Has Been Accessed\n",
/*0x28*/ "Met up with CI Agent\n",
/*0x29*/ "Air Intercept Radar Shutdown\n",
/*0x2a*/ "Critical Mission Object Destroyed\n",
/*0x2b*/ "Main Gate Has Been Opened\n",
/*0x2c*/ "Main Gate Has Been Closed\n",
/*0x2d*/ "Access Denied\n",
/*0x2e*/ "Explosive has been placed\n",
/*0x2f*/ "Foreign object detected - security fields activated\n",
/*0x30*/ "Obtain Explosive\n",
/*0x31*/ "Dr Carolls\n",
/*0x32*/ "Explosives\n",
/*0x33*/ "Explosives\n",
/*0x34*/ "Picked up Explosives\n",
/*0x35*/ "The air intercept radar is controlled from that\nbunker.\n",
/*0x36*/ "There's the antenna, but... I can't throw a bug\nthat high!\n",
/*0x37*/ "The Hangar lift is the other side \nof that huge door.\n",
/*0x38*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n",
/*0x39*/ "Lift Access Terminals Destroyed\n",
/*0x3a*/ "Okay, Joanna, take a look at this. Our operative inside Area 51 was able to get this out to us.",
/*0x3b*/ "This is your entry point; a deserted helipad on the edge of the base.",
/*0x3c*/ "The lift down to the hangars and the rendezvous point is beyond that wall; watch out for these guards.",
/*0x3d*/ "Here is the communications antenna; attach a comms rider bug so we can talk to you when you're inside the base. Again, watch out for hostiles.",
/*0x3e*/ "Oh my god!",
/*0x3f*/ "Here is our friend. He appears to be physically unhurt, though he hasn't regained consciousness yet. By the look of it, the surgeons are almost done with their preliminary tests and will begin dissection soon.",
/*0x40*/ "But who was...?",
/*0x41*/ "Any questions? No? Good. Away you go to the hangar.",
/*0x42*/ "Agent Dark Mission Log, 1028 hours. Against my better judgement, I'm about to enter Area 51.",
/*0x43*/ "Agent Dark! Over here!",
/*0x44*/ "There you are! I was beginning to wonder if...",
/*0x45*/ "If what?",
/*0x46*/ "If you'd been discovered yet. And frankly, if this is how you work, I'm amazed that you lasted longer than five minutes.",
/*0x47*/ "I was tidying up one of your loose ends.",
/*0x48*/ "My loose ends?",
/*0x49*/ "I'm sorry, I didn't realise you wanted him to shoot you. I can call in some more guards if you like.",
/*0x4a*/ "Okay, okay, forget about it. I'm going to let the Institute know we've made contact.",
/*0x4b*/ NULL,
};

Some files were not shown because too many files have changed in this diff Show More