TSTP Solution File: SWW964+1 by SnakeForV-SAT---1.0

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : SnakeForV-SAT---1.0
% Problem  : SWW964+1 : TPTP v8.1.0. Released v7.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_sat --cores 0 -t %d %s

% Computer : n012.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Wed Aug 31 19:25:07 EDT 2022

% Result   : Theorem 0.18s 0.56s
% Output   : Refutation 0.18s
% Verified : 
% SZS Type : Refutation
%            Derivation depth      :   12
%            Number of leaves      :   40
% Syntax   : Number of formulae    :  183 (  41 unt;   0 def)
%            Number of atoms       :  484 (  53 equ)
%            Maximal formula atoms :    7 (   2 avg)
%            Number of connectives :  530 ( 229   ~; 227   |;  30   &)
%                                         (   9 <=>;  35  =>;   0  <=;   0 <~>)
%            Maximal formula depth :   12 (   5 avg)
%            Maximal term depth    :    7 (   2 avg)
%            Number of predicates  :   14 (  12 usr;  10 prp; 0-2 aty)
%            Number of functors    :   35 (  35 usr;  11 con; 0-4 aty)
%            Number of variables   :  286 ( 284   !;   2   ?)

% Comments : 
%------------------------------------------------------------------------------
fof(f1717,plain,
    $false,
    inference(avatar_sat_refutation,[],[f676,f726,f1010,f1106,f1439,f1550,f1557,f1660,f1687,f1716]) ).

fof(f1716,plain,
    ( spl3_9
    | ~ spl3_1 ),
    inference(avatar_split_clause,[],[f1715,f664,f1005]) ).

fof(f1005,plain,
    ( spl3_9
  <=> ! [X2] : ~ pred_attacker(X2) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_9])]) ).

fof(f664,plain,
    ( spl3_1
  <=> ! [X2] : ~ pred_attacker(tuple_client_B_in_2(X2)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_1])]) ).

fof(f1715,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl3_1 ),
    inference(resolution,[],[f665,f498]) ).

fof(f498,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f330]) ).

fof(f330,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f251]) ).

fof(f251,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_2(X0)) ),
    inference(rectify,[],[f144]) ).

fof(f144,axiom,
    ! [X122] :
      ( pred_attacker(X122)
     => pred_attacker(tuple_client_B_in_2(X122)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax143) ).

fof(f665,plain,
    ( ! [X2] : ~ pred_attacker(tuple_client_B_in_2(X2))
    | ~ spl3_1 ),
    inference(avatar_component_clause,[],[f664]) ).

fof(f1687,plain,
    ( spl3_9
    | ~ spl3_3
    | ~ spl3_73 ),
    inference(avatar_split_clause,[],[f1686,f1658,f670,f1005]) ).

fof(f670,plain,
    ( spl3_3
  <=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_3])]) ).

fof(f1658,plain,
    ( spl3_73
  <=> ! [X0] :
        ( pred_attacker(constr_ecb_enc_1(sF1,X0))
        | ~ pred_attacker(X0) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_73])]) ).

fof(f1686,plain,
    ( ! [X5] : ~ pred_attacker(X5)
    | ~ spl3_3
    | ~ spl3_73 ),
    inference(subsumption_resolution,[],[f1685,f541]) ).

fof(f541,plain,
    ! [X0] :
      ( pred_attacker(constr_pkey(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f325]) ).

fof(f325,plain,
    ! [X0] :
      ( pred_attacker(constr_pkey(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f224]) ).

fof(f224,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(constr_pkey(X0)) ),
    inference(rectify,[],[f106]) ).

fof(f106,axiom,
    ! [X60] :
      ( pred_attacker(X60)
     => pred_attacker(constr_pkey(X60)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax105) ).

fof(f1685,plain,
    ( ! [X5] :
        ( ~ pred_attacker(X5)
        | ~ pred_attacker(constr_pkey(X5)) )
    | ~ spl3_3
    | ~ spl3_73 ),
    inference(subsumption_resolution,[],[f1672,f780]) ).

fof(f780,plain,
    ( ~ pred_attacker(sF1)
    | ~ spl3_3 ),
    inference(subsumption_resolution,[],[f779,f656]) ).

fof(f656,plain,
    ~ pred_attacker(sF2),
    inference(definition_folding,[],[f599,f655,f654]) ).

fof(f654,plain,
    sF1 = name_Nb(sK0),
    introduced(function_definition,[]) ).

fof(f655,plain,
    tuple_2(sF1,name_objective) = sF2,
    introduced(function_definition,[]) ).

fof(f599,plain,
    ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
    inference(cnf_transformation,[],[f436]) ).

fof(f436,plain,
    ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
    inference(skolemisation,[status(esa),new_symbols(skolem,[sK0])],[f318,f435]) ).

fof(f435,plain,
    ( ? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective))
   => ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)) ),
    introduced(choice_axiom,[]) ).

fof(f318,plain,
    ? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective)),
    inference(ennf_transformation,[],[f218]) ).

fof(f218,plain,
    ~ ! [X0] : pred_attacker(tuple_2(name_Nb(X0),name_objective)),
    inference(rectify,[],[f197]) ).

fof(f197,negated_conjecture,
    ~ ! [X201] : pred_attacker(tuple_2(name_Nb(X201),name_objective)),
    inference(negated_conjecture,[],[f196]) ).

fof(f196,conjecture,
    ! [X201] : pred_attacker(tuple_2(name_Nb(X201),name_objective)),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',co0) ).

fof(f779,plain,
    ( ~ pred_attacker(sF1)
    | pred_attacker(sF2)
    | ~ spl3_3 ),
    inference(subsumption_resolution,[],[f778,f727]) ).

fof(f727,plain,
    ( pred_attacker(name_objective)
    | ~ spl3_3 ),
    inference(resolution,[],[f672,f461]) ).

fof(f461,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_B_out_6(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f308]) ).

fof(f308,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_B_out_6(X0)) ),
    inference(ennf_transformation,[],[f248]) ).

fof(f248,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_out_6(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f134]) ).

fof(f134,axiom,
    ! [X109] :
      ( pred_attacker(tuple_client_B_out_6(X109))
     => pred_attacker(X109) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax133) ).

fof(f672,plain,
    ( pred_attacker(tuple_client_B_out_6(name_objective))
    | ~ spl3_3 ),
    inference(avatar_component_clause,[],[f670]) ).

fof(f778,plain,
    ( ~ pred_attacker(name_objective)
    | ~ pred_attacker(sF1)
    | pred_attacker(sF2) ),
    inference(superposition,[],[f600,f655]) ).

fof(f600,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X1,X0))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(cnf_transformation,[],[f392]) ).

fof(f392,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X1,X0))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f391]) ).

fof(f391,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X1,X0))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(ennf_transformation,[],[f238]) ).

fof(f238,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X0)
        & pred_attacker(X1) )
     => pred_attacker(tuple_2(X1,X0)) ),
    inference(rectify,[],[f172]) ).

fof(f172,axiom,
    ! [X173,X172] :
      ( ( pred_attacker(X172)
        & pred_attacker(X173) )
     => pred_attacker(tuple_2(X172,X173)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax171) ).

fof(f1672,plain,
    ( ! [X5] :
        ( pred_attacker(sF1)
        | ~ pred_attacker(constr_pkey(X5))
        | ~ pred_attacker(X5) )
    | ~ spl3_73 ),
    inference(resolution,[],[f1659,f773]) ).

fof(f773,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(constr_ecb_enc_1(X0,constr_pkey(X1)))
      | ~ pred_attacker(X1)
      | pred_attacker(X0) ),
    inference(superposition,[],[f542,f458]) ).

fof(f458,plain,
    ! [X0,X1] : constr_ecb_dec_1(constr_ecb_enc_1(X1,constr_pkey(X0)),X0) = X1,
    inference(cnf_transformation,[],[f211]) ).

fof(f211,plain,
    ! [X0,X1] : constr_ecb_dec_1(constr_ecb_enc_1(X1,constr_pkey(X0)),X0) = X1,
    inference(rectify,[],[f85]) ).

fof(f85,axiom,
    ! [X18,X19] : constr_ecb_dec_1(constr_ecb_enc_1(X19,constr_pkey(X18)),X18) = X19,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax84) ).

fof(f542,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_ecb_dec_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f380]) ).

fof(f380,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_ecb_dec_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f379]) ).

fof(f379,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_ecb_dec_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f237]) ).

fof(f237,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(constr_ecb_dec_1(X0,X1)) ),
    inference(rectify,[],[f131]) ).

fof(f131,axiom,
    ! [X104,X105] :
      ( ( pred_attacker(X104)
        & pred_attacker(X105) )
     => pred_attacker(constr_ecb_dec_1(X104,X105)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax130) ).

fof(f1659,plain,
    ( ! [X0] :
        ( pred_attacker(constr_ecb_enc_1(sF1,X0))
        | ~ pred_attacker(X0) )
    | ~ spl3_73 ),
    inference(avatar_component_clause,[],[f1658]) ).

fof(f1660,plain,
    ( spl3_13
    | spl3_73
    | ~ spl3_10
    | ~ spl3_65 ),
    inference(avatar_split_clause,[],[f1654,f1548,f1008,f1658,f1149]) ).

fof(f1149,plain,
    ( spl3_13
  <=> ! [X1] :
        ( ~ pred_attacker(X1)
        | name_A = X1
        | name_B = X1 ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_13])]) ).

fof(f1008,plain,
    ( spl3_10
  <=> ! [X0,X1] :
        ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
        | ~ pred_attacker(X1)
        | name_A = X0
        | ~ pred_attacker(X0)
        | name_B = X0 ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_10])]) ).

fof(f1548,plain,
    ( spl3_65
  <=> ! [X6,X5] :
        ( ~ pred_attacker(tuple_client_B_in_2(X5))
        | pred_attacker(constr_ecb_enc_1(name_Nb(X6),constr_tuple_2_get_1_bitstring(constr_checksign(X5,constr_pkey(name_skS))))) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_65])]) ).

fof(f1654,plain,
    ( ! [X0,X1] :
        ( pred_attacker(constr_ecb_enc_1(sF1,X0))
        | name_A = X1
        | ~ pred_attacker(X0)
        | name_B = X1
        | ~ pred_attacker(X1) )
    | ~ spl3_10
    | ~ spl3_65 ),
    inference(resolution,[],[f1650,f1107]) ).

fof(f1107,plain,
    ( ! [X0,X1] :
        ( pred_attacker(constr_sign(tuple_2(X0,X1),name_skS))
        | ~ pred_attacker(X1)
        | ~ pred_attacker(X0)
        | name_A = X0
        | name_B = X0 )
    | ~ spl3_10 ),
    inference(resolution,[],[f1009,f618]) ).

fof(f618,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_key_retrieval_server_out_2(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f335]) ).

fof(f335,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_key_retrieval_server_out_2(X0))
      | pred_attacker(X0) ),
    inference(ennf_transformation,[],[f266]) ).

fof(f266,plain,
    ! [X0] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f114]) ).

fof(f114,axiom,
    ! [X68] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(X68))
     => pred_attacker(X68) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax113) ).

fof(f1009,plain,
    ( ! [X0,X1] :
        ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
        | name_B = X0
        | name_A = X0
        | ~ pred_attacker(X1)
        | ~ pred_attacker(X0) )
    | ~ spl3_10 ),
    inference(avatar_component_clause,[],[f1008]) ).

fof(f1650,plain,
    ( ! [X0,X1] :
        ( ~ pred_attacker(constr_sign(tuple_2(X0,X1),name_skS))
        | pred_attacker(constr_ecb_enc_1(sF1,X1)) )
    | ~ spl3_65 ),
    inference(superposition,[],[f1649,f489]) ).

fof(f489,plain,
    ! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X1,X0)) = X0,
    inference(cnf_transformation,[],[f409]) ).

fof(f409,plain,
    ! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X1,X0)) = X0,
    inference(rectify,[],[f283]) ).

fof(f283,plain,
    ! [X1,X0] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
    inference(rectify,[],[f90]) ).

fof(f90,axiom,
    ! [X35,X36] : constr_tuple_2_get_1_bitstring(tuple_2(X35,X36)) = X36,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax89) ).

fof(f1649,plain,
    ( ! [X0] :
        ( pred_attacker(constr_ecb_enc_1(sF1,constr_tuple_2_get_1_bitstring(X0)))
        | ~ pred_attacker(constr_sign(X0,name_skS)) )
    | ~ spl3_65 ),
    inference(resolution,[],[f1648,f498]) ).

fof(f1648,plain,
    ( ! [X0] :
        ( ~ pred_attacker(tuple_client_B_in_2(constr_sign(X0,name_skS)))
        | pred_attacker(constr_ecb_enc_1(sF1,constr_tuple_2_get_1_bitstring(X0))) )
    | ~ spl3_65 ),
    inference(superposition,[],[f1596,f560]) ).

fof(f560,plain,
    ! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
    inference(cnf_transformation,[],[f229]) ).

fof(f229,plain,
    ! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
    inference(rectify,[],[f81]) ).

fof(f81,axiom,
    ! [X4,X5] : constr_checksign(constr_sign(X5,X4),constr_pkey(X4)) = X5,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax80) ).

fof(f1596,plain,
    ( ! [X0] :
        ( pred_attacker(constr_ecb_enc_1(sF1,constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))
        | ~ pred_attacker(tuple_client_B_in_2(X0)) )
    | ~ spl3_65 ),
    inference(superposition,[],[f1549,f654]) ).

fof(f1549,plain,
    ( ! [X6,X5] :
        ( pred_attacker(constr_ecb_enc_1(name_Nb(X6),constr_tuple_2_get_1_bitstring(constr_checksign(X5,constr_pkey(name_skS)))))
        | ~ pred_attacker(tuple_client_B_in_2(X5)) )
    | ~ spl3_65 ),
    inference(avatar_component_clause,[],[f1548]) ).

fof(f1557,plain,
    ( spl3_9
    | ~ spl3_4 ),
    inference(avatar_split_clause,[],[f1556,f674,f1005]) ).

fof(f674,plain,
    ( spl3_4
  <=> ! [X1] : ~ pred_attacker(tuple_client_B_in_3(X1)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_4])]) ).

fof(f1556,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl3_4 ),
    inference(resolution,[],[f675,f641]) ).

fof(f641,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_3(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f322]) ).

fof(f322,plain,
    ! [X0] :
      ( ~ pred_attacker(X0)
      | pred_attacker(tuple_client_B_in_3(X0)) ),
    inference(ennf_transformation,[],[f262]) ).

fof(f262,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_3(X0)) ),
    inference(rectify,[],[f142]) ).

fof(f142,axiom,
    ! [X120] :
      ( pred_attacker(X120)
     => pred_attacker(tuple_client_B_in_3(X120)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax141) ).

fof(f675,plain,
    ( ! [X1] : ~ pred_attacker(tuple_client_B_in_3(X1))
    | ~ spl3_4 ),
    inference(avatar_component_clause,[],[f674]) ).

fof(f1550,plain,
    ( spl3_65
    | spl3_4 ),
    inference(avatar_split_clause,[],[f1543,f674,f1548]) ).

fof(f1543,plain,
    ! [X6,X4,X5] :
      ( ~ pred_attacker(tuple_client_B_in_3(X4))
      | ~ pred_attacker(tuple_client_B_in_2(X5))
      | pred_attacker(constr_ecb_enc_1(name_Nb(X6),constr_tuple_2_get_1_bitstring(constr_checksign(X5,constr_pkey(name_skS))))) ),
    inference(resolution,[],[f1138,f488]) ).

fof(f488,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(tuple_3(X2,X1,X0))
      | pred_attacker(X1) ),
    inference(cnf_transformation,[],[f408]) ).

fof(f408,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(X1)
      | ~ pred_attacker(tuple_3(X2,X1,X0)) ),
    inference(rectify,[],[f367]) ).

fof(f367,plain,
    ! [X1,X2,X0] :
      ( pred_attacker(X2)
      | ~ pred_attacker(tuple_3(X0,X2,X1)) ),
    inference(ennf_transformation,[],[f261]) ).

fof(f261,plain,
    ! [X1,X2,X0] :
      ( pred_attacker(tuple_3(X0,X2,X1))
     => pred_attacker(X2) ),
    inference(rectify,[],[f170]) ).

fof(f170,axiom,
    ! [X166,X168,X167] :
      ( pred_attacker(tuple_3(X166,X167,X168))
     => pred_attacker(X167) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax169) ).

fof(f1138,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X2),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_3(X0))
      | ~ pred_attacker(tuple_client_B_in_2(X1)) ),
    inference(resolution,[],[f659,f500]) ).

fof(f500,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_B_out_4(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f397]) ).

fof(f397,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_B_out_4(X0)) ),
    inference(ennf_transformation,[],[f287]) ).

fof(f287,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_out_4(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f136]) ).

fof(f136,axiom,
    ! [X111] :
      ( pred_attacker(tuple_client_B_out_4(X111))
     => pred_attacker(X111) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax135) ).

fof(f659,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_B_out_4(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_attacker(tuple_client_B_in_2(X2)) ),
    inference(subsumption_resolution,[],[f658,f539]) ).

fof(f539,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X1,X0),
    inference(cnf_transformation,[],[f419]) ).

fof(f419,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X1,X0),
    inference(rectify,[],[f240]) ).

fof(f240,plain,
    ! [X1,X0] : pred_eq_bitstring_bitstring(X0,X1),
    inference(rectify,[],[f96]) ).

fof(f96,axiom,
    ! [X49,X50] : pred_eq_bitstring_bitstring(X49,X50),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax95) ).

fof(f658,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_B_out_4(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ),
    inference(subsumption_resolution,[],[f647,f539]) ).

fof(f647,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | pred_attacker(tuple_client_B_out_4(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ),
    inference(definition_unfolding,[],[f502,f453]) ).

fof(f453,plain,
    ! [X2,X3,X0,X1] : tuple_3(constr_ecb_enc_1(X2,X1),constr_ecb_enc_1(X3,X1),constr_ecb_enc_1(X0,X1)) = constr_ecb_enc_3(X2,X3,X0,X1),
    inference(cnf_transformation,[],[f406]) ).

fof(f406,plain,
    ! [X0,X1,X2,X3] : tuple_3(constr_ecb_enc_1(X2,X1),constr_ecb_enc_1(X3,X1),constr_ecb_enc_1(X0,X1)) = constr_ecb_enc_3(X2,X3,X0,X1),
    inference(rectify,[],[f259]) ).

fof(f259,plain,
    ! [X2,X0,X1,X3] : tuple_3(constr_ecb_enc_1(X1,X0),constr_ecb_enc_1(X3,X0),constr_ecb_enc_1(X2,X0)) = constr_ecb_enc_3(X1,X3,X2,X0),
    inference(rectify,[],[f87]) ).

fof(f87,axiom,
    ! [X25,X26,X28,X27] : constr_ecb_enc_3(X26,X27,X28,X25) = tuple_3(constr_ecb_enc_1(X26,X25),constr_ecb_enc_1(X27,X25),constr_ecb_enc_1(X28,X25)),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax86) ).

fof(f502,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(tuple_client_B_in_2(X2))
      | pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X0),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_3(X1)) ),
    inference(cnf_transformation,[],[f411]) ).

fof(f411,plain,
    ! [X0,X1,X2] :
      ( ~ pred_attacker(tuple_client_B_in_2(X2))
      | pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X0),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_3(X1)) ),
    inference(rectify,[],[f306]) ).

fof(f306,plain,
    ! [X1,X0,X2] :
      ( ~ pred_attacker(tuple_client_B_in_2(X2))
      | pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),name_Nb(X1),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X0,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_3(X0)) ),
    inference(flattening,[],[f305]) ).

fof(f305,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),name_Nb(X1),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X0,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_3(X0))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS)))) ),
    inference(ennf_transformation,[],[f255]) ).

fof(f255,plain,
    ! [X0,X1,X2] :
      ( ( pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X0,name_skB)))
        & pred_attacker(tuple_client_B_in_3(X0))
        & pred_attacker(tuple_client_B_in_2(X2))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS)))) )
     => pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),name_Nb(X1),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
    inference(rectify,[],[f192]) ).

fof(f192,axiom,
    ! [X190,X189,X191] :
      ( ( pred_attacker(tuple_client_B_in_3(X190))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X191,constr_pkey(name_skS))))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X190,name_skB)))
        & pred_attacker(tuple_client_B_in_2(X191)) )
     => pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X190,name_skB)),name_Nb(X189),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X191,constr_pkey(name_skS)))))) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax191) ).

fof(f1439,plain,
    ~ spl3_13,
    inference(avatar_contradiction_clause,[],[f1438]) ).

fof(f1438,plain,
    ( $false
    | ~ spl3_13 ),
    inference(subsumption_resolution,[],[f1437,f526]) ).

fof(f526,plain,
    constr_CONST_4 != name_B,
    inference(cnf_transformation,[],[f44]) ).

fof(f44,axiom,
    constr_CONST_4 != name_B,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax43) ).

fof(f1437,plain,
    ( constr_CONST_4 = name_B
    | ~ spl3_13 ),
    inference(subsumption_resolution,[],[f1206,f533]) ).

fof(f533,plain,
    constr_CONST_4 != name_A,
    inference(cnf_transformation,[],[f43]) ).

fof(f43,axiom,
    constr_CONST_4 != name_A,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax42) ).

fof(f1206,plain,
    ( constr_CONST_4 = name_A
    | constr_CONST_4 = name_B
    | ~ spl3_13 ),
    inference(resolution,[],[f1150,f613]) ).

fof(f613,plain,
    pred_attacker(constr_CONST_4),
    inference(cnf_transformation,[],[f158]) ).

fof(f158,axiom,
    pred_attacker(constr_CONST_4),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax157) ).

fof(f1150,plain,
    ( ! [X1] :
        ( ~ pred_attacker(X1)
        | name_A = X1
        | name_B = X1 )
    | ~ spl3_13 ),
    inference(avatar_component_clause,[],[f1149]) ).

fof(f1106,plain,
    ~ spl3_9,
    inference(avatar_contradiction_clause,[],[f1056]) ).

fof(f1056,plain,
    ( $false
    | ~ spl3_9 ),
    inference(resolution,[],[f1006,f494]) ).

fof(f494,plain,
    pred_attacker(tuple_out_1(constr_pkey(name_skA))),
    inference(cnf_transformation,[],[f185]) ).

fof(f185,axiom,
    pred_attacker(tuple_out_1(constr_pkey(name_skA))),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax184) ).

fof(f1006,plain,
    ( ! [X2] : ~ pred_attacker(X2)
    | ~ spl3_9 ),
    inference(avatar_component_clause,[],[f1005]) ).

fof(f1010,plain,
    ( spl3_9
    | spl3_10 ),
    inference(avatar_split_clause,[],[f1003,f1008,f1005]) ).

fof(f1003,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | ~ pred_attacker(X2)
      | name_B = X0
      | ~ pred_attacker(X0)
      | name_A = X0
      | ~ pred_attacker(X1) ),
    inference(resolution,[],[f806,f534]) ).

fof(f534,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f417]) ).

fof(f417,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(X0)
      | pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
      | ~ pred_attacker(X1) ),
    inference(rectify,[],[f370]) ).

fof(f370,plain,
    ! [X1,X0] :
      ( ~ pred_attacker(X1)
      | pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f369]) ).

fof(f369,plain,
    ! [X1,X0] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f243]) ).

fof(f243,plain,
    ! [X1,X0] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
    inference(rectify,[],[f115]) ).

fof(f115,axiom,
    ! [X69,X70] :
      ( ( pred_attacker(X70)
        & pred_attacker(X69) )
     => pred_attacker(tuple_key_retrieval_server_in_1(X69,X70)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax114) ).

fof(f806,plain,
    ! [X2,X3,X4] :
      ( ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X3))
      | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X3,X4),name_skS)))
      | ~ pred_attacker(X4)
      | name_B = X3
      | name_A = X3 ),
    inference(subsumption_resolution,[],[f797,f629]) ).

fof(f629,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f446]) ).

fof(f446,plain,
    ! [X0,X1] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,X0)) ),
    inference(rectify,[],[f312]) ).

fof(f312,plain,
    ! [X1,X0] :
      ( pred_attacker(X1)
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
    inference(ennf_transformation,[],[f252]) ).

fof(f252,plain,
    ! [X1,X0] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
     => pred_attacker(X1) ),
    inference(rectify,[],[f117]) ).

fof(f117,axiom,
    ! [X73,X74] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X73,X74))
     => pred_attacker(X74) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax116) ).

fof(f797,plain,
    ! [X2,X3,X4] :
      ( name_A = X3
      | ~ pred_attacker(X4)
      | ~ pred_attacker(X3)
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X3))
      | name_B = X3
      | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X3,X4),name_skS))) ),
    inference(resolution,[],[f583,f792]) ).

fof(f792,plain,
    ! [X0,X1] :
      ( pred_table(tuple_keys(X0,X1))
      | ~ pred_attacker(X1)
      | name_A = X0
      | name_B = X0
      | ~ pred_attacker(X0) ),
    inference(resolution,[],[f636,f481]) ).

fof(f481,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f373]) ).

fof(f373,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(X1)
      | pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f372]) ).

fof(f372,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f268]) ).

fof(f268,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(tuple_key_register_server_in_1(X0,X1)) ),
    inference(rectify,[],[f118]) ).

fof(f118,axiom,
    ! [X75,X76] :
      ( ( pred_attacker(X76)
        & pred_attacker(X75) )
     => pred_attacker(tuple_key_register_server_in_1(X75,X76)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax117) ).

fof(f636,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(tuple_key_register_server_in_1(X1,X0))
      | name_B = X1
      | pred_table(tuple_keys(X1,X0))
      | name_A = X1 ),
    inference(cnf_transformation,[],[f400]) ).

fof(f400,plain,
    ! [X0,X1] :
      ( name_A = X1
      | ~ pred_attacker(tuple_key_register_server_in_1(X1,X0))
      | pred_table(tuple_keys(X1,X0))
      | name_B = X1 ),
    inference(flattening,[],[f399]) ).

fof(f399,plain,
    ! [X0,X1] :
      ( pred_table(tuple_keys(X1,X0))
      | ~ pred_attacker(tuple_key_register_server_in_1(X1,X0))
      | name_A = X1
      | name_B = X1 ),
    inference(ennf_transformation,[],[f263]) ).

fof(f263,plain,
    ! [X0,X1] :
      ( ( pred_attacker(tuple_key_register_server_in_1(X1,X0))
        & name_A != X1
        & name_B != X1 )
     => pred_table(tuple_keys(X1,X0)) ),
    inference(rectify,[],[f195]) ).

fof(f195,axiom,
    ! [X200,X199] :
      ( ( name_B != X199
        & name_A != X199
        & pred_attacker(tuple_key_register_server_in_1(X199,X200)) )
     => pred_table(tuple_keys(X199,X200)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax194) ).

fof(f583,plain,
    ! [X2,X0,X1] :
      ( ~ pred_table(tuple_keys(X1,X2))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
      | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X2),name_skS))) ),
    inference(cnf_transformation,[],[f428]) ).

fof(f428,plain,
    ! [X0,X1,X2] :
      ( ~ pred_table(tuple_keys(X1,X2))
      | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X2),name_skS)))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
    inference(rectify,[],[f376]) ).

fof(f376,plain,
    ! [X2,X0,X1] :
      ( ~ pred_table(tuple_keys(X0,X1))
      | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0)) ),
    inference(flattening,[],[f375]) ).

fof(f375,plain,
    ! [X0,X2,X1] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
      | ~ pred_table(tuple_keys(X0,X1)) ),
    inference(ennf_transformation,[],[f227]) ).

fof(f227,plain,
    ! [X0,X2,X1] :
      ( ( pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
        & pred_table(tuple_keys(X0,X1)) )
     => pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
    inference(rectify,[],[f194]) ).

fof(f194,axiom,
    ! [X196,X197,X198] :
      ( ( pred_table(tuple_keys(X196,X197))
        & pred_attacker(tuple_key_retrieval_server_in_1(X198,X196)) )
     => pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X196,X197),name_skS))) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax193) ).

fof(f726,plain,
    ~ spl3_2,
    inference(avatar_contradiction_clause,[],[f689]) ).

fof(f689,plain,
    ( $false
    | ~ spl3_2 ),
    inference(resolution,[],[f680,f581]) ).

fof(f581,plain,
    pred_attacker(name_c),
    inference(cnf_transformation,[],[f177]) ).

fof(f177,axiom,
    pred_attacker(name_c),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax176) ).

fof(f680,plain,
    ( ! [X1] : ~ pred_attacker(X1)
    | ~ spl3_2 ),
    inference(resolution,[],[f552,f668]) ).

fof(f668,plain,
    ( ! [X3] : ~ pred_attacker(tuple_client_B_in_5(X3))
    | ~ spl3_2 ),
    inference(avatar_component_clause,[],[f667]) ).

fof(f667,plain,
    ( spl3_2
  <=> ! [X3] : ~ pred_attacker(tuple_client_B_in_5(X3)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_2])]) ).

fof(f552,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_5(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f329]) ).

fof(f329,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_5(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f247]) ).

fof(f247,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_5(X0)) ),
    inference(rectify,[],[f140]) ).

fof(f140,axiom,
    ! [X118] :
      ( pred_attacker(X118)
     => pred_attacker(tuple_client_B_in_5(X118)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax139) ).

fof(f676,plain,
    ( spl3_1
    | spl3_2
    | spl3_3
    | spl3_4 ),
    inference(avatar_split_clause,[],[f662,f674,f670,f667,f664]) ).

fof(f662,plain,
    ! [X2,X3,X1] :
      ( ~ pred_attacker(tuple_client_B_in_3(X1))
      | pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_5(X3))
      | ~ pred_attacker(tuple_client_B_in_2(X2)) ),
    inference(subsumption_resolution,[],[f661,f539]) ).

fof(f661,plain,
    ! [X2,X3,X1] :
      ( ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_attacker(tuple_client_B_in_5(X3))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(subsumption_resolution,[],[f660,f539]) ).

fof(f660,plain,
    ! [X2,X3,X1] :
      ( ~ pred_attacker(tuple_client_B_in_5(X3))
      | pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_attacker(tuple_client_B_in_2(X2)) ),
    inference(subsumption_resolution,[],[f566,f539]) ).

fof(f566,plain,
    ! [X2,X3,X0,X1] :
      ( ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X3,name_skB))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_attacker(tuple_client_B_in_5(X3)) ),
    inference(cnf_transformation,[],[f427]) ).

fof(f427,plain,
    ! [X0,X1,X2,X3] :
      ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_5(X3))
      | pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X3,name_skB)) ),
    inference(rectify,[],[f395]) ).

fof(f395,plain,
    ! [X0,X2,X1,X3] :
      ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_5(X3))
      | pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_2(X1))
      | ~ pred_attacker(tuple_client_B_in_3(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X2,name_skB)))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X3,name_skB)) ),
    inference(flattening,[],[f394]) ).

fof(f394,plain,
    ! [X2,X3,X1,X0] :
      ( pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_2(X1))
      | ~ pred_attacker(tuple_client_B_in_5(X3))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X3,name_skB))
      | ~ pred_attacker(tuple_client_B_in_3(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X2,name_skB))) ),
    inference(ennf_transformation,[],[f290]) ).

fof(f290,plain,
    ! [X2,X3,X1,X0] :
      ( ( pred_attacker(tuple_client_B_in_2(X1))
        & pred_attacker(tuple_client_B_in_5(X3))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
        & pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X3,name_skB))
        & pred_attacker(tuple_client_B_in_3(X2))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X2,name_skB))) )
     => pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(rectify,[],[f193]) ).

fof(f193,axiom,
    ! [X192,X195,X193,X194] :
      ( ( pred_attacker(tuple_client_B_in_5(X194))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X195,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_3(X193))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X193,name_skB)))
        & pred_attacker(tuple_client_B_in_2(X195))
        & pred_eq_bitstring_bitstring(name_Nb(X192),constr_ecb_dec_1(X194,name_skB)) )
     => pred_attacker(tuple_client_B_out_6(name_objective)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax192) ).

%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.11/0.12  % Problem    : SWW964+1 : TPTP v8.1.0. Released v7.4.0.
% 0.11/0.12  % Command    : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_sat --cores 0 -t %d %s
% 0.12/0.33  % Computer : n012.cluster.edu
% 0.12/0.33  % Model    : x86_64 x86_64
% 0.12/0.33  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.12/0.33  % Memory   : 8042.1875MB
% 0.12/0.33  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.12/0.33  % CPULimit   : 300
% 0.12/0.33  % WCLimit    : 300
% 0.12/0.33  % DateTime   : Tue Aug 30 21:17:50 EDT 2022
% 0.12/0.33  % CPUTime    : 
% 0.18/0.48  % (12607)ott+10_1:5_bd=off:tgt=full:i=99:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/99Mi)
% 0.18/0.49  % (12615)ott+3_1:1_gsp=on:lcm=predicate:i=138:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/138Mi)
% 0.18/0.50  % (12609)ott+11_2:3_av=off:fde=unused:nwc=5.0:tgt=ground:i=75:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/75Mi)
% 0.18/0.51  % (12623)ott+10_7:2_awrs=decay:awrsf=8:bd=preordered:drc=off:fd=preordered:fde=unused:fsr=off:slsq=on:slsqc=2:slsqr=5,8:sp=const_min:spb=units:to=lpo:i=355:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/355Mi)
% 0.18/0.51  % (12617)ott+11_1:1_drc=off:nwc=5.0:slsq=on:slsqc=1:spb=goal_then_units:to=lpo:i=467:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/467Mi)
% 0.18/0.51  % (12604)ott+2_1:1_fsr=off:gsp=on:i=50:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/50Mi)
% 0.18/0.52  % (12598)ott+33_1:4_s2a=on:tgt=ground:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 0.18/0.52  % (12595)ott+10_1:32_abs=on:br=off:urr=ec_only:i=50:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/50Mi)
% 0.18/0.52  % (12605)ott+10_1:32_bd=off:fsr=off:newcnf=on:tgt=full:i=100:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/100Mi)
% 0.18/0.52  % (12601)dis+10_1:1_fsd=on:sp=occurrence:i=7:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/7Mi)
% 0.18/0.52  % (12601)Instruction limit reached!
% 0.18/0.52  % (12601)------------------------------
% 0.18/0.52  % (12601)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.18/0.52  % (12594)fmb+10_1:1_bce=on:fmbsr=1.5:nm=4:skr=on:i=191324:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/191324Mi)
% 0.18/0.52  % (12616)dis+21_1:1_av=off:er=filter:slsq=on:slsqc=0:slsqr=1,1:sp=frequency:to=lpo:i=498:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/498Mi)
% 0.18/0.52  % (12619)ott+10_1:5_bd=off:tgt=full:i=500:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/500Mi)
% 0.18/0.52  % (12599)dis+34_1:32_abs=on:add=off:bsr=on:gsp=on:sp=weighted_frequency:i=48:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/48Mi)
% 0.18/0.52  % (12606)ott+10_1:28_bd=off:bs=on:tgt=ground:i=101:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/101Mi)
% 0.18/0.53  % (12597)ott+10_1:32_bd=off:fsr=off:newcnf=on:tgt=full:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 0.18/0.53  % (12602)dis+2_1:64_add=large:bce=on:bd=off:i=2:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/2Mi)
% 0.18/0.53  % (12602)Instruction limit reached!
% 0.18/0.53  % (12602)------------------------------
% 0.18/0.53  % (12602)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.18/0.53  % (12602)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.18/0.53  % (12602)Termination reason: Unknown
% 0.18/0.53  % (12602)Termination phase: Preprocessing 3
% 0.18/0.53  
% 0.18/0.53  % (12602)Memory used [KB]: 1279
% 0.18/0.53  % (12602)Time elapsed: 0.003 s
% 0.18/0.53  % (12602)Instructions burned: 3 (million)
% 0.18/0.53  % (12602)------------------------------
% 0.18/0.53  % (12602)------------------------------
% 0.18/0.53  % (12601)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.18/0.53  % (12601)Termination reason: Unknown
% 0.18/0.53  % (12601)Termination phase: Saturation
% 0.18/0.53  
% 0.18/0.53  % (12601)Memory used [KB]: 5884
% 0.18/0.53  % (12601)Time elapsed: 0.122 s
% 0.18/0.53  % (12601)Instructions burned: 8 (million)
% 0.18/0.53  % (12601)------------------------------
% 0.18/0.53  % (12601)------------------------------
% 0.18/0.53  % (12596)ott+4_1:1_av=off:bd=off:nwc=5.0:s2a=on:s2at=2.0:slsq=on:slsqc=2:slsql=off:slsqr=1,2:sp=frequency:i=37:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/37Mi)
% 0.18/0.53  % (12611)fmb+10_1:1_bce=on:i=59:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/59Mi)
% 0.18/0.53  % (12621)ott+11_2:3_av=off:fde=unused:nwc=5.0:tgt=ground:i=177:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/177Mi)
% 0.18/0.53  % (12603)ott-1_1:6_av=off:cond=on:fsr=off:nwc=3.0:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 0.18/0.53  % (12620)ins+10_1:1_awrs=decay:awrsf=30:bsr=unit_only:foolp=on:igrr=8/457:igs=10:igwr=on:nwc=1.5:sp=weighted_frequency:to=lpo:uhcvi=on:i=68:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/68Mi)
% 0.18/0.53  % (12608)ins+10_1:1_awrs=decay:awrsf=30:bsr=unit_only:foolp=on:igrr=8/457:igs=10:igwr=on:nwc=1.5:sp=weighted_frequency:to=lpo:uhcvi=on:i=68:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/68Mi)
% 0.18/0.53  % (12622)ott+33_1:4_s2a=on:tgt=ground:i=439:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/439Mi)
% 0.18/0.53  % (12613)ott+4_1:1_av=off:bd=off:nwc=5.0:rp=on:s2a=on:s2at=2.0:slsq=on:slsqc=2:slsql=off:slsqr=1,2:sp=frequency:i=100:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/100Mi)
% 0.18/0.54  % (12618)ott+10_1:1_kws=precedence:tgt=ground:i=482:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/482Mi)
% 0.18/0.54  % (12595)Refutation not found, incomplete strategy% (12595)------------------------------
% 0.18/0.54  % (12595)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.18/0.54  % (12595)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.18/0.54  % (12595)Termination reason: Refutation not found, incomplete strategy
% 0.18/0.54  
% 0.18/0.54  % (12595)Memory used [KB]: 6140
% 0.18/0.54  % (12595)Time elapsed: 0.133 s
% 0.18/0.54  % (12595)Instructions burned: 16 (million)
% 0.18/0.54  % (12595)------------------------------
% 0.18/0.54  % (12595)------------------------------
% 0.18/0.54  % (12610)dis+34_1:32_abs=on:add=off:bsr=on:gsp=on:sp=weighted_frequency:i=99:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/99Mi)
% 0.18/0.54  % (12612)ott+10_1:1_tgt=ground:i=100:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/100Mi)
% 0.18/0.54  % (12614)ott+10_1:8_bsd=on:fsd=on:lcm=predicate:nwc=5.0:s2a=on:s2at=1.5:spb=goal_then_units:i=176:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/176Mi)
% 0.18/0.55  % (12600)fmb+10_1:1_fmbsr=2.0:nm=4:skr=on:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 0.18/0.56  % (12607)First to succeed.
% 0.18/0.56  % (12607)Refutation found. Thanks to Tanya!
% 0.18/0.56  % SZS status Theorem for theBenchmark
% 0.18/0.56  % SZS output start Proof for theBenchmark
% See solution above
% 0.18/0.56  % (12607)------------------------------
% 0.18/0.56  % (12607)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.18/0.56  % (12607)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.18/0.56  % (12607)Termination reason: Refutation
% 0.18/0.56  
% 0.18/0.56  % (12607)Memory used [KB]: 6524
% 0.18/0.56  % (12607)Time elapsed: 0.152 s
% 0.18/0.56  % (12607)Instructions burned: 37 (million)
% 0.18/0.56  % (12607)------------------------------
% 0.18/0.56  % (12607)------------------------------
% 0.18/0.56  % (12593)Success in time 0.217 s
%------------------------------------------------------------------------------