TSTP Solution File: SWV018-1 by Etableau---0.67

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : Etableau---0.67
% Problem  : SWV018-1 : TPTP v8.1.0. Released v2.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : etableau --auto --tsmdo --quicksat=10000 --tableau=1 --tableau-saturation=1 -s -p --tableau-cores=8 --cpu-limit=%d %s

% Computer : n023.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 600s
% DateTime : Wed Jul 20 18:18:58 EDT 2022

% Result   : Satisfiable 0.13s 0.40s
% Output   : CNFRefutation 0.13s
% Verified : 
% SZS Type : -

% Comments : 
%------------------------------------------------------------------------------
%----WARNING: Could not form TPTP format derivation
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.07/0.13  % Problem  : SWV018-1 : TPTP v8.1.0. Released v2.4.0.
% 0.07/0.13  % Command  : etableau --auto --tsmdo --quicksat=10000 --tableau=1 --tableau-saturation=1 -s -p --tableau-cores=8 --cpu-limit=%d %s
% 0.13/0.35  % Computer : n023.cluster.edu
% 0.13/0.35  % Model    : x86_64 x86_64
% 0.13/0.35  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.13/0.35  % Memory   : 8042.1875MB
% 0.13/0.35  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.13/0.35  % CPULimit : 300
% 0.13/0.35  % WCLimit  : 600
% 0.13/0.35  % DateTime : Wed Jun 15 10:45:50 EDT 2022
% 0.13/0.35  % CPUTime  : 
% 0.13/0.38  # No SInE strategy applied
% 0.13/0.38  # Auto-Mode selected heuristic G_E___208_C18_F1_SE_CS_SP_PS_S5PRR_S4d
% 0.13/0.38  # and selection function SelectCQIPrecWNTNp.
% 0.13/0.38  #
% 0.13/0.38  # Presaturation interreduction done
% 0.13/0.38  # Number of axioms: 41 Number of unprocessed: 41
% 0.13/0.38  # Tableaux proof search.
% 0.13/0.38  # APR header successfully linked.
% 0.13/0.38  # Hello from C++
% 0.13/0.40  # The folding up rule is enabled...
% 0.13/0.40  # Local unification is enabled...
% 0.13/0.40  # Any saturation attempts will use folding labels...
% 0.13/0.40  # 41 beginning clauses after preprocessing and clausification
% 0.13/0.40  # Creating start rules for all 1 conjectures.
% 0.13/0.40  # There are 1 start rule candidates:
% 0.13/0.40  # Found 14 unit axioms.
% 0.13/0.40  # 1 start rule tableaux created.
% 0.13/0.40  # 27 extension rule candidate clauses
% 0.13/0.40  # 14 unit axiom clauses
% 0.13/0.40  
% 0.13/0.40  # Requested 8, 32 cores available to the main process.
% 0.13/0.40  # There are not enough tableaux to fork, creating more from the initial 1
% 0.13/0.40  # 1402 Satisfiable branch
% 0.13/0.40  # Satisfiable branch found.
% 0.13/0.40  # There were 1 total branch saturation attempts.
% 0.13/0.40  # There were 0 of these attempts blocked.
% 0.13/0.40  # There were 0 deferred branch saturation attempts.
% 0.13/0.40  # There were 0 free duplicated saturations.
% 0.13/0.40  # There were 0 total successful branch saturations.
% 0.13/0.40  # There were 0 successful branch saturations in interreduction.
% 0.13/0.40  # There were 0 successful branch saturations on the branch.
% 0.13/0.40  # There were 0 successful branch saturations after the branch.
% 0.13/0.40  # SZS status Satisfiable for /export/starexec/sandbox/benchmark/theBenchmark.p
% 0.13/0.40  # SZS output start for /export/starexec/sandbox/benchmark/theBenchmark.p
% 0.13/0.40  # Begin clausification derivation
% 0.13/0.40  
% 0.13/0.40  # End clausification derivation
% 0.13/0.40  # Begin listing active clauses obtained from FOF to CNF conversion
% 0.13/0.40  cnf(i_0_42, plain, (party_of_protocol(a))).
% 0.13/0.40  cnf(i_0_47, plain, (party_of_protocol(b))).
% 0.13/0.40  cnf(i_0_54, plain, (party_of_protocol(t))).
% 0.13/0.40  cnf(i_0_48, plain, (fresh_to_b(an_a_nonce))).
% 0.13/0.40  cnf(i_0_73, plain, (a_nonce(an_a_nonce))).
% 0.13/0.40  cnf(i_0_78, plain, (fresh_intruder_nonce(an_intruder_nonce))).
% 0.13/0.40  cnf(i_0_77, plain, (a_key(generate_key(X1)))).
% 0.13/0.40  cnf(i_0_75, plain, (a_nonce(generate_b_nonce(X1)))).
% 0.13/0.40  cnf(i_0_74, plain, (a_nonce(generate_expiration_time(X1)))).
% 0.13/0.40  cnf(i_0_46, plain, (b_holds(key(bt,t)))).
% 0.13/0.40  cnf(i_0_52, plain, (t_holds(key(at,a)))).
% 0.13/0.40  cnf(i_0_53, plain, (t_holds(key(bt,b)))).
% 0.13/0.40  cnf(i_0_44, plain, (a_stored(pair(b,an_a_nonce)))).
% 0.13/0.40  cnf(i_0_43, plain, (message(sent(a,b,pair(a,an_a_nonce))))).
% 0.13/0.40  cnf(i_0_76, plain, (~a_nonce(X1)|~a_key(X1))).
% 0.13/0.40  cnf(i_0_81, plain, (intruder_message(X1)|~fresh_intruder_nonce(X1))).
% 0.13/0.40  cnf(i_0_80, plain, (fresh_to_b(X1)|~fresh_intruder_nonce(X1))).
% 0.13/0.40  cnf(i_0_82, negated_conjecture, (~intruder_holds(key(X1,X2))|~b_holds(key(X1,X3)))).
% 0.13/0.40  cnf(i_0_79, plain, (fresh_intruder_nonce(generate_intruder_nonce(X1))|~fresh_intruder_nonce(X1))).
% 0.13/0.40  cnf(i_0_58, plain, (intruder_message(X1)|~intruder_message(pair(X2,X1)))).
% 0.13/0.40  cnf(i_0_57, plain, (intruder_message(X1)|~intruder_message(pair(X1,X2)))).
% 0.13/0.40  cnf(i_0_56, plain, (intruder_message(X1)|~message(sent(X2,X3,X1)))).
% 0.13/0.40  cnf(i_0_61, plain, (intruder_message(X1)|~intruder_message(triple(X2,X3,X1)))).
% 0.13/0.40  cnf(i_0_71, plain, (intruder_holds(key(X1,X2))|~intruder_message(X1)|~party_of_protocol(X2))).
% 0.13/0.40  cnf(i_0_60, plain, (intruder_message(X1)|~intruder_message(triple(X2,X1,X3)))).
% 0.13/0.40  cnf(i_0_59, plain, (intruder_message(X1)|~intruder_message(triple(X1,X2,X3)))).
% 0.13/0.40  cnf(i_0_65, plain, (intruder_message(X1)|~intruder_message(quadruple(X2,X3,X4,X1)))).
% 0.13/0.40  cnf(i_0_64, plain, (intruder_message(X1)|~intruder_message(quadruple(X2,X3,X1,X4)))).
% 0.13/0.40  cnf(i_0_66, plain, (intruder_message(pair(X1,X2))|~intruder_message(X2)|~intruder_message(X1))).
% 0.13/0.40  cnf(i_0_63, plain, (intruder_message(X1)|~intruder_message(quadruple(X2,X1,X3,X4)))).
% 0.13/0.40  cnf(i_0_62, plain, (intruder_message(X1)|~intruder_message(quadruple(X1,X2,X3,X4)))).
% 0.13/0.40  cnf(i_0_69, plain, (intruder_message(X1)|~intruder_holds(key(X1,X2))|~intruder_message(encrypt(X3,X1))|~party_of_protocol(X2))).
% 0.13/0.40  cnf(i_0_70, plain, (message(sent(X1,X2,X3))|~intruder_message(X3)|~party_of_protocol(X2)|~party_of_protocol(X1))).
% 0.13/0.40  cnf(i_0_67, plain, (intruder_message(triple(X1,X2,X3))|~intruder_message(X3)|~intruder_message(X2)|~intruder_message(X1))).
% 0.13/0.40  cnf(i_0_72, plain, (intruder_message(encrypt(X1,X2))|~intruder_holds(key(X2,X3))|~intruder_message(X1)|~party_of_protocol(X3))).
% 0.13/0.40  cnf(i_0_50, plain, (b_stored(pair(X1,X2))|~fresh_to_b(X2)|~message(sent(X1,b,pair(X1,X2))))).
% 0.13/0.40  cnf(i_0_68, plain, (intruder_message(quadruple(X1,X2,X3,X4))|~intruder_message(X4)|~intruder_message(X3)|~intruder_message(X2)|~intruder_message(X1))).
% 0.13/0.40  cnf(i_0_51, plain, (b_holds(key(X1,X2))|~a_key(X1)|~b_stored(pair(X2,X3))|~message(sent(X2,b,pair(encrypt(triple(X2,X1,generate_expiration_time(X3)),bt),encrypt(generate_b_nonce(X3),X1)))))).
% 0.13/0.40  cnf(i_0_49, plain, (message(sent(b,t,triple(b,generate_b_nonce(X1),encrypt(triple(X2,X1,generate_expiration_time(X1)),bt))))|~fresh_to_b(X1)|~message(sent(X2,b,pair(X2,X1))))).
% 0.13/0.40  cnf(i_0_45, plain, (message(sent(a,X1,pair(X2,encrypt(X3,X4))))|~a_stored(pair(X1,X5))|~message(sent(t,a,triple(encrypt(quadruple(X1,X5,X4,X6),at),X2,X3))))).
% 0.13/0.40  cnf(i_0_55, plain, (message(sent(t,X1,triple(encrypt(quadruple(X2,X3,generate_key(X3),X4),X5),encrypt(triple(X1,generate_key(X3),X4),X6),X7)))|~a_nonce(X3)|~t_holds(key(X6,X2))|~t_holds(key(X5,X1))|~message(sent(X2,t,triple(X2,X7,encrypt(triple(X1,X3,X4),X6)))))).
% 0.13/0.40  # End listing active clauses.  There is an equivalent clause to each of these in the clausification!
% 0.13/0.40  # Begin printing tableau
% 0.13/0.40  # Found 5 steps
% 0.13/0.40  cnf(i_0_82, negated_conjecture, (~intruder_holds(key(bt,a))|~b_holds(key(bt,t))), inference(start_rule)).
% 0.13/0.40  cnf(i_0_84, plain, (~b_holds(key(bt,t))), inference(closure_rule, [i_0_46])).
% 0.13/0.40  cnf(i_0_83, plain, (~intruder_holds(key(bt,a))), inference(extension_rule, [i_0_71])).
% 0.13/0.40  cnf(i_0_103, plain, (~party_of_protocol(a)), inference(closure_rule, [i_0_42])).
% 0.13/0.40  cnf(i_0_102, plain, (~intruder_message(bt)), inference(extension_rule, [i_0_81])).
% 0.13/0.40  # End printing tableau
% 0.13/0.40  # SZS output end
% 0.13/0.40  # Branches closed with saturation will be marked with an "s"
% 0.13/0.40  # Returning from population with 1 new_tableaux and 0 remaining starting tableaux.
% 0.13/0.40  # We now have 1 tableaux to operate on
% 0.13/0.40  # Found closed tableau during pool population.
% 0.13/0.40  # Proof search is over...
% 0.13/0.40  # Freeing feature tree
%------------------------------------------------------------------------------