pwninit 2.2.0

automate starting binary exploit challenges
Documentation
//! CPU architectures

use crate::elf;

use std::fmt;
use std::path::Path;
use std::path::PathBuf;

use goblin::elf::header::EM_386;
use goblin::elf::header::EM_X86_64;
use snafu::ResultExt;
use snafu::Snafu;

/// The CPU architectures supported by `pwninit`
pub enum CpuArch {
    I386,
    Amd64,
}

impl fmt::Display for CpuArch {
    /// Architecture names fitting the spec for Ubuntu repositories
    fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
        f.write_str(match self {
            CpuArch::I386 => "i386",
            CpuArch::Amd64 => "amd64",
        })
    }
}

#[derive(Debug, Snafu)]
pub enum Error {
    ElfParseError {
        source: elf::parse::Error,
    },

    #[snafu(display("{}: architecture is not x86", path.display()))]
    BadArch {
        path: PathBuf,
    },
}

pub type Result = std::result::Result<CpuArch, Error>;

impl CpuArch {
    /// Detect `CpuArch` from the bytes of an ELF file
    pub fn from_elf_bytes(path: &Path, bytes: &[u8]) -> Result {
        let elf = elf::parse::parse(path, bytes).context(ElfParseError)?;
        let arch = elf.header.e_machine;
        match arch {
            EM_386 => Ok(CpuArch::I386),
            EM_X86_64 => Ok(CpuArch::Amd64),
            _ => Err(Error::BadArch {
                path: path.to_path_buf(),
            }),
        }
    }
}