Problems found with existing digests:
Package memconf distfile memconf-2.16/memconf.gz
b6f4b736cac388dddc5070670351cf7262aba048 [recorded]
95748686a5ad8144232f4d4abc9bf052721a196f [calculated]
Problems found locating distfiles:
Package dc-tools: missing distfile dc-tools/abs0-dc-burn-netbsd-1.5-0-gae55ec9
Package ipw-firmware: missing distfile ipw2100-fw-1.2.tgz
Package iwi-firmware: missing distfile ipw2200-fw-2.3.tgz
Package nvnet: missing distfile nvnet-netbsd-src-20050620.tgz
Package syslog-ng: missing distfile syslog-ng-3.7.2.tar.gz
Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden). All existing
SHA1 digests retained for now as an audit trail.
tested at this time.
Tools to help hacking Allwinner A10 (aka sun4i) based devices and possibly
it's successors, that's why the 'x' in the package name.
fexc:
`.fex` file (de)compiler
Usage: ./fexc [-vq] [-I <infmt>] [-O <outfmt>] [<input> [<output>]]
infmt: fex, bin (default:fex)
outfmt: fex, bin (default:bin)
bin2fex:
compatibility shortcut to call `fexc` to decompile an script.bin
blob back into `.fex` format used by allwinner's SDK to configure
the boards.
fex2bin:
compatiblity shortcut to call `fexc` to compile a `.fex` file into
the binary form used by the sun4i kernel.
fel:
script interface for talking to the FEL USB handler built in to
th CPU. You activate FEL mode by pushing the usboot/recovery
button at poweron. See http://linux-sunxi.org/FEL/USBBoot for
a detailed usage guide.
fel-gpio:
Simple wrapper around fel-pio and fel to allow GPIO manipulations
via FEL
fel-sdboot:
ARM native sdcard bootloader forcing the device into FEL mode
fel-pio:
ARM native helper for fel-gpio
pio:
Manipulate PIO register dumps
jtag-loop.sunxi:
ARM native boot helper to force the SD port into JTAG
and then stop, to ease debugging of bootloaders.
bootinfo:
Dump information from Allwinner boot files (boot0/boot1)
--type=sd include SD boot info
--type=nand include NAND boot info (not implemented)
phoenix_info:
gives information about a phoenix image created by the
phoenixcard utility and optionally extracts the embedded boot
code & firmware file from their hidden partitions.