ReturnsBOOL TRUE if successfully serialized, FALSE otherwise
+
+
+
+◆ c_memmove()
+
+
+
+
+
+ void c_memmove |
+ ( |
+ char * |
+ dest, |
+
+
+ |
+ |
+ char * |
+ src, |
+
+
+ |
+ |
+ size_t |
+ cnt |
+
+
+ |
+ ) |
+ | |
+
+
+
+
+
copies memory
+
- Parameters
-
+
+ dest | destination buffer |
+ src | source buffer |
+ cnt | number of bytes to copy |
+
+
+
+
+
+
+
+◆ c_strlen()
+
+
+
+
+
+ ssize_t c_strlen |
+ ( |
+ char * |
+ str | ) |
+ |
+
+
+
+
+
returns length of c string
+
- Parameters
-
+
+ str | pointer to c string |
+
+
+
+
- Returns
- ssize_t length of c string
+
+
+
+
+◆ c_strnlen()
+
+
+
+
+
+ ssize_t c_strnlen |
+ ( |
+ char * |
+ str, |
+
+
+ |
+ |
+ size_t |
+ max_len |
+
+
+ |
+ ) |
+ | |
+
+
+
+
+
returns length of c string with a maximum length
+
- Parameters
-
+
+ str | pointer to c string |
+ max_len | maximum length of c string |
+
+
+
+
- Returns
- ssize_t length of c string
+
diff --git a/xzre_8h_source.html b/xzre_8h_source.html
index e0ea9b4..02def19 100644
--- a/xzre_8h_source.html
+++ b/xzre_8h_source.html
@@ -2209,49 +2209,65 @@
-
-
-
-
- 3918 static_assert(
sizeof(global_ctx) == 0x8);
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ 3954 static_assert(
sizeof(global_ctx) == 0x8);
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
int RSA_public_decrypt(int flen, const unsigned char *from, unsigned char *to, RSA *rsa, int padding)
Definition: ssh_patch.c:37
@@ -2395,6 +2411,7 @@
BOOL sshd_get_usable_socket(int *pSock, int socket_index, libc_imports_t *imports)
gets the first usable socket fd
void mm_log_handler_hook(LogLevel level, int forced, const char *msg, void *ctx)
void * elf_symbol_get_addr(elf_info_t *elf_info, EncodedStringId encoded_string_id)
Looks up an ELF symbol from a parsed ELF, and returns its memory address.
+ssize_t c_strnlen(char *str, size_t max_len)
returns length of c string with a maximum length
void init_elf_entry_ctx(elf_entry_ctx_t *ctx)
initialises the elf_entry_ctx_t
BOOL verify_signature(struct sshkey *sshkey, u8 *signed_data, u64 sshkey_digest_offset, u64 signed_data_size, u8 *signature, u8 *ed448_raw_key, global_context_t *global_ctx)
Checks if signed_data is signed with ed448_raw_key.
BOOL validate_log_handler_pointers(void *addr1, void *addr2, void *search_base, u8 *code_end, string_references_t *refs, global_context_t *global)
Validate that the two addresses are the expected/correct ones.
@@ -2413,6 +2430,7 @@
BOOL process_shared_libraries_map(struct link_map *r_map, backdoor_shared_libraries_data_t *data)
scans loaded libraries to identify interesting libraries and populate related data
BOOL backdoor_setup(backdoor_setup_params_t *params)
the backdoor main method that installs the backdoor_symbind64() callback
void * elf_get_reloc_symbol(elf_info_t *elf_info, Elf64_Rela *relocs, u32 num_relocs, u64 reloc_type, EncodedStringId encoded_string_id)
Searches the ELF relocations for a symbol having name encoded_string id and relocation of type reloc_...
+void c_memmove(char *dest, char *src, size_t cnt)
copies memory
BOOL elf_contains_vaddr_relro(elf_info_t *elf_info, u64 vaddr, u64 size, u32 p_flags)
checks if given ELF file contains the range [vaddr, vaddr+size) in the gnurelro segment
BOOL elf_contains_vaddr(elf_info_t *elf_info, void *vaddr, u64 size, u32 p_flags)
checks if given ELF file contains the range [vaddr, vaddr+size) in a segment with the specified memor...
BOOL find_link_map_l_audit_any_plt(backdoor_data_handle_t *data, ptrdiff_t libname_offset, backdoor_hooks_data_t *hooks, imported_funcs_t *imported_funcs)
Find struct link_map offset required to modify ld.so's private link_map::l_audit_any_plt state.
@@ -2536,6 +2554,7 @@
BOOL find_mov_lea_instruction(u8 *code_start, u8 *code_end, BOOL is_64bit_operand, BOOL load_flag, dasm_ctx_t *dctx)
like find_mov_instruction, but also considers LEA instructions
BOOL find_lea_instruction(u8 *code_start, u8 *code_end, u64 displacement)
finds a lea instruction
void * fake_lzma_alloc(void *opaque, size_t nmemb, size_t size)
a fake alloc function called by lzma_alloc() that then calls elf_symbol_get_addr()
+ssize_t c_strlen(char *str)
returns length of c string
BOOL find_reg2reg_instruction(u8 *code_start, u8 *code_end, dasm_ctx_t *dctx)
finds a reg2reg instruction
lzma_allocator * get_lzma_allocator(void)
gets the fake LZMA allocator, used for imports resolution the "opaque" field of the structure holds a...