miasm
Reverse engineering framework
dse.DSETest Class Reference
Inheritance diagram for dse.DSETest:
Collaboration diagram for dse.DSETest:

Public Member Functions

def __init__ (self, jitter_engine)
 
def init_machine (self)
 
def prepare (self)
 
def __call__ (self)
 
def run (self)
 
def asm (self)
 
def check (self)
 

Public Attributes

 loc_db
 
 machine
 
 myjit
 
 dse
 
 assembly
 

Static Public Attributes

string TXT
 
string arch_name = "x86_32"
 
int arch_attrib = 32
 
int ret_addr = 0x1337beef
 
int run_addr = 0x0
 

Detailed Description

Inspired from TEST/ARCH/X86

Test the symbolic execution correctly follow generated labels

Constructor & Destructor Documentation

◆ __init__()

def dse.DSETest.__init__ (   self,
  jitter_engine 
)

Member Function Documentation

◆ __call__()

def dse.DSETest.__call__ (   self)
Here is the call graph for this function:

◆ asm()

def dse.DSETest.asm (   self)
Here is the call graph for this function:
Here is the caller graph for this function:

◆ check()

def dse.DSETest.check (   self)

Reimplemented in dse.DSEAttachInBreakpoint.

Here is the caller graph for this function:

◆ init_machine()

def dse.DSETest.init_machine (   self)

Reimplemented in dse.DSEAttachInBreakpoint.

Here is the caller graph for this function:

◆ prepare()

def dse.DSETest.prepare (   self)

Reimplemented in dse.DSEAttachInBreakpoint.

Here is the caller graph for this function:

◆ run()

def dse.DSETest.run (   self)
Here is the caller graph for this function:

Member Data Documentation

◆ arch_attrib

int dse.DSETest.arch_attrib = 32
static

◆ arch_name

string dse.DSETest.arch_name = "x86_32"
static

◆ assembly

dse.DSETest.assembly

◆ dse

dse.DSETest.dse

◆ loc_db

dse.DSETest.loc_db

◆ machine

dse.DSETest.machine

◆ myjit

dse.DSETest.myjit

◆ ret_addr

int dse.DSETest.ret_addr = 0x1337beef
static

◆ run_addr

int dse.DSETest.run_addr = 0x0
static

◆ TXT

string dse.DSETest.TXT
static
Initial value:
= '''
main:
SHL EDX, CL
RET
'''

The documentation for this class was generated from the following file: