solidity/test/libsolidity/smtCheckerTests/deployment
Martin Blicha b0419da654 [SMTChecker] Remember verification targets from trusted external calls
Previously, we did not remember trusted external calls for later phase
when we compute possible verification targets for each function.
This led to false negative in cases where verification target can be
violated, but not by calling a public function directly, but only when
it is called as an external function from other function.

The added test cases witnesses this behaviour. The underflow in
`dec` cannot happen in any other way except what the `dec` is called
from `f`.

The same problem did not occur when the functions are called internally,
because for such cases, we have already been remembering these calls in
the callgraph in the CHC engine.
2023-05-26 13:03:44 +02:00
..
deploy_bmc_trusted.sol
deploy_bmc_untrusted.sol [SMTChecker] Add a new trusted mode which assumes that code that is 2023-02-06 17:02:33 +01:00
deploy_trusted_addresses.sol Report safe properties in BMC and CHC 2023-03-09 14:59:32 +01:00
deploy_trusted_flow.sol [SMTChecker] Remember verification targets from trusted external calls 2023-05-26 13:03:44 +02:00
deploy_trusted_keep_storage_constraints.sol Report safe properties in BMC and CHC 2023-03-09 14:59:32 +01:00
deploy_trusted_state_flow_2.sol Report safe properties in BMC and CHC 2023-03-09 14:59:32 +01:00
deploy_trusted_state_flow_3.sol [SMTChecker] Add a new trusted mode which assumes that code that is 2023-02-06 17:02:33 +01:00
deploy_trusted_state_flow_4.sol
deploy_trusted_state_flow.sol Report safe properties in BMC and CHC 2023-03-09 14:59:32 +01:00
deploy_trusted.sol Report safe properties in BMC and CHC 2023-03-09 14:59:32 +01:00
deploy_untrusted_addresses.sol
deploy_untrusted_erase_storage_constraints.sol
deploy_untrusted.sol
deployment_trusted_with_value_1.sol Report safe properties in BMC and CHC 2023-03-09 14:59:32 +01:00