TSTP Solution File: SWV233+1 by SnakeForV---1.0
View Problem
- Process Solution
%------------------------------------------------------------------------------
% File : SnakeForV---1.0
% Problem : SWV233+1 : TPTP v8.1.0. Released v3.2.0.
% Transfm : none
% Format : tptp:raw
% Command : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_uns --cores 0 -t %d %s
% Computer : n002.cluster.edu
% Model : x86_64 x86_64
% CPU : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory : 8042.1875MB
% OS : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit : 300s
% DateTime : Wed Aug 31 18:44:34 EDT 2022
% Result : Theorem 1.59s 0.55s
% Output : Refutation 1.59s
% Verified :
% SZS Type : Refutation
% Derivation depth : 23
% Number of leaves : 22
% Syntax : Number of formulae : 147 ( 37 unt; 0 def)
% Number of atoms : 454 ( 76 equ)
% Maximal formula atoms : 11 ( 3 avg)
% Number of connectives : 544 ( 237 ~; 221 |; 65 &)
% ( 8 <=>; 13 =>; 0 <=; 0 <~>)
% Maximal formula depth : 13 ( 5 avg)
% Maximal term depth : 8 ( 2 avg)
% Number of predicates : 11 ( 9 usr; 9 prp; 0-2 aty)
% Number of functors : 22 ( 22 usr; 9 con; 0-2 aty)
% Number of variables : 202 ( 202 !; 0 ?)
% Comments :
%------------------------------------------------------------------------------
fof(f316,plain,
$false,
inference(avatar_sat_refutation,[],[f144,f155,f188,f231,f255,f272,f300,f311,f315]) ).
fof(f315,plain,
( ~ spl0_12
| ~ spl0_15 ),
inference(avatar_contradiction_clause,[],[f314]) ).
fof(f314,plain,
( $false
| ~ spl0_12
| ~ spl0_15 ),
inference(subsumption_resolution,[],[f313,f86]) ).
fof(f86,plain,
~ knows(secret),
inference(cnf_transformation,[],[f24]) ).
fof(f24,plain,
~ knows(secret),
inference(flattening,[],[f20]) ).
fof(f20,negated_conjecture,
~ knows(secret),
inference(negated_conjecture,[],[f19]) ).
fof(f19,conjecture,
knows(secret),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',attack) ).
fof(f313,plain,
( knows(secret)
| ~ spl0_12
| ~ spl0_15 ),
inference(subsumption_resolution,[],[f312,f271]) ).
fof(f271,plain,
( knows(kgen(k_a))
| ~ spl0_12 ),
inference(avatar_component_clause,[],[f269]) ).
fof(f269,plain,
( spl0_12
<=> knows(kgen(k_a)) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_12])]) ).
fof(f312,plain,
( ~ knows(kgen(k_a))
| knows(secret)
| ~ spl0_15 ),
inference(resolution,[],[f299,f78]) ).
fof(f78,plain,
! [X0,X1] :
( ~ knows(symmetric_encrypt(X0,X1))
| knows(X0)
| ~ knows(X1) ),
inference(cnf_transformation,[],[f57]) ).
fof(f57,plain,
! [X0,X1] :
( ~ knows(symmetric_encrypt(X0,X1))
| knows(X0)
| ~ knows(X1) ),
inference(rectify,[],[f43]) ).
fof(f43,plain,
! [X1,X0] :
( ~ knows(symmetric_encrypt(X1,X0))
| knows(X1)
| ~ knows(X0) ),
inference(flattening,[],[f42]) ).
fof(f42,plain,
! [X0,X1] :
( knows(X1)
| ~ knows(symmetric_encrypt(X1,X0))
| ~ knows(X0) ),
inference(ennf_transformation,[],[f36]) ).
fof(f36,plain,
! [X0,X1] :
( ( knows(symmetric_encrypt(X1,X0))
& knows(X0) )
=> knows(X1) ),
inference(rectify,[],[f2]) ).
fof(f2,axiom,
! [X1,X0] :
( ( knows(symmetric_encrypt(X0,X1))
& knows(X1) )
=> knows(X0) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',symmetric_encrypt_equation) ).
fof(f299,plain,
( knows(symmetric_encrypt(secret,kgen(k_a)))
| ~ spl0_15 ),
inference(avatar_component_clause,[],[f297]) ).
fof(f297,plain,
( spl0_15
<=> knows(symmetric_encrypt(secret,kgen(k_a))) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_15])]) ).
fof(f311,plain,
~ spl0_14,
inference(avatar_contradiction_clause,[],[f310]) ).
fof(f310,plain,
( $false
| ~ spl0_14 ),
inference(subsumption_resolution,[],[f309,f112]) ).
fof(f112,plain,
knows(n),
inference(resolution,[],[f73,f80]) ).
fof(f80,plain,
! [X0,X1] :
( ~ knows(concatenate(X0,X1))
| knows(X0) ),
inference(cnf_transformation,[],[f58]) ).
fof(f58,plain,
! [X0,X1] :
( ( knows(X0)
& knows(X1) )
| ~ knows(concatenate(X0,X1)) ),
inference(rectify,[],[f49]) ).
fof(f49,plain,
! [X1,X0] :
( ( knows(X1)
& knows(X0) )
| ~ knows(concatenate(X1,X0)) ),
inference(ennf_transformation,[],[f32]) ).
fof(f32,plain,
! [X0,X1] :
( knows(concatenate(X1,X0))
=> ( knows(X1)
& knows(X0) ) ),
inference(rectify,[],[f5]) ).
fof(f5,axiom,
! [X1,X0] :
( knows(concatenate(X0,X1))
=> ( knows(X1)
& knows(X0) ) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',construct_message_2) ).
fof(f73,plain,
knows(concatenate(n,concatenate(k_c,sign(concatenate(c,concatenate(k_c,eol)),inverse(k_c))))),
inference(cnf_transformation,[],[f54]) ).
fof(f54,plain,
! [X0,X1,X2,X3,X4] :
( ( ~ knows(X1)
| knows(symmetric_encrypt(secret,first(extract(decrypt(X4,inverse(k_c)),second(extract(X1,k_ca))))))
| s != first(extract(X1,k_ca))
| n != second(extract(decrypt(X4,inverse(k_c)),second(extract(X1,k_ca))))
| ~ knows(X4) )
& ( ~ knows(X2)
| ~ knows(X0)
| second(extract(X2,X3)) != X3
| knows(concatenate(encrypt(sign(concatenate(kgen(X3),concatenate(X0,eol)),inverse(k_s)),X3),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))))
| ~ knows(X3) )
& knows(concatenate(n,concatenate(k_c,sign(concatenate(c,concatenate(k_c,eol)),inverse(k_c))))) ),
inference(rectify,[],[f39]) ).
fof(f39,plain,
! [X1,X2,X0,X3,X4] :
( ( ~ knows(X2)
| knows(symmetric_encrypt(secret,first(extract(decrypt(X4,inverse(k_c)),second(extract(X2,k_ca))))))
| s != first(extract(X2,k_ca))
| n != second(extract(decrypt(X4,inverse(k_c)),second(extract(X2,k_ca))))
| ~ knows(X4) )
& ( ~ knows(X0)
| ~ knows(X1)
| second(extract(X0,X3)) != X3
| knows(concatenate(encrypt(sign(concatenate(kgen(X3),concatenate(X1,eol)),inverse(k_s)),X3),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))))
| ~ knows(X3) )
& knows(concatenate(n,concatenate(k_c,sign(concatenate(c,concatenate(k_c,eol)),inverse(k_c))))) ),
inference(flattening,[],[f38]) ).
fof(f38,plain,
! [X2,X1,X4,X3,X0] :
( ( knows(concatenate(encrypt(sign(concatenate(kgen(X3),concatenate(X1,eol)),inverse(k_s)),X3),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))))
| ~ knows(X1)
| ~ knows(X0)
| ~ knows(X3)
| second(extract(X0,X3)) != X3 )
& knows(concatenate(n,concatenate(k_c,sign(concatenate(c,concatenate(k_c,eol)),inverse(k_c)))))
& ( knows(symmetric_encrypt(secret,first(extract(decrypt(X4,inverse(k_c)),second(extract(X2,k_ca))))))
| ~ knows(X4)
| n != second(extract(decrypt(X4,inverse(k_c)),second(extract(X2,k_ca))))
| s != first(extract(X2,k_ca))
| ~ knows(X2) ) ),
inference(ennf_transformation,[],[f37]) ).
fof(f37,plain,
! [X2,X1,X4,X3,X0] :
( ( ( knows(X1)
& knows(X0)
& knows(X3)
& second(extract(X0,X3)) = X3 )
=> knows(concatenate(encrypt(sign(concatenate(kgen(X3),concatenate(X1,eol)),inverse(k_s)),X3),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca)))) )
& knows(concatenate(n,concatenate(k_c,sign(concatenate(c,concatenate(k_c,eol)),inverse(k_c)))))
& ( ( knows(X4)
& n = second(extract(decrypt(X4,inverse(k_c)),second(extract(X2,k_ca))))
& s = first(extract(X2,k_ca))
& knows(X2) )
=> knows(symmetric_encrypt(secret,first(extract(decrypt(X4,inverse(k_c)),second(extract(X2,k_ca)))))) ) ),
inference(rectify,[],[f18]) ).
fof(f18,axiom,
! [X8,X6,X10,X7,X9] :
( ( ( knows(X10)
& knows(X9)
& first(extract(X10,k_ca)) = s
& n = second(extract(decrypt(X9,inverse(k_c)),second(extract(X10,k_ca)))) )
=> knows(symmetric_encrypt(secret,first(extract(decrypt(X9,inverse(k_c)),second(extract(X10,k_ca)))))) )
& ( ( knows(X8)
& knows(X6)
& second(extract(X8,X7)) = X7
& knows(X7) )
=> knows(concatenate(encrypt(sign(concatenate(kgen(X7),concatenate(X6,eol)),inverse(k_s)),X7),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca)))) )
& knows(concatenate(n,concatenate(k_c,sign(concatenate(c,concatenate(k_c,eol)),inverse(k_c))))) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',protocol) ).
fof(f309,plain,
( ~ knows(n)
| ~ spl0_14 ),
inference(equality_resolution,[],[f288]) ).
fof(f288,plain,
( ! [X0] :
( n != X0
| ~ knows(X0) )
| ~ spl0_14 ),
inference(avatar_component_clause,[],[f287]) ).
fof(f287,plain,
( spl0_14
<=> ! [X0] :
( n != X0
| ~ knows(X0) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_14])]) ).
fof(f300,plain,
( spl0_15
| spl0_14
| ~ spl0_4
| ~ spl0_5 ),
inference(avatar_split_clause,[],[f294,f149,f142,f287,f297]) ).
fof(f142,plain,
( spl0_4
<=> ! [X0] :
( ~ knows(X0)
| knows(concatenate(encrypt(sign(concatenate(kgen(k_a),concatenate(X0,eol)),inverse(k_s)),k_a),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca)))) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_4])]) ).
fof(f149,plain,
( spl0_5
<=> knows(sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_5])]) ).
fof(f294,plain,
( ! [X0] :
( ~ knows(X0)
| n != X0
| knows(symmetric_encrypt(secret,kgen(k_a))) )
| ~ spl0_4
| ~ spl0_5 ),
inference(resolution,[],[f281,f261]) ).
fof(f261,plain,
( ! [X0] :
( knows(sign(concatenate(kgen(k_a),concatenate(X0,eol)),inverse(k_s)))
| ~ knows(X0) )
| ~ spl0_4 ),
inference(resolution,[],[f259,f109]) ).
fof(f109,plain,
! [X0] :
( ~ knows(encrypt(X0,k_a))
| knows(X0) ),
inference(resolution,[],[f76,f71]) ).
fof(f71,plain,
knows(inverse(k_a)),
inference(cnf_transformation,[],[f17]) ).
fof(f17,axiom,
( knows(inverse(k_a))
& knows(k_a)
& knows(k_ca) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',previous_knowledge) ).
fof(f76,plain,
! [X0,X1] :
( ~ knows(inverse(X0))
| knows(X1)
| ~ knows(encrypt(X1,X0)) ),
inference(cnf_transformation,[],[f55]) ).
fof(f55,plain,
! [X0,X1] :
( ~ knows(encrypt(X1,X0))
| ~ knows(inverse(X0))
| knows(X1) ),
inference(rectify,[],[f48]) ).
fof(f48,plain,
! [X1,X0] :
( ~ knows(encrypt(X0,X1))
| ~ knows(inverse(X1))
| knows(X0) ),
inference(flattening,[],[f47]) ).
fof(f47,plain,
! [X1,X0] :
( knows(X0)
| ~ knows(inverse(X1))
| ~ knows(encrypt(X0,X1)) ),
inference(ennf_transformation,[],[f1]) ).
fof(f1,axiom,
! [X1,X0] :
( ( knows(inverse(X1))
& knows(encrypt(X0,X1)) )
=> knows(X0) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',encrypt_equation) ).
fof(f259,plain,
( ! [X0] :
( knows(encrypt(sign(concatenate(kgen(k_a),concatenate(X0,eol)),inverse(k_s)),k_a))
| ~ knows(X0) )
| ~ spl0_4 ),
inference(resolution,[],[f143,f80]) ).
fof(f143,plain,
( ! [X0] :
( knows(concatenate(encrypt(sign(concatenate(kgen(k_a),concatenate(X0,eol)),inverse(k_s)),k_a),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))))
| ~ knows(X0) )
| ~ spl0_4 ),
inference(avatar_component_clause,[],[f142]) ).
fof(f281,plain,
( ! [X2,X3,X1] :
( ~ knows(sign(concatenate(X1,concatenate(X2,X3)),inverse(k_s)))
| n != X2
| knows(symmetric_encrypt(secret,X1)) )
| ~ spl0_5 ),
inference(subsumption_resolution,[],[f280,f116]) ).
fof(f116,plain,
knows(k_c),
inference(resolution,[],[f113,f80]) ).
fof(f113,plain,
knows(concatenate(k_c,sign(concatenate(c,concatenate(k_c,eol)),inverse(k_c)))),
inference(resolution,[],[f73,f79]) ).
fof(f79,plain,
! [X0,X1] :
( ~ knows(concatenate(X0,X1))
| knows(X1) ),
inference(cnf_transformation,[],[f58]) ).
fof(f280,plain,
( ! [X2,X3,X1] :
( ~ knows(k_c)
| ~ knows(sign(concatenate(X1,concatenate(X2,X3)),inverse(k_s)))
| n != X2
| knows(symmetric_encrypt(secret,X1)) )
| ~ spl0_5 ),
inference(resolution,[],[f278,f61]) ).
fof(f61,plain,
! [X0,X1] :
( knows(encrypt(X0,X1))
| ~ knows(X0)
| ~ knows(X1) ),
inference(cnf_transformation,[],[f52]) ).
fof(f52,plain,
! [X0,X1] :
( ~ knows(X0)
| ~ knows(X1)
| ( knows(sign(X0,X1))
& knows(extract(X0,X1))
& knows(symmetric_decrypt(X0,X1))
& knows(concatenate(X0,X1))
& knows(symmetric_encrypt(X0,X1))
& knows(decrypt(X0,X1))
& knows(encrypt(X0,X1)) ) ),
inference(rectify,[],[f51]) ).
fof(f51,plain,
! [X1,X0] :
( ~ knows(X1)
| ~ knows(X0)
| ( knows(sign(X1,X0))
& knows(extract(X1,X0))
& knows(symmetric_decrypt(X1,X0))
& knows(concatenate(X1,X0))
& knows(symmetric_encrypt(X1,X0))
& knows(decrypt(X1,X0))
& knows(encrypt(X1,X0)) ) ),
inference(flattening,[],[f50]) ).
fof(f50,plain,
! [X1,X0] :
( ( knows(sign(X1,X0))
& knows(extract(X1,X0))
& knows(symmetric_decrypt(X1,X0))
& knows(concatenate(X1,X0))
& knows(symmetric_encrypt(X1,X0))
& knows(decrypt(X1,X0))
& knows(encrypt(X1,X0)) )
| ~ knows(X0)
| ~ knows(X1) ),
inference(ennf_transformation,[],[f25]) ).
fof(f25,plain,
! [X1,X0] :
( ( knows(X0)
& knows(X1) )
=> ( knows(sign(X1,X0))
& knows(extract(X1,X0))
& knows(symmetric_decrypt(X1,X0))
& knows(concatenate(X1,X0))
& knows(symmetric_encrypt(X1,X0))
& knows(decrypt(X1,X0))
& knows(encrypt(X1,X0)) ) ),
inference(rectify,[],[f4]) ).
fof(f4,axiom,
! [X1,X0] :
( ( knows(X0)
& knows(X1) )
=> ( knows(extract(X0,X1))
& knows(symmetric_decrypt(X0,X1))
& knows(concatenate(X0,X1))
& knows(encrypt(X0,X1))
& knows(decrypt(X0,X1))
& knows(sign(X0,X1))
& knows(symmetric_encrypt(X0,X1)) ) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',construct_message_1) ).
fof(f278,plain,
( ! [X2,X0,X1] :
( ~ knows(encrypt(sign(concatenate(X2,concatenate(X0,X1)),inverse(k_s)),k_c))
| knows(symmetric_encrypt(secret,X2))
| n != X0 )
| ~ spl0_5 ),
inference(superposition,[],[f277,f98]) ).
fof(f98,plain,
! [X0,X1] : first(concatenate(X1,X0)) = X1,
inference(definition_unfolding,[],[f77,f87]) ).
fof(f87,plain,
! [X0] : head(X0) = first(X0),
inference(cnf_transformation,[],[f22]) ).
fof(f22,plain,
! [X0] : head(X0) = first(X0),
inference(rectify,[],[f12]) ).
fof(f12,axiom,
! [X4] : first(X4) = head(X4),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',first_axiom) ).
fof(f77,plain,
! [X0,X1] : head(concatenate(X1,X0)) = X1,
inference(cnf_transformation,[],[f56]) ).
fof(f56,plain,
! [X0,X1] : head(concatenate(X1,X0)) = X1,
inference(rectify,[],[f23]) ).
fof(f23,plain,
! [X1,X0] : head(concatenate(X0,X1)) = X0,
inference(rectify,[],[f10]) ).
fof(f10,axiom,
! [X4,X5] : head(concatenate(X4,X5)) = X4,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',head_axiom) ).
fof(f277,plain,
( ! [X0,X1] :
( n != first(X1)
| knows(symmetric_encrypt(secret,X0))
| ~ knows(encrypt(sign(concatenate(X0,X1),inverse(k_s)),k_c)) )
| ~ spl0_5 ),
inference(forward_demodulation,[],[f276,f98]) ).
fof(f276,plain,
( ! [X0,X1] :
( knows(symmetric_encrypt(secret,first(concatenate(X0,X1))))
| n != first(X1)
| ~ knows(encrypt(sign(concatenate(X0,X1),inverse(k_s)),k_c)) )
| ~ spl0_5 ),
inference(superposition,[],[f273,f85]) ).
fof(f85,plain,
! [X0,X1] : tail(concatenate(X0,X1)) = X1,
inference(cnf_transformation,[],[f35]) ).
fof(f35,plain,
! [X0,X1] : tail(concatenate(X0,X1)) = X1,
inference(rectify,[],[f11]) ).
fof(f11,axiom,
! [X4,X5] : tail(concatenate(X4,X5)) = X5,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',tail_axiom) ).
fof(f273,plain,
( ! [X0] :
( n != first(tail(X0))
| ~ knows(encrypt(sign(X0,inverse(k_s)),k_c))
| knows(symmetric_encrypt(secret,first(X0))) )
| ~ spl0_5 ),
inference(superposition,[],[f265,f81]) ).
fof(f81,plain,
! [X0,X1] : extract(sign(X1,inverse(X0)),X0) = X1,
inference(cnf_transformation,[],[f59]) ).
fof(f59,plain,
! [X0,X1] : extract(sign(X1,inverse(X0)),X0) = X1,
inference(rectify,[],[f28]) ).
fof(f28,plain,
! [X1,X0] : extract(sign(X0,inverse(X1)),X1) = X0,
inference(rectify,[],[f9]) ).
fof(f9,axiom,
! [X2,X3] : extract(sign(X2,inverse(X3)),X3) = X2,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',sign_axiom) ).
fof(f265,plain,
( ! [X0] :
( n != first(tail(extract(X0,k_s)))
| ~ knows(encrypt(X0,k_c))
| knows(symmetric_encrypt(secret,first(extract(X0,k_s)))) )
| ~ spl0_5 ),
inference(superposition,[],[f178,f72]) ).
fof(f72,plain,
! [X0,X1] : decrypt(encrypt(X0,X1),inverse(X1)) = X0,
inference(cnf_transformation,[],[f27]) ).
fof(f27,plain,
! [X0,X1] : decrypt(encrypt(X0,X1),inverse(X1)) = X0,
inference(rectify,[],[f7]) ).
fof(f7,axiom,
! [X2,X3] : decrypt(encrypt(X2,X3),inverse(X3)) = X2,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',decrypt_axiom) ).
fof(f178,plain,
( ! [X0] :
( n != first(tail(extract(decrypt(X0,inverse(k_c)),k_s)))
| knows(symmetric_encrypt(secret,first(extract(decrypt(X0,inverse(k_c)),k_s))))
| ~ knows(X0) )
| ~ spl0_5 ),
inference(forward_demodulation,[],[f177,f98]) ).
fof(f177,plain,
( ! [X0] :
( n != first(tail(extract(decrypt(X0,inverse(k_c)),k_s)))
| ~ knows(X0)
| knows(symmetric_encrypt(secret,first(extract(decrypt(X0,inverse(k_c)),first(concatenate(k_s,eol)))))) )
| ~ spl0_5 ),
inference(forward_demodulation,[],[f176,f85]) ).
fof(f176,plain,
( ! [X0] :
( n != first(tail(extract(decrypt(X0,inverse(k_c)),k_s)))
| knows(symmetric_encrypt(secret,first(extract(decrypt(X0,inverse(k_c)),first(tail(concatenate(s,concatenate(k_s,eol))))))))
| ~ knows(X0) )
| ~ spl0_5 ),
inference(forward_demodulation,[],[f175,f98]) ).
fof(f175,plain,
( ! [X0] :
( n != first(tail(extract(decrypt(X0,inverse(k_c)),first(concatenate(k_s,eol)))))
| ~ knows(X0)
| knows(symmetric_encrypt(secret,first(extract(decrypt(X0,inverse(k_c)),first(tail(concatenate(s,concatenate(k_s,eol)))))))) )
| ~ spl0_5 ),
inference(forward_demodulation,[],[f174,f85]) ).
fof(f174,plain,
( ! [X0] :
( n != first(tail(extract(decrypt(X0,inverse(k_c)),first(tail(concatenate(s,concatenate(k_s,eol)))))))
| knows(symmetric_encrypt(secret,first(extract(decrypt(X0,inverse(k_c)),first(tail(concatenate(s,concatenate(k_s,eol))))))))
| ~ knows(X0) )
| ~ spl0_5 ),
inference(subsumption_resolution,[],[f159,f98]) ).
fof(f159,plain,
( ! [X0] :
( n != first(tail(extract(decrypt(X0,inverse(k_c)),first(tail(concatenate(s,concatenate(k_s,eol)))))))
| s != first(concatenate(s,concatenate(k_s,eol)))
| knows(symmetric_encrypt(secret,first(extract(decrypt(X0,inverse(k_c)),first(tail(concatenate(s,concatenate(k_s,eol))))))))
| ~ knows(X0) )
| ~ spl0_5 ),
inference(resolution,[],[f151,f115]) ).
fof(f115,plain,
! [X0,X1] :
( ~ knows(sign(X0,inverse(k_ca)))
| s != first(X0)
| knows(symmetric_encrypt(secret,first(extract(decrypt(X1,inverse(k_c)),first(tail(X0))))))
| n != first(tail(extract(decrypt(X1,inverse(k_c)),first(tail(X0)))))
| ~ knows(X1) ),
inference(superposition,[],[f96,f81]) ).
fof(f96,plain,
! [X1,X4] :
( s != first(extract(X1,k_ca))
| ~ knows(X4)
| ~ knows(X1)
| knows(symmetric_encrypt(secret,first(extract(decrypt(X4,inverse(k_c)),first(tail(extract(X1,k_ca)))))))
| n != first(tail(extract(decrypt(X4,inverse(k_c)),first(tail(extract(X1,k_ca)))))) ),
inference(definition_unfolding,[],[f75,f94,f94,f94]) ).
fof(f94,plain,
! [X0] : second(X0) = first(tail(X0)),
inference(definition_unfolding,[],[f89,f87]) ).
fof(f89,plain,
! [X0] : head(tail(X0)) = second(X0),
inference(cnf_transformation,[],[f30]) ).
fof(f30,plain,
! [X0] : head(tail(X0)) = second(X0),
inference(rectify,[],[f13]) ).
fof(f13,axiom,
! [X4] : second(X4) = head(tail(X4)),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',second_axiom) ).
fof(f75,plain,
! [X1,X4] :
( ~ knows(X1)
| knows(symmetric_encrypt(secret,first(extract(decrypt(X4,inverse(k_c)),second(extract(X1,k_ca))))))
| s != first(extract(X1,k_ca))
| n != second(extract(decrypt(X4,inverse(k_c)),second(extract(X1,k_ca))))
| ~ knows(X4) ),
inference(cnf_transformation,[],[f54]) ).
fof(f151,plain,
( knows(sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca)))
| ~ spl0_5 ),
inference(avatar_component_clause,[],[f149]) ).
fof(f272,plain,
( spl0_12
| spl0_6
| ~ spl0_4
| ~ spl0_5 ),
inference(avatar_split_clause,[],[f266,f149,f142,f153,f269]) ).
fof(f153,plain,
( spl0_6
<=> ! [X1] : ~ knows(X1) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_6])]) ).
fof(f266,plain,
( ! [X0] :
( ~ knows(X0)
| knows(kgen(k_a)) )
| ~ spl0_4
| ~ spl0_5 ),
inference(resolution,[],[f264,f80]) ).
fof(f264,plain,
( ! [X2] :
( knows(concatenate(kgen(k_a),concatenate(X2,eol)))
| ~ knows(X2) )
| ~ spl0_4
| ~ spl0_5 ),
inference(subsumption_resolution,[],[f263,f232]) ).
fof(f232,plain,
( knows(k_s)
| ~ spl0_5 ),
inference(resolution,[],[f180,f80]) ).
fof(f180,plain,
( knows(concatenate(k_s,eol))
| ~ spl0_5 ),
inference(resolution,[],[f162,f79]) ).
fof(f162,plain,
( knows(concatenate(s,concatenate(k_s,eol)))
| ~ spl0_5 ),
inference(subsumption_resolution,[],[f161,f69]) ).
fof(f69,plain,
knows(k_ca),
inference(cnf_transformation,[],[f17]) ).
fof(f161,plain,
( knows(concatenate(s,concatenate(k_s,eol)))
| ~ knows(k_ca)
| ~ spl0_5 ),
inference(resolution,[],[f151,f83]) ).
fof(f83,plain,
! [X0,X1] :
( ~ knows(sign(X0,inverse(X1)))
| ~ knows(X1)
| knows(X0) ),
inference(cnf_transformation,[],[f60]) ).
fof(f60,plain,
! [X0,X1] :
( ~ knows(sign(X0,inverse(X1)))
| knows(X0)
| ~ knows(X1) ),
inference(rectify,[],[f41]) ).
fof(f41,plain,
! [X1,X0] :
( ~ knows(sign(X1,inverse(X0)))
| knows(X1)
| ~ knows(X0) ),
inference(flattening,[],[f40]) ).
fof(f40,plain,
! [X1,X0] :
( knows(X1)
| ~ knows(X0)
| ~ knows(sign(X1,inverse(X0))) ),
inference(ennf_transformation,[],[f33]) ).
fof(f33,plain,
! [X1,X0] :
( ( knows(X0)
& knows(sign(X1,inverse(X0))) )
=> knows(X1) ),
inference(rectify,[],[f3]) ).
fof(f3,axiom,
! [X3,X2] :
( ( knows(sign(X2,inverse(X3)))
& knows(X3) )
=> knows(X2) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',sign_equation) ).
fof(f263,plain,
( ! [X2] :
( knows(concatenate(kgen(k_a),concatenate(X2,eol)))
| ~ knows(X2)
| ~ knows(k_s) )
| ~ spl0_4 ),
inference(resolution,[],[f261,f83]) ).
fof(f255,plain,
( spl0_6
| ~ spl0_9 ),
inference(avatar_split_clause,[],[f254,f186,f153]) ).
fof(f186,plain,
( spl0_9
<=> ! [X0,X1] :
( k_a != X0
| ~ knows(concatenate(X0,X1)) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_9])]) ).
fof(f254,plain,
( ! [X0] : ~ knows(X0)
| ~ spl0_9 ),
inference(subsumption_resolution,[],[f253,f70]) ).
fof(f70,plain,
knows(k_a),
inference(cnf_transformation,[],[f17]) ).
fof(f253,plain,
( ! [X0] :
( ~ knows(X0)
| ~ knows(k_a) )
| ~ spl0_9 ),
inference(resolution,[],[f251,f64]) ).
fof(f64,plain,
! [X0,X1] :
( knows(concatenate(X0,X1))
| ~ knows(X1)
| ~ knows(X0) ),
inference(cnf_transformation,[],[f52]) ).
fof(f251,plain,
( ! [X0] : ~ knows(concatenate(k_a,X0))
| ~ spl0_9 ),
inference(equality_resolution,[],[f187]) ).
fof(f187,plain,
( ! [X0,X1] :
( k_a != X0
| ~ knows(concatenate(X0,X1)) )
| ~ spl0_9 ),
inference(avatar_component_clause,[],[f186]) ).
fof(f231,plain,
~ spl0_6,
inference(avatar_contradiction_clause,[],[f212]) ).
fof(f212,plain,
( $false
| ~ spl0_6 ),
inference(resolution,[],[f154,f112]) ).
fof(f154,plain,
( ! [X1] : ~ knows(X1)
| ~ spl0_6 ),
inference(avatar_component_clause,[],[f153]) ).
fof(f188,plain,
( spl0_9
| spl0_6
| ~ spl0_3 ),
inference(avatar_split_clause,[],[f181,f139,f153,f186]) ).
fof(f139,plain,
( spl0_3
<=> ! [X1] :
( ~ knows(X1)
| k_a != first(tail(X1)) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_3])]) ).
fof(f181,plain,
( ! [X2,X0,X1] :
( ~ knows(X2)
| k_a != X0
| ~ knows(concatenate(X0,X1)) )
| ~ spl0_3 ),
inference(resolution,[],[f158,f64]) ).
fof(f158,plain,
( ! [X2,X0,X1] :
( ~ knows(concatenate(X2,concatenate(X0,X1)))
| k_a != X0 )
| ~ spl0_3 ),
inference(superposition,[],[f145,f98]) ).
fof(f145,plain,
( ! [X0,X1] :
( k_a != first(X1)
| ~ knows(concatenate(X0,X1)) )
| ~ spl0_3 ),
inference(superposition,[],[f140,f85]) ).
fof(f140,plain,
( ! [X1] :
( k_a != first(tail(X1))
| ~ knows(X1) )
| ~ spl0_3 ),
inference(avatar_component_clause,[],[f139]) ).
fof(f155,plain,
( spl0_5
| spl0_6 ),
inference(avatar_split_clause,[],[f147,f153,f149]) ).
fof(f147,plain,
! [X1] :
( ~ knows(X1)
| knows(sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))) ),
inference(resolution,[],[f124,f79]) ).
fof(f124,plain,
! [X0] :
( knows(concatenate(encrypt(sign(concatenate(kgen(k_c),concatenate(X0,eol)),inverse(k_s)),k_c),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))))
| ~ knows(X0) ),
inference(subsumption_resolution,[],[f123,f98]) ).
fof(f123,plain,
! [X0] :
( ~ knows(X0)
| k_c != first(concatenate(k_c,eol))
| knows(concatenate(encrypt(sign(concatenate(kgen(k_c),concatenate(X0,eol)),inverse(k_s)),k_c),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca)))) ),
inference(forward_demodulation,[],[f122,f85]) ).
fof(f122,plain,
! [X0] :
( ~ knows(X0)
| knows(concatenate(encrypt(sign(concatenate(kgen(k_c),concatenate(X0,eol)),inverse(k_s)),k_c),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))))
| k_c != first(tail(concatenate(c,concatenate(k_c,eol)))) ),
inference(subsumption_resolution,[],[f119,f116]) ).
fof(f119,plain,
! [X0] :
( k_c != first(tail(concatenate(c,concatenate(k_c,eol))))
| ~ knows(X0)
| knows(concatenate(encrypt(sign(concatenate(kgen(k_c),concatenate(X0,eol)),inverse(k_s)),k_c),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))))
| ~ knows(k_c) ),
inference(resolution,[],[f117,f114]) ).
fof(f114,plain,
! [X2,X0,X1] :
( ~ knows(sign(X0,inverse(X1)))
| knows(concatenate(encrypt(sign(concatenate(kgen(X1),concatenate(X2,eol)),inverse(k_s)),X1),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))))
| first(tail(X0)) != X1
| ~ knows(X2)
| ~ knows(X1) ),
inference(superposition,[],[f97,f81]) ).
fof(f97,plain,
! [X2,X3,X0] :
( first(tail(extract(X2,X3))) != X3
| ~ knows(X3)
| knows(concatenate(encrypt(sign(concatenate(kgen(X3),concatenate(X0,eol)),inverse(k_s)),X3),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))))
| ~ knows(X2)
| ~ knows(X0) ),
inference(definition_unfolding,[],[f74,f94]) ).
fof(f74,plain,
! [X2,X3,X0] :
( ~ knows(X2)
| ~ knows(X0)
| second(extract(X2,X3)) != X3
| knows(concatenate(encrypt(sign(concatenate(kgen(X3),concatenate(X0,eol)),inverse(k_s)),X3),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))))
| ~ knows(X3) ),
inference(cnf_transformation,[],[f54]) ).
fof(f117,plain,
knows(sign(concatenate(c,concatenate(k_c,eol)),inverse(k_c))),
inference(resolution,[],[f113,f79]) ).
fof(f144,plain,
( spl0_3
| spl0_4 ),
inference(avatar_split_clause,[],[f137,f142,f139]) ).
fof(f137,plain,
! [X0,X1] :
( ~ knows(X0)
| ~ knows(X1)
| knows(concatenate(encrypt(sign(concatenate(kgen(k_a),concatenate(X0,eol)),inverse(k_s)),k_a),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))))
| k_a != first(tail(X1)) ),
inference(subsumption_resolution,[],[f136,f70]) ).
fof(f136,plain,
! [X0,X1] :
( k_a != first(tail(X1))
| knows(concatenate(encrypt(sign(concatenate(kgen(k_a),concatenate(X0,eol)),inverse(k_s)),k_a),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))))
| ~ knows(X0)
| ~ knows(X1)
| ~ knows(k_a) ),
inference(resolution,[],[f118,f71]) ).
fof(f118,plain,
! [X2,X0,X1] :
( ~ knows(inverse(X0))
| knows(concatenate(encrypt(sign(concatenate(kgen(X0),concatenate(X1,eol)),inverse(k_s)),X0),sign(concatenate(s,concatenate(k_s,eol)),inverse(k_ca))))
| ~ knows(X2)
| ~ knows(X1)
| first(tail(X2)) != X0
| ~ knows(X0) ),
inference(resolution,[],[f114,f67]) ).
fof(f67,plain,
! [X0,X1] :
( knows(sign(X0,X1))
| ~ knows(X0)
| ~ knows(X1) ),
inference(cnf_transformation,[],[f52]) ).
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.03/0.12 % Problem : SWV233+1 : TPTP v8.1.0. Released v3.2.0.
% 0.03/0.13 % Command : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_uns --cores 0 -t %d %s
% 0.13/0.35 % Computer : n002.cluster.edu
% 0.13/0.35 % Model : x86_64 x86_64
% 0.13/0.35 % CPU : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.13/0.35 % Memory : 8042.1875MB
% 0.13/0.35 % OS : Linux 3.10.0-693.el7.x86_64
% 0.13/0.35 % CPULimit : 300
% 0.13/0.35 % WCLimit : 300
% 0.13/0.35 % DateTime : Tue Aug 30 19:20:14 EDT 2022
% 0.13/0.35 % CPUTime :
% 0.21/0.49 % (21885)dis+1002_1:12_drc=off:fd=preordered:tgt=full:i=99978:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/99978Mi)
% 0.21/0.49 % (21898)lrs+10_1:4_av=off:bs=unit_only:bsr=unit_only:ep=RS:s2a=on:sos=on:sp=frequency:to=lpo:i=16:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/16Mi)
% 0.21/0.50 % (21906)dis+1010_1:1_bs=on:ep=RS:erd=off:newcnf=on:nwc=10.0:s2a=on:sgt=32:ss=axioms:i=30:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/30Mi)
% 0.21/0.50 % (21894)dis+10_1:1_newcnf=on:sgt=8:sos=on:ss=axioms:to=lpo:urr=on:i=49:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/49Mi)
% 0.21/0.50 % (21906)Refutation not found, incomplete strategy% (21906)------------------------------
% 0.21/0.50 % (21906)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.21/0.50 % (21898)Refutation not found, incomplete strategy% (21898)------------------------------
% 0.21/0.50 % (21898)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.21/0.50 % (21906)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.21/0.50 % (21906)Termination reason: Refutation not found, incomplete strategy
% 0.21/0.50
% 0.21/0.50 % (21906)Memory used [KB]: 6012
% 0.21/0.50 % (21906)Time elapsed: 0.090 s
% 0.21/0.50 % (21906)Instructions burned: 4 (million)
% 0.21/0.50 % (21906)------------------------------
% 0.21/0.50 % (21906)------------------------------
% 0.21/0.50 % (21898)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.21/0.50 % (21898)Termination reason: Refutation not found, incomplete strategy
% 0.21/0.50
% 0.21/0.50 % (21898)Memory used [KB]: 1535
% 0.21/0.50 % (21898)Time elapsed: 0.097 s
% 0.21/0.50 % (21898)Instructions burned: 3 (million)
% 0.21/0.50 % (21898)------------------------------
% 0.21/0.50 % (21898)------------------------------
% 0.21/0.51 % (21903)fmb+10_1:1_nm=2:i=3:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/3Mi)
% 0.21/0.51 % (21914)dis+2_3:1_aac=none:abs=on:ep=R:lcm=reverse:nwc=10.0:sos=on:sp=const_frequency:spb=units:urr=ec_only:i=8:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/8Mi)
% 0.21/0.51 % (21891)dis+21_1:1_av=off:sos=on:sp=frequency:ss=included:to=lpo:i=15:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/15Mi)
% 0.21/0.51 % (21914)Refutation not found, incomplete strategy% (21914)------------------------------
% 0.21/0.51 % (21914)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.21/0.51 % (21914)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.21/0.51 % (21914)Termination reason: Refutation not found, incomplete strategy
% 0.21/0.51
% 0.21/0.51 % (21914)Memory used [KB]: 6012
% 0.21/0.51 % (21914)Time elapsed: 0.098 s
% 0.21/0.51 % (21914)Instructions burned: 2 (million)
% 0.21/0.51 % (21914)------------------------------
% 0.21/0.51 % (21914)------------------------------
% 0.21/0.51 % (21890)lrs+10_1:1024_nm=0:nwc=5.0:ss=axioms:i=13:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/13Mi)
% 0.21/0.51 % (21890)Refutation not found, incomplete strategy% (21890)------------------------------
% 0.21/0.51 % (21890)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.21/0.51 % (21890)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.21/0.51 % (21890)Termination reason: Refutation not found, incomplete strategy
% 0.21/0.51
% 0.21/0.51 % (21890)Memory used [KB]: 5884
% 0.21/0.51 % (21890)Time elapsed: 0.002 s
% 0.21/0.51 % (21890)------------------------------
% 0.21/0.51 % (21890)------------------------------
% 0.21/0.51 % (21911)lrs+11_1:1_plsq=on:plsqc=1:plsqr=32,1:ss=included:i=95:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/95Mi)
% 0.21/0.51 % (21887)lrs+10_1:1_gsp=on:sd=1:sgt=32:sos=on:ss=axioms:i=13:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/13Mi)
% 0.21/0.51 % (21887)Refutation not found, incomplete strategy% (21887)------------------------------
% 0.21/0.51 % (21887)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.21/0.51 % (21887)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.21/0.51 % (21887)Termination reason: Refutation not found, incomplete strategy
% 0.21/0.51
% 0.21/0.51 % (21887)Memory used [KB]: 6012
% 0.21/0.51 % (21887)Time elapsed: 0.104 s
% 0.21/0.51 % (21887)Instructions burned: 3 (million)
% 0.21/0.51 % (21887)------------------------------
% 0.21/0.51 % (21887)------------------------------
% 0.21/0.51 % (21893)lrs+2_1:1_lcm=reverse:lma=on:sos=all:spb=goal_then_units:ss=included:urr=on:i=39:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/39Mi)
% 0.21/0.52 % (21888)dis+1002_1:1_aac=none:bd=off:sac=on:sos=on:spb=units:i=3:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/3Mi)
% 0.21/0.52 % (21910)dis+21_1:1_ep=RS:nwc=10.0:s2a=on:s2at=1.5:i=50:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/50Mi)
% 0.21/0.52 % (21908)dis+1010_2:3_fs=off:fsr=off:nm=0:nwc=5.0:s2a=on:s2agt=32:i=82:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/82Mi)
% 0.21/0.52 % (21895)lrs+10_1:1_br=off:sos=on:ss=axioms:st=2.0:urr=on:i=33:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/33Mi)
% 0.21/0.53 % (21891)Refutation not found, incomplete strategy% (21891)------------------------------
% 0.21/0.53 % (21891)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.21/0.53 % (21891)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.21/0.53 % (21891)Termination reason: Refutation not found, incomplete strategy
% 0.21/0.53
% 0.21/0.53 % (21891)Memory used [KB]: 1535
% 0.21/0.53 % (21891)Time elapsed: 0.118 s
% 0.21/0.53 % (21891)Instructions burned: 3 (million)
% 0.21/0.53 % (21891)------------------------------
% 0.21/0.53 % (21891)------------------------------
% 0.21/0.53 % (21912)lrs+1011_1:1_fd=preordered:fsd=on:sos=on:thsq=on:thsqc=64:thsqd=32:uwa=ground:i=99:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/99Mi)
% 0.21/0.53 % (21900)lrs+10_1:1_ins=3:sp=reverse_frequency:spb=goal:to=lpo:i=3:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/3Mi)
% 0.21/0.53 % (21915)lrs-11_1:1_nm=0:sac=on:sd=4:ss=axioms:st=3.0:i=24:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/24Mi)
% 0.21/0.53 % (21900)Instruction limit reached!
% 0.21/0.53 % (21900)------------------------------
% 0.21/0.53 % (21900)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.21/0.53 % (21900)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.21/0.53 % (21900)Termination reason: Unknown
% 0.21/0.53 % (21900)Termination phase: Saturation
% 0.21/0.53
% 0.21/0.53 % (21900)Memory used [KB]: 6012
% 0.21/0.53 % (21900)Time elapsed: 0.097 s
% 0.21/0.53 % (21900)Instructions burned: 3 (million)
% 0.21/0.53 % (21900)------------------------------
% 0.21/0.53 % (21900)------------------------------
% 0.21/0.53 % (21889)lrs+10_5:1_br=off:fde=none:nwc=3.0:sd=1:sgt=10:sos=on:ss=axioms:urr=on:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 0.21/0.53 % (21913)dis+21_1:1_aac=none:abs=on:er=known:fde=none:fsr=off:nwc=5.0:s2a=on:s2at=4.0:sp=const_frequency:to=lpo:urr=ec_only:i=25:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/25Mi)
% 1.44/0.53 % (21911)First to succeed.
% 1.44/0.53 % (21903)Instruction limit reached!
% 1.44/0.53 % (21903)------------------------------
% 1.44/0.53 % (21903)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.44/0.53 % (21903)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.44/0.53 % (21903)Termination reason: Unknown
% 1.44/0.53 % (21903)Termination phase: Finite model building preprocessing
% 1.44/0.53
% 1.44/0.53 % (21903)Memory used [KB]: 1535
% 1.44/0.53 % (21903)Time elapsed: 0.004 s
% 1.44/0.53 % (21903)Instructions burned: 3 (million)
% 1.44/0.53 % (21903)------------------------------
% 1.44/0.53 % (21903)------------------------------
% 1.44/0.54 % (21896)lrs+10_1:1_ep=R:lcm=predicate:lma=on:sos=all:spb=goal:ss=included:i=12:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/12Mi)
% 1.44/0.54 % (21907)ott+21_1:1_erd=off:s2a=on:sac=on:sd=1:sgt=64:sos=on:ss=included:st=3.0:to=lpo:urr=on:i=99:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/99Mi)
% 1.44/0.54 % (21902)lrs+1011_1:1_fd=preordered:fsd=on:sos=on:thsq=on:thsqc=64:thsqd=32:uwa=ground:i=50:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/50Mi)
% 1.44/0.54 % (21896)Refutation not found, incomplete strategy% (21896)------------------------------
% 1.44/0.54 % (21896)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.44/0.54 % (21896)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.44/0.54 % (21896)Termination reason: Refutation not found, incomplete strategy
% 1.44/0.54
% 1.44/0.54 % (21896)Memory used [KB]: 5884
% 1.44/0.54 % (21896)Time elapsed: 0.129 s
% 1.44/0.54 % (21896)Instructions burned: 2 (million)
% 1.44/0.54 % (21896)------------------------------
% 1.44/0.54 % (21896)------------------------------
% 1.44/0.54 % (21905)dis-10_3:2_amm=sco:ep=RS:fsr=off:nm=10:sd=2:sos=on:ss=axioms:st=3.0:i=11:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/11Mi)
% 1.44/0.54 % (21888)Instruction limit reached!
% 1.44/0.54 % (21888)------------------------------
% 1.44/0.54 % (21888)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.44/0.54 % (21888)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.44/0.54 % (21888)Termination reason: Unknown
% 1.44/0.54 % (21888)Termination phase: Saturation
% 1.44/0.54
% 1.44/0.54 % (21888)Memory used [KB]: 6012
% 1.44/0.54 % (21888)Time elapsed: 0.003 s
% 1.44/0.54 % (21888)Instructions burned: 3 (million)
% 1.44/0.54 % (21888)------------------------------
% 1.44/0.54 % (21888)------------------------------
% 1.44/0.54 % (21905)Refutation not found, incomplete strategy% (21905)------------------------------
% 1.44/0.54 % (21905)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.44/0.54 % (21904)ott+1010_1:1_sd=2:sos=on:sp=occurrence:ss=axioms:urr=on:i=2:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/2Mi)
% 1.44/0.54 % (21904)Refutation not found, incomplete strategy% (21904)------------------------------
% 1.44/0.54 % (21904)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.44/0.54 % (21904)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.44/0.54 % (21904)Termination reason: Refutation not found, incomplete strategy
% 1.44/0.54
% 1.44/0.54 % (21897)lrs+10_1:2_br=off:nm=4:ss=included:urr=on:i=7:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/7Mi)
% 1.44/0.54 % (21904)Memory used [KB]: 5884
% 1.44/0.54 % (21904)Time elapsed: 0.002 s
% 1.44/0.54 % (21904)------------------------------
% 1.44/0.54 % (21904)------------------------------
% 1.44/0.54 % (21905)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.44/0.54 % (21905)Termination reason: Refutation not found, incomplete strategy
% 1.44/0.54
% 1.44/0.54 % (21905)Memory used [KB]: 5884
% 1.44/0.54 % (21905)Time elapsed: 0.131 s
% 1.44/0.54 % (21905)Instructions burned: 3 (million)
% 1.44/0.54 % (21905)------------------------------
% 1.44/0.54 % (21905)------------------------------
% 1.44/0.54 % (21899)lrs+10_1:32_br=off:nm=16:sd=2:ss=axioms:st=2.0:urr=on:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 1.44/0.54 % (21910)Refutation not found, incomplete strategy% (21910)------------------------------
% 1.44/0.54 % (21910)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.44/0.54 % (21897)Instruction limit reached!
% 1.44/0.54 % (21897)------------------------------
% 1.44/0.54 % (21897)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.44/0.54 % (21909)dis+10_1:1_av=off:sos=on:sp=reverse_arity:ss=included:st=2.0:to=lpo:urr=ec_only:i=45:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/45Mi)
% 1.44/0.54 % (21909)Refutation not found, incomplete strategy% (21909)------------------------------
% 1.44/0.54 % (21909)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.44/0.55 % (21901)lrs+10_1:1_drc=off:sp=reverse_frequency:spb=goal:to=lpo:i=7:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/7Mi)
% 1.44/0.55 % (21892)dis+1010_1:50_awrs=decay:awrsf=128:nwc=10.0:s2pl=no:sp=frequency:ss=axioms:i=39:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/39Mi)
% 1.44/0.55 % (21892)Refutation not found, incomplete strategy% (21892)------------------------------
% 1.44/0.55 % (21892)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.44/0.55 % (21892)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.44/0.55 % (21892)Termination reason: Refutation not found, incomplete strategy
% 1.44/0.55
% 1.44/0.55 % (21892)Memory used [KB]: 5884
% 1.44/0.55 % (21892)Time elapsed: 0.001 s
% 1.44/0.55 % (21892)------------------------------
% 1.44/0.55 % (21892)------------------------------
% 1.44/0.55 % (21901)Instruction limit reached!
% 1.44/0.55 % (21901)------------------------------
% 1.44/0.55 % (21901)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.44/0.55 % (21910)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.44/0.55 % (21910)Termination reason: Refutation not found, incomplete strategy
% 1.44/0.55
% 1.44/0.55 % (21910)Memory used [KB]: 6012
% 1.44/0.55 % (21910)Time elapsed: 0.140 s
% 1.44/0.55 % (21910)Instructions burned: 3 (million)
% 1.44/0.55 % (21910)------------------------------
% 1.44/0.55 % (21910)------------------------------
% 1.44/0.55 % (21897)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.44/0.55 % (21897)Termination reason: Unknown
% 1.44/0.55 % (21897)Termination phase: Saturation
% 1.44/0.55
% 1.44/0.55 % (21897)Memory used [KB]: 6140
% 1.44/0.55 % (21897)Time elapsed: 0.144 s
% 1.44/0.55 % (21897)Instructions burned: 8 (million)
% 1.44/0.55 % (21897)------------------------------
% 1.44/0.55 % (21897)------------------------------
% 1.59/0.55 % (21911)Refutation found. Thanks to Tanya!
% 1.59/0.55 % SZS status Theorem for theBenchmark
% 1.59/0.55 % SZS output start Proof for theBenchmark
% See solution above
% 1.59/0.55 % (21911)------------------------------
% 1.59/0.55 % (21911)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.59/0.55 % (21911)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.59/0.55 % (21911)Termination reason: Refutation
% 1.59/0.55
% 1.59/0.55 % (21911)Memory used [KB]: 6140
% 1.59/0.55 % (21911)Time elapsed: 0.125 s
% 1.59/0.55 % (21911)Instructions burned: 11 (million)
% 1.59/0.55 % (21911)------------------------------
% 1.59/0.55 % (21911)------------------------------
% 1.59/0.55 % (21884)Success in time 0.189 s
%------------------------------------------------------------------------------