ethereum: Add property tests and instructions for running them with KEVM (#2956)
* ethereum: Add Foundry tests written by RV * ethereum: Add scripts and instructions to run proofs using KEVM * ethereum: Fix typo on testSetup_after_setup_revert_KEVM * ethereum: Edit Makefile to skip KEVM tests when running forge test * ethereum: Fix commented-out lines in Foundry tests * ethereum: Refactor GovernanceStructs invalid-size tests * ethereum: Replace assume with bound in Foundry tests Co-authored-by: Jeff Schroeder <jeffschroeder@computer.org> * ethereum: Apply review suggestions to run-kevm script Co-authored-by: Jeff Schroeder <jeffschroeder@computer.org> * ethereum: explicit cast to uint8 for some vars The bound() calls need to be explicitly cast to uint8 from the uint256 that forge-std's bound() returns. * ethereum: updating some of the RV tests The definitions don't compile with newer forge/solc. * ethereum: Add assumption to test that guardian count > 0 Prevents an arithmetic over/underflow error in testCannotVerifySignaturesWithOutOfBoundsSignature, in the expression bound(outOfBoundsGuardian, 0, params.guardianCount - 1) --------- Co-authored-by: Lucas MT <lucas.tabajara@runtimeverification.com> Co-authored-by: Jeff Schroeder <jeffschroeder@computer.org>
This commit is contained in:
parent
5457e7ff98
commit
406a43d03e
|
@ -83,7 +83,7 @@ test-identifiers: dependencies
|
|||
|
||||
.PHONY:
|
||||
test-forge: dependencies
|
||||
forge test
|
||||
forge test --no-match-test .*_KEVM # ignore KEVM tests (see PROOFS.md)
|
||||
|
||||
clean:
|
||||
rm -rf ganache.log .env node_modules build flattened build-forge ethers-contracts lib/forge-std lib/openzeppelin-contracts
|
||||
|
|
|
@ -0,0 +1,49 @@
|
|||
# Instructions to Reproduce the KEVM Proofs
|
||||
|
||||
## Dependencies
|
||||
|
||||
First, install [Forge](https://github.com/foundry-rs/foundry/tree/master/forge) and run
|
||||
|
||||
```
|
||||
make dependencies
|
||||
```
|
||||
|
||||
to install the `forge-std` library in the `lib` folder.
|
||||
|
||||
Next, [follow the instructions here](https://github.com/runtimeverification/evm-semantics/) to install KEVM (we recommend the fast installation with kup). All proofs were originally run using the KEVM version corresponding to commit [f5c1795aea0c7d6781c94f0e6d4c434ad3ad1982](https://github.com/runtimeverification/evm-semantics/commit/f5c1795aea0c7d6781c94f0e6d4c434ad3ad1982). To update the installation to a specific KEVM version, run
|
||||
|
||||
```
|
||||
kup update kevm --version <branch name or commit hash>
|
||||
```
|
||||
|
||||
## Reproducing the Proofs
|
||||
|
||||
Use the following command to run the proofs using KEVM:
|
||||
|
||||
```
|
||||
./run-kevm.sh
|
||||
```
|
||||
|
||||
The script first builds the tests with `forge build`, then kompiles them into a KEVM specification and runs the prover.
|
||||
|
||||
The script symbolically executes all tests added to the `tests` variable. By default, it is set to run all of the tests that have been verified using KEVM. To run a single test at a time, comment out the lines with the other tests. Tests can also be run in parallel by changing the value of the `workers` variable.
|
||||
|
||||
The script is set to resume proofs from where they left off. This means that if a proof is interrupted halfway, running the script again will continue from that point. Similarly, if a proof has already completed, running the script again will do nothing and just report the result. To instead restart from the beginning, turn on the `reinit` option in the script. Also note that if changes are made to the Solidity code, or if you switch to a different KEVM version, you should turn on the `regen` option the next time you run the script.
|
||||
|
||||
**Note:** When building the tests, the `run-kevm.sh` script uses the command `forge build --skip Migrator.sol` to avoid building the `Migrator` contract. The reason is that this contract contains a function named `claim`, which currently causes problems because `claim` is a reserved keyword in KEVM (none of the proofs depend on this contract, but KEVM generates definitions for all contracts built by `forge build`). Until this issue is fixed, if `forge build` has previously been run without the `--skip Migrator.sol` option, it is necessary to delete the `out/Migrator.sol` directory before running `run-kevm.sh`. Otherwise, the script will produce the following error:
|
||||
```
|
||||
[Error] Inner Parser: Parse error: unexpected end of file following token '.'.
|
||||
Source(/path/to/wormhole/ethereum/out/kompiled/foundry.k)
|
||||
Location(7633,23,7633,23)
|
||||
7633 | rule ( Migrator . claim ( V0__amount : uint256 ) => #abiCallData (
|
||||
"claim" , #uint256 ( V0__amount ) , .TypedArgs ) )
|
||||
. ^
|
||||
[Error] Inner Parser: Parse error: unexpected token 'uint256' following token
|
||||
':'.
|
||||
Source(/path/to/wormhole/ethereum/out/kompiled/foundry.k)
|
||||
Location(7633,45,7633,52)
|
||||
7633 | rule ( Migrator . claim ( V0__amount : uint256 ) => #abiCallData (
|
||||
"claim" , #uint256 ( V0__amount ) , .TypedArgs ) )
|
||||
. ^~~~~~~
|
||||
[Error] Compiler: Had 2 parsing errors.
|
||||
```
|
|
@ -0,0 +1,220 @@
|
|||
// test/Messages.sol
|
||||
// SPDX-License-Identifier: Apache 2
|
||||
|
||||
pragma solidity ^0.8.0;
|
||||
|
||||
import "../contracts/Messages.sol";
|
||||
import "../contracts/Getters.sol";
|
||||
import "../contracts/Structs.sol";
|
||||
import "forge-test/rv-helpers/TestUtils.sol";
|
||||
|
||||
contract TestGetters is TestUtils {
|
||||
Getters getters;
|
||||
|
||||
function setUp() public {
|
||||
getters = new Getters();
|
||||
}
|
||||
|
||||
function testGetGuardianSetIndex(uint32 index, bytes32 storageSlot)
|
||||
public
|
||||
unchangedStorage(address(getters), storageSlot)
|
||||
{
|
||||
vm.assume(storageSlot != GUARDIANSETINDEX_STORAGE_INDEX);
|
||||
|
||||
bytes32 mask = bytes32(0xffffffffffffffffffffffffffffffffffffffffffffffffffffffff00000000);
|
||||
bytes32 updatedStorage = storeWithMask(address(getters), GUARDIANSETINDEX_STORAGE_INDEX, bytes32(uint256(index)), mask);
|
||||
|
||||
assertEq(index, getters.getCurrentGuardianSetIndex());
|
||||
assertEq(updatedStorage, vm.load(address(getters), GUARDIANSETINDEX_STORAGE_INDEX));
|
||||
}
|
||||
|
||||
function testGetGuardianSetIndex_KEVM(uint32 index, bytes32 storageSlot)
|
||||
public
|
||||
symbolic(address(getters))
|
||||
{
|
||||
testGetGuardianSetIndex(index, storageSlot);
|
||||
}
|
||||
|
||||
function testGetExpireGuardianSet(uint32 timestamp, uint32 index, bytes32 storageSlot)
|
||||
public
|
||||
unchangedStorage(address(getters), storageSlot)
|
||||
{
|
||||
bytes32 storageLocation = hashedLocationOffset(index,GUARDIANSETS_STORAGE_INDEX,1);
|
||||
vm.assume(storageSlot != storageLocation);
|
||||
|
||||
bytes32 mask = bytes32(0xffffffffffffffffffffffffffffffffffffffffffffffffffffffff00000000);
|
||||
bytes32 updatedStorage = storeWithMask(address(getters), storageLocation, bytes32(uint256(timestamp)), mask);
|
||||
|
||||
uint32 expirationTime = getters.getGuardianSet(index).expirationTime;
|
||||
|
||||
assertEq(expirationTime, timestamp);
|
||||
assertEq(updatedStorage, vm.load(address(getters), storageLocation));
|
||||
}
|
||||
|
||||
function testGetExpireGuardianSet_KEVM(uint32 timestamp, uint32 index, bytes32 storageSlot)
|
||||
public
|
||||
symbolic(address(getters))
|
||||
{
|
||||
testGetExpireGuardianSet(timestamp, index, storageSlot);
|
||||
}
|
||||
|
||||
function testGetMessageFee(uint256 newFee, bytes32 storageSlot)
|
||||
public
|
||||
unchangedStorage(address(getters), storageSlot)
|
||||
{
|
||||
vm.assume(storageSlot != MESSAGEFEE_STORAGE_INDEX);
|
||||
|
||||
vm.store(address(getters), MESSAGEFEE_STORAGE_INDEX, bytes32(newFee));
|
||||
|
||||
assertEq(newFee, getters.messageFee());
|
||||
assertEq(bytes32(newFee), vm.load(address(getters), MESSAGEFEE_STORAGE_INDEX));
|
||||
}
|
||||
|
||||
function testGetMessageFee_KEVM(uint256 newFee, bytes32 storageSlot)
|
||||
public
|
||||
symbolic(address(getters))
|
||||
{
|
||||
testGetMessageFee(newFee, storageSlot);
|
||||
}
|
||||
|
||||
function testGetGovernanceContract(bytes32 newGovernanceContract, bytes32 storageSlot)
|
||||
public
|
||||
unchangedStorage(address(getters), storageSlot)
|
||||
{
|
||||
vm.assume(storageSlot != GOVERNANCECONTRACT_STORAGE_INDEX);
|
||||
|
||||
vm.store(address(getters), GOVERNANCECONTRACT_STORAGE_INDEX, newGovernanceContract);
|
||||
|
||||
assertEq(newGovernanceContract, getters.governanceContract());
|
||||
assertEq(newGovernanceContract, vm.load(address(getters), GOVERNANCECONTRACT_STORAGE_INDEX));
|
||||
}
|
||||
|
||||
function testGetGovernanceContract_KEVM(bytes32 newGovernanceContract, bytes32 storageSlot)
|
||||
public
|
||||
symbolic(address(getters))
|
||||
{
|
||||
testGetGovernanceContract(newGovernanceContract, storageSlot);
|
||||
}
|
||||
|
||||
function testIsInitialized(address newImplementation, uint8 initialized, bytes32 storageSlot)
|
||||
public
|
||||
unchangedStorage(address(getters), storageSlot)
|
||||
{
|
||||
bytes32 storageLocation = hashedLocation(newImplementation, INITIALIZEDIMPLEMENTATIONS_STORAGE_INDEX);
|
||||
vm.assume(storageSlot != storageLocation);
|
||||
|
||||
bytes32 mask = bytes32(0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00);
|
||||
bytes32 updatedStorage = storeWithMask(address(getters), storageLocation, bytes32(uint256(initialized)), mask);
|
||||
|
||||
assertEq(getters.isInitialized(newImplementation), initialized != 0);
|
||||
assertEq(updatedStorage, vm.load(address(getters), storageLocation));
|
||||
}
|
||||
|
||||
function testIsInitialized_KEVM(address newImplementation, uint8 initialized, bytes32 storageSlot)
|
||||
public
|
||||
symbolic(address(getters))
|
||||
{
|
||||
testIsInitialized(newImplementation, initialized, storageSlot);
|
||||
}
|
||||
|
||||
function testGetGovernanceActionConsumed(bytes32 hash, uint8 initialized, bytes32 storageSlot)
|
||||
public
|
||||
unchangedStorage(address(getters), storageSlot)
|
||||
{
|
||||
bytes32 storageLocation = hashedLocation(hash, CONSUMEDGOVACTIONS_STORAGE_INDEX);
|
||||
vm.assume(storageSlot != storageLocation);
|
||||
|
||||
bytes32 mask = bytes32(0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00);
|
||||
bytes32 updatedStorage = storeWithMask(address(getters), storageLocation, bytes32(uint256(initialized)), mask);
|
||||
|
||||
assertEq(getters.governanceActionIsConsumed(hash), initialized != 0);
|
||||
assertEq(updatedStorage, vm.load(address(getters), storageLocation));
|
||||
}
|
||||
|
||||
function testGetGovernanceActionConsumed_KEVM(bytes32 hash, uint8 initialized, bytes32 storageSlot)
|
||||
public
|
||||
symbolic(address(getters))
|
||||
{
|
||||
testGetGovernanceActionConsumed(hash, initialized, storageSlot);
|
||||
}
|
||||
|
||||
function testChainId(uint16 newChainId, bytes32 storageSlot)
|
||||
public
|
||||
unchangedStorage(address(getters), storageSlot)
|
||||
{
|
||||
vm.assume(storageSlot != CHAINID_STORAGE_INDEX);
|
||||
|
||||
bytes32 mask = bytes32(0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000);
|
||||
bytes32 updatedStorage = storeWithMask(address(getters), CHAINID_STORAGE_INDEX, bytes32(uint256(newChainId)), mask);
|
||||
|
||||
assertEq(getters.chainId(), newChainId);
|
||||
assertEq(updatedStorage, vm.load(address(getters), CHAINID_STORAGE_INDEX));
|
||||
}
|
||||
|
||||
function testChainId_KEVM(uint16 newChainId, bytes32 storageSlot)
|
||||
public
|
||||
symbolic(address(getters))
|
||||
{
|
||||
testChainId(newChainId, storageSlot);
|
||||
}
|
||||
|
||||
function testGovernanceChainId(uint16 newChainId, bytes32 storageSlot)
|
||||
public
|
||||
unchangedStorage(address(getters), storageSlot)
|
||||
{
|
||||
vm.assume(storageSlot != CHAINID_STORAGE_INDEX);
|
||||
|
||||
bytes32 mask = bytes32(0xffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffff);
|
||||
bytes32 updatedStorage = storeWithMask(address(getters), CHAINID_STORAGE_INDEX, bytes32(uint256(newChainId)) << 16, mask);
|
||||
|
||||
assertEq(getters.governanceChainId(), newChainId);
|
||||
assertEq(updatedStorage, vm.load(address(getters), CHAINID_STORAGE_INDEX));
|
||||
}
|
||||
|
||||
function testGovernanceChainId_KEVM(uint16 newChainId, bytes32 storageSlot)
|
||||
public
|
||||
symbolic(address(getters))
|
||||
{
|
||||
testGovernanceChainId(newChainId, storageSlot);
|
||||
}
|
||||
|
||||
function testNextSequence(address emitter, uint64 sequence, bytes32 storageSlot)
|
||||
public
|
||||
unchangedStorage(address(getters), storageSlot)
|
||||
{
|
||||
bytes32 storageLocation = hashedLocation(emitter, SEQUENCES_STORAGE_INDEX);
|
||||
vm.assume(storageSlot != storageLocation);
|
||||
|
||||
bytes32 mask = bytes32(0xffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000);
|
||||
bytes32 updatedStorage = storeWithMask(address(getters), storageLocation, bytes32(uint256(sequence)), mask);
|
||||
|
||||
assertEq(getters.nextSequence(emitter), sequence);
|
||||
assertEq(updatedStorage, vm.load(address(getters), storageLocation));
|
||||
}
|
||||
|
||||
function testNextSequence_KEVM(address emitter, uint64 sequence, bytes32 storageSlot)
|
||||
public
|
||||
symbolic(address(getters))
|
||||
{
|
||||
testNextSequence(emitter, sequence, storageSlot);
|
||||
}
|
||||
|
||||
function testEvmChainId(uint256 newEvmChainId, bytes32 storageSlot)
|
||||
public
|
||||
unchangedStorage(address(getters), storageSlot)
|
||||
{
|
||||
vm.assume(storageSlot != EVMCHAINID_STORAGE_INDEX);
|
||||
|
||||
vm.store(address(getters), EVMCHAINID_STORAGE_INDEX, bytes32(newEvmChainId));
|
||||
|
||||
assertEq(getters.evmChainId(), newEvmChainId);
|
||||
assertEq(bytes32(newEvmChainId), vm.load(address(getters), EVMCHAINID_STORAGE_INDEX));
|
||||
}
|
||||
|
||||
function testEvmChainId_KEVM(uint256 newEvmChainId, bytes32 storageSlot)
|
||||
public
|
||||
symbolic(address(getters))
|
||||
{
|
||||
testEvmChainId(newEvmChainId, storageSlot);
|
||||
}
|
||||
}
|
File diff suppressed because it is too large
Load Diff
|
@ -0,0 +1,440 @@
|
|||
// test/Messages.sol
|
||||
// SPDX-License-Identifier: Apache 2
|
||||
|
||||
pragma solidity ^0.8.0;
|
||||
|
||||
import "../contracts/GovernanceStructs.sol";
|
||||
import "forge-test/rv-helpers/TestUtils.sol";
|
||||
|
||||
contract TestGovernanceStructs is TestUtils {
|
||||
GovernanceStructs gs;
|
||||
|
||||
function setUp() public {
|
||||
gs = new GovernanceStructs();
|
||||
}
|
||||
|
||||
function testParseContractUpgrade(
|
||||
bytes32 module,
|
||||
uint16 chain,
|
||||
bytes32 newContract
|
||||
) public {
|
||||
uint8 action = 1;
|
||||
|
||||
bytes memory encodedUpgrade = abi.encodePacked(
|
||||
module,
|
||||
action,
|
||||
chain,
|
||||
newContract
|
||||
);
|
||||
|
||||
assertEq(encodedUpgrade.length, 67);
|
||||
|
||||
GovernanceStructs.ContractUpgrade memory cu =
|
||||
gs.parseContractUpgrade(encodedUpgrade);
|
||||
|
||||
assertEq(cu.module, module);
|
||||
assertEq(cu.action, action);
|
||||
assertEq(cu.chain, chain);
|
||||
assertEq(cu.newContract, address(uint160(uint256(newContract))));
|
||||
}
|
||||
|
||||
function testParseContractUpgrade_KEVM(
|
||||
bytes32 module,
|
||||
uint16 chain,
|
||||
bytes32 newContract
|
||||
) public symbolic(address(gs)) {
|
||||
testParseContractUpgrade(module, chain, newContract);
|
||||
}
|
||||
|
||||
function testParseContractUpgradeWrongAction(
|
||||
bytes32 module,
|
||||
uint8 action,
|
||||
uint16 chain,
|
||||
bytes32 newContract
|
||||
) public {
|
||||
vm.assume(action != 1);
|
||||
|
||||
bytes memory encodedUpgrade = abi.encodePacked(
|
||||
module,
|
||||
action,
|
||||
chain,
|
||||
newContract
|
||||
);
|
||||
|
||||
assertEq(encodedUpgrade.length, 67);
|
||||
|
||||
vm.expectRevert("invalid ContractUpgrade");
|
||||
|
||||
gs.parseContractUpgrade(encodedUpgrade);
|
||||
}
|
||||
|
||||
function testParseContractUpgradeWrongAction_KEVM(
|
||||
bytes32 module,
|
||||
uint8 action,
|
||||
uint16 chain,
|
||||
bytes32 newContract
|
||||
) public symbolic(address(gs)) {
|
||||
testParseContractUpgradeWrongAction(module, action, chain, newContract);
|
||||
}
|
||||
|
||||
// Needs loop invariant for unbounded bytes type
|
||||
function testParseContractUpgradeSizeTooSmall(bytes memory encodedUpgrade)
|
||||
public
|
||||
{
|
||||
vm.assume(encodedUpgrade.length < 67);
|
||||
|
||||
if (32 < encodedUpgrade.length)
|
||||
encodedUpgrade[32] = bytes1(0x01); // ensure correct action
|
||||
|
||||
vm.expectRevert();
|
||||
|
||||
gs.parseContractUpgrade(encodedUpgrade);
|
||||
}
|
||||
|
||||
// Needs loop invariant for unbounded bytes type
|
||||
function testParseContractUpgradeSizeTooLarge(
|
||||
bytes32 module,
|
||||
uint16 chain,
|
||||
bytes32 newContract,
|
||||
bytes memory extraBytes
|
||||
) public {
|
||||
vm.assume(0 < extraBytes.length);
|
||||
|
||||
uint8 action = 1;
|
||||
|
||||
bytes memory encodedUpgrade = abi.encodePacked(
|
||||
module,
|
||||
action,
|
||||
chain,
|
||||
newContract,
|
||||
extraBytes
|
||||
);
|
||||
|
||||
assertGt(encodedUpgrade.length, 67);
|
||||
|
||||
vm.expectRevert("invalid ContractUpgrade");
|
||||
|
||||
gs.parseContractUpgrade(encodedUpgrade);
|
||||
}
|
||||
|
||||
function testParseSetMessageFee(
|
||||
bytes32 module,
|
||||
uint16 chain,
|
||||
uint256 messageFee
|
||||
) public {
|
||||
uint8 action = 3;
|
||||
|
||||
bytes memory encodedSetMessageFee = abi.encodePacked(
|
||||
module,
|
||||
action,
|
||||
chain,
|
||||
messageFee
|
||||
);
|
||||
|
||||
assertEq(encodedSetMessageFee.length, 67);
|
||||
|
||||
GovernanceStructs.SetMessageFee memory smf =
|
||||
gs.parseSetMessageFee(encodedSetMessageFee);
|
||||
|
||||
assertEq(smf.module, module);
|
||||
assertEq(smf.action, action);
|
||||
assertEq(smf.chain, chain);
|
||||
assertEq(smf.messageFee, messageFee);
|
||||
}
|
||||
|
||||
function testParseSetMessageFee_KEVM(
|
||||
bytes32 module,
|
||||
uint16 chain,
|
||||
uint256 messageFee
|
||||
) public symbolic(address(gs)) {
|
||||
testParseSetMessageFee(module, chain, messageFee);
|
||||
}
|
||||
|
||||
function testParseSetMessageFeeWrongAction(
|
||||
bytes32 module,
|
||||
uint8 action,
|
||||
uint16 chain,
|
||||
uint256 messageFee
|
||||
) public {
|
||||
vm.assume(action != 3);
|
||||
|
||||
bytes memory encodedSetMessageFee = abi.encodePacked(
|
||||
module,
|
||||
action,
|
||||
chain,
|
||||
messageFee
|
||||
);
|
||||
|
||||
assertEq(encodedSetMessageFee.length, 67);
|
||||
|
||||
vm.expectRevert("invalid SetMessageFee");
|
||||
|
||||
gs.parseSetMessageFee(encodedSetMessageFee);
|
||||
}
|
||||
|
||||
function testParseSetMessageFeeWrongAction_KEVM(
|
||||
bytes32 module,
|
||||
uint8 action,
|
||||
uint16 chain,
|
||||
uint256 messageFee
|
||||
) public symbolic(address(gs)) {
|
||||
testParseSetMessageFeeWrongAction(module, action, chain, messageFee);
|
||||
}
|
||||
|
||||
// Needs loop invariant for unbounded bytes type
|
||||
function testParseSetMessageFeeSizeTooSmall(bytes memory encodedSetMessageFee)
|
||||
public
|
||||
{
|
||||
vm.assume(encodedSetMessageFee.length < 67);
|
||||
|
||||
if (32 < encodedSetMessageFee.length)
|
||||
encodedSetMessageFee[32] = bytes1(0x03); // ensure correct action
|
||||
|
||||
vm.expectRevert();
|
||||
|
||||
gs.parseSetMessageFee(encodedSetMessageFee);
|
||||
}
|
||||
|
||||
// Needs loop invariant for unbounded bytes type
|
||||
function testParseSetMessageFeeSizeTooLarge(
|
||||
bytes32 module,
|
||||
uint16 chain,
|
||||
uint256 messageFee,
|
||||
bytes memory extraBytes
|
||||
) public {
|
||||
vm.assume(0 < extraBytes.length);
|
||||
|
||||
uint8 action = 3;
|
||||
|
||||
bytes memory encodedSetMessageFee = abi.encodePacked(
|
||||
module,
|
||||
action,
|
||||
chain,
|
||||
messageFee,
|
||||
extraBytes
|
||||
);
|
||||
|
||||
assertGt(encodedSetMessageFee.length, 67);
|
||||
|
||||
vm.expectRevert("invalid SetMessageFee");
|
||||
|
||||
gs.parseSetMessageFee(encodedSetMessageFee);
|
||||
}
|
||||
|
||||
function testParseTransferFees(
|
||||
bytes32 module,
|
||||
uint16 chain,
|
||||
uint256 amount,
|
||||
bytes32 recipient
|
||||
) public {
|
||||
uint8 action = 4;
|
||||
|
||||
bytes memory encodedTransferFees = abi.encodePacked(
|
||||
module,
|
||||
action,
|
||||
chain,
|
||||
amount,
|
||||
recipient
|
||||
);
|
||||
|
||||
assertEq(encodedTransferFees.length, 99);
|
||||
|
||||
GovernanceStructs.TransferFees memory tf =
|
||||
gs.parseTransferFees(encodedTransferFees);
|
||||
|
||||
assertEq(tf.module, module);
|
||||
assertEq(tf.action, action);
|
||||
assertEq(tf.chain, chain);
|
||||
assertEq(tf.amount, amount);
|
||||
assertEq(tf.recipient, recipient);
|
||||
}
|
||||
|
||||
function testParseTransferFees_KEVM(
|
||||
bytes32 module,
|
||||
uint16 chain,
|
||||
uint256 amount,
|
||||
bytes32 recipient
|
||||
) public symbolic(address(gs)) {
|
||||
testParseTransferFees(module, chain, amount, recipient);
|
||||
}
|
||||
|
||||
function testParseTransferFeesWrongAction(
|
||||
bytes32 module,
|
||||
uint8 action,
|
||||
uint16 chain,
|
||||
uint256 amount,
|
||||
bytes32 recipient
|
||||
) public {
|
||||
vm.assume(action != 4);
|
||||
|
||||
bytes memory encodedTransferFees = abi.encodePacked(
|
||||
module,
|
||||
action,
|
||||
chain,
|
||||
amount,
|
||||
recipient
|
||||
);
|
||||
|
||||
assertEq(encodedTransferFees.length, 99);
|
||||
|
||||
vm.expectRevert("invalid TransferFees");
|
||||
|
||||
gs.parseTransferFees(encodedTransferFees);
|
||||
}
|
||||
|
||||
function testParseTransferFeesWrongAction_KEVM(
|
||||
bytes32 module,
|
||||
uint8 action,
|
||||
uint16 chain,
|
||||
uint256 amount,
|
||||
bytes32 recipient
|
||||
) public symbolic(address(gs)) {
|
||||
testParseTransferFeesWrongAction(module, action, chain, amount, recipient);
|
||||
}
|
||||
|
||||
// Needs loop invariant for unbounded bytes type
|
||||
function testParseTransferFeesSizeTooSmall(bytes memory encodedTransferFees)
|
||||
public
|
||||
{
|
||||
vm.assume(encodedTransferFees.length < 99);
|
||||
|
||||
if (32 < encodedTransferFees.length)
|
||||
encodedTransferFees[32] = bytes1(0x04); // ensure correct action
|
||||
|
||||
vm.expectRevert();
|
||||
|
||||
gs.parseTransferFees(encodedTransferFees);
|
||||
}
|
||||
|
||||
// Needs loop invariant for unbounded bytes type
|
||||
function testParseTransferFeesSizeTooLarge(
|
||||
bytes32 module,
|
||||
uint16 chain,
|
||||
uint256 amount,
|
||||
bytes32 recipient,
|
||||
bytes memory extraBytes
|
||||
) public {
|
||||
vm.assume(0 < extraBytes.length);
|
||||
|
||||
uint8 action = 4;
|
||||
|
||||
bytes memory encodedTransferFees = abi.encodePacked(
|
||||
module,
|
||||
action,
|
||||
chain,
|
||||
amount,
|
||||
recipient,
|
||||
extraBytes
|
||||
);
|
||||
|
||||
assertGt(encodedTransferFees.length, 99);
|
||||
|
||||
vm.expectRevert("invalid TransferFees");
|
||||
|
||||
gs.parseTransferFees(encodedTransferFees);
|
||||
}
|
||||
|
||||
function testParseRecoverChainId(
|
||||
bytes32 module,
|
||||
uint256 evmChainId,
|
||||
uint16 newChainId
|
||||
) public {
|
||||
uint8 action = 5;
|
||||
|
||||
bytes memory encodedRecoverChainId = abi.encodePacked(
|
||||
module,
|
||||
action,
|
||||
evmChainId,
|
||||
newChainId
|
||||
);
|
||||
|
||||
assertEq(encodedRecoverChainId.length, 67);
|
||||
|
||||
GovernanceStructs.RecoverChainId memory rci =
|
||||
gs.parseRecoverChainId(encodedRecoverChainId);
|
||||
|
||||
assertEq(rci.module, module);
|
||||
assertEq(rci.action, action);
|
||||
assertEq(rci.evmChainId, evmChainId);
|
||||
assertEq(rci.newChainId, newChainId);
|
||||
}
|
||||
|
||||
function testParseRecoverChainId_KEVM(
|
||||
bytes32 module,
|
||||
uint256 evmChainId,
|
||||
uint16 newChainId
|
||||
) public symbolic(address(gs)) {
|
||||
testParseRecoverChainId(module, evmChainId, newChainId);
|
||||
}
|
||||
|
||||
function testParseRecoverChainIdWrongAction(
|
||||
bytes32 module,
|
||||
uint8 action,
|
||||
uint256 evmChainId,
|
||||
uint16 newChainId
|
||||
) public {
|
||||
vm.assume(action != 5);
|
||||
|
||||
bytes memory encodedRecoverChainId = abi.encodePacked(
|
||||
module,
|
||||
action,
|
||||
evmChainId,
|
||||
newChainId
|
||||
);
|
||||
|
||||
assertEq(encodedRecoverChainId.length, 67);
|
||||
|
||||
vm.expectRevert("invalid RecoverChainId");
|
||||
|
||||
gs.parseRecoverChainId(encodedRecoverChainId);
|
||||
}
|
||||
|
||||
function testParseRecoverChainIdWrongAction_KEVM(
|
||||
bytes32 module,
|
||||
uint8 action,
|
||||
uint256 evmChainId,
|
||||
uint16 newChainId
|
||||
) public symbolic(address(gs)) {
|
||||
testParseRecoverChainIdWrongAction(module, action, evmChainId, newChainId);
|
||||
}
|
||||
|
||||
// Needs loop invariant for unbounded bytes type
|
||||
function testParseRecoverChainIdSizeTooSmall(bytes memory encodedRecoverChainId)
|
||||
public
|
||||
{
|
||||
vm.assume(encodedRecoverChainId.length < 67);
|
||||
|
||||
if (32 < encodedRecoverChainId.length)
|
||||
encodedRecoverChainId[32] = bytes1(0x05); // ensure correct action
|
||||
|
||||
vm.expectRevert();
|
||||
|
||||
gs.parseRecoverChainId(encodedRecoverChainId);
|
||||
}
|
||||
|
||||
// Needs loop invariant for unbounded bytes type
|
||||
function testParseRecoverChainIdSizeTooLarge(
|
||||
bytes32 module,
|
||||
uint256 evmChainId,
|
||||
uint16 newChainId,
|
||||
bytes memory extraBytes
|
||||
) public {
|
||||
vm.assume(0 < extraBytes.length);
|
||||
|
||||
uint8 action = 5;
|
||||
|
||||
bytes memory encodedRecoverChainId = abi.encodePacked(
|
||||
module,
|
||||
action,
|
||||
evmChainId,
|
||||
newChainId,
|
||||
extraBytes
|
||||
);
|
||||
|
||||
assertGt(encodedRecoverChainId.length, 67);
|
||||
|
||||
vm.expectRevert("invalid RecoverChainId");
|
||||
|
||||
gs.parseRecoverChainId(encodedRecoverChainId);
|
||||
}
|
||||
}
|
|
@ -0,0 +1,155 @@
|
|||
// test/Messages.sol
|
||||
// SPDX-License-Identifier: Apache 2
|
||||
|
||||
pragma solidity ^0.8.0;
|
||||
|
||||
import "../contracts/Implementation.sol";
|
||||
import "../contracts/Setup.sol";
|
||||
import "../contracts/Wormhole.sol";
|
||||
import "../contracts/interfaces/IWormhole.sol";
|
||||
import "forge-std/Test.sol";
|
||||
import "forge-test/rv-helpers/TestUtils.sol";
|
||||
|
||||
contract TestImplementation is TestUtils {
|
||||
event LogMessagePublished(address indexed sender, uint64 sequence, uint32 nonce, bytes payload, uint8 consistencyLevel);
|
||||
|
||||
Wormhole proxy;
|
||||
Implementation impl;
|
||||
Setup setup;
|
||||
Setup proxiedSetup;
|
||||
IWormhole proxied;
|
||||
|
||||
uint256 constant testGuardian = 93941733246223705020089879371323733820373732307041878556247502674739205313440;
|
||||
bytes32 constant governanceContract = 0x0000000000000000000000000000000000000000000000000000000000000004;
|
||||
bytes32 constant MESSAGEFEE_STORAGESLOT = bytes32(uint256(7));
|
||||
bytes32 constant SEQUENCES_SLOT = bytes32(uint256(4));
|
||||
|
||||
function setUp() public {
|
||||
// Deploy setup
|
||||
setup = new Setup();
|
||||
// Deploy implementation contract
|
||||
impl = new Implementation();
|
||||
// Deploy proxy
|
||||
proxy = new Wormhole(address(setup), bytes(""));
|
||||
|
||||
address[] memory keys = new address[](1);
|
||||
keys[0] = 0xbeFA429d57cD18b7F8A4d91A2da9AB4AF05d0FBe;
|
||||
//keys[0] = vm.addr(testGuardian);
|
||||
|
||||
//proxied setup
|
||||
proxiedSetup = Setup(address(proxy));
|
||||
|
||||
vm.chainId(1);
|
||||
proxiedSetup.setup({
|
||||
implementation: address(impl),
|
||||
initialGuardians: keys,
|
||||
chainId: 2,
|
||||
governanceChainId: 1,
|
||||
governanceContract: governanceContract,
|
||||
evmChainId: 1
|
||||
});
|
||||
|
||||
proxied = IWormhole(address(proxy));
|
||||
}
|
||||
|
||||
function testPublishMessage(
|
||||
bytes32 storageSlot,
|
||||
uint256 messageFee,
|
||||
address alice,
|
||||
uint256 aliceBalance,
|
||||
uint32 nonce,
|
||||
bytes memory payload,
|
||||
uint8 consistencyLevel)
|
||||
public
|
||||
unchangedStorage(address(proxied), storageSlot)
|
||||
{
|
||||
uint64 sequence = proxied.nextSequence(alice);
|
||||
bytes32 storageLocation = hashedLocation(alice, SEQUENCES_SLOT);
|
||||
|
||||
vm.assume(aliceBalance >= messageFee);
|
||||
vm.assume(storageSlot != storageLocation);
|
||||
vm.assume(storageSlot != MESSAGEFEE_STORAGESLOT);
|
||||
|
||||
vm.store(address(proxied), MESSAGEFEE_STORAGESLOT, bytes32(messageFee));
|
||||
vm.deal(address(alice),aliceBalance);
|
||||
|
||||
vm.prank(alice);
|
||||
proxied.publishMessage{value: messageFee}(nonce, payload, consistencyLevel);
|
||||
|
||||
assertEq(sequence + 1, proxied.nextSequence(alice));
|
||||
}
|
||||
|
||||
function testPublishMessage_Emit(
|
||||
bytes32 storageSlot,
|
||||
uint256 messageFee,
|
||||
address alice,
|
||||
uint256 aliceBalance,
|
||||
uint32 nonce,
|
||||
bytes memory payload,
|
||||
uint8 consistencyLevel)
|
||||
public
|
||||
unchangedStorage(address(proxied), storageSlot)
|
||||
{
|
||||
uint64 sequence = proxied.nextSequence(alice);
|
||||
bytes32 storageLocation = hashedLocation(alice, SEQUENCES_SLOT);
|
||||
|
||||
vm.assume(aliceBalance >= messageFee);
|
||||
vm.assume(storageSlot != storageLocation);
|
||||
vm.assume(storageSlot != MESSAGEFEE_STORAGESLOT);
|
||||
|
||||
vm.store(address(proxied), MESSAGEFEE_STORAGESLOT, bytes32(messageFee));
|
||||
vm.deal(address(alice),aliceBalance);
|
||||
|
||||
vm.prank(alice);
|
||||
vm.expectEmit(true, true, true, true);
|
||||
emit LogMessagePublished(alice, sequence, nonce, payload, consistencyLevel);
|
||||
|
||||
proxied.publishMessage{value: messageFee}(nonce, payload, consistencyLevel);
|
||||
}
|
||||
|
||||
function testPublishMessage_Revert_InvalidFee(
|
||||
bytes32 storageSlot,
|
||||
uint256 messageFee,
|
||||
address alice,
|
||||
uint256 aliceBalance,
|
||||
uint256 aliceFee,
|
||||
uint32 nonce,
|
||||
bytes memory payload,
|
||||
uint8 consistencyLevel)
|
||||
public
|
||||
unchangedStorage(address(proxied), storageSlot)
|
||||
{
|
||||
vm.assume(aliceBalance >= aliceFee);
|
||||
vm.assume(aliceFee != messageFee);
|
||||
vm.assume(storageSlot != MESSAGEFEE_STORAGESLOT);
|
||||
|
||||
vm.store(address(proxied), MESSAGEFEE_STORAGESLOT, bytes32(messageFee));
|
||||
vm.deal(address(alice),aliceBalance);
|
||||
|
||||
vm.prank(alice);
|
||||
vm.expectRevert("invalid fee");
|
||||
proxied.publishMessage{value: aliceFee}(nonce, payload, consistencyLevel);
|
||||
}
|
||||
|
||||
function testPublishMessage_Revert_OutOfFunds(
|
||||
bytes32 storageSlot,
|
||||
uint256 messageFee,
|
||||
address alice,
|
||||
uint256 aliceBalance,
|
||||
uint32 nonce,
|
||||
bytes memory payload,
|
||||
uint8 consistencyLevel)
|
||||
public
|
||||
unchangedStorage(address(proxied), storageSlot)
|
||||
{
|
||||
vm.assume(aliceBalance < messageFee);
|
||||
vm.assume(storageSlot != MESSAGEFEE_STORAGESLOT);
|
||||
|
||||
vm.store(address(proxied), MESSAGEFEE_STORAGESLOT, bytes32(messageFee));
|
||||
vm.deal(address(alice),aliceBalance);
|
||||
|
||||
vm.prank(alice);
|
||||
vm.expectRevert();
|
||||
proxied.publishMessage{value: messageFee}(nonce, payload, consistencyLevel);
|
||||
}
|
||||
}
|
|
@ -0,0 +1,214 @@
|
|||
// test/Messages.sol
|
||||
// SPDX-License-Identifier: Apache 2
|
||||
|
||||
pragma solidity ^0.8.0;
|
||||
|
||||
import "../contracts/Messages.sol";
|
||||
import "../contracts/Setters.sol";
|
||||
import "../contracts/Structs.sol";
|
||||
import "forge-test/rv-helpers/TestUtils.sol";
|
||||
|
||||
contract TestMessagesRV is TestUtils {
|
||||
using BytesLib for bytes;
|
||||
|
||||
Messages messages;
|
||||
|
||||
struct GuardianSetParams {
|
||||
uint256[] privateKeys;
|
||||
uint8 guardianCount;
|
||||
uint32 expirationTime;
|
||||
}
|
||||
|
||||
function setUp() public {
|
||||
messages = new Messages();
|
||||
}
|
||||
|
||||
function paramsAreWellFormed(GuardianSetParams memory params)
|
||||
internal
|
||||
pure
|
||||
returns (bool)
|
||||
{
|
||||
return params.guardianCount <= 19 &&
|
||||
params.guardianCount <= params.privateKeys.length;
|
||||
}
|
||||
|
||||
function generateGuardianSet(GuardianSetParams memory params)
|
||||
internal
|
||||
returns (Structs.GuardianSet memory)
|
||||
{
|
||||
for (uint8 i = 0; i < params.guardianCount; ++i)
|
||||
vm.assume(0 < params.privateKeys[i] &&
|
||||
params.privateKeys[i] < SECP256K1_CURVE_ORDER);
|
||||
|
||||
address[] memory guardians = new address[](params.guardianCount);
|
||||
|
||||
for (uint8 i = 0; i < params.guardianCount; ++i) {
|
||||
guardians[i] = vm.addr(params.privateKeys[i]);
|
||||
}
|
||||
|
||||
return Structs.GuardianSet(guardians, params.expirationTime);
|
||||
}
|
||||
|
||||
function generateSignature(
|
||||
uint8 index,
|
||||
uint256 privateKey,
|
||||
address guardian,
|
||||
bytes32 message
|
||||
)
|
||||
internal
|
||||
returns (Structs.Signature memory)
|
||||
{
|
||||
(uint8 v, bytes32 r, bytes32 s) = vm.sign(privateKey, message);
|
||||
assertEq(ecrecover(message, v, r, s), guardian);
|
||||
|
||||
return Structs.Signature(r, s, v, index);
|
||||
}
|
||||
|
||||
function generateSignatures(
|
||||
uint256[] memory privateKeys,
|
||||
address[] memory guardians,
|
||||
bytes32 message
|
||||
)
|
||||
internal
|
||||
returns (Structs.Signature[] memory)
|
||||
{
|
||||
Structs.Signature[] memory sigs =
|
||||
new Structs.Signature[](guardians.length);
|
||||
|
||||
for (uint8 i = 0; i < guardians.length; ++i) {
|
||||
sigs[i] = generateSignature(
|
||||
i,
|
||||
privateKeys[i],
|
||||
guardians[i],
|
||||
message
|
||||
);
|
||||
}
|
||||
|
||||
return sigs;
|
||||
}
|
||||
|
||||
function isProperSignature(Structs.Signature memory sig, bytes32 message)
|
||||
internal
|
||||
pure
|
||||
returns (bool)
|
||||
{
|
||||
address signer = ecrecover(message, sig.v, sig.r, sig.s);
|
||||
|
||||
return signer != address(0);
|
||||
}
|
||||
|
||||
function testCannotVerifySignaturesWithOutOfBoundsSignature(
|
||||
bytes memory encoded,
|
||||
GuardianSetParams memory params,
|
||||
uint8 outOfBoundsGuardian,
|
||||
uint8 outOfBoundsAmount
|
||||
) public {
|
||||
vm.assume(encoded.length > 0);
|
||||
vm.assume(paramsAreWellFormed(params));
|
||||
vm.assume(params.guardianCount > 0);
|
||||
outOfBoundsGuardian = uint8(bound(outOfBoundsGuardian, 0, params.guardianCount - 1));
|
||||
outOfBoundsAmount = uint8(bound(outOfBoundsAmount, 0, MAX_UINT8 - params.guardianCount));
|
||||
|
||||
bytes32 message = keccak256(encoded);
|
||||
Structs.GuardianSet memory guardianSet = generateGuardianSet(params);
|
||||
Structs.Signature[] memory sigs = generateSignatures(
|
||||
params.privateKeys,
|
||||
guardianSet.keys,
|
||||
keccak256(encoded)
|
||||
);
|
||||
|
||||
sigs[outOfBoundsGuardian].guardianIndex =
|
||||
params.guardianCount + outOfBoundsAmount;
|
||||
|
||||
vm.expectRevert("guardian index out of bounds");
|
||||
messages.verifySignatures(message, sigs, guardianSet);
|
||||
}
|
||||
|
||||
function testCannotVerifySignaturesWithInvalidSignature1(
|
||||
bytes memory encoded,
|
||||
GuardianSetParams memory params,
|
||||
Structs.Signature memory fakeSignature
|
||||
) public {
|
||||
vm.assume(encoded.length > 0);
|
||||
vm.assume(paramsAreWellFormed(params));
|
||||
vm.assume(fakeSignature.guardianIndex < params.guardianCount);
|
||||
|
||||
bytes32 message = keccak256(encoded);
|
||||
Structs.GuardianSet memory guardianSet = generateGuardianSet(params);
|
||||
Structs.Signature[] memory sigs = generateSignatures(
|
||||
params.privateKeys,
|
||||
guardianSet.keys,
|
||||
message
|
||||
);
|
||||
|
||||
sigs[fakeSignature.guardianIndex] = fakeSignature;
|
||||
|
||||
// It is very unlikely that the arbitrary fakeSignature will be the
|
||||
// correct signature for the guardian at that index, so the below
|
||||
// should be the only reasonable outcomes
|
||||
if (isProperSignature(fakeSignature, message)) {
|
||||
(bool valid, string memory reason) =
|
||||
messages.verifySignatures(message, sigs, guardianSet);
|
||||
|
||||
assertEq(valid, false);
|
||||
assertEq(reason, "VM signature invalid");
|
||||
} else {
|
||||
vm.expectRevert("ecrecover failed with signature");
|
||||
messages.verifySignatures(message, sigs, guardianSet);
|
||||
}
|
||||
}
|
||||
|
||||
function testCannotVerifySignaturesWithInvalidSignature2(
|
||||
bytes memory encoded,
|
||||
GuardianSetParams memory params,
|
||||
uint8 fakeGuardianIndex,
|
||||
uint256 fakeGuardianPrivateKey
|
||||
) public {
|
||||
vm.assume(encoded.length > 0);
|
||||
vm.assume(paramsAreWellFormed(params));
|
||||
vm.assume(fakeGuardianIndex < params.guardianCount);
|
||||
vm.assume(0 < fakeGuardianPrivateKey &&
|
||||
fakeGuardianPrivateKey < SECP256K1_CURVE_ORDER);
|
||||
vm.assume(fakeGuardianPrivateKey != params.privateKeys[fakeGuardianIndex]);
|
||||
|
||||
bytes32 message = keccak256(encoded);
|
||||
Structs.GuardianSet memory guardianSet = generateGuardianSet(params);
|
||||
Structs.Signature[] memory sigs = generateSignatures(
|
||||
params.privateKeys,
|
||||
guardianSet.keys,
|
||||
message
|
||||
);
|
||||
|
||||
address fakeGuardian = vm.addr(fakeGuardianPrivateKey);
|
||||
sigs[fakeGuardianIndex] = generateSignature(
|
||||
fakeGuardianIndex,
|
||||
fakeGuardianPrivateKey,
|
||||
fakeGuardian,
|
||||
message
|
||||
);
|
||||
|
||||
(bool valid, string memory reason) = messages.verifySignatures(message, sigs, guardianSet);
|
||||
assertEq(valid, false);
|
||||
assertEq(reason, "VM signature invalid");
|
||||
}
|
||||
|
||||
function testVerifySignatures(
|
||||
bytes memory encoded,
|
||||
GuardianSetParams memory params
|
||||
) public {
|
||||
vm.assume(encoded.length > 0);
|
||||
vm.assume(paramsAreWellFormed(params));
|
||||
|
||||
bytes32 message = keccak256(encoded);
|
||||
Structs.GuardianSet memory guardianSet = generateGuardianSet(params);
|
||||
Structs.Signature[] memory sigs = generateSignatures(
|
||||
params.privateKeys,
|
||||
guardianSet.keys,
|
||||
message
|
||||
);
|
||||
|
||||
(bool valid, string memory reason) = messages.verifySignatures(message, sigs, guardianSet);
|
||||
assertEq(valid, true);
|
||||
assertEq(bytes(reason).length, 0);
|
||||
}
|
||||
}
|
|
@ -0,0 +1,268 @@
|
|||
// test/Messages.sol
|
||||
// SPDX-License-Identifier: Apache 2
|
||||
|
||||
pragma solidity ^0.8.0;
|
||||
|
||||
import "forge-test/rv-helpers/MySetters.sol";
|
||||
import "forge-test/rv-helpers/TestUtils.sol";
|
||||
|
||||
contract TestSetters is TestUtils {
|
||||
MySetters setters;
|
||||
|
||||
function setUp() public {
|
||||
setters = new MySetters();
|
||||
}
|
||||
|
||||
function testUpdateGuardianSetIndex(uint32 index, bytes32 storageSlot)
|
||||
public
|
||||
unchangedStorage(address(setters), storageSlot)
|
||||
{
|
||||
vm.assume(storageSlot != GUARDIANSETINDEX_STORAGE_INDEX);
|
||||
|
||||
bytes32 originalSlot = vm.load(address(setters), GUARDIANSETINDEX_STORAGE_INDEX);
|
||||
|
||||
setters.updateGuardianSetIndex_external(index);
|
||||
|
||||
bytes32 updatedSlot = vm.load(address(setters), GUARDIANSETINDEX_STORAGE_INDEX);
|
||||
bytes32 mask = bytes32(0xffffffffffffffffffffffffffffffffffffffffffffffffffffffff00000000);
|
||||
bytes32 expectedSlot = bytes32(uint256(index)) | (mask & originalSlot);
|
||||
|
||||
assertEq(updatedSlot, expectedSlot);
|
||||
}
|
||||
|
||||
function testUpdateGuardianSetIndex_KEVM(uint32 index, bytes32 storageSlot)
|
||||
public
|
||||
symbolic(address(setters))
|
||||
{
|
||||
testUpdateGuardianSetIndex(index, storageSlot);
|
||||
}
|
||||
|
||||
function testExpireGuardianSet(uint32 timestamp, uint32 index, bytes32 storageSlot)
|
||||
public
|
||||
unchangedStorage(address(setters), storageSlot)
|
||||
{
|
||||
bytes32 storageLocation = hashedLocationOffset(index,GUARDIANSETS_STORAGE_INDEX,1);
|
||||
vm.assume(storageSlot != storageLocation);
|
||||
vm.assume(timestamp <= MAX_UINT32 - 86400);
|
||||
|
||||
bytes32 originalSlot = vm.load(address(setters), storageLocation);
|
||||
|
||||
vm.warp(timestamp);
|
||||
|
||||
setters.expireGuardianSet_external(index);
|
||||
|
||||
bytes32 updatedSlot = vm.load(address(setters), storageLocation);
|
||||
bytes32 mask = bytes32(0xffffffffffffffffffffffffffffffffffffffffffffffffffffffff00000000);
|
||||
bytes32 expectedSlot = bytes32(uint256(timestamp + 86400)) | (mask & originalSlot);
|
||||
|
||||
assertEq(updatedSlot, expectedSlot);
|
||||
}
|
||||
|
||||
function testExpireGuardianSet_KEVM(uint32 timestamp, uint32 index, bytes32 storageSlot)
|
||||
public
|
||||
symbolic(address(setters))
|
||||
{
|
||||
testExpireGuardianSet(timestamp, index, storageSlot);
|
||||
}
|
||||
|
||||
function testSetInitialized(address newImplementation, bytes32 storageSlot)
|
||||
public
|
||||
unchangedStorage(address(setters), storageSlot)
|
||||
{
|
||||
bytes32 storageLocation = hashedLocation(newImplementation, INITIALIZEDIMPLEMENTATIONS_STORAGE_INDEX);
|
||||
vm.assume(storageSlot != storageLocation);
|
||||
|
||||
bytes32 originalSlot = vm.load(address(setters), storageLocation);
|
||||
|
||||
setters.setInitialized_external(newImplementation);
|
||||
|
||||
bytes32 updatedSlot = vm.load(address(setters), storageLocation);
|
||||
bytes32 mask = bytes32(0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00);
|
||||
bytes32 expectedSlot = bytes32(uint256(uint8(0x01))) | (mask & originalSlot);
|
||||
|
||||
assertEq(updatedSlot, expectedSlot);
|
||||
}
|
||||
|
||||
function testSetInitialized_KEVM(address newImplementation, bytes32 storageSlot)
|
||||
public
|
||||
symbolic(address(setters))
|
||||
{
|
||||
testSetInitialized(newImplementation, storageSlot);
|
||||
}
|
||||
|
||||
function testSetGovernanceActionConsumed(bytes32 hash, bytes32 storageSlot)
|
||||
public
|
||||
unchangedStorage(address(setters), storageSlot)
|
||||
{
|
||||
bytes32 storageLocation = hashedLocation(hash, CONSUMEDGOVACTIONS_STORAGE_INDEX);
|
||||
vm.assume(storageSlot != storageLocation);
|
||||
|
||||
bytes32 originalSlot = vm.load(address(setters), storageLocation);
|
||||
|
||||
setters.setGovernanceActionConsumed_external(hash);
|
||||
|
||||
bytes32 updatedSlot = vm.load(address(setters), storageLocation);
|
||||
bytes32 mask = bytes32(0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff00);
|
||||
bytes32 expectedSlot = bytes32(uint256(uint8(0x01))) | (mask & originalSlot);
|
||||
|
||||
assertEq(updatedSlot, expectedSlot);
|
||||
}
|
||||
|
||||
function testSetGovernanceActionConsumed_KEVM(bytes32 hash, bytes32 storageSlot)
|
||||
public
|
||||
symbolic(address(setters))
|
||||
{
|
||||
testSetGovernanceActionConsumed(hash, storageSlot);
|
||||
}
|
||||
|
||||
function testSetChainId(uint16 newChainId, bytes32 storageSlot)
|
||||
public
|
||||
unchangedStorage(address(setters), storageSlot)
|
||||
{
|
||||
vm.assume(storageSlot != CHAINID_STORAGE_INDEX);
|
||||
|
||||
bytes32 originalSlot = vm.load(address(setters), CHAINID_STORAGE_INDEX);
|
||||
|
||||
setters.setChainId_external(newChainId);
|
||||
|
||||
bytes32 updatedSlot = vm.load(address(setters), CHAINID_STORAGE_INDEX);
|
||||
bytes32 mask = bytes32(0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000);
|
||||
bytes32 expectedSlot = bytes32(uint256(newChainId)) | (mask & originalSlot);
|
||||
|
||||
assertEq(updatedSlot, expectedSlot);
|
||||
}
|
||||
|
||||
function testSetChainId_KEVM(uint16 newChainId, bytes32 storageSlot)
|
||||
public
|
||||
symbolic(address(setters))
|
||||
{
|
||||
testSetChainId(newChainId, storageSlot);
|
||||
}
|
||||
|
||||
function testSetGovernanceChainId(uint16 newChainId, bytes32 storageSlot)
|
||||
public
|
||||
unchangedStorage(address(setters), storageSlot)
|
||||
{
|
||||
vm.assume(storageSlot != CHAINID_STORAGE_INDEX);
|
||||
|
||||
bytes32 originalSlot = vm.load(address(setters), CHAINID_STORAGE_INDEX);
|
||||
|
||||
setters.setGovernanceChainId_external(newChainId);
|
||||
|
||||
bytes32 updatedSlot = vm.load(address(setters), CHAINID_STORAGE_INDEX);
|
||||
bytes32 mask = bytes32(0xffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000ffff);
|
||||
bytes32 expectedSlot = bytes32(uint256(newChainId) << 16) | (mask & originalSlot);
|
||||
|
||||
assertEq(updatedSlot, expectedSlot);
|
||||
}
|
||||
|
||||
function testSetGovernanceChainId_KEVM(uint16 newChainId, bytes32 storageSlot)
|
||||
public
|
||||
symbolic(address(setters))
|
||||
{
|
||||
testSetGovernanceChainId(newChainId, storageSlot);
|
||||
}
|
||||
|
||||
function testSetGovernanceContract(bytes32 newGovernanceContract, bytes32 storageSlot)
|
||||
public
|
||||
unchangedStorage(address(setters), storageSlot)
|
||||
{
|
||||
vm.assume(storageSlot != GOVERNANCECONTRACT_STORAGE_INDEX);
|
||||
|
||||
setters.setGovernanceContract_external(newGovernanceContract);
|
||||
|
||||
assertEq(newGovernanceContract, vm.load(address(setters), GOVERNANCECONTRACT_STORAGE_INDEX));
|
||||
}
|
||||
|
||||
function testSetGovernanceContract_KEVM(bytes32 newGovernanceContract, bytes32 storageSlot)
|
||||
public
|
||||
symbolic(address(setters))
|
||||
{
|
||||
testSetGovernanceContract(newGovernanceContract, storageSlot);
|
||||
}
|
||||
|
||||
function testSetMessageFee(uint256 newFee, bytes32 storageSlot)
|
||||
public
|
||||
unchangedStorage(address(setters), storageSlot)
|
||||
{
|
||||
vm.assume(storageSlot != MESSAGEFEE_STORAGE_INDEX);
|
||||
|
||||
setters.setMessageFee_external(newFee);
|
||||
|
||||
bytes32 updatedSlot = vm.load(address(setters), MESSAGEFEE_STORAGE_INDEX);
|
||||
bytes32 expectedSlot = bytes32(newFee);
|
||||
|
||||
assertEq(updatedSlot, expectedSlot);
|
||||
}
|
||||
|
||||
function testSetMessageFee_KEVM(uint256 newFee, bytes32 storageSlot)
|
||||
public
|
||||
symbolic(address(setters))
|
||||
{
|
||||
testSetMessageFee(newFee, storageSlot);
|
||||
}
|
||||
|
||||
function testSetNextSequence(address emitter, uint64 sequence, bytes32 storageSlot)
|
||||
public
|
||||
unchangedStorage(address(setters), storageSlot)
|
||||
{
|
||||
bytes32 storageLocation = hashedLocation(emitter, SEQUENCES_STORAGE_INDEX);
|
||||
vm.assume(storageSlot != storageLocation);
|
||||
|
||||
bytes32 originalSlot = vm.load(address(setters), storageLocation);
|
||||
|
||||
setters.setNextSequence_external(emitter, sequence);
|
||||
|
||||
bytes32 updatedSlot = vm.load(address(setters), storageLocation);
|
||||
bytes32 mask = bytes32(0xffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000);
|
||||
bytes32 expectedSlot = bytes32(uint256(sequence)) | (mask & originalSlot);
|
||||
|
||||
assertEq(updatedSlot, expectedSlot);
|
||||
}
|
||||
|
||||
function testSetNextSequence_KEVM(address emitter, uint64 sequence, bytes32 storageSlot)
|
||||
public
|
||||
symbolic(address(setters))
|
||||
{
|
||||
testSetNextSequence(emitter, sequence, storageSlot);
|
||||
}
|
||||
|
||||
function testSetEvmChainId_Success(uint256 newEvmChainId, bytes32 storageSlot)
|
||||
public
|
||||
unchangedStorage(address(setters), storageSlot)
|
||||
{
|
||||
vm.assume(storageSlot != EVMCHAINID_STORAGE_INDEX);
|
||||
vm.assume(newEvmChainId < 2 ** 64);
|
||||
|
||||
vm.chainId(newEvmChainId);
|
||||
|
||||
setters.setEvmChainId_external(newEvmChainId);
|
||||
|
||||
assertEq(bytes32(newEvmChainId), vm.load(address(setters), EVMCHAINID_STORAGE_INDEX));
|
||||
}
|
||||
|
||||
function testSetEvmChainId_Success_KEVM(uint256 newEvmChainId, bytes32 storageSlot)
|
||||
public
|
||||
symbolic(address(setters))
|
||||
{
|
||||
testSetEvmChainId_Success(newEvmChainId, storageSlot);
|
||||
}
|
||||
|
||||
function testSetEvmChainId_Revert(uint256 newEvmChainId, bytes32 storageSlot)
|
||||
public
|
||||
unchangedStorage(address(setters), storageSlot)
|
||||
{
|
||||
vm.assume(newEvmChainId < 2 ** 64);
|
||||
vm.assume(newEvmChainId != block.chainid);
|
||||
|
||||
vm.expectRevert("invalid evmChainId");
|
||||
setters.setEvmChainId_external(newEvmChainId);
|
||||
}
|
||||
|
||||
function testSetEvmChainId_Revert_KEVM(uint256 newEvmChainId, bytes32 storageSlot)
|
||||
public
|
||||
symbolic(address(setters))
|
||||
{
|
||||
testSetEvmChainId_Revert(newEvmChainId, storageSlot);
|
||||
}
|
||||
}
|
|
@ -0,0 +1,116 @@
|
|||
// test/Messages.sol
|
||||
// SPDX-License-Identifier: Apache 2
|
||||
|
||||
pragma solidity ^0.8.0;
|
||||
|
||||
import "../contracts/Implementation.sol";
|
||||
import "../contracts/Setup.sol";
|
||||
import "../contracts/Wormhole.sol";
|
||||
import "../contracts/interfaces/IWormhole.sol";
|
||||
import "forge-test/rv-helpers/TestUtils.sol";
|
||||
|
||||
contract TestSetup is TestUtils {
|
||||
|
||||
Wormhole proxy;
|
||||
Implementation impl;
|
||||
Setup setup;
|
||||
Setup proxiedSetup;
|
||||
IWormhole proxied;
|
||||
|
||||
uint256 constant testGuardian = 93941733246223705020089879371323733820373732307041878556247502674739205313440;
|
||||
bytes32 constant governanceContract = 0x0000000000000000000000000000000000000000000000000000000000000004;
|
||||
|
||||
function setUp() public {
|
||||
// Deploy setup
|
||||
setup = new Setup();
|
||||
// Deploy implementation contract
|
||||
impl = new Implementation();
|
||||
// Deploy proxy
|
||||
proxy = new Wormhole(address(setup), bytes(""));
|
||||
|
||||
address[] memory keys = new address[](1);
|
||||
keys[0] = 0xbeFA429d57cD18b7F8A4d91A2da9AB4AF05d0FBe; // vm.addr(testGuardian)
|
||||
|
||||
//proxied setup
|
||||
proxiedSetup = Setup(address(proxy));
|
||||
|
||||
vm.chainId(1);
|
||||
proxiedSetup.setup({
|
||||
implementation: address(impl),
|
||||
initialGuardians: keys,
|
||||
chainId: 2,
|
||||
governanceChainId: 1,
|
||||
governanceContract: governanceContract,
|
||||
evmChainId: 1
|
||||
});
|
||||
|
||||
proxied = IWormhole(address(proxy));
|
||||
}
|
||||
|
||||
function testInitialize_after_setup_revert(bytes32 storageSlot, address alice)
|
||||
public
|
||||
unchangedStorage(address(proxied), storageSlot)
|
||||
{
|
||||
vm.prank(alice);
|
||||
vm.expectRevert("already initialized");
|
||||
proxied.initialize();
|
||||
}
|
||||
|
||||
function testInitialize_after_setup_revert_KEVM(bytes32 storageSlot, address alice)
|
||||
public
|
||||
{
|
||||
kevm.infiniteGas();
|
||||
testInitialize_after_setup_revert(storageSlot, alice);
|
||||
}
|
||||
|
||||
function testSetup_after_setup_revert(
|
||||
bytes32 storageSlot,
|
||||
address alice,
|
||||
address implementation,
|
||||
address initialGuardian,
|
||||
uint16 chainId,
|
||||
uint16 governanceChainId,
|
||||
bytes32 govContract,
|
||||
uint256 evmChainId)
|
||||
public
|
||||
unchangedStorage(address(proxied), storageSlot)
|
||||
{
|
||||
address[] memory keys = new address[](1);
|
||||
keys[0] = initialGuardian;
|
||||
|
||||
vm.prank(alice);
|
||||
vm.expectRevert("unsupported");
|
||||
proxiedSetup.setup({
|
||||
implementation: implementation,
|
||||
initialGuardians: keys,
|
||||
chainId: chainId,
|
||||
governanceChainId: governanceChainId,
|
||||
governanceContract: govContract,
|
||||
evmChainId: evmChainId
|
||||
});
|
||||
}
|
||||
|
||||
function testSetup_after_setup_revert_KEVM(
|
||||
bytes32 storageSlot,
|
||||
address alice,
|
||||
address implementation,
|
||||
address initialGuardian,
|
||||
uint16 chainId,
|
||||
uint16 governanceChainId,
|
||||
bytes32 govContract,
|
||||
uint256 evmChainId)
|
||||
public
|
||||
{
|
||||
kevm.infiniteGas();
|
||||
testSetup_after_setup_revert(
|
||||
storageSlot,
|
||||
alice,
|
||||
implementation,
|
||||
initialGuardian,
|
||||
chainId,
|
||||
governanceChainId,
|
||||
govContract,
|
||||
evmChainId
|
||||
);
|
||||
}
|
||||
}
|
|
@ -0,0 +1,86 @@
|
|||
// SPDX-License-Identifier: Apache 2
|
||||
|
||||
pragma solidity ^0.8.0;
|
||||
|
||||
import "../contracts/Implementation.sol";
|
||||
import "../contracts/Governance.sol";
|
||||
import "../contracts/Setup.sol";
|
||||
import "../contracts/Shutdown.sol";
|
||||
import "../contracts/Wormhole.sol";
|
||||
import "forge-test/rv-helpers/TestUtils.sol";
|
||||
import "forge-test/rv-helpers/MyImplementation.sol";
|
||||
import "forge-test/rv-helpers/IMyWormhole.sol";
|
||||
|
||||
contract TestShutdown is TestUtils {
|
||||
|
||||
MyImplementation impl;
|
||||
|
||||
Wormhole proxy;
|
||||
Setup setup;
|
||||
Setup proxiedSetup;
|
||||
IMyWormhole proxied;
|
||||
|
||||
uint256 constant testGuardian = 93941733246223705020089879371323733820373732307041878556247502674739205313440;
|
||||
bytes32 constant governanceContract = 0x0000000000000000000000000000000000000000000000000000000000000004;
|
||||
|
||||
function setUp() public {
|
||||
vm.chainId(1);
|
||||
// Deploy setup
|
||||
setup = new Setup();
|
||||
// Deploy implementation contract
|
||||
impl = new MyImplementation(1,2);
|
||||
// Deploy proxy
|
||||
proxy = new Wormhole(address(setup), bytes(""));
|
||||
|
||||
address[] memory keys = new address[](1);
|
||||
keys[0] = 0xbeFA429d57cD18b7F8A4d91A2da9AB4AF05d0FBe;
|
||||
//keys[0] = vm.addr(testGuardian);
|
||||
|
||||
//proxied setup
|
||||
proxiedSetup = Setup(address(proxy));
|
||||
|
||||
proxiedSetup.setup({
|
||||
implementation: address(impl),
|
||||
initialGuardians: keys,
|
||||
chainId: 2,
|
||||
governanceChainId: 1,
|
||||
governanceContract: governanceContract,
|
||||
evmChainId: 1
|
||||
});
|
||||
|
||||
proxied = IMyWormhole(address(proxy));
|
||||
upgradeImplementation();
|
||||
}
|
||||
|
||||
function upgradeImplementation() internal {
|
||||
vm.chainId(1);
|
||||
|
||||
Shutdown shutdn = new Shutdown();
|
||||
bytes memory payload = payloadSubmitContract(
|
||||
0x00000000000000000000000000000000000000000000000000000000436f7265,
|
||||
2,
|
||||
address(shutdn)
|
||||
);
|
||||
(bytes memory _vm, ) = validVm(
|
||||
0, 0, 0, 1, governanceContract, 0, 0, payload, testGuardian);
|
||||
|
||||
proxied.submitContractUpgrade(_vm);
|
||||
}
|
||||
|
||||
function testShutdownInit(address alice, bytes32 storageSlot)
|
||||
public
|
||||
unchangedStorage(address(proxied), storageSlot)
|
||||
{
|
||||
vm.prank(alice);
|
||||
proxied.initialize();
|
||||
}
|
||||
|
||||
function testShutdown_publishMessage_revert(address alice, bytes32 storageSlot, uint32 nonce, bytes memory payload, uint8 consistencyLevel)
|
||||
public
|
||||
unchangedStorage(address(proxied), storageSlot)
|
||||
{
|
||||
vm.prank(alice);
|
||||
vm.expectRevert();
|
||||
proxied.publishMessage(nonce,payload,consistencyLevel);
|
||||
}
|
||||
}
|
|
@ -78,7 +78,7 @@ contract TestTokenImplementation is TokenImplementation, Test {
|
|||
address spender,
|
||||
uint256 amount,
|
||||
uint256 deadline
|
||||
) public view returns (SignatureSetup memory output) {
|
||||
) public returns (SignatureSetup memory output) {
|
||||
// prepare signer allowing for tokens to be spent
|
||||
uint256 sk = uint256(walletPrivateKey);
|
||||
output.allower = vm.addr(sk);
|
||||
|
|
|
@ -0,0 +1,11 @@
|
|||
// SPDX-License-Identifier: Apache 2
|
||||
|
||||
pragma solidity ^0.8.0;
|
||||
|
||||
import "contracts/interfaces/IWormhole.sol";
|
||||
|
||||
interface IMyWormhole is IWormhole {
|
||||
|
||||
function getImplementation() external returns (address);
|
||||
function upgradeImpl(address newImplementation) external;
|
||||
}
|
|
@ -0,0 +1,38 @@
|
|||
// SPDX-License-Identifier: MIT
|
||||
pragma solidity >=0.6.2 <0.9.0;
|
||||
pragma experimental ABIEncoderV2;
|
||||
|
||||
interface KEVMCheatsBase {
|
||||
// Expects a call using the CALL opcode to an address with the specified calldata.
|
||||
function expectRegularCall(address,bytes calldata) external;
|
||||
// Expects a call using the CALL opcode to an address with the specified msg.value and calldata.
|
||||
function expectRegularCall(address,uint256,bytes calldata) external;
|
||||
// Expects a static call to an address with the specified calldata.
|
||||
function expectStaticCall(address,bytes calldata) external;
|
||||
// Expects a delegate call to an address with the specified calldata.
|
||||
function expectDelegateCall(address,bytes calldata) external;
|
||||
// Expects that no contract calls are made after invoking the cheatcode.
|
||||
function expectNoCall() external;
|
||||
// Expects the given address to deploy a new contract, using the CREATE opcode, with the specified value and bytecode.
|
||||
function expectCreate(address,uint256,bytes calldata) external;
|
||||
// Expects the given address to deploy a new contract, using the CREATE2 opcode, with the specified value and bytecode (appended with a bytes32 salt).
|
||||
function expectCreate2(address,uint256,bytes calldata) external;
|
||||
// Makes the storage of the given address completely symbolic.
|
||||
function symbolicStorage(address) external;
|
||||
// Adds an address to the whitelist.
|
||||
function allowCallsToAddress(address) external;
|
||||
// Adds an address and a storage slot to the whitelist.
|
||||
function allowChangesToStorage(address,uint256) external;
|
||||
// Set the current <gas> cell
|
||||
function infiniteGas() external;
|
||||
}
|
||||
|
||||
abstract contract KEVMCheats {
|
||||
KEVMCheatsBase public constant kevm = KEVMCheatsBase(address(uint160(uint256(keccak256("hevm cheat code")))));
|
||||
|
||||
// Checks if an address matches one of the built-in addresses.
|
||||
function notBuiltinAddress(address addr) internal pure returns (bool) {
|
||||
return (addr != address(645326474426547203313410069153905908525362434349) &&
|
||||
addr != address(1032069922050249630382865877677304880282300743300));
|
||||
}
|
||||
}
|
|
@ -0,0 +1,21 @@
|
|||
// SPDX-License-Identifier: Apache 2
|
||||
|
||||
pragma solidity ^0.8.0;
|
||||
|
||||
import "contracts/Implementation.sol";
|
||||
|
||||
contract MyImplementation is Implementation {
|
||||
constructor(uint256 evmChain, uint16 chain) {
|
||||
setEvmChainId(evmChain);
|
||||
setChainId(chain);
|
||||
}
|
||||
|
||||
function getImplementation() public view returns (address impl) {
|
||||
impl = _getImplementation();
|
||||
return impl;
|
||||
}
|
||||
|
||||
function upgradeImpl(address newImplementation) public {
|
||||
upgradeImplementation(newImplementation);
|
||||
}
|
||||
}
|
|
@ -0,0 +1,47 @@
|
|||
// SPDX-License-Identifier: Apache 2
|
||||
|
||||
pragma solidity ^0.8.0;
|
||||
import "contracts/Setters.sol";
|
||||
|
||||
contract MySetters is Setters {
|
||||
|
||||
function updateGuardianSetIndex_external(uint32 newIndex) external {
|
||||
updateGuardianSetIndex(newIndex);
|
||||
}
|
||||
|
||||
function expireGuardianSet_external(uint32 index) external {
|
||||
expireGuardianSet(index);
|
||||
}
|
||||
|
||||
function setInitialized_external(address implementation) external {
|
||||
setInitialized(implementation);
|
||||
}
|
||||
|
||||
function setGovernanceActionConsumed_external(bytes32 hash) external {
|
||||
setGovernanceActionConsumed(hash);
|
||||
}
|
||||
|
||||
function setChainId_external(uint16 chainId) external {
|
||||
setChainId(chainId);
|
||||
}
|
||||
|
||||
function setGovernanceChainId_external(uint16 chainId) external {
|
||||
setGovernanceChainId(chainId);
|
||||
}
|
||||
|
||||
function setGovernanceContract_external(bytes32 governanceContract) external {
|
||||
setGovernanceContract(governanceContract);
|
||||
}
|
||||
|
||||
function setMessageFee_external(uint256 newFee) external {
|
||||
setMessageFee(newFee);
|
||||
}
|
||||
|
||||
function setNextSequence_external(address emitter, uint64 sequence) external {
|
||||
setNextSequence(emitter, sequence);
|
||||
}
|
||||
|
||||
function setEvmChainId_external(uint256 evmChainId) external {
|
||||
setEvmChainId(evmChainId);
|
||||
}
|
||||
}
|
|
@ -0,0 +1,187 @@
|
|||
// test/Messages.sol
|
||||
// SPDX-License-Identifier: Apache 2
|
||||
|
||||
pragma solidity ^0.8.0;
|
||||
|
||||
import "forge-std/Test.sol";
|
||||
import "forge-test/rv-helpers/KEVMCheats.sol";
|
||||
|
||||
uint32 constant MAX_UINT8 = 0xff;
|
||||
uint32 constant MAX_UINT16 = 0xffff;
|
||||
uint32 constant MAX_UINT32 = 0xffffffff;
|
||||
|
||||
bytes32 constant CHAINID_STORAGE_INDEX = bytes32(uint256(0));
|
||||
bytes32 constant GOVERNANCECONTRACT_STORAGE_INDEX = bytes32(uint256(1));
|
||||
bytes32 constant GUARDIANSETS_STORAGE_INDEX = bytes32(uint256(2));
|
||||
bytes32 constant GUARDIANSETINDEX_STORAGE_INDEX = bytes32(uint256(3));
|
||||
bytes32 constant SEQUENCES_STORAGE_INDEX = bytes32(uint256(4));
|
||||
bytes32 constant CONSUMEDGOVACTIONS_STORAGE_INDEX = bytes32(uint256(5));
|
||||
bytes32 constant INITIALIZEDIMPLEMENTATIONS_STORAGE_INDEX = bytes32(uint256(6));
|
||||
bytes32 constant MESSAGEFEE_STORAGE_INDEX = bytes32(uint256(7));
|
||||
bytes32 constant EVMCHAINID_STORAGE_INDEX = bytes32(uint256(8));
|
||||
|
||||
uint256 constant SECP256K1_CURVE_ORDER =
|
||||
115792089237316195423570985008687907852837564279074904382605163141518161494337;
|
||||
|
||||
contract TestUtils is Test, KEVMCheats {
|
||||
|
||||
// Returns the index hash of the storage slot of a map at location `index` and the key `_key`.
|
||||
function hashedLocation(address _key, bytes32 _index) public pure returns(bytes32) {
|
||||
// returns `keccak(#buf(32,_key) +Bytes #buf(32, index))
|
||||
return keccak256(abi.encode(_key, _index));
|
||||
}
|
||||
|
||||
// Returns the index hash of the storage slot of a map at location `index` and the key `_key`.
|
||||
function hashedLocation(bytes32 _key, bytes32 _index) public pure returns(bytes32) {
|
||||
// returns `keccak(#buf(32,_key) +Bytes #buf(32, index))
|
||||
return keccak256(abi.encode(_key, _index));
|
||||
}
|
||||
|
||||
// Returns the index hash of the storage slot of a map at location `index` and the key `_key`.
|
||||
function hashedLocationOffset(uint32 _key, bytes32 _index, uint256 offset) public pure returns(bytes32) {
|
||||
// returns `keccak(#buf(32,_key) +Bytes #buf(32, index))
|
||||
return bytes32(uint256(keccak256(abi.encode(_key, _index))) + offset);
|
||||
}
|
||||
|
||||
// Updates an address's storage slot with the given content, using a bitmask.
|
||||
// The bitmask should set to 0 those bits that will be updated with the new content.
|
||||
// It is assumed that the new content fits in the 0 region of the bitmask.
|
||||
function storeWithMask(address contractAddress, bytes32 storageSlot, bytes32 content, bytes32 mask) public returns (bytes32) {
|
||||
bytes32 originalStorage = vm.load(contractAddress, storageSlot);
|
||||
bytes32 updatedStorage = (mask & originalStorage) | content;
|
||||
vm.store(contractAddress, storageSlot, updatedStorage);
|
||||
return updatedStorage;
|
||||
}
|
||||
|
||||
// Uses KEVM cheatcodes to make the gas and contract storage symbolic.
|
||||
modifier symbolic(address contractAddress){
|
||||
kevm.infiniteGas();
|
||||
kevm.symbolicStorage(contractAddress);
|
||||
_;
|
||||
}
|
||||
|
||||
// Asserts that the given storage slot doesn't change in the given contract.
|
||||
modifier unchangedStorage(address contractAddress, bytes32 storageSlot) {
|
||||
bytes32 initialStorage = vm.load(contractAddress, storageSlot);
|
||||
_;
|
||||
bytes32 finalStorage = vm.load(contractAddress, storageSlot);
|
||||
assertEq(initialStorage, finalStorage);
|
||||
}
|
||||
|
||||
function validVmHeader(uint32 guardianSetIndex) internal pure returns (bytes memory vmH) {
|
||||
uint8 version = 1;
|
||||
uint8 signersLen = 1;
|
||||
uint8 guardianIndex = 0;
|
||||
|
||||
vmH = abi.encodePacked(
|
||||
version,
|
||||
guardianSetIndex,
|
||||
signersLen,
|
||||
guardianIndex
|
||||
);
|
||||
}
|
||||
|
||||
function payloadSubmitContract(bytes32 module, uint16 chainId, address newImpl) internal pure returns (bytes memory payload) {
|
||||
uint8 action = 1;
|
||||
bytes32 newContract = bytes32(uint256(uint160(newImpl)));
|
||||
|
||||
payload = abi.encodePacked(
|
||||
module,
|
||||
action,
|
||||
chainId,
|
||||
newContract
|
||||
);
|
||||
}
|
||||
|
||||
function payloadSubmitMessageFee(bytes32 module, uint16 chainId, uint256 newMessageFee) internal pure returns (bytes memory payload) {
|
||||
uint8 action = 3;
|
||||
|
||||
payload = abi.encodePacked(
|
||||
module,
|
||||
action,
|
||||
chainId,
|
||||
newMessageFee
|
||||
);
|
||||
}
|
||||
|
||||
function payloadSubmitNewGuardianSet(bytes32 module, uint16 chainId, uint32 newGuardianSetIndex, address[] memory keys) internal pure returns (bytes memory payload) {
|
||||
uint8 action = 2;
|
||||
uint8 keysLength = uint8(keys.length);
|
||||
|
||||
payload = abi.encodePacked(
|
||||
module,
|
||||
action,
|
||||
chainId,
|
||||
newGuardianSetIndex,
|
||||
keysLength
|
||||
);
|
||||
|
||||
for(uint8 i = 0; i < keysLength; i++)
|
||||
payload = abi.encodePacked(payload, keys[i]);
|
||||
}
|
||||
|
||||
function payloadSubmitTransferFees(bytes32 module, uint16 chainId, uint256 amount, bytes32 recipient) internal pure returns (bytes memory payload) {
|
||||
uint8 action = 4;
|
||||
|
||||
payload = abi.encodePacked(
|
||||
module,
|
||||
action,
|
||||
chainId,
|
||||
amount,
|
||||
recipient
|
||||
);
|
||||
}
|
||||
|
||||
function payloadSubmitRecoverChainId(bytes32 module, uint256 evmChainId, uint16 newChainId) internal pure returns (bytes memory payload) {
|
||||
uint8 action = 5;
|
||||
|
||||
payload = abi.encodePacked(
|
||||
module,
|
||||
action,
|
||||
evmChainId,
|
||||
newChainId
|
||||
);
|
||||
}
|
||||
|
||||
|
||||
function validVm(
|
||||
uint32 guardianSetIndex,
|
||||
uint32 timestamp,
|
||||
uint32 nonce,
|
||||
uint16 emitterChainId,
|
||||
bytes32 emitterAddress,
|
||||
uint64 sequence,
|
||||
uint8 consistencyLevel,
|
||||
bytes memory payload,
|
||||
uint256 pk)
|
||||
internal
|
||||
returns (bytes memory _vm, bytes32 hash)
|
||||
{
|
||||
bytes memory header = validVmHeader(guardianSetIndex);
|
||||
|
||||
bytes memory body = abi.encodePacked(
|
||||
timestamp,
|
||||
nonce,
|
||||
emitterChainId,
|
||||
emitterAddress,
|
||||
sequence,
|
||||
consistencyLevel,
|
||||
payload
|
||||
);
|
||||
|
||||
hash = keccak256(abi.encodePacked(keccak256(body)));
|
||||
|
||||
bytes memory signature = validSignature(pk, hash);
|
||||
|
||||
_vm = bytes.concat(header, signature, body);
|
||||
}
|
||||
|
||||
function validSignature(uint256 pk, bytes32 hash) public returns (bytes memory signature) {
|
||||
uint8 v;
|
||||
bytes32 r;
|
||||
bytes32 s;
|
||||
(v, r, s) = vm.sign(pk, hash);
|
||||
|
||||
signature = abi.encodePacked(r, s,(v - 27));
|
||||
}
|
||||
}
|
|
@ -0,0 +1,113 @@
|
|||
#!/usr/bin/env bash
|
||||
set -euxo pipefail
|
||||
|
||||
forge_build() {
|
||||
# Avoid building Migrator contract (see PROOFS.md for explanation)
|
||||
forge build --skip Migrator.sol
|
||||
}
|
||||
|
||||
foundry_kompile() {
|
||||
kevm foundry-kompile --verbose \
|
||||
--require wormhole-lemmas.k \
|
||||
--module-import WORMHOLE-LEMMAS \
|
||||
${rekompile} \
|
||||
${regen}
|
||||
}
|
||||
|
||||
foundry_prove() {
|
||||
kevm foundry-prove \
|
||||
--max-depth ${max_depth} \
|
||||
--max-iterations ${max_iterations} \
|
||||
--workers ${workers} \
|
||||
--verbose \
|
||||
${reinit} \
|
||||
${debug} \
|
||||
${simplify_init} \
|
||||
${implication_every_block} \
|
||||
${break_every_step} \
|
||||
${break_on_calls} \
|
||||
${auto_abstract} \
|
||||
${tests[*]}
|
||||
}
|
||||
|
||||
max_depth=5000
|
||||
max_iterations=5000
|
||||
|
||||
# Number of processes run by the prover in parallel
|
||||
# Should be at most (M - 8) / 8 in a machine with M GB of RAM
|
||||
workers=1
|
||||
|
||||
# Switch the options below to turn them on or off
|
||||
|
||||
# Turn on to regenerate K definitions if Solidity code or KEVM version changes
|
||||
regen=--regen
|
||||
regen=
|
||||
|
||||
# Turn on if new lemmas have been added to wormhole-lemmas.k (subsumed by --regen)
|
||||
rekompile=--rekompile
|
||||
rekompile=
|
||||
|
||||
# Progress is saved automatically so an unfinished proof can be resumed from where it left off
|
||||
# Turn on to restart proof from the beginning instead of resuming
|
||||
reinit=--reinit
|
||||
reinit=
|
||||
|
||||
debug=--debug
|
||||
debug=
|
||||
|
||||
simplify_init=--no-simplify-init
|
||||
simplify_init=
|
||||
|
||||
implication_every_block=--implication-every-block
|
||||
implication_every_block=
|
||||
|
||||
break_every_step=--break-every-step
|
||||
break_every_step=
|
||||
|
||||
# Turn off to save the state before every call to the KCFG
|
||||
break_on_calls=
|
||||
break_on_calls=--no-break-on-calls
|
||||
|
||||
auto_abstract=--auto-abstract
|
||||
auto_abstract=
|
||||
|
||||
# List of tests to symbolically execute
|
||||
|
||||
tests=(
|
||||
"--test TestSetters.testUpdateGuardianSetIndex_KEVM "
|
||||
"--test TestSetters.testExpireGuardianSet_KEVM "
|
||||
"--test TestSetters.testSetMessageFee_KEVM "
|
||||
"--test TestSetters.testSetGovernanceContract_KEVM "
|
||||
"--test TestSetters.testSetInitialized_KEVM "
|
||||
"--test TestSetters.testSetGovernanceActionConsumed_KEVM "
|
||||
"--test TestSetters.testSetChainId_KEVM "
|
||||
"--test TestSetters.testSetGovernanceChainId_KEVM "
|
||||
"--test TestSetters.testSetNextSequence_KEVM "
|
||||
"--test TestSetters.testSetEvmChainId_Success_KEVM "
|
||||
"--test TestSetters.testSetEvmChainId_Revert_KEVM "
|
||||
"--test TestGetters.testGetGuardianSetIndex_KEVM "
|
||||
"--test TestGetters.testGetMessageFee_KEVM "
|
||||
"--test TestGetters.testGetGovernanceContract_KEVM "
|
||||
"--test TestGetters.testIsInitialized_KEVM "
|
||||
"--test TestGetters.testGetGovernanceActionConsumed_KEVM "
|
||||
"--test TestGetters.testChainId_KEVM "
|
||||
"--test TestGetters.testGovernanceChainId_KEVM "
|
||||
"--test TestGetters.testNextSequence_KEVM "
|
||||
"--test TestGetters.testEvmChainId_KEVM "
|
||||
"--test TestGovernanceStructs.testParseContractUpgrade_KEVM "
|
||||
"--test TestGovernanceStructs.testParseContractUpgradeWrongAction_KEVM "
|
||||
"--test TestGovernanceStructs.testParseSetMessageFee_KEVM "
|
||||
"--test TestGovernanceStructs.testParseSetMessageFeeWrongAction_KEVM "
|
||||
"--test TestGovernanceStructs.testParseTransferFees_KEVM "
|
||||
"--test TestGovernanceStructs.testParseTransferFeesWrongAction_KEVM "
|
||||
"--test TestGovernanceStructs.testParseRecoverChainId_KEVM "
|
||||
"--test TestGovernanceStructs.testParseRecoverChainIdWrongAction_KEVM "
|
||||
"--test TestSetup.testInitialize_after_setup_revert_KEVM "
|
||||
"--test TestSetup.testSetup_after_setup_revert_KEVM "
|
||||
)
|
||||
|
||||
# Comment these lines as needed
|
||||
pkill kore-rpc || true
|
||||
forge_build
|
||||
foundry_kompile
|
||||
foundry_prove
|
|
@ -0,0 +1,240 @@
|
|||
requires "evm.md"
|
||||
requires "foundry.md"
|
||||
|
||||
module WORMHOLE-LEMMAS
|
||||
imports FOUNDRY
|
||||
imports INFINITE-GAS
|
||||
imports SET-SYMBOLIC
|
||||
|
||||
syntax StepSort ::= Int
|
||||
| Bool
|
||||
| Bytes
|
||||
| Set
|
||||
// ------------------------
|
||||
|
||||
syntax KItem ::= runLemma ( StepSort )
|
||||
| doneLemma( StepSort )
|
||||
// --------------------------------------
|
||||
|
||||
syntax Int ::= "notMaxUInt8" [alias] /* FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF00 */
|
||||
| "notMaxUInt16" [alias] /* FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF0000 */
|
||||
| "notMaxUInt32" [alias] /* FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF00000000 */
|
||||
| "notMaxUInt64" [alias] /* FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF0000000000000000 */
|
||||
| "notMaxUInt240" [alias] /* FFFF000000000000000000000000000000000000000000000000000000000000 */
|
||||
| "notMaxUInt248" [alias] /* FF00000000000000000000000000000000000000000000000000000000000000 */
|
||||
// ------------------------------------------------------------------------------------------------------------
|
||||
|
||||
rule notMaxUInt8 => 115792089237316195423570985008687907853269984665640564039457584007913129639680
|
||||
|
||||
rule notMaxUInt16 => 115792089237316195423570985008687907853269984665640564039457584007913129574400
|
||||
|
||||
rule notMaxUInt32 => 115792089237316195423570985008687907853269984665640564039457584007908834672640
|
||||
|
||||
rule notMaxUInt64 => 115792089237316195423570985008687907853269984665640564039439137263839420088320
|
||||
|
||||
rule notMaxUInt240 => 115790322390251417039241401711187164934754157181743688420499462401711837020160
|
||||
|
||||
rule notMaxUInt248 => 115339776388732929035197660848497720713218148788040405586178452820382218977280
|
||||
|
||||
rule <k> runLemma(T) => doneLemma(T) ... </k>
|
||||
|
||||
rule notMaxUInt248 &Int ( X <<Int 248 ) => X <<Int 248
|
||||
requires #rangeUInt ( 8 , X )
|
||||
[simplification]
|
||||
|
||||
rule notMaxUInt240 &Int ( X <<Int 240 ) => X <<Int 240
|
||||
requires #rangeUInt ( 16 , X )
|
||||
[simplification]
|
||||
|
||||
rule 4294901760 &Int ( X <<Int 16 ) => X <<Int 16
|
||||
requires #rangeUInt ( 16 , X )
|
||||
[simplification]
|
||||
|
||||
rule maxUInt16 &Int ( ( ( X *Int pow16 ) |Int ( 115792089237316195423570985008687907853269984665640564039457584007908834738175 &Int _ ) ) >>Int 16 ) => X
|
||||
requires #rangeUInt ( 16 , X )
|
||||
[simplification]
|
||||
|
||||
rule maxUInt16 &Int ( ( ( X <<Int 16 ) |Int ( 115792089237316195423570985008687907853269984665640564039457584007908834738175 &Int _ ) ) /Int pow16 ) => X
|
||||
requires #rangeUInt ( 16 , X )
|
||||
[simplification]
|
||||
|
||||
rule maxUInt8 &Int ( X |Int ( notMaxUInt8 &Int _ ) ) => X
|
||||
requires #rangeUInt ( 8 , X )
|
||||
[simplification]
|
||||
|
||||
rule maxUInt16 &Int ( X |Int ( notMaxUInt16 &Int _ ) ) => X
|
||||
requires #rangeUInt ( 16 , X )
|
||||
[simplification]
|
||||
|
||||
rule maxUInt32 &Int ( X |Int ( notMaxUInt32 &Int _ ) ) => X
|
||||
requires #rangeUInt ( 32 , X )
|
||||
[simplification]
|
||||
|
||||
rule maxUInt64 &Int ( X |Int ( notMaxUInt64 &Int _ ) ) => X
|
||||
requires #rangeUInt ( 64 , X )
|
||||
[simplification]
|
||||
|
||||
rule notMaxUInt16 &Int X => 0
|
||||
requires #rangeUInt ( 16 , X )
|
||||
[simplification]
|
||||
|
||||
rule notMaxUInt32 &Int X => 0
|
||||
requires #rangeUInt ( 32 , X )
|
||||
[simplification]
|
||||
|
||||
rule notMaxUInt64 &Int X => 0
|
||||
requires #rangeUInt ( 64 , X )
|
||||
[simplification]
|
||||
|
||||
rule maxUInt32 &Int X => X
|
||||
requires #rangeUInt ( 32 , X )
|
||||
[simplification]
|
||||
|
||||
rule #lookup ( MAP [ KEY1 <- _ ] , KEY2 ) => #lookup ( MAP , KEY2 )
|
||||
requires KEY1 =/=Int KEY2
|
||||
[simplification]
|
||||
|
||||
rule chop ( I:Int ) => I modInt pow256 [simplification, smt-lemma]
|
||||
|
||||
rule A &Int B => B &Int A
|
||||
[symbolic(A), concrete(B), simplification]
|
||||
|
||||
// Not being able to generalize this for some reason
|
||||
rule (X <<Int 248) <Int pow256 => true
|
||||
requires #rangeUInt ( 8 , X )
|
||||
[simplification]
|
||||
|
||||
rule (X <<Int 240) <Int pow256 => true
|
||||
requires #rangeUInt ( 16 , X )
|
||||
[simplification]
|
||||
|
||||
rule (X <<Int 16) <Int pow256 => true
|
||||
requires #rangeUInt ( 240 , X )
|
||||
[simplification]
|
||||
|
||||
rule 0 <=Int (X <<Int Y) => true
|
||||
requires 0 <=Int X andBool 0 <=Int Y
|
||||
[simplification]
|
||||
|
||||
rule ( ( X modInt N ) +Int Y ) modInt N => (X +Int Y) modInt N
|
||||
[simplification]
|
||||
|
||||
rule X xorInt maxUInt256 => maxUInt256 -Int X
|
||||
requires #rangeUInt ( 256 , X )
|
||||
[simplification]
|
||||
|
||||
rule X <=Int 115792089237316195423570985008687907853269984665640564039457584007913129639934 => X =/=Int maxUInt256
|
||||
requires #rangeUInt ( 256 , X )
|
||||
[simplification]
|
||||
|
||||
rule keccak ( _ ) ==Int maxUInt256 => false
|
||||
[simplification]
|
||||
|
||||
rule 1 |Int _ ==Int 0 => false
|
||||
[simplification]
|
||||
|
||||
rule (A |Int B) ==Int (B |Int A) => true
|
||||
[simplification, smt-lemma]
|
||||
|
||||
rule maxUInt8 &Int #asWord ( X ) => #asWord ( #range ( X , 31 , 1 ) )
|
||||
requires lengthBytes ( X ) ==Int 32
|
||||
[simplification]
|
||||
|
||||
rule maxUInt16 &Int #asWord ( X ) => #asWord ( #range ( X , 30 , 2 ) )
|
||||
requires lengthBytes ( X ) ==Int 32
|
||||
[simplification]
|
||||
|
||||
rule #buf ( 32 , #asWord ( X ) ) => X
|
||||
requires lengthBytes ( X ) ==Int 32
|
||||
[simplification]
|
||||
|
||||
rule #buf ( 32 , X <<Int 248 ) => #buf ( 1 , X ) +Bytes #buf ( 31 , 0 )
|
||||
requires #rangeUInt ( 8 , X )
|
||||
[simplification]
|
||||
|
||||
rule #buf ( 32 , X <<Int 240 ) => #buf ( 2 , X ) +Bytes #buf ( 30 , 0 )
|
||||
requires #rangeUInt ( 16 , X )
|
||||
[simplification]
|
||||
|
||||
rule #range ( X , S1 , W1 ) +Bytes #range ( X , S2 , W2 ) => #range ( X , S1 , W1 +Int W2 )
|
||||
requires S1 +Int W1 ==Int S2
|
||||
andBool S2 +Int W2 <=Int lengthBytes ( X )
|
||||
[simplification]
|
||||
|
||||
rule ( X <<Int 16 ) ==Int ( X *Int pow16 ) => true
|
||||
requires 0 <=Int X
|
||||
[simplification, smt-lemma]
|
||||
endmodule
|
||||
|
||||
module WORMHOLE-LEMMAS-SPEC
|
||||
imports WORMHOLE-LEMMAS
|
||||
|
||||
claim [lowest-32-bits]: <k> runLemma ( VV0_index_114b9705:Int ==Int ( maxUInt32 &Int ( VV0_index_114b9705:Int |Int ( notMaxUInt32 &Int #lookup ( _STORAGE:Map , 11 ) ) ) ) )
|
||||
=> doneLemma ( true ) ... </k>
|
||||
requires #rangeUInt ( 32 , VV0_index_114b9705 )
|
||||
|
||||
claim [chop-successor-key]: <k> runLemma ( #lookup ( STORAGE [ chop ( KEY +Int 1 ) <- _ ] , KEY ) )
|
||||
=> doneLemma ( #lookup ( STORAGE , KEY ) ) ... </k>
|
||||
|
||||
claim [chop-successor]: <k> runLemma ( chop ( KEY +Int 1 ) =/=Int KEY )
|
||||
=> doneLemma ( true ) ... </k>
|
||||
|
||||
claim [bits-16-to-31]: <k> runLemma ( ( 65535 &Int ( ( ( ( ( VV0_newChainId_114b9705:Int <<Int 16 ) modInt 115792089237316195423570985008687907853269984665640564039457584007913129639936 ) &Int 4294901760 ) /Int 65536 ) &Int 65535 ) ) ==Int VV0_newChainId_114b9705:Int )
|
||||
=> doneLemma ( true ) ... </k>
|
||||
requires #rangeUInt ( 16 , VV0_newChainId_114b9705 )
|
||||
|
||||
claim [bits-16-to-31-2]: <k> runLemma ( ( maxUInt16 &Int ( ( ( 4294901760 &Int ( VV0_newChainId_114b9705:Int <<Int 16 ) ) |Int ( 115792089237316195423570985008687907853269984665640564039457584007908834738175 &Int #lookup ( _STORAGE:Map , 8 ) ) ) /Int pow16 ) ) ==Int VV0_newChainId_114b9705:Int ) => doneLemma ( true ) ... </k>
|
||||
requires #rangeUInt ( 16 , VV0_newChainId_114b9705 )
|
||||
|
||||
claim [bits-16-to-31-3]: <k> runLemma ( maxUInt16 &Int ( ( ( ( ( X <<Int 16 ) modInt pow256 ) &Int 4294901760 ) /Int pow16 ) &Int maxUInt16 ) ) => doneLemma ( X ) ... </k>
|
||||
requires #rangeUInt ( 16 , X )
|
||||
|
||||
claim [bits-16-to-31-4]: <k> runLemma ( ( X *Int pow16 ) |Int Y ==Int ( ( ( ( X <<Int 16 ) modInt pow256 ) &Int 4294901760 ) |Int Y ) ) => doneLemma ( true ) ... </k>
|
||||
requires #rangeUInt ( 16 , X )
|
||||
|
||||
claim [bits-16-to-31-5]: <k> runLemma ( ( ( X *Int pow16 ) |Int ( 115792089237316195423570985008687907853269984665640564039457584007908834738175 &Int Y ) ) ==Int ( ( 115792089237316195423570985008687907853269984665640564039457584007908834738175 &Int Y ) |Int ( 4294901760 &Int ( ( X <<Int 16 ) modInt pow256 ) ) ) ) => doneLemma ( true ) ... </k>
|
||||
requires #rangeUInt ( 16 , X )
|
||||
andBool #rangeUInt ( 256 , Y )
|
||||
|
||||
claim [shift-mask]: <k> runLemma ( ( ( VV0_newChainId_114b9705:Int *Int pow16 ) |Int Y ==Int ( ( ( ( VV0_newChainId_114b9705:Int <<Int 16 ) modInt pow256 ) &Int 4294901760 ) |Int Y ) ) )
|
||||
=> doneLemma ( true ) ... </k>
|
||||
requires #rangeUInt ( 16 , VV0_newChainId_114b9705 )
|
||||
|
||||
claim [shift-range]: <k> runLemma ( #rangeUInt ( 256 , X <<Int 16 ) ) => doneLemma ( true ) ... </k>
|
||||
requires #rangeUInt ( 16 , X )
|
||||
|
||||
claim [shift-mod]: <k> runLemma ( ( X <<Int 16 ) modInt pow256 ) => doneLemma ( X <<Int 16 ) ... </k>
|
||||
requires #rangeUInt ( 16 , X )
|
||||
|
||||
claim [lowest-8-bits]: <k> runLemma ( maxUInt8 &Int #asWord ( #range ( #buf ( 32 , X ) , 1 , 31 ) +Bytes #range ( #buf ( 32 , #asWord ( b"\x01" +Bytes #range ( #buf ( 32 , Y ) , 0 , 2 ) +Bytes #range ( #buf ( 32 , Z ) , 0 , 29 ) ) ) , 0 , 1 ) ) )
|
||||
=> doneLemma ( 1 ) ... </k>
|
||||
requires #rangeUInt ( 256 , X )
|
||||
andBool #rangeUInt ( 256 , Y )
|
||||
andBool #rangeUInt ( 256 , Z )
|
||||
|
||||
claim [highest-8-bits]: <k> runLemma ( maxUInt8 &Int #asWord ( #range ( #buf ( 32 , ( notMaxUInt248 &Int ( ( X <<Int 248 ) modInt pow256 ) ) ) , 0 , 1 ) ) )
|
||||
=> doneLemma ( X ) ... </k>
|
||||
requires #rangeUInt ( 8 , X )
|
||||
|
||||
claim [highest-16-bits]: <k> runLemma ( maxUInt16 &Int #asWord ( #range ( #buf ( 32 , X ) , 3 , 29 ) +Bytes b"\x01" +Bytes #range ( #buf ( 32 , ( notMaxUInt240 &Int ( ( Y <<Int 240 ) modInt pow256 ) ) ) , 0 , 2 ) ) )
|
||||
=> doneLemma ( Y ) ... </k>
|
||||
requires #rangeUInt ( 256 , X )
|
||||
andBool #rangeUInt ( 16 , Y )
|
||||
|
||||
claim [one-byte-range]: <k> runLemma ( #asWord ( #range ( #buf ( 32 , notMaxUInt248 &Int ( X <<Int 248 ) modInt pow256 ) , 0 , 1 ) ) <Int pow8 )
|
||||
=> doneLemma ( true ) ... </k>
|
||||
requires #rangeUInt ( 8 , X )
|
||||
|
||||
claim [shift-248]: <k> runLemma ( ( X <<Int 248 ) <Int pow256 )
|
||||
=> doneLemma ( true ) ... </k>
|
||||
requires #rangeUInt ( 8 , X )
|
||||
|
||||
claim [length-concat]: <k> runLemma ( lengthBytes ( #range ( #buf ( 32 , _X ) , 3 , 29 ) +Bytes b"\x01" +Bytes #buf ( 2 , Y ) ) )
|
||||
=> doneLemma ( 32 ) ... </k>
|
||||
requires #rangeUInt ( 16 , Y )
|
||||
|
||||
claim [concat-ranges]: <k> runLemma ( #asWord ( #range ( #buf ( 32 , X ) , 0 , 29 ) +Bytes #range ( #buf ( 32 , X ) , 29 , 3 ) ) )
|
||||
=> doneLemma ( X ) ... </k>
|
||||
requires #rangeUInt ( 256 , X )
|
||||
|
||||
endmodule
|
Loading…
Reference in New Issue