1\  Welcome to detok - OpenBIOS detokenizer v1.0.2
2\  (C) Copyright 2001-2006 Stefan Reinauer.
3\  (C) Copyright 2006 coresystems GmbH <info@coresystems.de>
4\  (C) Copyright 2005 IBM Corporation.  All Rights Reserved.
5\  Written by Stefan Reinauer, <stepan@openbios.org>
6\  This program is free software; you may redistribute it under the terms of
7\  the GNU General Public License v2. This program has absolutely no warranty.
8\
9\  PCI Header identified
10\    Offset to Data Structure = 0x001c (28)
11\  PCI Data Structure identified
12\    Data Structure Length = 0x0018 (24)
13\    Vendor ID: 0x1fad
14\    Device ID: 0xc0ed
15\    Class Code: 0x090210  (unknown)
16\    Image Revision: 0xfeeb
17\    Code Type: 0x01 (Open Firmware)
18\    Image Length: 0x0002 blocks (1024 bytes)
19\    Not last PCI Image.
20     0: start1 ( 0x0f1 )   ( 16-bit offsets)
21     1:   format:    0x08
22     2:   checksum:  0x4855 (Ok)
23     4:   len:       0x00e3 ( 227 bytes)
24     8: new-token ( 0x0b5 ) 0x800
25    11: b(:) ( 0x0b7 )
26    12:     b(") ( 0x012 ) ( len=0xc [12 bytes] )
27                    " This is the "
28    26:     type ( 0x090 )
29    27:     b(") ( 0x012 ) ( len=5 )
30                    " True "
31    34:     type ( 0x090 )
32    35:     b(") ( 0x012 ) ( len=0x12 [18 bytes] )
33                    "  side of the test."
34    55:     type ( 0x090 )
35    56:     cr ( 0x092 )
36    57: b(;) ( 0x0c2 )
37    58: named-token ( 0x0b6 ) tell-me 0x801
38    69: b(:) ( 0x0b7 )
39    70:     b(") ( 0x012 ) ( len=0x21 [33 bytes] )
40                    " Begin Nested ""Constant"" Test Test"
41   105:     type ( 0x090 )
42   106:     b(") ( 0x012 ) ( len=0x10 [16 bytes] )
43                    " Is True, level 1"
44   124:     type ( 0x090 )
45   125:     b(") ( 0x012 ) ( len=0x1c [28 bytes] )
46                    " Is True and is True, level 2"
47   155:     b(") ( 0x012 ) ( len=0x11 [17 bytes] )
48                    " Middle of level 2"
49   174:     type ( 0x090 )
50   175:     b(") ( 0x012 ) ( len=0x21 [33 bytes] )
51                    " Is True and is Not False, level 2"
52   210: b(;) ( 0x0c2 )
53   211: named-token ( 0x0b6 ) whoozis 0x802
54   222: b(:) ( 0x0b7 )
55   223:     (unnamed-fcode) [0x800]
56   225: b(;) ( 0x0c2 )
57   226: end0 ( 0x000 )
58\  Detokenization finished normally after 227 bytes.
59\  Subsequent FCode Block detected.  Detokenizing.
60   227: start1 ( 0x0f1 )   ( 16-bit offsets)
61   228:   format:    0x08
62   229:   checksum:  0x5b7c (Ok)
63   231:   len:       0x011d ( 285 bytes)
64   235: named-token ( 0x0b6 ) whatziz 0x803
65   246: b(:) ( 0x0b7 )
66   247:     b(") ( 0x012 ) ( len=0xc [12 bytes] )
67                    " This is the "
68   261:     type ( 0x090 )
69   262:     b(") ( 0x012 ) ( len=5 )
70                    " False"
71   269:     type ( 0x090 )
72   270:     b(") ( 0x012 ) ( len=0x12 [18 bytes] )
73                    "  side of the test."
74   290:     type ( 0x090 )
75   291:     cr ( 0x092 )
76   292: b(;) ( 0x0c2 )
77   293: named-token ( 0x0b6 ) tell-me 0x804
78   304: b(:) ( 0x0b7 )
79   305:     b(") ( 0x012 ) ( len=0x21 [33 bytes] )
80                    " Begin Nested ""Constant"" Test Test"
81   340:     type ( 0x090 )
82   341:     b(") ( 0x012 ) ( len=0x14 [20 bytes] )
83                    " Is Not True, level 1"
84   363:     type ( 0x090 )
85   364:     b(") ( 0x012 ) ( len=0x24 [36 bytes] )
86                    " Is Not True and is Not True, level 2"
87   402:     b(") ( 0x012 ) ( len=0x15 [21 bytes] )
88                    " Middle of Not level 2"
89   425:     type ( 0x090 )
90   426:     b(") ( 0x012 ) ( len=0x21 [33 bytes] )
91                    " Is Not True and is False, level 2"
92   461: b(;) ( 0x0c2 )
93   462: named-token ( 0x0b6 ) whoozis 0x805
94   473: b(:) ( 0x0b7 )
95   474:     whatziz ( 0x803 )
96   476: b(;) ( 0x0c2 )
97   477: b(") ( 0x012 ) ( len=0x1c [28 bytes] )
98                " De-tokenize THIS, wise-guy!"( 0a )"
99   507: type ( 0x090 )
100   508: end0 ( 0x000 )
101\  Detokenization finished prematurely after 282 of 285 bytes.
102\  Unexpected token, 0x677, after end of FCode block.
103\  PCI Image padding-field of 463 bytes had first non-zero byte at offset 0
104\  PCI Header identified
105\    Offset to Data Structure = 0x001c (28)
106\  PCI Data Structure identified
107\    Data Structure Length = 0x0018 (24)
108\    Vendor ID: 0x5afe
109\    Device ID: 0x1991
110\    Class Code: 0x010203  (unknown)
111\    Image Revision: 0x2a55
112\    Code Type: 0x01 (Open Firmware)
113\    Image Length: 0x0002 blocks (1024 bytes)
114\    Last PCI Image.
115   972: start1 ( 0x0f1 )   ( 16-bit offsets)
116   973:   format:    0x08
117   974:   checksum:  0x9e28 (Ok)
118   976:   len:       0x01e5 ( 485 bytes)
119   980: named-token ( 0x0b6 ) whatziz 0x800
120   991: b(:) ( 0x0b7 )
121   992:     b(") ( 0x012 ) ( len=0xc [12 bytes] )
122                    " This is the "
123  1006:     type ( 0x090 )
124  1007:     b(") ( 0x012 ) ( len=5 )
125                    " True "
126  1014:     type ( 0x090 )
127  1015:     b(") ( 0x012 ) ( len=0x12 [18 bytes] )
128                    "  side of the test."
129  1035:     type ( 0x090 )
130  1036:     cr ( 0x092 )
131  1037: b(;) ( 0x0c2 )
132  1038: named-token ( 0x0b6 ) tell-me 0x801
133  1049: b(:) ( 0x0b7 )
134  1050:     b(") ( 0x012 ) ( len=0x21 [33 bytes] )
135                    " Begin Nested ""Constant"" Test Test"
136  1085:     type ( 0x090 )
137  1086:     b(") ( 0x012 ) ( len=0x10 [16 bytes] )
138                    " Is True, level 1"
139  1104:     type ( 0x090 )
140  1105:     b(") ( 0x012 ) ( len=0x1c [28 bytes] )
141                    " Is True and is True, level 2"
142  1135:     b(") ( 0x012 ) ( len=0x11 [17 bytes] )
143                    " Middle of level 2"
144  1154:     type ( 0x090 )
145  1155:     b(") ( 0x012 ) ( len=0x21 [33 bytes] )
146                    " Is True and is Not False, level 2"
147  1190: b(;) ( 0x0c2 )
148  1191: named-token ( 0x0b6 ) whoozis 0x802
149  1202: b(:) ( 0x0b7 )
150  1203:     whatziz ( 0x800 )
151  1205: b(;) ( 0x0c2 )
152\  Unexpected FCode-Block Starter.
153  1206: start1 ( 0x0f1 )   ( 16-bit offsets)
154  1207:   format:    0x08
155  1208:   checksum should be:  0x03d6, but is 0x2195
156  1210:   len:       0x0012 ( 18 bytes)
157\    Ignoring length field.
158  1214: named-token ( 0x0b6 ) whatziz 0x803
159  1225: b(:) ( 0x0b7 )
160  1226:     b(") ( 0x012 ) ( len=0xc [12 bytes] )
161                    " This is the "
162  1240:     type ( 0x090 )
163  1241:     b(") ( 0x012 ) ( len=5 )
164                    " False"
165  1248:     type ( 0x090 )
166  1249:     b(") ( 0x012 ) ( len=0x12 [18 bytes] )
167                    "  side of the test."
168  1269:     type ( 0x090 )
169  1270:     cr ( 0x092 )
170  1271: b(;) ( 0x0c2 )
171  1272: named-token ( 0x0b6 ) tell-me 0x804
172  1283: b(:) ( 0x0b7 )
173  1284:     b(") ( 0x012 ) ( len=0x21 [33 bytes] )
174                    " Begin Nested ""Constant"" Test Test"
175  1319:     type ( 0x090 )
176  1320:     b(") ( 0x012 ) ( len=0x14 [20 bytes] )
177                    " Is Not True, level 1"
178  1342:     type ( 0x090 )
179  1343:     b(") ( 0x012 ) ( len=0x24 [36 bytes] )
180                    " Is Not True and is Not True, level 2"
181  1381:     b(") ( 0x012 ) ( len=0x15 [21 bytes] )
182                    " Middle of Not level 2"
183  1404:     type ( 0x090 )
184  1405:     b(") ( 0x012 ) ( len=0x21 [33 bytes] )
185                    " Is Not True and is False, level 2"
186  1440: b(;) ( 0x0c2 )
187  1441: named-token ( 0x0b6 ) whoozis 0x805
188  1452: b(:) ( 0x0b7 )
189  1453:     whatziz ( 0x803 )
190  1455: b(;) ( 0x0c2 )
191  1456: end0 ( 0x000 )
192\  Detokenization finished normally after 485 bytes.
193\  PCI Image padded with 487 bytes of zero
194
195