TSTP Solution File: SWW959+1 by Otter---3.3
View Problem
- Process Solution
%------------------------------------------------------------------------------
% File : Otter---3.3
% Problem : SWW959+1 : TPTP v8.1.0. Released v7.4.0.
% Transfm : none
% Format : tptp:raw
% Command : otter-tptp-script %s
% Computer : n024.cluster.edu
% Model : x86_64 x86_64
% CPU : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory : 8042.1875MB
% OS : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit : 300s
% DateTime : Wed Jul 27 13:23:14 EDT 2022
% Result : Theorem 3.04s 3.28s
% Output : Refutation 3.04s
% Verified :
% SZS Type : Refutation
% Derivation depth : 4
% Number of leaves : 8
% Syntax : Number of clauses : 14 ( 9 unt; 0 nHn; 13 RR)
% Number of literals : 24 ( 0 equ; 11 neg)
% Maximal clause size : 7 ( 1 avg)
% Maximal term depth : 4 ( 1 avg)
% Number of predicates : 3 ( 2 usr; 1 prp; 0-2 aty)
% Number of functors : 15 ( 15 usr; 5 con; 0-2 aty)
% Number of variables : 10 ( 3 sgn)
% Comments :
%------------------------------------------------------------------------------
cnf(181,axiom,
( ~ pred_attacker(tuple_client_B_out_6(A))
| pred_attacker(A) ),
file('SWW959+1.p',unknown),
[] ).
cnf(187,axiom,
( ~ pred_attacker(A)
| pred_attacker(tuple_client_B_in_5(A)) ),
file('SWW959+1.p',unknown),
[] ).
cnf(189,axiom,
( ~ pred_attacker(A)
| pred_attacker(tuple_client_B_in_3(A)) ),
file('SWW959+1.p',unknown),
[] ).
cnf(191,axiom,
( ~ pred_attacker(A)
| pred_attacker(tuple_client_B_in_2(A)) ),
file('SWW959+1.p',unknown),
[] ).
cnf(215,axiom,
( ~ pred_e_q_bitstring_bitstring(name_Nb(A),constr_adec(B,name_skB))
| ~ pred_attacker(tuple_client_B_in_5(B))
| ~ pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(C,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(C))
| ~ pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(D,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_2(D))
| pred_attacker(tuple_client_B_out_6(name_objective)) ),
file('SWW959+1.p',unknown),
[] ).
cnf(218,axiom,
~ pred_attacker(name_objective),
file('SWW959+1.p',unknown),
[] ).
cnf(248,axiom,
pred_e_q_bitstring_bitstring(A,B),
file('SWW959+1.p',unknown),
[] ).
cnf(249,axiom,
pred_attacker(tuple_true),
file('SWW959+1.p',unknown),
[] ).
cnf(285,plain,
pred_attacker(tuple_client_B_in_2(tuple_true)),
inference(hyper,[status(thm)],[249,191]),
[iquote('hyper,249,191')] ).
cnf(286,plain,
pred_attacker(tuple_client_B_in_3(tuple_true)),
inference(hyper,[status(thm)],[249,189]),
[iquote('hyper,249,189')] ).
cnf(287,plain,
pred_attacker(tuple_client_B_in_5(tuple_true)),
inference(hyper,[status(thm)],[249,187]),
[iquote('hyper,249,187')] ).
cnf(1945,plain,
pred_attacker(tuple_client_B_out_6(name_objective)),
inference(hyper,[status(thm)],[287,215,248,248,286,248,285]),
[iquote('hyper,287,215,248,248,286,248,285')] ).
cnf(1949,plain,
pred_attacker(name_objective),
inference(hyper,[status(thm)],[1945,181]),
[iquote('hyper,1945,181')] ).
cnf(1950,plain,
$false,
inference(binary,[status(thm)],[1949,218]),
[iquote('binary,1949.1,218.1')] ).
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.11/0.11 % Problem : SWW959+1 : TPTP v8.1.0. Released v7.4.0.
% 0.11/0.12 % Command : otter-tptp-script %s
% 0.12/0.33 % Computer : n024.cluster.edu
% 0.12/0.33 % Model : x86_64 x86_64
% 0.12/0.33 % CPU : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.12/0.33 % Memory : 8042.1875MB
% 0.12/0.33 % OS : Linux 3.10.0-693.el7.x86_64
% 0.12/0.33 % CPULimit : 300
% 0.12/0.33 % WCLimit : 300
% 0.12/0.33 % DateTime : Wed Jul 27 03:01:40 EDT 2022
% 0.12/0.33 % CPUTime :
% 1.67/2.12 ----- Otter 3.3f, August 2004 -----
% 1.67/2.12 The process was started by sandbox2 on n024.cluster.edu,
% 1.67/2.12 Wed Jul 27 03:01:40 2022
% 1.67/2.12 The command was "./otter". The process ID is 10163.
% 1.67/2.12
% 1.67/2.12 set(prolog_style_variables).
% 1.67/2.12 set(auto).
% 1.67/2.12 dependent: set(auto1).
% 1.67/2.12 dependent: set(process_input).
% 1.67/2.12 dependent: clear(print_kept).
% 1.67/2.12 dependent: clear(print_new_demod).
% 1.67/2.12 dependent: clear(print_back_demod).
% 1.67/2.12 dependent: clear(print_back_sub).
% 1.67/2.12 dependent: set(control_memory).
% 1.67/2.12 dependent: assign(max_mem, 12000).
% 1.67/2.12 dependent: assign(pick_given_ratio, 4).
% 1.67/2.12 dependent: assign(stats_level, 1).
% 1.67/2.12 dependent: assign(max_seconds, 10800).
% 1.67/2.12 clear(print_given).
% 1.67/2.12
% 1.67/2.12 formula_list(usable).
% 1.67/2.12 all A (A=A).
% 1.67/2.12 constr_CONST_0x30!=constr_CONST_1.
% 1.67/2.12 constr_CONST_0x30!=constr_CONST_2.
% 1.67/2.12 constr_CONST_0x30!=constr_CONST_3.
% 1.67/2.12 constr_CONST_0x30!=constr_CONST_4.
% 1.67/2.12 constr_CONST_0x30!=name_A.
% 1.67/2.12 constr_CONST_0x30!=name_B.
% 1.67/2.12 constr_CONST_0x30!=name_I.
% 1.67/2.12 constr_CONST_0x30!=name_c.
% 1.67/2.12 constr_CONST_0x30!=name_objective.
% 1.67/2.12 constr_CONST_0x30!=name_skA.
% 1.67/2.12 constr_CONST_0x30!=name_skB.
% 1.67/2.12 constr_CONST_0x30!=name_skS.
% 1.67/2.12 constr_CONST_1!=constr_CONST_2.
% 1.67/2.12 constr_CONST_1!=constr_CONST_3.
% 1.67/2.12 constr_CONST_1!=constr_CONST_4.
% 1.67/2.12 constr_CONST_1!=name_A.
% 1.67/2.12 constr_CONST_1!=name_B.
% 1.67/2.12 constr_CONST_1!=name_I.
% 1.67/2.12 constr_CONST_1!=name_c.
% 1.67/2.12 constr_CONST_1!=name_objective.
% 1.67/2.12 constr_CONST_1!=name_skA.
% 1.67/2.12 constr_CONST_1!=name_skB.
% 1.67/2.12 constr_CONST_1!=name_skS.
% 1.67/2.12 constr_CONST_2!=constr_CONST_3.
% 1.67/2.12 constr_CONST_2!=constr_CONST_4.
% 1.67/2.12 constr_CONST_2!=name_A.
% 1.67/2.12 constr_CONST_2!=name_B.
% 1.67/2.12 constr_CONST_2!=name_I.
% 1.67/2.12 constr_CONST_2!=name_c.
% 1.67/2.12 constr_CONST_2!=name_objective.
% 1.67/2.12 constr_CONST_2!=name_skA.
% 1.67/2.12 constr_CONST_2!=name_skB.
% 1.67/2.12 constr_CONST_2!=name_skS.
% 1.67/2.12 constr_CONST_3!=constr_CONST_4.
% 1.67/2.12 constr_CONST_3!=name_A.
% 1.67/2.12 constr_CONST_3!=name_B.
% 1.67/2.12 constr_CONST_3!=name_I.
% 1.67/2.12 constr_CONST_3!=name_c.
% 1.67/2.12 constr_CONST_3!=name_objective.
% 1.67/2.12 constr_CONST_3!=name_skA.
% 1.67/2.12 constr_CONST_3!=name_skB.
% 1.67/2.12 constr_CONST_3!=name_skS.
% 1.67/2.12 constr_CONST_4!=name_A.
% 1.67/2.12 constr_CONST_4!=name_B.
% 1.67/2.12 constr_CONST_4!=name_I.
% 1.67/2.12 constr_CONST_4!=name_c.
% 1.67/2.12 constr_CONST_4!=name_objective.
% 1.67/2.12 constr_CONST_4!=name_skA.
% 1.67/2.12 constr_CONST_4!=name_skB.
% 1.67/2.12 constr_CONST_4!=name_skS.
% 1.67/2.12 name_A!=name_B.
% 1.67/2.12 name_A!=name_I.
% 1.67/2.12 name_A!=name_c.
% 1.67/2.12 name_A!=name_objective.
% 1.67/2.12 name_A!=name_skA.
% 1.67/2.12 name_A!=name_skB.
% 1.67/2.12 name_A!=name_skS.
% 1.67/2.12 name_B!=name_I.
% 1.67/2.12 name_B!=name_c.
% 1.67/2.12 name_B!=name_objective.
% 1.67/2.12 name_B!=name_skA.
% 1.67/2.12 name_B!=name_skB.
% 1.67/2.12 name_B!=name_skS.
% 1.67/2.12 name_I!=name_c.
% 1.67/2.12 name_I!=name_objective.
% 1.67/2.12 name_I!=name_skA.
% 1.67/2.12 name_I!=name_skB.
% 1.67/2.12 name_I!=name_skS.
% 1.67/2.12 name_c!=name_objective.
% 1.67/2.12 name_c!=name_skA.
% 1.67/2.12 name_c!=name_skB.
% 1.67/2.12 name_c!=name_skS.
% 1.67/2.12 name_objective!=name_skA.
% 1.67/2.12 name_objective!=name_skB.
% 1.67/2.12 name_objective!=name_skS.
% 1.67/2.12 name_skA!=name_skB.
% 1.67/2.12 name_skA!=name_skS.
% 1.67/2.12 name_skB!=name_skS.
% 1.67/2.12 all VAR_K_18 VAR_M_17 (constr_adec(constr_aenc(VAR_M_17,constr_pkey(VAR_K_18)),VAR_K_18)=VAR_M_17).
% 1.67/2.12 all VAR_K_16 VAR_M_15 (constr_dec(constr_enc(VAR_M_15,VAR_K_16),VAR_K_16)=VAR_M_15).
% 1.67/2.12 all VAR_K_14 VAR_M_13 (constr_getmess(constr_sign(VAR_M_13,VAR_K_14))=VAR_M_13).
% 1.67/2.12 all VAR_K_0X30 VAR_M_0X30 (constr_checksign(constr_sign(VAR_M_0X30,VAR_K_0X30),constr_pkey(VAR_K_0X30))=VAR_M_0X30).
% 1.67/2.12 all VAR_X0X30_11 VAR_X1_12 (constr_tuple_2_get_1_bitstring(tuple_2(VAR_X0X30_11,VAR_X1_12))=VAR_X1_12).
% 1.67/2.12 all VAR_X0X30_9 VAR_X1_10X30 (constr_tuple_2_get_0x30_bitstring(tuple_2(VAR_X0X30_9,VAR_X1_10X30))=VAR_X0X30_9).
% 1.67/2.12 all VAR_X0X30_7 VAR_X1_8 (constr_tuple_2_get_1(tuple_2(VAR_X0X30_7,VAR_X1_8))=VAR_X1_8).
% 1.67/2.12 all VAR_X0X30_0X30 VAR_X1_0X30 (constr_tuple_2_get_0x30(tuple_2(VAR_X0X30_0X30,VAR_X1_0X30))=VAR_X0X30_0X30).
% 1.67/2.12 all VAR_X_35 VAR_Y_36 pred_e_q_bitstring_bitstring(VAR_X_35,VAR_Y_36).
% 1.67/2.12 all VAR_V_42 (pred_attacker(VAR_V_42)->pred_attacker(constr_tuple_2_get_1_bitstring(VAR_V_42))).
% 1.67/2.12 all VAR_V_44 (pred_attacker(VAR_V_44)->pred_attacker(constr_tuple_2_get_1(VAR_V_44))).
% 1.67/2.12 all VAR_V_46 (pred_attacker(VAR_V_46)->pred_attacker(constr_tuple_2_get_0x30_bitstring(VAR_V_46))).
% 1.67/2.12 all VAR_V_48 (pred_attacker(VAR_V_48)->pred_attacker(constr_tuple_2_get_0x30(VAR_V_48))).
% 1.67/2.12 pred_attacker(tuple_true).
% 1.67/2.12 all VAR_V_51 VAR_V_52 (pred_attacker(VAR_V_51)&pred_attacker(VAR_V_52)->pred_attacker(constr_sign(VAR_V_51,VAR_V_52))).
% 1.67/2.12 all VAR_V_54 (pred_attacker(VAR_V_54)->pred_attacker(constr_pkey(VAR_V_54))).
% 1.67/2.12 all VAR_V_56 (pred_attacker(VAR_V_56)->pred_attacker(tuple_out_3(VAR_V_56))).
% 1.67/2.12 all VAR_V_59 (pred_attacker(tuple_out_3(VAR_V_59))->pred_attacker(VAR_V_59)).
% 1.67/2.12 all VAR_V_62 (pred_attacker(VAR_V_62)->pred_attacker(tuple_out_2(VAR_V_62))).
% 1.67/2.12 all VAR_V_65 (pred_attacker(tuple_out_2(VAR_V_65))->pred_attacker(VAR_V_65)).
% 1.67/2.12 all VAR_V_68 (pred_attacker(VAR_V_68)->pred_attacker(tuple_out_1(VAR_V_68))).
% 1.67/2.12 all VAR_V_71 (pred_attacker(tuple_out_1(VAR_V_71))->pred_attacker(VAR_V_71)).
% 1.67/2.12 all VAR_V_75 (pred_attacker(VAR_V_75)->pred_attacker(tuple_key_retrieval_server_out_2(VAR_V_75))).
% 1.67/2.12 all VAR_V_78 (pred_attacker(tuple_key_retrieval_server_out_2(VAR_V_78))->pred_attacker(VAR_V_78)).
% 1.67/2.12 all VAR_V_82 VAR_V_83 (pred_attacker(VAR_V_82)&pred_attacker(VAR_V_83)->pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_82,VAR_V_83))).
% 1.67/2.12 all VAR_V_90X30 VAR_V_91 (pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_90X30,VAR_V_91))->pred_attacker(VAR_V_90X30)).
% 1.67/2.12 all VAR_V_93 VAR_V_94 (pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_93,VAR_V_94))->pred_attacker(VAR_V_94)).
% 1.67/2.12 all VAR_V_98 VAR_V_99 (pred_attacker(VAR_V_98)&pred_attacker(VAR_V_99)->pred_attacker(tuple_key_register_server_in_1(VAR_V_98,VAR_V_99))).
% 1.67/2.12 all VAR_V_10X306 VAR_V_10X307 (pred_attacker(tuple_key_register_server_in_1(VAR_V_10X306,VAR_V_10X307))->pred_attacker(VAR_V_10X306)).
% 1.67/2.12 all VAR_V_10X309 VAR_V_110X30 (pred_attacker(tuple_key_register_server_in_1(VAR_V_10X309,VAR_V_110X30))->pred_attacker(VAR_V_110X30)).
% 1.67/2.12 all VAR_V_113 (pred_attacker(VAR_V_113)->pred_attacker(constr_getmess(VAR_V_113))).
% 1.67/2.12 pred_attacker(tuple_false).
% 1.67/2.12 all VAR_V_116 VAR_V_117 (pred_attacker(VAR_V_116)&pred_attacker(VAR_V_117)->pred_attacker(constr_enc(VAR_V_116,VAR_V_117))).
% 1.67/2.12 all VAR_V_120X30 VAR_V_121 (pred_attacker(VAR_V_120X30)&pred_attacker(VAR_V_121)->pred_attacker(constr_dec(VAR_V_120X30,VAR_V_121))).
% 1.67/2.12 all VAR_V_123 (pred_attacker(VAR_V_123)->pred_attacker(tuple_client_B_out_6(VAR_V_123))).
% 1.67/2.12 all VAR_V_126 (pred_attacker(tuple_client_B_out_6(VAR_V_126))->pred_attacker(VAR_V_126)).
% 1.67/2.12 all VAR_V_129 (pred_attacker(VAR_V_129)->pred_attacker(tuple_client_B_out_4(VAR_V_129))).
% 1.67/2.12 all VAR_V_132 (pred_attacker(tuple_client_B_out_4(VAR_V_132))->pred_attacker(VAR_V_132)).
% 1.67/2.12 all VAR_V_136 VAR_V_137 (pred_attacker(VAR_V_136)&pred_attacker(VAR_V_137)->pred_attacker(tuple_client_B_out_1(VAR_V_136,VAR_V_137))).
% 1.67/2.12 all VAR_V_144 VAR_V_145 (pred_attacker(tuple_client_B_out_1(VAR_V_144,VAR_V_145))->pred_attacker(VAR_V_144)).
% 1.67/2.12 all VAR_V_147 VAR_V_148 (pred_attacker(tuple_client_B_out_1(VAR_V_147,VAR_V_148))->pred_attacker(VAR_V_148)).
% 1.67/2.12 all VAR_V_151 (pred_attacker(VAR_V_151)->pred_attacker(tuple_client_B_in_5(VAR_V_151))).
% 1.67/2.12 all VAR_V_154 (pred_attacker(tuple_client_B_in_5(VAR_V_154))->pred_attacker(VAR_V_154)).
% 1.67/2.12 all VAR_V_157 (pred_attacker(VAR_V_157)->pred_attacker(tuple_client_B_in_3(VAR_V_157))).
% 1.67/2.12 all VAR_V_160X30 (pred_attacker(tuple_client_B_in_3(VAR_V_160X30))->pred_attacker(VAR_V_160X30)).
% 1.67/2.12 all VAR_V_163 (pred_attacker(VAR_V_163)->pred_attacker(tuple_client_B_in_2(VAR_V_163))).
% 1.67/2.12 all VAR_V_166 (pred_attacker(tuple_client_B_in_2(VAR_V_166))->pred_attacker(VAR_V_166)).
% 1.67/2.12 all VAR_V_169 (pred_attacker(VAR_V_169)->pred_attacker(tuple_client_A_out_5(VAR_V_169))).
% 1.67/2.12 all VAR_V_172 (pred_attacker(tuple_client_A_out_5(VAR_V_172))->pred_attacker(VAR_V_172)).
% 1.67/2.12 all VAR_V_175 (pred_attacker(VAR_V_175)->pred_attacker(tuple_client_A_out_3(VAR_V_175))).
% 1.67/2.12 all VAR_V_178 (pred_attacker(tuple_client_A_out_3(VAR_V_178))->pred_attacker(VAR_V_178)).
% 1.67/2.12 all VAR_V_182 VAR_V_183 (pred_attacker(VAR_V_182)&pred_attacker(VAR_V_183)->pred_attacker(tuple_client_A_out_1(VAR_V_182,VAR_V_183))).
% 1.67/2.12 all VAR_V_190X30 VAR_V_191 (pred_attacker(tuple_client_A_out_1(VAR_V_190X30,VAR_V_191))->pred_attacker(VAR_V_190X30)).
% 1.67/2.12 all VAR_V_193 VAR_V_194 (pred_attacker(tuple_client_A_out_1(VAR_V_193,VAR_V_194))->pred_attacker(VAR_V_194)).
% 1.67/2.12 all VAR_V_197 (pred_attacker(VAR_V_197)->pred_attacker(tuple_client_A_in_4(VAR_V_197))).
% 1.67/2.12 all VAR_V_20X300X30 (pred_attacker(tuple_client_A_in_4(VAR_V_20X300X30))->pred_attacker(VAR_V_20X300X30)).
% 1.67/2.12 all VAR_V_20X303 (pred_attacker(VAR_V_20X303)->pred_attacker(tuple_client_A_in_2(VAR_V_20X303))).
% 1.67/2.12 all VAR_V_20X306 (pred_attacker(tuple_client_A_in_2(VAR_V_20X306))->pred_attacker(VAR_V_20X306)).
% 1.67/2.12 all VAR_V_210X30 VAR_V_211 (pred_attacker(VAR_V_210X30)&pred_attacker(VAR_V_211)->pred_attacker(constr_checksign(VAR_V_210X30,VAR_V_211))).
% 1.67/2.12 all VAR_V_214 VAR_V_215 (pred_attacker(VAR_V_214)&pred_attacker(VAR_V_215)->pred_attacker(constr_aenc(VAR_V_214,VAR_V_215))).
% 1.67/2.12 all VAR_V_218 VAR_V_219 (pred_attacker(VAR_V_218)&pred_attacker(VAR_V_219)->pred_attacker(constr_adec(VAR_V_218,VAR_V_219))).
% 1.67/2.12 pred_attacker(constr_CONST_4).
% 1.67/2.12 pred_attacker(constr_CONST_3).
% 1.67/2.12 pred_attacker(constr_CONST_2).
% 1.67/2.12 pred_attacker(constr_CONST_1).
% 1.67/2.12 pred_attacker(constr_CONST_0x30).
% 1.67/2.12 all VAR_V_226 VAR_V_227 (pred_attacker(VAR_V_226)&pred_attacker(VAR_V_227)->pred_attacker(tuple_2(VAR_V_226,VAR_V_227))).
% 1.67/2.12 all VAR_V_234 VAR_V_235 (pred_attacker(tuple_2(VAR_V_234,VAR_V_235))->pred_attacker(VAR_V_234)).
% 1.67/2.12 all VAR_V_237 VAR_V_238 (pred_attacker(tuple_2(VAR_V_237,VAR_V_238))->pred_attacker(VAR_V_238)).
% 1.67/2.12 all VAR_V_240X30 VAR_V_241 (pred_mess(VAR_V_241,VAR_V_240X30)&pred_attacker(VAR_V_241)->pred_attacker(VAR_V_240X30)).
% 1.67/2.12 all VAR_V_242 VAR_V_243 (pred_attacker(VAR_V_243)&pred_attacker(VAR_V_242)->pred_mess(VAR_V_243,VAR_V_242)).
% 1.67/2.12 pred_attacker(name_c).
% 1.67/2.12 pred_attacker(name_I).
% 1.67/2.12 pred_attacker(name_B).
% 1.67/2.12 pred_attacker(name_A).
% 1.67/2.12 all VAR_V_245 pred_e_qual(VAR_V_245,VAR_V_245).
% 1.67/2.12 all VAR_V_246 pred_attacker(name_new0x2Dname(VAR_V_246)).
% 1.67/2.12 pred_table(tuple_keys(name_A,constr_pkey(name_skA))).
% 1.67/2.12 pred_table(tuple_keys(name_B,constr_pkey(name_skB))).
% 1.67/2.12 pred_attacker(tuple_out_1(constr_pkey(name_skA))).
% 1.67/2.12 pred_attacker(tuple_out_2(constr_pkey(name_skB))).
% 1.67/2.12 pred_attacker(tuple_out_3(constr_pkey(name_skS))).
% 1.67/2.12 pred_attacker(tuple_client_A_out_1(name_A,name_I)).
% 1.67/2.12 all VAR_0X40SID_366 VAR_SIGN_I_PKI_365 (pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_I_PKI_365,constr_pkey(name_skS))))&pred_attacker(tuple_client_A_in_2(VAR_SIGN_I_PKI_365))->pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(VAR_0X40SID_366),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_I_PKI_365,constr_pkey(name_skS))))))).
% 1.67/2.12 all VAR_0X40SID_414 VAR_AENC_NA_NI_415 VAR_SIGN_I_PKI_416 (pred_e_q_bitstring_bitstring(name_Na(VAR_0X40SID_414),constr_tuple_2_get_0x30(constr_adec(VAR_AENC_NA_NI_415,name_skA)))&pred_attacker(tuple_client_A_in_4(VAR_AENC_NA_NI_415))&pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_I_PKI_416,constr_pkey(name_skS))))&pred_attacker(tuple_client_A_in_2(VAR_SIGN_I_PKI_416))->pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(VAR_AENC_NA_NI_415,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_I_PKI_416,constr_pkey(name_skS))))))).
% 1.67/2.12 pred_attacker(tuple_client_B_out_1(name_B,name_A)).
% 1.67/2.12 all VAR_0X40SID_523 VAR_AENC_NA_A_521 VAR_SIGN_A_PKA_522 (pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(VAR_AENC_NA_A_521,name_skB)))&pred_attacker(tuple_client_B_in_3(VAR_AENC_NA_A_521))&pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_A_PKA_522,constr_pkey(name_skS))))&pred_attacker(tuple_client_B_in_2(VAR_SIGN_A_PKA_522))->pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(VAR_AENC_NA_A_521,name_skB)),name_Nb(VAR_0X40SID_523)),constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_A_PKA_522,constr_pkey(name_skS))))))).
% 1.67/2.12 all VAR_0X40SID_545 VAR_AENC_NA_A_547 VAR_AENC_NB_546 VAR_SIGN_A_PKA_548 (pred_e_q_bitstring_bitstring(name_Nb(VAR_0X40SID_545),constr_adec(VAR_AENC_NB_546,name_skB))&pred_attacker(tuple_client_B_in_5(VAR_AENC_NB_546))&pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(VAR_AENC_NA_A_547,name_skB)))&pred_attacker(tuple_client_B_in_3(VAR_AENC_NA_A_547))&pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_A_PKA_548,constr_pkey(name_skS))))&pred_attacker(tuple_client_B_in_2(VAR_SIGN_A_PKA_548))->pred_attacker(tuple_client_B_out_6(name_objective))).
% 1.67/2.12 all VAR_DST_587 VAR_PKDST_588 VAR_SRC_589 (pred_table(tuple_keys(VAR_DST_587,VAR_PKDST_588))&pred_attacker(tuple_key_retrieval_server_in_1(VAR_SRC_589,VAR_DST_587))->pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(VAR_DST_587,VAR_PKDST_588),name_skS)))).
% 1.67/2.12 all VAR_HOST_641 VAR_PK_642 (VAR_HOST_641!=name_B&VAR_HOST_641!=name_A&pred_attacker(tuple_key_register_server_in_1(VAR_HOST_641,VAR_PK_642))->pred_table(tuple_keys(VAR_HOST_641,VAR_PK_642))).
% 1.67/2.12 -pred_attacker(name_objective).
% 1.67/2.12 end_of_list.
% 1.67/2.12
% 1.67/2.12 -------> usable clausifies to:
% 1.67/2.12
% 1.67/2.12 list(usable).
% 1.67/2.12 0 [] A=A.
% 1.67/2.12 0 [] constr_CONST_0x30!=constr_CONST_1.
% 1.67/2.12 0 [] constr_CONST_0x30!=constr_CONST_2.
% 1.67/2.12 0 [] constr_CONST_0x30!=constr_CONST_3.
% 1.67/2.12 0 [] constr_CONST_0x30!=constr_CONST_4.
% 1.67/2.12 0 [] constr_CONST_0x30!=name_A.
% 1.67/2.12 0 [] constr_CONST_0x30!=name_B.
% 1.67/2.12 0 [] constr_CONST_0x30!=name_I.
% 1.67/2.12 0 [] constr_CONST_0x30!=name_c.
% 1.67/2.12 0 [] constr_CONST_0x30!=name_objective.
% 1.67/2.12 0 [] constr_CONST_0x30!=name_skA.
% 1.67/2.12 0 [] constr_CONST_0x30!=name_skB.
% 1.67/2.12 0 [] constr_CONST_0x30!=name_skS.
% 1.67/2.12 0 [] constr_CONST_1!=constr_CONST_2.
% 1.67/2.12 0 [] constr_CONST_1!=constr_CONST_3.
% 1.67/2.12 0 [] constr_CONST_1!=constr_CONST_4.
% 1.67/2.12 0 [] constr_CONST_1!=name_A.
% 1.67/2.12 0 [] constr_CONST_1!=name_B.
% 1.67/2.12 0 [] constr_CONST_1!=name_I.
% 1.67/2.12 0 [] constr_CONST_1!=name_c.
% 1.67/2.12 0 [] constr_CONST_1!=name_objective.
% 1.67/2.12 0 [] constr_CONST_1!=name_skA.
% 1.67/2.12 0 [] constr_CONST_1!=name_skB.
% 1.67/2.12 0 [] constr_CONST_1!=name_skS.
% 1.67/2.12 0 [] constr_CONST_2!=constr_CONST_3.
% 1.67/2.12 0 [] constr_CONST_2!=constr_CONST_4.
% 1.67/2.12 0 [] constr_CONST_2!=name_A.
% 1.67/2.12 0 [] constr_CONST_2!=name_B.
% 1.67/2.12 0 [] constr_CONST_2!=name_I.
% 1.67/2.12 0 [] constr_CONST_2!=name_c.
% 1.67/2.12 0 [] constr_CONST_2!=name_objective.
% 1.67/2.12 0 [] constr_CONST_2!=name_skA.
% 1.67/2.12 0 [] constr_CONST_2!=name_skB.
% 1.67/2.12 0 [] constr_CONST_2!=name_skS.
% 1.67/2.12 0 [] constr_CONST_3!=constr_CONST_4.
% 1.67/2.12 0 [] constr_CONST_3!=name_A.
% 1.67/2.12 0 [] constr_CONST_3!=name_B.
% 1.67/2.12 0 [] constr_CONST_3!=name_I.
% 1.67/2.12 0 [] constr_CONST_3!=name_c.
% 1.67/2.12 0 [] constr_CONST_3!=name_objective.
% 1.67/2.12 0 [] constr_CONST_3!=name_skA.
% 1.67/2.12 0 [] constr_CONST_3!=name_skB.
% 1.67/2.12 0 [] constr_CONST_3!=name_skS.
% 1.67/2.12 0 [] constr_CONST_4!=name_A.
% 1.67/2.12 0 [] constr_CONST_4!=name_B.
% 1.67/2.12 0 [] constr_CONST_4!=name_I.
% 1.67/2.12 0 [] constr_CONST_4!=name_c.
% 1.67/2.12 0 [] constr_CONST_4!=name_objective.
% 1.67/2.12 0 [] constr_CONST_4!=name_skA.
% 1.67/2.12 0 [] constr_CONST_4!=name_skB.
% 1.67/2.12 0 [] constr_CONST_4!=name_skS.
% 1.67/2.12 0 [] name_A!=name_B.
% 1.67/2.12 0 [] name_A!=name_I.
% 1.67/2.12 0 [] name_A!=name_c.
% 1.67/2.12 0 [] name_A!=name_objective.
% 1.67/2.12 0 [] name_A!=name_skA.
% 1.67/2.12 0 [] name_A!=name_skB.
% 1.67/2.12 0 [] name_A!=name_skS.
% 1.67/2.12 0 [] name_B!=name_I.
% 1.67/2.12 0 [] name_B!=name_c.
% 1.67/2.12 0 [] name_B!=name_objective.
% 1.67/2.12 0 [] name_B!=name_skA.
% 1.67/2.12 0 [] name_B!=name_skB.
% 1.67/2.12 0 [] name_B!=name_skS.
% 1.67/2.12 0 [] name_I!=name_c.
% 1.67/2.12 0 [] name_I!=name_objective.
% 1.67/2.12 0 [] name_I!=name_skA.
% 1.67/2.12 0 [] name_I!=name_skB.
% 1.67/2.12 0 [] name_I!=name_skS.
% 1.67/2.12 0 [] name_c!=name_objective.
% 1.67/2.12 0 [] name_c!=name_skA.
% 1.67/2.12 0 [] name_c!=name_skB.
% 1.67/2.12 0 [] name_c!=name_skS.
% 1.67/2.12 0 [] name_objective!=name_skA.
% 1.67/2.12 0 [] name_objective!=name_skB.
% 1.67/2.12 0 [] name_objective!=name_skS.
% 1.67/2.12 0 [] name_skA!=name_skB.
% 1.67/2.12 0 [] name_skA!=name_skS.
% 1.67/2.12 0 [] name_skB!=name_skS.
% 1.67/2.12 0 [] constr_adec(constr_aenc(VAR_M_17,constr_pkey(VAR_K_18)),VAR_K_18)=VAR_M_17.
% 1.67/2.12 0 [] constr_dec(constr_enc(VAR_M_15,VAR_K_16),VAR_K_16)=VAR_M_15.
% 1.67/2.12 0 [] constr_getmess(constr_sign(VAR_M_13,VAR_K_14))=VAR_M_13.
% 1.67/2.12 0 [] constr_checksign(constr_sign(VAR_M_0X30,VAR_K_0X30),constr_pkey(VAR_K_0X30))=VAR_M_0X30.
% 1.67/2.12 0 [] constr_tuple_2_get_1_bitstring(tuple_2(VAR_X0X30_11,VAR_X1_12))=VAR_X1_12.
% 1.67/2.12 0 [] constr_tuple_2_get_0x30_bitstring(tuple_2(VAR_X0X30_9,VAR_X1_10X30))=VAR_X0X30_9.
% 1.67/2.12 0 [] constr_tuple_2_get_1(tuple_2(VAR_X0X30_7,VAR_X1_8))=VAR_X1_8.
% 1.67/2.12 0 [] constr_tuple_2_get_0x30(tuple_2(VAR_X0X30_0X30,VAR_X1_0X30))=VAR_X0X30_0X30.
% 1.67/2.12 0 [] pred_e_q_bitstring_bitstring(VAR_X_35,VAR_Y_36).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_42)|pred_attacker(constr_tuple_2_get_1_bitstring(VAR_V_42)).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_44)|pred_attacker(constr_tuple_2_get_1(VAR_V_44)).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_46)|pred_attacker(constr_tuple_2_get_0x30_bitstring(VAR_V_46)).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_48)|pred_attacker(constr_tuple_2_get_0x30(VAR_V_48)).
% 1.67/2.12 0 [] pred_attacker(tuple_true).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_51)| -pred_attacker(VAR_V_52)|pred_attacker(constr_sign(VAR_V_51,VAR_V_52)).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_54)|pred_attacker(constr_pkey(VAR_V_54)).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_56)|pred_attacker(tuple_out_3(VAR_V_56)).
% 1.67/2.12 0 [] -pred_attacker(tuple_out_3(VAR_V_59))|pred_attacker(VAR_V_59).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_62)|pred_attacker(tuple_out_2(VAR_V_62)).
% 1.67/2.12 0 [] -pred_attacker(tuple_out_2(VAR_V_65))|pred_attacker(VAR_V_65).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_68)|pred_attacker(tuple_out_1(VAR_V_68)).
% 1.67/2.12 0 [] -pred_attacker(tuple_out_1(VAR_V_71))|pred_attacker(VAR_V_71).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_75)|pred_attacker(tuple_key_retrieval_server_out_2(VAR_V_75)).
% 1.67/2.12 0 [] -pred_attacker(tuple_key_retrieval_server_out_2(VAR_V_78))|pred_attacker(VAR_V_78).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_82)| -pred_attacker(VAR_V_83)|pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_82,VAR_V_83)).
% 1.67/2.12 0 [] -pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_90X30,VAR_V_91))|pred_attacker(VAR_V_90X30).
% 1.67/2.12 0 [] -pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_93,VAR_V_94))|pred_attacker(VAR_V_94).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_98)| -pred_attacker(VAR_V_99)|pred_attacker(tuple_key_register_server_in_1(VAR_V_98,VAR_V_99)).
% 1.67/2.12 0 [] -pred_attacker(tuple_key_register_server_in_1(VAR_V_10X306,VAR_V_10X307))|pred_attacker(VAR_V_10X306).
% 1.67/2.12 0 [] -pred_attacker(tuple_key_register_server_in_1(VAR_V_10X309,VAR_V_110X30))|pred_attacker(VAR_V_110X30).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_113)|pred_attacker(constr_getmess(VAR_V_113)).
% 1.67/2.12 0 [] pred_attacker(tuple_false).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_116)| -pred_attacker(VAR_V_117)|pred_attacker(constr_enc(VAR_V_116,VAR_V_117)).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_120X30)| -pred_attacker(VAR_V_121)|pred_attacker(constr_dec(VAR_V_120X30,VAR_V_121)).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_123)|pred_attacker(tuple_client_B_out_6(VAR_V_123)).
% 1.67/2.12 0 [] -pred_attacker(tuple_client_B_out_6(VAR_V_126))|pred_attacker(VAR_V_126).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_129)|pred_attacker(tuple_client_B_out_4(VAR_V_129)).
% 1.67/2.12 0 [] -pred_attacker(tuple_client_B_out_4(VAR_V_132))|pred_attacker(VAR_V_132).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_136)| -pred_attacker(VAR_V_137)|pred_attacker(tuple_client_B_out_1(VAR_V_136,VAR_V_137)).
% 1.67/2.12 0 [] -pred_attacker(tuple_client_B_out_1(VAR_V_144,VAR_V_145))|pred_attacker(VAR_V_144).
% 1.67/2.12 0 [] -pred_attacker(tuple_client_B_out_1(VAR_V_147,VAR_V_148))|pred_attacker(VAR_V_148).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_151)|pred_attacker(tuple_client_B_in_5(VAR_V_151)).
% 1.67/2.12 0 [] -pred_attacker(tuple_client_B_in_5(VAR_V_154))|pred_attacker(VAR_V_154).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_157)|pred_attacker(tuple_client_B_in_3(VAR_V_157)).
% 1.67/2.12 0 [] -pred_attacker(tuple_client_B_in_3(VAR_V_160X30))|pred_attacker(VAR_V_160X30).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_163)|pred_attacker(tuple_client_B_in_2(VAR_V_163)).
% 1.67/2.12 0 [] -pred_attacker(tuple_client_B_in_2(VAR_V_166))|pred_attacker(VAR_V_166).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_169)|pred_attacker(tuple_client_A_out_5(VAR_V_169)).
% 1.67/2.12 0 [] -pred_attacker(tuple_client_A_out_5(VAR_V_172))|pred_attacker(VAR_V_172).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_175)|pred_attacker(tuple_client_A_out_3(VAR_V_175)).
% 1.67/2.12 0 [] -pred_attacker(tuple_client_A_out_3(VAR_V_178))|pred_attacker(VAR_V_178).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_182)| -pred_attacker(VAR_V_183)|pred_attacker(tuple_client_A_out_1(VAR_V_182,VAR_V_183)).
% 1.67/2.12 0 [] -pred_attacker(tuple_client_A_out_1(VAR_V_190X30,VAR_V_191))|pred_attacker(VAR_V_190X30).
% 1.67/2.12 0 [] -pred_attacker(tuple_client_A_out_1(VAR_V_193,VAR_V_194))|pred_attacker(VAR_V_194).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_197)|pred_attacker(tuple_client_A_in_4(VAR_V_197)).
% 1.67/2.12 0 [] -pred_attacker(tuple_client_A_in_4(VAR_V_20X300X30))|pred_attacker(VAR_V_20X300X30).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_20X303)|pred_attacker(tuple_client_A_in_2(VAR_V_20X303)).
% 1.67/2.12 0 [] -pred_attacker(tuple_client_A_in_2(VAR_V_20X306))|pred_attacker(VAR_V_20X306).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_210X30)| -pred_attacker(VAR_V_211)|pred_attacker(constr_checksign(VAR_V_210X30,VAR_V_211)).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_214)| -pred_attacker(VAR_V_215)|pred_attacker(constr_aenc(VAR_V_214,VAR_V_215)).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_218)| -pred_attacker(VAR_V_219)|pred_attacker(constr_adec(VAR_V_218,VAR_V_219)).
% 1.67/2.12 0 [] pred_attacker(constr_CONST_4).
% 1.67/2.12 0 [] pred_attacker(constr_CONST_3).
% 1.67/2.12 0 [] pred_attacker(constr_CONST_2).
% 1.67/2.12 0 [] pred_attacker(constr_CONST_1).
% 1.67/2.12 0 [] pred_attacker(constr_CONST_0x30).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_226)| -pred_attacker(VAR_V_227)|pred_attacker(tuple_2(VAR_V_226,VAR_V_227)).
% 1.67/2.12 0 [] -pred_attacker(tuple_2(VAR_V_234,VAR_V_235))|pred_attacker(VAR_V_234).
% 1.67/2.12 0 [] -pred_attacker(tuple_2(VAR_V_237,VAR_V_238))|pred_attacker(VAR_V_238).
% 1.67/2.12 0 [] -pred_mess(VAR_V_241,VAR_V_240X30)| -pred_attacker(VAR_V_241)|pred_attacker(VAR_V_240X30).
% 1.67/2.12 0 [] -pred_attacker(VAR_V_243)| -pred_attacker(VAR_V_242)|pred_mess(VAR_V_243,VAR_V_242).
% 1.67/2.12 0 [] pred_attacker(name_c).
% 1.67/2.12 0 [] pred_attacker(name_I).
% 1.67/2.12 0 [] pred_attacker(name_B).
% 1.67/2.12 0 [] pred_attacker(name_A).
% 1.67/2.12 0 [] pred_e_qual(VAR_V_245,VAR_V_245).
% 1.67/2.12 0 [] pred_attacker(name_new0x2Dname(VAR_V_246)).
% 1.67/2.12 0 [] pred_table(tuple_keys(name_A,constr_pkey(name_skA))).
% 1.67/2.12 0 [] pred_table(tuple_keys(name_B,constr_pkey(name_skB))).
% 1.67/2.12 0 [] pred_attacker(tuple_out_1(constr_pkey(name_skA))).
% 1.67/2.12 0 [] pred_attacker(tuple_out_2(constr_pkey(name_skB))).
% 1.67/2.12 0 [] pred_attacker(tuple_out_3(constr_pkey(name_skS))).
% 1.67/2.12 0 [] pred_attacker(tuple_client_A_out_1(name_A,name_I)).
% 1.67/2.12 0 [] -pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_I_PKI_365,constr_pkey(name_skS))))| -pred_attacker(tuple_client_A_in_2(VAR_SIGN_I_PKI_365))|pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(VAR_0X40SID_366),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_I_PKI_365,constr_pkey(name_skS)))))).
% 1.67/2.12 0 [] -pred_e_q_bitstring_bitstring(name_Na(VAR_0X40SID_414),constr_tuple_2_get_0x30(constr_adec(VAR_AENC_NA_NI_415,name_skA)))| -pred_attacker(tuple_client_A_in_4(VAR_AENC_NA_NI_415))| -pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_I_PKI_416,constr_pkey(name_skS))))| -pred_attacker(tuple_client_A_in_2(VAR_SIGN_I_PKI_416))|pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(VAR_AENC_NA_NI_415,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_I_PKI_416,constr_pkey(name_skS)))))).
% 1.67/2.12 0 [] pred_attacker(tuple_client_B_out_1(name_B,name_A)).
% 1.67/2.12 0 [] -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(VAR_AENC_NA_A_521,name_skB)))| -pred_attacker(tuple_client_B_in_3(VAR_AENC_NA_A_521))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_A_PKA_522,constr_pkey(name_skS))))| -pred_attacker(tuple_client_B_in_2(VAR_SIGN_A_PKA_522))|pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(VAR_AENC_NA_A_521,name_skB)),name_Nb(VAR_0X40SID_523)),constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_A_PKA_522,constr_pkey(name_skS)))))).
% 1.67/2.12 0 [] -pred_e_q_bitstring_bitstring(name_Nb(VAR_0X40SID_545),constr_adec(VAR_AENC_NB_546,name_skB))| -pred_attacker(tuple_client_B_in_5(VAR_AENC_NB_546))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(VAR_AENC_NA_A_547,name_skB)))| -pred_attacker(tuple_client_B_in_3(VAR_AENC_NA_A_547))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_A_PKA_548,constr_pkey(name_skS))))| -pred_attacker(tuple_client_B_in_2(VAR_SIGN_A_PKA_548))|pred_attacker(tuple_client_B_out_6(name_objective)).
% 1.67/2.12 0 [] -pred_table(tuple_keys(VAR_DST_587,VAR_PKDST_588))| -pred_attacker(tuple_key_retrieval_server_in_1(VAR_SRC_589,VAR_DST_587))|pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(VAR_DST_587,VAR_PKDST_588),name_skS))).
% 1.67/2.12 0 [] VAR_HOST_641=name_B|VAR_HOST_641=name_A| -pred_attacker(tuple_key_register_server_in_1(VAR_HOST_641,VAR_PK_642))|pred_table(tuple_keys(VAR_HOST_641,VAR_PK_642)).
% 1.67/2.12 0 [] -pred_attacker(name_objective).
% 1.67/2.12 end_of_list.
% 1.67/2.12
% 1.67/2.12 SCAN INPUT: prop=0, horn=0, equality=1, symmetry=0, max_lits=7.
% 1.67/2.12
% 1.67/2.12 This ia a non-Horn set with equality. The strategy will be
% 1.67/2.12 Knuth-Bendix, ordered hyper_res, factoring, and unit
% 1.67/2.12 deletion, with positive clauses in sos and nonpositive
% 1.67/2.12 clauses in usable.
% 1.67/2.12
% 1.67/2.12 dependent: set(knuth_bendix).
% 1.67/2.12 dependent: set(anl_eq).
% 1.67/2.12 dependent: set(para_from).
% 1.67/2.12 dependent: set(para_into).
% 1.67/2.12 dependent: clear(para_from_right).
% 1.67/2.12 dependent: clear(para_into_right).
% 1.67/2.12 dependent: set(para_from_vars).
% 1.67/2.12 dependent: set(eq_units_both_ways).
% 1.67/2.12 dependent: set(dynamic_demod_all).
% 1.67/2.12 dependent: set(dynamic_demod).
% 1.67/2.12 dependent: set(order_eq).
% 1.67/2.12 dependent: set(back_demod).
% 1.67/2.12 dependent: set(lrpo).
% 1.67/2.12 dependent: set(hyper_res).
% 1.67/2.12 dependent: set(unit_deletion).
% 1.67/2.12 dependent: set(factor).
% 1.67/2.12
% 1.67/2.12 ------------> process usable:
% 1.67/2.12 ** KEPT (pick-wt=3): 2 [copy,1,flip.1] constr_CONST_1!=constr_CONST_0x30.
% 1.67/2.12 ** KEPT (pick-wt=3): 4 [copy,3,flip.1] constr_CONST_2!=constr_CONST_0x30.
% 1.67/2.12 ** KEPT (pick-wt=3): 6 [copy,5,flip.1] constr_CONST_3!=constr_CONST_0x30.
% 1.67/2.12 ** KEPT (pick-wt=3): 8 [copy,7,flip.1] constr_CONST_4!=constr_CONST_0x30.
% 1.67/2.12 ** KEPT (pick-wt=3): 10 [copy,9,flip.1] name_A!=constr_CONST_0x30.
% 1.67/2.12 ** KEPT (pick-wt=3): 12 [copy,11,flip.1] name_B!=constr_CONST_0x30.
% 1.67/2.12 ** KEPT (pick-wt=3): 14 [copy,13,flip.1] name_I!=constr_CONST_0x30.
% 1.67/2.12 ** KEPT (pick-wt=3): 16 [copy,15,flip.1] name_c!=constr_CONST_0x30.
% 1.67/2.12 ** KEPT (pick-wt=3): 18 [copy,17,flip.1] name_objective!=constr_CONST_0x30.
% 1.67/2.12 ** KEPT (pick-wt=3): 20 [copy,19,flip.1] name_skA!=constr_CONST_0x30.
% 1.67/2.12 ** KEPT (pick-wt=3): 22 [copy,21,flip.1] name_skB!=constr_CONST_0x30.
% 1.67/2.12 ** KEPT (pick-wt=3): 24 [copy,23,flip.1] name_skS!=constr_CONST_0x30.
% 1.67/2.12 ** KEPT (pick-wt=3): 26 [copy,25,flip.1] constr_CONST_2!=constr_CONST_1.
% 1.67/2.12 ** KEPT (pick-wt=3): 28 [copy,27,flip.1] constr_CONST_3!=constr_CONST_1.
% 1.67/2.12 ** KEPT (pick-wt=3): 30 [copy,29,flip.1] constr_CONST_4!=constr_CONST_1.
% 1.67/2.12 ** KEPT (pick-wt=3): 32 [copy,31,flip.1] name_A!=constr_CONST_1.
% 1.67/2.12 ** KEPT (pick-wt=3): 34 [copy,33,flip.1] name_B!=constr_CONST_1.
% 1.67/2.12 ** KEPT (pick-wt=3): 36 [copy,35,flip.1] name_I!=constr_CONST_1.
% 1.67/2.12 ** KEPT (pick-wt=3): 38 [copy,37,flip.1] name_c!=constr_CONST_1.
% 1.67/2.12 ** KEPT (pick-wt=3): 40 [copy,39,flip.1] name_objective!=constr_CONST_1.
% 1.67/2.12 ** KEPT (pick-wt=3): 42 [copy,41,flip.1] name_skA!=constr_CONST_1.
% 1.67/2.12 ** KEPT (pick-wt=3): 44 [copy,43,flip.1] name_skB!=constr_CONST_1.
% 1.67/2.12 ** KEPT (pick-wt=3): 46 [copy,45,flip.1] name_skS!=constr_CONST_1.
% 1.67/2.12 ** KEPT (pick-wt=3): 48 [copy,47,flip.1] constr_CONST_3!=constr_CONST_2.
% 1.67/2.12 ** KEPT (pick-wt=3): 50 [copy,49,flip.1] constr_CONST_4!=constr_CONST_2.
% 1.67/2.12 ** KEPT (pick-wt=3): 52 [copy,51,flip.1] name_A!=constr_CONST_2.
% 1.67/2.12 ** KEPT (pick-wt=3): 54 [copy,53,flip.1] name_B!=constr_CONST_2.
% 1.67/2.12 ** KEPT (pick-wt=3): 56 [copy,55,flip.1] name_I!=constr_CONST_2.
% 1.67/2.12 ** KEPT (pick-wt=3): 58 [copy,57,flip.1] name_c!=constr_CONST_2.
% 1.67/2.12 ** KEPT (pick-wt=3): 60 [copy,59,flip.1] name_objective!=constr_CONST_2.
% 1.67/2.12 ** KEPT (pick-wt=3): 62 [copy,61,flip.1] name_skA!=constr_CONST_2.
% 1.67/2.12 ** KEPT (pick-wt=3): 64 [copy,63,flip.1] name_skB!=constr_CONST_2.
% 1.67/2.12 ** KEPT (pick-wt=3): 66 [copy,65,flip.1] name_skS!=constr_CONST_2.
% 1.67/2.12 ** KEPT (pick-wt=3): 68 [copy,67,flip.1] constr_CONST_4!=constr_CONST_3.
% 1.67/2.12 ** KEPT (pick-wt=3): 70 [copy,69,flip.1] name_A!=constr_CONST_3.
% 1.67/2.12 ** KEPT (pick-wt=3): 72 [copy,71,flip.1] name_B!=constr_CONST_3.
% 1.67/2.12 ** KEPT (pick-wt=3): 74 [copy,73,flip.1] name_I!=constr_CONST_3.
% 1.67/2.12 ** KEPT (pick-wt=3): 76 [copy,75,flip.1] name_c!=constr_CONST_3.
% 1.67/2.12 ** KEPT (pick-wt=3): 78 [copy,77,flip.1] name_objective!=constr_CONST_3.
% 1.67/2.12 ** KEPT (pick-wt=3): 80 [copy,79,flip.1] name_skA!=constr_CONST_3.
% 1.67/2.12 ** KEPT (pick-wt=3): 82 [copy,81,flip.1] name_skB!=constr_CONST_3.
% 1.67/2.12 ** KEPT (pick-wt=3): 84 [copy,83,flip.1] name_skS!=constr_CONST_3.
% 1.67/2.12 ** KEPT (pick-wt=3): 86 [copy,85,flip.1] name_A!=constr_CONST_4.
% 1.67/2.12 ** KEPT (pick-wt=3): 88 [copy,87,flip.1] name_B!=constr_CONST_4.
% 1.67/2.12 ** KEPT (pick-wt=3): 90 [copy,89,flip.1] name_I!=constr_CONST_4.
% 1.67/2.12 ** KEPT (pick-wt=3): 92 [copy,91,flip.1] name_c!=constr_CONST_4.
% 1.67/2.12 ** KEPT (pick-wt=3): 94 [copy,93,flip.1] name_objective!=constr_CONST_4.
% 1.67/2.12 ** KEPT (pick-wt=3): 96 [copy,95,flip.1] name_skA!=constr_CONST_4.
% 1.67/2.12 ** KEPT (pick-wt=3): 98 [copy,97,flip.1] name_skB!=constr_CONST_4.
% 1.67/2.12 ** KEPT (pick-wt=3): 100 [copy,99,flip.1] name_skS!=constr_CONST_4.
% 1.67/2.12 ** KEPT (pick-wt=3): 102 [copy,101,flip.1] name_B!=name_A.
% 1.67/2.12 ** KEPT (pick-wt=3): 104 [copy,103,flip.1] name_I!=name_A.
% 1.67/2.12 ** KEPT (pick-wt=3): 106 [copy,105,flip.1] name_c!=name_A.
% 1.67/2.12 ** KEPT (pick-wt=3): 108 [copy,107,flip.1] name_objective!=name_A.
% 1.67/2.12 ** KEPT (pick-wt=3): 110 [copy,109,flip.1] name_skA!=name_A.
% 1.67/2.12 ** KEPT (pick-wt=3): 112 [copy,111,flip.1] name_skB!=name_A.
% 1.67/2.12 ** KEPT (pick-wt=3): 114 [copy,113,flip.1] name_skS!=name_A.
% 1.67/2.12 ** KEPT (pick-wt=3): 116 [copy,115,flip.1] name_I!=name_B.
% 1.67/2.12 ** KEPT (pick-wt=3): 118 [copy,117,flip.1] name_c!=name_B.
% 1.67/2.12 ** KEPT (pick-wt=3): 120 [copy,119,flip.1] name_objective!=name_B.
% 1.67/2.12 ** KEPT (pick-wt=3): 122 [copy,121,flip.1] name_skA!=name_B.
% 1.67/2.12 ** KEPT (pick-wt=3): 124 [copy,123,flip.1] name_skB!=name_B.
% 1.67/2.12 ** KEPT (pick-wt=3): 126 [copy,125,flip.1] name_skS!=name_B.
% 1.67/2.12 ** KEPT (pick-wt=3): 128 [copy,127,flip.1] name_c!=name_I.
% 1.67/2.12 ** KEPT (pick-wt=3): 130 [copy,129,flip.1] name_objective!=name_I.
% 1.67/2.12 ** KEPT (pick-wt=3): 132 [copy,131,flip.1] name_skA!=name_I.
% 1.67/2.12 ** KEPT (pick-wt=3): 134 [copy,133,flip.1] name_skB!=name_I.
% 1.67/2.12 ** KEPT (pick-wt=3): 136 [copy,135,flip.1] name_skS!=name_I.
% 1.67/2.12 ** KEPT (pick-wt=3): 138 [copy,137,flip.1] name_objective!=name_c.
% 1.67/2.12 ** KEPT (pick-wt=3): 140 [copy,139,flip.1] name_skA!=name_c.
% 1.67/2.12 ** KEPT (pick-wt=3): 142 [copy,141,flip.1] name_skB!=name_c.
% 1.67/2.12 ** KEPT (pick-wt=3): 144 [copy,143,flip.1] name_skS!=name_c.
% 1.67/2.12 ** KEPT (pick-wt=3): 146 [copy,145,flip.1] name_skA!=name_objective.
% 1.67/2.12 ** KEPT (pick-wt=3): 148 [copy,147,flip.1] name_skB!=name_objective.
% 1.67/2.12 ** KEPT (pick-wt=3): 150 [copy,149,flip.1] name_skS!=name_objective.
% 1.67/2.12 ** KEPT (pick-wt=3): 152 [copy,151,flip.1] name_skB!=name_skA.
% 1.67/2.12 ** KEPT (pick-wt=3): 154 [copy,153,flip.1] name_skS!=name_skA.
% 1.67/2.12 ** KEPT (pick-wt=3): 156 [copy,155,flip.1] name_skS!=name_skB.
% 1.67/2.12 ** KEPT (pick-wt=5): 157 [] -pred_attacker(A)|pred_attacker(constr_tuple_2_get_1_bitstring(A)).
% 1.67/2.12 ** KEPT (pick-wt=5): 158 [] -pred_attacker(A)|pred_attacker(constr_tuple_2_get_1(A)).
% 1.67/2.12 ** KEPT (pick-wt=5): 159 [] -pred_attacker(A)|pred_attacker(constr_tuple_2_get_0x30_bitstring(A)).
% 1.67/2.12 ** KEPT (pick-wt=5): 160 [] -pred_attacker(A)|pred_attacker(constr_tuple_2_get_0x30(A)).
% 1.67/2.12 ** KEPT (pick-wt=8): 161 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_sign(A,B)).
% 1.67/2.12 ** KEPT (pick-wt=5): 162 [] -pred_attacker(A)|pred_attacker(constr_pkey(A)).
% 1.67/2.12 ** KEPT (pick-wt=5): 163 [] -pred_attacker(A)|pred_attacker(tuple_out_3(A)).
% 1.67/2.12 ** KEPT (pick-wt=5): 164 [] -pred_attacker(tuple_out_3(A))|pred_attacker(A).
% 1.67/2.12 ** KEPT (pick-wt=5): 165 [] -pred_attacker(A)|pred_attacker(tuple_out_2(A)).
% 1.67/2.12 ** KEPT (pick-wt=5): 166 [] -pred_attacker(tuple_out_2(A))|pred_attacker(A).
% 1.67/2.12 ** KEPT (pick-wt=5): 167 [] -pred_attacker(A)|pred_attacker(tuple_out_1(A)).
% 1.67/2.12 ** KEPT (pick-wt=5): 168 [] -pred_attacker(tuple_out_1(A))|pred_attacker(A).
% 1.67/2.12 ** KEPT (pick-wt=5): 169 [] -pred_attacker(A)|pred_attacker(tuple_key_retrieval_server_out_2(A)).
% 1.67/2.12 ** KEPT (pick-wt=5): 170 [] -pred_attacker(tuple_key_retrieval_server_out_2(A))|pred_attacker(A).
% 1.67/2.12 ** KEPT (pick-wt=8): 171 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(tuple_key_retrieval_server_in_1(A,B)).
% 1.67/2.12 ** KEPT (pick-wt=6): 172 [] -pred_attacker(tuple_key_retrieval_server_in_1(A,B))|pred_attacker(A).
% 1.67/2.12 ** KEPT (pick-wt=6): 173 [] -pred_attacker(tuple_key_retrieval_server_in_1(A,B))|pred_attacker(B).
% 1.67/2.12 ** KEPT (pick-wt=8): 174 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(tuple_key_register_server_in_1(A,B)).
% 1.67/2.12 ** KEPT (pick-wt=6): 175 [] -pred_attacker(tuple_key_register_server_in_1(A,B))|pred_attacker(A).
% 1.67/2.12 ** KEPT (pick-wt=6): 176 [] -pred_attacker(tuple_key_register_server_in_1(A,B))|pred_attacker(B).
% 1.67/2.12 ** KEPT (pick-wt=5): 177 [] -pred_attacker(A)|pred_attacker(constr_getmess(A)).
% 1.67/2.12 ** KEPT (pick-wt=8): 178 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_enc(A,B)).
% 1.67/2.12 ** KEPT (pick-wt=8): 179 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_dec(A,B)).
% 1.67/2.12 ** KEPT (pick-wt=5): 180 [] -pred_attacker(A)|pred_attacker(tuple_client_B_out_6(A)).
% 1.67/2.12 ** KEPT (pick-wt=5): 181 [] -pred_attacker(tuple_client_B_out_6(A))|pred_attacker(A).
% 1.67/2.12 ** KEPT (pick-wt=5): 182 [] -pred_attacker(A)|pred_attacker(tuple_client_B_out_4(A)).
% 1.67/2.12 ** KEPT (pick-wt=5): 183 [] -pred_attacker(tuple_client_B_out_4(A))|pred_attacker(A).
% 1.67/2.12 ** KEPT (pick-wt=8): 184 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(tuple_client_B_out_1(A,B)).
% 1.67/2.12 ** KEPT (pick-wt=6): 185 [] -pred_attacker(tuple_client_B_out_1(A,B))|pred_attacker(A).
% 1.67/2.12 ** KEPT (pick-wt=6): 186 [] -pred_attacker(tuple_client_B_out_1(A,B))|pred_attacker(B).
% 1.67/2.12 ** KEPT (pick-wt=5): 187 [] -pred_attacker(A)|pred_attacker(tuple_client_B_in_5(A)).
% 1.98/2.12 ** KEPT (pick-wt=5): 188 [] -pred_attacker(tuple_client_B_in_5(A))|pred_attacker(A).
% 1.98/2.12 ** KEPT (pick-wt=5): 189 [] -pred_attacker(A)|pred_attacker(tuple_client_B_in_3(A)).
% 1.98/2.12 ** KEPT (pick-wt=5): 190 [] -pred_attacker(tuple_client_B_in_3(A))|pred_attacker(A).
% 1.98/2.12 ** KEPT (pick-wt=5): 191 [] -pred_attacker(A)|pred_attacker(tuple_client_B_in_2(A)).
% 1.98/2.12 ** KEPT (pick-wt=5): 192 [] -pred_attacker(tuple_client_B_in_2(A))|pred_attacker(A).
% 1.98/2.12 ** KEPT (pick-wt=5): 193 [] -pred_attacker(A)|pred_attacker(tuple_client_A_out_5(A)).
% 1.98/2.12 ** KEPT (pick-wt=5): 194 [] -pred_attacker(tuple_client_A_out_5(A))|pred_attacker(A).
% 1.98/2.12 ** KEPT (pick-wt=5): 195 [] -pred_attacker(A)|pred_attacker(tuple_client_A_out_3(A)).
% 1.98/2.12 ** KEPT (pick-wt=5): 196 [] -pred_attacker(tuple_client_A_out_3(A))|pred_attacker(A).
% 1.98/2.12 ** KEPT (pick-wt=8): 197 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(tuple_client_A_out_1(A,B)).
% 1.98/2.12 ** KEPT (pick-wt=6): 198 [] -pred_attacker(tuple_client_A_out_1(A,B))|pred_attacker(A).
% 1.98/2.12 ** KEPT (pick-wt=6): 199 [] -pred_attacker(tuple_client_A_out_1(A,B))|pred_attacker(B).
% 1.98/2.12 ** KEPT (pick-wt=5): 200 [] -pred_attacker(A)|pred_attacker(tuple_client_A_in_4(A)).
% 1.98/2.12 ** KEPT (pick-wt=5): 201 [] -pred_attacker(tuple_client_A_in_4(A))|pred_attacker(A).
% 1.98/2.12 ** KEPT (pick-wt=5): 202 [] -pred_attacker(A)|pred_attacker(tuple_client_A_in_2(A)).
% 1.98/2.12 ** KEPT (pick-wt=5): 203 [] -pred_attacker(tuple_client_A_in_2(A))|pred_attacker(A).
% 1.98/2.12 ** KEPT (pick-wt=8): 204 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_checksign(A,B)).
% 1.98/2.12 ** KEPT (pick-wt=8): 205 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_aenc(A,B)).
% 1.98/2.12 ** KEPT (pick-wt=8): 206 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_adec(A,B)).
% 1.98/2.12 ** KEPT (pick-wt=8): 207 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(tuple_2(A,B)).
% 1.98/2.12 ** KEPT (pick-wt=6): 208 [] -pred_attacker(tuple_2(A,B))|pred_attacker(A).
% 1.98/2.12 ** KEPT (pick-wt=6): 209 [] -pred_attacker(tuple_2(A,B))|pred_attacker(B).
% 1.98/2.12 ** KEPT (pick-wt=7): 210 [] -pred_mess(A,B)| -pred_attacker(A)|pred_attacker(B).
% 1.98/2.12 ** KEPT (pick-wt=7): 211 [] -pred_attacker(A)| -pred_attacker(B)|pred_mess(A,B).
% 1.98/2.12 ** KEPT (pick-wt=22): 212 [] -pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(A,constr_pkey(name_skS))))| -pred_attacker(tuple_client_A_in_2(A))|pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(B),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(A,constr_pkey(name_skS)))))).
% 1.98/2.12 ** KEPT (pick-wt=32): 213 [] -pred_e_q_bitstring_bitstring(name_Na(A),constr_tuple_2_get_0x30(constr_adec(B,name_skA)))| -pred_attacker(tuple_client_A_in_4(B))| -pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(C,constr_pkey(name_skS))))| -pred_attacker(tuple_client_A_in_2(C))|pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(B,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(C,constr_pkey(name_skS)))))).
% 1.98/2.12 ** KEPT (pick-wt=34): 214 [] -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(A,name_skB)))| -pred_attacker(tuple_client_B_in_3(A))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(B,constr_pkey(name_skS))))| -pred_attacker(tuple_client_B_in_2(B))|pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(A,name_skB)),name_Nb(C)),constr_tuple_2_get_1_bitstring(constr_checksign(B,constr_pkey(name_skS)))))).
% 1.98/2.12 ** KEPT (pick-wt=31): 215 [] -pred_e_q_bitstring_bitstring(name_Nb(A),constr_adec(B,name_skB))| -pred_attacker(tuple_client_B_in_5(B))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(C,name_skB)))| -pred_attacker(tuple_client_B_in_3(C))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(D,constr_pkey(name_skS))))| -pred_attacker(tuple_client_B_in_2(D))|pred_attacker(tuple_client_B_out_6(name_objective)).
% 1.98/2.12 ** KEPT (pick-wt=15): 216 [] -pred_table(tuple_keys(A,B))| -pred_attacker(tuple_key_retrieval_server_in_1(C,A))|pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(A,B),name_skS))).
% 3.04/3.28 ** KEPT (pick-wt=14): 217 [] A=name_B|A=name_A| -pred_attacker(tuple_key_register_server_in_1(A,B))|pred_table(tuple_keys(A,B)).
% 3.04/3.28 ** KEPT (pick-wt=2): 218 [] -pred_attacker(name_objective).
% 3.04/3.28
% 3.04/3.28 ------------> process sos:
% 3.04/3.28 ** KEPT (pick-wt=3): 231 [] A=A.
% 3.04/3.28 ** KEPT (pick-wt=8): 232 [] constr_adec(constr_aenc(A,constr_pkey(B)),B)=A.
% 3.04/3.28 ---> New Demodulator: 233 [new_demod,232] constr_adec(constr_aenc(A,constr_pkey(B)),B)=A.
% 3.04/3.28 ** KEPT (pick-wt=7): 234 [] constr_dec(constr_enc(A,B),B)=A.
% 3.04/3.28 ---> New Demodulator: 235 [new_demod,234] constr_dec(constr_enc(A,B),B)=A.
% 3.04/3.28 ** KEPT (pick-wt=6): 236 [] constr_getmess(constr_sign(A,B))=A.
% 3.04/3.28 ---> New Demodulator: 237 [new_demod,236] constr_getmess(constr_sign(A,B))=A.
% 3.04/3.28 ** KEPT (pick-wt=8): 238 [] constr_checksign(constr_sign(A,B),constr_pkey(B))=A.
% 3.04/3.28 ---> New Demodulator: 239 [new_demod,238] constr_checksign(constr_sign(A,B),constr_pkey(B))=A.
% 3.04/3.28 ** KEPT (pick-wt=6): 240 [] constr_tuple_2_get_1_bitstring(tuple_2(A,B))=B.
% 3.04/3.28 ---> New Demodulator: 241 [new_demod,240] constr_tuple_2_get_1_bitstring(tuple_2(A,B))=B.
% 3.04/3.28 ** KEPT (pick-wt=6): 242 [] constr_tuple_2_get_0x30_bitstring(tuple_2(A,B))=A.
% 3.04/3.28 ---> New Demodulator: 243 [new_demod,242] constr_tuple_2_get_0x30_bitstring(tuple_2(A,B))=A.
% 3.04/3.28 ** KEPT (pick-wt=6): 244 [] constr_tuple_2_get_1(tuple_2(A,B))=B.
% 3.04/3.28 ---> New Demodulator: 245 [new_demod,244] constr_tuple_2_get_1(tuple_2(A,B))=B.
% 3.04/3.28 ** KEPT (pick-wt=6): 246 [] constr_tuple_2_get_0x30(tuple_2(A,B))=A.
% 3.04/3.28 ---> New Demodulator: 247 [new_demod,246] constr_tuple_2_get_0x30(tuple_2(A,B))=A.
% 3.04/3.28 ** KEPT (pick-wt=3): 248 [] pred_e_q_bitstring_bitstring(A,B).
% 3.04/3.28 ** KEPT (pick-wt=2): 249 [] pred_attacker(tuple_true).
% 3.04/3.28 ** KEPT (pick-wt=2): 250 [] pred_attacker(tuple_false).
% 3.04/3.28 ** KEPT (pick-wt=2): 251 [] pred_attacker(constr_CONST_4).
% 3.04/3.28 ** KEPT (pick-wt=2): 252 [] pred_attacker(constr_CONST_3).
% 3.04/3.28 ** KEPT (pick-wt=2): 253 [] pred_attacker(constr_CONST_2).
% 3.04/3.28 ** KEPT (pick-wt=2): 254 [] pred_attacker(constr_CONST_1).
% 3.04/3.28 ** KEPT (pick-wt=2): 255 [] pred_attacker(constr_CONST_0x30).
% 3.04/3.28 ** KEPT (pick-wt=2): 256 [] pred_attacker(name_c).
% 3.04/3.28 ** KEPT (pick-wt=2): 257 [] pred_attacker(name_I).
% 3.04/3.28 ** KEPT (pick-wt=2): 258 [] pred_attacker(name_B).
% 3.04/3.28 ** KEPT (pick-wt=2): 259 [] pred_attacker(name_A).
% 3.04/3.28 ** KEPT (pick-wt=3): 260 [] pred_e_qual(A,A).
% 3.04/3.28 ** KEPT (pick-wt=3): 261 [] pred_attacker(name_new0x2Dname(A)).
% 3.04/3.28 ** KEPT (pick-wt=5): 262 [] pred_table(tuple_keys(name_A,constr_pkey(name_skA))).
% 3.04/3.28 ** KEPT (pick-wt=5): 263 [] pred_table(tuple_keys(name_B,constr_pkey(name_skB))).
% 3.04/3.28 ** KEPT (pick-wt=4): 264 [] pred_attacker(tuple_out_1(constr_pkey(name_skA))).
% 3.04/3.28 ** KEPT (pick-wt=4): 265 [] pred_attacker(tuple_out_2(constr_pkey(name_skB))).
% 3.04/3.28 ** KEPT (pick-wt=4): 266 [] pred_attacker(tuple_out_3(constr_pkey(name_skS))).
% 3.04/3.28 ** KEPT (pick-wt=4): 267 [] pred_attacker(tuple_client_A_out_1(name_A,name_I)).
% 3.04/3.28 ** KEPT (pick-wt=4): 268 [] pred_attacker(tuple_client_B_out_1(name_B,name_A)).
% 3.04/3.28 Following clause subsumed by 231 during input processing: 0 [copy,231,flip.1] A=A.
% 3.04/3.28 >>>> Starting back demodulation with 233.
% 3.04/3.28 >>>> Starting back demodulation with 235.
% 3.04/3.28 >>>> Starting back demodulation with 237.
% 3.04/3.28 >>>> Starting back demodulation with 239.
% 3.04/3.28 >>>> Starting back demodulation with 241.
% 3.04/3.28 >>>> Starting back demodulation with 243.
% 3.04/3.28 >>>> Starting back demodulation with 245.
% 3.04/3.28 >>>> Starting back demodulation with 247.
% 3.04/3.28
% 3.04/3.28 ======= end of input processing =======
% 3.04/3.28
% 3.04/3.28 =========== start of search ===========
% 3.04/3.28
% 3.04/3.28
% 3.04/3.28 Resetting weight limit to 3.
% 3.04/3.28
% 3.04/3.28
% 3.04/3.28 Resetting weight limit to 3.
% 3.04/3.28
% 3.04/3.28 sos_size=1688
% 3.04/3.28
% 3.04/3.28 -------- PROOF --------
% 3.04/3.28
% 3.04/3.28 ----> UNIT CONFLICT at 1.15 sec ----> 1950 [binary,1949.1,218.1] $F.
% 3.04/3.28
% 3.04/3.28 Length of proof is 5. Level of proof is 3.
% 3.04/3.28
% 3.04/3.28 ---------------- PROOF ----------------
% 3.04/3.28 % SZS status Theorem
% 3.04/3.28 % SZS output start Refutation
% See solution above
% 3.04/3.28 ------------ end of proof -------------
% 3.04/3.28
% 3.04/3.28
% 3.04/3.28 Search stopped by max_proofs option.
% 3.04/3.28
% 3.04/3.28
% 3.04/3.28 Search stopped by max_proofs option.
% 3.04/3.28
% 3.04/3.28 ============ end of search ============
% 3.04/3.28
% 3.04/3.28 -------------- statistics -------------
% 3.04/3.28 clauses given 432
% 3.04/3.28 clauses generated 1077961
% 3.04/3.28 clauses kept 1863
% 3.04/3.28 clauses forward subsumed 688
% 3.04/3.28 clauses back subsumed 3
% 3.04/3.28 Kbytes malloced 5859
% 3.04/3.28
% 3.04/3.28 ----------- times (seconds) -----------
% 3.04/3.28 user CPU time 1.15 (0 hr, 0 min, 1 sec)
% 3.04/3.28 system CPU time 0.00 (0 hr, 0 min, 0 sec)
% 3.04/3.28 wall-clock time 3 (0 hr, 0 min, 3 sec)
% 3.04/3.28
% 3.04/3.28 That finishes the proof of the theorem.
% 3.04/3.28
% 3.04/3.28 Process 10163 finished Wed Jul 27 03:01:43 2022
% 3.13/3.28 Otter interrupted
% 3.13/3.28 PROOF FOUND
%------------------------------------------------------------------------------