![]() |
miasm
Reverse engineering framework
|
Functions | |
| def | parse_fmt (s) |
| def | xxx___printf_chk (jitter) |
| def | xxx_puts (jitter) |
Variables | |
| stdout = stdout.buffer | |
| int | nb_tests = 1 |
| parser = Sandbox_Linux_x86_64.parser(description="ELF sandboxer") | |
| help | |
| options = parser.parse_args() | |
| expected = open(options.expected) | |
| loc_db = LocationDB() | |
| sb = Sandbox_Linux_x86_64(loc_db, options.filename, options, globals()) | |
| addr = sb.elf.getsectionbyname(".symtab")[options.funcname].value | |
| FS | |
| def testqemu64.parse_fmt | ( | s | ) |

| def testqemu64.xxx___printf_chk | ( | jitter | ) |
Tiny implementation of printf_chk

| def testqemu64.xxx_puts | ( | jitter | ) |
#include <stdio.h> int puts(const char *s); writes the string s and a trailing newline to stdout.
| testqemu64.addr = sb.elf.getsectionbyname(".symtab")[options.funcname].value |
| testqemu64.expected = open(options.expected) |
| testqemu64.FS |
| testqemu64.help |
| testqemu64.loc_db = LocationDB() |
| int testqemu64.nb_tests = 1 |
| testqemu64.options = parser.parse_args() |
| testqemu64.parser = Sandbox_Linux_x86_64.parser(description="ELF sandboxer") |
| testqemu64.sb = Sandbox_Linux_x86_64(loc_db, options.filename, options, globals()) |
| testqemu64.stdout = stdout.buffer |