TSTP Solution File: SWW964+1 by SnakeForV---1.0
View Problem
- Process Solution
%------------------------------------------------------------------------------
% File : SnakeForV---1.0
% Problem : SWW964+1 : TPTP v8.1.0. Released v7.4.0.
% Transfm : none
% Format : tptp:raw
% Command : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_uns --cores 0 -t %d %s
% Computer : n010.cluster.edu
% Model : x86_64 x86_64
% CPU : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory : 8042.1875MB
% OS : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit : 300s
% DateTime : Wed Aug 31 19:15:09 EDT 2022
% Result : Theorem 2.16s 0.67s
% Output : Refutation 2.16s
% Verified :
% SZS Type : Refutation
% Derivation depth : 14
% Number of leaves : 63
% Syntax : Number of formulae : 285 ( 64 unt; 0 def)
% Number of atoms : 736 ( 65 equ)
% Maximal formula atoms : 7 ( 2 avg)
% Number of connectives : 820 ( 369 ~; 340 |; 44 &)
% ( 18 <=>; 49 =>; 0 <=; 0 <~>)
% Maximal formula depth : 12 ( 5 avg)
% Maximal term depth : 7 ( 2 avg)
% Number of predicates : 23 ( 21 usr; 19 prp; 0-2 aty)
% Number of functors : 47 ( 47 usr; 14 con; 0-4 aty)
% Number of variables : 447 ( 445 !; 2 ?)
% Comments :
%------------------------------------------------------------------------------
fof(f1663,plain,
$false,
inference(avatar_sat_refutation,[],[f667,f722,f812,f890,f892,f1039,f1280,f1313,f1318,f1432,f1438,f1455,f1492,f1506,f1580,f1583,f1644,f1660,f1662]) ).
fof(f1662,plain,
( spl3_5
| ~ spl3_39
| ~ spl3_50 ),
inference(avatar_split_clause,[],[f1653,f1641,f1453,f715]) ).
fof(f715,plain,
( spl3_5
<=> pred_attacker(sF1) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_5])]) ).
fof(f1453,plain,
( spl3_39
<=> ! [X7] :
( ~ pred_attacker(constr_ecb_enc_1(X7,constr_pkey(name_skA)))
| pred_attacker(X7) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_39])]) ).
fof(f1641,plain,
( spl3_50
<=> pred_attacker(constr_ecb_enc_1(sF1,constr_pkey(name_skA))) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_50])]) ).
fof(f1653,plain,
( pred_attacker(sF1)
| ~ spl3_39
| ~ spl3_50 ),
inference(resolution,[],[f1643,f1454]) ).
fof(f1454,plain,
( ! [X7] :
( ~ pred_attacker(constr_ecb_enc_1(X7,constr_pkey(name_skA)))
| pred_attacker(X7) )
| ~ spl3_39 ),
inference(avatar_component_clause,[],[f1453]) ).
fof(f1643,plain,
( pred_attacker(constr_ecb_enc_1(sF1,constr_pkey(name_skA)))
| ~ spl3_50 ),
inference(avatar_component_clause,[],[f1641]) ).
fof(f1660,plain,
( spl3_46
| ~ spl3_1 ),
inference(avatar_split_clause,[],[f1659,f655,f1574]) ).
fof(f1574,plain,
( spl3_46
<=> ! [X4] : ~ pred_attacker(tuple_client_B_in_3(X4)) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_46])]) ).
fof(f655,plain,
( spl3_1
<=> ! [X0] :
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X0,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X0)) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_1])]) ).
fof(f1659,plain,
( ! [X0] : ~ pred_attacker(tuple_client_B_in_3(X0))
| ~ spl3_1 ),
inference(subsumption_resolution,[],[f656,f533]) ).
fof(f533,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X1,X0),
inference(cnf_transformation,[],[f423]) ).
fof(f423,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X1,X0),
inference(rectify,[],[f276]) ).
fof(f276,plain,
! [X1,X0] : pred_eq_bitstring_bitstring(X0,X1),
inference(rectify,[],[f96]) ).
fof(f96,axiom,
! [X49,X50] : pred_eq_bitstring_bitstring(X49,X50),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax95) ).
fof(f656,plain,
( ! [X0] :
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X0,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X0)) )
| ~ spl3_1 ),
inference(avatar_component_clause,[],[f655]) ).
fof(f1644,plain,
( spl3_13
| spl3_50
| ~ spl3_47 ),
inference(avatar_split_clause,[],[f1638,f1578,f1641,f938]) ).
fof(f938,plain,
( spl3_13
<=> ! [X1] : ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,name_A)) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_13])]) ).
fof(f1578,plain,
( spl3_47
<=> ! [X2,X0] :
( ~ pred_attacker(tuple_client_B_in_2(X0))
| pred_attacker(constr_ecb_enc_1(name_Nb(X2),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_47])]) ).
fof(f1638,plain,
( ! [X1] :
( pred_attacker(constr_ecb_enc_1(sF1,constr_pkey(name_skA)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,name_A)) )
| ~ spl3_47 ),
inference(resolution,[],[f1609,f573]) ).
fof(f573,plain,
pred_table(tuple_keys(name_A,constr_pkey(name_skA))),
inference(cnf_transformation,[],[f183]) ).
fof(f183,axiom,
pred_table(tuple_keys(name_A,constr_pkey(name_skA))),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax182) ).
fof(f1609,plain,
( ! [X2,X0,X1] :
( ~ pred_table(tuple_keys(X1,X0))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X1))
| pred_attacker(constr_ecb_enc_1(sF1,X0)) )
| ~ spl3_47 ),
inference(resolution,[],[f1607,f903]) ).
fof(f903,plain,
! [X2,X0,X1] :
( pred_attacker(constr_sign(tuple_2(X1,X2),name_skS))
| ~ pred_table(tuple_keys(X1,X2))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
inference(resolution,[],[f538,f584]) ).
fof(f584,plain,
! [X0] :
( ~ pred_attacker(tuple_key_retrieval_server_out_2(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f358]) ).
fof(f358,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_key_retrieval_server_out_2(X0)) ),
inference(ennf_transformation,[],[f227]) ).
fof(f227,plain,
! [X0] :
( pred_attacker(tuple_key_retrieval_server_out_2(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f114]) ).
fof(f114,axiom,
! [X68] :
( pred_attacker(tuple_key_retrieval_server_out_2(X68))
=> pred_attacker(X68) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax113) ).
fof(f538,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X2),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
| ~ pred_table(tuple_keys(X0,X2)) ),
inference(cnf_transformation,[],[f425]) ).
fof(f425,plain,
! [X0,X1,X2] :
( ~ pred_table(tuple_keys(X0,X2))
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X2),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,X0)) ),
inference(rectify,[],[f325]) ).
fof(f325,plain,
! [X2,X0,X1] :
( ~ pred_table(tuple_keys(X2,X1))
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X2,X1),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X2)) ),
inference(flattening,[],[f324]) ).
fof(f324,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X2,X1),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X2))
| ~ pred_table(tuple_keys(X2,X1)) ),
inference(ennf_transformation,[],[f237]) ).
fof(f237,plain,
! [X2,X0,X1] :
( ( pred_attacker(tuple_key_retrieval_server_in_1(X0,X2))
& pred_table(tuple_keys(X2,X1)) )
=> pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X2,X1),name_skS))) ),
inference(rectify,[],[f194]) ).
fof(f194,axiom,
! [X198,X197,X196] :
( ( pred_attacker(tuple_key_retrieval_server_in_1(X198,X196))
& pred_table(tuple_keys(X196,X197)) )
=> pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X196,X197),name_skS))) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax193) ).
fof(f1607,plain,
( ! [X0,X1] :
( ~ pred_attacker(constr_sign(tuple_2(X1,X0),name_skS))
| pred_attacker(constr_ecb_enc_1(sF1,X0)) )
| ~ spl3_47 ),
inference(resolution,[],[f1602,f539]) ).
fof(f539,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f299]) ).
fof(f299,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f208]) ).
fof(f208,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_2(X0)) ),
inference(rectify,[],[f144]) ).
fof(f144,axiom,
! [X122] :
( pred_attacker(X122)
=> pred_attacker(tuple_client_B_in_2(X122)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax143) ).
fof(f1602,plain,
( ! [X0,X1] :
( ~ pred_attacker(tuple_client_B_in_2(constr_sign(tuple_2(X0,X1),name_skS)))
| pred_attacker(constr_ecb_enc_1(sF1,X1)) )
| ~ spl3_47 ),
inference(superposition,[],[f1598,f589]) ).
fof(f589,plain,
! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X1,X0)) = X0,
inference(cnf_transformation,[],[f272]) ).
fof(f272,plain,
! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X1,X0)) = X0,
inference(rectify,[],[f90]) ).
fof(f90,axiom,
! [X36,X35] : constr_tuple_2_get_1_bitstring(tuple_2(X35,X36)) = X36,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax89) ).
fof(f1598,plain,
( ! [X0] :
( pred_attacker(constr_ecb_enc_1(sF1,constr_tuple_2_get_1_bitstring(X0)))
| ~ pred_attacker(tuple_client_B_in_2(constr_sign(X0,name_skS))) )
| ~ spl3_47 ),
inference(superposition,[],[f1596,f502]) ).
fof(f502,plain,
! [X0,X1] : constr_checksign(constr_sign(X0,X1),constr_pkey(X1)) = X0,
inference(cnf_transformation,[],[f415]) ).
fof(f415,plain,
! [X0,X1] : constr_checksign(constr_sign(X0,X1),constr_pkey(X1)) = X0,
inference(rectify,[],[f230]) ).
fof(f230,plain,
! [X1,X0] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
inference(rectify,[],[f81]) ).
fof(f81,axiom,
! [X4,X5] : constr_checksign(constr_sign(X5,X4),constr_pkey(X4)) = X5,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax80) ).
fof(f1596,plain,
( ! [X0] :
( pred_attacker(constr_ecb_enc_1(sF1,constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))
| ~ pred_attacker(tuple_client_B_in_2(X0)) )
| ~ spl3_47 ),
inference(superposition,[],[f1579,f651]) ).
fof(f651,plain,
sF1 = name_Nb(sK0),
introduced(function_definition,[]) ).
fof(f1579,plain,
( ! [X2,X0] :
( pred_attacker(constr_ecb_enc_1(name_Nb(X2),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))
| ~ pred_attacker(tuple_client_B_in_2(X0)) )
| ~ spl3_47 ),
inference(avatar_component_clause,[],[f1578]) ).
fof(f1583,plain,
( spl3_33
| ~ spl3_46 ),
inference(avatar_split_clause,[],[f1582,f1574,f1275]) ).
fof(f1275,plain,
( spl3_33
<=> ! [X2] : ~ pred_attacker(X2) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_33])]) ).
fof(f1582,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl3_46 ),
inference(resolution,[],[f1575,f547]) ).
fof(f547,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f402]) ).
fof(f402,plain,
! [X0] :
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_B_in_3(X0)) ),
inference(ennf_transformation,[],[f270]) ).
fof(f270,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_3(X0)) ),
inference(rectify,[],[f142]) ).
fof(f142,axiom,
! [X120] :
( pred_attacker(X120)
=> pred_attacker(tuple_client_B_in_3(X120)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax141) ).
fof(f1575,plain,
( ! [X4] : ~ pred_attacker(tuple_client_B_in_3(X4))
| ~ spl3_46 ),
inference(avatar_component_clause,[],[f1574]) ).
fof(f1580,plain,
( spl3_46
| spl3_47 ),
inference(avatar_split_clause,[],[f1564,f1578,f1574]) ).
fof(f1564,plain,
! [X2,X0,X1] :
( ~ pred_attacker(tuple_client_B_in_2(X0))
| pred_attacker(constr_ecb_enc_1(name_Nb(X2),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))
| ~ pred_attacker(tuple_client_B_in_3(X1)) ),
inference(resolution,[],[f1541,f626]) ).
fof(f626,plain,
! [X2,X0,X1] :
( ~ pred_attacker(tuple_3(X1,X2,X0))
| pred_attacker(X2) ),
inference(cnf_transformation,[],[f442]) ).
fof(f442,plain,
! [X0,X1,X2] :
( ~ pred_attacker(tuple_3(X1,X2,X0))
| pred_attacker(X2) ),
inference(rectify,[],[f405]) ).
fof(f405,plain,
! [X1,X2,X0] :
( ~ pred_attacker(tuple_3(X2,X0,X1))
| pred_attacker(X0) ),
inference(ennf_transformation,[],[f210]) ).
fof(f210,plain,
! [X1,X0,X2] :
( pred_attacker(tuple_3(X2,X0,X1))
=> pred_attacker(X0) ),
inference(rectify,[],[f170]) ).
fof(f170,axiom,
! [X167,X168,X166] :
( pred_attacker(tuple_3(X166,X167,X168))
=> pred_attacker(X167) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax169) ).
fof(f1541,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X2),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_2(X1))
| ~ pred_attacker(tuple_client_B_in_3(X0)) ),
inference(resolution,[],[f1520,f501]) ).
fof(f501,plain,
! [X0] :
( ~ pred_attacker(tuple_client_B_out_4(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f386]) ).
fof(f386,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_B_out_4(X0)) ),
inference(ennf_transformation,[],[f238]) ).
fof(f238,plain,
! [X0] :
( pred_attacker(tuple_client_B_out_4(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f136]) ).
fof(f136,axiom,
! [X111] :
( pred_attacker(tuple_client_B_out_4(X111))
=> pred_attacker(X111) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax135) ).
fof(f1520,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_B_out_4(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_attacker(tuple_client_B_in_2(X2)) ),
inference(subsumption_resolution,[],[f1519,f533]) ).
fof(f1519,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_B_out_4(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1)) ),
inference(subsumption_resolution,[],[f644,f533]) ).
fof(f644,plain,
! [X2,X0,X1] :
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| pred_attacker(tuple_client_B_out_4(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))) ),
inference(definition_unfolding,[],[f468,f555]) ).
fof(f555,plain,
! [X2,X3,X0,X1] : constr_ecb_enc_3(X1,X2,X0,X3) = tuple_3(constr_ecb_enc_1(X1,X3),constr_ecb_enc_1(X2,X3),constr_ecb_enc_1(X0,X3)),
inference(cnf_transformation,[],[f429]) ).
fof(f429,plain,
! [X0,X1,X2,X3] : constr_ecb_enc_3(X1,X2,X0,X3) = tuple_3(constr_ecb_enc_1(X1,X3),constr_ecb_enc_1(X2,X3),constr_ecb_enc_1(X0,X3)),
inference(rectify,[],[f246]) ).
fof(f246,plain,
! [X0,X3,X2,X1] : constr_ecb_enc_3(X3,X2,X0,X1) = tuple_3(constr_ecb_enc_1(X3,X1),constr_ecb_enc_1(X2,X1),constr_ecb_enc_1(X0,X1)),
inference(rectify,[],[f87]) ).
fof(f87,axiom,
! [X28,X25,X27,X26] : constr_ecb_enc_3(X26,X27,X28,X25) = tuple_3(constr_ecb_enc_1(X26,X25),constr_ecb_enc_1(X27,X25),constr_ecb_enc_1(X28,X25)),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax86) ).
fof(f468,plain,
! [X2,X0,X1] :
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
| pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X0),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS)))) ),
inference(cnf_transformation,[],[f408]) ).
fof(f408,plain,
! [X0,X1,X2] :
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
| pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X0),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS)))) ),
inference(rectify,[],[f377]) ).
fof(f377,plain,
! [X2,X1,X0] :
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
| pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X2),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS)))) ),
inference(flattening,[],[f376]) ).
fof(f376,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X2),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ),
inference(ennf_transformation,[],[f294]) ).
fof(f294,plain,
! [X2,X0,X1] :
( ( pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_2(X0))
& pred_attacker(tuple_client_B_in_3(X1))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) )
=> pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X2),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
inference(rectify,[],[f192]) ).
fof(f192,axiom,
! [X191,X190,X189] :
( ( pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X190,name_skB)))
& pred_attacker(tuple_client_B_in_3(X190))
& pred_attacker(tuple_client_B_in_2(X191))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X191,constr_pkey(name_skS)))) )
=> pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X190,name_skB)),name_Nb(X189),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X191,constr_pkey(name_skS)))))) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax191) ).
fof(f1506,plain,
( spl3_33
| ~ spl3_38 ),
inference(avatar_split_clause,[],[f1505,f1450,f1275]) ).
fof(f1450,plain,
( spl3_38
<=> ! [X8] : ~ pred_attacker(constr_ecb_enc_1(X8,constr_pkey(name_skA))) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_38])]) ).
fof(f1505,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl3_38 ),
inference(subsumption_resolution,[],[f1493,f673]) ).
fof(f673,plain,
pred_attacker(constr_pkey(name_skA)),
inference(resolution,[],[f565,f474]) ).
fof(f474,plain,
pred_attacker(tuple_out_1(constr_pkey(name_skA))),
inference(cnf_transformation,[],[f185]) ).
fof(f185,axiom,
pred_attacker(tuple_out_1(constr_pkey(name_skA))),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax184) ).
fof(f565,plain,
! [X0] :
( ~ pred_attacker(tuple_out_1(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f371]) ).
fof(f371,plain,
! [X0] :
( ~ pred_attacker(tuple_out_1(X0))
| pred_attacker(X0) ),
inference(ennf_transformation,[],[f290]) ).
fof(f290,plain,
! [X0] :
( pred_attacker(tuple_out_1(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f112]) ).
fof(f112,axiom,
! [X66] :
( pred_attacker(tuple_out_1(X66))
=> pred_attacker(X66) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax111) ).
fof(f1493,plain,
( ! [X0] :
( ~ pred_attacker(constr_pkey(name_skA))
| ~ pred_attacker(X0) )
| ~ spl3_38 ),
inference(resolution,[],[f1451,f458]) ).
fof(f458,plain,
! [X0,X1] :
( pred_attacker(constr_ecb_enc_1(X1,X0))
| ~ pred_attacker(X0)
| ~ pred_attacker(X1) ),
inference(cnf_transformation,[],[f317]) ).
fof(f317,plain,
! [X0,X1] :
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(constr_ecb_enc_1(X1,X0)) ),
inference(flattening,[],[f316]) ).
fof(f316,plain,
! [X1,X0] :
( pred_attacker(constr_ecb_enc_1(X1,X0))
| ~ pred_attacker(X0)
| ~ pred_attacker(X1) ),
inference(ennf_transformation,[],[f231]) ).
fof(f231,plain,
! [X1,X0] :
( ( pred_attacker(X0)
& pred_attacker(X1) )
=> pred_attacker(constr_ecb_enc_1(X1,X0)) ),
inference(rectify,[],[f127]) ).
fof(f127,axiom,
! [X97,X96] :
( ( pred_attacker(X96)
& pred_attacker(X97) )
=> pred_attacker(constr_ecb_enc_1(X96,X97)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax126) ).
fof(f1451,plain,
( ! [X8] : ~ pred_attacker(constr_ecb_enc_1(X8,constr_pkey(name_skA)))
| ~ spl3_38 ),
inference(avatar_component_clause,[],[f1450]) ).
fof(f1492,plain,
~ spl3_37,
inference(avatar_contradiction_clause,[],[f1491]) ).
fof(f1491,plain,
( $false
| ~ spl3_37 ),
inference(subsumption_resolution,[],[f1490,f522]) ).
fof(f522,plain,
pred_attacker(constr_CONST_3),
inference(cnf_transformation,[],[f159]) ).
fof(f159,axiom,
pred_attacker(constr_CONST_3),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax158) ).
fof(f1490,plain,
( ~ pred_attacker(constr_CONST_3)
| ~ spl3_37 ),
inference(equality_resolution,[],[f1489]) ).
fof(f1489,plain,
( ! [X0] :
( constr_CONST_3 != X0
| ~ pred_attacker(X0) )
| ~ spl3_37 ),
inference(duplicate_literal_removal,[],[f1470]) ).
fof(f1470,plain,
( ! [X0] :
( constr_CONST_3 != X0
| ~ pred_attacker(X0)
| constr_CONST_3 != X0 )
| ~ spl3_37 ),
inference(superposition,[],[f492,f1458]) ).
fof(f1458,plain,
( ! [X0] :
( name_A = X0
| ~ pred_attacker(X0)
| constr_CONST_3 != X0 )
| ~ spl3_37 ),
inference(superposition,[],[f455,f1437]) ).
fof(f1437,plain,
( ! [X0] :
( name_B = X0
| name_A = X0
| ~ pred_attacker(X0) )
| ~ spl3_37 ),
inference(avatar_component_clause,[],[f1436]) ).
fof(f1436,plain,
( spl3_37
<=> ! [X0] :
( ~ pred_attacker(X0)
| name_A = X0
| name_B = X0 ) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_37])]) ).
fof(f455,plain,
constr_CONST_3 != name_B,
inference(cnf_transformation,[],[f36]) ).
fof(f36,axiom,
constr_CONST_3 != name_B,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax35) ).
fof(f492,plain,
constr_CONST_3 != name_A,
inference(cnf_transformation,[],[f35]) ).
fof(f35,axiom,
constr_CONST_3 != name_A,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax34) ).
fof(f1455,plain,
( spl3_38
| spl3_38
| spl3_39
| ~ spl3_36 ),
inference(avatar_split_clause,[],[f1448,f1311,f1453,f1450,f1450]) ).
fof(f1311,plain,
( spl3_36
<=> ! [X10] :
( ~ pred_attacker(tuple_client_A_in_4(X10))
| pred_attacker(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X10,name_skA))) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_36])]) ).
fof(f1448,plain,
( ! [X8,X9,X7] :
( ~ pred_attacker(constr_ecb_enc_1(X7,constr_pkey(name_skA)))
| ~ pred_attacker(constr_ecb_enc_1(X9,constr_pkey(name_skA)))
| pred_attacker(X7)
| ~ pred_attacker(constr_ecb_enc_1(X8,constr_pkey(name_skA))) )
| ~ spl3_36 ),
inference(resolution,[],[f1445,f535]) ).
fof(f535,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_3(X0,X2,X1))
| ~ pred_attacker(X0)
| ~ pred_attacker(X2)
| ~ pred_attacker(X1) ),
inference(cnf_transformation,[],[f424]) ).
fof(f424,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_3(X0,X2,X1))
| ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| ~ pred_attacker(X2) ),
inference(rectify,[],[f365]) ).
fof(f365,plain,
! [X2,X1,X0] :
( pred_attacker(tuple_3(X2,X0,X1))
| ~ pred_attacker(X2)
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f364]) ).
fof(f364,plain,
! [X2,X1,X0] :
( pred_attacker(tuple_3(X2,X0,X1))
| ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| ~ pred_attacker(X2) ),
inference(ennf_transformation,[],[f204]) ).
fof(f204,plain,
! [X2,X1,X0] :
( ( pred_attacker(X0)
& pred_attacker(X1)
& pred_attacker(X2) )
=> pred_attacker(tuple_3(X2,X0,X1)) ),
inference(rectify,[],[f168]) ).
fof(f168,axiom,
! [X161,X162,X160] :
( ( pred_attacker(X162)
& pred_attacker(X161)
& pred_attacker(X160) )
=> pred_attacker(tuple_3(X160,X161,X162)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax167) ).
fof(f1445,plain,
( ! [X2,X0,X1] :
( ~ pred_attacker(tuple_3(constr_ecb_enc_1(X1,constr_pkey(name_skA)),constr_ecb_enc_1(X0,constr_pkey(name_skA)),constr_ecb_enc_1(X2,constr_pkey(name_skA))))
| pred_attacker(X0) )
| ~ spl3_36 ),
inference(resolution,[],[f1440,f519]) ).
fof(f519,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f329]) ).
fof(f329,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f286]) ).
fof(f286,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_A_in_4(X0)) ),
inference(rectify,[],[f153]) ).
fof(f153,axiom,
! [X134] :
( pred_attacker(X134)
=> pred_attacker(tuple_client_A_in_4(X134)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax152) ).
fof(f1440,plain,
( ! [X2,X0,X1] :
( ~ pred_attacker(tuple_client_A_in_4(tuple_3(constr_ecb_enc_1(X0,constr_pkey(name_skA)),constr_ecb_enc_1(X1,constr_pkey(name_skA)),constr_ecb_enc_1(X2,constr_pkey(name_skA)))))
| pred_attacker(X1) )
| ~ spl3_36 ),
inference(forward_demodulation,[],[f1439,f583]) ).
fof(f583,plain,
! [X2,X0,X1] : constr_tuple_3_get_1_bitstring(tuple_3(X0,X1,X2)) = X1,
inference(cnf_transformation,[],[f432]) ).
fof(f432,plain,
! [X0,X1,X2] : constr_tuple_3_get_1_bitstring(tuple_3(X0,X1,X2)) = X1,
inference(rectify,[],[f256]) ).
fof(f256,plain,
! [X1,X0,X2] : constr_tuple_3_get_1_bitstring(tuple_3(X1,X0,X2)) = X0,
inference(rectify,[],[f89]) ).
fof(f89,axiom,
! [X33,X32,X34] : constr_tuple_3_get_1_bitstring(tuple_3(X32,X33,X34)) = X33,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax88) ).
fof(f1439,plain,
( ! [X2,X0,X1] :
( ~ pred_attacker(tuple_client_A_in_4(tuple_3(constr_ecb_enc_1(X0,constr_pkey(name_skA)),constr_ecb_enc_1(X1,constr_pkey(name_skA)),constr_ecb_enc_1(X2,constr_pkey(name_skA)))))
| pred_attacker(constr_tuple_3_get_1_bitstring(tuple_3(X0,X1,X2))) )
| ~ spl3_36 ),
inference(superposition,[],[f1312,f643]) ).
fof(f643,plain,
! [X2,X3,X0,X1] : tuple_3(X3,X0,X2) = constr_ecb_dec_3(tuple_3(constr_ecb_enc_1(X3,constr_pkey(X1)),constr_ecb_enc_1(X0,constr_pkey(X1)),constr_ecb_enc_1(X2,constr_pkey(X1))),X1),
inference(definition_unfolding,[],[f453,f555]) ).
fof(f453,plain,
! [X2,X3,X0,X1] : constr_ecb_dec_3(constr_ecb_enc_3(X3,X0,X2,constr_pkey(X1)),X1) = tuple_3(X3,X0,X2),
inference(cnf_transformation,[],[f407]) ).
fof(f407,plain,
! [X0,X1,X2,X3] : constr_ecb_dec_3(constr_ecb_enc_3(X3,X0,X2,constr_pkey(X1)),X1) = tuple_3(X3,X0,X2),
inference(rectify,[],[f259]) ).
fof(f259,plain,
! [X3,X2,X1,X0] : constr_ecb_dec_3(constr_ecb_enc_3(X0,X3,X1,constr_pkey(X2)),X2) = tuple_3(X0,X3,X1),
inference(rectify,[],[f83]) ).
fof(f83,axiom,
! [X12,X14,X11,X13] : constr_ecb_dec_3(constr_ecb_enc_3(X12,X13,X14,constr_pkey(X11)),X11) = tuple_3(X12,X13,X14),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax82) ).
fof(f1312,plain,
( ! [X10] :
( pred_attacker(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X10,name_skA)))
| ~ pred_attacker(tuple_client_A_in_4(X10)) )
| ~ spl3_36 ),
inference(avatar_component_clause,[],[f1311]) ).
fof(f1438,plain,
( spl3_37
| spl3_33
| ~ spl3_34 ),
inference(avatar_split_clause,[],[f1434,f1278,f1275,f1436]) ).
fof(f1278,plain,
( spl3_34
<=> ! [X0,X1] :
( name_B = X0
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
| name_A = X0 ) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_34])]) ).
fof(f1434,plain,
( ! [X0,X1] :
( ~ pred_attacker(X1)
| ~ pred_attacker(X0)
| name_B = X0
| name_A = X0 )
| ~ spl3_34 ),
inference(resolution,[],[f1279,f605]) ).
fof(f605,plain,
! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| ~ pred_attacker(X0)
| ~ pred_attacker(X1) ),
inference(cnf_transformation,[],[f438]) ).
fof(f438,plain,
! [X0,X1] :
( ~ pred_attacker(X1)
| ~ pred_attacker(X0)
| pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
inference(rectify,[],[f344]) ).
fof(f344,plain,
! [X1,X0] :
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(tuple_key_retrieval_server_in_1(X1,X0)) ),
inference(flattening,[],[f343]) ).
fof(f343,plain,
! [X1,X0] :
( pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
| ~ pred_attacker(X0)
| ~ pred_attacker(X1) ),
inference(ennf_transformation,[],[f226]) ).
fof(f226,plain,
! [X1,X0] :
( ( pred_attacker(X0)
& pred_attacker(X1) )
=> pred_attacker(tuple_key_retrieval_server_in_1(X1,X0)) ),
inference(rectify,[],[f115]) ).
fof(f115,axiom,
! [X70,X69] :
( ( pred_attacker(X70)
& pred_attacker(X69) )
=> pred_attacker(tuple_key_retrieval_server_in_1(X69,X70)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax114) ).
fof(f1279,plain,
( ! [X0,X1] :
( ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
| name_A = X0
| name_B = X0 )
| ~ spl3_34 ),
inference(avatar_component_clause,[],[f1278]) ).
fof(f1432,plain,
~ spl3_33,
inference(avatar_contradiction_clause,[],[f1327]) ).
fof(f1327,plain,
( $false
| ~ spl3_33 ),
inference(resolution,[],[f1276,f490]) ).
fof(f490,plain,
pred_attacker(name_c),
inference(cnf_transformation,[],[f177]) ).
fof(f177,axiom,
pred_attacker(name_c),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax176) ).
fof(f1276,plain,
( ! [X2] : ~ pred_attacker(X2)
| ~ spl3_33 ),
inference(avatar_component_clause,[],[f1275]) ).
fof(f1318,plain,
( spl3_29
| ~ spl3_32 ),
inference(avatar_split_clause,[],[f1316,f1264,f1247]) ).
fof(f1247,plain,
( spl3_29
<=> ! [X11,X12,X10] :
( ~ pred_attacker(X12)
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X10,X11))
| ~ pred_table(tuple_keys(X11,constr_pkey(X12))) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_29])]) ).
fof(f1264,plain,
( spl3_32
<=> ! [X0,X1] :
( ~ pred_attacker(X1)
| ~ pred_attacker(tuple_client_A_in_2(constr_sign(tuple_2(X0,constr_pkey(X1)),name_skS))) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_32])]) ).
fof(f1316,plain,
( ! [X2,X0,X1] :
( ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X1))
| ~ pred_table(tuple_keys(X1,constr_pkey(X0)))
| ~ pred_attacker(X0) )
| ~ spl3_32 ),
inference(resolution,[],[f1315,f903]) ).
fof(f1315,plain,
( ! [X0,X1] :
( ~ pred_attacker(constr_sign(tuple_2(X1,constr_pkey(X0)),name_skS))
| ~ pred_attacker(X0) )
| ~ spl3_32 ),
inference(resolution,[],[f1265,f536]) ).
fof(f536,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_2(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f306]) ).
fof(f306,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_2(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f289]) ).
fof(f289,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_A_in_2(X0)) ),
inference(rectify,[],[f155]) ).
fof(f155,axiom,
! [X136] :
( pred_attacker(X136)
=> pred_attacker(tuple_client_A_in_2(X136)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax154) ).
fof(f1265,plain,
( ! [X0,X1] :
( ~ pred_attacker(tuple_client_A_in_2(constr_sign(tuple_2(X0,constr_pkey(X1)),name_skS)))
| ~ pred_attacker(X1) )
| ~ spl3_32 ),
inference(avatar_component_clause,[],[f1264]) ).
fof(f1313,plain,
( spl3_36
| spl3_32 ),
inference(avatar_split_clause,[],[f1304,f1264,f1311]) ).
fof(f1304,plain,
! [X10,X8,X9] :
( ~ pred_attacker(tuple_client_A_in_2(constr_sign(tuple_2(X8,constr_pkey(X9)),name_skS)))
| ~ pred_attacker(X9)
| ~ pred_attacker(tuple_client_A_in_4(X10))
| pred_attacker(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X10,name_skA))) ),
inference(resolution,[],[f1294,f708]) ).
fof(f708,plain,
! [X0,X1] :
( ~ pred_attacker(constr_ecb_enc_1(X0,constr_pkey(X1)))
| pred_attacker(X0)
| ~ pred_attacker(X1) ),
inference(superposition,[],[f487,f449]) ).
fof(f449,plain,
! [X0,X1] : constr_ecb_dec_1(constr_ecb_enc_1(X1,constr_pkey(X0)),X0) = X1,
inference(cnf_transformation,[],[f406]) ).
fof(f406,plain,
! [X0,X1] : constr_ecb_dec_1(constr_ecb_enc_1(X1,constr_pkey(X0)),X0) = X1,
inference(rectify,[],[f293]) ).
fof(f293,plain,
! [X1,X0] : constr_ecb_dec_1(constr_ecb_enc_1(X0,constr_pkey(X1)),X1) = X0,
inference(rectify,[],[f85]) ).
fof(f85,axiom,
! [X19,X18] : constr_ecb_dec_1(constr_ecb_enc_1(X19,constr_pkey(X18)),X18) = X19,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax84) ).
fof(f487,plain,
! [X0,X1] :
( pred_attacker(constr_ecb_dec_1(X1,X0))
| ~ pred_attacker(X0)
| ~ pred_attacker(X1) ),
inference(cnf_transformation,[],[f412]) ).
fof(f412,plain,
! [X0,X1] :
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(constr_ecb_dec_1(X1,X0)) ),
inference(rectify,[],[f394]) ).
fof(f394,plain,
! [X1,X0] :
( ~ pred_attacker(X1)
| ~ pred_attacker(X0)
| pred_attacker(constr_ecb_dec_1(X0,X1)) ),
inference(flattening,[],[f393]) ).
fof(f393,plain,
! [X0,X1] :
( pred_attacker(constr_ecb_dec_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f255]) ).
fof(f255,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(constr_ecb_dec_1(X0,X1)) ),
inference(rectify,[],[f131]) ).
fof(f131,axiom,
! [X104,X105] :
( ( pred_attacker(X105)
& pred_attacker(X104) )
=> pred_attacker(constr_ecb_dec_1(X104,X105)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax130) ).
fof(f1294,plain,
! [X2,X0,X1] :
( pred_attacker(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X2,name_skA)),X1))
| ~ pred_attacker(tuple_client_A_in_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(tuple_client_A_in_4(X2)) ),
inference(superposition,[],[f1291,f589]) ).
fof(f1291,plain,
! [X0,X1] :
( pred_attacker(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X1,name_skA)),constr_tuple_2_get_1_bitstring(X0)))
| ~ pred_attacker(tuple_client_A_in_2(constr_sign(X0,name_skS)))
| ~ pred_attacker(tuple_client_A_in_4(X1)) ),
inference(superposition,[],[f1286,f502]) ).
fof(f1286,plain,
! [X0,X1] :
( pred_attacker(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))
| ~ pred_attacker(tuple_client_A_in_2(X0))
| ~ pred_attacker(tuple_client_A_in_4(X1)) ),
inference(resolution,[],[f1283,f559]) ).
fof(f559,plain,
! [X0] :
( ~ pred_attacker(tuple_client_A_out_5(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f300]) ).
fof(f300,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_A_out_5(X0)) ),
inference(ennf_transformation,[],[f249]) ).
fof(f249,plain,
! [X0] :
( pred_attacker(tuple_client_A_out_5(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f147]) ).
fof(f147,axiom,
! [X125] :
( pred_attacker(tuple_client_A_out_5(X125))
=> pred_attacker(X125) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax146) ).
fof(f1283,plain,
! [X2,X0] :
( pred_attacker(tuple_client_A_out_5(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_attacker(tuple_client_A_in_4(X0)) ),
inference(subsumption_resolution,[],[f1282,f533]) ).
fof(f1282,plain,
! [X2,X0] :
( ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_3_get_2(constr_ecb_dec_3(X0,name_skA)))
| pred_attacker(tuple_client_A_out_5(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
inference(subsumption_resolution,[],[f1281,f533]) ).
fof(f1281,plain,
! [X2,X0,X1] :
( ~ pred_eq_bitstring_bitstring(name_Na(X1),constr_tuple_3_get_0x30(constr_ecb_dec_3(X0,name_skA)))
| pred_attacker(tuple_client_A_out_5(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_3_get_2(constr_ecb_dec_3(X0,name_skA)))
| ~ pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_attacker(tuple_client_A_in_2(X2)) ),
inference(subsumption_resolution,[],[f601,f533]) ).
fof(f601,plain,
! [X2,X0,X1] :
( ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| pred_attacker(tuple_client_A_out_5(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_3_get_2(constr_ecb_dec_3(X0,name_skA)))
| ~ pred_eq_bitstring_bitstring(name_Na(X1),constr_tuple_3_get_0x30(constr_ecb_dec_3(X0,name_skA)))
| ~ pred_attacker(tuple_client_A_in_4(X0)) ),
inference(cnf_transformation,[],[f437]) ).
fof(f437,plain,
! [X0,X1,X2] :
( ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| pred_attacker(tuple_client_A_out_5(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_eq_bitstring_bitstring(name_Na(X1),constr_tuple_3_get_0x30(constr_ecb_dec_3(X0,name_skA)))
| ~ pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_3_get_2(constr_ecb_dec_3(X0,name_skA))) ),
inference(rectify,[],[f399]) ).
fof(f399,plain,
! [X2,X0,X1] :
( ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
| pred_attacker(tuple_client_A_out_5(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X2,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_3_get_0x30(constr_ecb_dec_3(X2,name_skA)))
| ~ pred_attacker(tuple_client_A_in_4(X2))
| ~ pred_attacker(tuple_client_A_in_2(X1))
| ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_3_get_2(constr_ecb_dec_3(X2,name_skA))) ),
inference(flattening,[],[f398]) ).
fof(f398,plain,
! [X2,X1,X0] :
( pred_attacker(tuple_client_A_out_5(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X2,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
| ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_3_get_0x30(constr_ecb_dec_3(X2,name_skA)))
| ~ pred_attacker(tuple_client_A_in_2(X1))
| ~ pred_attacker(tuple_client_A_in_4(X2))
| ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_3_get_2(constr_ecb_dec_3(X2,name_skA))) ),
inference(ennf_transformation,[],[f209]) ).
fof(f209,plain,
! [X2,X1,X0] :
( ( pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
& pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_3_get_0x30(constr_ecb_dec_3(X2,name_skA)))
& pred_attacker(tuple_client_A_in_2(X1))
& pred_attacker(tuple_client_A_in_4(X2))
& pred_eq_bitstring_bitstring(name_I,constr_tuple_3_get_2(constr_ecb_dec_3(X2,name_skA))) )
=> pred_attacker(tuple_client_A_out_5(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X2,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))))) ),
inference(rectify,[],[f190]) ).
fof(f190,axiom,
! [X186,X188,X187] :
( ( pred_attacker(tuple_client_A_in_2(X188))
& pred_eq_bitstring_bitstring(name_I,constr_tuple_3_get_2(constr_ecb_dec_3(X187,name_skA)))
& pred_eq_bitstring_bitstring(name_Na(X186),constr_tuple_3_get_0x30(constr_ecb_dec_3(X187,name_skA)))
& pred_attacker(tuple_client_A_in_4(X187))
& pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X188,constr_pkey(name_skS)))) )
=> pred_attacker(tuple_client_A_out_5(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(X187,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X188,constr_pkey(name_skS)))))) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax189) ).
fof(f1280,plain,
( spl3_33
| spl3_34
| ~ spl3_29 ),
inference(avatar_split_clause,[],[f1273,f1247,f1278,f1275]) ).
fof(f1273,plain,
( ! [X2,X0,X1] :
( name_B = X0
| name_A = X0
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
| ~ pred_attacker(X2) )
| ~ spl3_29 ),
inference(subsumption_resolution,[],[f1272,f595]) ).
fof(f595,plain,
! [X0] :
( pred_attacker(constr_pkey(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f368]) ).
fof(f368,plain,
! [X0] :
( ~ pred_attacker(X0)
| pred_attacker(constr_pkey(X0)) ),
inference(ennf_transformation,[],[f200]) ).
fof(f200,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(constr_pkey(X0)) ),
inference(rectify,[],[f106]) ).
fof(f106,axiom,
! [X60] :
( pred_attacker(X60)
=> pred_attacker(constr_pkey(X60)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax105) ).
fof(f1272,plain,
( ! [X2,X0,X1] :
( ~ pred_attacker(X2)
| name_B = X0
| name_A = X0
| ~ pred_attacker(constr_pkey(X2))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,X0)) )
| ~ spl3_29 ),
inference(subsumption_resolution,[],[f1271,f638]) ).
fof(f638,plain,
! [X0,X1] :
( ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f367]) ).
fof(f367,plain,
! [X0,X1] :
( ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
| pred_attacker(X0) ),
inference(ennf_transformation,[],[f218]) ).
fof(f218,plain,
! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f117]) ).
fof(f117,axiom,
! [X74,X73] :
( pred_attacker(tuple_key_retrieval_server_in_1(X73,X74))
=> pred_attacker(X74) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax116) ).
fof(f1271,plain,
( ! [X2,X0,X1] :
( ~ pred_attacker(X2)
| ~ pred_attacker(X0)
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
| name_A = X0
| ~ pred_attacker(constr_pkey(X2))
| name_B = X0 )
| ~ spl3_29 ),
inference(resolution,[],[f1256,f617]) ).
fof(f617,plain,
! [X0,X1] :
( pred_attacker(tuple_key_register_server_in_1(X1,X0))
| ~ pred_attacker(X0)
| ~ pred_attacker(X1) ),
inference(cnf_transformation,[],[f440]) ).
fof(f440,plain,
! [X0,X1] :
( pred_attacker(tuple_key_register_server_in_1(X1,X0))
| ~ pred_attacker(X0)
| ~ pred_attacker(X1) ),
inference(rectify,[],[f404]) ).
fof(f404,plain,
! [X1,X0] :
( pred_attacker(tuple_key_register_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f403]) ).
fof(f403,plain,
! [X1,X0] :
( pred_attacker(tuple_key_register_server_in_1(X0,X1))
| ~ pred_attacker(X0)
| ~ pred_attacker(X1) ),
inference(ennf_transformation,[],[f247]) ).
fof(f247,plain,
! [X1,X0] :
( ( pred_attacker(X0)
& pred_attacker(X1) )
=> pred_attacker(tuple_key_register_server_in_1(X0,X1)) ),
inference(rectify,[],[f118]) ).
fof(f118,axiom,
! [X75,X76] :
( ( pred_attacker(X75)
& pred_attacker(X76) )
=> pred_attacker(tuple_key_register_server_in_1(X75,X76)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax117) ).
fof(f1256,plain,
( ! [X2,X3,X4] :
( ~ pred_attacker(tuple_key_register_server_in_1(X4,constr_pkey(X2)))
| name_A = X4
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X3,X4))
| name_B = X4
| ~ pred_attacker(X2) )
| ~ spl3_29 ),
inference(resolution,[],[f1248,f639]) ).
fof(f639,plain,
! [X0,X1] :
( pred_table(tuple_keys(X0,X1))
| name_A = X0
| name_B = X0
| ~ pred_attacker(tuple_key_register_server_in_1(X0,X1)) ),
inference(cnf_transformation,[],[f447]) ).
fof(f447,plain,
! [X0,X1] :
( pred_table(tuple_keys(X0,X1))
| name_B = X0
| name_A = X0
| ~ pred_attacker(tuple_key_register_server_in_1(X0,X1)) ),
inference(rectify,[],[f315]) ).
fof(f315,plain,
! [X1,X0] :
( pred_table(tuple_keys(X1,X0))
| name_B = X1
| name_A = X1
| ~ pred_attacker(tuple_key_register_server_in_1(X1,X0)) ),
inference(flattening,[],[f314]) ).
fof(f314,plain,
! [X1,X0] :
( pred_table(tuple_keys(X1,X0))
| ~ pred_attacker(tuple_key_register_server_in_1(X1,X0))
| name_B = X1
| name_A = X1 ),
inference(ennf_transformation,[],[f233]) ).
fof(f233,plain,
! [X1,X0] :
( ( pred_attacker(tuple_key_register_server_in_1(X1,X0))
& name_B != X1
& name_A != X1 )
=> pred_table(tuple_keys(X1,X0)) ),
inference(rectify,[],[f195]) ).
fof(f195,axiom,
! [X200,X199] :
( ( name_B != X199
& name_A != X199
& pred_attacker(tuple_key_register_server_in_1(X199,X200)) )
=> pred_table(tuple_keys(X199,X200)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax194) ).
fof(f1248,plain,
( ! [X10,X11,X12] :
( ~ pred_table(tuple_keys(X11,constr_pkey(X12)))
| ~ pred_attacker(X12)
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X10,X11)) )
| ~ spl3_29 ),
inference(avatar_component_clause,[],[f1247]) ).
fof(f1039,plain,
~ spl3_13,
inference(avatar_contradiction_clause,[],[f1013]) ).
fof(f1013,plain,
( $false
| ~ spl3_13 ),
inference(resolution,[],[f954,f594]) ).
fof(f594,plain,
pred_attacker(tuple_client_A_out_1(name_A,name_I)),
inference(cnf_transformation,[],[f188]) ).
fof(f188,axiom,
pred_attacker(tuple_client_A_out_1(name_A,name_I)),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax187) ).
fof(f954,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl3_13 ),
inference(subsumption_resolution,[],[f953,f543]) ).
fof(f543,plain,
pred_attacker(name_A),
inference(cnf_transformation,[],[f180]) ).
fof(f180,axiom,
pred_attacker(name_A),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax179) ).
fof(f953,plain,
( ! [X0] :
( ~ pred_attacker(X0)
| ~ pred_attacker(name_A) )
| ~ spl3_13 ),
inference(resolution,[],[f939,f605]) ).
fof(f939,plain,
( ! [X1] : ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,name_A))
| ~ spl3_13 ),
inference(avatar_component_clause,[],[f938]) ).
fof(f892,plain,
( spl3_6
| ~ spl3_4 ),
inference(avatar_split_clause,[],[f891,f664,f719]) ).
fof(f719,plain,
( spl3_6
<=> pred_attacker(name_objective) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_6])]) ).
fof(f664,plain,
( spl3_4
<=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_4])]) ).
fof(f891,plain,
( pred_attacker(name_objective)
| ~ spl3_4 ),
inference(resolution,[],[f666,f558]) ).
fof(f558,plain,
! [X0] :
( ~ pred_attacker(tuple_client_B_out_6(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f380]) ).
fof(f380,plain,
! [X0] :
( ~ pred_attacker(tuple_client_B_out_6(X0))
| pred_attacker(X0) ),
inference(ennf_transformation,[],[f292]) ).
fof(f292,plain,
! [X0] :
( pred_attacker(tuple_client_B_out_6(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f134]) ).
fof(f134,axiom,
! [X109] :
( pred_attacker(tuple_client_B_out_6(X109))
=> pred_attacker(X109) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax133) ).
fof(f666,plain,
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ spl3_4 ),
inference(avatar_component_clause,[],[f664]) ).
fof(f890,plain,
~ spl3_3,
inference(avatar_contradiction_clause,[],[f856]) ).
fof(f856,plain,
( $false
| ~ spl3_3 ),
inference(resolution,[],[f814,f520]) ).
fof(f520,plain,
pred_attacker(tuple_false),
inference(cnf_transformation,[],[f122]) ).
fof(f122,axiom,
pred_attacker(tuple_false),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax121) ).
fof(f814,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl3_3 ),
inference(resolution,[],[f813,f539]) ).
fof(f813,plain,
( ! [X1] : ~ pred_attacker(tuple_client_B_in_2(X1))
| ~ spl3_3 ),
inference(subsumption_resolution,[],[f662,f533]) ).
fof(f662,plain,
( ! [X1] :
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_2(X1)) )
| ~ spl3_3 ),
inference(avatar_component_clause,[],[f661]) ).
fof(f661,plain,
( spl3_3
<=> ! [X1] :
( ~ pred_attacker(tuple_client_B_in_2(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS)))) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_3])]) ).
fof(f812,plain,
~ spl3_2,
inference(avatar_contradiction_clause,[],[f737]) ).
fof(f737,plain,
( $false
| ~ spl3_2 ),
inference(resolution,[],[f736,f579]) ).
fof(f579,plain,
pred_attacker(constr_CONST_0x30),
inference(cnf_transformation,[],[f162]) ).
fof(f162,axiom,
pred_attacker(constr_CONST_0x30),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax161) ).
fof(f736,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl3_2 ),
inference(resolution,[],[f735,f497]) ).
fof(f497,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f392]) ).
fof(f392,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f221]) ).
fof(f221,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_5(X0)) ),
inference(rectify,[],[f140]) ).
fof(f140,axiom,
! [X118] :
( pred_attacker(X118)
=> pred_attacker(tuple_client_B_in_5(X118)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax139) ).
fof(f735,plain,
( ! [X3] : ~ pred_attacker(tuple_client_B_in_5(X3))
| ~ spl3_2 ),
inference(subsumption_resolution,[],[f659,f533]) ).
fof(f659,plain,
( ! [X2,X3] :
( ~ pred_attacker(tuple_client_B_in_5(X3))
| ~ pred_eq_bitstring_bitstring(name_Nb(X2),constr_ecb_dec_1(X3,name_skB)) )
| ~ spl3_2 ),
inference(avatar_component_clause,[],[f658]) ).
fof(f658,plain,
( spl3_2
<=> ! [X2,X3] :
( ~ pred_eq_bitstring_bitstring(name_Nb(X2),constr_ecb_dec_1(X3,name_skB))
| ~ pred_attacker(tuple_client_B_in_5(X3)) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_2])]) ).
fof(f722,plain,
( ~ spl3_5
| ~ spl3_6 ),
inference(avatar_split_clause,[],[f713,f719,f715]) ).
fof(f713,plain,
( ~ pred_attacker(name_objective)
| ~ pred_attacker(sF1) ),
inference(subsumption_resolution,[],[f712,f653]) ).
fof(f653,plain,
~ pred_attacker(sF2),
inference(definition_folding,[],[f509,f652,f651]) ).
fof(f652,plain,
tuple_2(sF1,name_objective) = sF2,
introduced(function_definition,[]) ).
fof(f509,plain,
~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
inference(cnf_transformation,[],[f417]) ).
fof(f417,plain,
~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
inference(skolemisation,[status(esa),new_symbols(skolem,[sK0])],[f381,f416]) ).
fof(f416,plain,
( ? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective))
=> ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)) ),
introduced(choice_axiom,[]) ).
fof(f381,plain,
? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective)),
inference(ennf_transformation,[],[f222]) ).
fof(f222,plain,
~ ! [X0] : pred_attacker(tuple_2(name_Nb(X0),name_objective)),
inference(rectify,[],[f197]) ).
fof(f197,negated_conjecture,
~ ! [X201] : pred_attacker(tuple_2(name_Nb(X201),name_objective)),
inference(negated_conjecture,[],[f196]) ).
fof(f196,conjecture,
! [X201] : pred_attacker(tuple_2(name_Nb(X201),name_objective)),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',co0) ).
fof(f712,plain,
( ~ pred_attacker(name_objective)
| pred_attacker(sF2)
| ~ pred_attacker(sF1) ),
inference(superposition,[],[f552,f652]) ).
fof(f552,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X1,X0))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f428]) ).
fof(f428,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X1,X0))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(rectify,[],[f374]) ).
fof(f374,plain,
! [X1,X0] :
( pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X0)
| ~ pred_attacker(X1) ),
inference(flattening,[],[f373]) ).
fof(f373,plain,
! [X1,X0] :
( pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f285]) ).
fof(f285,plain,
! [X1,X0] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(tuple_2(X0,X1)) ),
inference(rectify,[],[f172]) ).
fof(f172,axiom,
! [X172,X173] :
( ( pred_attacker(X172)
& pred_attacker(X173) )
=> pred_attacker(tuple_2(X172,X173)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax171) ).
fof(f667,plain,
( spl3_1
| spl3_2
| spl3_3
| spl3_4 ),
inference(avatar_split_clause,[],[f517,f664,f661,f658,f655]) ).
fof(f517,plain,
! [X2,X3,X0,X1] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X1))
| ~ pred_eq_bitstring_bitstring(name_Nb(X2),constr_ecb_dec_1(X3,name_skB))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X0,name_skB)))
| ~ pred_attacker(tuple_client_B_in_5(X3))
| ~ pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS)))) ),
inference(cnf_transformation,[],[f420]) ).
fof(f420,plain,
! [X0,X1,X2,X3] :
( ~ pred_attacker(tuple_client_B_in_3(X0))
| pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
| ~ pred_eq_bitstring_bitstring(name_Nb(X2),constr_ecb_dec_1(X3,name_skB))
| ~ pred_attacker(tuple_client_B_in_5(X3))
| ~ pred_attacker(tuple_client_B_in_2(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X0,name_skB))) ),
inference(rectify,[],[f336]) ).
fof(f336,plain,
! [X0,X3,X1,X2] :
( ~ pred_attacker(tuple_client_B_in_3(X0))
| pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_eq_bitstring_bitstring(name_Nb(X1),constr_ecb_dec_1(X2,name_skB))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X0,name_skB))) ),
inference(flattening,[],[f335]) ).
fof(f335,plain,
! [X3,X0,X1,X2] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X0,name_skB)))
| ~ pred_eq_bitstring_bitstring(name_Nb(X1),constr_ecb_dec_1(X2,name_skB))
| ~ pred_attacker(tuple_client_B_in_3(X0)) ),
inference(ennf_transformation,[],[f278]) ).
fof(f278,plain,
! [X3,X0,X1,X2] :
( ( pred_attacker(tuple_client_B_in_5(X2))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_2(X3))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X0,name_skB)))
& pred_eq_bitstring_bitstring(name_Nb(X1),constr_ecb_dec_1(X2,name_skB))
& pred_attacker(tuple_client_B_in_3(X0)) )
=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(rectify,[],[f193]) ).
fof(f193,axiom,
! [X193,X192,X194,X195] :
( ( pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X193,name_skB)))
& pred_eq_bitstring_bitstring(name_Nb(X192),constr_ecb_dec_1(X194,name_skB))
& pred_attacker(tuple_client_B_in_3(X193))
& pred_attacker(tuple_client_B_in_2(X195))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X195,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_5(X194)) )
=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax192) ).
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.07/0.12 % Problem : SWW964+1 : TPTP v8.1.0. Released v7.4.0.
% 0.07/0.13 % Command : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_uns --cores 0 -t %d %s
% 0.13/0.34 % Computer : n010.cluster.edu
% 0.13/0.34 % Model : x86_64 x86_64
% 0.13/0.34 % CPU : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.13/0.34 % Memory : 8042.1875MB
% 0.13/0.34 % OS : Linux 3.10.0-693.el7.x86_64
% 0.13/0.34 % CPULimit : 300
% 0.13/0.34 % WCLimit : 300
% 0.13/0.34 % DateTime : Tue Aug 30 21:11:29 EDT 2022
% 0.13/0.34 % CPUTime :
% 0.19/0.56 % (24397)lrs+2_1:1_lcm=reverse:lma=on:sos=all:spb=goal_then_units:ss=included:urr=on:i=39:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/39Mi)
% 0.19/0.56 % (24390)dis+1002_1:12_drc=off:fd=preordered:tgt=full:i=99978:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/99978Mi)
% 0.19/0.56 % (24414)dis+21_1:1_ep=RS:nwc=10.0:s2a=on:s2at=1.5:i=50:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/50Mi)
% 0.19/0.56 % (24413)dis+10_1:1_av=off:sos=on:sp=reverse_arity:ss=included:st=2.0:to=lpo:urr=ec_only:i=45:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/45Mi)
% 0.19/0.56 % (24398)dis+10_1:1_newcnf=on:sgt=8:sos=on:ss=axioms:to=lpo:urr=on:i=49:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/49Mi)
% 0.19/0.56 % (24419)lrs-11_1:1_nm=0:sac=on:sd=4:ss=axioms:st=3.0:i=24:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/24Mi)
% 0.19/0.57 % (24403)lrs+10_1:32_br=off:nm=16:sd=2:ss=axioms:st=2.0:urr=on:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 0.19/0.57 % (24415)lrs+11_1:1_plsq=on:plsqc=1:plsqr=32,1:ss=included:i=95:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/95Mi)
% 0.19/0.57 % (24405)lrs+10_1:1_drc=off:sp=reverse_frequency:spb=goal:to=lpo:i=7:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/7Mi)
% 0.19/0.58 % (24405)Instruction limit reached!
% 0.19/0.58 % (24405)------------------------------
% 0.19/0.58 % (24405)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.19/0.58 % (24406)lrs+1011_1:1_fd=preordered:fsd=on:sos=on:thsq=on:thsqc=64:thsqd=32:uwa=ground:i=50:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/50Mi)
% 0.19/0.58 % (24405)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.19/0.58 % (24405)Termination reason: Unknown
% 0.19/0.58 % (24405)Termination phase: Saturation
% 0.19/0.58
% 0.19/0.58 % (24405)Memory used [KB]: 6396
% 0.19/0.58 % (24405)Time elapsed: 0.006 s
% 0.19/0.58 % (24405)Instructions burned: 7 (million)
% 0.19/0.58 % (24405)------------------------------
% 0.19/0.58 % (24405)------------------------------
% 0.19/0.58 % (24401)lrs+10_1:2_br=off:nm=4:ss=included:urr=on:i=7:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/7Mi)
% 0.19/0.58 % (24413)Refutation not found, incomplete strategy% (24413)------------------------------
% 0.19/0.58 % (24413)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.19/0.58 % (24413)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.19/0.58 % (24413)Termination reason: Refutation not found, incomplete strategy
% 0.19/0.58
% 0.19/0.58 % (24413)Memory used [KB]: 2046
% 0.19/0.58 % (24413)Time elapsed: 0.149 s
% 0.19/0.58 % (24413)Instructions burned: 10 (million)
% 0.19/0.58 % (24413)------------------------------
% 0.19/0.58 % (24413)------------------------------
% 0.19/0.58 % (24399)lrs+10_1:1_br=off:sos=on:ss=axioms:st=2.0:urr=on:i=33:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/33Mi)
% 0.19/0.58 % (24392)dis+1002_1:1_aac=none:bd=off:sac=on:sos=on:spb=units:i=3:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/3Mi)
% 0.19/0.58 % (24406)Refutation not found, incomplete strategy% (24406)------------------------------
% 0.19/0.58 % (24406)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.19/0.58 % (24406)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.19/0.58 % (24406)Termination reason: Refutation not found, incomplete strategy
% 0.19/0.58
% 0.19/0.58 % (24406)Memory used [KB]: 6652
% 0.19/0.58 % (24406)Time elapsed: 0.161 s
% 0.19/0.58 % (24406)Instructions burned: 9 (million)
% 0.19/0.58 % (24406)------------------------------
% 0.19/0.58 % (24406)------------------------------
% 0.19/0.59 % (24410)dis+1010_1:1_bs=on:ep=RS:erd=off:newcnf=on:nwc=10.0:s2a=on:sgt=32:ss=axioms:i=30:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/30Mi)
% 0.19/0.59 % (24417)dis+21_1:1_aac=none:abs=on:er=known:fde=none:fsr=off:nwc=5.0:s2a=on:s2at=4.0:sp=const_frequency:to=lpo:urr=ec_only:i=25:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/25Mi)
% 0.19/0.59 % (24408)ott+1010_1:1_sd=2:sos=on:sp=occurrence:ss=axioms:urr=on:i=2:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/2Mi)
% 0.19/0.59 % (24412)dis+1010_2:3_fs=off:fsr=off:nm=0:nwc=5.0:s2a=on:s2agt=32:i=82:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/82Mi)
% 1.82/0.59 % (24394)lrs+10_1:1024_nm=0:nwc=5.0:ss=axioms:i=13:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/13Mi)
% 1.82/0.59 % (24408)Instruction limit reached!
% 1.82/0.59 % (24408)------------------------------
% 1.82/0.59 % (24408)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.82/0.59 % (24408)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.82/0.59 % (24408)Termination reason: Unknown
% 1.82/0.59 % (24408)Termination phase: Preprocessing 1
% 1.82/0.59
% 1.82/0.59 % (24408)Memory used [KB]: 1535
% 1.82/0.59 % (24408)Time elapsed: 0.005 s
% 1.82/0.59 % (24408)Instructions burned: 2 (million)
% 1.82/0.59 % (24400)lrs+10_1:1_ep=R:lcm=predicate:lma=on:sos=all:spb=goal:ss=included:i=12:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/12Mi)
% 1.82/0.59 % (24408)------------------------------
% 1.82/0.59 % (24408)------------------------------
% 1.82/0.59 % (24416)lrs+1011_1:1_fd=preordered:fsd=on:sos=on:thsq=on:thsqc=64:thsqd=32:uwa=ground:i=99:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/99Mi)
% 1.82/0.59 % (24396)dis+1010_1:50_awrs=decay:awrsf=128:nwc=10.0:s2pl=no:sp=frequency:ss=axioms:i=39:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/39Mi)
% 1.82/0.59 % (24395)dis+21_1:1_av=off:sos=on:sp=frequency:ss=included:to=lpo:i=15:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/15Mi)
% 1.82/0.59 % (24407)fmb+10_1:1_nm=2:i=3:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/3Mi)
% 1.82/0.60 % (24418)dis+2_3:1_aac=none:abs=on:ep=R:lcm=reverse:nwc=10.0:sos=on:sp=const_frequency:spb=units:urr=ec_only:i=8:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/8Mi)
% 1.82/0.60 % (24407)Instruction limit reached!
% 1.82/0.60 % (24407)------------------------------
% 1.82/0.60 % (24407)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.82/0.60 % (24407)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.82/0.60 % (24407)Termination reason: Unknown
% 1.82/0.60 % (24407)Termination phase: Preprocessing 2
% 1.82/0.60
% 1.82/0.60 % (24407)Memory used [KB]: 1791
% 1.82/0.60 % (24407)Time elapsed: 0.002 s
% 1.82/0.60 % (24407)Instructions burned: 3 (million)
% 1.82/0.60 % (24407)------------------------------
% 1.82/0.60 % (24407)------------------------------
% 1.82/0.60 % (24393)lrs+10_5:1_br=off:fde=none:nwc=3.0:sd=1:sgt=10:sos=on:ss=axioms:urr=on:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 1.82/0.60 % (24401)Instruction limit reached!
% 1.82/0.60 % (24401)------------------------------
% 1.82/0.60 % (24401)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.82/0.60 % (24401)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.82/0.60 % (24401)Termination reason: Unknown
% 1.82/0.60 % (24401)Termination phase: Saturation
% 1.82/0.60
% 1.82/0.60 % (24401)Memory used [KB]: 6396
% 1.82/0.60 % (24401)Time elapsed: 0.006 s
% 1.82/0.60 % (24401)Instructions burned: 8 (million)
% 1.82/0.60 % (24401)------------------------------
% 1.82/0.60 % (24401)------------------------------
% 1.82/0.60 % (24396)Refutation not found, incomplete strategy% (24396)------------------------------
% 1.82/0.60 % (24396)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.82/0.60 % (24396)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.82/0.60 % (24396)Termination reason: Refutation not found, incomplete strategy
% 1.82/0.60
% 1.82/0.60 % (24396)Memory used [KB]: 6396
% 1.82/0.60 % (24396)Time elapsed: 0.176 s
% 1.82/0.60 % (24396)Instructions burned: 11 (million)
% 1.82/0.60 % (24396)------------------------------
% 1.82/0.60 % (24396)------------------------------
% 1.82/0.60 % (24409)dis-10_3:2_amm=sco:ep=RS:fsr=off:nm=10:sd=2:sos=on:ss=axioms:st=3.0:i=11:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/11Mi)
% 1.82/0.60 % (24418)Instruction limit reached!
% 1.82/0.60 % (24418)------------------------------
% 1.82/0.60 % (24418)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.82/0.60 % (24418)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.82/0.60 % (24418)Termination reason: Unknown
% 1.82/0.60 % (24418)Termination phase: Saturation
% 1.82/0.60
% 1.82/0.60 % (24418)Memory used [KB]: 6524
% 1.82/0.60 % (24418)Time elapsed: 0.005 s
% 1.82/0.60 % (24418)Instructions burned: 9 (million)
% 1.82/0.60 % (24418)------------------------------
% 1.82/0.60 % (24418)------------------------------
% 1.82/0.60 % (24404)lrs+10_1:1_ins=3:sp=reverse_frequency:spb=goal:to=lpo:i=3:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/3Mi)
% 1.82/0.60 % (24391)lrs+10_1:1_gsp=on:sd=1:sgt=32:sos=on:ss=axioms:i=13:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/13Mi)
% 1.82/0.60 % (24402)lrs+10_1:4_av=off:bs=unit_only:bsr=unit_only:ep=RS:s2a=on:sos=on:sp=frequency:to=lpo:i=16:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/16Mi)
% 1.82/0.60 % (24409)Refutation not found, incomplete strategy% (24409)------------------------------
% 1.82/0.60 % (24409)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.82/0.60 % (24409)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.82/0.60 % (24409)Termination reason: Refutation not found, incomplete strategy
% 1.82/0.60
% 1.82/0.60 % (24409)Memory used [KB]: 6268
% 1.82/0.60 % (24409)Time elapsed: 0.185 s
% 1.82/0.60 % (24409)Instructions burned: 5 (million)
% 1.82/0.60 % (24409)------------------------------
% 1.82/0.60 % (24409)------------------------------
% 1.82/0.60 % (24391)Refutation not found, incomplete strategy% (24391)------------------------------
% 1.82/0.60 % (24391)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.82/0.60 % (24404)Instruction limit reached!
% 1.82/0.60 % (24404)------------------------------
% 1.82/0.60 % (24404)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.82/0.60 % (24391)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.82/0.60 % (24391)Termination reason: Refutation not found, incomplete strategy
% 1.82/0.60 % (24404)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.82/0.60
% 1.82/0.60 % (24404)Termination reason: Unknown
% 1.82/0.60 % (24404)Termination phase: Property scanning
% 1.82/0.60
% 1.82/0.60 % (24391)Memory used [KB]: 6140
% 1.82/0.60 % (24391)Time elapsed: 0.144 s
% 1.82/0.60 % (24404)Memory used [KB]: 1791
% 1.82/0.60 % (24391)Instructions burned: 3 (million)
% 1.82/0.60 % (24391)------------------------------
% 1.82/0.60 % (24391)------------------------------
% 1.82/0.60 % (24404)Time elapsed: 0.003 s
% 1.82/0.60 % (24404)Instructions burned: 5 (million)
% 1.82/0.60 % (24404)------------------------------
% 1.82/0.60 % (24404)------------------------------
% 1.82/0.60 % (24392)Instruction limit reached!
% 1.82/0.60 % (24392)------------------------------
% 1.82/0.60 % (24392)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.82/0.60 % (24392)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.82/0.60 % (24392)Termination reason: Unknown
% 1.82/0.60 % (24392)Termination phase: Naming
% 1.82/0.60
% 1.82/0.60 % (24392)Memory used [KB]: 1791
% 1.82/0.60 % (24392)Time elapsed: 0.004 s
% 1.82/0.60 % (24392)Instructions burned: 3 (million)
% 1.82/0.60 % (24392)------------------------------
% 1.82/0.60 % (24392)------------------------------
% 1.82/0.60 % (24419)Instruction limit reached!
% 1.82/0.60 % (24419)------------------------------
% 1.82/0.60 % (24419)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.82/0.60 % (24419)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.82/0.60 % (24419)Termination reason: Unknown
% 1.82/0.60 % (24419)Termination phase: Saturation
% 1.82/0.60
% 1.82/0.60 % (24419)Memory used [KB]: 6652
% 1.82/0.60 % (24419)Time elapsed: 0.195 s
% 1.82/0.60 % (24419)Instructions burned: 25 (million)
% 1.82/0.60 % (24419)------------------------------
% 1.82/0.60 % (24419)------------------------------
% 1.82/0.60 % (24395)Refutation not found, incomplete strategy% (24395)------------------------------
% 1.82/0.60 % (24395)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.82/0.60 % (24395)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.82/0.60 % (24395)Termination reason: Refutation not found, incomplete strategy
% 1.82/0.60
% 1.82/0.60 % (24395)Memory used [KB]: 2046
% 1.82/0.60 % (24395)Time elapsed: 0.183 s
% 1.82/0.60 % (24395)Instructions burned: 8 (million)
% 1.82/0.60 % (24395)------------------------------
% 1.82/0.60 % (24395)------------------------------
% 1.82/0.60 % (24402)Refutation not found, incomplete strategy% (24402)------------------------------
% 1.82/0.60 % (24402)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.05/0.61 % (24411)ott+21_1:1_erd=off:s2a=on:sac=on:sd=1:sgt=64:sos=on:ss=included:st=3.0:to=lpo:urr=on:i=99:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/99Mi)
% 2.05/0.61 % (24402)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.05/0.61 % (24402)Termination reason: Refutation not found, incomplete strategy
% 2.05/0.61
% 2.05/0.61 % (24402)Memory used [KB]: 2046
% 2.05/0.61 % (24402)Time elapsed: 0.189 s
% 2.05/0.61 % (24402)Instructions burned: 9 (million)
% 2.05/0.61 % (24402)------------------------------
% 2.05/0.61 % (24402)------------------------------
% 2.05/0.61 % (24394)Refutation not found, incomplete strategy% (24394)------------------------------
% 2.05/0.61 % (24394)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.05/0.61 % (24394)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.05/0.61 % (24394)Termination reason: Refutation not found, incomplete strategy
% 2.05/0.61
% 2.05/0.61 % (24394)Memory used [KB]: 6396
% 2.05/0.61 % (24394)Time elapsed: 0.177 s
% 2.05/0.61 % (24394)Instructions burned: 10 (million)
% 2.05/0.61 % (24394)------------------------------
% 2.05/0.61 % (24394)------------------------------
% 2.05/0.61 % (24400)Refutation not found, incomplete strategy% (24400)------------------------------
% 2.05/0.61 % (24400)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.05/0.61 % (24400)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.05/0.61 % (24400)Termination reason: Refutation not found, incomplete strategy
% 2.05/0.61
% 2.05/0.61 % (24400)Memory used [KB]: 6524
% 2.05/0.61 % (24400)Time elapsed: 0.199 s
% 2.05/0.61 % (24400)Instructions burned: 10 (million)
% 2.05/0.61 % (24400)------------------------------
% 2.05/0.61 % (24400)------------------------------
% 2.05/0.62 % (24397)Instruction limit reached!
% 2.05/0.62 % (24397)------------------------------
% 2.05/0.62 % (24397)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.05/0.62 % (24417)Instruction limit reached!
% 2.05/0.62 % (24417)------------------------------
% 2.05/0.62 % (24417)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.05/0.62 % (24417)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.05/0.62 % (24417)Termination reason: Unknown
% 2.05/0.62 % (24417)Termination phase: Saturation
% 2.05/0.62
% 2.05/0.62 % (24417)Memory used [KB]: 6780
% 2.05/0.62 % (24417)Time elapsed: 0.213 s
% 2.05/0.62 % (24417)Instructions burned: 25 (million)
% 2.05/0.62 % (24417)------------------------------
% 2.05/0.62 % (24417)------------------------------
% 2.05/0.62 % (24397)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.05/0.62 % (24397)Termination reason: Unknown
% 2.05/0.62 % (24397)Termination phase: Saturation
% 2.05/0.62
% 2.05/0.62 % (24397)Memory used [KB]: 7164
% 2.05/0.62 % (24397)Time elapsed: 0.180 s
% 2.05/0.62 % (24397)Instructions burned: 39 (million)
% 2.05/0.62 % (24397)------------------------------
% 2.05/0.62 % (24397)------------------------------
% 2.16/0.63 % (24410)Refutation not found, incomplete strategy% (24410)------------------------------
% 2.16/0.63 % (24410)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.16/0.63 % (24410)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.16/0.63 % (24410)Termination reason: Refutation not found, incomplete strategy
% 2.16/0.63
% 2.16/0.63 % (24410)Memory used [KB]: 6652
% 2.16/0.63 % (24410)Time elapsed: 0.208 s
% 2.16/0.63 % (24410)Instructions burned: 19 (million)
% 2.16/0.63 % (24410)------------------------------
% 2.16/0.63 % (24410)------------------------------
% 2.16/0.63 % (24398)Instruction limit reached!
% 2.16/0.63 % (24398)------------------------------
% 2.16/0.63 % (24398)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.16/0.64 % (24414)Refutation not found, incomplete strategy% (24414)------------------------------
% 2.16/0.64 % (24414)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.16/0.64 % (24390)First to succeed.
% 2.16/0.64 % (24399)Instruction limit reached!
% 2.16/0.64 % (24399)------------------------------
% 2.16/0.64 % (24399)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.16/0.64 % (24398)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.16/0.64 % (24398)Termination reason: Unknown
% 2.16/0.64 % (24398)Termination phase: Saturation
% 2.16/0.64
% 2.16/0.64 % (24398)Memory used [KB]: 7164
% 2.16/0.64 % (24398)Time elapsed: 0.210 s
% 2.16/0.64 % (24398)Instructions burned: 49 (million)
% 2.16/0.64 % (24398)------------------------------
% 2.16/0.64 % (24398)------------------------------
% 2.16/0.64 % (24414)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.16/0.64 % (24414)Termination reason: Refutation not found, incomplete strategy
% 2.16/0.64
% 2.16/0.64 % (24414)Memory used [KB]: 6908
% 2.16/0.64 % (24414)Time elapsed: 0.212 s
% 2.16/0.64 % (24414)Instructions burned: 40 (million)
% 2.16/0.64 % (24414)------------------------------
% 2.16/0.64 % (24414)------------------------------
% 2.16/0.65 % (24399)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.16/0.65 % (24399)Termination reason: Unknown
% 2.16/0.65 % (24399)Termination phase: Saturation
% 2.16/0.65
% 2.16/0.65 % (24399)Memory used [KB]: 7164
% 2.16/0.65 % (24399)Time elapsed: 0.183 s
% 2.16/0.65 % (24399)Instructions burned: 34 (million)
% 2.16/0.65 % (24399)------------------------------
% 2.16/0.65 % (24399)------------------------------
% 2.16/0.67 % (24390)Refutation found. Thanks to Tanya!
% 2.16/0.67 % SZS status Theorem for theBenchmark
% 2.16/0.67 % SZS output start Proof for theBenchmark
% See solution above
% 2.16/0.67 % (24390)------------------------------
% 2.16/0.67 % (24390)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.16/0.67 % (24390)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.16/0.67 % (24390)Termination reason: Refutation
% 2.16/0.67
% 2.16/0.67 % (24390)Memory used [KB]: 7036
% 2.16/0.67 % (24390)Time elapsed: 0.225 s
% 2.16/0.67 % (24390)Instructions burned: 47 (million)
% 2.16/0.67 % (24390)------------------------------
% 2.16/0.67 % (24390)------------------------------
% 2.16/0.67 % (24389)Success in time 0.304 s
%------------------------------------------------------------------------------