TSTP Solution File: SWW959+1 by Otter---3.3

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : Otter---3.3
% Problem  : SWW959+1 : TPTP v8.1.0. Released v7.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : otter-tptp-script %s

% Computer : n024.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Wed Jul 27 13:23:14 EDT 2022

% Result   : Theorem 3.04s 3.28s
% Output   : Refutation 3.04s
% Verified : 
% SZS Type : Refutation
%            Derivation depth      :    4
%            Number of leaves      :    8
% Syntax   : Number of clauses     :   14 (   9 unt;   0 nHn;  13 RR)
%            Number of literals    :   24 (   0 equ;  11 neg)
%            Maximal clause size   :    7 (   1 avg)
%            Maximal term depth    :    4 (   1 avg)
%            Number of predicates  :    3 (   2 usr;   1 prp; 0-2 aty)
%            Number of functors    :   15 (  15 usr;   5 con; 0-2 aty)
%            Number of variables   :   10 (   3 sgn)

% Comments : 
%------------------------------------------------------------------------------
cnf(181,axiom,
    ( ~ pred_attacker(tuple_client_B_out_6(A))
    | pred_attacker(A) ),
    file('SWW959+1.p',unknown),
    [] ).

cnf(187,axiom,
    ( ~ pred_attacker(A)
    | pred_attacker(tuple_client_B_in_5(A)) ),
    file('SWW959+1.p',unknown),
    [] ).

cnf(189,axiom,
    ( ~ pred_attacker(A)
    | pred_attacker(tuple_client_B_in_3(A)) ),
    file('SWW959+1.p',unknown),
    [] ).

cnf(191,axiom,
    ( ~ pred_attacker(A)
    | pred_attacker(tuple_client_B_in_2(A)) ),
    file('SWW959+1.p',unknown),
    [] ).

cnf(215,axiom,
    ( ~ pred_e_q_bitstring_bitstring(name_Nb(A),constr_adec(B,name_skB))
    | ~ pred_attacker(tuple_client_B_in_5(B))
    | ~ pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(C,name_skB)))
    | ~ pred_attacker(tuple_client_B_in_3(C))
    | ~ pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(D,constr_pkey(name_skS))))
    | ~ pred_attacker(tuple_client_B_in_2(D))
    | pred_attacker(tuple_client_B_out_6(name_objective)) ),
    file('SWW959+1.p',unknown),
    [] ).

cnf(218,axiom,
    ~ pred_attacker(name_objective),
    file('SWW959+1.p',unknown),
    [] ).

cnf(248,axiom,
    pred_e_q_bitstring_bitstring(A,B),
    file('SWW959+1.p',unknown),
    [] ).

cnf(249,axiom,
    pred_attacker(tuple_true),
    file('SWW959+1.p',unknown),
    [] ).

cnf(285,plain,
    pred_attacker(tuple_client_B_in_2(tuple_true)),
    inference(hyper,[status(thm)],[249,191]),
    [iquote('hyper,249,191')] ).

cnf(286,plain,
    pred_attacker(tuple_client_B_in_3(tuple_true)),
    inference(hyper,[status(thm)],[249,189]),
    [iquote('hyper,249,189')] ).

cnf(287,plain,
    pred_attacker(tuple_client_B_in_5(tuple_true)),
    inference(hyper,[status(thm)],[249,187]),
    [iquote('hyper,249,187')] ).

cnf(1945,plain,
    pred_attacker(tuple_client_B_out_6(name_objective)),
    inference(hyper,[status(thm)],[287,215,248,248,286,248,285]),
    [iquote('hyper,287,215,248,248,286,248,285')] ).

cnf(1949,plain,
    pred_attacker(name_objective),
    inference(hyper,[status(thm)],[1945,181]),
    [iquote('hyper,1945,181')] ).

cnf(1950,plain,
    $false,
    inference(binary,[status(thm)],[1949,218]),
    [iquote('binary,1949.1,218.1')] ).

%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.11/0.11  % Problem  : SWW959+1 : TPTP v8.1.0. Released v7.4.0.
% 0.11/0.12  % Command  : otter-tptp-script %s
% 0.12/0.33  % Computer : n024.cluster.edu
% 0.12/0.33  % Model    : x86_64 x86_64
% 0.12/0.33  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.12/0.33  % Memory   : 8042.1875MB
% 0.12/0.33  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.12/0.33  % CPULimit : 300
% 0.12/0.33  % WCLimit  : 300
% 0.12/0.33  % DateTime : Wed Jul 27 03:01:40 EDT 2022
% 0.12/0.33  % CPUTime  : 
% 1.67/2.12  ----- Otter 3.3f, August 2004 -----
% 1.67/2.12  The process was started by sandbox2 on n024.cluster.edu,
% 1.67/2.12  Wed Jul 27 03:01:40 2022
% 1.67/2.12  The command was "./otter".  The process ID is 10163.
% 1.67/2.12  
% 1.67/2.12  set(prolog_style_variables).
% 1.67/2.12  set(auto).
% 1.67/2.12     dependent: set(auto1).
% 1.67/2.12     dependent: set(process_input).
% 1.67/2.12     dependent: clear(print_kept).
% 1.67/2.12     dependent: clear(print_new_demod).
% 1.67/2.12     dependent: clear(print_back_demod).
% 1.67/2.12     dependent: clear(print_back_sub).
% 1.67/2.12     dependent: set(control_memory).
% 1.67/2.12     dependent: assign(max_mem, 12000).
% 1.67/2.12     dependent: assign(pick_given_ratio, 4).
% 1.67/2.12     dependent: assign(stats_level, 1).
% 1.67/2.12     dependent: assign(max_seconds, 10800).
% 1.67/2.12  clear(print_given).
% 1.67/2.12  
% 1.67/2.12  formula_list(usable).
% 1.67/2.12  all A (A=A).
% 1.67/2.12  constr_CONST_0x30!=constr_CONST_1.
% 1.67/2.12  constr_CONST_0x30!=constr_CONST_2.
% 1.67/2.12  constr_CONST_0x30!=constr_CONST_3.
% 1.67/2.12  constr_CONST_0x30!=constr_CONST_4.
% 1.67/2.12  constr_CONST_0x30!=name_A.
% 1.67/2.12  constr_CONST_0x30!=name_B.
% 1.67/2.12  constr_CONST_0x30!=name_I.
% 1.67/2.12  constr_CONST_0x30!=name_c.
% 1.67/2.12  constr_CONST_0x30!=name_objective.
% 1.67/2.12  constr_CONST_0x30!=name_skA.
% 1.67/2.12  constr_CONST_0x30!=name_skB.
% 1.67/2.12  constr_CONST_0x30!=name_skS.
% 1.67/2.12  constr_CONST_1!=constr_CONST_2.
% 1.67/2.12  constr_CONST_1!=constr_CONST_3.
% 1.67/2.12  constr_CONST_1!=constr_CONST_4.
% 1.67/2.12  constr_CONST_1!=name_A.
% 1.67/2.12  constr_CONST_1!=name_B.
% 1.67/2.12  constr_CONST_1!=name_I.
% 1.67/2.12  constr_CONST_1!=name_c.
% 1.67/2.12  constr_CONST_1!=name_objective.
% 1.67/2.12  constr_CONST_1!=name_skA.
% 1.67/2.12  constr_CONST_1!=name_skB.
% 1.67/2.12  constr_CONST_1!=name_skS.
% 1.67/2.12  constr_CONST_2!=constr_CONST_3.
% 1.67/2.12  constr_CONST_2!=constr_CONST_4.
% 1.67/2.12  constr_CONST_2!=name_A.
% 1.67/2.12  constr_CONST_2!=name_B.
% 1.67/2.12  constr_CONST_2!=name_I.
% 1.67/2.12  constr_CONST_2!=name_c.
% 1.67/2.12  constr_CONST_2!=name_objective.
% 1.67/2.12  constr_CONST_2!=name_skA.
% 1.67/2.12  constr_CONST_2!=name_skB.
% 1.67/2.12  constr_CONST_2!=name_skS.
% 1.67/2.12  constr_CONST_3!=constr_CONST_4.
% 1.67/2.12  constr_CONST_3!=name_A.
% 1.67/2.12  constr_CONST_3!=name_B.
% 1.67/2.12  constr_CONST_3!=name_I.
% 1.67/2.12  constr_CONST_3!=name_c.
% 1.67/2.12  constr_CONST_3!=name_objective.
% 1.67/2.12  constr_CONST_3!=name_skA.
% 1.67/2.12  constr_CONST_3!=name_skB.
% 1.67/2.12  constr_CONST_3!=name_skS.
% 1.67/2.12  constr_CONST_4!=name_A.
% 1.67/2.12  constr_CONST_4!=name_B.
% 1.67/2.12  constr_CONST_4!=name_I.
% 1.67/2.12  constr_CONST_4!=name_c.
% 1.67/2.12  constr_CONST_4!=name_objective.
% 1.67/2.12  constr_CONST_4!=name_skA.
% 1.67/2.12  constr_CONST_4!=name_skB.
% 1.67/2.12  constr_CONST_4!=name_skS.
% 1.67/2.12  name_A!=name_B.
% 1.67/2.12  name_A!=name_I.
% 1.67/2.12  name_A!=name_c.
% 1.67/2.12  name_A!=name_objective.
% 1.67/2.12  name_A!=name_skA.
% 1.67/2.12  name_A!=name_skB.
% 1.67/2.12  name_A!=name_skS.
% 1.67/2.12  name_B!=name_I.
% 1.67/2.12  name_B!=name_c.
% 1.67/2.12  name_B!=name_objective.
% 1.67/2.12  name_B!=name_skA.
% 1.67/2.12  name_B!=name_skB.
% 1.67/2.12  name_B!=name_skS.
% 1.67/2.12  name_I!=name_c.
% 1.67/2.12  name_I!=name_objective.
% 1.67/2.12  name_I!=name_skA.
% 1.67/2.12  name_I!=name_skB.
% 1.67/2.12  name_I!=name_skS.
% 1.67/2.12  name_c!=name_objective.
% 1.67/2.12  name_c!=name_skA.
% 1.67/2.12  name_c!=name_skB.
% 1.67/2.12  name_c!=name_skS.
% 1.67/2.12  name_objective!=name_skA.
% 1.67/2.12  name_objective!=name_skB.
% 1.67/2.12  name_objective!=name_skS.
% 1.67/2.12  name_skA!=name_skB.
% 1.67/2.12  name_skA!=name_skS.
% 1.67/2.12  name_skB!=name_skS.
% 1.67/2.12  all VAR_K_18 VAR_M_17 (constr_adec(constr_aenc(VAR_M_17,constr_pkey(VAR_K_18)),VAR_K_18)=VAR_M_17).
% 1.67/2.12  all VAR_K_16 VAR_M_15 (constr_dec(constr_enc(VAR_M_15,VAR_K_16),VAR_K_16)=VAR_M_15).
% 1.67/2.12  all VAR_K_14 VAR_M_13 (constr_getmess(constr_sign(VAR_M_13,VAR_K_14))=VAR_M_13).
% 1.67/2.12  all VAR_K_0X30 VAR_M_0X30 (constr_checksign(constr_sign(VAR_M_0X30,VAR_K_0X30),constr_pkey(VAR_K_0X30))=VAR_M_0X30).
% 1.67/2.12  all VAR_X0X30_11 VAR_X1_12 (constr_tuple_2_get_1_bitstring(tuple_2(VAR_X0X30_11,VAR_X1_12))=VAR_X1_12).
% 1.67/2.12  all VAR_X0X30_9 VAR_X1_10X30 (constr_tuple_2_get_0x30_bitstring(tuple_2(VAR_X0X30_9,VAR_X1_10X30))=VAR_X0X30_9).
% 1.67/2.12  all VAR_X0X30_7 VAR_X1_8 (constr_tuple_2_get_1(tuple_2(VAR_X0X30_7,VAR_X1_8))=VAR_X1_8).
% 1.67/2.12  all VAR_X0X30_0X30 VAR_X1_0X30 (constr_tuple_2_get_0x30(tuple_2(VAR_X0X30_0X30,VAR_X1_0X30))=VAR_X0X30_0X30).
% 1.67/2.12  all VAR_X_35 VAR_Y_36 pred_e_q_bitstring_bitstring(VAR_X_35,VAR_Y_36).
% 1.67/2.12  all VAR_V_42 (pred_attacker(VAR_V_42)->pred_attacker(constr_tuple_2_get_1_bitstring(VAR_V_42))).
% 1.67/2.12  all VAR_V_44 (pred_attacker(VAR_V_44)->pred_attacker(constr_tuple_2_get_1(VAR_V_44))).
% 1.67/2.12  all VAR_V_46 (pred_attacker(VAR_V_46)->pred_attacker(constr_tuple_2_get_0x30_bitstring(VAR_V_46))).
% 1.67/2.12  all VAR_V_48 (pred_attacker(VAR_V_48)->pred_attacker(constr_tuple_2_get_0x30(VAR_V_48))).
% 1.67/2.12  pred_attacker(tuple_true).
% 1.67/2.12  all VAR_V_51 VAR_V_52 (pred_attacker(VAR_V_51)&pred_attacker(VAR_V_52)->pred_attacker(constr_sign(VAR_V_51,VAR_V_52))).
% 1.67/2.12  all VAR_V_54 (pred_attacker(VAR_V_54)->pred_attacker(constr_pkey(VAR_V_54))).
% 1.67/2.12  all VAR_V_56 (pred_attacker(VAR_V_56)->pred_attacker(tuple_out_3(VAR_V_56))).
% 1.67/2.12  all VAR_V_59 (pred_attacker(tuple_out_3(VAR_V_59))->pred_attacker(VAR_V_59)).
% 1.67/2.12  all VAR_V_62 (pred_attacker(VAR_V_62)->pred_attacker(tuple_out_2(VAR_V_62))).
% 1.67/2.12  all VAR_V_65 (pred_attacker(tuple_out_2(VAR_V_65))->pred_attacker(VAR_V_65)).
% 1.67/2.12  all VAR_V_68 (pred_attacker(VAR_V_68)->pred_attacker(tuple_out_1(VAR_V_68))).
% 1.67/2.12  all VAR_V_71 (pred_attacker(tuple_out_1(VAR_V_71))->pred_attacker(VAR_V_71)).
% 1.67/2.12  all VAR_V_75 (pred_attacker(VAR_V_75)->pred_attacker(tuple_key_retrieval_server_out_2(VAR_V_75))).
% 1.67/2.12  all VAR_V_78 (pred_attacker(tuple_key_retrieval_server_out_2(VAR_V_78))->pred_attacker(VAR_V_78)).
% 1.67/2.12  all VAR_V_82 VAR_V_83 (pred_attacker(VAR_V_82)&pred_attacker(VAR_V_83)->pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_82,VAR_V_83))).
% 1.67/2.12  all VAR_V_90X30 VAR_V_91 (pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_90X30,VAR_V_91))->pred_attacker(VAR_V_90X30)).
% 1.67/2.12  all VAR_V_93 VAR_V_94 (pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_93,VAR_V_94))->pred_attacker(VAR_V_94)).
% 1.67/2.12  all VAR_V_98 VAR_V_99 (pred_attacker(VAR_V_98)&pred_attacker(VAR_V_99)->pred_attacker(tuple_key_register_server_in_1(VAR_V_98,VAR_V_99))).
% 1.67/2.12  all VAR_V_10X306 VAR_V_10X307 (pred_attacker(tuple_key_register_server_in_1(VAR_V_10X306,VAR_V_10X307))->pred_attacker(VAR_V_10X306)).
% 1.67/2.12  all VAR_V_10X309 VAR_V_110X30 (pred_attacker(tuple_key_register_server_in_1(VAR_V_10X309,VAR_V_110X30))->pred_attacker(VAR_V_110X30)).
% 1.67/2.12  all VAR_V_113 (pred_attacker(VAR_V_113)->pred_attacker(constr_getmess(VAR_V_113))).
% 1.67/2.12  pred_attacker(tuple_false).
% 1.67/2.12  all VAR_V_116 VAR_V_117 (pred_attacker(VAR_V_116)&pred_attacker(VAR_V_117)->pred_attacker(constr_enc(VAR_V_116,VAR_V_117))).
% 1.67/2.12  all VAR_V_120X30 VAR_V_121 (pred_attacker(VAR_V_120X30)&pred_attacker(VAR_V_121)->pred_attacker(constr_dec(VAR_V_120X30,VAR_V_121))).
% 1.67/2.12  all VAR_V_123 (pred_attacker(VAR_V_123)->pred_attacker(tuple_client_B_out_6(VAR_V_123))).
% 1.67/2.12  all VAR_V_126 (pred_attacker(tuple_client_B_out_6(VAR_V_126))->pred_attacker(VAR_V_126)).
% 1.67/2.12  all VAR_V_129 (pred_attacker(VAR_V_129)->pred_attacker(tuple_client_B_out_4(VAR_V_129))).
% 1.67/2.12  all VAR_V_132 (pred_attacker(tuple_client_B_out_4(VAR_V_132))->pred_attacker(VAR_V_132)).
% 1.67/2.12  all VAR_V_136 VAR_V_137 (pred_attacker(VAR_V_136)&pred_attacker(VAR_V_137)->pred_attacker(tuple_client_B_out_1(VAR_V_136,VAR_V_137))).
% 1.67/2.12  all VAR_V_144 VAR_V_145 (pred_attacker(tuple_client_B_out_1(VAR_V_144,VAR_V_145))->pred_attacker(VAR_V_144)).
% 1.67/2.12  all VAR_V_147 VAR_V_148 (pred_attacker(tuple_client_B_out_1(VAR_V_147,VAR_V_148))->pred_attacker(VAR_V_148)).
% 1.67/2.12  all VAR_V_151 (pred_attacker(VAR_V_151)->pred_attacker(tuple_client_B_in_5(VAR_V_151))).
% 1.67/2.12  all VAR_V_154 (pred_attacker(tuple_client_B_in_5(VAR_V_154))->pred_attacker(VAR_V_154)).
% 1.67/2.12  all VAR_V_157 (pred_attacker(VAR_V_157)->pred_attacker(tuple_client_B_in_3(VAR_V_157))).
% 1.67/2.12  all VAR_V_160X30 (pred_attacker(tuple_client_B_in_3(VAR_V_160X30))->pred_attacker(VAR_V_160X30)).
% 1.67/2.12  all VAR_V_163 (pred_attacker(VAR_V_163)->pred_attacker(tuple_client_B_in_2(VAR_V_163))).
% 1.67/2.12  all VAR_V_166 (pred_attacker(tuple_client_B_in_2(VAR_V_166))->pred_attacker(VAR_V_166)).
% 1.67/2.12  all VAR_V_169 (pred_attacker(VAR_V_169)->pred_attacker(tuple_client_A_out_5(VAR_V_169))).
% 1.67/2.12  all VAR_V_172 (pred_attacker(tuple_client_A_out_5(VAR_V_172))->pred_attacker(VAR_V_172)).
% 1.67/2.12  all VAR_V_175 (pred_attacker(VAR_V_175)->pred_attacker(tuple_client_A_out_3(VAR_V_175))).
% 1.67/2.12  all VAR_V_178 (pred_attacker(tuple_client_A_out_3(VAR_V_178))->pred_attacker(VAR_V_178)).
% 1.67/2.12  all VAR_V_182 VAR_V_183 (pred_attacker(VAR_V_182)&pred_attacker(VAR_V_183)->pred_attacker(tuple_client_A_out_1(VAR_V_182,VAR_V_183))).
% 1.67/2.12  all VAR_V_190X30 VAR_V_191 (pred_attacker(tuple_client_A_out_1(VAR_V_190X30,VAR_V_191))->pred_attacker(VAR_V_190X30)).
% 1.67/2.12  all VAR_V_193 VAR_V_194 (pred_attacker(tuple_client_A_out_1(VAR_V_193,VAR_V_194))->pred_attacker(VAR_V_194)).
% 1.67/2.12  all VAR_V_197 (pred_attacker(VAR_V_197)->pred_attacker(tuple_client_A_in_4(VAR_V_197))).
% 1.67/2.12  all VAR_V_20X300X30 (pred_attacker(tuple_client_A_in_4(VAR_V_20X300X30))->pred_attacker(VAR_V_20X300X30)).
% 1.67/2.12  all VAR_V_20X303 (pred_attacker(VAR_V_20X303)->pred_attacker(tuple_client_A_in_2(VAR_V_20X303))).
% 1.67/2.12  all VAR_V_20X306 (pred_attacker(tuple_client_A_in_2(VAR_V_20X306))->pred_attacker(VAR_V_20X306)).
% 1.67/2.12  all VAR_V_210X30 VAR_V_211 (pred_attacker(VAR_V_210X30)&pred_attacker(VAR_V_211)->pred_attacker(constr_checksign(VAR_V_210X30,VAR_V_211))).
% 1.67/2.12  all VAR_V_214 VAR_V_215 (pred_attacker(VAR_V_214)&pred_attacker(VAR_V_215)->pred_attacker(constr_aenc(VAR_V_214,VAR_V_215))).
% 1.67/2.12  all VAR_V_218 VAR_V_219 (pred_attacker(VAR_V_218)&pred_attacker(VAR_V_219)->pred_attacker(constr_adec(VAR_V_218,VAR_V_219))).
% 1.67/2.12  pred_attacker(constr_CONST_4).
% 1.67/2.12  pred_attacker(constr_CONST_3).
% 1.67/2.12  pred_attacker(constr_CONST_2).
% 1.67/2.12  pred_attacker(constr_CONST_1).
% 1.67/2.12  pred_attacker(constr_CONST_0x30).
% 1.67/2.12  all VAR_V_226 VAR_V_227 (pred_attacker(VAR_V_226)&pred_attacker(VAR_V_227)->pred_attacker(tuple_2(VAR_V_226,VAR_V_227))).
% 1.67/2.12  all VAR_V_234 VAR_V_235 (pred_attacker(tuple_2(VAR_V_234,VAR_V_235))->pred_attacker(VAR_V_234)).
% 1.67/2.12  all VAR_V_237 VAR_V_238 (pred_attacker(tuple_2(VAR_V_237,VAR_V_238))->pred_attacker(VAR_V_238)).
% 1.67/2.12  all VAR_V_240X30 VAR_V_241 (pred_mess(VAR_V_241,VAR_V_240X30)&pred_attacker(VAR_V_241)->pred_attacker(VAR_V_240X30)).
% 1.67/2.12  all VAR_V_242 VAR_V_243 (pred_attacker(VAR_V_243)&pred_attacker(VAR_V_242)->pred_mess(VAR_V_243,VAR_V_242)).
% 1.67/2.12  pred_attacker(name_c).
% 1.67/2.12  pred_attacker(name_I).
% 1.67/2.12  pred_attacker(name_B).
% 1.67/2.12  pred_attacker(name_A).
% 1.67/2.12  all VAR_V_245 pred_e_qual(VAR_V_245,VAR_V_245).
% 1.67/2.12  all VAR_V_246 pred_attacker(name_new0x2Dname(VAR_V_246)).
% 1.67/2.12  pred_table(tuple_keys(name_A,constr_pkey(name_skA))).
% 1.67/2.12  pred_table(tuple_keys(name_B,constr_pkey(name_skB))).
% 1.67/2.12  pred_attacker(tuple_out_1(constr_pkey(name_skA))).
% 1.67/2.12  pred_attacker(tuple_out_2(constr_pkey(name_skB))).
% 1.67/2.12  pred_attacker(tuple_out_3(constr_pkey(name_skS))).
% 1.67/2.12  pred_attacker(tuple_client_A_out_1(name_A,name_I)).
% 1.67/2.12  all VAR_0X40SID_366 VAR_SIGN_I_PKI_365 (pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_I_PKI_365,constr_pkey(name_skS))))&pred_attacker(tuple_client_A_in_2(VAR_SIGN_I_PKI_365))->pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(VAR_0X40SID_366),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_I_PKI_365,constr_pkey(name_skS))))))).
% 1.67/2.12  all VAR_0X40SID_414 VAR_AENC_NA_NI_415 VAR_SIGN_I_PKI_416 (pred_e_q_bitstring_bitstring(name_Na(VAR_0X40SID_414),constr_tuple_2_get_0x30(constr_adec(VAR_AENC_NA_NI_415,name_skA)))&pred_attacker(tuple_client_A_in_4(VAR_AENC_NA_NI_415))&pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_I_PKI_416,constr_pkey(name_skS))))&pred_attacker(tuple_client_A_in_2(VAR_SIGN_I_PKI_416))->pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(VAR_AENC_NA_NI_415,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_I_PKI_416,constr_pkey(name_skS))))))).
% 1.67/2.12  pred_attacker(tuple_client_B_out_1(name_B,name_A)).
% 1.67/2.12  all VAR_0X40SID_523 VAR_AENC_NA_A_521 VAR_SIGN_A_PKA_522 (pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(VAR_AENC_NA_A_521,name_skB)))&pred_attacker(tuple_client_B_in_3(VAR_AENC_NA_A_521))&pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_A_PKA_522,constr_pkey(name_skS))))&pred_attacker(tuple_client_B_in_2(VAR_SIGN_A_PKA_522))->pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(VAR_AENC_NA_A_521,name_skB)),name_Nb(VAR_0X40SID_523)),constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_A_PKA_522,constr_pkey(name_skS))))))).
% 1.67/2.12  all VAR_0X40SID_545 VAR_AENC_NA_A_547 VAR_AENC_NB_546 VAR_SIGN_A_PKA_548 (pred_e_q_bitstring_bitstring(name_Nb(VAR_0X40SID_545),constr_adec(VAR_AENC_NB_546,name_skB))&pred_attacker(tuple_client_B_in_5(VAR_AENC_NB_546))&pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(VAR_AENC_NA_A_547,name_skB)))&pred_attacker(tuple_client_B_in_3(VAR_AENC_NA_A_547))&pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_A_PKA_548,constr_pkey(name_skS))))&pred_attacker(tuple_client_B_in_2(VAR_SIGN_A_PKA_548))->pred_attacker(tuple_client_B_out_6(name_objective))).
% 1.67/2.12  all VAR_DST_587 VAR_PKDST_588 VAR_SRC_589 (pred_table(tuple_keys(VAR_DST_587,VAR_PKDST_588))&pred_attacker(tuple_key_retrieval_server_in_1(VAR_SRC_589,VAR_DST_587))->pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(VAR_DST_587,VAR_PKDST_588),name_skS)))).
% 1.67/2.12  all VAR_HOST_641 VAR_PK_642 (VAR_HOST_641!=name_B&VAR_HOST_641!=name_A&pred_attacker(tuple_key_register_server_in_1(VAR_HOST_641,VAR_PK_642))->pred_table(tuple_keys(VAR_HOST_641,VAR_PK_642))).
% 1.67/2.12  -pred_attacker(name_objective).
% 1.67/2.12  end_of_list.
% 1.67/2.12  
% 1.67/2.12  -------> usable clausifies to:
% 1.67/2.12  
% 1.67/2.12  list(usable).
% 1.67/2.12  0 [] A=A.
% 1.67/2.12  0 [] constr_CONST_0x30!=constr_CONST_1.
% 1.67/2.12  0 [] constr_CONST_0x30!=constr_CONST_2.
% 1.67/2.12  0 [] constr_CONST_0x30!=constr_CONST_3.
% 1.67/2.12  0 [] constr_CONST_0x30!=constr_CONST_4.
% 1.67/2.12  0 [] constr_CONST_0x30!=name_A.
% 1.67/2.12  0 [] constr_CONST_0x30!=name_B.
% 1.67/2.12  0 [] constr_CONST_0x30!=name_I.
% 1.67/2.12  0 [] constr_CONST_0x30!=name_c.
% 1.67/2.12  0 [] constr_CONST_0x30!=name_objective.
% 1.67/2.12  0 [] constr_CONST_0x30!=name_skA.
% 1.67/2.12  0 [] constr_CONST_0x30!=name_skB.
% 1.67/2.12  0 [] constr_CONST_0x30!=name_skS.
% 1.67/2.12  0 [] constr_CONST_1!=constr_CONST_2.
% 1.67/2.12  0 [] constr_CONST_1!=constr_CONST_3.
% 1.67/2.12  0 [] constr_CONST_1!=constr_CONST_4.
% 1.67/2.12  0 [] constr_CONST_1!=name_A.
% 1.67/2.12  0 [] constr_CONST_1!=name_B.
% 1.67/2.12  0 [] constr_CONST_1!=name_I.
% 1.67/2.12  0 [] constr_CONST_1!=name_c.
% 1.67/2.12  0 [] constr_CONST_1!=name_objective.
% 1.67/2.12  0 [] constr_CONST_1!=name_skA.
% 1.67/2.12  0 [] constr_CONST_1!=name_skB.
% 1.67/2.12  0 [] constr_CONST_1!=name_skS.
% 1.67/2.12  0 [] constr_CONST_2!=constr_CONST_3.
% 1.67/2.12  0 [] constr_CONST_2!=constr_CONST_4.
% 1.67/2.12  0 [] constr_CONST_2!=name_A.
% 1.67/2.12  0 [] constr_CONST_2!=name_B.
% 1.67/2.12  0 [] constr_CONST_2!=name_I.
% 1.67/2.12  0 [] constr_CONST_2!=name_c.
% 1.67/2.12  0 [] constr_CONST_2!=name_objective.
% 1.67/2.12  0 [] constr_CONST_2!=name_skA.
% 1.67/2.12  0 [] constr_CONST_2!=name_skB.
% 1.67/2.12  0 [] constr_CONST_2!=name_skS.
% 1.67/2.12  0 [] constr_CONST_3!=constr_CONST_4.
% 1.67/2.12  0 [] constr_CONST_3!=name_A.
% 1.67/2.12  0 [] constr_CONST_3!=name_B.
% 1.67/2.12  0 [] constr_CONST_3!=name_I.
% 1.67/2.12  0 [] constr_CONST_3!=name_c.
% 1.67/2.12  0 [] constr_CONST_3!=name_objective.
% 1.67/2.12  0 [] constr_CONST_3!=name_skA.
% 1.67/2.12  0 [] constr_CONST_3!=name_skB.
% 1.67/2.12  0 [] constr_CONST_3!=name_skS.
% 1.67/2.12  0 [] constr_CONST_4!=name_A.
% 1.67/2.12  0 [] constr_CONST_4!=name_B.
% 1.67/2.12  0 [] constr_CONST_4!=name_I.
% 1.67/2.12  0 [] constr_CONST_4!=name_c.
% 1.67/2.12  0 [] constr_CONST_4!=name_objective.
% 1.67/2.12  0 [] constr_CONST_4!=name_skA.
% 1.67/2.12  0 [] constr_CONST_4!=name_skB.
% 1.67/2.12  0 [] constr_CONST_4!=name_skS.
% 1.67/2.12  0 [] name_A!=name_B.
% 1.67/2.12  0 [] name_A!=name_I.
% 1.67/2.12  0 [] name_A!=name_c.
% 1.67/2.12  0 [] name_A!=name_objective.
% 1.67/2.12  0 [] name_A!=name_skA.
% 1.67/2.12  0 [] name_A!=name_skB.
% 1.67/2.12  0 [] name_A!=name_skS.
% 1.67/2.12  0 [] name_B!=name_I.
% 1.67/2.12  0 [] name_B!=name_c.
% 1.67/2.12  0 [] name_B!=name_objective.
% 1.67/2.12  0 [] name_B!=name_skA.
% 1.67/2.12  0 [] name_B!=name_skB.
% 1.67/2.12  0 [] name_B!=name_skS.
% 1.67/2.12  0 [] name_I!=name_c.
% 1.67/2.12  0 [] name_I!=name_objective.
% 1.67/2.12  0 [] name_I!=name_skA.
% 1.67/2.12  0 [] name_I!=name_skB.
% 1.67/2.12  0 [] name_I!=name_skS.
% 1.67/2.12  0 [] name_c!=name_objective.
% 1.67/2.12  0 [] name_c!=name_skA.
% 1.67/2.12  0 [] name_c!=name_skB.
% 1.67/2.12  0 [] name_c!=name_skS.
% 1.67/2.12  0 [] name_objective!=name_skA.
% 1.67/2.12  0 [] name_objective!=name_skB.
% 1.67/2.12  0 [] name_objective!=name_skS.
% 1.67/2.12  0 [] name_skA!=name_skB.
% 1.67/2.12  0 [] name_skA!=name_skS.
% 1.67/2.12  0 [] name_skB!=name_skS.
% 1.67/2.12  0 [] constr_adec(constr_aenc(VAR_M_17,constr_pkey(VAR_K_18)),VAR_K_18)=VAR_M_17.
% 1.67/2.12  0 [] constr_dec(constr_enc(VAR_M_15,VAR_K_16),VAR_K_16)=VAR_M_15.
% 1.67/2.12  0 [] constr_getmess(constr_sign(VAR_M_13,VAR_K_14))=VAR_M_13.
% 1.67/2.12  0 [] constr_checksign(constr_sign(VAR_M_0X30,VAR_K_0X30),constr_pkey(VAR_K_0X30))=VAR_M_0X30.
% 1.67/2.12  0 [] constr_tuple_2_get_1_bitstring(tuple_2(VAR_X0X30_11,VAR_X1_12))=VAR_X1_12.
% 1.67/2.12  0 [] constr_tuple_2_get_0x30_bitstring(tuple_2(VAR_X0X30_9,VAR_X1_10X30))=VAR_X0X30_9.
% 1.67/2.12  0 [] constr_tuple_2_get_1(tuple_2(VAR_X0X30_7,VAR_X1_8))=VAR_X1_8.
% 1.67/2.12  0 [] constr_tuple_2_get_0x30(tuple_2(VAR_X0X30_0X30,VAR_X1_0X30))=VAR_X0X30_0X30.
% 1.67/2.12  0 [] pred_e_q_bitstring_bitstring(VAR_X_35,VAR_Y_36).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_42)|pred_attacker(constr_tuple_2_get_1_bitstring(VAR_V_42)).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_44)|pred_attacker(constr_tuple_2_get_1(VAR_V_44)).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_46)|pred_attacker(constr_tuple_2_get_0x30_bitstring(VAR_V_46)).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_48)|pred_attacker(constr_tuple_2_get_0x30(VAR_V_48)).
% 1.67/2.12  0 [] pred_attacker(tuple_true).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_51)| -pred_attacker(VAR_V_52)|pred_attacker(constr_sign(VAR_V_51,VAR_V_52)).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_54)|pred_attacker(constr_pkey(VAR_V_54)).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_56)|pred_attacker(tuple_out_3(VAR_V_56)).
% 1.67/2.12  0 [] -pred_attacker(tuple_out_3(VAR_V_59))|pred_attacker(VAR_V_59).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_62)|pred_attacker(tuple_out_2(VAR_V_62)).
% 1.67/2.12  0 [] -pred_attacker(tuple_out_2(VAR_V_65))|pred_attacker(VAR_V_65).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_68)|pred_attacker(tuple_out_1(VAR_V_68)).
% 1.67/2.12  0 [] -pred_attacker(tuple_out_1(VAR_V_71))|pred_attacker(VAR_V_71).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_75)|pred_attacker(tuple_key_retrieval_server_out_2(VAR_V_75)).
% 1.67/2.12  0 [] -pred_attacker(tuple_key_retrieval_server_out_2(VAR_V_78))|pred_attacker(VAR_V_78).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_82)| -pred_attacker(VAR_V_83)|pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_82,VAR_V_83)).
% 1.67/2.12  0 [] -pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_90X30,VAR_V_91))|pred_attacker(VAR_V_90X30).
% 1.67/2.12  0 [] -pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_93,VAR_V_94))|pred_attacker(VAR_V_94).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_98)| -pred_attacker(VAR_V_99)|pred_attacker(tuple_key_register_server_in_1(VAR_V_98,VAR_V_99)).
% 1.67/2.12  0 [] -pred_attacker(tuple_key_register_server_in_1(VAR_V_10X306,VAR_V_10X307))|pred_attacker(VAR_V_10X306).
% 1.67/2.12  0 [] -pred_attacker(tuple_key_register_server_in_1(VAR_V_10X309,VAR_V_110X30))|pred_attacker(VAR_V_110X30).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_113)|pred_attacker(constr_getmess(VAR_V_113)).
% 1.67/2.12  0 [] pred_attacker(tuple_false).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_116)| -pred_attacker(VAR_V_117)|pred_attacker(constr_enc(VAR_V_116,VAR_V_117)).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_120X30)| -pred_attacker(VAR_V_121)|pred_attacker(constr_dec(VAR_V_120X30,VAR_V_121)).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_123)|pred_attacker(tuple_client_B_out_6(VAR_V_123)).
% 1.67/2.12  0 [] -pred_attacker(tuple_client_B_out_6(VAR_V_126))|pred_attacker(VAR_V_126).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_129)|pred_attacker(tuple_client_B_out_4(VAR_V_129)).
% 1.67/2.12  0 [] -pred_attacker(tuple_client_B_out_4(VAR_V_132))|pred_attacker(VAR_V_132).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_136)| -pred_attacker(VAR_V_137)|pred_attacker(tuple_client_B_out_1(VAR_V_136,VAR_V_137)).
% 1.67/2.12  0 [] -pred_attacker(tuple_client_B_out_1(VAR_V_144,VAR_V_145))|pred_attacker(VAR_V_144).
% 1.67/2.12  0 [] -pred_attacker(tuple_client_B_out_1(VAR_V_147,VAR_V_148))|pred_attacker(VAR_V_148).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_151)|pred_attacker(tuple_client_B_in_5(VAR_V_151)).
% 1.67/2.12  0 [] -pred_attacker(tuple_client_B_in_5(VAR_V_154))|pred_attacker(VAR_V_154).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_157)|pred_attacker(tuple_client_B_in_3(VAR_V_157)).
% 1.67/2.12  0 [] -pred_attacker(tuple_client_B_in_3(VAR_V_160X30))|pred_attacker(VAR_V_160X30).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_163)|pred_attacker(tuple_client_B_in_2(VAR_V_163)).
% 1.67/2.12  0 [] -pred_attacker(tuple_client_B_in_2(VAR_V_166))|pred_attacker(VAR_V_166).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_169)|pred_attacker(tuple_client_A_out_5(VAR_V_169)).
% 1.67/2.12  0 [] -pred_attacker(tuple_client_A_out_5(VAR_V_172))|pred_attacker(VAR_V_172).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_175)|pred_attacker(tuple_client_A_out_3(VAR_V_175)).
% 1.67/2.12  0 [] -pred_attacker(tuple_client_A_out_3(VAR_V_178))|pred_attacker(VAR_V_178).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_182)| -pred_attacker(VAR_V_183)|pred_attacker(tuple_client_A_out_1(VAR_V_182,VAR_V_183)).
% 1.67/2.12  0 [] -pred_attacker(tuple_client_A_out_1(VAR_V_190X30,VAR_V_191))|pred_attacker(VAR_V_190X30).
% 1.67/2.12  0 [] -pred_attacker(tuple_client_A_out_1(VAR_V_193,VAR_V_194))|pred_attacker(VAR_V_194).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_197)|pred_attacker(tuple_client_A_in_4(VAR_V_197)).
% 1.67/2.12  0 [] -pred_attacker(tuple_client_A_in_4(VAR_V_20X300X30))|pred_attacker(VAR_V_20X300X30).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_20X303)|pred_attacker(tuple_client_A_in_2(VAR_V_20X303)).
% 1.67/2.12  0 [] -pred_attacker(tuple_client_A_in_2(VAR_V_20X306))|pred_attacker(VAR_V_20X306).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_210X30)| -pred_attacker(VAR_V_211)|pred_attacker(constr_checksign(VAR_V_210X30,VAR_V_211)).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_214)| -pred_attacker(VAR_V_215)|pred_attacker(constr_aenc(VAR_V_214,VAR_V_215)).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_218)| -pred_attacker(VAR_V_219)|pred_attacker(constr_adec(VAR_V_218,VAR_V_219)).
% 1.67/2.12  0 [] pred_attacker(constr_CONST_4).
% 1.67/2.12  0 [] pred_attacker(constr_CONST_3).
% 1.67/2.12  0 [] pred_attacker(constr_CONST_2).
% 1.67/2.12  0 [] pred_attacker(constr_CONST_1).
% 1.67/2.12  0 [] pred_attacker(constr_CONST_0x30).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_226)| -pred_attacker(VAR_V_227)|pred_attacker(tuple_2(VAR_V_226,VAR_V_227)).
% 1.67/2.12  0 [] -pred_attacker(tuple_2(VAR_V_234,VAR_V_235))|pred_attacker(VAR_V_234).
% 1.67/2.12  0 [] -pred_attacker(tuple_2(VAR_V_237,VAR_V_238))|pred_attacker(VAR_V_238).
% 1.67/2.12  0 [] -pred_mess(VAR_V_241,VAR_V_240X30)| -pred_attacker(VAR_V_241)|pred_attacker(VAR_V_240X30).
% 1.67/2.12  0 [] -pred_attacker(VAR_V_243)| -pred_attacker(VAR_V_242)|pred_mess(VAR_V_243,VAR_V_242).
% 1.67/2.12  0 [] pred_attacker(name_c).
% 1.67/2.12  0 [] pred_attacker(name_I).
% 1.67/2.12  0 [] pred_attacker(name_B).
% 1.67/2.12  0 [] pred_attacker(name_A).
% 1.67/2.12  0 [] pred_e_qual(VAR_V_245,VAR_V_245).
% 1.67/2.12  0 [] pred_attacker(name_new0x2Dname(VAR_V_246)).
% 1.67/2.12  0 [] pred_table(tuple_keys(name_A,constr_pkey(name_skA))).
% 1.67/2.12  0 [] pred_table(tuple_keys(name_B,constr_pkey(name_skB))).
% 1.67/2.12  0 [] pred_attacker(tuple_out_1(constr_pkey(name_skA))).
% 1.67/2.12  0 [] pred_attacker(tuple_out_2(constr_pkey(name_skB))).
% 1.67/2.12  0 [] pred_attacker(tuple_out_3(constr_pkey(name_skS))).
% 1.67/2.12  0 [] pred_attacker(tuple_client_A_out_1(name_A,name_I)).
% 1.67/2.12  0 [] -pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_I_PKI_365,constr_pkey(name_skS))))| -pred_attacker(tuple_client_A_in_2(VAR_SIGN_I_PKI_365))|pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(VAR_0X40SID_366),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_I_PKI_365,constr_pkey(name_skS)))))).
% 1.67/2.12  0 [] -pred_e_q_bitstring_bitstring(name_Na(VAR_0X40SID_414),constr_tuple_2_get_0x30(constr_adec(VAR_AENC_NA_NI_415,name_skA)))| -pred_attacker(tuple_client_A_in_4(VAR_AENC_NA_NI_415))| -pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_I_PKI_416,constr_pkey(name_skS))))| -pred_attacker(tuple_client_A_in_2(VAR_SIGN_I_PKI_416))|pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(VAR_AENC_NA_NI_415,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_I_PKI_416,constr_pkey(name_skS)))))).
% 1.67/2.12  0 [] pred_attacker(tuple_client_B_out_1(name_B,name_A)).
% 1.67/2.12  0 [] -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(VAR_AENC_NA_A_521,name_skB)))| -pred_attacker(tuple_client_B_in_3(VAR_AENC_NA_A_521))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_A_PKA_522,constr_pkey(name_skS))))| -pred_attacker(tuple_client_B_in_2(VAR_SIGN_A_PKA_522))|pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(VAR_AENC_NA_A_521,name_skB)),name_Nb(VAR_0X40SID_523)),constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_A_PKA_522,constr_pkey(name_skS)))))).
% 1.67/2.12  0 [] -pred_e_q_bitstring_bitstring(name_Nb(VAR_0X40SID_545),constr_adec(VAR_AENC_NB_546,name_skB))| -pred_attacker(tuple_client_B_in_5(VAR_AENC_NB_546))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(VAR_AENC_NA_A_547,name_skB)))| -pred_attacker(tuple_client_B_in_3(VAR_AENC_NA_A_547))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_A_PKA_548,constr_pkey(name_skS))))| -pred_attacker(tuple_client_B_in_2(VAR_SIGN_A_PKA_548))|pred_attacker(tuple_client_B_out_6(name_objective)).
% 1.67/2.12  0 [] -pred_table(tuple_keys(VAR_DST_587,VAR_PKDST_588))| -pred_attacker(tuple_key_retrieval_server_in_1(VAR_SRC_589,VAR_DST_587))|pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(VAR_DST_587,VAR_PKDST_588),name_skS))).
% 1.67/2.12  0 [] VAR_HOST_641=name_B|VAR_HOST_641=name_A| -pred_attacker(tuple_key_register_server_in_1(VAR_HOST_641,VAR_PK_642))|pred_table(tuple_keys(VAR_HOST_641,VAR_PK_642)).
% 1.67/2.12  0 [] -pred_attacker(name_objective).
% 1.67/2.12  end_of_list.
% 1.67/2.12  
% 1.67/2.12  SCAN INPUT: prop=0, horn=0, equality=1, symmetry=0, max_lits=7.
% 1.67/2.12  
% 1.67/2.12  This ia a non-Horn set with equality.  The strategy will be
% 1.67/2.12  Knuth-Bendix, ordered hyper_res, factoring, and unit
% 1.67/2.12  deletion, with positive clauses in sos and nonpositive
% 1.67/2.12  clauses in usable.
% 1.67/2.12  
% 1.67/2.12     dependent: set(knuth_bendix).
% 1.67/2.12     dependent: set(anl_eq).
% 1.67/2.12     dependent: set(para_from).
% 1.67/2.12     dependent: set(para_into).
% 1.67/2.12     dependent: clear(para_from_right).
% 1.67/2.12     dependent: clear(para_into_right).
% 1.67/2.12     dependent: set(para_from_vars).
% 1.67/2.12     dependent: set(eq_units_both_ways).
% 1.67/2.12     dependent: set(dynamic_demod_all).
% 1.67/2.12     dependent: set(dynamic_demod).
% 1.67/2.12     dependent: set(order_eq).
% 1.67/2.12     dependent: set(back_demod).
% 1.67/2.12     dependent: set(lrpo).
% 1.67/2.12     dependent: set(hyper_res).
% 1.67/2.12     dependent: set(unit_deletion).
% 1.67/2.12     dependent: set(factor).
% 1.67/2.12  
% 1.67/2.12  ------------> process usable:
% 1.67/2.12  ** KEPT (pick-wt=3): 2 [copy,1,flip.1] constr_CONST_1!=constr_CONST_0x30.
% 1.67/2.12  ** KEPT (pick-wt=3): 4 [copy,3,flip.1] constr_CONST_2!=constr_CONST_0x30.
% 1.67/2.12  ** KEPT (pick-wt=3): 6 [copy,5,flip.1] constr_CONST_3!=constr_CONST_0x30.
% 1.67/2.12  ** KEPT (pick-wt=3): 8 [copy,7,flip.1] constr_CONST_4!=constr_CONST_0x30.
% 1.67/2.12  ** KEPT (pick-wt=3): 10 [copy,9,flip.1] name_A!=constr_CONST_0x30.
% 1.67/2.12  ** KEPT (pick-wt=3): 12 [copy,11,flip.1] name_B!=constr_CONST_0x30.
% 1.67/2.12  ** KEPT (pick-wt=3): 14 [copy,13,flip.1] name_I!=constr_CONST_0x30.
% 1.67/2.12  ** KEPT (pick-wt=3): 16 [copy,15,flip.1] name_c!=constr_CONST_0x30.
% 1.67/2.12  ** KEPT (pick-wt=3): 18 [copy,17,flip.1] name_objective!=constr_CONST_0x30.
% 1.67/2.12  ** KEPT (pick-wt=3): 20 [copy,19,flip.1] name_skA!=constr_CONST_0x30.
% 1.67/2.12  ** KEPT (pick-wt=3): 22 [copy,21,flip.1] name_skB!=constr_CONST_0x30.
% 1.67/2.12  ** KEPT (pick-wt=3): 24 [copy,23,flip.1] name_skS!=constr_CONST_0x30.
% 1.67/2.12  ** KEPT (pick-wt=3): 26 [copy,25,flip.1] constr_CONST_2!=constr_CONST_1.
% 1.67/2.12  ** KEPT (pick-wt=3): 28 [copy,27,flip.1] constr_CONST_3!=constr_CONST_1.
% 1.67/2.12  ** KEPT (pick-wt=3): 30 [copy,29,flip.1] constr_CONST_4!=constr_CONST_1.
% 1.67/2.12  ** KEPT (pick-wt=3): 32 [copy,31,flip.1] name_A!=constr_CONST_1.
% 1.67/2.12  ** KEPT (pick-wt=3): 34 [copy,33,flip.1] name_B!=constr_CONST_1.
% 1.67/2.12  ** KEPT (pick-wt=3): 36 [copy,35,flip.1] name_I!=constr_CONST_1.
% 1.67/2.12  ** KEPT (pick-wt=3): 38 [copy,37,flip.1] name_c!=constr_CONST_1.
% 1.67/2.12  ** KEPT (pick-wt=3): 40 [copy,39,flip.1] name_objective!=constr_CONST_1.
% 1.67/2.12  ** KEPT (pick-wt=3): 42 [copy,41,flip.1] name_skA!=constr_CONST_1.
% 1.67/2.12  ** KEPT (pick-wt=3): 44 [copy,43,flip.1] name_skB!=constr_CONST_1.
% 1.67/2.12  ** KEPT (pick-wt=3): 46 [copy,45,flip.1] name_skS!=constr_CONST_1.
% 1.67/2.12  ** KEPT (pick-wt=3): 48 [copy,47,flip.1] constr_CONST_3!=constr_CONST_2.
% 1.67/2.12  ** KEPT (pick-wt=3): 50 [copy,49,flip.1] constr_CONST_4!=constr_CONST_2.
% 1.67/2.12  ** KEPT (pick-wt=3): 52 [copy,51,flip.1] name_A!=constr_CONST_2.
% 1.67/2.12  ** KEPT (pick-wt=3): 54 [copy,53,flip.1] name_B!=constr_CONST_2.
% 1.67/2.12  ** KEPT (pick-wt=3): 56 [copy,55,flip.1] name_I!=constr_CONST_2.
% 1.67/2.12  ** KEPT (pick-wt=3): 58 [copy,57,flip.1] name_c!=constr_CONST_2.
% 1.67/2.12  ** KEPT (pick-wt=3): 60 [copy,59,flip.1] name_objective!=constr_CONST_2.
% 1.67/2.12  ** KEPT (pick-wt=3): 62 [copy,61,flip.1] name_skA!=constr_CONST_2.
% 1.67/2.12  ** KEPT (pick-wt=3): 64 [copy,63,flip.1] name_skB!=constr_CONST_2.
% 1.67/2.12  ** KEPT (pick-wt=3): 66 [copy,65,flip.1] name_skS!=constr_CONST_2.
% 1.67/2.12  ** KEPT (pick-wt=3): 68 [copy,67,flip.1] constr_CONST_4!=constr_CONST_3.
% 1.67/2.12  ** KEPT (pick-wt=3): 70 [copy,69,flip.1] name_A!=constr_CONST_3.
% 1.67/2.12  ** KEPT (pick-wt=3): 72 [copy,71,flip.1] name_B!=constr_CONST_3.
% 1.67/2.12  ** KEPT (pick-wt=3): 74 [copy,73,flip.1] name_I!=constr_CONST_3.
% 1.67/2.12  ** KEPT (pick-wt=3): 76 [copy,75,flip.1] name_c!=constr_CONST_3.
% 1.67/2.12  ** KEPT (pick-wt=3): 78 [copy,77,flip.1] name_objective!=constr_CONST_3.
% 1.67/2.12  ** KEPT (pick-wt=3): 80 [copy,79,flip.1] name_skA!=constr_CONST_3.
% 1.67/2.12  ** KEPT (pick-wt=3): 82 [copy,81,flip.1] name_skB!=constr_CONST_3.
% 1.67/2.12  ** KEPT (pick-wt=3): 84 [copy,83,flip.1] name_skS!=constr_CONST_3.
% 1.67/2.12  ** KEPT (pick-wt=3): 86 [copy,85,flip.1] name_A!=constr_CONST_4.
% 1.67/2.12  ** KEPT (pick-wt=3): 88 [copy,87,flip.1] name_B!=constr_CONST_4.
% 1.67/2.12  ** KEPT (pick-wt=3): 90 [copy,89,flip.1] name_I!=constr_CONST_4.
% 1.67/2.12  ** KEPT (pick-wt=3): 92 [copy,91,flip.1] name_c!=constr_CONST_4.
% 1.67/2.12  ** KEPT (pick-wt=3): 94 [copy,93,flip.1] name_objective!=constr_CONST_4.
% 1.67/2.12  ** KEPT (pick-wt=3): 96 [copy,95,flip.1] name_skA!=constr_CONST_4.
% 1.67/2.12  ** KEPT (pick-wt=3): 98 [copy,97,flip.1] name_skB!=constr_CONST_4.
% 1.67/2.12  ** KEPT (pick-wt=3): 100 [copy,99,flip.1] name_skS!=constr_CONST_4.
% 1.67/2.12  ** KEPT (pick-wt=3): 102 [copy,101,flip.1] name_B!=name_A.
% 1.67/2.12  ** KEPT (pick-wt=3): 104 [copy,103,flip.1] name_I!=name_A.
% 1.67/2.12  ** KEPT (pick-wt=3): 106 [copy,105,flip.1] name_c!=name_A.
% 1.67/2.12  ** KEPT (pick-wt=3): 108 [copy,107,flip.1] name_objective!=name_A.
% 1.67/2.12  ** KEPT (pick-wt=3): 110 [copy,109,flip.1] name_skA!=name_A.
% 1.67/2.12  ** KEPT (pick-wt=3): 112 [copy,111,flip.1] name_skB!=name_A.
% 1.67/2.12  ** KEPT (pick-wt=3): 114 [copy,113,flip.1] name_skS!=name_A.
% 1.67/2.12  ** KEPT (pick-wt=3): 116 [copy,115,flip.1] name_I!=name_B.
% 1.67/2.12  ** KEPT (pick-wt=3): 118 [copy,117,flip.1] name_c!=name_B.
% 1.67/2.12  ** KEPT (pick-wt=3): 120 [copy,119,flip.1] name_objective!=name_B.
% 1.67/2.12  ** KEPT (pick-wt=3): 122 [copy,121,flip.1] name_skA!=name_B.
% 1.67/2.12  ** KEPT (pick-wt=3): 124 [copy,123,flip.1] name_skB!=name_B.
% 1.67/2.12  ** KEPT (pick-wt=3): 126 [copy,125,flip.1] name_skS!=name_B.
% 1.67/2.12  ** KEPT (pick-wt=3): 128 [copy,127,flip.1] name_c!=name_I.
% 1.67/2.12  ** KEPT (pick-wt=3): 130 [copy,129,flip.1] name_objective!=name_I.
% 1.67/2.12  ** KEPT (pick-wt=3): 132 [copy,131,flip.1] name_skA!=name_I.
% 1.67/2.12  ** KEPT (pick-wt=3): 134 [copy,133,flip.1] name_skB!=name_I.
% 1.67/2.12  ** KEPT (pick-wt=3): 136 [copy,135,flip.1] name_skS!=name_I.
% 1.67/2.12  ** KEPT (pick-wt=3): 138 [copy,137,flip.1] name_objective!=name_c.
% 1.67/2.12  ** KEPT (pick-wt=3): 140 [copy,139,flip.1] name_skA!=name_c.
% 1.67/2.12  ** KEPT (pick-wt=3): 142 [copy,141,flip.1] name_skB!=name_c.
% 1.67/2.12  ** KEPT (pick-wt=3): 144 [copy,143,flip.1] name_skS!=name_c.
% 1.67/2.12  ** KEPT (pick-wt=3): 146 [copy,145,flip.1] name_skA!=name_objective.
% 1.67/2.12  ** KEPT (pick-wt=3): 148 [copy,147,flip.1] name_skB!=name_objective.
% 1.67/2.12  ** KEPT (pick-wt=3): 150 [copy,149,flip.1] name_skS!=name_objective.
% 1.67/2.12  ** KEPT (pick-wt=3): 152 [copy,151,flip.1] name_skB!=name_skA.
% 1.67/2.12  ** KEPT (pick-wt=3): 154 [copy,153,flip.1] name_skS!=name_skA.
% 1.67/2.12  ** KEPT (pick-wt=3): 156 [copy,155,flip.1] name_skS!=name_skB.
% 1.67/2.12  ** KEPT (pick-wt=5): 157 [] -pred_attacker(A)|pred_attacker(constr_tuple_2_get_1_bitstring(A)).
% 1.67/2.12  ** KEPT (pick-wt=5): 158 [] -pred_attacker(A)|pred_attacker(constr_tuple_2_get_1(A)).
% 1.67/2.12  ** KEPT (pick-wt=5): 159 [] -pred_attacker(A)|pred_attacker(constr_tuple_2_get_0x30_bitstring(A)).
% 1.67/2.12  ** KEPT (pick-wt=5): 160 [] -pred_attacker(A)|pred_attacker(constr_tuple_2_get_0x30(A)).
% 1.67/2.12  ** KEPT (pick-wt=8): 161 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_sign(A,B)).
% 1.67/2.12  ** KEPT (pick-wt=5): 162 [] -pred_attacker(A)|pred_attacker(constr_pkey(A)).
% 1.67/2.12  ** KEPT (pick-wt=5): 163 [] -pred_attacker(A)|pred_attacker(tuple_out_3(A)).
% 1.67/2.12  ** KEPT (pick-wt=5): 164 [] -pred_attacker(tuple_out_3(A))|pred_attacker(A).
% 1.67/2.12  ** KEPT (pick-wt=5): 165 [] -pred_attacker(A)|pred_attacker(tuple_out_2(A)).
% 1.67/2.12  ** KEPT (pick-wt=5): 166 [] -pred_attacker(tuple_out_2(A))|pred_attacker(A).
% 1.67/2.12  ** KEPT (pick-wt=5): 167 [] -pred_attacker(A)|pred_attacker(tuple_out_1(A)).
% 1.67/2.12  ** KEPT (pick-wt=5): 168 [] -pred_attacker(tuple_out_1(A))|pred_attacker(A).
% 1.67/2.12  ** KEPT (pick-wt=5): 169 [] -pred_attacker(A)|pred_attacker(tuple_key_retrieval_server_out_2(A)).
% 1.67/2.12  ** KEPT (pick-wt=5): 170 [] -pred_attacker(tuple_key_retrieval_server_out_2(A))|pred_attacker(A).
% 1.67/2.12  ** KEPT (pick-wt=8): 171 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(tuple_key_retrieval_server_in_1(A,B)).
% 1.67/2.12  ** KEPT (pick-wt=6): 172 [] -pred_attacker(tuple_key_retrieval_server_in_1(A,B))|pred_attacker(A).
% 1.67/2.12  ** KEPT (pick-wt=6): 173 [] -pred_attacker(tuple_key_retrieval_server_in_1(A,B))|pred_attacker(B).
% 1.67/2.12  ** KEPT (pick-wt=8): 174 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(tuple_key_register_server_in_1(A,B)).
% 1.67/2.12  ** KEPT (pick-wt=6): 175 [] -pred_attacker(tuple_key_register_server_in_1(A,B))|pred_attacker(A).
% 1.67/2.12  ** KEPT (pick-wt=6): 176 [] -pred_attacker(tuple_key_register_server_in_1(A,B))|pred_attacker(B).
% 1.67/2.12  ** KEPT (pick-wt=5): 177 [] -pred_attacker(A)|pred_attacker(constr_getmess(A)).
% 1.67/2.12  ** KEPT (pick-wt=8): 178 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_enc(A,B)).
% 1.67/2.12  ** KEPT (pick-wt=8): 179 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_dec(A,B)).
% 1.67/2.12  ** KEPT (pick-wt=5): 180 [] -pred_attacker(A)|pred_attacker(tuple_client_B_out_6(A)).
% 1.67/2.12  ** KEPT (pick-wt=5): 181 [] -pred_attacker(tuple_client_B_out_6(A))|pred_attacker(A).
% 1.67/2.12  ** KEPT (pick-wt=5): 182 [] -pred_attacker(A)|pred_attacker(tuple_client_B_out_4(A)).
% 1.67/2.12  ** KEPT (pick-wt=5): 183 [] -pred_attacker(tuple_client_B_out_4(A))|pred_attacker(A).
% 1.67/2.12  ** KEPT (pick-wt=8): 184 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(tuple_client_B_out_1(A,B)).
% 1.67/2.12  ** KEPT (pick-wt=6): 185 [] -pred_attacker(tuple_client_B_out_1(A,B))|pred_attacker(A).
% 1.67/2.12  ** KEPT (pick-wt=6): 186 [] -pred_attacker(tuple_client_B_out_1(A,B))|pred_attacker(B).
% 1.67/2.12  ** KEPT (pick-wt=5): 187 [] -pred_attacker(A)|pred_attacker(tuple_client_B_in_5(A)).
% 1.98/2.12  ** KEPT (pick-wt=5): 188 [] -pred_attacker(tuple_client_B_in_5(A))|pred_attacker(A).
% 1.98/2.12  ** KEPT (pick-wt=5): 189 [] -pred_attacker(A)|pred_attacker(tuple_client_B_in_3(A)).
% 1.98/2.12  ** KEPT (pick-wt=5): 190 [] -pred_attacker(tuple_client_B_in_3(A))|pred_attacker(A).
% 1.98/2.12  ** KEPT (pick-wt=5): 191 [] -pred_attacker(A)|pred_attacker(tuple_client_B_in_2(A)).
% 1.98/2.12  ** KEPT (pick-wt=5): 192 [] -pred_attacker(tuple_client_B_in_2(A))|pred_attacker(A).
% 1.98/2.12  ** KEPT (pick-wt=5): 193 [] -pred_attacker(A)|pred_attacker(tuple_client_A_out_5(A)).
% 1.98/2.12  ** KEPT (pick-wt=5): 194 [] -pred_attacker(tuple_client_A_out_5(A))|pred_attacker(A).
% 1.98/2.12  ** KEPT (pick-wt=5): 195 [] -pred_attacker(A)|pred_attacker(tuple_client_A_out_3(A)).
% 1.98/2.12  ** KEPT (pick-wt=5): 196 [] -pred_attacker(tuple_client_A_out_3(A))|pred_attacker(A).
% 1.98/2.12  ** KEPT (pick-wt=8): 197 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(tuple_client_A_out_1(A,B)).
% 1.98/2.12  ** KEPT (pick-wt=6): 198 [] -pred_attacker(tuple_client_A_out_1(A,B))|pred_attacker(A).
% 1.98/2.12  ** KEPT (pick-wt=6): 199 [] -pred_attacker(tuple_client_A_out_1(A,B))|pred_attacker(B).
% 1.98/2.12  ** KEPT (pick-wt=5): 200 [] -pred_attacker(A)|pred_attacker(tuple_client_A_in_4(A)).
% 1.98/2.12  ** KEPT (pick-wt=5): 201 [] -pred_attacker(tuple_client_A_in_4(A))|pred_attacker(A).
% 1.98/2.12  ** KEPT (pick-wt=5): 202 [] -pred_attacker(A)|pred_attacker(tuple_client_A_in_2(A)).
% 1.98/2.12  ** KEPT (pick-wt=5): 203 [] -pred_attacker(tuple_client_A_in_2(A))|pred_attacker(A).
% 1.98/2.12  ** KEPT (pick-wt=8): 204 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_checksign(A,B)).
% 1.98/2.12  ** KEPT (pick-wt=8): 205 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_aenc(A,B)).
% 1.98/2.12  ** KEPT (pick-wt=8): 206 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_adec(A,B)).
% 1.98/2.12  ** KEPT (pick-wt=8): 207 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(tuple_2(A,B)).
% 1.98/2.12  ** KEPT (pick-wt=6): 208 [] -pred_attacker(tuple_2(A,B))|pred_attacker(A).
% 1.98/2.12  ** KEPT (pick-wt=6): 209 [] -pred_attacker(tuple_2(A,B))|pred_attacker(B).
% 1.98/2.12  ** KEPT (pick-wt=7): 210 [] -pred_mess(A,B)| -pred_attacker(A)|pred_attacker(B).
% 1.98/2.12  ** KEPT (pick-wt=7): 211 [] -pred_attacker(A)| -pred_attacker(B)|pred_mess(A,B).
% 1.98/2.12  ** KEPT (pick-wt=22): 212 [] -pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(A,constr_pkey(name_skS))))| -pred_attacker(tuple_client_A_in_2(A))|pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(B),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(A,constr_pkey(name_skS)))))).
% 1.98/2.12  ** KEPT (pick-wt=32): 213 [] -pred_e_q_bitstring_bitstring(name_Na(A),constr_tuple_2_get_0x30(constr_adec(B,name_skA)))| -pred_attacker(tuple_client_A_in_4(B))| -pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(C,constr_pkey(name_skS))))| -pred_attacker(tuple_client_A_in_2(C))|pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(B,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(C,constr_pkey(name_skS)))))).
% 1.98/2.12  ** KEPT (pick-wt=34): 214 [] -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(A,name_skB)))| -pred_attacker(tuple_client_B_in_3(A))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(B,constr_pkey(name_skS))))| -pred_attacker(tuple_client_B_in_2(B))|pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(A,name_skB)),name_Nb(C)),constr_tuple_2_get_1_bitstring(constr_checksign(B,constr_pkey(name_skS)))))).
% 1.98/2.12  ** KEPT (pick-wt=31): 215 [] -pred_e_q_bitstring_bitstring(name_Nb(A),constr_adec(B,name_skB))| -pred_attacker(tuple_client_B_in_5(B))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(C,name_skB)))| -pred_attacker(tuple_client_B_in_3(C))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(D,constr_pkey(name_skS))))| -pred_attacker(tuple_client_B_in_2(D))|pred_attacker(tuple_client_B_out_6(name_objective)).
% 1.98/2.12  ** KEPT (pick-wt=15): 216 [] -pred_table(tuple_keys(A,B))| -pred_attacker(tuple_key_retrieval_server_in_1(C,A))|pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(A,B),name_skS))).
% 3.04/3.28  ** KEPT (pick-wt=14): 217 [] A=name_B|A=name_A| -pred_attacker(tuple_key_register_server_in_1(A,B))|pred_table(tuple_keys(A,B)).
% 3.04/3.28  ** KEPT (pick-wt=2): 218 [] -pred_attacker(name_objective).
% 3.04/3.28  
% 3.04/3.28  ------------> process sos:
% 3.04/3.28  ** KEPT (pick-wt=3): 231 [] A=A.
% 3.04/3.28  ** KEPT (pick-wt=8): 232 [] constr_adec(constr_aenc(A,constr_pkey(B)),B)=A.
% 3.04/3.28  ---> New Demodulator: 233 [new_demod,232] constr_adec(constr_aenc(A,constr_pkey(B)),B)=A.
% 3.04/3.28  ** KEPT (pick-wt=7): 234 [] constr_dec(constr_enc(A,B),B)=A.
% 3.04/3.28  ---> New Demodulator: 235 [new_demod,234] constr_dec(constr_enc(A,B),B)=A.
% 3.04/3.28  ** KEPT (pick-wt=6): 236 [] constr_getmess(constr_sign(A,B))=A.
% 3.04/3.28  ---> New Demodulator: 237 [new_demod,236] constr_getmess(constr_sign(A,B))=A.
% 3.04/3.28  ** KEPT (pick-wt=8): 238 [] constr_checksign(constr_sign(A,B),constr_pkey(B))=A.
% 3.04/3.28  ---> New Demodulator: 239 [new_demod,238] constr_checksign(constr_sign(A,B),constr_pkey(B))=A.
% 3.04/3.28  ** KEPT (pick-wt=6): 240 [] constr_tuple_2_get_1_bitstring(tuple_2(A,B))=B.
% 3.04/3.28  ---> New Demodulator: 241 [new_demod,240] constr_tuple_2_get_1_bitstring(tuple_2(A,B))=B.
% 3.04/3.28  ** KEPT (pick-wt=6): 242 [] constr_tuple_2_get_0x30_bitstring(tuple_2(A,B))=A.
% 3.04/3.28  ---> New Demodulator: 243 [new_demod,242] constr_tuple_2_get_0x30_bitstring(tuple_2(A,B))=A.
% 3.04/3.28  ** KEPT (pick-wt=6): 244 [] constr_tuple_2_get_1(tuple_2(A,B))=B.
% 3.04/3.28  ---> New Demodulator: 245 [new_demod,244] constr_tuple_2_get_1(tuple_2(A,B))=B.
% 3.04/3.28  ** KEPT (pick-wt=6): 246 [] constr_tuple_2_get_0x30(tuple_2(A,B))=A.
% 3.04/3.28  ---> New Demodulator: 247 [new_demod,246] constr_tuple_2_get_0x30(tuple_2(A,B))=A.
% 3.04/3.28  ** KEPT (pick-wt=3): 248 [] pred_e_q_bitstring_bitstring(A,B).
% 3.04/3.28  ** KEPT (pick-wt=2): 249 [] pred_attacker(tuple_true).
% 3.04/3.28  ** KEPT (pick-wt=2): 250 [] pred_attacker(tuple_false).
% 3.04/3.28  ** KEPT (pick-wt=2): 251 [] pred_attacker(constr_CONST_4).
% 3.04/3.28  ** KEPT (pick-wt=2): 252 [] pred_attacker(constr_CONST_3).
% 3.04/3.28  ** KEPT (pick-wt=2): 253 [] pred_attacker(constr_CONST_2).
% 3.04/3.28  ** KEPT (pick-wt=2): 254 [] pred_attacker(constr_CONST_1).
% 3.04/3.28  ** KEPT (pick-wt=2): 255 [] pred_attacker(constr_CONST_0x30).
% 3.04/3.28  ** KEPT (pick-wt=2): 256 [] pred_attacker(name_c).
% 3.04/3.28  ** KEPT (pick-wt=2): 257 [] pred_attacker(name_I).
% 3.04/3.28  ** KEPT (pick-wt=2): 258 [] pred_attacker(name_B).
% 3.04/3.28  ** KEPT (pick-wt=2): 259 [] pred_attacker(name_A).
% 3.04/3.28  ** KEPT (pick-wt=3): 260 [] pred_e_qual(A,A).
% 3.04/3.28  ** KEPT (pick-wt=3): 261 [] pred_attacker(name_new0x2Dname(A)).
% 3.04/3.28  ** KEPT (pick-wt=5): 262 [] pred_table(tuple_keys(name_A,constr_pkey(name_skA))).
% 3.04/3.28  ** KEPT (pick-wt=5): 263 [] pred_table(tuple_keys(name_B,constr_pkey(name_skB))).
% 3.04/3.28  ** KEPT (pick-wt=4): 264 [] pred_attacker(tuple_out_1(constr_pkey(name_skA))).
% 3.04/3.28  ** KEPT (pick-wt=4): 265 [] pred_attacker(tuple_out_2(constr_pkey(name_skB))).
% 3.04/3.28  ** KEPT (pick-wt=4): 266 [] pred_attacker(tuple_out_3(constr_pkey(name_skS))).
% 3.04/3.28  ** KEPT (pick-wt=4): 267 [] pred_attacker(tuple_client_A_out_1(name_A,name_I)).
% 3.04/3.28  ** KEPT (pick-wt=4): 268 [] pred_attacker(tuple_client_B_out_1(name_B,name_A)).
% 3.04/3.28    Following clause subsumed by 231 during input processing: 0 [copy,231,flip.1] A=A.
% 3.04/3.28  >>>> Starting back demodulation with 233.
% 3.04/3.28  >>>> Starting back demodulation with 235.
% 3.04/3.28  >>>> Starting back demodulation with 237.
% 3.04/3.28  >>>> Starting back demodulation with 239.
% 3.04/3.28  >>>> Starting back demodulation with 241.
% 3.04/3.28  >>>> Starting back demodulation with 243.
% 3.04/3.28  >>>> Starting back demodulation with 245.
% 3.04/3.28  >>>> Starting back demodulation with 247.
% 3.04/3.28  
% 3.04/3.28  ======= end of input processing =======
% 3.04/3.28  
% 3.04/3.28  =========== start of search ===========
% 3.04/3.28  
% 3.04/3.28  
% 3.04/3.28  Resetting weight limit to 3.
% 3.04/3.28  
% 3.04/3.28  
% 3.04/3.28  Resetting weight limit to 3.
% 3.04/3.28  
% 3.04/3.28  sos_size=1688
% 3.04/3.28  
% 3.04/3.28  -------- PROOF -------- 
% 3.04/3.28  
% 3.04/3.28  ----> UNIT CONFLICT at   1.15 sec ----> 1950 [binary,1949.1,218.1] $F.
% 3.04/3.28  
% 3.04/3.28  Length of proof is 5.  Level of proof is 3.
% 3.04/3.28  
% 3.04/3.28  ---------------- PROOF ----------------
% 3.04/3.28  % SZS status Theorem
% 3.04/3.28  % SZS output start Refutation
% See solution above
% 3.04/3.28  ------------ end of proof -------------
% 3.04/3.28  
% 3.04/3.28  
% 3.04/3.28  Search stopped by max_proofs option.
% 3.04/3.28  
% 3.04/3.28  
% 3.04/3.28  Search stopped by max_proofs option.
% 3.04/3.28  
% 3.04/3.28  ============ end of search ============
% 3.04/3.28  
% 3.04/3.28  -------------- statistics -------------
% 3.04/3.28  clauses given                432
% 3.04/3.28  clauses generated        1077961
% 3.04/3.28  clauses kept                1863
% 3.04/3.28  clauses forward subsumed     688
% 3.04/3.28  clauses back subsumed          3
% 3.04/3.28  Kbytes malloced             5859
% 3.04/3.28  
% 3.04/3.28  ----------- times (seconds) -----------
% 3.04/3.28  user CPU time          1.15          (0 hr, 0 min, 1 sec)
% 3.04/3.28  system CPU time        0.00          (0 hr, 0 min, 0 sec)
% 3.04/3.28  wall-clock time        3             (0 hr, 0 min, 3 sec)
% 3.04/3.28  
% 3.04/3.28  That finishes the proof of the theorem.
% 3.04/3.28  
% 3.04/3.28  Process 10163 finished Wed Jul 27 03:01:43 2022
% 3.13/3.28  Otter interrupted
% 3.13/3.28  PROOF FOUND
%------------------------------------------------------------------------------