![]() |
miasm
Reverse engineering framework
|
Functions | |
| def | parse_fmt (s) |
| def | xxx___printf_chk (jitter) |
| def | xxx_puts (jitter) |
Variables | |
| stdout = stdout.buffer | |
| int | nb_tests = 1 |
| parser = Sandbox_Linux_x86_32.parser(description="ELF sandboxer") | |
| help | |
| options = parser.parse_args() | |
| expected = open(options.expected) | |
| loc_db = LocationDB() | |
| sb = Sandbox_Linux_x86_32(loc_db, options.filename, options, globals()) | |
| addr = sb.elf.getsectionbyname(".symtab")[options.funcname].value | |
| GS | |
| def testqemu.parse_fmt | ( | s | ) |

| def testqemu.xxx___printf_chk | ( | jitter | ) |
Tiny implementation of printf_chk

| def testqemu.xxx_puts | ( | jitter | ) |
#include <stdio.h> int puts(const char *s); writes the string s and a trailing newline to stdout.
| testqemu.addr = sb.elf.getsectionbyname(".symtab")[options.funcname].value |
| testqemu.expected = open(options.expected) |
| testqemu.GS |
| testqemu.help |
| testqemu.loc_db = LocationDB() |
| int testqemu.nb_tests = 1 |
| testqemu.options = parser.parse_args() |
| testqemu.parser = Sandbox_Linux_x86_32.parser(description="ELF sandboxer") |
| testqemu.sb = Sandbox_Linux_x86_32(loc_db, options.filename, options, globals()) |
| testqemu.stdout = stdout.buffer |