Hash :
d89219a0
Author :
Date :
2017-06-08T18:57:07
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194
\ Welcome to detok - OpenBIOS detokenizer v1.0.2
\ (C) Copyright 2001-2006 Stefan Reinauer.
\ (C) Copyright 2006 coresystems GmbH
\ (C) Copyright 2005 IBM Corporation. All Rights Reserved.
\ Written by Stefan Reinauer
\ This program is free software; you may redistribute it under the terms of
\ the GNU General Public License v2. This program has absolutely no warranty.
\
\ PCI Header identified
\ Offset to Data Structure = 0x001c (28)
\ PCI Data Structure identified
\ Data Structure Length = 0x0018 (24)
\ Vendor ID: 0x1fad
\ Device ID: 0xc0ed
\ Class Code: 0x090210 (unknown)
\ Image Revision: 0xfeeb
\ Code Type: 0x01 (Open Firmware)
\ Image Length: 0x0002 blocks (1024 bytes)
\ Not last PCI Image.
0: start1 ( 0x0f1 ) ( 16-bit offsets)
1: format: 0x08
2: checksum: 0x4855 (Ok)
4: len: 0x00e3 ( 227 bytes)
8: new-token ( 0x0b5 ) 0x800
11: b(:) ( 0x0b7 )
12: b(") ( 0x012 ) ( len=0xc [12 bytes] )
" This is the "
26: type ( 0x090 )
27: b(") ( 0x012 ) ( len=5 )
" True "
34: type ( 0x090 )
35: b(") ( 0x012 ) ( len=0x12 [18 bytes] )
" side of the test."
55: type ( 0x090 )
56: cr ( 0x092 )
57: b(;) ( 0x0c2 )
58: named-token ( 0x0b6 ) tell-me 0x801
69: b(:) ( 0x0b7 )
70: b(") ( 0x012 ) ( len=0x21 [33 bytes] )
" Begin Nested ""Constant"" Test Test"
105: type ( 0x090 )
106: b(") ( 0x012 ) ( len=0x10 [16 bytes] )
" Is True, level 1"
124: type ( 0x090 )
125: b(") ( 0x012 ) ( len=0x1c [28 bytes] )
" Is True and is True, level 2"
155: b(") ( 0x012 ) ( len=0x11 [17 bytes] )
" Middle of level 2"
174: type ( 0x090 )
175: b(") ( 0x012 ) ( len=0x21 [33 bytes] )
" Is True and is Not False, level 2"
210: b(;) ( 0x0c2 )
211: named-token ( 0x0b6 ) whoozis 0x802
222: b(:) ( 0x0b7 )
223: (unnamed-fcode) [0x800]
225: b(;) ( 0x0c2 )
226: end0 ( 0x000 )
\ Detokenization finished normally after 227 bytes.
\ Subsequent FCode Block detected. Detokenizing.
227: start1 ( 0x0f1 ) ( 16-bit offsets)
228: format: 0x08
229: checksum: 0x5b7c (Ok)
231: len: 0x011d ( 285 bytes)
235: named-token ( 0x0b6 ) whatziz 0x803
246: b(:) ( 0x0b7 )
247: b(") ( 0x012 ) ( len=0xc [12 bytes] )
" This is the "
261: type ( 0x090 )
262: b(") ( 0x012 ) ( len=5 )
" False"
269: type ( 0x090 )
270: b(") ( 0x012 ) ( len=0x12 [18 bytes] )
" side of the test."
290: type ( 0x090 )
291: cr ( 0x092 )
292: b(;) ( 0x0c2 )
293: named-token ( 0x0b6 ) tell-me 0x804
304: b(:) ( 0x0b7 )
305: b(") ( 0x012 ) ( len=0x21 [33 bytes] )
" Begin Nested ""Constant"" Test Test"
340: type ( 0x090 )
341: b(") ( 0x012 ) ( len=0x14 [20 bytes] )
" Is Not True, level 1"
363: type ( 0x090 )
364: b(") ( 0x012 ) ( len=0x24 [36 bytes] )
" Is Not True and is Not True, level 2"
402: b(") ( 0x012 ) ( len=0x15 [21 bytes] )
" Middle of Not level 2"
425: type ( 0x090 )
426: b(") ( 0x012 ) ( len=0x21 [33 bytes] )
" Is Not True and is False, level 2"
461: b(;) ( 0x0c2 )
462: named-token ( 0x0b6 ) whoozis 0x805
473: b(:) ( 0x0b7 )
474: whatziz ( 0x803 )
476: b(;) ( 0x0c2 )
477: b(") ( 0x012 ) ( len=0x1c [28 bytes] )
" De-tokenize THIS, wise-guy!"( 0a )"
507: type ( 0x090 )
508: end0 ( 0x000 )
\ Detokenization finished prematurely after 282 of 285 bytes.
\ Unexpected token, 0x677, after end of FCode block.
\ PCI Image padding-field of 463 bytes had first non-zero byte at offset 0
\ PCI Header identified
\ Offset to Data Structure = 0x001c (28)
\ PCI Data Structure identified
\ Data Structure Length = 0x0018 (24)
\ Vendor ID: 0x5afe
\ Device ID: 0x1991
\ Class Code: 0x010203 (unknown)
\ Image Revision: 0x2a55
\ Code Type: 0x01 (Open Firmware)
\ Image Length: 0x0002 blocks (1024 bytes)
\ Last PCI Image.
972: start1 ( 0x0f1 ) ( 16-bit offsets)
973: format: 0x08
974: checksum: 0x9e28 (Ok)
976: len: 0x01e5 ( 485 bytes)
980: named-token ( 0x0b6 ) whatziz 0x800
991: b(:) ( 0x0b7 )
992: b(") ( 0x012 ) ( len=0xc [12 bytes] )
" This is the "
1006: type ( 0x090 )
1007: b(") ( 0x012 ) ( len=5 )
" True "
1014: type ( 0x090 )
1015: b(") ( 0x012 ) ( len=0x12 [18 bytes] )
" side of the test."
1035: type ( 0x090 )
1036: cr ( 0x092 )
1037: b(;) ( 0x0c2 )
1038: named-token ( 0x0b6 ) tell-me 0x801
1049: b(:) ( 0x0b7 )
1050: b(") ( 0x012 ) ( len=0x21 [33 bytes] )
" Begin Nested ""Constant"" Test Test"
1085: type ( 0x090 )
1086: b(") ( 0x012 ) ( len=0x10 [16 bytes] )
" Is True, level 1"
1104: type ( 0x090 )
1105: b(") ( 0x012 ) ( len=0x1c [28 bytes] )
" Is True and is True, level 2"
1135: b(") ( 0x012 ) ( len=0x11 [17 bytes] )
" Middle of level 2"
1154: type ( 0x090 )
1155: b(") ( 0x012 ) ( len=0x21 [33 bytes] )
" Is True and is Not False, level 2"
1190: b(;) ( 0x0c2 )
1191: named-token ( 0x0b6 ) whoozis 0x802
1202: b(:) ( 0x0b7 )
1203: whatziz ( 0x800 )
1205: b(;) ( 0x0c2 )
\ Unexpected FCode-Block Starter.
1206: start1 ( 0x0f1 ) ( 16-bit offsets)
1207: format: 0x08
1208: checksum should be: 0x03d6, but is 0x2195
1210: len: 0x0012 ( 18 bytes)
\ Ignoring length field.
1214: named-token ( 0x0b6 ) whatziz 0x803
1225: b(:) ( 0x0b7 )
1226: b(") ( 0x012 ) ( len=0xc [12 bytes] )
" This is the "
1240: type ( 0x090 )
1241: b(") ( 0x012 ) ( len=5 )
" False"
1248: type ( 0x090 )
1249: b(") ( 0x012 ) ( len=0x12 [18 bytes] )
" side of the test."
1269: type ( 0x090 )
1270: cr ( 0x092 )
1271: b(;) ( 0x0c2 )
1272: named-token ( 0x0b6 ) tell-me 0x804
1283: b(:) ( 0x0b7 )
1284: b(") ( 0x012 ) ( len=0x21 [33 bytes] )
" Begin Nested ""Constant"" Test Test"
1319: type ( 0x090 )
1320: b(") ( 0x012 ) ( len=0x14 [20 bytes] )
" Is Not True, level 1"
1342: type ( 0x090 )
1343: b(") ( 0x012 ) ( len=0x24 [36 bytes] )
" Is Not True and is Not True, level 2"
1381: b(") ( 0x012 ) ( len=0x15 [21 bytes] )
" Middle of Not level 2"
1404: type ( 0x090 )
1405: b(") ( 0x012 ) ( len=0x21 [33 bytes] )
" Is Not True and is False, level 2"
1440: b(;) ( 0x0c2 )
1441: named-token ( 0x0b6 ) whoozis 0x805
1452: b(:) ( 0x0b7 )
1453: whatziz ( 0x803 )
1455: b(;) ( 0x0c2 )
1456: end0 ( 0x000 )
\ Detokenization finished normally after 485 bytes.
\ PCI Image padded with 487 bytes of zero