TSTP Solution File: SWW959+1 by Vampire-SAT---4.8
View Problem
- Process Solution
%------------------------------------------------------------------------------
% File : Vampire-SAT---4.8
% Problem : SWW959+1 : TPTP v8.1.2. Released v7.4.0.
% Transfm : none
% Format : tptp:raw
% Command : vampire --mode casc_sat -m 16384 --cores 7 -t %d %s
% Computer : n023.cluster.edu
% Model : x86_64 x86_64
% CPU : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory : 8042.1875MB
% OS : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit : 300s
% DateTime : Sun May 5 11:55:24 EDT 2024
% Result : Theorem 0.22s 0.39s
% Output : Refutation 0.22s
% Verified :
% SZS Type : Refutation
% Derivation depth : 15
% Number of leaves : 9
% Syntax : Number of formulae : 44 ( 15 unt; 0 def)
% Number of atoms : 112 ( 0 equ)
% Maximal formula atoms : 7 ( 2 avg)
% Number of connectives : 124 ( 56 ~; 48 |; 10 &)
% ( 0 <=>; 10 =>; 0 <=; 0 <~>)
% Maximal formula depth : 12 ( 5 avg)
% Maximal term depth : 4 ( 2 avg)
% Number of predicates : 3 ( 2 usr; 1 prp; 0-2 aty)
% Number of functors : 16 ( 16 usr; 4 con; 0-2 aty)
% Number of variables : 70 ( 70 !; 0 ?)
% Comments :
%------------------------------------------------------------------------------
fof(f722,plain,
$false,
inference(resolution,[],[f702,f421]) ).
fof(f421,plain,
! [X0] : pred_attacker(name_new0x2Dname(X0)),
inference(cnf_transformation,[],[f172]) ).
fof(f172,plain,
! [X0] : pred_attacker(name_new0x2Dname(X0)),
inference(rectify,[],[f155]) ).
fof(f155,axiom,
! [X97] : pred_attacker(name_new0x2Dname(X97)),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax154) ).
fof(f702,plain,
! [X0] : ~ pred_attacker(X0),
inference(resolution,[],[f672,f437]) ).
fof(f437,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f259]) ).
fof(f259,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f189]) ).
fof(f189,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_3(X0)) ),
inference(rectify,[],[f122]) ).
fof(f122,axiom,
! [X62] :
( pred_attacker(X62)
=> pred_attacker(tuple_client_B_in_3(X62)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax121) ).
fof(f672,plain,
! [X0] : ~ pred_attacker(tuple_client_B_in_3(X0)),
inference(resolution,[],[f637,f416]) ).
fof(f416,plain,
pred_attacker(tuple_out_3(constr_pkey(name_skS))),
inference(cnf_transformation,[],[f160]) ).
fof(f160,axiom,
pred_attacker(tuple_out_3(constr_pkey(name_skS))),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax159) ).
fof(f637,plain,
! [X0,X1] :
( ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_attacker(X0) ),
inference(resolution,[],[f606,f433]) ).
fof(f433,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f255]) ).
fof(f255,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f185]) ).
fof(f185,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_5(X0)) ),
inference(rectify,[],[f120]) ).
fof(f120,axiom,
! [X60] :
( pred_attacker(X60)
=> pred_attacker(tuple_client_B_in_5(X60)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax119) ).
fof(f606,plain,
! [X0,X1] :
( ~ pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(tuple_client_B_in_3(X1)) ),
inference(resolution,[],[f571,f416]) ).
fof(f571,plain,
! [X2,X0,X1] :
( ~ pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_attacker(X2) ),
inference(resolution,[],[f568,f324]) ).
fof(f324,plain,
~ pred_attacker(name_objective),
inference(cnf_transformation,[],[f171]) ).
fof(f171,plain,
~ pred_attacker(name_objective),
inference(flattening,[],[f170]) ).
fof(f170,negated_conjecture,
~ pred_attacker(name_objective),
inference(negated_conjecture,[],[f169]) ).
fof(f169,conjecture,
pred_attacker(name_objective),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',co0) ).
fof(f568,plain,
! [X2,X0,X1] :
( pred_attacker(name_objective)
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_attacker(X0) ),
inference(resolution,[],[f567,f435]) ).
fof(f435,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f257]) ).
fof(f257,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f187]) ).
fof(f187,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_2(X0)) ),
inference(rectify,[],[f124]) ).
fof(f124,axiom,
! [X64] :
( pred_attacker(X64)
=> pred_attacker(tuple_client_B_in_2(X64)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax123) ).
fof(f567,plain,
! [X2,X0,X1] :
( ~ pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(tuple_client_B_in_3(X2))
| ~ pred_attacker(tuple_client_B_in_5(X1))
| pred_attacker(name_objective) ),
inference(resolution,[],[f565,f446]) ).
fof(f446,plain,
! [X0] :
( ~ pred_attacker(tuple_client_B_out_6(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f268]) ).
fof(f268,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_B_out_6(X0)) ),
inference(ennf_transformation,[],[f198]) ).
fof(f198,plain,
! [X0] :
( pred_attacker(tuple_client_B_out_6(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f114]) ).
fof(f114,axiom,
! [X51] :
( pred_attacker(tuple_client_B_out_6(X51))
=> pred_attacker(X51) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax113) ).
fof(f565,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X1))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_attacker(tuple_client_B_in_3(X0)) ),
inference(resolution,[],[f561,f454]) ).
fof(f454,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
inference(cnf_transformation,[],[f206]) ).
fof(f206,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
inference(rectify,[],[f87]) ).
fof(f87,axiom,
! [X16,X17] : pred_eq_bitstring_bitstring(X16,X17),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax86) ).
fof(f561,plain,
! [X2,X3,X1] :
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X2,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X2))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_attacker(tuple_client_B_in_5(X1))
| pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(resolution,[],[f555,f454]) ).
fof(f555,plain,
! [X2,X3,X0,X1] :
( ~ pred_eq_bitstring_bitstring(name_Nb(X1),constr_adec(X2,name_skB))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X3))
| ~ pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(resolution,[],[f491,f454]) ).
fof(f491,plain,
! [X2,X3,X0,X1] :
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(cnf_transformation,[],[f323]) ).
fof(f323,plain,
! [X0,X1,X2,X3] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ),
inference(flattening,[],[f322]) ).
fof(f322,plain,
! [X0,X1,X2,X3] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ),
inference(ennf_transformation,[],[f242]) ).
fof(f242,plain,
! [X0,X1,X2,X3] :
( ( pred_attacker(tuple_client_B_in_2(X3))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X1))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
& pred_attacker(tuple_client_B_in_5(X2))
& pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) )
=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(rectify,[],[f166]) ).
fof(f166,axiom,
! [X106,X107,X108,X109] :
( ( pred_attacker(tuple_client_B_in_2(X109))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X109,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X107))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X107,name_skB)))
& pred_attacker(tuple_client_B_in_5(X108))
& pred_eq_bitstring_bitstring(name_Nb(X106),constr_adec(X108,name_skB)) )
=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax165) ).
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.03/0.12 % Problem : SWW959+1 : TPTP v8.1.2. Released v7.4.0.
% 0.13/0.14 % Command : vampire --mode casc_sat -m 16384 --cores 7 -t %d %s
% 0.15/0.36 % Computer : n023.cluster.edu
% 0.15/0.36 % Model : x86_64 x86_64
% 0.15/0.36 % CPU : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.15/0.36 % Memory : 8042.1875MB
% 0.15/0.36 % OS : Linux 3.10.0-693.el7.x86_64
% 0.15/0.36 % CPULimit : 300
% 0.15/0.36 % WCLimit : 300
% 0.15/0.36 % DateTime : Fri May 3 19:35:53 EDT 2024
% 0.15/0.36 % CPUTime :
% 0.22/0.36 % (7526)Running in auto input_syntax mode. Trying TPTP
% 0.22/0.38 % (7530)WARNING: value z3 for option sas not known
% 0.22/0.38 % (7533)ott-10_8_av=off:bd=preordered:bs=on:fsd=off:fsr=off:fde=unused:irw=on:lcm=predicate:lma=on:nm=4:nwc=1.7:sp=frequency_522 on theBenchmark for (522ds/0Mi)
% 0.22/0.38 % (7529)fmb+10_1_bce=on:fmbdsb=on:fmbes=contour:fmbswr=3:fde=none:nm=0_793 on theBenchmark for (793ds/0Mi)
% 0.22/0.38 % (7530)dis+2_11_add=large:afr=on:amm=off:bd=off:bce=on:fsd=off:fde=none:gs=on:gsaa=full_model:gsem=off:irw=on:msp=off:nm=4:nwc=1.3:sas=z3:sims=off:sac=on:sp=reverse_arity_569 on theBenchmark for (569ds/0Mi)
% 0.22/0.38 % (7534)ott+1_64_av=off:bd=off:bce=on:fsd=off:fde=unused:gsp=on:irw=on:lcm=predicate:lma=on:nm=2:nwc=1.1:sims=off:urr=on_497 on theBenchmark for (497ds/0Mi)
% 0.22/0.38 % (7532)ott+10_10:1_add=off:afr=on:amm=off:anc=all:bd=off:bs=on:fsr=off:irw=on:lma=on:msp=off:nm=4:nwc=4.0:sac=on:sp=reverse_frequency_531 on theBenchmark for (531ds/0Mi)
% 0.22/0.39 % (7533)First to succeed.
% 0.22/0.39 % (7533)Solution written to "/export/starexec/sandbox2/tmp/vampire-proof-7526"
% 0.22/0.39 % (7533)Refutation found. Thanks to Tanya!
% 0.22/0.39 % SZS status Theorem for theBenchmark
% 0.22/0.39 % SZS output start Proof for theBenchmark
% See solution above
% 0.22/0.40 % (7533)------------------------------
% 0.22/0.40 % (7533)Version: Vampire 4.8 (commit 3a798227e on 2024-05-03 07:42:47 +0200)
% 0.22/0.40 % (7533)Termination reason: Refutation
% 0.22/0.40
% 0.22/0.40 % (7533)Memory used [KB]: 1041
% 0.22/0.40 % (7533)Time elapsed: 0.012 s
% 0.22/0.40 % (7533)Instructions burned: 21 (million)
% 0.22/0.40 % (7526)Success in time 0.032 s
%------------------------------------------------------------------------------