Evo podataka:
__________________________________________________________________________________________________
reader-bulcrypt.o: file format elf32-i386
Disassembly of section .text:
00000000 <bulcrypt_card_info>:
0: 83 ec 1c sub $0x1c,%esp
3: c7 04 24 00 00 00 00 movl $0x0,(%esp)
a: e8 fc ff ff ff call b <bulcrypt_card_info+0xb>
f: 83 c4 1c add $0x1c,%esp
12: c3 ret
13: 8d b6 00 00 00 00 lea 0x0(%esi),%esi
19: 8d bc 27 00 00 00 00 lea 0x0(%edi,%eiz,1),%edi
00000020 <bulcrypt_get_emm_filter>:
20: 83 ec 1c sub $0x1c,%esp
23: c7 04 24 12 00 00 00 movl $0x12,(%esp)
2a: e8 fc ff ff ff call 2b <bulcrypt_get_emm_filter+0xb>
2f: 83 c4 1c add $0x1c,%esp
32: c3 ret
33: 8d b6 00 00 00 00 lea 0x0(%esi),%esi
39: 8d bc 27 00 00 00 00 lea 0x0(%edi,%eiz,1),%edi
00000040 <bulcrypt_get_emm_type>:
40: 83 ec 1c sub $0x1c,%esp
43: c7 04 24 1d 00 00 00 movl $0x1d,(%esp)
4a: e8 fc ff ff ff call 4b <bulcrypt_get_emm_type+0xb>
4f: 83 c4 1c add $0x1c,%esp
52: c3 ret
53: 8d b6 00 00 00 00 lea 0x0(%esi),%esi
59: 8d bc 27 00 00 00 00 lea 0x0(%edi,%eiz,1),%edi
00000060 <bulcrypt_do_emm>:
60: 83 ec 1c sub $0x1c,%esp
63: c7 04 24 26 00 00 00 movl $0x26,(%esp)
6a: e8 fc ff ff ff call 6b <bulcrypt_do_emm+0xb>
6f: 83 c4 1c add $0x1c,%esp
72: c3 ret
73: 8d b6 00 00 00 00 lea 0x0(%esi),%esi
79: 8d bc 27 00 00 00 00 lea 0x0(%edi,%eiz,1),%edi
00000080 <bulcrypt_do_ecm>:
80: 83 ec 1c sub $0x1c,%esp
83: c7 04 24 2a 00 00 00 movl $0x2a,(%esp)
8a: e8 fc ff ff ff call 8b <bulcrypt_do_ecm+0xb>
8f: 83 c4 1c add $0x1c,%esp
92: c3 ret
93: 8d b6 00 00 00 00 lea 0x0(%esi),%esi
99: 8d bc 27 00 00 00 00 lea 0x0(%edi,%eiz,1),%edi
000000a0 <bulcrypt_card_init>:
a0: 57 push %edi
a1: b9 10 00 00 00 mov $0x10,%ecx
a6: 53 push %ebx
a7: 83 ec 64 sub $0x64,%esp
aa: 65 a1 14 00 00 00 mov %gs:0x14,%eax
b0: 89 44 24 5c mov %eax,0x5c(%esp)
b4: 31 c0 xor %eax,%eax
b6: 8d 54 24 1c lea 0x1c(%esp),%edx
ba: 8b 5c 24 70 mov 0x70(%esp),%ebx
be: 89 d7 mov %edx,%edi
c0: f3 ab rep stos %eax,%es:(%edi)
c2: 8d 44 24 18 lea 0x18(%esp),%eax
c6: 89 44 24 08 mov %eax,0x8(%esp)
ca: 8d 44 24 74 lea 0x74(%esp),%eax
ce: 89 54 24 04 mov %edx,0x4(%esp)
d2: 89 04 24 mov %eax,(%esp)
d5: e8 fc ff ff ff call d6 <bulcrypt_card_init+0x36>
da: 80 7c 24 1c 3b cmpb $0x3b,0x1c(%esp)
df: 74 37 je 118 <bulcrypt_card_init+0x78>
e1: c7 04 24 50 00 00 00 movl $0x50,(%esp)
e8: e8 fc ff ff ff call e9 <bulcrypt_card_init+0x49>
ed: 8b 54 24 5c mov 0x5c(%esp),%edx
f1: 65 33 15 14 00 00 00 xor %gs:0x14,%edx
f8: 66 c7 83 52 07 00 00 movw $0x5581,0x752(%ebx)
ff: 81 55
101: c7 83 cc 03 00 00 00 movl $0x0,0x3cc(%ebx)
108: 00 00 00
10b: 75 33 jne 140 <bulcrypt_card_init+0xa0>
10d: 83 c4 64 add $0x64,%esp
110: 5b pop %ebx
111: 5f pop %edi
112: c3 ret
113: 90 nop
114: 8d 74 26 00 lea 0x0(%esi,%eiz,1),%esi
118: 80 7c 24 1d 20 cmpb $0x20,0x1d(%esp)
11d: 75 c2 jne e1 <bulcrypt_card_init+0x41>
11f: 80 7c 24 1e 00 cmpb $0x0,0x1e(%esp)
124: 75 bb jne e1 <bulcrypt_card_init+0x41>
126: c7 04 24 00 00 00 00 movl $0x0,(%esp)
12d: e8 fc ff ff ff call 12e <bulcrypt_card_init+0x8e>
132: c7 04 24 2c 00 00 00 movl $0x2c,(%esp)
139: e8 fc ff ff ff call 13a <bulcrypt_card_init+0x9a>
13e: eb ad jmp ed <bulcrypt_card_init+0x4d>
140: e8 fc ff ff ff call 141 <bulcrypt_card_init+0xa1>
Disassembly of section .rodata.str1.1:
00000000 <.rodata.str1.1>:
0: 5b pop %ebx
1: 62 75 6c bound %esi,0x6c(%ebp)
4: 63 72 79 arpl %si,0x79(%edx)
7: 70 74 jo 7d <bulcrypt_do_emm+0x1d>
9: 2d 72 65 61 64 sub $0x64616572,%eax
e: 65 gs
f: 72 5d jb 6e <bulcrypt_do_emm+0xe>
11: 00 45 4d add %al,0x4d(%ebp)
14: 4d dec %ebp
15: 20 46 49 and %al,0x49(%esi)
18: 4c dec %esp
19: 54 push %esp
1a: 45 inc %ebp
1b: 52 push %edx
1c: 00 45 4d add %al,0x4d(%ebp)
1f: 4d dec %ebp
20: 20 54 59 50 and %dl,0x50(%ecx,%ebx,2)
24: 45 inc %ebp
25: 00 45 4d add %al,0x4d(%ebp)
28: 4d dec %ebp
29: 00 45 43 add %al,0x43(%ebp)
2c: 4d dec %ebp
...
Disassembly of section .rodata.str1.4:
00000000 <.rodata.str1.4>:
0: 5b pop %ebx
1: 62 75 6c bound %esi,0x6c(%ebp)
4: 63 72 79 arpl %si,0x79(%edx)
7: 70 74 jo 7d <bulcrypt_do_emm+0x1d>
9: 2d 72 65 61 64 sub $0x64616572,%eax
e: 65 gs
f: 72 5d jb 6e <.rodata.str1.4+0x6e>
11: 20 42 75 and %al,0x75(%edx)
14: 6c insb (%dx),%es:(%edi)
15: 63 72 79 arpl %si,0x79(%edx)
18: 70 74 jo 8e <bulcrypt_do_ecm+0xe>
1a: 20 63 61 and %ah,0x61(%ebx)
1d: 72 64 jb 83 <bulcrypt_do_ecm+0x3>
1f: 20 64 65 74 and %ah,0x74(%ebp,%eiz,2)
23: 65 63 74 65 64 arpl %si,%gs:0x64(%ebp,%eiz,2)
28: 00 00 add %al,(%eax)
2a: 00 00 add %al,(%eax)
2c: 5b pop %ebx
2d: 62 75 6c bound %esi,0x6c(%ebp)
30: 63 72 79 arpl %si,0x79(%edx)
33: 70 74 jo a9 <bulcrypt_card_init+0x9>
35: 2d 72 65 61 64 sub $0x64616572,%eax
3a: 65 gs
3b: 72 5d jb 9a <bulcrypt_do_ecm+0x1a>
3d: 20 74 79 70 and %dh,0x70(%ecx,%edi,2)
41: 65 3a 20 cmp %gs:(%eax),%ah
44: 42 inc %edx
45: 75 6c jne b3 <bulcrypt_card_init+0x13>
47: 63 72 79 arpl %si,0x79(%edx)
4a: 70 74 jo c0 <bulcrypt_card_init+0x20>
4c: 00 00 add %al,(%eax)
4e: 00 00 add %al,(%eax)
50: 5b pop %ebx
51: 62 75 6c bound %esi,0x6c(%ebp)
54: 63 72 79 arpl %si,0x79(%edx)
57: 70 74 jo cd <bulcrypt_card_init+0x2d>
59: 2d 72 65 61 64 sub $0x64616572,%eax
5e: 65 gs
5f: 72 5d jb be <bulcrypt_card_init+0x1e>
61: 20 42 75 and %al,0x75(%edx)
64: 6c insb (%dx),%es:(%edi)
65: 63 72 79 arpl %si,0x79(%edx)
68: 70 74 jo de <bulcrypt_card_init+0x3e>
6a: 20 65 72 and %ah,0x72(%ebp)
6d: 72 6f jb de <bulcrypt_card_init+0x3e>
6f: 72 00 jb 71 <bulcrypt_do_emm+0x11>
Disassembly of section .comment:
00000000 <.comment>:
0: 00 47 43 add %al,0x43(%edi)
3: 43 inc %ebx
4: 3a 20 cmp (%eax),%ah
6: 28 55 62 sub %dl,0x62(%ebp)
9: 75 6e jne 79 <bulcrypt_do_emm+0x19>
b: 74 75 je 82 <bulcrypt_do_ecm+0x2>
d: 2f das
e: 4c dec %esp
f: 69 6e 61 72 6f 20 34 imul $0x34206f72,0x61(%esi),%ebp
16: 2e cs
17: 34 2e xor $0x2e,%al
19: 34 2d xor $0x2d,%al
1b: 31 34 75 62 75 6e 74 xor %esi,0x746e7562(,%esi,2)
22: 75 35 jne 59 <bulcrypt_get_emm_type+0x19>
24: 29 20 sub %esp,(%eax)
26: 34 2e xor $0x2e,%al
28: 34 2e xor $0x2e,%al
2a: 35 .byte 0x35
...