TSTP Solution File: SWW964+1 by Vampire---4.8
View Problem
- Process Solution
%------------------------------------------------------------------------------
% File : Vampire---4.8
% Problem : SWW964+1 : TPTP v8.1.2. Released v7.4.0.
% Transfm : none
% Format : tptp:raw
% Command : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule file --schedule_file /export/starexec/sandbox2/solver/bin/quickGreedyProduceRating_steal_pow3.txt --cores 8 -m 12000 -t %d %s
% Computer : n012.cluster.edu
% Model : x86_64 x86_64
% CPU : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory : 8042.1875MB
% OS : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit : 300s
% DateTime : Sun May 5 11:31:50 EDT 2024
% Result : Theorem 0.95s 0.88s
% Output : Refutation 0.95s
% Verified :
% SZS Type : Refutation
% Derivation depth : 16
% Number of leaves : 39
% Syntax : Number of formulae : 170 ( 32 unt; 0 def)
% Number of atoms : 450 ( 39 equ)
% Maximal formula atoms : 8 ( 2 avg)
% Number of connectives : 495 ( 215 ~; 205 |; 30 &)
% ( 12 <=>; 33 =>; 0 <=; 0 <~>)
% Maximal formula depth : 12 ( 5 avg)
% Maximal term depth : 7 ( 2 avg)
% Number of predicates : 17 ( 15 usr; 13 prp; 0-2 aty)
% Number of functors : 30 ( 30 usr; 7 con; 0-4 aty)
% Number of variables : 277 ( 275 !; 2 ?)
% Comments :
%------------------------------------------------------------------------------
fof(f1381,plain,
$false,
inference(avatar_sat_refutation,[],[f494,f506,f524,f533,f539,f541,f897,f1152,f1235,f1340,f1355,f1375,f1380]) ).
fof(f1380,plain,
( spl1_7
| ~ spl1_1 ),
inference(avatar_split_clause,[],[f1379,f482,f510]) ).
fof(f510,plain,
( spl1_7
<=> ! [X1] : ~ pred_attacker(X1) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_7])]) ).
fof(f482,plain,
( spl1_1
<=> ! [X2,X0] :
( ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X2,name_skB)) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_1])]) ).
fof(f1379,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl1_1 ),
inference(resolution,[],[f1376,f413]) ).
fof(f413,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f304]) ).
fof(f304,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f221]) ).
fof(f221,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_5(X0)) ),
inference(rectify,[],[f140]) ).
fof(f140,axiom,
! [X118] :
( pred_attacker(X118)
=> pred_attacker(tuple_client_B_in_5(X118)) ),
file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax139) ).
fof(f1376,plain,
( ! [X2] : ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ spl1_1 ),
inference(subsumption_resolution,[],[f483,f398]) ).
fof(f398,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
inference(cnf_transformation,[],[f206]) ).
fof(f206,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
inference(rectify,[],[f96]) ).
fof(f96,axiom,
! [X49,X50] : pred_eq_bitstring_bitstring(X49,X50),
file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax95) ).
fof(f483,plain,
( ! [X2,X0] :
( ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X2,name_skB)) )
| ~ spl1_1 ),
inference(avatar_component_clause,[],[f482]) ).
fof(f1375,plain,
( spl1_5
| ~ spl1_66 ),
inference(avatar_contradiction_clause,[],[f1374]) ).
fof(f1374,plain,
( $false
| spl1_5
| ~ spl1_66 ),
inference(resolution,[],[f1354,f501]) ).
fof(f501,plain,
( ~ pred_attacker(name_Nb(sK0))
| spl1_5 ),
inference(avatar_component_clause,[],[f499]) ).
fof(f499,plain,
( spl1_5
<=> pred_attacker(name_Nb(sK0)) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_5])]) ).
fof(f1354,plain,
( ! [X1] : pred_attacker(name_Nb(X1))
| ~ spl1_66 ),
inference(avatar_component_clause,[],[f1353]) ).
fof(f1353,plain,
( spl1_66
<=> ! [X1] : pred_attacker(name_Nb(X1)) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_66])]) ).
fof(f1355,plain,
( spl1_66
| spl1_7
| ~ spl1_63 ),
inference(avatar_split_clause,[],[f1351,f1298,f510,f1353]) ).
fof(f1298,plain,
( spl1_63
<=> ! [X2,X1] :
( pred_attacker(constr_ecb_enc_1(name_Nb(X1),X2))
| ~ pred_attacker(X2) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_63])]) ).
fof(f1351,plain,
( ! [X0,X1] :
( ~ pred_attacker(X0)
| pred_attacker(name_Nb(X1)) )
| ~ spl1_63 ),
inference(subsumption_resolution,[],[f1342,f399]) ).
fof(f399,plain,
! [X0] :
( pred_attacker(constr_pkey(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f292]) ).
fof(f292,plain,
! [X0] :
( pred_attacker(constr_pkey(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f207]) ).
fof(f207,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(constr_pkey(X0)) ),
inference(rectify,[],[f106]) ).
fof(f106,axiom,
! [X60] :
( pred_attacker(X60)
=> pred_attacker(constr_pkey(X60)) ),
file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax105) ).
fof(f1342,plain,
( ! [X0,X1] :
( ~ pred_attacker(constr_pkey(X0))
| ~ pred_attacker(X0)
| pred_attacker(name_Nb(X1)) )
| ~ spl1_63 ),
inference(resolution,[],[f1299,f558]) ).
fof(f558,plain,
! [X0,X1] :
( ~ pred_attacker(constr_ecb_enc_1(X0,constr_pkey(X1)))
| ~ pred_attacker(X1)
| pred_attacker(X0) ),
inference(superposition,[],[f404,f405]) ).
fof(f405,plain,
! [X0,X1] : constr_ecb_dec_1(constr_ecb_enc_1(X1,constr_pkey(X0)),X0) = X1,
inference(cnf_transformation,[],[f213]) ).
fof(f213,plain,
! [X0,X1] : constr_ecb_dec_1(constr_ecb_enc_1(X1,constr_pkey(X0)),X0) = X1,
inference(rectify,[],[f85]) ).
fof(f85,axiom,
! [X18,X19] : constr_ecb_dec_1(constr_ecb_enc_1(X19,constr_pkey(X18)),X18) = X19,
file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax84) ).
fof(f404,plain,
! [X0,X1] :
( pred_attacker(constr_ecb_dec_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f298]) ).
fof(f298,plain,
! [X0,X1] :
( pred_attacker(constr_ecb_dec_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f297]) ).
fof(f297,plain,
! [X0,X1] :
( pred_attacker(constr_ecb_dec_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f212]) ).
fof(f212,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(constr_ecb_dec_1(X0,X1)) ),
inference(rectify,[],[f131]) ).
fof(f131,axiom,
! [X104,X105] :
( ( pred_attacker(X105)
& pred_attacker(X104) )
=> pred_attacker(constr_ecb_dec_1(X104,X105)) ),
file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax130) ).
fof(f1299,plain,
( ! [X2,X1] :
( pred_attacker(constr_ecb_enc_1(name_Nb(X1),X2))
| ~ pred_attacker(X2) )
| ~ spl1_63 ),
inference(avatar_component_clause,[],[f1298]) ).
fof(f1340,plain,
( spl1_7
| spl1_63
| ~ spl1_58 ),
inference(avatar_split_clause,[],[f1331,f1233,f1298,f510]) ).
fof(f1233,plain,
( spl1_58
<=> ! [X2,X1,X3] :
( ~ pred_attacker(X1)
| ~ pred_attacker(X2)
| pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),X2),constr_ecb_enc_1(name_Nb(X3),X2),constr_ecb_enc_1(name_B,X2))) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_58])]) ).
fof(f1331,plain,
( ! [X2,X0,X1] :
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(constr_ecb_enc_1(name_Nb(X2),X0)) )
| ~ spl1_58 ),
inference(resolution,[],[f1234,f450]) ).
fof(f450,plain,
! [X2,X0,X1] :
( ~ pred_attacker(tuple_3(X0,X1,X2))
| pred_attacker(X1) ),
inference(cnf_transformation,[],[f337]) ).
fof(f337,plain,
! [X0,X1,X2] :
( pred_attacker(X1)
| ~ pred_attacker(tuple_3(X0,X1,X2)) ),
inference(ennf_transformation,[],[f258]) ).
fof(f258,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_3(X0,X1,X2))
=> pred_attacker(X1) ),
inference(rectify,[],[f170]) ).
fof(f170,axiom,
! [X166,X167,X168] :
( pred_attacker(tuple_3(X166,X167,X168))
=> pred_attacker(X167) ),
file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax169) ).
fof(f1234,plain,
( ! [X2,X3,X1] :
( pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),X2),constr_ecb_enc_1(name_Nb(X3),X2),constr_ecb_enc_1(name_B,X2)))
| ~ pred_attacker(X2)
| ~ pred_attacker(X1) )
| ~ spl1_58 ),
inference(avatar_component_clause,[],[f1233]) ).
fof(f1235,plain,
( spl1_58
| spl1_17
| ~ spl1_52 ),
inference(avatar_split_clause,[],[f1229,f1150,f686,f1233]) ).
fof(f686,plain,
( spl1_17
<=> ! [X0] :
( ~ pred_attacker(X0)
| name_B = X0
| name_A = X0 ) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_17])]) ).
fof(f1150,plain,
( spl1_52
<=> ! [X0,X3,X2,X1] :
( ~ pred_attacker(X0)
| ~ pred_attacker(X3)
| ~ pred_table(tuple_keys(X3,X1))
| pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),X1),constr_ecb_enc_1(name_Nb(X2),X1),constr_ecb_enc_1(name_B,X1))) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_52])]) ).
fof(f1229,plain,
( ! [X2,X3,X0,X1] :
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),X2),constr_ecb_enc_1(name_Nb(X3),X2),constr_ecb_enc_1(name_B,X2)))
| ~ pred_attacker(X2)
| name_A = X0
| name_B = X0 )
| ~ spl1_52 ),
inference(duplicate_literal_removal,[],[f1228]) ).
fof(f1228,plain,
( ! [X2,X3,X0,X1] :
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),X2),constr_ecb_enc_1(name_Nb(X3),X2),constr_ecb_enc_1(name_B,X2)))
| ~ pred_attacker(X0)
| ~ pred_attacker(X2)
| name_A = X0
| name_B = X0 )
| ~ spl1_52 ),
inference(resolution,[],[f1151,f586]) ).
fof(f586,plain,
! [X0,X1] :
( pred_table(tuple_keys(X1,X0))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0)
| name_A = X1
| name_B = X1 ),
inference(resolution,[],[f472,f460]) ).
fof(f460,plain,
! [X0,X1] :
( ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
| pred_table(tuple_keys(X0,X1))
| name_A = X0
| name_B = X0 ),
inference(cnf_transformation,[],[f350]) ).
fof(f350,plain,
! [X0,X1] :
( pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
| name_A = X0
| name_B = X0 ),
inference(flattening,[],[f349]) ).
fof(f349,plain,
! [X0,X1] :
( pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
| name_A = X0
| name_B = X0 ),
inference(ennf_transformation,[],[f268]) ).
fof(f268,plain,
! [X0,X1] :
( ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
& name_A != X0
& name_B != X0 )
=> pred_table(tuple_keys(X0,X1)) ),
inference(rectify,[],[f195]) ).
fof(f195,axiom,
! [X199,X200] :
( ( pred_attacker(tuple_key_register_server_in_1(X199,X200))
& name_A != X199
& name_B != X199 )
=> pred_table(tuple_keys(X199,X200)) ),
file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax194) ).
fof(f472,plain,
! [X0,X1] :
( pred_attacker(tuple_key_register_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f363]) ).
fof(f363,plain,
! [X0,X1] :
( pred_attacker(tuple_key_register_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f362]) ).
fof(f362,plain,
! [X0,X1] :
( pred_attacker(tuple_key_register_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f278]) ).
fof(f278,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(tuple_key_register_server_in_1(X0,X1)) ),
inference(rectify,[],[f118]) ).
fof(f118,axiom,
! [X75,X76] :
( ( pred_attacker(X76)
& pred_attacker(X75) )
=> pred_attacker(tuple_key_register_server_in_1(X75,X76)) ),
file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax117) ).
fof(f1151,plain,
( ! [X2,X3,X0,X1] :
( ~ pred_table(tuple_keys(X3,X1))
| ~ pred_attacker(X3)
| ~ pred_attacker(X0)
| pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),X1),constr_ecb_enc_1(name_Nb(X2),X1),constr_ecb_enc_1(name_B,X1))) )
| ~ spl1_52 ),
inference(avatar_component_clause,[],[f1150]) ).
fof(f1152,plain,
( spl1_7
| spl1_52 ),
inference(avatar_split_clause,[],[f1148,f1150,f510]) ).
fof(f1148,plain,
! [X2,X3,X0,X1,X4] :
( ~ pred_attacker(X0)
| pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),X1),constr_ecb_enc_1(name_Nb(X2),X1),constr_ecb_enc_1(name_B,X1)))
| ~ pred_table(tuple_keys(X3,X1))
| ~ pred_attacker(X3)
| ~ pred_attacker(X4) ),
inference(resolution,[],[f809,f467]) ).
fof(f467,plain,
! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f356]) ).
fof(f356,plain,
! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f355]) ).
fof(f355,plain,
! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f273]) ).
fof(f273,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
inference(rectify,[],[f115]) ).
fof(f115,axiom,
! [X69,X70] :
( ( pred_attacker(X70)
& pred_attacker(X69) )
=> pred_attacker(tuple_key_retrieval_server_in_1(X69,X70)) ),
file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax114) ).
fof(f809,plain,
! [X2,X3,X0,X1,X4] :
( ~ pred_attacker(tuple_key_retrieval_server_in_1(X4,X1))
| ~ pred_attacker(X0)
| pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),X2),constr_ecb_enc_1(name_Nb(X3),X2),constr_ecb_enc_1(name_B,X2)))
| ~ pred_table(tuple_keys(X1,X2)) ),
inference(forward_demodulation,[],[f808,f422]) ).
fof(f422,plain,
! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
inference(cnf_transformation,[],[f230]) ).
fof(f230,plain,
! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
inference(rectify,[],[f90]) ).
fof(f90,axiom,
! [X35,X36] : constr_tuple_2_get_1_bitstring(tuple_2(X35,X36)) = X36,
file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax89) ).
fof(f808,plain,
! [X2,X3,X0,X1,X4] :
( pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),constr_tuple_2_get_1_bitstring(tuple_2(X1,X2))),constr_ecb_enc_1(name_Nb(X3),constr_tuple_2_get_1_bitstring(tuple_2(X1,X2))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(tuple_2(X1,X2)))))
| ~ pred_attacker(X0)
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X4,X1))
| ~ pred_table(tuple_keys(X1,X2)) ),
inference(resolution,[],[f740,f549]) ).
fof(f549,plain,
! [X2,X0,X1] :
( pred_attacker(constr_sign(tuple_2(X0,X1),name_skS))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
| ~ pred_table(tuple_keys(X0,X1)) ),
inference(resolution,[],[f463,f446]) ).
fof(f446,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
| ~ pred_table(tuple_keys(X0,X1)) ),
inference(cnf_transformation,[],[f333]) ).
fof(f333,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
| ~ pred_table(tuple_keys(X0,X1)) ),
inference(flattening,[],[f332]) ).
fof(f332,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
| ~ pred_table(tuple_keys(X0,X1)) ),
inference(ennf_transformation,[],[f254]) ).
fof(f254,plain,
! [X0,X1,X2] :
( ( pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
& pred_table(tuple_keys(X0,X1)) )
=> pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
inference(rectify,[],[f194]) ).
fof(f194,axiom,
! [X196,X197,X198] :
( ( pred_attacker(tuple_key_retrieval_server_in_1(X198,X196))
& pred_table(tuple_keys(X196,X197)) )
=> pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X196,X197),name_skS))) ),
file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax193) ).
fof(f463,plain,
! [X0] :
( ~ pred_attacker(tuple_key_retrieval_server_out_2(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f351]) ).
fof(f351,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_key_retrieval_server_out_2(X0)) ),
inference(ennf_transformation,[],[f269]) ).
fof(f269,plain,
! [X0] :
( pred_attacker(tuple_key_retrieval_server_out_2(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f114]) ).
fof(f114,axiom,
! [X68] :
( pred_attacker(tuple_key_retrieval_server_out_2(X68))
=> pred_attacker(X68) ),
file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax113) ).
fof(f740,plain,
! [X2,X0,X1] :
( ~ pred_attacker(constr_sign(X0,name_skS))
| pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(X0)),constr_ecb_enc_1(name_Nb(X2),constr_tuple_2_get_1_bitstring(X0)),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(X0))))
| ~ pred_attacker(X1) ),
inference(superposition,[],[f652,f401]) ).
fof(f401,plain,
! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
inference(cnf_transformation,[],[f209]) ).
fof(f209,plain,
! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
inference(rectify,[],[f81]) ).
fof(f81,axiom,
! [X4,X5] : constr_checksign(constr_sign(X5,X4),constr_pkey(X4)) = X5,
file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax80) ).
fof(f652,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X2),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(resolution,[],[f612,f415]) ).
fof(f415,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f306]) ).
fof(f306,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f223]) ).
fof(f223,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_3(X0)) ),
inference(rectify,[],[f142]) ).
fof(f142,axiom,
! [X120] :
( pred_attacker(X120)
=> pred_attacker(tuple_client_B_in_3(X120)) ),
file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax141) ).
fof(f612,plain,
! [X2,X0,X1] :
( ~ pred_attacker(tuple_client_B_in_3(X0))
| pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X2),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
| ~ pred_attacker(X1) ),
inference(resolution,[],[f547,f417]) ).
fof(f417,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f308]) ).
fof(f308,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f225]) ).
fof(f225,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_2(X0)) ),
inference(rectify,[],[f144]) ).
fof(f144,axiom,
! [X122] :
( pred_attacker(X122)
=> pred_attacker(tuple_client_B_in_2(X122)) ),
file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax143) ).
fof(f547,plain,
! [X2,X0,X1] :
( ~ pred_attacker(tuple_client_B_in_2(X1))
| pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X2),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_3(X0)) ),
inference(resolution,[],[f425,f535]) ).
fof(f535,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_B_out_4(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_attacker(tuple_client_B_in_3(X1)) ),
inference(subsumption_resolution,[],[f534,f398]) ).
fof(f534,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_B_out_4(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ),
inference(subsumption_resolution,[],[f473,f398]) ).
fof(f473,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_B_out_4(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ),
inference(definition_unfolding,[],[f377,f419]) ).
fof(f419,plain,
! [X2,X3,X0,X1] : constr_ecb_enc_3(X1,X2,X3,X0) = tuple_3(constr_ecb_enc_1(X1,X0),constr_ecb_enc_1(X2,X0),constr_ecb_enc_1(X3,X0)),
inference(cnf_transformation,[],[f227]) ).
fof(f227,plain,
! [X0,X1,X2,X3] : constr_ecb_enc_3(X1,X2,X3,X0) = tuple_3(constr_ecb_enc_1(X1,X0),constr_ecb_enc_1(X2,X0),constr_ecb_enc_1(X3,X0)),
inference(rectify,[],[f87]) ).
fof(f87,axiom,
! [X25,X26,X27,X28] : constr_ecb_enc_3(X26,X27,X28,X25) = tuple_3(constr_ecb_enc_1(X26,X25),constr_ecb_enc_1(X27,X25),constr_ecb_enc_1(X28,X25)),
file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax86) ).
fof(f377,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X0),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ),
inference(cnf_transformation,[],[f287]) ).
fof(f287,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X0),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ),
inference(flattening,[],[f286]) ).
fof(f286,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X0),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ),
inference(ennf_transformation,[],[f203]) ).
fof(f203,plain,
! [X0,X1,X2] :
( ( pred_attacker(tuple_client_B_in_2(X2))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X1))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) )
=> pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X0),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
inference(rectify,[],[f192]) ).
fof(f192,axiom,
! [X189,X190,X191] :
( ( pred_attacker(tuple_client_B_in_2(X191))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X191,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X190))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X190,name_skB))) )
=> pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X190,name_skB)),name_Nb(X189),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X191,constr_pkey(name_skS)))))) ),
file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax191) ).
fof(f425,plain,
! [X0] :
( ~ pred_attacker(tuple_client_B_out_4(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f313]) ).
fof(f313,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_B_out_4(X0)) ),
inference(ennf_transformation,[],[f233]) ).
fof(f233,plain,
! [X0] :
( pred_attacker(tuple_client_B_out_4(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f136]) ).
fof(f136,axiom,
! [X111] :
( pred_attacker(tuple_client_B_out_4(X111))
=> pred_attacker(X111) ),
file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax135) ).
fof(f897,plain,
~ spl1_17,
inference(avatar_contradiction_clause,[],[f896]) ).
fof(f896,plain,
( $false
| ~ spl1_17 ),
inference(subsumption_resolution,[],[f895,f391]) ).
fof(f391,plain,
name_A != name_I,
inference(cnf_transformation,[],[f52]) ).
fof(f52,axiom,
name_A != name_I,
file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax51) ).
fof(f895,plain,
( name_A = name_I
| ~ spl1_17 ),
inference(subsumption_resolution,[],[f832,f390]) ).
fof(f390,plain,
name_B != name_I,
inference(cnf_transformation,[],[f58]) ).
fof(f58,axiom,
name_B != name_I,
file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax57) ).
fof(f832,plain,
( name_B = name_I
| name_A = name_I
| ~ spl1_17 ),
inference(resolution,[],[f687,f388]) ).
fof(f388,plain,
pred_attacker(name_I),
inference(cnf_transformation,[],[f178]) ).
fof(f178,axiom,
pred_attacker(name_I),
file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax177) ).
fof(f687,plain,
( ! [X0] :
( ~ pred_attacker(X0)
| name_B = X0
| name_A = X0 )
| ~ spl1_17 ),
inference(avatar_component_clause,[],[f686]) ).
fof(f541,plain,
( spl1_6
| ~ spl1_4 ),
inference(avatar_split_clause,[],[f540,f491,f503]) ).
fof(f503,plain,
( spl1_6
<=> pred_attacker(name_objective) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_6])]) ).
fof(f491,plain,
( spl1_4
<=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_4])]) ).
fof(f540,plain,
( pred_attacker(name_objective)
| ~ spl1_4 ),
inference(resolution,[],[f493,f410]) ).
fof(f410,plain,
! [X0] :
( ~ pred_attacker(tuple_client_B_out_6(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f301]) ).
fof(f301,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_B_out_6(X0)) ),
inference(ennf_transformation,[],[f218]) ).
fof(f218,plain,
! [X0] :
( pred_attacker(tuple_client_B_out_6(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f134]) ).
fof(f134,axiom,
! [X109] :
( pred_attacker(tuple_client_B_out_6(X109))
=> pred_attacker(X109) ),
file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax133) ).
fof(f493,plain,
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ spl1_4 ),
inference(avatar_component_clause,[],[f491]) ).
fof(f539,plain,
( spl1_7
| ~ spl1_3 ),
inference(avatar_split_clause,[],[f538,f488,f510]) ).
fof(f488,plain,
( spl1_3
<=> ! [X3] :
( ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS)))) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_3])]) ).
fof(f538,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl1_3 ),
inference(subsumption_resolution,[],[f417,f536]) ).
fof(f536,plain,
( ! [X3] : ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ spl1_3 ),
inference(subsumption_resolution,[],[f489,f398]) ).
fof(f489,plain,
( ! [X3] :
( ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS)))) )
| ~ spl1_3 ),
inference(avatar_component_clause,[],[f488]) ).
fof(f533,plain,
( spl1_7
| ~ spl1_2 ),
inference(avatar_split_clause,[],[f532,f485,f510]) ).
fof(f485,plain,
( spl1_2
<=> ! [X1] :
( ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_2])]) ).
fof(f532,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl1_2 ),
inference(subsumption_resolution,[],[f415,f527]) ).
fof(f527,plain,
( ! [X0] : ~ pred_attacker(tuple_client_B_in_3(X0))
| ~ spl1_2 ),
inference(resolution,[],[f398,f486]) ).
fof(f486,plain,
( ! [X1] :
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X1)) )
| ~ spl1_2 ),
inference(avatar_component_clause,[],[f485]) ).
fof(f524,plain,
~ spl1_7,
inference(avatar_contradiction_clause,[],[f517]) ).
fof(f517,plain,
( $false
| ~ spl1_7 ),
inference(resolution,[],[f511,f395]) ).
fof(f395,plain,
pred_attacker(name_A),
inference(cnf_transformation,[],[f180]) ).
fof(f180,axiom,
pred_attacker(name_A),
file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax179) ).
fof(f511,plain,
( ! [X1] : ~ pred_attacker(X1)
| ~ spl1_7 ),
inference(avatar_component_clause,[],[f510]) ).
fof(f506,plain,
( ~ spl1_5
| ~ spl1_6 ),
inference(avatar_split_clause,[],[f495,f503,f499]) ).
fof(f495,plain,
( ~ pred_attacker(name_objective)
| ~ pred_attacker(name_Nb(sK0)) ),
inference(resolution,[],[f375,f366]) ).
fof(f366,plain,
~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
inference(cnf_transformation,[],[f365]) ).
fof(f365,plain,
~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
inference(skolemisation,[status(esa),new_symbols(skolem,[sK0])],[f279,f364]) ).
fof(f364,plain,
( ? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective))
=> ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)) ),
introduced(choice_axiom,[]) ).
fof(f279,plain,
? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective)),
inference(ennf_transformation,[],[f198]) ).
fof(f198,plain,
~ ! [X0] : pred_attacker(tuple_2(name_Nb(X0),name_objective)),
inference(rectify,[],[f197]) ).
fof(f197,negated_conjecture,
~ ! [X201] : pred_attacker(tuple_2(name_Nb(X201),name_objective)),
inference(negated_conjecture,[],[f196]) ).
fof(f196,conjecture,
! [X201] : pred_attacker(tuple_2(name_Nb(X201),name_objective)),
file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',co0) ).
fof(f375,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f283]) ).
fof(f283,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f282]) ).
fof(f282,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f201]) ).
fof(f201,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(tuple_2(X0,X1)) ),
inference(rectify,[],[f172]) ).
fof(f172,axiom,
! [X172,X173] :
( ( pred_attacker(X173)
& pred_attacker(X172) )
=> pred_attacker(tuple_2(X172,X173)) ),
file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax171) ).
fof(f494,plain,
( spl1_1
| spl1_2
| spl1_3
| spl1_4 ),
inference(avatar_split_clause,[],[f376,f491,f488,f485,f482]) ).
fof(f376,plain,
! [X2,X3,X0,X1] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X2,name_skB)) ),
inference(cnf_transformation,[],[f285]) ).
fof(f285,plain,
! [X0,X1,X2,X3] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X2,name_skB)) ),
inference(flattening,[],[f284]) ).
fof(f284,plain,
! [X0,X1,X2,X3] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X2,name_skB)) ),
inference(ennf_transformation,[],[f202]) ).
fof(f202,plain,
! [X0,X1,X2,X3] :
( ( pred_attacker(tuple_client_B_in_2(X3))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X1))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
& pred_attacker(tuple_client_B_in_5(X2))
& pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X2,name_skB)) )
=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(rectify,[],[f193]) ).
fof(f193,axiom,
! [X192,X193,X194,X195] :
( ( pred_attacker(tuple_client_B_in_2(X195))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X195,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X193))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X193,name_skB)))
& pred_attacker(tuple_client_B_in_5(X194))
& pred_eq_bitstring_bitstring(name_Nb(X192),constr_ecb_dec_1(X194,name_skB)) )
=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax192) ).
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.04/0.09 % Problem : SWW964+1 : TPTP v8.1.2. Released v7.4.0.
% 0.04/0.10 % Command : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule file --schedule_file /export/starexec/sandbox2/solver/bin/quickGreedyProduceRating_steal_pow3.txt --cores 8 -m 12000 -t %d %s
% 0.09/0.30 % Computer : n012.cluster.edu
% 0.09/0.30 % Model : x86_64 x86_64
% 0.09/0.30 % CPU : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.09/0.30 % Memory : 8042.1875MB
% 0.09/0.30 % OS : Linux 3.10.0-693.el7.x86_64
% 0.09/0.30 % CPULimit : 300
% 0.09/0.30 % WCLimit : 300
% 0.09/0.30 % DateTime : Fri May 3 19:38:52 EDT 2024
% 0.09/0.30 % CPUTime :
% 0.09/0.30 This is a FOF_THM_RFO_SEQ problem
% 0.09/0.30 Running vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule file --schedule_file /export/starexec/sandbox2/solver/bin/quickGreedyProduceRating_steal_pow3.txt --cores 8 -m 12000 -t 300 /export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760
% 0.60/0.79 % (18874)lrs+1011_1:1_sil=8000:sp=occurrence:nwc=10.0:i=78:ss=axioms:sgt=8_0 on Vampire---4 for (2995ds/78Mi)
% 0.60/0.79 % (18875)ott+1011_1:1_sil=2000:urr=on:i=33:sd=1:kws=inv_frequency:ss=axioms:sup=off_0 on Vampire---4 for (2995ds/33Mi)
% 0.60/0.79 % (18872)dis-1011_2:1_sil=2000:lsd=20:nwc=5.0:flr=on:mep=off:st=3.0:i=34:sd=1:ep=RS:ss=axioms_0 on Vampire---4 for (2995ds/34Mi)
% 0.60/0.79 % (18873)lrs+1011_461:32768_sil=16000:irw=on:sp=frequency:lsd=20:fd=preordered:nwc=10.0:s2agt=32:alpa=false:cond=fast:s2a=on:i=51:s2at=3.0:awrs=decay:awrsf=691:bd=off:nm=20:fsr=off:amm=sco:uhcvi=on:rawr=on_0 on Vampire---4 for (2995ds/51Mi)
% 0.60/0.79 % (18876)lrs+2_1:1_sil=16000:fde=none:sos=all:nwc=5.0:i=34:ep=RS:s2pl=on:lma=on:afp=100000_0 on Vampire---4 for (2995ds/34Mi)
% 0.60/0.79 % (18877)lrs+1002_1:16_to=lpo:sil=32000:sp=unary_frequency:sos=on:i=45:bd=off:ss=axioms_0 on Vampire---4 for (2995ds/45Mi)
% 0.60/0.79 % (18878)lrs+21_1:5_sil=2000:sos=on:urr=on:newcnf=on:slsq=on:i=83:slsql=off:bd=off:nm=2:ss=axioms:st=1.5:sp=const_min:gsp=on:rawr=on_0 on Vampire---4 for (2995ds/83Mi)
% 0.60/0.79 % (18879)lrs-21_1:1_to=lpo:sil=2000:sp=frequency:sos=on:lma=on:i=56:sd=2:ss=axioms:ep=R_0 on Vampire---4 for (2995ds/56Mi)
% 0.60/0.79 % (18872)Refutation not found, incomplete strategy% (18872)------------------------------
% 0.60/0.79 % (18872)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.60/0.79 % (18872)Termination reason: Refutation not found, incomplete strategy
% 0.60/0.79
% 0.60/0.79 % (18872)Memory used [KB]: 1159
% 0.60/0.79 % (18872)Time elapsed: 0.004 s
% 0.60/0.79 % (18872)Instructions burned: 4 (million)
% 0.60/0.79 % (18872)------------------------------
% 0.60/0.79 % (18872)------------------------------
% 0.60/0.79 % (18877)Refutation not found, incomplete strategy% (18877)------------------------------
% 0.60/0.79 % (18877)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.60/0.79 % (18877)Termination reason: Refutation not found, incomplete strategy
% 0.60/0.79
% 0.60/0.79 % (18877)Memory used [KB]: 1176
% 0.60/0.79 % (18877)Time elapsed: 0.004 s
% 0.60/0.79 % (18877)Instructions burned: 5 (million)
% 0.60/0.79 % (18879)Refutation not found, incomplete strategy% (18879)------------------------------
% 0.60/0.79 % (18879)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.60/0.79 % (18879)Termination reason: Refutation not found, incomplete strategy
% 0.60/0.79
% 0.60/0.79 % (18879)Memory used [KB]: 1176
% 0.60/0.79 % (18879)Time elapsed: 0.004 s
% 0.60/0.79 % (18879)Instructions burned: 4 (million)
% 0.60/0.79 % (18877)------------------------------
% 0.60/0.79 % (18877)------------------------------
% 0.60/0.79 % (18879)------------------------------
% 0.60/0.79 % (18879)------------------------------
% 0.60/0.79 % (18876)Refutation not found, incomplete strategy% (18876)------------------------------
% 0.60/0.79 % (18876)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.60/0.79 % (18876)Termination reason: Refutation not found, incomplete strategy
% 0.60/0.79
% 0.60/0.79 % (18876)Memory used [KB]: 1271
% 0.60/0.79 % (18876)Time elapsed: 0.005 s
% 0.60/0.79 % (18876)Instructions burned: 8 (million)
% 0.60/0.79 % (18876)------------------------------
% 0.60/0.79 % (18876)------------------------------
% 0.60/0.79 % (18880)lrs+21_1:16_sil=2000:sp=occurrence:urr=on:flr=on:i=55:sd=1:nm=0:ins=3:ss=included:rawr=on:br=off_0 on Vampire---4 for (2995ds/55Mi)
% 0.60/0.79 % (18881)dis+3_25:4_sil=16000:sos=all:erd=off:i=50:s2at=4.0:bd=off:nm=60:sup=off:cond=on:av=off:ins=2:nwc=10.0:etr=on:to=lpo:s2agt=20:fd=off:bsr=unit_only:slsq=on:slsqr=28,19:awrs=converge:awrsf=500:tgt=ground:bs=unit_only_0 on Vampire---4 for (2995ds/50Mi)
% 0.60/0.79 % (18882)lrs+1010_1:2_sil=4000:tgt=ground:nwc=10.0:st=2.0:i=208:sd=1:bd=off:ss=axioms_0 on Vampire---4 for (2995ds/208Mi)
% 0.60/0.79 % (18883)lrs-1011_1:1_sil=4000:plsq=on:plsqr=32,1:sp=frequency:plsql=on:nwc=10.0:i=52:aac=none:afr=on:ss=axioms:er=filter:sgt=16:rawr=on:etr=on:lma=on_0 on Vampire---4 for (2995ds/52Mi)
% 0.60/0.80 % (18882)Refutation not found, incomplete strategy% (18882)------------------------------
% 0.60/0.80 % (18882)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.60/0.80 % (18882)Termination reason: Refutation not found, incomplete strategy
% 0.60/0.80
% 0.60/0.80 % (18882)Memory used [KB]: 1157
% 0.60/0.80 % (18882)Time elapsed: 0.003 s
% 0.60/0.80 % (18882)Instructions burned: 4 (million)
% 0.60/0.80 % (18882)------------------------------
% 0.60/0.80 % (18882)------------------------------
% 0.60/0.80 % (18884)lrs-1010_1:1_to=lpo:sil=2000:sp=reverse_arity:sos=on:urr=ec_only:i=518:sd=2:bd=off:ss=axioms:sgt=16_0 on Vampire---4 for (2995ds/518Mi)
% 0.60/0.80 % (18884)Refutation not found, incomplete strategy% (18884)------------------------------
% 0.60/0.80 % (18884)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.60/0.80 % (18884)Termination reason: Refutation not found, incomplete strategy
% 0.60/0.80
% 0.60/0.80 % (18884)Memory used [KB]: 1238
% 0.60/0.80 % (18884)Time elapsed: 0.005 s
% 0.60/0.80 % (18884)Instructions burned: 8 (million)
% 0.60/0.80 % (18884)------------------------------
% 0.60/0.80 % (18884)------------------------------
% 0.60/0.80 % (18875)Instruction limit reached!
% 0.60/0.80 % (18875)------------------------------
% 0.60/0.80 % (18875)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.60/0.80 % (18875)Termination reason: Unknown
% 0.60/0.80 % (18875)Termination phase: Saturation
% 0.60/0.80
% 0.60/0.80 % (18875)Memory used [KB]: 1685
% 0.60/0.80 % (18875)Time elapsed: 0.019 s
% 0.60/0.80 % (18875)Instructions burned: 34 (million)
% 0.60/0.80 % (18875)------------------------------
% 0.60/0.80 % (18875)------------------------------
% 0.60/0.81 % (18885)lrs+1011_87677:1048576_sil=8000:sos=on:spb=non_intro:nwc=10.0:kmz=on:i=42:ep=RS:nm=0:ins=1:uhcvi=on:rawr=on:fde=unused:afp=2000:afq=1.444:plsq=on:nicw=on_0 on Vampire---4 for (2995ds/42Mi)
% 0.60/0.81 % (18886)dis+1011_1258907:1048576_bsr=unit_only:to=lpo:drc=off:sil=2000:tgt=full:fde=none:sp=frequency:spb=goal:rnwc=on:nwc=6.70083:sac=on:newcnf=on:st=2:i=243:bs=unit_only:sd=3:afp=300:awrs=decay:awrsf=218:nm=16:ins=3:afq=3.76821:afr=on:ss=axioms:sgt=5:rawr=on:add=off:bsd=on_0 on Vampire---4 for (2995ds/243Mi)
% 0.60/0.81 % (18873)Instruction limit reached!
% 0.60/0.81 % (18873)------------------------------
% 0.60/0.81 % (18873)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.60/0.81 % (18873)Termination reason: Unknown
% 0.60/0.81 % (18873)Termination phase: Saturation
% 0.60/0.81
% 0.60/0.81 % (18873)Memory used [KB]: 1850
% 0.60/0.81 % (18873)Time elapsed: 0.029 s
% 0.60/0.81 % (18873)Instructions burned: 51 (million)
% 0.60/0.81 % (18873)------------------------------
% 0.60/0.81 % (18873)------------------------------
% 0.60/0.82 % (18881)Instruction limit reached!
% 0.60/0.82 % (18881)------------------------------
% 0.60/0.82 % (18881)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.60/0.82 % (18881)Termination reason: Unknown
% 0.60/0.82 % (18881)Termination phase: Saturation
% 0.60/0.82
% 0.60/0.82 % (18881)Memory used [KB]: 1973
% 0.60/0.82 % (18881)Time elapsed: 0.025 s
% 0.60/0.82 % (18881)Instructions burned: 50 (million)
% 0.60/0.82 % (18881)------------------------------
% 0.60/0.82 % (18881)------------------------------
% 0.60/0.82 % (18887)lrs+1011_2:9_sil=2000:lsd=10:newcnf=on:i=117:sd=2:awrs=decay:ss=included:amm=off:ep=R_0 on Vampire---4 for (2995ds/117Mi)
% 0.60/0.82 % (18888)dis+1011_11:1_sil=2000:avsq=on:i=143:avsqr=1,16:ep=RS:rawr=on:aac=none:lsd=100:mep=off:fde=none:newcnf=on:bsr=unit_only_0 on Vampire---4 for (2994ds/143Mi)
% 0.60/0.82 % (18880)Instruction limit reached!
% 0.60/0.82 % (18880)------------------------------
% 0.60/0.82 % (18880)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.60/0.82 % (18880)Termination reason: Unknown
% 0.60/0.82 % (18880)Termination phase: Saturation
% 0.60/0.82
% 0.60/0.82 % (18880)Memory used [KB]: 2188
% 0.60/0.82 % (18880)Time elapsed: 0.029 s
% 0.60/0.82 % (18880)Instructions burned: 56 (million)
% 0.60/0.82 % (18880)------------------------------
% 0.60/0.82 % (18880)------------------------------
% 0.60/0.82 % (18889)lrs+1011_1:2_to=lpo:sil=8000:plsqc=1:plsq=on:plsqr=326,59:sp=weighted_frequency:plsql=on:nwc=10.0:newcnf=on:i=93:awrs=converge:awrsf=200:bd=off:ins=1:rawr=on:alpa=false:avsq=on:avsqr=1,16_0 on Vampire---4 for (2994ds/93Mi)
% 0.60/0.82 % (18883)Instruction limit reached!
% 0.60/0.82 % (18883)------------------------------
% 0.60/0.82 % (18883)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.60/0.82 % (18883)Termination reason: Unknown
% 0.60/0.82 % (18883)Termination phase: Saturation
% 0.60/0.82
% 0.60/0.82 % (18883)Memory used [KB]: 1748
% 0.60/0.82 % (18883)Time elapsed: 0.031 s
% 0.60/0.82 % (18883)Instructions burned: 53 (million)
% 0.60/0.82 % (18883)------------------------------
% 0.60/0.82 % (18883)------------------------------
% 0.79/0.82 % (18887)Refutation not found, incomplete strategy% (18887)------------------------------
% 0.79/0.82 % (18887)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.79/0.83 % (18887)Termination reason: Refutation not found, incomplete strategy
% 0.79/0.83
% 0.79/0.83 % (18887)Memory used [KB]: 1335
% 0.79/0.83 % (18887)Time elapsed: 0.009 s
% 0.79/0.83 % (18887)Instructions burned: 16 (million)
% 0.79/0.83 % (18887)------------------------------
% 0.79/0.83 % (18887)------------------------------
% 0.79/0.83 % (18885)Instruction limit reached!
% 0.79/0.83 % (18885)------------------------------
% 0.79/0.83 % (18885)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.79/0.83 % (18885)Termination reason: Unknown
% 0.79/0.83 % (18885)Termination phase: Saturation
% 0.79/0.83
% 0.79/0.83 % (18885)Memory used [KB]: 2046
% 0.79/0.83 % (18885)Time elapsed: 0.022 s
% 0.79/0.83 % (18885)Instructions burned: 42 (million)
% 0.79/0.83 % (18885)------------------------------
% 0.79/0.83 % (18885)------------------------------
% 0.79/0.83 % (18890)lrs+1666_1:1_sil=4000:sp=occurrence:sos=on:urr=on:newcnf=on:i=62:amm=off:ep=R:erd=off:nm=0:plsq=on:plsqr=14,1_0 on Vampire---4 for (2994ds/62Mi)
% 0.79/0.83 % (18878)Instruction limit reached!
% 0.79/0.83 % (18878)------------------------------
% 0.79/0.83 % (18878)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.79/0.83 % (18878)Termination reason: Unknown
% 0.79/0.83 % (18878)Termination phase: Saturation
% 0.79/0.83
% 0.79/0.83 % (18878)Memory used [KB]: 2411
% 0.79/0.83 % (18878)Time elapsed: 0.043 s
% 0.79/0.83 % (18878)Instructions burned: 84 (million)
% 0.79/0.83 % (18878)------------------------------
% 0.79/0.83 % (18878)------------------------------
% 0.79/0.83 % (18891)lrs+21_2461:262144_anc=none:drc=off:sil=2000:sp=occurrence:nwc=6.0:updr=off:st=3.0:i=32:sd=2:afp=4000:erml=3:nm=14:afq=2.0:uhcvi=on:ss=included:er=filter:abs=on:nicw=on:ile=on:sims=off:s2a=on:s2agt=50:s2at=-1.0:plsq=on:plsql=on:plsqc=2:plsqr=1,32:newcnf=on:bd=off:to=lpo_0 on Vampire---4 for (2994ds/32Mi)
% 0.79/0.83 % (18874)Instruction limit reached!
% 0.79/0.83 % (18874)------------------------------
% 0.79/0.83 % (18874)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.79/0.83 % (18874)Termination reason: Unknown
% 0.79/0.83 % (18874)Termination phase: Saturation
% 0.79/0.83
% 0.79/0.83 % (18874)Memory used [KB]: 1951
% 0.79/0.83 % (18874)Time elapsed: 0.044 s
% 0.79/0.83 % (18874)Instructions burned: 79 (million)
% 0.79/0.83 % (18874)------------------------------
% 0.79/0.83 % (18874)------------------------------
% 0.79/0.83 % (18892)dis+1011_1:1_sil=16000:nwc=7.0:s2agt=64:s2a=on:i=1919:ss=axioms:sgt=8:lsd=50:sd=7_0 on Vampire---4 for (2994ds/1919Mi)
% 0.79/0.83 % (18888)Refutation not found, incomplete strategy% (18888)------------------------------
% 0.79/0.83 % (18888)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.79/0.83 % (18888)Termination reason: Refutation not found, incomplete strategy
% 0.79/0.83
% 0.79/0.83 % (18888)Memory used [KB]: 1350
% 0.79/0.83 % (18888)Time elapsed: 0.012 s
% 0.79/0.83 % (18888)Instructions burned: 21 (million)
% 0.79/0.83 % (18888)------------------------------
% 0.79/0.83 % (18888)------------------------------
% 0.79/0.83 % (18893)ott-32_5:1_sil=4000:sp=occurrence:urr=full:rp=on:nwc=5.0:newcnf=on:st=5.0:s2pl=on:i=55:sd=2:ins=2:ss=included:rawr=on:anc=none:sos=on:s2agt=8:spb=intro:ep=RS:avsq=on:avsqr=27,155:lma=on_0 on Vampire---4 for (2994ds/55Mi)
% 0.79/0.83 % (18894)lrs-1011_1:1_sil=2000:sos=on:urr=on:i=53:sd=1:bd=off:ins=3:av=off:ss=axioms:sgt=16:gsp=on:lsd=10_0 on Vampire---4 for (2994ds/53Mi)
% 0.79/0.83 % (18895)lrs+1011_6929:65536_anc=all_dependent:sil=2000:fde=none:plsqc=1:plsq=on:plsqr=19,8:plsql=on:nwc=3.0:i=46:afp=4000:ep=R:nm=3:fsr=off:afr=on:aer=off:gsp=on_0 on Vampire---4 for (2994ds/46Mi)
% 0.79/0.85 % (18891)Instruction limit reached!
% 0.79/0.85 % (18891)------------------------------
% 0.79/0.85 % (18891)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.79/0.85 % (18891)Termination reason: Unknown
% 0.79/0.85 % (18891)Termination phase: Saturation
% 0.79/0.85
% 0.79/0.85 % (18891)Memory used [KB]: 1654
% 0.79/0.85 % (18891)Time elapsed: 0.019 s
% 0.79/0.85 % (18891)Instructions burned: 33 (million)
% 0.79/0.85 % (18891)------------------------------
% 0.79/0.85 % (18891)------------------------------
% 0.79/0.85 % (18896)dis+10_3:31_sil=2000:sp=frequency:abs=on:acc=on:lcm=reverse:nwc=3.0:alpa=random:st=3.0:i=102:sd=1:nm=4:ins=1:aer=off:ss=axioms_0 on Vampire---4 for (2994ds/102Mi)
% 0.79/0.85 % (18896)Refutation not found, incomplete strategy% (18896)------------------------------
% 0.79/0.85 % (18896)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.79/0.85 % (18896)Termination reason: Refutation not found, incomplete strategy
% 0.79/0.85
% 0.79/0.85 % (18896)Memory used [KB]: 1194
% 0.79/0.85 % (18896)Time elapsed: 0.004 s
% 0.79/0.85 % (18896)Instructions burned: 5 (million)
% 0.79/0.85 % (18896)------------------------------
% 0.79/0.85 % (18896)------------------------------
% 0.79/0.86 % (18897)ott+1011_9:29_slsqr=3,2:sil=2000:tgt=ground:lsd=10:lcm=predicate:avsqc=4:slsq=on:avsq=on:i=35:s2at=4.0:add=large:sd=1:avsqr=1,16:aer=off:ss=axioms:sgt=100:rawr=on:s2a=on:sac=on:afp=1:nwc=10.0:nm=64:bd=preordered:abs=on:rnwc=on:er=filter:nicw=on:spb=non_intro:lma=on_0 on Vampire---4 for (2994ds/35Mi)
% 0.95/0.86 % (18890)Instruction limit reached!
% 0.95/0.86 % (18890)------------------------------
% 0.95/0.86 % (18890)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.95/0.86 % (18890)Termination reason: Unknown
% 0.95/0.86 % (18890)Termination phase: Saturation
% 0.95/0.86
% 0.95/0.86 % (18890)Memory used [KB]: 2414
% 0.95/0.86 % (18890)Time elapsed: 0.031 s
% 0.95/0.86 % (18890)Instructions burned: 62 (million)
% 0.95/0.86 % (18890)------------------------------
% 0.95/0.86 % (18890)------------------------------
% 0.95/0.86 % (18895)Instruction limit reached!
% 0.95/0.86 % (18895)------------------------------
% 0.95/0.86 % (18895)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.95/0.86 % (18895)Termination reason: Unknown
% 0.95/0.86 % (18895)Termination phase: Saturation
% 0.95/0.86
% 0.95/0.86 % (18895)Memory used [KB]: 1714
% 0.95/0.86 % (18895)Time elapsed: 0.047 s
% 0.95/0.86 % (18895)Instructions burned: 46 (million)
% 0.95/0.86 % (18895)------------------------------
% 0.95/0.86 % (18895)------------------------------
% 0.95/0.86 % (18894)Instruction limit reached!
% 0.95/0.86 % (18894)------------------------------
% 0.95/0.86 % (18894)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.95/0.86 % (18894)Termination reason: Unknown
% 0.95/0.86 % (18894)Termination phase: Saturation
% 0.95/0.86
% 0.95/0.86 % (18894)Memory used [KB]: 1771
% 0.95/0.86 % (18894)Time elapsed: 0.049 s
% 0.95/0.86 % (18894)Instructions burned: 53 (million)
% 0.95/0.86 % (18894)------------------------------
% 0.95/0.86 % (18894)------------------------------
% 0.95/0.86 % (18893)Instruction limit reached!
% 0.95/0.86 % (18893)------------------------------
% 0.95/0.86 % (18893)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.95/0.86 % (18893)Termination reason: Unknown
% 0.95/0.86 % (18893)Termination phase: Saturation
% 0.95/0.86
% 0.95/0.86 % (18893)Memory used [KB]: 2356
% 0.95/0.86 % (18893)Time elapsed: 0.049 s
% 0.95/0.86 % (18893)Instructions burned: 56 (million)
% 0.95/0.86 % (18893)------------------------------
% 0.95/0.86 % (18893)------------------------------
% 0.95/0.86 % (18898)dis+1003_1:1024_sil=4000:urr=on:newcnf=on:i=87:av=off:fsr=off:bce=on_0 on Vampire---4 for (2994ds/87Mi)
% 0.95/0.86 % (18899)dis+1010_12107:524288_anc=none:drc=encompass:sil=2000:bsd=on:rp=on:nwc=10.0:alpa=random:i=109:kws=precedence:awrs=decay:awrsf=2:nm=16:ins=3:rawr=on:s2a=on:s2at=4.5:acc=on:flr=on_0 on Vampire---4 for (2994ds/109Mi)
% 0.95/0.86 % (18900)lrs+1002_1:16_sil=2000:sp=occurrence:sos=on:i=161:aac=none:bd=off:ss=included:sd=5:st=2.5:sup=off_0 on Vampire---4 for (2994ds/161Mi)
% 0.95/0.86 % (18901)lrs-1002_2:9_anc=none:sil=2000:plsqc=1:plsq=on:avsql=on:plsqr=2859761,1048576:erd=off:rp=on:nwc=21.7107:newcnf=on:avsq=on:i=69:aac=none:avsqr=6317,1048576:ep=RS:fsr=off:rawr=on:afp=50:afq=2.133940627822616:sac=on_0 on Vampire---4 for (2994ds/69Mi)
% 0.95/0.86 % (18897)Refutation not found, incomplete strategy% (18897)------------------------------
% 0.95/0.86 % (18897)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.95/0.86 % (18897)Termination reason: Refutation not found, incomplete strategy
% 0.95/0.86
% 0.95/0.86 % (18897)Memory used [KB]: 1266
% 0.95/0.86 % (18897)Time elapsed: 0.031 s
% 0.95/0.86 % (18897)Instructions burned: 16 (million)
% 0.95/0.86 % (18897)------------------------------
% 0.95/0.86 % (18897)------------------------------
% 0.95/0.86 % (18900)Refutation not found, incomplete strategy% (18900)------------------------------
% 0.95/0.86 % (18900)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.95/0.86 % (18900)Termination reason: Refutation not found, incomplete strategy
% 0.95/0.86
% 0.95/0.86 % (18900)Memory used [KB]: 1204
% 0.95/0.86 % (18900)Time elapsed: 0.005 s
% 0.95/0.86 % (18900)Instructions burned: 8 (million)
% 0.95/0.86 % (18900)------------------------------
% 0.95/0.86 % (18900)------------------------------
% 0.95/0.87 % (18902)lrs+1010_1:512_sil=8000:tgt=ground:spb=units:gs=on:lwlo=on:nicw=on:gsem=on:st=1.5:i=40:nm=21:ss=included:nwc=5.3:afp=4000:afq=1.38:ins=1:bs=unit_only:awrs=converge:awrsf=10:bce=on_0 on Vampire---4 for (2994ds/40Mi)
% 0.95/0.87 % (18903)ott+1011_1:3_drc=off:sil=4000:tgt=ground:fde=unused:plsq=on:sp=unary_first:fd=preordered:nwc=10.0:i=360:ins=1:rawr=on:bd=preordered_0 on Vampire---4 for (2994ds/360Mi)
% 0.95/0.87 % (18901)Refutation not found, incomplete strategy% (18901)------------------------------
% 0.95/0.87 % (18901)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.95/0.87 % (18901)Termination reason: Refutation not found, incomplete strategy
% 0.95/0.87
% 0.95/0.87 % (18901)Memory used [KB]: 1410
% 0.95/0.87 % (18901)Time elapsed: 0.009 s
% 0.95/0.87 % (18901)Instructions burned: 15 (million)
% 0.95/0.87 % (18901)------------------------------
% 0.95/0.87 % (18901)------------------------------
% 0.95/0.87 % (18892)First to succeed.
% 0.95/0.87 % (18904)dis+10_1:4_to=lpo:sil=2000:sos=on:spb=goal:rp=on:sac=on:newcnf=on:i=161:ss=axioms:aac=none_0 on Vampire---4 for (2994ds/161Mi)
% 0.95/0.87 % (18889)Instruction limit reached!
% 0.95/0.87 % (18889)------------------------------
% 0.95/0.87 % (18889)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.95/0.87 % (18889)Termination reason: Unknown
% 0.95/0.87 % (18889)Termination phase: Saturation
% 0.95/0.87
% 0.95/0.87 % (18889)Memory used [KB]: 2343
% 0.95/0.87 % (18889)Time elapsed: 0.052 s
% 0.95/0.87 % (18889)Instructions burned: 94 (million)
% 0.95/0.87 % (18889)------------------------------
% 0.95/0.87 % (18889)------------------------------
% 0.95/0.87 % (18892)Solution written to "/export/starexec/sandbox2/tmp/vampire-proof-18867"
% 0.95/0.88 % (18904)Refutation not found, incomplete strategy% (18904)------------------------------
% 0.95/0.88 % (18904)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.95/0.88 % (18904)Termination reason: Refutation not found, incomplete strategy
% 0.95/0.88
% 0.95/0.88 % (18904)Memory used [KB]: 1179
% 0.95/0.88 % (18904)Time elapsed: 0.004 s
% 0.95/0.88 % (18904)Instructions burned: 5 (million)
% 0.95/0.88 % (18904)------------------------------
% 0.95/0.88 % (18904)------------------------------
% 0.95/0.88 % (18892)Refutation found. Thanks to Tanya!
% 0.95/0.88 % SZS status Theorem for Vampire---4
% 0.95/0.88 % SZS output start Proof for Vampire---4
% See solution above
% 0.95/0.88 % (18892)------------------------------
% 0.95/0.88 % (18892)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.95/0.88 % (18892)Termination reason: Refutation
% 0.95/0.88
% 0.95/0.88 % (18892)Memory used [KB]: 1698
% 0.95/0.88 % (18892)Time elapsed: 0.068 s
% 0.95/0.88 % (18892)Instructions burned: 84 (million)
% 0.95/0.88 % (18867)Success in time 0.574 s
% 0.95/0.88 % Vampire---4.8 exiting
%------------------------------------------------------------------------------