(this is duplicate of what I submitted under docs, when
that's made visible this can be removed)
This is an expanded list of all the source files and
what they do, as extracted from the "Description" and
"Purpose" lines - except for lines with  which I
summarized. It really helps hackers, I think.