TSTP Solution File: SWW949+1 by iProver---3.8

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : iProver---3.8
% Problem  : SWW949+1 : TPTP v8.1.2. Released v7.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : run_iprover %s %d THM

% Computer : n015.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Fri Sep  1 00:41:31 EDT 2023

% Result   : Theorem 93.52s 13.72s
% Output   : CNFRefutation 93.52s
% Verified : 
% SZS Type : Refutation
%            Derivation depth      :   20
%            Number of leaves      :   17
% Syntax   : Number of formulae    :  116 (  44 unt;   0 def)
%            Number of atoms       :  212 (  19 equ)
%            Maximal formula atoms :    4 (   1 avg)
%            Number of connectives :  176 (  80   ~;  76   |;   4   &)
%                                         (   0 <=>;  16  =>;   0  <=;   0 <~>)
%            Maximal formula depth :    6 (   3 avg)
%            Maximal term depth    :    5 (   2 avg)
%            Number of predicates  :    3 (   1 usr;   1 prp; 0-2 aty)
%            Number of functors    :   13 (  13 usr;   6 con; 0-2 aty)
%            Number of variables   :  149 (   2 sgn;  72   !;   0   ?)

% Comments : 
%------------------------------------------------------------------------------
fof(f79,axiom,
    ! [X0] : constr_ZERO = constr_xor(X0,X0),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax78) ).

fof(f80,axiom,
    ! [X1] : constr_xor(X1,constr_ZERO) = X1,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax79) ).

fof(f81,axiom,
    ! [X2,X3] : constr_xor(X2,X3) = constr_xor(X3,X2),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax80) ).

fof(f82,axiom,
    ! [X4,X5,X6] : constr_xor(X4,constr_xor(X5,X6)) = constr_xor(constr_xor(X4,X5),X6),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax81) ).

fof(f83,axiom,
    ! [X7,X8] :
      ( ( pred_attacker(X8)
        & pred_attacker(X7) )
     => pred_attacker(constr_xor(X7,X8)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax82) ).

fof(f88,axiom,
    ! [X13,X14] :
      ( pred_attacker(tuple_knowledge_from_1st_round_out_2(X13,X14))
     => pred_attacker(X13) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax87) ).

fof(f89,axiom,
    ! [X15,X16] :
      ( pred_attacker(tuple_knowledge_from_1st_round_out_2(X15,X16))
     => pred_attacker(X16) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax88) ).

fof(f91,axiom,
    ! [X18] :
      ( pred_attacker(tuple_knowledge_from_1st_round_out_1(X18))
     => pred_attacker(X18) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax90) ).

fof(f98,axiom,
    pred_attacker(constr_ZERO),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax97) ).

fof(f100,axiom,
    ! [X26] :
      ( pred_attacker(tuple_R_out_4(X26))
     => pred_attacker(X26) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax99) ).

fof(f104,axiom,
    ! [X30] :
      ( pred_attacker(tuple_R_out_1(X30))
     => pred_attacker(X30) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax103) ).

fof(f105,axiom,
    ! [X31,X32] :
      ( ( pred_attacker(X32)
        & pred_attacker(X31) )
     => pred_attacker(tuple_R_in_2(X31,X32)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax104) ).

fof(f118,axiom,
    pred_attacker(tuple_knowledge_from_1st_round_out_1(name_r1_from_1st)),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax117) ).

fof(f119,axiom,
    pred_attacker(tuple_knowledge_from_1st_round_out_2(constr_xor(name_t,name_r2_from_1st),constr_f(constr_xor(name_r1_from_1st,name_r2_from_1st),name_t))),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax118) ).

fof(f121,axiom,
    pred_attacker(tuple_R_out_1(name_r1)),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax120) ).

fof(f123,axiom,
    ! [X44] :
      ( pred_attacker(tuple_R_in_2(X44,constr_f(constr_xor(name_r1,constr_xor(X44,name_t)),name_t)))
     => pred_attacker(tuple_R_out_4(name_objective)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax122) ).

fof(f124,conjecture,
    pred_attacker(name_objective),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',co0) ).

fof(f125,negated_conjecture,
    ~ pred_attacker(name_objective),
    inference(negated_conjecture,[],[f124]) ).

fof(f126,plain,
    ! [X0] : constr_xor(X0,constr_ZERO) = X0,
    inference(rectify,[],[f80]) ).

fof(f127,plain,
    ! [X0,X1] : constr_xor(X0,X1) = constr_xor(X1,X0),
    inference(rectify,[],[f81]) ).

fof(f128,plain,
    ! [X0,X1,X2] : constr_xor(X0,constr_xor(X1,X2)) = constr_xor(constr_xor(X0,X1),X2),
    inference(rectify,[],[f82]) ).

fof(f129,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(constr_xor(X0,X1)) ),
    inference(rectify,[],[f83]) ).

fof(f133,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_knowledge_from_1st_round_out_2(X0,X1))
     => pred_attacker(X0) ),
    inference(rectify,[],[f88]) ).

fof(f134,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_knowledge_from_1st_round_out_2(X0,X1))
     => pred_attacker(X1) ),
    inference(rectify,[],[f89]) ).

fof(f136,plain,
    ! [X0] :
      ( pred_attacker(tuple_knowledge_from_1st_round_out_1(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f91]) ).

fof(f143,plain,
    ! [X0] :
      ( pred_attacker(tuple_R_out_4(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f100]) ).

fof(f147,plain,
    ! [X0] :
      ( pred_attacker(tuple_R_out_1(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f104]) ).

fof(f148,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(tuple_R_in_2(X0,X1)) ),
    inference(rectify,[],[f105]) ).

fof(f156,plain,
    ! [X0] :
      ( pred_attacker(tuple_R_in_2(X0,constr_f(constr_xor(name_r1,constr_xor(X0,name_t)),name_t)))
     => pred_attacker(tuple_R_out_4(name_objective)) ),
    inference(rectify,[],[f123]) ).

fof(f157,plain,
    ~ pred_attacker(name_objective),
    inference(flattening,[],[f125]) ).

fof(f159,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_xor(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f129]) ).

fof(f160,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_xor(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f159]) ).

fof(f165,plain,
    ! [X0,X1] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_knowledge_from_1st_round_out_2(X0,X1)) ),
    inference(ennf_transformation,[],[f133]) ).

fof(f166,plain,
    ! [X0,X1] :
      ( pred_attacker(X1)
      | ~ pred_attacker(tuple_knowledge_from_1st_round_out_2(X0,X1)) ),
    inference(ennf_transformation,[],[f134]) ).

fof(f168,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_knowledge_from_1st_round_out_1(X0)) ),
    inference(ennf_transformation,[],[f136]) ).

fof(f176,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_R_out_4(X0)) ),
    inference(ennf_transformation,[],[f143]) ).

fof(f180,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_R_out_1(X0)) ),
    inference(ennf_transformation,[],[f147]) ).

fof(f181,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_R_in_2(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f148]) ).

fof(f182,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_R_in_2(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f181]) ).

fof(f190,plain,
    ! [X0] :
      ( pred_attacker(tuple_R_out_4(name_objective))
      | ~ pred_attacker(tuple_R_in_2(X0,constr_f(constr_xor(name_r1,constr_xor(X0,name_t)),name_t))) ),
    inference(ennf_transformation,[],[f156]) ).

fof(f269,plain,
    ! [X0] : constr_ZERO = constr_xor(X0,X0),
    inference(cnf_transformation,[],[f79]) ).

fof(f270,plain,
    ! [X0] : constr_xor(X0,constr_ZERO) = X0,
    inference(cnf_transformation,[],[f126]) ).

fof(f271,plain,
    ! [X0,X1] : constr_xor(X0,X1) = constr_xor(X1,X0),
    inference(cnf_transformation,[],[f127]) ).

fof(f272,plain,
    ! [X2,X0,X1] : constr_xor(X0,constr_xor(X1,X2)) = constr_xor(constr_xor(X0,X1),X2),
    inference(cnf_transformation,[],[f128]) ).

fof(f273,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_xor(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f160]) ).

fof(f278,plain,
    ! [X0,X1] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_knowledge_from_1st_round_out_2(X0,X1)) ),
    inference(cnf_transformation,[],[f165]) ).

fof(f279,plain,
    ! [X0,X1] :
      ( pred_attacker(X1)
      | ~ pred_attacker(tuple_knowledge_from_1st_round_out_2(X0,X1)) ),
    inference(cnf_transformation,[],[f166]) ).

fof(f281,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_knowledge_from_1st_round_out_1(X0)) ),
    inference(cnf_transformation,[],[f168]) ).

fof(f288,plain,
    pred_attacker(constr_ZERO),
    inference(cnf_transformation,[],[f98]) ).

fof(f290,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_R_out_4(X0)) ),
    inference(cnf_transformation,[],[f176]) ).

fof(f294,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_R_out_1(X0)) ),
    inference(cnf_transformation,[],[f180]) ).

fof(f295,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_R_in_2(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f182]) ).

fof(f307,plain,
    pred_attacker(tuple_knowledge_from_1st_round_out_1(name_r1_from_1st)),
    inference(cnf_transformation,[],[f118]) ).

fof(f308,plain,
    pred_attacker(tuple_knowledge_from_1st_round_out_2(constr_xor(name_t,name_r2_from_1st),constr_f(constr_xor(name_r1_from_1st,name_r2_from_1st),name_t))),
    inference(cnf_transformation,[],[f119]) ).

fof(f310,plain,
    pred_attacker(tuple_R_out_1(name_r1)),
    inference(cnf_transformation,[],[f121]) ).

fof(f312,plain,
    ! [X0] :
      ( pred_attacker(tuple_R_out_4(name_objective))
      | ~ pred_attacker(tuple_R_in_2(X0,constr_f(constr_xor(name_r1,constr_xor(X0,name_t)),name_t))) ),
    inference(cnf_transformation,[],[f190]) ).

fof(f313,plain,
    ~ pred_attacker(name_objective),
    inference(cnf_transformation,[],[f157]) ).

cnf(c_127,plain,
    constr_xor(X0,X0) = constr_ZERO,
    inference(cnf_transformation,[],[f269]) ).

cnf(c_128,plain,
    constr_xor(X0,constr_ZERO) = X0,
    inference(cnf_transformation,[],[f270]) ).

cnf(c_129,plain,
    constr_xor(X0,X1) = constr_xor(X1,X0),
    inference(cnf_transformation,[],[f271]) ).

cnf(c_130,plain,
    constr_xor(constr_xor(X0,X1),X2) = constr_xor(X0,constr_xor(X1,X2)),
    inference(cnf_transformation,[],[f272]) ).

cnf(c_131,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | pred_attacker(constr_xor(X0,X1)) ),
    inference(cnf_transformation,[],[f273]) ).

cnf(c_136,plain,
    ( ~ pred_attacker(tuple_knowledge_from_1st_round_out_2(X0,X1))
    | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f278]) ).

cnf(c_137,plain,
    ( ~ pred_attacker(tuple_knowledge_from_1st_round_out_2(X0,X1))
    | pred_attacker(X1) ),
    inference(cnf_transformation,[],[f279]) ).

cnf(c_139,plain,
    ( ~ pred_attacker(tuple_knowledge_from_1st_round_out_1(X0))
    | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f281]) ).

cnf(c_146,plain,
    pred_attacker(constr_ZERO),
    inference(cnf_transformation,[],[f288]) ).

cnf(c_148,plain,
    ( ~ pred_attacker(tuple_R_out_4(X0))
    | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f290]) ).

cnf(c_152,plain,
    ( ~ pred_attacker(tuple_R_out_1(X0))
    | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f294]) ).

cnf(c_153,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | pred_attacker(tuple_R_in_2(X0,X1)) ),
    inference(cnf_transformation,[],[f295]) ).

cnf(c_165,plain,
    pred_attacker(tuple_knowledge_from_1st_round_out_1(name_r1_from_1st)),
    inference(cnf_transformation,[],[f307]) ).

cnf(c_166,plain,
    pred_attacker(tuple_knowledge_from_1st_round_out_2(constr_xor(name_t,name_r2_from_1st),constr_f(constr_xor(name_r1_from_1st,name_r2_from_1st),name_t))),
    inference(cnf_transformation,[],[f308]) ).

cnf(c_168,plain,
    pred_attacker(tuple_R_out_1(name_r1)),
    inference(cnf_transformation,[],[f310]) ).

cnf(c_170,plain,
    ( ~ pred_attacker(tuple_R_in_2(X0,constr_f(constr_xor(name_r1,constr_xor(X0,name_t)),name_t)))
    | pred_attacker(tuple_R_out_4(name_objective)) ),
    inference(cnf_transformation,[],[f312]) ).

cnf(c_171,negated_conjecture,
    ~ pred_attacker(name_objective),
    inference(cnf_transformation,[],[f313]) ).

cnf(c_200,plain,
    pred_attacker(tuple_knowledge_from_1st_round_out_2(constr_xor(name_t,name_r2_from_1st),constr_f(constr_xor(name_r2_from_1st,name_r1_from_1st),name_t))),
    inference(theory_normalisation,[status(thm)],[c_166,c_130,c_129]) ).

cnf(c_202,plain,
    ( ~ pred_attacker(tuple_R_in_2(X0,constr_f(constr_xor(name_t,constr_xor(X0,name_r1)),name_t)))
    | pred_attacker(tuple_R_out_4(name_objective)) ),
    inference(theory_normalisation,[status(thm)],[c_170,c_130,c_129]) ).

cnf(c_893,plain,
    ( pred_attacker(tuple_R_out_4(name_objective))
    | ~ pred_attacker(tuple_R_in_2(X0,constr_f(constr_xor(name_t,constr_xor(X0,name_r1)),name_t))) ),
    inference(prop_impl_just,[status(thm)],[c_202]) ).

cnf(c_894,plain,
    ( ~ pred_attacker(tuple_R_in_2(X0,constr_f(constr_xor(name_t,constr_xor(X0,name_r1)),name_t)))
    | pred_attacker(tuple_R_out_4(name_objective)) ),
    inference(renaming,[status(thm)],[c_893]) ).

cnf(c_418804,plain,
    constr_xor(X0,constr_xor(X1,X2)) = constr_xor(X1,constr_xor(X0,X2)),
    inference(superposition,[status(thm)],[c_130,c_129]) ).

cnf(c_418895,plain,
    pred_attacker(name_r1_from_1st),
    inference(superposition,[status(thm)],[c_165,c_139]) ).

cnf(c_418958,plain,
    pred_attacker(name_r1),
    inference(superposition,[status(thm)],[c_168,c_152]) ).

cnf(c_418964,plain,
    pred_attacker(constr_xor(name_t,name_r2_from_1st)),
    inference(superposition,[status(thm)],[c_200,c_136]) ).

cnf(c_418983,plain,
    pred_attacker(constr_f(constr_xor(name_r2_from_1st,name_r1_from_1st),name_t)),
    inference(superposition,[status(thm)],[c_200,c_137]) ).

cnf(c_418997,plain,
    constr_xor(constr_ZERO,X0) = X0,
    inference(superposition,[status(thm)],[c_129,c_128]) ).

cnf(c_418999,plain,
    ( ~ pred_attacker(tuple_R_in_2(X0,constr_f(constr_xor(name_t,constr_xor(name_r1,X0)),name_t)))
    | pred_attacker(tuple_R_out_4(name_objective)) ),
    inference(superposition,[status(thm)],[c_129,c_894]) ).

cnf(c_419037,plain,
    ( ~ pred_attacker(X0)
    | ~ pred_attacker(X1)
    | pred_attacker(constr_xor(X1,X0)) ),
    inference(superposition,[status(thm)],[c_129,c_131]) ).

cnf(c_419090,plain,
    constr_xor(X0,constr_xor(X0,X1)) = constr_xor(constr_ZERO,X1),
    inference(superposition,[status(thm)],[c_127,c_130]) ).

cnf(c_419131,plain,
    ( ~ pred_attacker(constr_xor(X0,X1))
    | ~ pred_attacker(X2)
    | pred_attacker(constr_xor(X0,constr_xor(X1,X2))) ),
    inference(superposition,[status(thm)],[c_130,c_419037]) ).

cnf(c_419136,plain,
    constr_xor(X0,constr_xor(X0,X1)) = X1,
    inference(demodulation,[status(thm)],[c_419090,c_418997]) ).

cnf(c_419259,plain,
    ( ~ pred_attacker(constr_xor(X0,X1))
    | ~ pred_attacker(X2)
    | pred_attacker(constr_xor(X0,constr_xor(X2,X1))) ),
    inference(superposition,[status(thm)],[c_418804,c_419037]) ).

cnf(c_419319,plain,
    ( ~ pred_attacker(tuple_R_in_2(constr_xor(name_r1,X0),constr_f(constr_xor(name_t,X0),name_t)))
    | pred_attacker(tuple_R_out_4(name_objective)) ),
    inference(superposition,[status(thm)],[c_419136,c_418999]) ).

cnf(c_419374,plain,
    ( ~ pred_attacker(constr_xor(X0,X1))
    | ~ pred_attacker(X2)
    | pred_attacker(constr_xor(constr_xor(X1,X2),X0)) ),
    inference(superposition,[status(thm)],[c_129,c_419131]) ).

cnf(c_419389,plain,
    ( ~ pred_attacker(constr_xor(X0,X1))
    | ~ pred_attacker(constr_xor(X2,X0))
    | pred_attacker(constr_xor(X2,X1)) ),
    inference(superposition,[status(thm)],[c_419136,c_419131]) ).

cnf(c_419401,plain,
    ( ~ pred_attacker(constr_xor(X0,X1))
    | ~ pred_attacker(X2)
    | pred_attacker(constr_xor(X1,constr_xor(X2,X0))) ),
    inference(theory_normalisation,[status(thm)],[c_419374,c_130,c_129]) ).

cnf(c_419647,plain,
    ( ~ pred_attacker(constr_xor(X0,X1))
    | ~ pred_attacker(constr_ZERO)
    | pred_attacker(constr_xor(X1,X0)) ),
    inference(superposition,[status(thm)],[c_418997,c_419401]) ).

cnf(c_419655,plain,
    ( ~ pred_attacker(constr_xor(X0,X1))
    | pred_attacker(constr_xor(X1,X0)) ),
    inference(forward_subsumption_resolution,[status(thm)],[c_419647,c_146]) ).

cnf(c_419759,plain,
    ( ~ pred_attacker(constr_xor(X0,constr_xor(X1,X2)))
    | pred_attacker(constr_xor(X2,constr_xor(X0,X1))) ),
    inference(superposition,[status(thm)],[c_130,c_419655]) ).

cnf(c_419787,plain,
    ( ~ pred_attacker(constr_xor(constr_xor(X0,X1),X2))
    | pred_attacker(constr_xor(X1,constr_xor(X2,X0))) ),
    inference(superposition,[status(thm)],[c_129,c_419759]) ).

cnf(c_419819,plain,
    ( ~ pred_attacker(constr_xor(X0,constr_xor(X1,X2)))
    | pred_attacker(constr_xor(X1,constr_xor(X2,X0))) ),
    inference(theory_normalisation,[status(thm)],[c_419787,c_130,c_129]) ).

cnf(c_420620,plain,
    ( ~ pred_attacker(tuple_R_in_2(constr_xor(name_r1,constr_xor(name_t,X0)),constr_f(X0,name_t)))
    | pred_attacker(tuple_R_out_4(name_objective)) ),
    inference(superposition,[status(thm)],[c_419136,c_419319]) ).

cnf(c_420625,plain,
    ( ~ pred_attacker(tuple_R_in_2(constr_xor(name_t,constr_xor(X0,name_r1)),constr_f(X0,name_t)))
    | pred_attacker(tuple_R_out_4(name_objective)) ),
    inference(theory_normalisation,[status(thm)],[c_420620,c_130,c_129]) ).

cnf(c_420771,plain,
    ( ~ pred_attacker(constr_xor(X0,name_t))
    | pred_attacker(constr_xor(X0,name_r2_from_1st)) ),
    inference(superposition,[status(thm)],[c_418964,c_419389]) ).

cnf(c_420867,plain,
    ( ~ pred_attacker(constr_xor(X0,constr_xor(X1,name_t)))
    | pred_attacker(constr_xor(constr_xor(X0,X1),name_r2_from_1st)) ),
    inference(superposition,[status(thm)],[c_130,c_420771]) ).

cnf(c_420871,plain,
    ( ~ pred_attacker(constr_xor(X0,constr_xor(X1,name_t)))
    | pred_attacker(constr_xor(X0,constr_xor(X1,name_r2_from_1st))) ),
    inference(theory_normalisation,[status(thm)],[c_420867,c_130,c_129]) ).

cnf(c_421095,plain,
    ( ~ pred_attacker(constr_xor(X0,constr_ZERO))
    | pred_attacker(constr_xor(X0,constr_xor(name_t,name_r2_from_1st))) ),
    inference(superposition,[status(thm)],[c_127,c_420871]) ).

cnf(c_421102,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(constr_xor(X0,constr_xor(name_t,name_r2_from_1st))) ),
    inference(light_normalisation,[status(thm)],[c_421095,c_128]) ).

cnf(c_421163,plain,
    ( ~ pred_attacker(X0)
    | pred_attacker(constr_xor(name_t,constr_xor(name_r2_from_1st,X0))) ),
    inference(superposition,[status(thm)],[c_421102,c_419819]) ).

cnf(c_512731,plain,
    ( ~ pred_attacker(tuple_R_in_2(constr_xor(name_t,constr_xor(name_r1,X0)),constr_f(X0,name_t)))
    | pred_attacker(tuple_R_out_4(name_objective)) ),
    inference(superposition,[status(thm)],[c_129,c_420625]) ).

cnf(c_513919,plain,
    ( ~ pred_attacker(constr_xor(name_t,constr_xor(name_r1,X0)))
    | ~ pred_attacker(constr_f(X0,name_t))
    | pred_attacker(tuple_R_out_4(name_objective)) ),
    inference(superposition,[status(thm)],[c_153,c_512731]) ).

cnf(c_514240,plain,
    ( ~ pred_attacker(constr_xor(name_t,X0))
    | ~ pred_attacker(constr_f(X0,name_t))
    | ~ pred_attacker(name_r1)
    | pred_attacker(tuple_R_out_4(name_objective)) ),
    inference(superposition,[status(thm)],[c_419259,c_513919]) ).

cnf(c_514382,plain,
    ( ~ pred_attacker(constr_xor(name_t,X0))
    | ~ pred_attacker(constr_f(X0,name_t))
    | pred_attacker(tuple_R_out_4(name_objective)) ),
    inference(forward_subsumption_resolution,[status(thm)],[c_514240,c_418958]) ).

cnf(c_514563,plain,
    ( ~ pred_attacker(constr_f(constr_xor(name_r2_from_1st,X0),name_t))
    | ~ pred_attacker(X0)
    | pred_attacker(tuple_R_out_4(name_objective)) ),
    inference(superposition,[status(thm)],[c_421163,c_514382]) ).

cnf(c_515176,plain,
    ( ~ pred_attacker(name_r1_from_1st)
    | pred_attacker(tuple_R_out_4(name_objective)) ),
    inference(superposition,[status(thm)],[c_418983,c_514563]) ).

cnf(c_515184,plain,
    pred_attacker(tuple_R_out_4(name_objective)),
    inference(forward_subsumption_resolution,[status(thm)],[c_515176,c_418895]) ).

cnf(c_515185,plain,
    pred_attacker(name_objective),
    inference(superposition,[status(thm)],[c_515184,c_148]) ).

cnf(c_515186,plain,
    $false,
    inference(forward_subsumption_resolution,[status(thm)],[c_515185,c_171]) ).


%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.00/0.13  % Problem  : SWW949+1 : TPTP v8.1.2. Released v7.4.0.
% 0.00/0.14  % Command  : run_iprover %s %d THM
% 0.15/0.35  % Computer : n015.cluster.edu
% 0.15/0.35  % Model    : x86_64 x86_64
% 0.15/0.35  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.15/0.35  % Memory   : 8042.1875MB
% 0.15/0.35  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.15/0.35  % CPULimit : 300
% 0.15/0.35  % WCLimit  : 300
% 0.15/0.35  % DateTime : Sun Aug 27 20:40:40 EDT 2023
% 0.15/0.35  % CPUTime  : 
% 0.22/0.47  Running first-order theorem proving
% 0.22/0.47  Running: /export/starexec/sandbox2/solver/bin/run_problem --schedule fof_schedule --no_cores 8 /export/starexec/sandbox2/benchmark/theBenchmark.p 300
% 93.52/13.72  % SZS status Started for theBenchmark.p
% 93.52/13.72  % SZS status Theorem for theBenchmark.p
% 93.52/13.72  
% 93.52/13.72  %---------------- iProver v3.8 (pre SMT-COMP 2023/CASC 2023) ----------------%
% 93.52/13.72  
% 93.52/13.72  ------  iProver source info
% 93.52/13.72  
% 93.52/13.72  git: date: 2023-05-31 18:12:56 +0000
% 93.52/13.72  git: sha1: 8abddc1f627fd3ce0bcb8b4cbf113b3cc443d7b6
% 93.52/13.72  git: non_committed_changes: false
% 93.52/13.72  git: last_make_outside_of_git: false
% 93.52/13.72  
% 93.52/13.72  ------ Parsing...
% 93.52/13.72  ------ Clausification by vclausify_rel  & Parsing by iProver...
% 93.52/13.72  
% 93.52/13.72  ------ Preprocessing... sup_sim: 0  sf_s  rm: 1 0s  sf_e  pe_s  pe:1:0s pe_e  sup_sim: 0  sf_s  rm: 1 0s  sf_e  pe_s  pe_e 
% 93.52/13.72  
% 93.52/13.72  ------ Preprocessing... gs_s  sp: 0 0s  gs_e  snvd_s sp: 0 0s snvd_e 
% 93.52/13.72  
% 93.52/13.72  ------ Preprocessing... sf_s  rm: 1 0s  sf_e  sf_s  rm: 0 0s  sf_e 
% 93.52/13.72  ------ Proving...
% 93.52/13.72  ------ Problem Properties 
% 93.52/13.72  
% 93.52/13.72  
% 93.52/13.72  clauses                                 121
% 93.52/13.72  conjectures                             1
% 93.52/13.72  EPR                                     88
% 93.52/13.72  Horn                                    121
% 93.52/13.72  unary                                   97
% 93.52/13.72  binary                                  20
% 93.52/13.72  lits                                    149
% 93.52/13.72  lits eq                                 82
% 93.52/13.72  fd_pure                                 0
% 93.52/13.72  fd_pseudo                               0
% 93.52/13.72  fd_cond                                 0
% 93.52/13.72  fd_pseudo_cond                          0
% 93.52/13.72  AC symbols                              1
% 93.52/13.72  
% 93.52/13.72  ------ Schedule dynamic 5 is on 
% 93.52/13.72  
% 93.52/13.72  ------ Input Options "--resolution_flag false --inst_lit_sel_side none" Time Limit: 10.
% 93.52/13.72  
% 93.52/13.72  
% 93.52/13.72  ------ 
% 93.52/13.72  Current options:
% 93.52/13.72  ------ 
% 93.52/13.72  
% 93.52/13.72  
% 93.52/13.72  
% 93.52/13.72  
% 93.52/13.72  ------ Proving...
% 93.52/13.72  Proof_search_loop: time out after: 3178 full_loop iterations
% 93.52/13.72  
% 93.52/13.72  ------ Input Options"--res_lit_sel adaptive --res_lit_sel_side num_symb" Time Limit: 15.
% 93.52/13.72  
% 93.52/13.72  
% 93.52/13.72  ------ 
% 93.52/13.72  Current options:
% 93.52/13.72  ------ 
% 93.52/13.72  
% 93.52/13.72  
% 93.52/13.72  
% 93.52/13.72  
% 93.52/13.72  ------ Proving...
% 93.52/13.72  
% 93.52/13.72  
% 93.52/13.72  % SZS status Theorem for theBenchmark.p
% 93.52/13.72  
% 93.52/13.72  % SZS output start CNFRefutation for theBenchmark.p
% See solution above
% 93.52/13.72  
% 93.52/13.72  
%------------------------------------------------------------------------------