TSTP Solution File: SWW964+1 by Vampire---4.8

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : Vampire---4.8
% Problem  : SWW964+1 : TPTP v8.1.2. Released v7.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule file --schedule_file /export/starexec/sandbox2/solver/bin/quickGreedyProduceRating_steal_pow3.txt --cores 8 -m 12000 -t %d %s

% Computer : n012.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Sun May  5 11:31:50 EDT 2024

% Result   : Theorem 0.95s 0.88s
% Output   : Refutation 0.95s
% Verified : 
% SZS Type : Refutation
%            Derivation depth      :   16
%            Number of leaves      :   39
% Syntax   : Number of formulae    :  170 (  32 unt;   0 def)
%            Number of atoms       :  450 (  39 equ)
%            Maximal formula atoms :    8 (   2 avg)
%            Number of connectives :  495 ( 215   ~; 205   |;  30   &)
%                                         (  12 <=>;  33  =>;   0  <=;   0 <~>)
%            Maximal formula depth :   12 (   5 avg)
%            Maximal term depth    :    7 (   2 avg)
%            Number of predicates  :   17 (  15 usr;  13 prp; 0-2 aty)
%            Number of functors    :   30 (  30 usr;   7 con; 0-4 aty)
%            Number of variables   :  277 ( 275   !;   2   ?)

% Comments : 
%------------------------------------------------------------------------------
fof(f1381,plain,
    $false,
    inference(avatar_sat_refutation,[],[f494,f506,f524,f533,f539,f541,f897,f1152,f1235,f1340,f1355,f1375,f1380]) ).

fof(f1380,plain,
    ( spl1_7
    | ~ spl1_1 ),
    inference(avatar_split_clause,[],[f1379,f482,f510]) ).

fof(f510,plain,
    ( spl1_7
  <=> ! [X1] : ~ pred_attacker(X1) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_7])]) ).

fof(f482,plain,
    ( spl1_1
  <=> ! [X2,X0] :
        ( ~ pred_attacker(tuple_client_B_in_5(X2))
        | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X2,name_skB)) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_1])]) ).

fof(f1379,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl1_1 ),
    inference(resolution,[],[f1376,f413]) ).

fof(f413,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_5(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f304]) ).

fof(f304,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_5(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f221]) ).

fof(f221,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_5(X0)) ),
    inference(rectify,[],[f140]) ).

fof(f140,axiom,
    ! [X118] :
      ( pred_attacker(X118)
     => pred_attacker(tuple_client_B_in_5(X118)) ),
    file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax139) ).

fof(f1376,plain,
    ( ! [X2] : ~ pred_attacker(tuple_client_B_in_5(X2))
    | ~ spl1_1 ),
    inference(subsumption_resolution,[],[f483,f398]) ).

fof(f398,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
    inference(cnf_transformation,[],[f206]) ).

fof(f206,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
    inference(rectify,[],[f96]) ).

fof(f96,axiom,
    ! [X49,X50] : pred_eq_bitstring_bitstring(X49,X50),
    file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax95) ).

fof(f483,plain,
    ( ! [X2,X0] :
        ( ~ pred_attacker(tuple_client_B_in_5(X2))
        | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X2,name_skB)) )
    | ~ spl1_1 ),
    inference(avatar_component_clause,[],[f482]) ).

fof(f1375,plain,
    ( spl1_5
    | ~ spl1_66 ),
    inference(avatar_contradiction_clause,[],[f1374]) ).

fof(f1374,plain,
    ( $false
    | spl1_5
    | ~ spl1_66 ),
    inference(resolution,[],[f1354,f501]) ).

fof(f501,plain,
    ( ~ pred_attacker(name_Nb(sK0))
    | spl1_5 ),
    inference(avatar_component_clause,[],[f499]) ).

fof(f499,plain,
    ( spl1_5
  <=> pred_attacker(name_Nb(sK0)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_5])]) ).

fof(f1354,plain,
    ( ! [X1] : pred_attacker(name_Nb(X1))
    | ~ spl1_66 ),
    inference(avatar_component_clause,[],[f1353]) ).

fof(f1353,plain,
    ( spl1_66
  <=> ! [X1] : pred_attacker(name_Nb(X1)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_66])]) ).

fof(f1355,plain,
    ( spl1_66
    | spl1_7
    | ~ spl1_63 ),
    inference(avatar_split_clause,[],[f1351,f1298,f510,f1353]) ).

fof(f1298,plain,
    ( spl1_63
  <=> ! [X2,X1] :
        ( pred_attacker(constr_ecb_enc_1(name_Nb(X1),X2))
        | ~ pred_attacker(X2) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_63])]) ).

fof(f1351,plain,
    ( ! [X0,X1] :
        ( ~ pred_attacker(X0)
        | pred_attacker(name_Nb(X1)) )
    | ~ spl1_63 ),
    inference(subsumption_resolution,[],[f1342,f399]) ).

fof(f399,plain,
    ! [X0] :
      ( pred_attacker(constr_pkey(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f292]) ).

fof(f292,plain,
    ! [X0] :
      ( pred_attacker(constr_pkey(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f207]) ).

fof(f207,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(constr_pkey(X0)) ),
    inference(rectify,[],[f106]) ).

fof(f106,axiom,
    ! [X60] :
      ( pred_attacker(X60)
     => pred_attacker(constr_pkey(X60)) ),
    file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax105) ).

fof(f1342,plain,
    ( ! [X0,X1] :
        ( ~ pred_attacker(constr_pkey(X0))
        | ~ pred_attacker(X0)
        | pred_attacker(name_Nb(X1)) )
    | ~ spl1_63 ),
    inference(resolution,[],[f1299,f558]) ).

fof(f558,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(constr_ecb_enc_1(X0,constr_pkey(X1)))
      | ~ pred_attacker(X1)
      | pred_attacker(X0) ),
    inference(superposition,[],[f404,f405]) ).

fof(f405,plain,
    ! [X0,X1] : constr_ecb_dec_1(constr_ecb_enc_1(X1,constr_pkey(X0)),X0) = X1,
    inference(cnf_transformation,[],[f213]) ).

fof(f213,plain,
    ! [X0,X1] : constr_ecb_dec_1(constr_ecb_enc_1(X1,constr_pkey(X0)),X0) = X1,
    inference(rectify,[],[f85]) ).

fof(f85,axiom,
    ! [X18,X19] : constr_ecb_dec_1(constr_ecb_enc_1(X19,constr_pkey(X18)),X18) = X19,
    file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax84) ).

fof(f404,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_ecb_dec_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f298]) ).

fof(f298,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_ecb_dec_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f297]) ).

fof(f297,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_ecb_dec_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f212]) ).

fof(f212,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(constr_ecb_dec_1(X0,X1)) ),
    inference(rectify,[],[f131]) ).

fof(f131,axiom,
    ! [X104,X105] :
      ( ( pred_attacker(X105)
        & pred_attacker(X104) )
     => pred_attacker(constr_ecb_dec_1(X104,X105)) ),
    file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax130) ).

fof(f1299,plain,
    ( ! [X2,X1] :
        ( pred_attacker(constr_ecb_enc_1(name_Nb(X1),X2))
        | ~ pred_attacker(X2) )
    | ~ spl1_63 ),
    inference(avatar_component_clause,[],[f1298]) ).

fof(f1340,plain,
    ( spl1_7
    | spl1_63
    | ~ spl1_58 ),
    inference(avatar_split_clause,[],[f1331,f1233,f1298,f510]) ).

fof(f1233,plain,
    ( spl1_58
  <=> ! [X2,X1,X3] :
        ( ~ pred_attacker(X1)
        | ~ pred_attacker(X2)
        | pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),X2),constr_ecb_enc_1(name_Nb(X3),X2),constr_ecb_enc_1(name_B,X2))) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_58])]) ).

fof(f1331,plain,
    ( ! [X2,X0,X1] :
        ( ~ pred_attacker(X0)
        | ~ pred_attacker(X1)
        | pred_attacker(constr_ecb_enc_1(name_Nb(X2),X0)) )
    | ~ spl1_58 ),
    inference(resolution,[],[f1234,f450]) ).

fof(f450,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(tuple_3(X0,X1,X2))
      | pred_attacker(X1) ),
    inference(cnf_transformation,[],[f337]) ).

fof(f337,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(X1)
      | ~ pred_attacker(tuple_3(X0,X1,X2)) ),
    inference(ennf_transformation,[],[f258]) ).

fof(f258,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_3(X0,X1,X2))
     => pred_attacker(X1) ),
    inference(rectify,[],[f170]) ).

fof(f170,axiom,
    ! [X166,X167,X168] :
      ( pred_attacker(tuple_3(X166,X167,X168))
     => pred_attacker(X167) ),
    file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax169) ).

fof(f1234,plain,
    ( ! [X2,X3,X1] :
        ( pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),X2),constr_ecb_enc_1(name_Nb(X3),X2),constr_ecb_enc_1(name_B,X2)))
        | ~ pred_attacker(X2)
        | ~ pred_attacker(X1) )
    | ~ spl1_58 ),
    inference(avatar_component_clause,[],[f1233]) ).

fof(f1235,plain,
    ( spl1_58
    | spl1_17
    | ~ spl1_52 ),
    inference(avatar_split_clause,[],[f1229,f1150,f686,f1233]) ).

fof(f686,plain,
    ( spl1_17
  <=> ! [X0] :
        ( ~ pred_attacker(X0)
        | name_B = X0
        | name_A = X0 ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_17])]) ).

fof(f1150,plain,
    ( spl1_52
  <=> ! [X0,X3,X2,X1] :
        ( ~ pred_attacker(X0)
        | ~ pred_attacker(X3)
        | ~ pred_table(tuple_keys(X3,X1))
        | pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),X1),constr_ecb_enc_1(name_Nb(X2),X1),constr_ecb_enc_1(name_B,X1))) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_52])]) ).

fof(f1229,plain,
    ( ! [X2,X3,X0,X1] :
        ( ~ pred_attacker(X0)
        | ~ pred_attacker(X1)
        | pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),X2),constr_ecb_enc_1(name_Nb(X3),X2),constr_ecb_enc_1(name_B,X2)))
        | ~ pred_attacker(X2)
        | name_A = X0
        | name_B = X0 )
    | ~ spl1_52 ),
    inference(duplicate_literal_removal,[],[f1228]) ).

fof(f1228,plain,
    ( ! [X2,X3,X0,X1] :
        ( ~ pred_attacker(X0)
        | ~ pred_attacker(X1)
        | pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),X2),constr_ecb_enc_1(name_Nb(X3),X2),constr_ecb_enc_1(name_B,X2)))
        | ~ pred_attacker(X0)
        | ~ pred_attacker(X2)
        | name_A = X0
        | name_B = X0 )
    | ~ spl1_52 ),
    inference(resolution,[],[f1151,f586]) ).

fof(f586,plain,
    ! [X0,X1] :
      ( pred_table(tuple_keys(X1,X0))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0)
      | name_A = X1
      | name_B = X1 ),
    inference(resolution,[],[f472,f460]) ).

fof(f460,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | pred_table(tuple_keys(X0,X1))
      | name_A = X0
      | name_B = X0 ),
    inference(cnf_transformation,[],[f350]) ).

fof(f350,plain,
    ! [X0,X1] :
      ( pred_table(tuple_keys(X0,X1))
      | ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | name_A = X0
      | name_B = X0 ),
    inference(flattening,[],[f349]) ).

fof(f349,plain,
    ! [X0,X1] :
      ( pred_table(tuple_keys(X0,X1))
      | ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | name_A = X0
      | name_B = X0 ),
    inference(ennf_transformation,[],[f268]) ).

fof(f268,plain,
    ! [X0,X1] :
      ( ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
        & name_A != X0
        & name_B != X0 )
     => pred_table(tuple_keys(X0,X1)) ),
    inference(rectify,[],[f195]) ).

fof(f195,axiom,
    ! [X199,X200] :
      ( ( pred_attacker(tuple_key_register_server_in_1(X199,X200))
        & name_A != X199
        & name_B != X199 )
     => pred_table(tuple_keys(X199,X200)) ),
    file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax194) ).

fof(f472,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f363]) ).

fof(f363,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f362]) ).

fof(f362,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f278]) ).

fof(f278,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(tuple_key_register_server_in_1(X0,X1)) ),
    inference(rectify,[],[f118]) ).

fof(f118,axiom,
    ! [X75,X76] :
      ( ( pred_attacker(X76)
        & pred_attacker(X75) )
     => pred_attacker(tuple_key_register_server_in_1(X75,X76)) ),
    file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax117) ).

fof(f1151,plain,
    ( ! [X2,X3,X0,X1] :
        ( ~ pred_table(tuple_keys(X3,X1))
        | ~ pred_attacker(X3)
        | ~ pred_attacker(X0)
        | pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),X1),constr_ecb_enc_1(name_Nb(X2),X1),constr_ecb_enc_1(name_B,X1))) )
    | ~ spl1_52 ),
    inference(avatar_component_clause,[],[f1150]) ).

fof(f1152,plain,
    ( spl1_7
    | spl1_52 ),
    inference(avatar_split_clause,[],[f1148,f1150,f510]) ).

fof(f1148,plain,
    ! [X2,X3,X0,X1,X4] :
      ( ~ pred_attacker(X0)
      | pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),X1),constr_ecb_enc_1(name_Nb(X2),X1),constr_ecb_enc_1(name_B,X1)))
      | ~ pred_table(tuple_keys(X3,X1))
      | ~ pred_attacker(X3)
      | ~ pred_attacker(X4) ),
    inference(resolution,[],[f809,f467]) ).

fof(f467,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f356]) ).

fof(f356,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f355]) ).

fof(f355,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f273]) ).

fof(f273,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
    inference(rectify,[],[f115]) ).

fof(f115,axiom,
    ! [X69,X70] :
      ( ( pred_attacker(X70)
        & pred_attacker(X69) )
     => pred_attacker(tuple_key_retrieval_server_in_1(X69,X70)) ),
    file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax114) ).

fof(f809,plain,
    ! [X2,X3,X0,X1,X4] :
      ( ~ pred_attacker(tuple_key_retrieval_server_in_1(X4,X1))
      | ~ pred_attacker(X0)
      | pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),X2),constr_ecb_enc_1(name_Nb(X3),X2),constr_ecb_enc_1(name_B,X2)))
      | ~ pred_table(tuple_keys(X1,X2)) ),
    inference(forward_demodulation,[],[f808,f422]) ).

fof(f422,plain,
    ! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
    inference(cnf_transformation,[],[f230]) ).

fof(f230,plain,
    ! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
    inference(rectify,[],[f90]) ).

fof(f90,axiom,
    ! [X35,X36] : constr_tuple_2_get_1_bitstring(tuple_2(X35,X36)) = X36,
    file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax89) ).

fof(f808,plain,
    ! [X2,X3,X0,X1,X4] :
      ( pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),constr_tuple_2_get_1_bitstring(tuple_2(X1,X2))),constr_ecb_enc_1(name_Nb(X3),constr_tuple_2_get_1_bitstring(tuple_2(X1,X2))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(tuple_2(X1,X2)))))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X4,X1))
      | ~ pred_table(tuple_keys(X1,X2)) ),
    inference(resolution,[],[f740,f549]) ).

fof(f549,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(constr_sign(tuple_2(X0,X1),name_skS))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
      | ~ pred_table(tuple_keys(X0,X1)) ),
    inference(resolution,[],[f463,f446]) ).

fof(f446,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
      | ~ pred_table(tuple_keys(X0,X1)) ),
    inference(cnf_transformation,[],[f333]) ).

fof(f333,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
      | ~ pred_table(tuple_keys(X0,X1)) ),
    inference(flattening,[],[f332]) ).

fof(f332,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
      | ~ pred_table(tuple_keys(X0,X1)) ),
    inference(ennf_transformation,[],[f254]) ).

fof(f254,plain,
    ! [X0,X1,X2] :
      ( ( pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
        & pred_table(tuple_keys(X0,X1)) )
     => pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
    inference(rectify,[],[f194]) ).

fof(f194,axiom,
    ! [X196,X197,X198] :
      ( ( pred_attacker(tuple_key_retrieval_server_in_1(X198,X196))
        & pred_table(tuple_keys(X196,X197)) )
     => pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X196,X197),name_skS))) ),
    file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax193) ).

fof(f463,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_key_retrieval_server_out_2(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f351]) ).

fof(f351,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_key_retrieval_server_out_2(X0)) ),
    inference(ennf_transformation,[],[f269]) ).

fof(f269,plain,
    ! [X0] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f114]) ).

fof(f114,axiom,
    ! [X68] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(X68))
     => pred_attacker(X68) ),
    file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax113) ).

fof(f740,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(constr_sign(X0,name_skS))
      | pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(X0)),constr_ecb_enc_1(name_Nb(X2),constr_tuple_2_get_1_bitstring(X0)),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(X0))))
      | ~ pred_attacker(X1) ),
    inference(superposition,[],[f652,f401]) ).

fof(f401,plain,
    ! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
    inference(cnf_transformation,[],[f209]) ).

fof(f209,plain,
    ! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
    inference(rectify,[],[f81]) ).

fof(f81,axiom,
    ! [X4,X5] : constr_checksign(constr_sign(X5,X4),constr_pkey(X4)) = X5,
    file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax80) ).

fof(f652,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X2),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(resolution,[],[f612,f415]) ).

fof(f415,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_3(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f306]) ).

fof(f306,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_3(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f223]) ).

fof(f223,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_3(X0)) ),
    inference(rectify,[],[f142]) ).

fof(f142,axiom,
    ! [X120] :
      ( pred_attacker(X120)
     => pred_attacker(tuple_client_B_in_3(X120)) ),
    file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax141) ).

fof(f612,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(tuple_client_B_in_3(X0))
      | pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X2),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
      | ~ pred_attacker(X1) ),
    inference(resolution,[],[f547,f417]) ).

fof(f417,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f308]) ).

fof(f308,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f225]) ).

fof(f225,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_2(X0)) ),
    inference(rectify,[],[f144]) ).

fof(f144,axiom,
    ! [X122] :
      ( pred_attacker(X122)
     => pred_attacker(tuple_client_B_in_2(X122)) ),
    file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax143) ).

fof(f547,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(tuple_client_B_in_2(X1))
      | pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X2),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_3(X0)) ),
    inference(resolution,[],[f425,f535]) ).

fof(f535,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_B_out_4(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_attacker(tuple_client_B_in_3(X1)) ),
    inference(subsumption_resolution,[],[f534,f398]) ).

fof(f534,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_B_out_4(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ),
    inference(subsumption_resolution,[],[f473,f398]) ).

fof(f473,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_B_out_4(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ),
    inference(definition_unfolding,[],[f377,f419]) ).

fof(f419,plain,
    ! [X2,X3,X0,X1] : constr_ecb_enc_3(X1,X2,X3,X0) = tuple_3(constr_ecb_enc_1(X1,X0),constr_ecb_enc_1(X2,X0),constr_ecb_enc_1(X3,X0)),
    inference(cnf_transformation,[],[f227]) ).

fof(f227,plain,
    ! [X0,X1,X2,X3] : constr_ecb_enc_3(X1,X2,X3,X0) = tuple_3(constr_ecb_enc_1(X1,X0),constr_ecb_enc_1(X2,X0),constr_ecb_enc_1(X3,X0)),
    inference(rectify,[],[f87]) ).

fof(f87,axiom,
    ! [X25,X26,X27,X28] : constr_ecb_enc_3(X26,X27,X28,X25) = tuple_3(constr_ecb_enc_1(X26,X25),constr_ecb_enc_1(X27,X25),constr_ecb_enc_1(X28,X25)),
    file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax86) ).

fof(f377,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X0),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ),
    inference(cnf_transformation,[],[f287]) ).

fof(f287,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X0),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ),
    inference(flattening,[],[f286]) ).

fof(f286,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X0),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ),
    inference(ennf_transformation,[],[f203]) ).

fof(f203,plain,
    ! [X0,X1,X2] :
      ( ( pred_attacker(tuple_client_B_in_2(X2))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_3(X1))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) )
     => pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X0),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
    inference(rectify,[],[f192]) ).

fof(f192,axiom,
    ! [X189,X190,X191] :
      ( ( pred_attacker(tuple_client_B_in_2(X191))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X191,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_3(X190))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X190,name_skB))) )
     => pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X190,name_skB)),name_Nb(X189),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X191,constr_pkey(name_skS)))))) ),
    file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax191) ).

fof(f425,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_B_out_4(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f313]) ).

fof(f313,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_B_out_4(X0)) ),
    inference(ennf_transformation,[],[f233]) ).

fof(f233,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_out_4(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f136]) ).

fof(f136,axiom,
    ! [X111] :
      ( pred_attacker(tuple_client_B_out_4(X111))
     => pred_attacker(X111) ),
    file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax135) ).

fof(f897,plain,
    ~ spl1_17,
    inference(avatar_contradiction_clause,[],[f896]) ).

fof(f896,plain,
    ( $false
    | ~ spl1_17 ),
    inference(subsumption_resolution,[],[f895,f391]) ).

fof(f391,plain,
    name_A != name_I,
    inference(cnf_transformation,[],[f52]) ).

fof(f52,axiom,
    name_A != name_I,
    file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax51) ).

fof(f895,plain,
    ( name_A = name_I
    | ~ spl1_17 ),
    inference(subsumption_resolution,[],[f832,f390]) ).

fof(f390,plain,
    name_B != name_I,
    inference(cnf_transformation,[],[f58]) ).

fof(f58,axiom,
    name_B != name_I,
    file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax57) ).

fof(f832,plain,
    ( name_B = name_I
    | name_A = name_I
    | ~ spl1_17 ),
    inference(resolution,[],[f687,f388]) ).

fof(f388,plain,
    pred_attacker(name_I),
    inference(cnf_transformation,[],[f178]) ).

fof(f178,axiom,
    pred_attacker(name_I),
    file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax177) ).

fof(f687,plain,
    ( ! [X0] :
        ( ~ pred_attacker(X0)
        | name_B = X0
        | name_A = X0 )
    | ~ spl1_17 ),
    inference(avatar_component_clause,[],[f686]) ).

fof(f541,plain,
    ( spl1_6
    | ~ spl1_4 ),
    inference(avatar_split_clause,[],[f540,f491,f503]) ).

fof(f503,plain,
    ( spl1_6
  <=> pred_attacker(name_objective) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_6])]) ).

fof(f491,plain,
    ( spl1_4
  <=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_4])]) ).

fof(f540,plain,
    ( pred_attacker(name_objective)
    | ~ spl1_4 ),
    inference(resolution,[],[f493,f410]) ).

fof(f410,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_B_out_6(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f301]) ).

fof(f301,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_B_out_6(X0)) ),
    inference(ennf_transformation,[],[f218]) ).

fof(f218,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_out_6(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f134]) ).

fof(f134,axiom,
    ! [X109] :
      ( pred_attacker(tuple_client_B_out_6(X109))
     => pred_attacker(X109) ),
    file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax133) ).

fof(f493,plain,
    ( pred_attacker(tuple_client_B_out_6(name_objective))
    | ~ spl1_4 ),
    inference(avatar_component_clause,[],[f491]) ).

fof(f539,plain,
    ( spl1_7
    | ~ spl1_3 ),
    inference(avatar_split_clause,[],[f538,f488,f510]) ).

fof(f488,plain,
    ( spl1_3
  <=> ! [X3] :
        ( ~ pred_attacker(tuple_client_B_in_2(X3))
        | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS)))) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_3])]) ).

fof(f538,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl1_3 ),
    inference(subsumption_resolution,[],[f417,f536]) ).

fof(f536,plain,
    ( ! [X3] : ~ pred_attacker(tuple_client_B_in_2(X3))
    | ~ spl1_3 ),
    inference(subsumption_resolution,[],[f489,f398]) ).

fof(f489,plain,
    ( ! [X3] :
        ( ~ pred_attacker(tuple_client_B_in_2(X3))
        | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS)))) )
    | ~ spl1_3 ),
    inference(avatar_component_clause,[],[f488]) ).

fof(f533,plain,
    ( spl1_7
    | ~ spl1_2 ),
    inference(avatar_split_clause,[],[f532,f485,f510]) ).

fof(f485,plain,
    ( spl1_2
  <=> ! [X1] :
        ( ~ pred_attacker(tuple_client_B_in_3(X1))
        | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_2])]) ).

fof(f532,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl1_2 ),
    inference(subsumption_resolution,[],[f415,f527]) ).

fof(f527,plain,
    ( ! [X0] : ~ pred_attacker(tuple_client_B_in_3(X0))
    | ~ spl1_2 ),
    inference(resolution,[],[f398,f486]) ).

fof(f486,plain,
    ( ! [X1] :
        ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
        | ~ pred_attacker(tuple_client_B_in_3(X1)) )
    | ~ spl1_2 ),
    inference(avatar_component_clause,[],[f485]) ).

fof(f524,plain,
    ~ spl1_7,
    inference(avatar_contradiction_clause,[],[f517]) ).

fof(f517,plain,
    ( $false
    | ~ spl1_7 ),
    inference(resolution,[],[f511,f395]) ).

fof(f395,plain,
    pred_attacker(name_A),
    inference(cnf_transformation,[],[f180]) ).

fof(f180,axiom,
    pred_attacker(name_A),
    file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax179) ).

fof(f511,plain,
    ( ! [X1] : ~ pred_attacker(X1)
    | ~ spl1_7 ),
    inference(avatar_component_clause,[],[f510]) ).

fof(f506,plain,
    ( ~ spl1_5
    | ~ spl1_6 ),
    inference(avatar_split_clause,[],[f495,f503,f499]) ).

fof(f495,plain,
    ( ~ pred_attacker(name_objective)
    | ~ pred_attacker(name_Nb(sK0)) ),
    inference(resolution,[],[f375,f366]) ).

fof(f366,plain,
    ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
    inference(cnf_transformation,[],[f365]) ).

fof(f365,plain,
    ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
    inference(skolemisation,[status(esa),new_symbols(skolem,[sK0])],[f279,f364]) ).

fof(f364,plain,
    ( ? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective))
   => ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)) ),
    introduced(choice_axiom,[]) ).

fof(f279,plain,
    ? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective)),
    inference(ennf_transformation,[],[f198]) ).

fof(f198,plain,
    ~ ! [X0] : pred_attacker(tuple_2(name_Nb(X0),name_objective)),
    inference(rectify,[],[f197]) ).

fof(f197,negated_conjecture,
    ~ ! [X201] : pred_attacker(tuple_2(name_Nb(X201),name_objective)),
    inference(negated_conjecture,[],[f196]) ).

fof(f196,conjecture,
    ! [X201] : pred_attacker(tuple_2(name_Nb(X201),name_objective)),
    file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',co0) ).

fof(f375,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f283]) ).

fof(f283,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f282]) ).

fof(f282,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f201]) ).

fof(f201,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(tuple_2(X0,X1)) ),
    inference(rectify,[],[f172]) ).

fof(f172,axiom,
    ! [X172,X173] :
      ( ( pred_attacker(X173)
        & pred_attacker(X172) )
     => pred_attacker(tuple_2(X172,X173)) ),
    file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax171) ).

fof(f494,plain,
    ( spl1_1
    | spl1_2
    | spl1_3
    | spl1_4 ),
    inference(avatar_split_clause,[],[f376,f491,f488,f485,f482]) ).

fof(f376,plain,
    ! [X2,X3,X0,X1] :
      ( pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_2(X3))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_5(X2))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X2,name_skB)) ),
    inference(cnf_transformation,[],[f285]) ).

fof(f285,plain,
    ! [X0,X1,X2,X3] :
      ( pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_2(X3))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_5(X2))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X2,name_skB)) ),
    inference(flattening,[],[f284]) ).

fof(f284,plain,
    ! [X0,X1,X2,X3] :
      ( pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_2(X3))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_5(X2))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X2,name_skB)) ),
    inference(ennf_transformation,[],[f202]) ).

fof(f202,plain,
    ! [X0,X1,X2,X3] :
      ( ( pred_attacker(tuple_client_B_in_2(X3))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_3(X1))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
        & pred_attacker(tuple_client_B_in_5(X2))
        & pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X2,name_skB)) )
     => pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(rectify,[],[f193]) ).

fof(f193,axiom,
    ! [X192,X193,X194,X195] :
      ( ( pred_attacker(tuple_client_B_in_2(X195))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X195,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_3(X193))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X193,name_skB)))
        & pred_attacker(tuple_client_B_in_5(X194))
        & pred_eq_bitstring_bitstring(name_Nb(X192),constr_ecb_dec_1(X194,name_skB)) )
     => pred_attacker(tuple_client_B_out_6(name_objective)) ),
    file('/export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760',ax192) ).

%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.04/0.09  % Problem    : SWW964+1 : TPTP v8.1.2. Released v7.4.0.
% 0.04/0.10  % Command    : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule file --schedule_file /export/starexec/sandbox2/solver/bin/quickGreedyProduceRating_steal_pow3.txt --cores 8 -m 12000 -t %d %s
% 0.09/0.30  % Computer : n012.cluster.edu
% 0.09/0.30  % Model    : x86_64 x86_64
% 0.09/0.30  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.09/0.30  % Memory   : 8042.1875MB
% 0.09/0.30  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.09/0.30  % CPULimit   : 300
% 0.09/0.30  % WCLimit    : 300
% 0.09/0.30  % DateTime   : Fri May  3 19:38:52 EDT 2024
% 0.09/0.30  % CPUTime    : 
% 0.09/0.30  This is a FOF_THM_RFO_SEQ problem
% 0.09/0.30  Running vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule file --schedule_file /export/starexec/sandbox2/solver/bin/quickGreedyProduceRating_steal_pow3.txt --cores 8 -m 12000 -t 300 /export/starexec/sandbox2/tmp/tmp.6QycpX2Uu5/Vampire---4.8_18760
% 0.60/0.79  % (18874)lrs+1011_1:1_sil=8000:sp=occurrence:nwc=10.0:i=78:ss=axioms:sgt=8_0 on Vampire---4 for (2995ds/78Mi)
% 0.60/0.79  % (18875)ott+1011_1:1_sil=2000:urr=on:i=33:sd=1:kws=inv_frequency:ss=axioms:sup=off_0 on Vampire---4 for (2995ds/33Mi)
% 0.60/0.79  % (18872)dis-1011_2:1_sil=2000:lsd=20:nwc=5.0:flr=on:mep=off:st=3.0:i=34:sd=1:ep=RS:ss=axioms_0 on Vampire---4 for (2995ds/34Mi)
% 0.60/0.79  % (18873)lrs+1011_461:32768_sil=16000:irw=on:sp=frequency:lsd=20:fd=preordered:nwc=10.0:s2agt=32:alpa=false:cond=fast:s2a=on:i=51:s2at=3.0:awrs=decay:awrsf=691:bd=off:nm=20:fsr=off:amm=sco:uhcvi=on:rawr=on_0 on Vampire---4 for (2995ds/51Mi)
% 0.60/0.79  % (18876)lrs+2_1:1_sil=16000:fde=none:sos=all:nwc=5.0:i=34:ep=RS:s2pl=on:lma=on:afp=100000_0 on Vampire---4 for (2995ds/34Mi)
% 0.60/0.79  % (18877)lrs+1002_1:16_to=lpo:sil=32000:sp=unary_frequency:sos=on:i=45:bd=off:ss=axioms_0 on Vampire---4 for (2995ds/45Mi)
% 0.60/0.79  % (18878)lrs+21_1:5_sil=2000:sos=on:urr=on:newcnf=on:slsq=on:i=83:slsql=off:bd=off:nm=2:ss=axioms:st=1.5:sp=const_min:gsp=on:rawr=on_0 on Vampire---4 for (2995ds/83Mi)
% 0.60/0.79  % (18879)lrs-21_1:1_to=lpo:sil=2000:sp=frequency:sos=on:lma=on:i=56:sd=2:ss=axioms:ep=R_0 on Vampire---4 for (2995ds/56Mi)
% 0.60/0.79  % (18872)Refutation not found, incomplete strategy% (18872)------------------------------
% 0.60/0.79  % (18872)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.60/0.79  % (18872)Termination reason: Refutation not found, incomplete strategy
% 0.60/0.79  
% 0.60/0.79  % (18872)Memory used [KB]: 1159
% 0.60/0.79  % (18872)Time elapsed: 0.004 s
% 0.60/0.79  % (18872)Instructions burned: 4 (million)
% 0.60/0.79  % (18872)------------------------------
% 0.60/0.79  % (18872)------------------------------
% 0.60/0.79  % (18877)Refutation not found, incomplete strategy% (18877)------------------------------
% 0.60/0.79  % (18877)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.60/0.79  % (18877)Termination reason: Refutation not found, incomplete strategy
% 0.60/0.79  
% 0.60/0.79  % (18877)Memory used [KB]: 1176
% 0.60/0.79  % (18877)Time elapsed: 0.004 s
% 0.60/0.79  % (18877)Instructions burned: 5 (million)
% 0.60/0.79  % (18879)Refutation not found, incomplete strategy% (18879)------------------------------
% 0.60/0.79  % (18879)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.60/0.79  % (18879)Termination reason: Refutation not found, incomplete strategy
% 0.60/0.79  
% 0.60/0.79  % (18879)Memory used [KB]: 1176
% 0.60/0.79  % (18879)Time elapsed: 0.004 s
% 0.60/0.79  % (18879)Instructions burned: 4 (million)
% 0.60/0.79  % (18877)------------------------------
% 0.60/0.79  % (18877)------------------------------
% 0.60/0.79  % (18879)------------------------------
% 0.60/0.79  % (18879)------------------------------
% 0.60/0.79  % (18876)Refutation not found, incomplete strategy% (18876)------------------------------
% 0.60/0.79  % (18876)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.60/0.79  % (18876)Termination reason: Refutation not found, incomplete strategy
% 0.60/0.79  
% 0.60/0.79  % (18876)Memory used [KB]: 1271
% 0.60/0.79  % (18876)Time elapsed: 0.005 s
% 0.60/0.79  % (18876)Instructions burned: 8 (million)
% 0.60/0.79  % (18876)------------------------------
% 0.60/0.79  % (18876)------------------------------
% 0.60/0.79  % (18880)lrs+21_1:16_sil=2000:sp=occurrence:urr=on:flr=on:i=55:sd=1:nm=0:ins=3:ss=included:rawr=on:br=off_0 on Vampire---4 for (2995ds/55Mi)
% 0.60/0.79  % (18881)dis+3_25:4_sil=16000:sos=all:erd=off:i=50:s2at=4.0:bd=off:nm=60:sup=off:cond=on:av=off:ins=2:nwc=10.0:etr=on:to=lpo:s2agt=20:fd=off:bsr=unit_only:slsq=on:slsqr=28,19:awrs=converge:awrsf=500:tgt=ground:bs=unit_only_0 on Vampire---4 for (2995ds/50Mi)
% 0.60/0.79  % (18882)lrs+1010_1:2_sil=4000:tgt=ground:nwc=10.0:st=2.0:i=208:sd=1:bd=off:ss=axioms_0 on Vampire---4 for (2995ds/208Mi)
% 0.60/0.79  % (18883)lrs-1011_1:1_sil=4000:plsq=on:plsqr=32,1:sp=frequency:plsql=on:nwc=10.0:i=52:aac=none:afr=on:ss=axioms:er=filter:sgt=16:rawr=on:etr=on:lma=on_0 on Vampire---4 for (2995ds/52Mi)
% 0.60/0.80  % (18882)Refutation not found, incomplete strategy% (18882)------------------------------
% 0.60/0.80  % (18882)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.60/0.80  % (18882)Termination reason: Refutation not found, incomplete strategy
% 0.60/0.80  
% 0.60/0.80  % (18882)Memory used [KB]: 1157
% 0.60/0.80  % (18882)Time elapsed: 0.003 s
% 0.60/0.80  % (18882)Instructions burned: 4 (million)
% 0.60/0.80  % (18882)------------------------------
% 0.60/0.80  % (18882)------------------------------
% 0.60/0.80  % (18884)lrs-1010_1:1_to=lpo:sil=2000:sp=reverse_arity:sos=on:urr=ec_only:i=518:sd=2:bd=off:ss=axioms:sgt=16_0 on Vampire---4 for (2995ds/518Mi)
% 0.60/0.80  % (18884)Refutation not found, incomplete strategy% (18884)------------------------------
% 0.60/0.80  % (18884)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.60/0.80  % (18884)Termination reason: Refutation not found, incomplete strategy
% 0.60/0.80  
% 0.60/0.80  % (18884)Memory used [KB]: 1238
% 0.60/0.80  % (18884)Time elapsed: 0.005 s
% 0.60/0.80  % (18884)Instructions burned: 8 (million)
% 0.60/0.80  % (18884)------------------------------
% 0.60/0.80  % (18884)------------------------------
% 0.60/0.80  % (18875)Instruction limit reached!
% 0.60/0.80  % (18875)------------------------------
% 0.60/0.80  % (18875)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.60/0.80  % (18875)Termination reason: Unknown
% 0.60/0.80  % (18875)Termination phase: Saturation
% 0.60/0.80  
% 0.60/0.80  % (18875)Memory used [KB]: 1685
% 0.60/0.80  % (18875)Time elapsed: 0.019 s
% 0.60/0.80  % (18875)Instructions burned: 34 (million)
% 0.60/0.80  % (18875)------------------------------
% 0.60/0.80  % (18875)------------------------------
% 0.60/0.81  % (18885)lrs+1011_87677:1048576_sil=8000:sos=on:spb=non_intro:nwc=10.0:kmz=on:i=42:ep=RS:nm=0:ins=1:uhcvi=on:rawr=on:fde=unused:afp=2000:afq=1.444:plsq=on:nicw=on_0 on Vampire---4 for (2995ds/42Mi)
% 0.60/0.81  % (18886)dis+1011_1258907:1048576_bsr=unit_only:to=lpo:drc=off:sil=2000:tgt=full:fde=none:sp=frequency:spb=goal:rnwc=on:nwc=6.70083:sac=on:newcnf=on:st=2:i=243:bs=unit_only:sd=3:afp=300:awrs=decay:awrsf=218:nm=16:ins=3:afq=3.76821:afr=on:ss=axioms:sgt=5:rawr=on:add=off:bsd=on_0 on Vampire---4 for (2995ds/243Mi)
% 0.60/0.81  % (18873)Instruction limit reached!
% 0.60/0.81  % (18873)------------------------------
% 0.60/0.81  % (18873)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.60/0.81  % (18873)Termination reason: Unknown
% 0.60/0.81  % (18873)Termination phase: Saturation
% 0.60/0.81  
% 0.60/0.81  % (18873)Memory used [KB]: 1850
% 0.60/0.81  % (18873)Time elapsed: 0.029 s
% 0.60/0.81  % (18873)Instructions burned: 51 (million)
% 0.60/0.81  % (18873)------------------------------
% 0.60/0.81  % (18873)------------------------------
% 0.60/0.82  % (18881)Instruction limit reached!
% 0.60/0.82  % (18881)------------------------------
% 0.60/0.82  % (18881)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.60/0.82  % (18881)Termination reason: Unknown
% 0.60/0.82  % (18881)Termination phase: Saturation
% 0.60/0.82  
% 0.60/0.82  % (18881)Memory used [KB]: 1973
% 0.60/0.82  % (18881)Time elapsed: 0.025 s
% 0.60/0.82  % (18881)Instructions burned: 50 (million)
% 0.60/0.82  % (18881)------------------------------
% 0.60/0.82  % (18881)------------------------------
% 0.60/0.82  % (18887)lrs+1011_2:9_sil=2000:lsd=10:newcnf=on:i=117:sd=2:awrs=decay:ss=included:amm=off:ep=R_0 on Vampire---4 for (2995ds/117Mi)
% 0.60/0.82  % (18888)dis+1011_11:1_sil=2000:avsq=on:i=143:avsqr=1,16:ep=RS:rawr=on:aac=none:lsd=100:mep=off:fde=none:newcnf=on:bsr=unit_only_0 on Vampire---4 for (2994ds/143Mi)
% 0.60/0.82  % (18880)Instruction limit reached!
% 0.60/0.82  % (18880)------------------------------
% 0.60/0.82  % (18880)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.60/0.82  % (18880)Termination reason: Unknown
% 0.60/0.82  % (18880)Termination phase: Saturation
% 0.60/0.82  
% 0.60/0.82  % (18880)Memory used [KB]: 2188
% 0.60/0.82  % (18880)Time elapsed: 0.029 s
% 0.60/0.82  % (18880)Instructions burned: 56 (million)
% 0.60/0.82  % (18880)------------------------------
% 0.60/0.82  % (18880)------------------------------
% 0.60/0.82  % (18889)lrs+1011_1:2_to=lpo:sil=8000:plsqc=1:plsq=on:plsqr=326,59:sp=weighted_frequency:plsql=on:nwc=10.0:newcnf=on:i=93:awrs=converge:awrsf=200:bd=off:ins=1:rawr=on:alpa=false:avsq=on:avsqr=1,16_0 on Vampire---4 for (2994ds/93Mi)
% 0.60/0.82  % (18883)Instruction limit reached!
% 0.60/0.82  % (18883)------------------------------
% 0.60/0.82  % (18883)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.60/0.82  % (18883)Termination reason: Unknown
% 0.60/0.82  % (18883)Termination phase: Saturation
% 0.60/0.82  
% 0.60/0.82  % (18883)Memory used [KB]: 1748
% 0.60/0.82  % (18883)Time elapsed: 0.031 s
% 0.60/0.82  % (18883)Instructions burned: 53 (million)
% 0.60/0.82  % (18883)------------------------------
% 0.60/0.82  % (18883)------------------------------
% 0.79/0.82  % (18887)Refutation not found, incomplete strategy% (18887)------------------------------
% 0.79/0.82  % (18887)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.79/0.83  % (18887)Termination reason: Refutation not found, incomplete strategy
% 0.79/0.83  
% 0.79/0.83  % (18887)Memory used [KB]: 1335
% 0.79/0.83  % (18887)Time elapsed: 0.009 s
% 0.79/0.83  % (18887)Instructions burned: 16 (million)
% 0.79/0.83  % (18887)------------------------------
% 0.79/0.83  % (18887)------------------------------
% 0.79/0.83  % (18885)Instruction limit reached!
% 0.79/0.83  % (18885)------------------------------
% 0.79/0.83  % (18885)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.79/0.83  % (18885)Termination reason: Unknown
% 0.79/0.83  % (18885)Termination phase: Saturation
% 0.79/0.83  
% 0.79/0.83  % (18885)Memory used [KB]: 2046
% 0.79/0.83  % (18885)Time elapsed: 0.022 s
% 0.79/0.83  % (18885)Instructions burned: 42 (million)
% 0.79/0.83  % (18885)------------------------------
% 0.79/0.83  % (18885)------------------------------
% 0.79/0.83  % (18890)lrs+1666_1:1_sil=4000:sp=occurrence:sos=on:urr=on:newcnf=on:i=62:amm=off:ep=R:erd=off:nm=0:plsq=on:plsqr=14,1_0 on Vampire---4 for (2994ds/62Mi)
% 0.79/0.83  % (18878)Instruction limit reached!
% 0.79/0.83  % (18878)------------------------------
% 0.79/0.83  % (18878)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.79/0.83  % (18878)Termination reason: Unknown
% 0.79/0.83  % (18878)Termination phase: Saturation
% 0.79/0.83  
% 0.79/0.83  % (18878)Memory used [KB]: 2411
% 0.79/0.83  % (18878)Time elapsed: 0.043 s
% 0.79/0.83  % (18878)Instructions burned: 84 (million)
% 0.79/0.83  % (18878)------------------------------
% 0.79/0.83  % (18878)------------------------------
% 0.79/0.83  % (18891)lrs+21_2461:262144_anc=none:drc=off:sil=2000:sp=occurrence:nwc=6.0:updr=off:st=3.0:i=32:sd=2:afp=4000:erml=3:nm=14:afq=2.0:uhcvi=on:ss=included:er=filter:abs=on:nicw=on:ile=on:sims=off:s2a=on:s2agt=50:s2at=-1.0:plsq=on:plsql=on:plsqc=2:plsqr=1,32:newcnf=on:bd=off:to=lpo_0 on Vampire---4 for (2994ds/32Mi)
% 0.79/0.83  % (18874)Instruction limit reached!
% 0.79/0.83  % (18874)------------------------------
% 0.79/0.83  % (18874)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.79/0.83  % (18874)Termination reason: Unknown
% 0.79/0.83  % (18874)Termination phase: Saturation
% 0.79/0.83  
% 0.79/0.83  % (18874)Memory used [KB]: 1951
% 0.79/0.83  % (18874)Time elapsed: 0.044 s
% 0.79/0.83  % (18874)Instructions burned: 79 (million)
% 0.79/0.83  % (18874)------------------------------
% 0.79/0.83  % (18874)------------------------------
% 0.79/0.83  % (18892)dis+1011_1:1_sil=16000:nwc=7.0:s2agt=64:s2a=on:i=1919:ss=axioms:sgt=8:lsd=50:sd=7_0 on Vampire---4 for (2994ds/1919Mi)
% 0.79/0.83  % (18888)Refutation not found, incomplete strategy% (18888)------------------------------
% 0.79/0.83  % (18888)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.79/0.83  % (18888)Termination reason: Refutation not found, incomplete strategy
% 0.79/0.83  
% 0.79/0.83  % (18888)Memory used [KB]: 1350
% 0.79/0.83  % (18888)Time elapsed: 0.012 s
% 0.79/0.83  % (18888)Instructions burned: 21 (million)
% 0.79/0.83  % (18888)------------------------------
% 0.79/0.83  % (18888)------------------------------
% 0.79/0.83  % (18893)ott-32_5:1_sil=4000:sp=occurrence:urr=full:rp=on:nwc=5.0:newcnf=on:st=5.0:s2pl=on:i=55:sd=2:ins=2:ss=included:rawr=on:anc=none:sos=on:s2agt=8:spb=intro:ep=RS:avsq=on:avsqr=27,155:lma=on_0 on Vampire---4 for (2994ds/55Mi)
% 0.79/0.83  % (18894)lrs-1011_1:1_sil=2000:sos=on:urr=on:i=53:sd=1:bd=off:ins=3:av=off:ss=axioms:sgt=16:gsp=on:lsd=10_0 on Vampire---4 for (2994ds/53Mi)
% 0.79/0.83  % (18895)lrs+1011_6929:65536_anc=all_dependent:sil=2000:fde=none:plsqc=1:plsq=on:plsqr=19,8:plsql=on:nwc=3.0:i=46:afp=4000:ep=R:nm=3:fsr=off:afr=on:aer=off:gsp=on_0 on Vampire---4 for (2994ds/46Mi)
% 0.79/0.85  % (18891)Instruction limit reached!
% 0.79/0.85  % (18891)------------------------------
% 0.79/0.85  % (18891)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.79/0.85  % (18891)Termination reason: Unknown
% 0.79/0.85  % (18891)Termination phase: Saturation
% 0.79/0.85  
% 0.79/0.85  % (18891)Memory used [KB]: 1654
% 0.79/0.85  % (18891)Time elapsed: 0.019 s
% 0.79/0.85  % (18891)Instructions burned: 33 (million)
% 0.79/0.85  % (18891)------------------------------
% 0.79/0.85  % (18891)------------------------------
% 0.79/0.85  % (18896)dis+10_3:31_sil=2000:sp=frequency:abs=on:acc=on:lcm=reverse:nwc=3.0:alpa=random:st=3.0:i=102:sd=1:nm=4:ins=1:aer=off:ss=axioms_0 on Vampire---4 for (2994ds/102Mi)
% 0.79/0.85  % (18896)Refutation not found, incomplete strategy% (18896)------------------------------
% 0.79/0.85  % (18896)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.79/0.85  % (18896)Termination reason: Refutation not found, incomplete strategy
% 0.79/0.85  
% 0.79/0.85  % (18896)Memory used [KB]: 1194
% 0.79/0.85  % (18896)Time elapsed: 0.004 s
% 0.79/0.85  % (18896)Instructions burned: 5 (million)
% 0.79/0.85  % (18896)------------------------------
% 0.79/0.85  % (18896)------------------------------
% 0.79/0.86  % (18897)ott+1011_9:29_slsqr=3,2:sil=2000:tgt=ground:lsd=10:lcm=predicate:avsqc=4:slsq=on:avsq=on:i=35:s2at=4.0:add=large:sd=1:avsqr=1,16:aer=off:ss=axioms:sgt=100:rawr=on:s2a=on:sac=on:afp=1:nwc=10.0:nm=64:bd=preordered:abs=on:rnwc=on:er=filter:nicw=on:spb=non_intro:lma=on_0 on Vampire---4 for (2994ds/35Mi)
% 0.95/0.86  % (18890)Instruction limit reached!
% 0.95/0.86  % (18890)------------------------------
% 0.95/0.86  % (18890)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.95/0.86  % (18890)Termination reason: Unknown
% 0.95/0.86  % (18890)Termination phase: Saturation
% 0.95/0.86  
% 0.95/0.86  % (18890)Memory used [KB]: 2414
% 0.95/0.86  % (18890)Time elapsed: 0.031 s
% 0.95/0.86  % (18890)Instructions burned: 62 (million)
% 0.95/0.86  % (18890)------------------------------
% 0.95/0.86  % (18890)------------------------------
% 0.95/0.86  % (18895)Instruction limit reached!
% 0.95/0.86  % (18895)------------------------------
% 0.95/0.86  % (18895)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.95/0.86  % (18895)Termination reason: Unknown
% 0.95/0.86  % (18895)Termination phase: Saturation
% 0.95/0.86  
% 0.95/0.86  % (18895)Memory used [KB]: 1714
% 0.95/0.86  % (18895)Time elapsed: 0.047 s
% 0.95/0.86  % (18895)Instructions burned: 46 (million)
% 0.95/0.86  % (18895)------------------------------
% 0.95/0.86  % (18895)------------------------------
% 0.95/0.86  % (18894)Instruction limit reached!
% 0.95/0.86  % (18894)------------------------------
% 0.95/0.86  % (18894)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.95/0.86  % (18894)Termination reason: Unknown
% 0.95/0.86  % (18894)Termination phase: Saturation
% 0.95/0.86  
% 0.95/0.86  % (18894)Memory used [KB]: 1771
% 0.95/0.86  % (18894)Time elapsed: 0.049 s
% 0.95/0.86  % (18894)Instructions burned: 53 (million)
% 0.95/0.86  % (18894)------------------------------
% 0.95/0.86  % (18894)------------------------------
% 0.95/0.86  % (18893)Instruction limit reached!
% 0.95/0.86  % (18893)------------------------------
% 0.95/0.86  % (18893)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.95/0.86  % (18893)Termination reason: Unknown
% 0.95/0.86  % (18893)Termination phase: Saturation
% 0.95/0.86  
% 0.95/0.86  % (18893)Memory used [KB]: 2356
% 0.95/0.86  % (18893)Time elapsed: 0.049 s
% 0.95/0.86  % (18893)Instructions burned: 56 (million)
% 0.95/0.86  % (18893)------------------------------
% 0.95/0.86  % (18893)------------------------------
% 0.95/0.86  % (18898)dis+1003_1:1024_sil=4000:urr=on:newcnf=on:i=87:av=off:fsr=off:bce=on_0 on Vampire---4 for (2994ds/87Mi)
% 0.95/0.86  % (18899)dis+1010_12107:524288_anc=none:drc=encompass:sil=2000:bsd=on:rp=on:nwc=10.0:alpa=random:i=109:kws=precedence:awrs=decay:awrsf=2:nm=16:ins=3:rawr=on:s2a=on:s2at=4.5:acc=on:flr=on_0 on Vampire---4 for (2994ds/109Mi)
% 0.95/0.86  % (18900)lrs+1002_1:16_sil=2000:sp=occurrence:sos=on:i=161:aac=none:bd=off:ss=included:sd=5:st=2.5:sup=off_0 on Vampire---4 for (2994ds/161Mi)
% 0.95/0.86  % (18901)lrs-1002_2:9_anc=none:sil=2000:plsqc=1:plsq=on:avsql=on:plsqr=2859761,1048576:erd=off:rp=on:nwc=21.7107:newcnf=on:avsq=on:i=69:aac=none:avsqr=6317,1048576:ep=RS:fsr=off:rawr=on:afp=50:afq=2.133940627822616:sac=on_0 on Vampire---4 for (2994ds/69Mi)
% 0.95/0.86  % (18897)Refutation not found, incomplete strategy% (18897)------------------------------
% 0.95/0.86  % (18897)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.95/0.86  % (18897)Termination reason: Refutation not found, incomplete strategy
% 0.95/0.86  
% 0.95/0.86  % (18897)Memory used [KB]: 1266
% 0.95/0.86  % (18897)Time elapsed: 0.031 s
% 0.95/0.86  % (18897)Instructions burned: 16 (million)
% 0.95/0.86  % (18897)------------------------------
% 0.95/0.86  % (18897)------------------------------
% 0.95/0.86  % (18900)Refutation not found, incomplete strategy% (18900)------------------------------
% 0.95/0.86  % (18900)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.95/0.86  % (18900)Termination reason: Refutation not found, incomplete strategy
% 0.95/0.86  
% 0.95/0.86  % (18900)Memory used [KB]: 1204
% 0.95/0.86  % (18900)Time elapsed: 0.005 s
% 0.95/0.86  % (18900)Instructions burned: 8 (million)
% 0.95/0.86  % (18900)------------------------------
% 0.95/0.86  % (18900)------------------------------
% 0.95/0.87  % (18902)lrs+1010_1:512_sil=8000:tgt=ground:spb=units:gs=on:lwlo=on:nicw=on:gsem=on:st=1.5:i=40:nm=21:ss=included:nwc=5.3:afp=4000:afq=1.38:ins=1:bs=unit_only:awrs=converge:awrsf=10:bce=on_0 on Vampire---4 for (2994ds/40Mi)
% 0.95/0.87  % (18903)ott+1011_1:3_drc=off:sil=4000:tgt=ground:fde=unused:plsq=on:sp=unary_first:fd=preordered:nwc=10.0:i=360:ins=1:rawr=on:bd=preordered_0 on Vampire---4 for (2994ds/360Mi)
% 0.95/0.87  % (18901)Refutation not found, incomplete strategy% (18901)------------------------------
% 0.95/0.87  % (18901)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.95/0.87  % (18901)Termination reason: Refutation not found, incomplete strategy
% 0.95/0.87  
% 0.95/0.87  % (18901)Memory used [KB]: 1410
% 0.95/0.87  % (18901)Time elapsed: 0.009 s
% 0.95/0.87  % (18901)Instructions burned: 15 (million)
% 0.95/0.87  % (18901)------------------------------
% 0.95/0.87  % (18901)------------------------------
% 0.95/0.87  % (18892)First to succeed.
% 0.95/0.87  % (18904)dis+10_1:4_to=lpo:sil=2000:sos=on:spb=goal:rp=on:sac=on:newcnf=on:i=161:ss=axioms:aac=none_0 on Vampire---4 for (2994ds/161Mi)
% 0.95/0.87  % (18889)Instruction limit reached!
% 0.95/0.87  % (18889)------------------------------
% 0.95/0.87  % (18889)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.95/0.87  % (18889)Termination reason: Unknown
% 0.95/0.87  % (18889)Termination phase: Saturation
% 0.95/0.87  
% 0.95/0.87  % (18889)Memory used [KB]: 2343
% 0.95/0.87  % (18889)Time elapsed: 0.052 s
% 0.95/0.87  % (18889)Instructions burned: 94 (million)
% 0.95/0.87  % (18889)------------------------------
% 0.95/0.87  % (18889)------------------------------
% 0.95/0.87  % (18892)Solution written to "/export/starexec/sandbox2/tmp/vampire-proof-18867"
% 0.95/0.88  % (18904)Refutation not found, incomplete strategy% (18904)------------------------------
% 0.95/0.88  % (18904)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.95/0.88  % (18904)Termination reason: Refutation not found, incomplete strategy
% 0.95/0.88  
% 0.95/0.88  % (18904)Memory used [KB]: 1179
% 0.95/0.88  % (18904)Time elapsed: 0.004 s
% 0.95/0.88  % (18904)Instructions burned: 5 (million)
% 0.95/0.88  % (18904)------------------------------
% 0.95/0.88  % (18904)------------------------------
% 0.95/0.88  % (18892)Refutation found. Thanks to Tanya!
% 0.95/0.88  % SZS status Theorem for Vampire---4
% 0.95/0.88  % SZS output start Proof for Vampire---4
% See solution above
% 0.95/0.88  % (18892)------------------------------
% 0.95/0.88  % (18892)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.95/0.88  % (18892)Termination reason: Refutation
% 0.95/0.88  
% 0.95/0.88  % (18892)Memory used [KB]: 1698
% 0.95/0.88  % (18892)Time elapsed: 0.068 s
% 0.95/0.88  % (18892)Instructions burned: 84 (million)
% 0.95/0.88  % (18867)Success in time 0.574 s
% 0.95/0.88  % Vampire---4.8 exiting
%------------------------------------------------------------------------------