User talk:0x45fff

func4
Dump of assembler code for function func4: 0x0000000000400e70 <+0>:	mov   QWORD PTR [rsp-0x18],rbx 0x0000000000400e75 <+5>:	mov   QWORD PTR [rsp-0x10],rbp 0x0000000000400e7a <+10>:	mov   QWORD PTR [rsp-0x8],r12 0x0000000000400e7f <+15>:	sub   rsp,0x18 0x0000000000400e83 <+19>:	mov   ebp,edi 0x0000000000400e85 <+21>:	mov   r12d,esi 0x0000000000400e88 <+24>:	test  edi,edi 0x0000000000400e8a <+26>:	jg    0x400e94  0x0000000000400e8c <+28>:	mov   r12d,0x0 0x0000000000400e92 <+34>:	jmp   0x400eb7  0x0000000000400e94 <+36>:	cmp   edi,0x1 0x0000000000400e97 <+39>:	je    0x400eb7  0x0000000000400e99 <+41>:	lea   edi,[rbp-0x1] 0x0000000000400e9c <+44>:	nop   DWORD PTR [rax+0x0] 0x0000000000400ea0 <+48>:	call  0x400e70 0x0000000000400ea5 <+53>:	mov   ebx,eax 0x0000000000400ea7 <+55>:	lea   edi,[rbp-0x2] 0x0000000000400eaa <+58>:	mov   esi,r12d 0x0000000000400ead <+61>:	call  0x400e70 0x0000000000400eb2 <+66>:	add   eax,ebx 0x0000000000400eb4 <+68>:	add   r12d,eax 0x0000000000400eb7 <+71>:	mov   eax,r12d 0x0000000000400eba <+74>:	mov   rbx,QWORD PTR [rsp] 0x0000000000400ebe <+78>:	mov   rbp,QWORD PTR [rsp+0x8] 0x0000000000400ec3 <+83>:	mov   r12,QWORD PTR [rsp+0x10] 0x0000000000400ec8 <+88>:	add   rsp,0x18 0x0000000000400ecc <+92>:	ret End of assembler dump. 0x45fff (talk) 00:19, 11 November 2023 (UTC)

phase_4
Dump of assembler code for function phase_4: 0x0000000000401124 <+0>:	sub   rsp,0x18 0x0000000000401128 <+4>:	lea   rcx,[rsp+0x14] 0x000000000040112d <+9>:	lea   rdx,[rsp+0x10] 0x0000000000401132 <+14>:	mov   esi,0x40280a 0x0000000000401137 <+19>:	mov   eax,0x0 0x000000000040113c <+24>:	call  0x400b80  0x0000000000401141 <+29>:	cmp   eax,0x2 0x0000000000401144 <+32>:	jne   0x401154  0x0000000000401146 <+34>:	mov   eax,DWORD PTR [rsp+0x14] 0x000000000040114a <+38>:	cmp   eax,0x1 0x000000000040114d <+41>:	jle   0x401154  0x000000000040114f <+43>:	cmp   eax,0x4 0x0000000000401152 <+46>:	jle   0x401159  0x0000000000401154 <+48>:	call  0x4014d2  0x0000000000401159 <+53>:	mov   esi,DWORD PTR [rsp+0x14] 0x000000000040115d <+57>:	mov   edi,0x6 0x0000000000401162 <+62>:	call  0x400e70 0x0000000000401167 <+67>:	cmp   eax,DWORD PTR [rsp+0x10] => 0x000000000040116b <+71>:	je    0x401172  0x000000000040116d <+73>:	call  0x4014d2  0x0000000000401172 <+78>:	add   rsp,0x18 0x0000000000401176 <+82>:	ret End of assembler dump. 0x45fff (talk) 00:19, 11 November 2023 (UTC)

phase_5
Dump of assembler code for function phase_5: 0x00000000004010ac <+0>:	push  rbx 0x00000000004010ad <+1>:	sub   rsp,0x10 0x00000000004010b1 <+5>:	mov   rbx,rdi 0x00000000004010b4 <+8>:	call  0x4012d0  0x00000000004010b9 <+13>:	cmp   eax,0x6 0x00000000004010bc <+16>:	je    0x4010c3  0x00000000004010be <+18>:	call  0x4014d2  0x00000000004010c3 <+23>:	mov   edx,0x0 0x00000000004010c8 <+28>:	mov   rdi,rsp 0x00000000004010cb <+31>:	movsx rax,BYTE PTR [rdx+rbx*1] 0x00000000004010d0 <+36>:	and   eax,0xf 0x00000000004010d3 <+39>:	movzx eax,BYTE PTR [rax+0x402790] 0x00000000004010da <+46>:	mov   BYTE PTR [rdx+rdi*1],al 0x00000000004010dd <+49>:	add   rdx,0x1 0x00000000004010e1 <+53>:	cmp   rdx,0x6 0x00000000004010e5 <+57>:	jne   0x4010cb  0x00000000004010e7 <+59>:	mov   BYTE PTR [rsp+0x6],0x0 0x00000000004010ec <+64>:	mov   esi,0x402732 0x00000000004010f1 <+69>:	mov   rdi,rsp 0x00000000004010f4 <+72>:	call  0x4012ef  0x00000000004010f9 <+77>:	test  eax,eax 0x00000000004010fb <+79>:	je    0x401102  0x00000000004010fd <+81>:	call  0x4014d2 <explode_bomb> 0x0000000000401102 <+86>:	add   rsp,0x10 0x0000000000401106 <+90>:	pop   rbx 0x0000000000401107 <+91>:	ret 0x45fff (talk) 00:20, 11 November 2023 (UTC)

string_length
Dump of assembler code for function string_length: 0x00000000004012d0 <+0>:	mov   eax,0x0 0x00000000004012d5 <+5>:	cmp   BYTE PTR [rdi],0x0 0x00000000004012d8 <+8>:	je    0x4012ed <string_length+29> 0x00000000004012da <+10>:	mov   rdx,rdi 0x00000000004012dd <+13>:	movzx eax,BYTE PTR [rdx+0x1] 0x00000000004012e1 <+17>:	add   rdx,0x1 0x00000000004012e5 <+21>:	test  al,al 0x00000000004012e7 <+23>:	jne   0x4012dd <string_length+13> 0x00000000004012e9 <+25>:	mov   eax,edx 0x00000000004012eb <+27>:	sub   eax,edi 0x00000000004012ed <+29>:	repz ret End of assembler dump. 0x45fff (talk) 00:21, 11 November 2023 (UTC)

strings_not_equal
Dump of assembler code for function strings_not_equal: 0x00000000004012ef <+0>:	push  r12 0x00000000004012f1 <+2>:	push  rbp 0x00000000004012f2 <+3>:	push  rbx 0x00000000004012f3 <+4>:	mov   rbp,rdi 0x00000000004012f6 <+7>:	mov   r12,rsi 0x00000000004012f9 <+10>:	call  0x4012d0 <string_length> 0x00000000004012fe <+15>:	mov   ebx,eax 0x0000000000401300 <+17>:	mov   rdi,r12 0x0000000000401303 <+20>:	call  0x4012d0 <string_length> 0x0000000000401308 <+25>:	cmp   ebx,eax 0x000000000040130a <+27>:	jne   0x40133e <strings_not_equal+79> 0x000000000040130c <+29>:	movzx eax,BYTE PTR [rbp+0x0] 0x0000000000401310 <+33>:	test  al,al 0x0000000000401312 <+35>:	je    0x401345 <strings_not_equal+86> 0x0000000000401314 <+37>:	mov   rcx,rbp 0x0000000000401317 <+40>:	mov   rdx,r12 0x000000000040131a <+43>:	cmp   al,BYTE PTR [r12] 0x000000000040131e <+47>:	je    0x401333 <strings_not_equal+68> 0x0000000000401320 <+49>:	jmp   0x40133e <strings_not_equal+79> 0x0000000000401322 <+51>:	movzx eax,BYTE PTR [rdx+0x1] 0x0000000000401326 <+55>:	add   rcx,0x1 0x000000000040132a <+59>:	add   rdx,0x1 0x000000000040132e <+63>:	cmp   sil,al 0x0000000000401331 <+66>:	jne   0x40133e <strings_not_equal+79> 0x0000000000401333 <+68>:	movzx esi,BYTE PTR [rcx+0x1] 0x0000000000401337 <+72>:	test  sil,sil 0x000000000040133a <+75>:	jne   0x401322 <strings_not_equal+51> 0x000000000040133c <+77>:	jmp   0x401345 <strings_not_equal+86> 0x000000000040133e <+79>:	mov   eax,0x1 0x0000000000401343 <+84>:	jmp   0x40134a <strings_not_equal+91> 0x0000000000401345 <+86>:	mov   eax,0x0 0x000000000040134a <+91>:	pop   rbx 0x000000000040134b <+92>:	pop   rbp 0x000000000040134c <+93>:	pop   r12 0x000000000040134e <+95>:	xchg  ax,ax 0x0000000000401350 <+97>:	ret End of assembler dump. 0x45fff (talk) 00:22, 11 November 2023 (UTC)