1\  Welcome to detok - OpenBIOS detokenizer v1.0.2
2\  (C) Copyright 2001-2006 Stefan Reinauer.
3\  (C) Copyright 2006 coresystems GmbH <info@coresystems.de>
4\  (C) Copyright 2005 IBM Corporation.  All Rights Reserved.
5\  Written by Stefan Reinauer, <stepan@openbios.org>
6\  This program is free software; you may redistribute it under the terms of
7\  the GNU General Public License v2. This program has absolutely no warranty.
8\
9\  PCI Header identified
10\    Offset to Data Structure = 0x001c (28)
11\  PCI Data Structure identified
12\    Data Structure Length = 0x0018 (24)
13\    Vendor ID: 0xbeef
14\    Device ID: 0xc0de
15\    Class Code: 0x090210  (unknown)
16\    Image Revision: 0x5afe
17\    Code Type: 0x01 (Open Firmware)
18\    Image Length: 0x0002 blocks (1024 bytes)
19\    Last PCI Image.
20     0: start1 ( 0x0f1 )   ( 16-bit offsets)
21     1:   format:    0x08
22     2:   checksum:  0x5142 (Ok)
23     4:   len:       0x0100 ( 256 bytes)
24     8: named-token ( 0x0b6 ) whatziz 0x800
25    19: b(:) ( 0x0b7 )
26    20:     b(") ( 0x012 ) ( len=0xc [12 bytes] )
27                    " This is the "
28    34:     type ( 0x090 )
29    35:     b(") ( 0x012 ) ( len=5 )
30                    " True "
31    42:     type ( 0x090 )
32    43:     b(") ( 0x012 ) ( len=0x12 [18 bytes] )
33                    "  side of the test."
34    63:     type ( 0x090 )
35    64:     cr ( 0x092 )
36    65: b(;) ( 0x0c2 )
37    66: named-token ( 0x0b6 ) wherezis 0x801
38    78: b(:) ( 0x0b7 )
39    79:     b(") ( 0x012 ) ( len=0x21 [33 bytes] )
40                    " Begin Nested ""Constant"" Test Test"
41   114:     type ( 0x090 )
42   115:     b(") ( 0x012 ) ( len=0x10 [16 bytes] )
43                    " Is True, level 1"
44   133:     type ( 0x090 )
45   134:     b(") ( 0x012 ) ( len=0x1c [28 bytes] )
46                    " Is True and is True, level 2"
47   164:     b(") ( 0x012 ) ( len=0x11 [17 bytes] )
48                    " Middle of level 2"
49   183:     type ( 0x090 )
50   184:     b(") ( 0x012 ) ( len=0x21 [33 bytes] )
51                    " Is True and is Not False, level 2"
52   219: b(;) ( 0x0c2 )
53   220: named-token ( 0x0b6 ) whoozis 0x802
54   231: b(:) ( 0x0b7 )
55   232:     whatziz ( 0x800 )
56   234:     wherezis ( 0x801 )
57   236: b(;) ( 0x0c2 )
58   237: named-token ( 0x0b6 ) whyzis 0x803
59   247: b(:) ( 0x0b7 )
60   248:     whoozis ( 0x802 )
61   250:     wherezis ( 0x801 )
62   252:     whatziz ( 0x800 )
63   254: b(;) ( 0x0c2 )
64   255: end0 ( 0x000 )
65\  Detokenization finished normally after 256 bytes.
66\  Subsequent FCode Block detected.  Detokenizing.
67   256: start1 ( 0x0f1 )   ( 16-bit offsets)
68   257:   format:    0x08
69   258:   checksum:  0x56e5 (Ok)
70   260:   len:       0x0110 ( 272 bytes)
71   264: named-token ( 0x0b6 ) whatziz 0x804
72   275: b(:) ( 0x0b7 )
73   276:     b(") ( 0x012 ) ( len=0xc [12 bytes] )
74                    " This is the "
75   290:     type ( 0x090 )
76   291:     b(") ( 0x012 ) ( len=5 )
77                    " False"
78   298:     type ( 0x090 )
79   299:     b(") ( 0x012 ) ( len=0x12 [18 bytes] )
80                    "  side of the test."
81   319:     type ( 0x090 )
82   320:     cr ( 0x092 )
83   321: b(;) ( 0x0c2 )
84   322: named-token ( 0x0b6 ) wherezis 0x805
85   334: b(:) ( 0x0b7 )
86   335:     b(") ( 0x012 ) ( len=0x21 [33 bytes] )
87                    " Begin Nested ""Constant"" Test Test"
88   370:     type ( 0x090 )
89   371:     b(") ( 0x012 ) ( len=0x14 [20 bytes] )
90                    " Is Not True, level 1"
91   393:     type ( 0x090 )
92   394:     b(") ( 0x012 ) ( len=0x24 [36 bytes] )
93                    " Is Not True and is Not True, level 2"
94   432:     b(") ( 0x012 ) ( len=0x15 [21 bytes] )
95                    " Middle of Not level 2"
96   455:     type ( 0x090 )
97   456:     b(") ( 0x012 ) ( len=0x21 [33 bytes] )
98                    " Is Not True and is False, level 2"
99   491: b(;) ( 0x0c2 )
100   492: named-token ( 0x0b6 ) whoozis 0x806
101   503: b(:) ( 0x0b7 )
102   504:     whatziz ( 0x804 )
103   506:     wherezis ( 0x805 )
104   508: b(;) ( 0x0c2 )
105   509: named-token ( 0x0b6 ) whyzis 0x807
106   519: b(:) ( 0x0b7 )
107   520:     whoozis ( 0x806 )
108   522:     wherezis ( 0x805 )
109   524:     whatziz ( 0x804 )
110   526: b(;) ( 0x0c2 )
111   527: end0 ( 0x000 )
112\  Detokenization finished normally after 272 bytes.
113\  PCI Image padded with 444 bytes of zero
114
115