TSTP Solution File: SWW959+1 by SnakeForV---1.0

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : SnakeForV---1.0
% Problem  : SWW959+1 : TPTP v8.1.0. Released v7.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_uns --cores 0 -t %d %s

% Computer : n010.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Wed Aug 31 19:15:08 EDT 2022

% Result   : Theorem 0.20s 0.57s
% Output   : Refutation 0.20s
% Verified : 
% SZS Type : Refutation
%            Derivation depth      :    7
%            Number of leaves      :   14
% Syntax   : Number of formulae    :   60 (  18 unt;   0 def)
%            Number of atoms       :  140 (   0 equ)
%            Maximal formula atoms :    7 (   2 avg)
%            Number of connectives :  152 (  72   ~;  56   |;  10   &)
%                                         (   4 <=>;  10  =>;   0  <=;   0 <~>)
%            Maximal formula depth :   12 (   4 avg)
%            Maximal term depth    :    4 (   2 avg)
%            Number of predicates  :    7 (   6 usr;   5 prp; 0-2 aty)
%            Number of functors    :   18 (  18 usr;   7 con; 0-2 aty)
%            Number of variables   :   60 (  60   !;   0   ?)

% Comments : 
%------------------------------------------------------------------------------
fof(f663,plain,
    $false,
    inference(avatar_sat_refutation,[],[f527,f565,f615,f659,f662]) ).

fof(f662,plain,
    ~ spl0_1,
    inference(avatar_contradiction_clause,[],[f661]) ).

fof(f661,plain,
    ( $false
    | ~ spl0_1 ),
    inference(resolution,[],[f660,f476]) ).

fof(f476,plain,
    ~ pred_attacker(name_objective),
    inference(cnf_transformation,[],[f234]) ).

fof(f234,plain,
    ~ pred_attacker(name_objective),
    inference(flattening,[],[f170]) ).

fof(f170,negated_conjecture,
    ~ pred_attacker(name_objective),
    inference(negated_conjecture,[],[f169]) ).

fof(f169,conjecture,
    pred_attacker(name_objective),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',co0) ).

fof(f660,plain,
    ( pred_attacker(name_objective)
    | ~ spl0_1 ),
    inference(resolution,[],[f517,f404]) ).

fof(f404,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_B_out_6(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f291]) ).

fof(f291,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_B_out_6(X0)) ),
    inference(ennf_transformation,[],[f175]) ).

fof(f175,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_out_6(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f114]) ).

fof(f114,axiom,
    ! [X51] :
      ( pred_attacker(tuple_client_B_out_6(X51))
     => pred_attacker(X51) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax113) ).

fof(f517,plain,
    ( pred_attacker(tuple_client_B_out_6(name_objective))
    | ~ spl0_1 ),
    inference(avatar_component_clause,[],[f515]) ).

fof(f515,plain,
    ( spl0_1
  <=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_1])]) ).

fof(f659,plain,
    ~ spl0_4,
    inference(avatar_contradiction_clause,[],[f622]) ).

fof(f622,plain,
    ( $false
    | ~ spl0_4 ),
    inference(resolution,[],[f617,f352]) ).

fof(f352,plain,
    pred_attacker(constr_CONST_4),
    inference(cnf_transformation,[],[f140]) ).

fof(f140,axiom,
    pred_attacker(constr_CONST_4),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax139) ).

fof(f617,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl0_4 ),
    inference(resolution,[],[f616,f383]) ).

fof(f383,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f267]) ).

fof(f267,plain,
    ! [X0] :
      ( ~ pred_attacker(X0)
      | pred_attacker(tuple_client_B_in_2(X0)) ),
    inference(ennf_transformation,[],[f194]) ).

fof(f194,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_2(X0)) ),
    inference(rectify,[],[f124]) ).

fof(f124,axiom,
    ! [X64] :
      ( pred_attacker(X64)
     => pred_attacker(tuple_client_B_in_2(X64)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax123) ).

fof(f616,plain,
    ( ! [X0] : ~ pred_attacker(tuple_client_B_in_2(X0))
    | ~ spl0_4 ),
    inference(resolution,[],[f526,f501]) ).

fof(f501,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
    inference(cnf_transformation,[],[f208]) ).

fof(f208,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
    inference(rectify,[],[f87]) ).

fof(f87,axiom,
    ! [X16,X17] : pred_eq_bitstring_bitstring(X16,X17),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax86) ).

fof(f526,plain,
    ( ! [X1] :
        ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
        | ~ pred_attacker(tuple_client_B_in_2(X1)) )
    | ~ spl0_4 ),
    inference(avatar_component_clause,[],[f525]) ).

fof(f525,plain,
    ( spl0_4
  <=> ! [X1] :
        ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
        | ~ pred_attacker(tuple_client_B_in_2(X1)) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_4])]) ).

fof(f615,plain,
    ~ spl0_3,
    inference(avatar_contradiction_clause,[],[f597]) ).

fof(f597,plain,
    ( $false
    | ~ spl0_3 ),
    inference(resolution,[],[f572,f351]) ).

fof(f351,plain,
    pred_attacker(tuple_client_A_out_1(name_A,name_I)),
    inference(cnf_transformation,[],[f161]) ).

fof(f161,axiom,
    pred_attacker(tuple_client_A_out_1(name_A,name_I)),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax160) ).

fof(f572,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl0_3 ),
    inference(resolution,[],[f570,f495]) ).

fof(f495,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_5(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f252]) ).

fof(f252,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_5(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f213]) ).

fof(f213,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_5(X0)) ),
    inference(rectify,[],[f120]) ).

fof(f120,axiom,
    ! [X60] :
      ( pred_attacker(X60)
     => pred_attacker(tuple_client_B_in_5(X60)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax119) ).

fof(f570,plain,
    ( ! [X0] : ~ pred_attacker(tuple_client_B_in_5(X0))
    | ~ spl0_3 ),
    inference(resolution,[],[f523,f501]) ).

fof(f523,plain,
    ( ! [X2,X0] :
        ( ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB))
        | ~ pred_attacker(tuple_client_B_in_5(X2)) )
    | ~ spl0_3 ),
    inference(avatar_component_clause,[],[f522]) ).

fof(f522,plain,
    ( spl0_3
  <=> ! [X2,X0] :
        ( ~ pred_attacker(tuple_client_B_in_5(X2))
        | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_3])]) ).

fof(f565,plain,
    ~ spl0_2,
    inference(avatar_contradiction_clause,[],[f531]) ).

fof(f531,plain,
    ( $false
    | ~ spl0_2 ),
    inference(resolution,[],[f529,f375]) ).

fof(f375,plain,
    pred_attacker(constr_CONST_1),
    inference(cnf_transformation,[],[f143]) ).

fof(f143,axiom,
    pred_attacker(constr_CONST_1),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax142) ).

fof(f529,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl0_2 ),
    inference(resolution,[],[f346,f528]) ).

fof(f528,plain,
    ( ! [X0] : ~ pred_attacker(tuple_client_B_in_3(X0))
    | ~ spl0_2 ),
    inference(resolution,[],[f501,f520]) ).

fof(f520,plain,
    ( ! [X3] :
        ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
        | ~ pred_attacker(tuple_client_B_in_3(X3)) )
    | ~ spl0_2 ),
    inference(avatar_component_clause,[],[f519]) ).

fof(f519,plain,
    ( spl0_2
  <=> ! [X3] :
        ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
        | ~ pred_attacker(tuple_client_B_in_3(X3)) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_2])]) ).

fof(f346,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_3(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f323]) ).

fof(f323,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_3(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f218]) ).

fof(f218,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_3(X0)) ),
    inference(rectify,[],[f122]) ).

fof(f122,axiom,
    ! [X62] :
      ( pred_attacker(X62)
     => pred_attacker(tuple_client_B_in_3(X62)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax121) ).

fof(f527,plain,
    ( spl0_1
    | spl0_2
    | spl0_3
    | spl0_4 ),
    inference(avatar_split_clause,[],[f415,f525,f522,f519,f515]) ).

fof(f415,plain,
    ! [X2,X3,X0,X1] :
      ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_5(X2))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_2(X1))
      | pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_3(X3)) ),
    inference(cnf_transformation,[],[f330]) ).

fof(f330,plain,
    ! [X0,X1,X2,X3] :
      ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_2(X1))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB))
      | ~ pred_attacker(tuple_client_B_in_3(X3))
      | pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_5(X2)) ),
    inference(rectify,[],[f271]) ).

fof(f271,plain,
    ! [X3,X1,X2,X0] :
      ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X0,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_2(X1))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X3),constr_adec(X2,name_skB))
      | ~ pred_attacker(tuple_client_B_in_3(X0))
      | pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_5(X2)) ),
    inference(flattening,[],[f270]) ).

fof(f270,plain,
    ! [X1,X0,X3,X2] :
      ( pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_3(X0))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X0,name_skB)))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X3),constr_adec(X2,name_skB))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_2(X1))
      | ~ pred_attacker(tuple_client_B_in_5(X2)) ),
    inference(ennf_transformation,[],[f206]) ).

fof(f206,plain,
    ! [X1,X0,X3,X2] :
      ( ( pred_attacker(tuple_client_B_in_3(X0))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X0,name_skB)))
        & pred_eq_bitstring_bitstring(name_Nb(X3),constr_adec(X2,name_skB))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_2(X1))
        & pred_attacker(tuple_client_B_in_5(X2)) )
     => pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(rectify,[],[f166]) ).

fof(f166,axiom,
    ! [X107,X109,X108,X106] :
      ( ( pred_eq_bitstring_bitstring(name_Nb(X106),constr_adec(X108,name_skB))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X107,name_skB)))
        & pred_attacker(tuple_client_B_in_5(X108))
        & pred_attacker(tuple_client_B_in_3(X107))
        & pred_attacker(tuple_client_B_in_2(X109))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X109,constr_pkey(name_skS)))) )
     => pred_attacker(tuple_client_B_out_6(name_objective)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax165) ).

%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.03/0.12  % Problem    : SWW959+1 : TPTP v8.1.0. Released v7.4.0.
% 0.13/0.13  % Command    : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_uns --cores 0 -t %d %s
% 0.13/0.34  % Computer : n010.cluster.edu
% 0.13/0.34  % Model    : x86_64 x86_64
% 0.13/0.34  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.13/0.34  % Memory   : 8042.1875MB
% 0.13/0.34  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.13/0.34  % CPULimit   : 300
% 0.13/0.34  % WCLimit    : 300
% 0.13/0.34  % DateTime   : Tue Aug 30 21:11:13 EDT 2022
% 0.13/0.34  % CPUTime    : 
% 0.20/0.55  % (23152)dis+1010_1:50_awrs=decay:awrsf=128:nwc=10.0:s2pl=no:sp=frequency:ss=axioms:i=39:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/39Mi)
% 0.20/0.55  % (23152)Refutation not found, incomplete strategy% (23152)------------------------------
% 0.20/0.55  % (23152)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.20/0.55  % (23152)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.20/0.55  % (23152)Termination reason: Refutation not found, incomplete strategy
% 0.20/0.55  
% 0.20/0.55  % (23152)Memory used [KB]: 6012
% 0.20/0.55  % (23152)Time elapsed: 0.133 s
% 0.20/0.55  % (23152)Instructions burned: 3 (million)
% 0.20/0.55  % (23152)------------------------------
% 0.20/0.55  % (23152)------------------------------
% 0.20/0.55  % (23168)dis+1010_2:3_fs=off:fsr=off:nm=0:nwc=5.0:s2a=on:s2agt=32:i=82:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/82Mi)
% 0.20/0.56  % (23160)lrs+10_1:1_ins=3:sp=reverse_frequency:spb=goal:to=lpo:i=3:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/3Mi)
% 0.20/0.56  % (23160)Instruction limit reached!
% 0.20/0.56  % (23160)------------------------------
% 0.20/0.56  % (23160)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.20/0.56  % (23160)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.20/0.56  % (23160)Termination reason: Unknown
% 0.20/0.56  % (23160)Termination phase: Property scanning
% 0.20/0.56  
% 0.20/0.56  % (23160)Memory used [KB]: 1663
% 0.20/0.56  % (23160)Time elapsed: 0.007 s
% 0.20/0.56  % (23160)Instructions burned: 3 (million)
% 0.20/0.56  % (23160)------------------------------
% 0.20/0.56  % (23160)------------------------------
% 0.20/0.56  % (23168)First to succeed.
% 0.20/0.57  % (23168)Refutation found. Thanks to Tanya!
% 0.20/0.57  % SZS status Theorem for theBenchmark
% 0.20/0.57  % SZS output start Proof for theBenchmark
% See solution above
% 0.20/0.57  % (23168)------------------------------
% 0.20/0.57  % (23168)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.20/0.57  % (23168)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.20/0.57  % (23168)Termination reason: Refutation
% 0.20/0.57  
% 0.20/0.57  % (23168)Memory used [KB]: 6268
% 0.20/0.57  % (23168)Time elapsed: 0.155 s
% 0.20/0.57  % (23168)Instructions burned: 8 (million)
% 0.20/0.57  % (23168)------------------------------
% 0.20/0.57  % (23168)------------------------------
% 0.20/0.57  % (23145)Success in time 0.215 s
%------------------------------------------------------------------------------