miasm
Reverse engineering framework
mn_pcmpeq.Test_PCMPEQD Class Reference
Inheritance diagram for mn_pcmpeq.Test_PCMPEQD:
Collaboration diagram for mn_pcmpeq.Test_PCMPEQD:

Public Member Functions

def check (self)
 
- Public Member Functions inherited from asm_test.Asm_Test_32
def init_machine (self)
 
- Public Member Functions inherited from asm_test.Asm_Test
def __init__ (self, jitter)
 
def __call__ (self)
 
def asm (self)
 
def run (self)
 
def __init__ (self, jitter)
 
def __call__ (self)
 
def asm (self)
 
def run (self)
 
def __init__ (self, jitter_engine)
 
def test_init (self)
 
def prepare (self)
 
def __call__ (self)
 
def run (self)
 
def asm (self)
 

Static Public Attributes

string TXT
 
- Static Public Attributes inherited from asm_test.Asm_Test_32
string arch_name = "x86_32"
 
int arch_attrib = 32
 
int ret_addr = 0x1337beef
 
- Static Public Attributes inherited from asm_test.Asm_Test
int run_addr = 0x0
 

Additional Inherited Members

- Public Attributes inherited from asm_test.Asm_Test
 loc_db
 
 myjit
 
 assembly
 

Member Function Documentation

◆ check()

def mn_pcmpeq.Test_PCMPEQD.check (   self)

Reimplemented from asm_test.Asm_Test.

Member Data Documentation

◆ TXT

string mn_pcmpeq.Test_PCMPEQD.TXT
static
Initial value:
= '''
main:
CALL next
.byte 0x88, 0x77, 0x66, 0x55, 0x44, 0x3F, 0x22, 0x11
.byte 0x88, 0x77, 0x66, 0x55, 0xF9, 0x33, 0x22, 0x11
next:
POP EBP
MOVQ MM0, QWORD PTR [EBP]
MOVQ MM1, MM0
PCMPEQD MM1, QWORD PTR [EBP+0x8]
RET
'''

The documentation for this class was generated from the following file: