TSTP Solution File: SWW964+1 by SnakeForV-SAT---1.0
View Problem
- Process Solution
%------------------------------------------------------------------------------
% File : SnakeForV-SAT---1.0
% Problem : SWW964+1 : TPTP v8.1.0. Released v7.4.0.
% Transfm : none
% Format : tptp:raw
% Command : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_sat --cores 0 -t %d %s
% Computer : n012.cluster.edu
% Model : x86_64 x86_64
% CPU : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory : 8042.1875MB
% OS : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit : 300s
% DateTime : Wed Aug 31 19:25:07 EDT 2022
% Result : Theorem 0.18s 0.56s
% Output : Refutation 0.18s
% Verified :
% SZS Type : Refutation
% Derivation depth : 12
% Number of leaves : 40
% Syntax : Number of formulae : 183 ( 41 unt; 0 def)
% Number of atoms : 484 ( 53 equ)
% Maximal formula atoms : 7 ( 2 avg)
% Number of connectives : 530 ( 229 ~; 227 |; 30 &)
% ( 9 <=>; 35 =>; 0 <=; 0 <~>)
% Maximal formula depth : 12 ( 5 avg)
% Maximal term depth : 7 ( 2 avg)
% Number of predicates : 14 ( 12 usr; 10 prp; 0-2 aty)
% Number of functors : 35 ( 35 usr; 11 con; 0-4 aty)
% Number of variables : 286 ( 284 !; 2 ?)
% Comments :
%------------------------------------------------------------------------------
fof(f1717,plain,
$false,
inference(avatar_sat_refutation,[],[f676,f726,f1010,f1106,f1439,f1550,f1557,f1660,f1687,f1716]) ).
fof(f1716,plain,
( spl3_9
| ~ spl3_1 ),
inference(avatar_split_clause,[],[f1715,f664,f1005]) ).
fof(f1005,plain,
( spl3_9
<=> ! [X2] : ~ pred_attacker(X2) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_9])]) ).
fof(f664,plain,
( spl3_1
<=> ! [X2] : ~ pred_attacker(tuple_client_B_in_2(X2)) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_1])]) ).
fof(f1715,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl3_1 ),
inference(resolution,[],[f665,f498]) ).
fof(f498,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f330]) ).
fof(f330,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f251]) ).
fof(f251,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_2(X0)) ),
inference(rectify,[],[f144]) ).
fof(f144,axiom,
! [X122] :
( pred_attacker(X122)
=> pred_attacker(tuple_client_B_in_2(X122)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax143) ).
fof(f665,plain,
( ! [X2] : ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ spl3_1 ),
inference(avatar_component_clause,[],[f664]) ).
fof(f1687,plain,
( spl3_9
| ~ spl3_3
| ~ spl3_73 ),
inference(avatar_split_clause,[],[f1686,f1658,f670,f1005]) ).
fof(f670,plain,
( spl3_3
<=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_3])]) ).
fof(f1658,plain,
( spl3_73
<=> ! [X0] :
( pred_attacker(constr_ecb_enc_1(sF1,X0))
| ~ pred_attacker(X0) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_73])]) ).
fof(f1686,plain,
( ! [X5] : ~ pred_attacker(X5)
| ~ spl3_3
| ~ spl3_73 ),
inference(subsumption_resolution,[],[f1685,f541]) ).
fof(f541,plain,
! [X0] :
( pred_attacker(constr_pkey(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f325]) ).
fof(f325,plain,
! [X0] :
( pred_attacker(constr_pkey(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f224]) ).
fof(f224,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(constr_pkey(X0)) ),
inference(rectify,[],[f106]) ).
fof(f106,axiom,
! [X60] :
( pred_attacker(X60)
=> pred_attacker(constr_pkey(X60)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax105) ).
fof(f1685,plain,
( ! [X5] :
( ~ pred_attacker(X5)
| ~ pred_attacker(constr_pkey(X5)) )
| ~ spl3_3
| ~ spl3_73 ),
inference(subsumption_resolution,[],[f1672,f780]) ).
fof(f780,plain,
( ~ pred_attacker(sF1)
| ~ spl3_3 ),
inference(subsumption_resolution,[],[f779,f656]) ).
fof(f656,plain,
~ pred_attacker(sF2),
inference(definition_folding,[],[f599,f655,f654]) ).
fof(f654,plain,
sF1 = name_Nb(sK0),
introduced(function_definition,[]) ).
fof(f655,plain,
tuple_2(sF1,name_objective) = sF2,
introduced(function_definition,[]) ).
fof(f599,plain,
~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
inference(cnf_transformation,[],[f436]) ).
fof(f436,plain,
~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
inference(skolemisation,[status(esa),new_symbols(skolem,[sK0])],[f318,f435]) ).
fof(f435,plain,
( ? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective))
=> ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)) ),
introduced(choice_axiom,[]) ).
fof(f318,plain,
? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective)),
inference(ennf_transformation,[],[f218]) ).
fof(f218,plain,
~ ! [X0] : pred_attacker(tuple_2(name_Nb(X0),name_objective)),
inference(rectify,[],[f197]) ).
fof(f197,negated_conjecture,
~ ! [X201] : pred_attacker(tuple_2(name_Nb(X201),name_objective)),
inference(negated_conjecture,[],[f196]) ).
fof(f196,conjecture,
! [X201] : pred_attacker(tuple_2(name_Nb(X201),name_objective)),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',co0) ).
fof(f779,plain,
( ~ pred_attacker(sF1)
| pred_attacker(sF2)
| ~ spl3_3 ),
inference(subsumption_resolution,[],[f778,f727]) ).
fof(f727,plain,
( pred_attacker(name_objective)
| ~ spl3_3 ),
inference(resolution,[],[f672,f461]) ).
fof(f461,plain,
! [X0] :
( ~ pred_attacker(tuple_client_B_out_6(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f308]) ).
fof(f308,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_B_out_6(X0)) ),
inference(ennf_transformation,[],[f248]) ).
fof(f248,plain,
! [X0] :
( pred_attacker(tuple_client_B_out_6(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f134]) ).
fof(f134,axiom,
! [X109] :
( pred_attacker(tuple_client_B_out_6(X109))
=> pred_attacker(X109) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax133) ).
fof(f672,plain,
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ spl3_3 ),
inference(avatar_component_clause,[],[f670]) ).
fof(f778,plain,
( ~ pred_attacker(name_objective)
| ~ pred_attacker(sF1)
| pred_attacker(sF2) ),
inference(superposition,[],[f600,f655]) ).
fof(f600,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X1,X0))
| ~ pred_attacker(X0)
| ~ pred_attacker(X1) ),
inference(cnf_transformation,[],[f392]) ).
fof(f392,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X1,X0))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f391]) ).
fof(f391,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X1,X0))
| ~ pred_attacker(X0)
| ~ pred_attacker(X1) ),
inference(ennf_transformation,[],[f238]) ).
fof(f238,plain,
! [X0,X1] :
( ( pred_attacker(X0)
& pred_attacker(X1) )
=> pred_attacker(tuple_2(X1,X0)) ),
inference(rectify,[],[f172]) ).
fof(f172,axiom,
! [X173,X172] :
( ( pred_attacker(X172)
& pred_attacker(X173) )
=> pred_attacker(tuple_2(X172,X173)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax171) ).
fof(f1672,plain,
( ! [X5] :
( pred_attacker(sF1)
| ~ pred_attacker(constr_pkey(X5))
| ~ pred_attacker(X5) )
| ~ spl3_73 ),
inference(resolution,[],[f1659,f773]) ).
fof(f773,plain,
! [X0,X1] :
( ~ pred_attacker(constr_ecb_enc_1(X0,constr_pkey(X1)))
| ~ pred_attacker(X1)
| pred_attacker(X0) ),
inference(superposition,[],[f542,f458]) ).
fof(f458,plain,
! [X0,X1] : constr_ecb_dec_1(constr_ecb_enc_1(X1,constr_pkey(X0)),X0) = X1,
inference(cnf_transformation,[],[f211]) ).
fof(f211,plain,
! [X0,X1] : constr_ecb_dec_1(constr_ecb_enc_1(X1,constr_pkey(X0)),X0) = X1,
inference(rectify,[],[f85]) ).
fof(f85,axiom,
! [X18,X19] : constr_ecb_dec_1(constr_ecb_enc_1(X19,constr_pkey(X18)),X18) = X19,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax84) ).
fof(f542,plain,
! [X0,X1] :
( pred_attacker(constr_ecb_dec_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f380]) ).
fof(f380,plain,
! [X0,X1] :
( pred_attacker(constr_ecb_dec_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f379]) ).
fof(f379,plain,
! [X0,X1] :
( pred_attacker(constr_ecb_dec_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f237]) ).
fof(f237,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(constr_ecb_dec_1(X0,X1)) ),
inference(rectify,[],[f131]) ).
fof(f131,axiom,
! [X104,X105] :
( ( pred_attacker(X104)
& pred_attacker(X105) )
=> pred_attacker(constr_ecb_dec_1(X104,X105)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax130) ).
fof(f1659,plain,
( ! [X0] :
( pred_attacker(constr_ecb_enc_1(sF1,X0))
| ~ pred_attacker(X0) )
| ~ spl3_73 ),
inference(avatar_component_clause,[],[f1658]) ).
fof(f1660,plain,
( spl3_13
| spl3_73
| ~ spl3_10
| ~ spl3_65 ),
inference(avatar_split_clause,[],[f1654,f1548,f1008,f1658,f1149]) ).
fof(f1149,plain,
( spl3_13
<=> ! [X1] :
( ~ pred_attacker(X1)
| name_A = X1
| name_B = X1 ) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_13])]) ).
fof(f1008,plain,
( spl3_10
<=> ! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(X1)
| name_A = X0
| ~ pred_attacker(X0)
| name_B = X0 ) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_10])]) ).
fof(f1548,plain,
( spl3_65
<=> ! [X6,X5] :
( ~ pred_attacker(tuple_client_B_in_2(X5))
| pred_attacker(constr_ecb_enc_1(name_Nb(X6),constr_tuple_2_get_1_bitstring(constr_checksign(X5,constr_pkey(name_skS))))) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_65])]) ).
fof(f1654,plain,
( ! [X0,X1] :
( pred_attacker(constr_ecb_enc_1(sF1,X0))
| name_A = X1
| ~ pred_attacker(X0)
| name_B = X1
| ~ pred_attacker(X1) )
| ~ spl3_10
| ~ spl3_65 ),
inference(resolution,[],[f1650,f1107]) ).
fof(f1107,plain,
( ! [X0,X1] :
( pred_attacker(constr_sign(tuple_2(X0,X1),name_skS))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0)
| name_A = X0
| name_B = X0 )
| ~ spl3_10 ),
inference(resolution,[],[f1009,f618]) ).
fof(f618,plain,
! [X0] :
( ~ pred_attacker(tuple_key_retrieval_server_out_2(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f335]) ).
fof(f335,plain,
! [X0] :
( ~ pred_attacker(tuple_key_retrieval_server_out_2(X0))
| pred_attacker(X0) ),
inference(ennf_transformation,[],[f266]) ).
fof(f266,plain,
! [X0] :
( pred_attacker(tuple_key_retrieval_server_out_2(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f114]) ).
fof(f114,axiom,
! [X68] :
( pred_attacker(tuple_key_retrieval_server_out_2(X68))
=> pred_attacker(X68) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax113) ).
fof(f1009,plain,
( ! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| name_B = X0
| name_A = X0
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) )
| ~ spl3_10 ),
inference(avatar_component_clause,[],[f1008]) ).
fof(f1650,plain,
( ! [X0,X1] :
( ~ pred_attacker(constr_sign(tuple_2(X0,X1),name_skS))
| pred_attacker(constr_ecb_enc_1(sF1,X1)) )
| ~ spl3_65 ),
inference(superposition,[],[f1649,f489]) ).
fof(f489,plain,
! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X1,X0)) = X0,
inference(cnf_transformation,[],[f409]) ).
fof(f409,plain,
! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X1,X0)) = X0,
inference(rectify,[],[f283]) ).
fof(f283,plain,
! [X1,X0] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
inference(rectify,[],[f90]) ).
fof(f90,axiom,
! [X35,X36] : constr_tuple_2_get_1_bitstring(tuple_2(X35,X36)) = X36,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax89) ).
fof(f1649,plain,
( ! [X0] :
( pred_attacker(constr_ecb_enc_1(sF1,constr_tuple_2_get_1_bitstring(X0)))
| ~ pred_attacker(constr_sign(X0,name_skS)) )
| ~ spl3_65 ),
inference(resolution,[],[f1648,f498]) ).
fof(f1648,plain,
( ! [X0] :
( ~ pred_attacker(tuple_client_B_in_2(constr_sign(X0,name_skS)))
| pred_attacker(constr_ecb_enc_1(sF1,constr_tuple_2_get_1_bitstring(X0))) )
| ~ spl3_65 ),
inference(superposition,[],[f1596,f560]) ).
fof(f560,plain,
! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
inference(cnf_transformation,[],[f229]) ).
fof(f229,plain,
! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
inference(rectify,[],[f81]) ).
fof(f81,axiom,
! [X4,X5] : constr_checksign(constr_sign(X5,X4),constr_pkey(X4)) = X5,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax80) ).
fof(f1596,plain,
( ! [X0] :
( pred_attacker(constr_ecb_enc_1(sF1,constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))
| ~ pred_attacker(tuple_client_B_in_2(X0)) )
| ~ spl3_65 ),
inference(superposition,[],[f1549,f654]) ).
fof(f1549,plain,
( ! [X6,X5] :
( pred_attacker(constr_ecb_enc_1(name_Nb(X6),constr_tuple_2_get_1_bitstring(constr_checksign(X5,constr_pkey(name_skS)))))
| ~ pred_attacker(tuple_client_B_in_2(X5)) )
| ~ spl3_65 ),
inference(avatar_component_clause,[],[f1548]) ).
fof(f1557,plain,
( spl3_9
| ~ spl3_4 ),
inference(avatar_split_clause,[],[f1556,f674,f1005]) ).
fof(f674,plain,
( spl3_4
<=> ! [X1] : ~ pred_attacker(tuple_client_B_in_3(X1)) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_4])]) ).
fof(f1556,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl3_4 ),
inference(resolution,[],[f675,f641]) ).
fof(f641,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f322]) ).
fof(f322,plain,
! [X0] :
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_B_in_3(X0)) ),
inference(ennf_transformation,[],[f262]) ).
fof(f262,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_3(X0)) ),
inference(rectify,[],[f142]) ).
fof(f142,axiom,
! [X120] :
( pred_attacker(X120)
=> pred_attacker(tuple_client_B_in_3(X120)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax141) ).
fof(f675,plain,
( ! [X1] : ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ spl3_4 ),
inference(avatar_component_clause,[],[f674]) ).
fof(f1550,plain,
( spl3_65
| spl3_4 ),
inference(avatar_split_clause,[],[f1543,f674,f1548]) ).
fof(f1543,plain,
! [X6,X4,X5] :
( ~ pred_attacker(tuple_client_B_in_3(X4))
| ~ pred_attacker(tuple_client_B_in_2(X5))
| pred_attacker(constr_ecb_enc_1(name_Nb(X6),constr_tuple_2_get_1_bitstring(constr_checksign(X5,constr_pkey(name_skS))))) ),
inference(resolution,[],[f1138,f488]) ).
fof(f488,plain,
! [X2,X0,X1] :
( ~ pred_attacker(tuple_3(X2,X1,X0))
| pred_attacker(X1) ),
inference(cnf_transformation,[],[f408]) ).
fof(f408,plain,
! [X0,X1,X2] :
( pred_attacker(X1)
| ~ pred_attacker(tuple_3(X2,X1,X0)) ),
inference(rectify,[],[f367]) ).
fof(f367,plain,
! [X1,X2,X0] :
( pred_attacker(X2)
| ~ pred_attacker(tuple_3(X0,X2,X1)) ),
inference(ennf_transformation,[],[f261]) ).
fof(f261,plain,
! [X1,X2,X0] :
( pred_attacker(tuple_3(X0,X2,X1))
=> pred_attacker(X2) ),
inference(rectify,[],[f170]) ).
fof(f170,axiom,
! [X166,X168,X167] :
( pred_attacker(tuple_3(X166,X167,X168))
=> pred_attacker(X167) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax169) ).
fof(f1138,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X2),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(tuple_client_B_in_2(X1)) ),
inference(resolution,[],[f659,f500]) ).
fof(f500,plain,
! [X0] :
( ~ pred_attacker(tuple_client_B_out_4(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f397]) ).
fof(f397,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_B_out_4(X0)) ),
inference(ennf_transformation,[],[f287]) ).
fof(f287,plain,
! [X0] :
( pred_attacker(tuple_client_B_out_4(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f136]) ).
fof(f136,axiom,
! [X111] :
( pred_attacker(tuple_client_B_out_4(X111))
=> pred_attacker(X111) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax135) ).
fof(f659,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_B_out_4(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_attacker(tuple_client_B_in_2(X2)) ),
inference(subsumption_resolution,[],[f658,f539]) ).
fof(f539,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X1,X0),
inference(cnf_transformation,[],[f419]) ).
fof(f419,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X1,X0),
inference(rectify,[],[f240]) ).
fof(f240,plain,
! [X1,X0] : pred_eq_bitstring_bitstring(X0,X1),
inference(rectify,[],[f96]) ).
fof(f96,axiom,
! [X49,X50] : pred_eq_bitstring_bitstring(X49,X50),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax95) ).
fof(f658,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_B_out_4(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ),
inference(subsumption_resolution,[],[f647,f539]) ).
fof(f647,plain,
! [X2,X0,X1] :
( ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| pred_attacker(tuple_client_B_out_4(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ),
inference(definition_unfolding,[],[f502,f453]) ).
fof(f453,plain,
! [X2,X3,X0,X1] : tuple_3(constr_ecb_enc_1(X2,X1),constr_ecb_enc_1(X3,X1),constr_ecb_enc_1(X0,X1)) = constr_ecb_enc_3(X2,X3,X0,X1),
inference(cnf_transformation,[],[f406]) ).
fof(f406,plain,
! [X0,X1,X2,X3] : tuple_3(constr_ecb_enc_1(X2,X1),constr_ecb_enc_1(X3,X1),constr_ecb_enc_1(X0,X1)) = constr_ecb_enc_3(X2,X3,X0,X1),
inference(rectify,[],[f259]) ).
fof(f259,plain,
! [X2,X0,X1,X3] : tuple_3(constr_ecb_enc_1(X1,X0),constr_ecb_enc_1(X3,X0),constr_ecb_enc_1(X2,X0)) = constr_ecb_enc_3(X1,X3,X2,X0),
inference(rectify,[],[f87]) ).
fof(f87,axiom,
! [X25,X26,X28,X27] : constr_ecb_enc_3(X26,X27,X28,X25) = tuple_3(constr_ecb_enc_1(X26,X25),constr_ecb_enc_1(X27,X25),constr_ecb_enc_1(X28,X25)),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax86) ).
fof(f502,plain,
! [X2,X0,X1] :
( ~ pred_attacker(tuple_client_B_in_2(X2))
| pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X0),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X1)) ),
inference(cnf_transformation,[],[f411]) ).
fof(f411,plain,
! [X0,X1,X2] :
( ~ pred_attacker(tuple_client_B_in_2(X2))
| pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X0),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X1)) ),
inference(rectify,[],[f306]) ).
fof(f306,plain,
! [X1,X0,X2] :
( ~ pred_attacker(tuple_client_B_in_2(X2))
| pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),name_Nb(X1),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X0,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X0)) ),
inference(flattening,[],[f305]) ).
fof(f305,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),name_Nb(X1),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X0,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS)))) ),
inference(ennf_transformation,[],[f255]) ).
fof(f255,plain,
! [X0,X1,X2] :
( ( pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X0,name_skB)))
& pred_attacker(tuple_client_B_in_3(X0))
& pred_attacker(tuple_client_B_in_2(X2))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS)))) )
=> pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),name_Nb(X1),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
inference(rectify,[],[f192]) ).
fof(f192,axiom,
! [X190,X189,X191] :
( ( pred_attacker(tuple_client_B_in_3(X190))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X191,constr_pkey(name_skS))))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X190,name_skB)))
& pred_attacker(tuple_client_B_in_2(X191)) )
=> pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X190,name_skB)),name_Nb(X189),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X191,constr_pkey(name_skS)))))) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax191) ).
fof(f1439,plain,
~ spl3_13,
inference(avatar_contradiction_clause,[],[f1438]) ).
fof(f1438,plain,
( $false
| ~ spl3_13 ),
inference(subsumption_resolution,[],[f1437,f526]) ).
fof(f526,plain,
constr_CONST_4 != name_B,
inference(cnf_transformation,[],[f44]) ).
fof(f44,axiom,
constr_CONST_4 != name_B,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax43) ).
fof(f1437,plain,
( constr_CONST_4 = name_B
| ~ spl3_13 ),
inference(subsumption_resolution,[],[f1206,f533]) ).
fof(f533,plain,
constr_CONST_4 != name_A,
inference(cnf_transformation,[],[f43]) ).
fof(f43,axiom,
constr_CONST_4 != name_A,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax42) ).
fof(f1206,plain,
( constr_CONST_4 = name_A
| constr_CONST_4 = name_B
| ~ spl3_13 ),
inference(resolution,[],[f1150,f613]) ).
fof(f613,plain,
pred_attacker(constr_CONST_4),
inference(cnf_transformation,[],[f158]) ).
fof(f158,axiom,
pred_attacker(constr_CONST_4),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax157) ).
fof(f1150,plain,
( ! [X1] :
( ~ pred_attacker(X1)
| name_A = X1
| name_B = X1 )
| ~ spl3_13 ),
inference(avatar_component_clause,[],[f1149]) ).
fof(f1106,plain,
~ spl3_9,
inference(avatar_contradiction_clause,[],[f1056]) ).
fof(f1056,plain,
( $false
| ~ spl3_9 ),
inference(resolution,[],[f1006,f494]) ).
fof(f494,plain,
pred_attacker(tuple_out_1(constr_pkey(name_skA))),
inference(cnf_transformation,[],[f185]) ).
fof(f185,axiom,
pred_attacker(tuple_out_1(constr_pkey(name_skA))),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax184) ).
fof(f1006,plain,
( ! [X2] : ~ pred_attacker(X2)
| ~ spl3_9 ),
inference(avatar_component_clause,[],[f1005]) ).
fof(f1010,plain,
( spl3_9
| spl3_10 ),
inference(avatar_split_clause,[],[f1003,f1008,f1005]) ).
fof(f1003,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(X2)
| name_B = X0
| ~ pred_attacker(X0)
| name_A = X0
| ~ pred_attacker(X1) ),
inference(resolution,[],[f806,f534]) ).
fof(f534,plain,
! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f417]) ).
fof(f417,plain,
! [X0,X1] :
( ~ pred_attacker(X0)
| pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
| ~ pred_attacker(X1) ),
inference(rectify,[],[f370]) ).
fof(f370,plain,
! [X1,X0] :
( ~ pred_attacker(X1)
| pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| ~ pred_attacker(X0) ),
inference(flattening,[],[f369]) ).
fof(f369,plain,
! [X1,X0] :
( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f243]) ).
fof(f243,plain,
! [X1,X0] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
inference(rectify,[],[f115]) ).
fof(f115,axiom,
! [X69,X70] :
( ( pred_attacker(X70)
& pred_attacker(X69) )
=> pred_attacker(tuple_key_retrieval_server_in_1(X69,X70)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax114) ).
fof(f806,plain,
! [X2,X3,X4] :
( ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X3))
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X3,X4),name_skS)))
| ~ pred_attacker(X4)
| name_B = X3
| name_A = X3 ),
inference(subsumption_resolution,[],[f797,f629]) ).
fof(f629,plain,
! [X0,X1] :
( ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f446]) ).
fof(f446,plain,
! [X0,X1] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,X0)) ),
inference(rectify,[],[f312]) ).
fof(f312,plain,
! [X1,X0] :
( pred_attacker(X1)
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
inference(ennf_transformation,[],[f252]) ).
fof(f252,plain,
! [X1,X0] :
( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
=> pred_attacker(X1) ),
inference(rectify,[],[f117]) ).
fof(f117,axiom,
! [X73,X74] :
( pred_attacker(tuple_key_retrieval_server_in_1(X73,X74))
=> pred_attacker(X74) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax116) ).
fof(f797,plain,
! [X2,X3,X4] :
( name_A = X3
| ~ pred_attacker(X4)
| ~ pred_attacker(X3)
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X3))
| name_B = X3
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X3,X4),name_skS))) ),
inference(resolution,[],[f583,f792]) ).
fof(f792,plain,
! [X0,X1] :
( pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(X1)
| name_A = X0
| name_B = X0
| ~ pred_attacker(X0) ),
inference(resolution,[],[f636,f481]) ).
fof(f481,plain,
! [X0,X1] :
( pred_attacker(tuple_key_register_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f373]) ).
fof(f373,plain,
! [X0,X1] :
( ~ pred_attacker(X1)
| pred_attacker(tuple_key_register_server_in_1(X0,X1))
| ~ pred_attacker(X0) ),
inference(flattening,[],[f372]) ).
fof(f372,plain,
! [X0,X1] :
( pred_attacker(tuple_key_register_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f268]) ).
fof(f268,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(tuple_key_register_server_in_1(X0,X1)) ),
inference(rectify,[],[f118]) ).
fof(f118,axiom,
! [X75,X76] :
( ( pred_attacker(X76)
& pred_attacker(X75) )
=> pred_attacker(tuple_key_register_server_in_1(X75,X76)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax117) ).
fof(f636,plain,
! [X0,X1] :
( ~ pred_attacker(tuple_key_register_server_in_1(X1,X0))
| name_B = X1
| pred_table(tuple_keys(X1,X0))
| name_A = X1 ),
inference(cnf_transformation,[],[f400]) ).
fof(f400,plain,
! [X0,X1] :
( name_A = X1
| ~ pred_attacker(tuple_key_register_server_in_1(X1,X0))
| pred_table(tuple_keys(X1,X0))
| name_B = X1 ),
inference(flattening,[],[f399]) ).
fof(f399,plain,
! [X0,X1] :
( pred_table(tuple_keys(X1,X0))
| ~ pred_attacker(tuple_key_register_server_in_1(X1,X0))
| name_A = X1
| name_B = X1 ),
inference(ennf_transformation,[],[f263]) ).
fof(f263,plain,
! [X0,X1] :
( ( pred_attacker(tuple_key_register_server_in_1(X1,X0))
& name_A != X1
& name_B != X1 )
=> pred_table(tuple_keys(X1,X0)) ),
inference(rectify,[],[f195]) ).
fof(f195,axiom,
! [X200,X199] :
( ( name_B != X199
& name_A != X199
& pred_attacker(tuple_key_register_server_in_1(X199,X200)) )
=> pred_table(tuple_keys(X199,X200)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax194) ).
fof(f583,plain,
! [X2,X0,X1] :
( ~ pred_table(tuple_keys(X1,X2))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X2),name_skS))) ),
inference(cnf_transformation,[],[f428]) ).
fof(f428,plain,
! [X0,X1,X2] :
( ~ pred_table(tuple_keys(X1,X2))
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X2),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
inference(rectify,[],[f376]) ).
fof(f376,plain,
! [X2,X0,X1] :
( ~ pred_table(tuple_keys(X0,X1))
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0)) ),
inference(flattening,[],[f375]) ).
fof(f375,plain,
! [X0,X2,X1] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
| ~ pred_table(tuple_keys(X0,X1)) ),
inference(ennf_transformation,[],[f227]) ).
fof(f227,plain,
! [X0,X2,X1] :
( ( pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
& pred_table(tuple_keys(X0,X1)) )
=> pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
inference(rectify,[],[f194]) ).
fof(f194,axiom,
! [X196,X197,X198] :
( ( pred_table(tuple_keys(X196,X197))
& pred_attacker(tuple_key_retrieval_server_in_1(X198,X196)) )
=> pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X196,X197),name_skS))) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax193) ).
fof(f726,plain,
~ spl3_2,
inference(avatar_contradiction_clause,[],[f689]) ).
fof(f689,plain,
( $false
| ~ spl3_2 ),
inference(resolution,[],[f680,f581]) ).
fof(f581,plain,
pred_attacker(name_c),
inference(cnf_transformation,[],[f177]) ).
fof(f177,axiom,
pred_attacker(name_c),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax176) ).
fof(f680,plain,
( ! [X1] : ~ pred_attacker(X1)
| ~ spl3_2 ),
inference(resolution,[],[f552,f668]) ).
fof(f668,plain,
( ! [X3] : ~ pred_attacker(tuple_client_B_in_5(X3))
| ~ spl3_2 ),
inference(avatar_component_clause,[],[f667]) ).
fof(f667,plain,
( spl3_2
<=> ! [X3] : ~ pred_attacker(tuple_client_B_in_5(X3)) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_2])]) ).
fof(f552,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f329]) ).
fof(f329,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f247]) ).
fof(f247,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_5(X0)) ),
inference(rectify,[],[f140]) ).
fof(f140,axiom,
! [X118] :
( pred_attacker(X118)
=> pred_attacker(tuple_client_B_in_5(X118)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax139) ).
fof(f676,plain,
( spl3_1
| spl3_2
| spl3_3
| spl3_4 ),
inference(avatar_split_clause,[],[f662,f674,f670,f667,f664]) ).
fof(f662,plain,
! [X2,X3,X1] :
( ~ pred_attacker(tuple_client_B_in_3(X1))
| pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_5(X3))
| ~ pred_attacker(tuple_client_B_in_2(X2)) ),
inference(subsumption_resolution,[],[f661,f539]) ).
fof(f661,plain,
! [X2,X3,X1] :
( ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_attacker(tuple_client_B_in_5(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(subsumption_resolution,[],[f660,f539]) ).
fof(f660,plain,
! [X2,X3,X1] :
( ~ pred_attacker(tuple_client_B_in_5(X3))
| pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_attacker(tuple_client_B_in_2(X2)) ),
inference(subsumption_resolution,[],[f566,f539]) ).
fof(f566,plain,
! [X2,X3,X0,X1] :
( ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X3,name_skB))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_attacker(tuple_client_B_in_5(X3)) ),
inference(cnf_transformation,[],[f427]) ).
fof(f427,plain,
! [X0,X1,X2,X3] :
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_5(X3))
| pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X3,name_skB)) ),
inference(rectify,[],[f395]) ).
fof(f395,plain,
! [X0,X2,X1,X3] :
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_5(X3))
| pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X1))
| ~ pred_attacker(tuple_client_B_in_3(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X2,name_skB)))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X3,name_skB)) ),
inference(flattening,[],[f394]) ).
fof(f394,plain,
! [X2,X3,X1,X0] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X1))
| ~ pred_attacker(tuple_client_B_in_5(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X3,name_skB))
| ~ pred_attacker(tuple_client_B_in_3(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X2,name_skB))) ),
inference(ennf_transformation,[],[f290]) ).
fof(f290,plain,
! [X2,X3,X1,X0] :
( ( pred_attacker(tuple_client_B_in_2(X1))
& pred_attacker(tuple_client_B_in_5(X3))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
& pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X3,name_skB))
& pred_attacker(tuple_client_B_in_3(X2))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X2,name_skB))) )
=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(rectify,[],[f193]) ).
fof(f193,axiom,
! [X192,X195,X193,X194] :
( ( pred_attacker(tuple_client_B_in_5(X194))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X195,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X193))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X193,name_skB)))
& pred_attacker(tuple_client_B_in_2(X195))
& pred_eq_bitstring_bitstring(name_Nb(X192),constr_ecb_dec_1(X194,name_skB)) )
=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax192) ).
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.11/0.12 % Problem : SWW964+1 : TPTP v8.1.0. Released v7.4.0.
% 0.11/0.12 % Command : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_sat --cores 0 -t %d %s
% 0.12/0.33 % Computer : n012.cluster.edu
% 0.12/0.33 % Model : x86_64 x86_64
% 0.12/0.33 % CPU : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.12/0.33 % Memory : 8042.1875MB
% 0.12/0.33 % OS : Linux 3.10.0-693.el7.x86_64
% 0.12/0.33 % CPULimit : 300
% 0.12/0.33 % WCLimit : 300
% 0.12/0.33 % DateTime : Tue Aug 30 21:17:50 EDT 2022
% 0.12/0.33 % CPUTime :
% 0.18/0.48 % (12607)ott+10_1:5_bd=off:tgt=full:i=99:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/99Mi)
% 0.18/0.49 % (12615)ott+3_1:1_gsp=on:lcm=predicate:i=138:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/138Mi)
% 0.18/0.50 % (12609)ott+11_2:3_av=off:fde=unused:nwc=5.0:tgt=ground:i=75:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/75Mi)
% 0.18/0.51 % (12623)ott+10_7:2_awrs=decay:awrsf=8:bd=preordered:drc=off:fd=preordered:fde=unused:fsr=off:slsq=on:slsqc=2:slsqr=5,8:sp=const_min:spb=units:to=lpo:i=355:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/355Mi)
% 0.18/0.51 % (12617)ott+11_1:1_drc=off:nwc=5.0:slsq=on:slsqc=1:spb=goal_then_units:to=lpo:i=467:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/467Mi)
% 0.18/0.51 % (12604)ott+2_1:1_fsr=off:gsp=on:i=50:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/50Mi)
% 0.18/0.52 % (12598)ott+33_1:4_s2a=on:tgt=ground:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 0.18/0.52 % (12595)ott+10_1:32_abs=on:br=off:urr=ec_only:i=50:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/50Mi)
% 0.18/0.52 % (12605)ott+10_1:32_bd=off:fsr=off:newcnf=on:tgt=full:i=100:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/100Mi)
% 0.18/0.52 % (12601)dis+10_1:1_fsd=on:sp=occurrence:i=7:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/7Mi)
% 0.18/0.52 % (12601)Instruction limit reached!
% 0.18/0.52 % (12601)------------------------------
% 0.18/0.52 % (12601)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.18/0.52 % (12594)fmb+10_1:1_bce=on:fmbsr=1.5:nm=4:skr=on:i=191324:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/191324Mi)
% 0.18/0.52 % (12616)dis+21_1:1_av=off:er=filter:slsq=on:slsqc=0:slsqr=1,1:sp=frequency:to=lpo:i=498:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/498Mi)
% 0.18/0.52 % (12619)ott+10_1:5_bd=off:tgt=full:i=500:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/500Mi)
% 0.18/0.52 % (12599)dis+34_1:32_abs=on:add=off:bsr=on:gsp=on:sp=weighted_frequency:i=48:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/48Mi)
% 0.18/0.52 % (12606)ott+10_1:28_bd=off:bs=on:tgt=ground:i=101:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/101Mi)
% 0.18/0.53 % (12597)ott+10_1:32_bd=off:fsr=off:newcnf=on:tgt=full:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 0.18/0.53 % (12602)dis+2_1:64_add=large:bce=on:bd=off:i=2:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/2Mi)
% 0.18/0.53 % (12602)Instruction limit reached!
% 0.18/0.53 % (12602)------------------------------
% 0.18/0.53 % (12602)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.18/0.53 % (12602)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.18/0.53 % (12602)Termination reason: Unknown
% 0.18/0.53 % (12602)Termination phase: Preprocessing 3
% 0.18/0.53
% 0.18/0.53 % (12602)Memory used [KB]: 1279
% 0.18/0.53 % (12602)Time elapsed: 0.003 s
% 0.18/0.53 % (12602)Instructions burned: 3 (million)
% 0.18/0.53 % (12602)------------------------------
% 0.18/0.53 % (12602)------------------------------
% 0.18/0.53 % (12601)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.18/0.53 % (12601)Termination reason: Unknown
% 0.18/0.53 % (12601)Termination phase: Saturation
% 0.18/0.53
% 0.18/0.53 % (12601)Memory used [KB]: 5884
% 0.18/0.53 % (12601)Time elapsed: 0.122 s
% 0.18/0.53 % (12601)Instructions burned: 8 (million)
% 0.18/0.53 % (12601)------------------------------
% 0.18/0.53 % (12601)------------------------------
% 0.18/0.53 % (12596)ott+4_1:1_av=off:bd=off:nwc=5.0:s2a=on:s2at=2.0:slsq=on:slsqc=2:slsql=off:slsqr=1,2:sp=frequency:i=37:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/37Mi)
% 0.18/0.53 % (12611)fmb+10_1:1_bce=on:i=59:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/59Mi)
% 0.18/0.53 % (12621)ott+11_2:3_av=off:fde=unused:nwc=5.0:tgt=ground:i=177:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/177Mi)
% 0.18/0.53 % (12603)ott-1_1:6_av=off:cond=on:fsr=off:nwc=3.0:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 0.18/0.53 % (12620)ins+10_1:1_awrs=decay:awrsf=30:bsr=unit_only:foolp=on:igrr=8/457:igs=10:igwr=on:nwc=1.5:sp=weighted_frequency:to=lpo:uhcvi=on:i=68:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/68Mi)
% 0.18/0.53 % (12608)ins+10_1:1_awrs=decay:awrsf=30:bsr=unit_only:foolp=on:igrr=8/457:igs=10:igwr=on:nwc=1.5:sp=weighted_frequency:to=lpo:uhcvi=on:i=68:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/68Mi)
% 0.18/0.53 % (12622)ott+33_1:4_s2a=on:tgt=ground:i=439:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/439Mi)
% 0.18/0.53 % (12613)ott+4_1:1_av=off:bd=off:nwc=5.0:rp=on:s2a=on:s2at=2.0:slsq=on:slsqc=2:slsql=off:slsqr=1,2:sp=frequency:i=100:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/100Mi)
% 0.18/0.54 % (12618)ott+10_1:1_kws=precedence:tgt=ground:i=482:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/482Mi)
% 0.18/0.54 % (12595)Refutation not found, incomplete strategy% (12595)------------------------------
% 0.18/0.54 % (12595)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.18/0.54 % (12595)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.18/0.54 % (12595)Termination reason: Refutation not found, incomplete strategy
% 0.18/0.54
% 0.18/0.54 % (12595)Memory used [KB]: 6140
% 0.18/0.54 % (12595)Time elapsed: 0.133 s
% 0.18/0.54 % (12595)Instructions burned: 16 (million)
% 0.18/0.54 % (12595)------------------------------
% 0.18/0.54 % (12595)------------------------------
% 0.18/0.54 % (12610)dis+34_1:32_abs=on:add=off:bsr=on:gsp=on:sp=weighted_frequency:i=99:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/99Mi)
% 0.18/0.54 % (12612)ott+10_1:1_tgt=ground:i=100:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/100Mi)
% 0.18/0.54 % (12614)ott+10_1:8_bsd=on:fsd=on:lcm=predicate:nwc=5.0:s2a=on:s2at=1.5:spb=goal_then_units:i=176:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/176Mi)
% 0.18/0.55 % (12600)fmb+10_1:1_fmbsr=2.0:nm=4:skr=on:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 0.18/0.56 % (12607)First to succeed.
% 0.18/0.56 % (12607)Refutation found. Thanks to Tanya!
% 0.18/0.56 % SZS status Theorem for theBenchmark
% 0.18/0.56 % SZS output start Proof for theBenchmark
% See solution above
% 0.18/0.56 % (12607)------------------------------
% 0.18/0.56 % (12607)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.18/0.56 % (12607)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.18/0.56 % (12607)Termination reason: Refutation
% 0.18/0.56
% 0.18/0.56 % (12607)Memory used [KB]: 6524
% 0.18/0.56 % (12607)Time elapsed: 0.152 s
% 0.18/0.56 % (12607)Instructions burned: 37 (million)
% 0.18/0.56 % (12607)------------------------------
% 0.18/0.56 % (12607)------------------------------
% 0.18/0.56 % (12593)Success in time 0.217 s
%------------------------------------------------------------------------------