File: DefCondTst2.MeF.DeTok

package info (click to toggle)
fcode-utils 1.0.3-2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 46,768 kB
  • sloc: ansic: 9,717; csh: 241; makefile: 129; sh: 17
file content (194 lines) | stat: -rw-r--r-- 7,385 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
\  Welcome to detok - OpenBIOS detokenizer v1.0.2
\  (C) Copyright 2001-2006 Stefan Reinauer.
\  (C) Copyright 2006 coresystems GmbH
\  (C) Copyright 2005 IBM Corporation.  All Rights Reserved.
\  Written by Stefan Reinauer
\  This program is free software; you may redistribute it under the terms of
\  the GNU General Public License v2. This program has absolutely no warranty.
\  
\  PCI Header identified
\    Offset to Data Structure = 0x001c (28)
\  PCI Data Structure identified
\    Data Structure Length = 0x0018 (24)
\    Vendor ID: 0x1fad
\    Device ID: 0xc0ed
\    Class Code: 0x090210  (unknown)
\    Image Revision: 0xfeeb
\    Code Type: 0x01 (Open Firmware)
\    Image Length: 0x0002 blocks (1024 bytes)
\    Not last PCI Image.
     0: start1 ( 0x0f1 )   ( 16-bit offsets)
     1:   format:    0x08
     2:   checksum:  0x4dd4 (Ok)
     4:   len:       0x00f3 ( 243 bytes)
     8: new-token ( 0x0b5 ) 0x800
    11: b(:) ( 0x0b7 ) 
    12:     b(") ( 0x012 ) ( len=0xc [12 bytes] )
                    " This is the "
    26:     type ( 0x090 ) 
    27:     b(") ( 0x012 ) ( len=5 )
                    " False"
    34:     type ( 0x090 ) 
    35:     b(") ( 0x012 ) ( len=0x12 [18 bytes] )
                    "  side of the test."
    55:     type ( 0x090 ) 
    56:     cr ( 0x092 ) 
    57: b(;) ( 0x0c2 ) 
    58: named-token ( 0x0b6 ) tell-me 0x801
    69: b(:) ( 0x0b7 ) 
    70:     b(") ( 0x012 ) ( len=0x21 [33 bytes] )
                    " Begin Nested ""Constant"" Test Test"
   105:     type ( 0x090 ) 
   106:     b(") ( 0x012 ) ( len=0x14 [20 bytes] )
                    " Is Not True, level 1"
   128:     type ( 0x090 ) 
   129:     b(") ( 0x012 ) ( len=0x24 [36 bytes] )
                    " Is Not True and is Not True, level 2"
   167:     b(") ( 0x012 ) ( len=0x15 [21 bytes] )
                    " Middle of Not level 2"
   190:     type ( 0x090 ) 
   191:     b(") ( 0x012 ) ( len=0x21 [33 bytes] )
                    " Is Not True and is False, level 2"
   226: b(;) ( 0x0c2 ) 
   227: named-token ( 0x0b6 ) whoozis 0x802
   238: b(:) ( 0x0b7 ) 
   239:     (unnamed-fcode) [0x800] 
   241: b(;) ( 0x0c2 ) 
   242: end0 ( 0x000 ) 
\  Detokenization finished normally after 243 bytes.
\  Subsequent FCode Block detected.  Detokenizing.
   243: start1 ( 0x0f1 )   ( 16-bit offsets)
   244:   format:    0x08
   245:   checksum:  0x55fd (Ok)
   247:   len:       0x010d ( 269 bytes)
   251: named-token ( 0x0b6 ) whatziz 0x803
   262: b(:) ( 0x0b7 ) 
   263:     b(") ( 0x012 ) ( len=0xc [12 bytes] )
                    " This is the "
   277:     type ( 0x090 ) 
   278:     b(") ( 0x012 ) ( len=5 )
                    " True "
   285:     type ( 0x090 ) 
   286:     b(") ( 0x012 ) ( len=0x12 [18 bytes] )
                    "  side of the test."
   306:     type ( 0x090 ) 
   307:     cr ( 0x092 ) 
   308: b(;) ( 0x0c2 ) 
   309: named-token ( 0x0b6 ) tell-me 0x804
   320: b(:) ( 0x0b7 ) 
   321:     b(") ( 0x012 ) ( len=0x21 [33 bytes] )
                    " Begin Nested ""Constant"" Test Test"
   356:     type ( 0x090 ) 
   357:     b(") ( 0x012 ) ( len=0x10 [16 bytes] )
                    " Is True, level 1"
   375:     type ( 0x090 ) 
   376:     b(") ( 0x012 ) ( len=0x1c [28 bytes] )
                    " Is True and is True, level 2"
   406:     b(") ( 0x012 ) ( len=0x11 [17 bytes] )
                    " Middle of level 2"
   425:     type ( 0x090 ) 
   426:     b(") ( 0x012 ) ( len=0x21 [33 bytes] )
                    " Is True and is Not False, level 2"
   461: b(;) ( 0x0c2 ) 
   462: named-token ( 0x0b6 ) whoozis 0x805
   473: b(:) ( 0x0b7 ) 
   474:     whatziz ( 0x803 ) 
   476: b(;) ( 0x0c2 ) 
   477: b(") ( 0x012 ) ( len=0x1c [28 bytes] )
                " De-tokenize THIS, wise-guy!"( 0a )"
   507: type ( 0x090 ) 
   508: end0 ( 0x000 ) 
\  Detokenization finished prematurely after 266 of 269 bytes.
\  Unexpected token, 0x677, after end of FCode block.
\  PCI Image padding-field of 463 bytes had first non-zero byte at offset 0
\  PCI Header identified
\    Offset to Data Structure = 0x001c (28)
\  PCI Data Structure identified
\    Data Structure Length = 0x0018 (24)
\    Vendor ID: 0x5afe
\    Device ID: 0x1991
\    Class Code: 0x010203  (unknown)
\    Image Revision: 0x2a55
\    Code Type: 0x01 (Open Firmware)
\    Image Length: 0x0002 blocks (1024 bytes)
\    Last PCI Image.
   972: start1 ( 0x0f1 )   ( 16-bit offsets)
   973:   format:    0x08
   974:   checksum:  0x9e28 (Ok)
   976:   len:       0x01e5 ( 485 bytes)
   980: named-token ( 0x0b6 ) whatziz 0x800
   991: b(:) ( 0x0b7 ) 
   992:     b(") ( 0x012 ) ( len=0xc [12 bytes] )
                    " This is the "
  1006:     type ( 0x090 ) 
  1007:     b(") ( 0x012 ) ( len=5 )
                    " True "
  1014:     type ( 0x090 ) 
  1015:     b(") ( 0x012 ) ( len=0x12 [18 bytes] )
                    "  side of the test."
  1035:     type ( 0x090 ) 
  1036:     cr ( 0x092 ) 
  1037: b(;) ( 0x0c2 ) 
  1038: named-token ( 0x0b6 ) tell-me 0x801
  1049: b(:) ( 0x0b7 ) 
  1050:     b(") ( 0x012 ) ( len=0x21 [33 bytes] )
                    " Begin Nested ""Constant"" Test Test"
  1085:     type ( 0x090 ) 
  1086:     b(") ( 0x012 ) ( len=0x10 [16 bytes] )
                    " Is True, level 1"
  1104:     type ( 0x090 ) 
  1105:     b(") ( 0x012 ) ( len=0x1c [28 bytes] )
                    " Is True and is True, level 2"
  1135:     b(") ( 0x012 ) ( len=0x11 [17 bytes] )
                    " Middle of level 2"
  1154:     type ( 0x090 ) 
  1155:     b(") ( 0x012 ) ( len=0x21 [33 bytes] )
                    " Is True and is Not False, level 2"
  1190: b(;) ( 0x0c2 ) 
  1191: named-token ( 0x0b6 ) whoozis 0x802
  1202: b(:) ( 0x0b7 ) 
  1203:     whatziz ( 0x800 ) 
  1205: b(;) ( 0x0c2 ) 
\  Unexpected FCode-Block Starter.
  1206: start1 ( 0x0f1 )   ( 16-bit offsets)
  1207:   format:    0x08
  1208:   checksum should be:  0x03d6, but is 0x2195
  1210:   len:       0x0012 ( 18 bytes)
\    Ignoring length field.
  1214: named-token ( 0x0b6 ) whatziz 0x803
  1225: b(:) ( 0x0b7 ) 
  1226:     b(") ( 0x012 ) ( len=0xc [12 bytes] )
                    " This is the "
  1240:     type ( 0x090 ) 
  1241:     b(") ( 0x012 ) ( len=5 )
                    " False"
  1248:     type ( 0x090 ) 
  1249:     b(") ( 0x012 ) ( len=0x12 [18 bytes] )
                    "  side of the test."
  1269:     type ( 0x090 ) 
  1270:     cr ( 0x092 ) 
  1271: b(;) ( 0x0c2 ) 
  1272: named-token ( 0x0b6 ) tell-me 0x804
  1283: b(:) ( 0x0b7 ) 
  1284:     b(") ( 0x012 ) ( len=0x21 [33 bytes] )
                    " Begin Nested ""Constant"" Test Test"
  1319:     type ( 0x090 ) 
  1320:     b(") ( 0x012 ) ( len=0x14 [20 bytes] )
                    " Is Not True, level 1"
  1342:     type ( 0x090 ) 
  1343:     b(") ( 0x012 ) ( len=0x24 [36 bytes] )
                    " Is Not True and is Not True, level 2"
  1381:     b(") ( 0x012 ) ( len=0x15 [21 bytes] )
                    " Middle of Not level 2"
  1404:     type ( 0x090 ) 
  1405:     b(") ( 0x012 ) ( len=0x21 [33 bytes] )
                    " Is Not True and is False, level 2"
  1440: b(;) ( 0x0c2 ) 
  1441: named-token ( 0x0b6 ) whoozis 0x805
  1452: b(:) ( 0x0b7 ) 
  1453:     whatziz ( 0x803 ) 
  1455: b(;) ( 0x0c2 ) 
  1456: end0 ( 0x000 ) 
\  Detokenization finished normally after 485 bytes.
\  PCI Image padded with 487 bytes of zero