TSTP Solution File: SWW960+1 by SnakeForV---1.0

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : SnakeForV---1.0
% Problem  : SWW960+1 : TPTP v8.1.0. Released v7.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_uns --cores 0 -t %d %s

% Computer : n023.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Wed Aug 31 19:15:09 EDT 2022

% Result   : Theorem 1.45s 0.62s
% Output   : Refutation 1.45s
% Verified : 
% SZS Type : Refutation
%            Derivation depth      :   14
%            Number of leaves      :   54
% Syntax   : Number of formulae    :  246 (  41 unt;   0 def)
%            Number of atoms       :  685 (  50 equ)
%            Maximal formula atoms :    8 (   2 avg)
%            Number of connectives :  803 ( 364   ~; 340   |;  36   &)
%                                         (  20 <=>;  43  =>;   0  <=;   0 <~>)
%            Maximal formula depth :   14 (   5 avg)
%            Maximal term depth    :    6 (   2 avg)
%            Number of predicates  :   25 (  23 usr;  21 prp; 0-2 aty)
%            Number of functors    :   35 (  35 usr;  10 con; 0-2 aty)
%            Number of variables   :  351 ( 349   !;   2   ?)

% Comments : 
%------------------------------------------------------------------------------
fof(f1403,plain,
    $false,
    inference(avatar_sat_refutation,[],[f527,f539,f605,f614,f665,f670,f672,f995,f1009,f1029,f1143,f1187,f1190,f1206,f1223,f1229,f1231,f1234,f1239,f1267,f1362]) ).

fof(f1362,plain,
    ~ spl1_48,
    inference(avatar_contradiction_clause,[],[f1361]) ).

fof(f1361,plain,
    ( $false
    | ~ spl1_48 ),
    inference(trivial_inequality_removal,[],[f1360]) ).

fof(f1360,plain,
    ( constr_CONST_4 != constr_CONST_4
    | ~ spl1_48 ),
    inference(superposition,[],[f506,f1182]) ).

fof(f1182,plain,
    ( constr_CONST_4 = name_A
    | ~ spl1_48 ),
    inference(avatar_component_clause,[],[f1180]) ).

fof(f1180,plain,
    ( spl1_48
  <=> constr_CONST_4 = name_A ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_48])]) ).

fof(f506,plain,
    constr_CONST_4 != name_A,
    inference(cnf_transformation,[],[f43]) ).

fof(f43,axiom,
    constr_CONST_4 != name_A,
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax42) ).

fof(f1267,plain,
    ( spl1_7
    | ~ spl1_20 ),
    inference(avatar_split_clause,[],[f1265,f841,f601]) ).

fof(f601,plain,
    ( spl1_7
  <=> ! [X1] : ~ pred_attacker(X1) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_7])]) ).

fof(f841,plain,
    ( spl1_20
  <=> ! [X4] :
        ( ~ pred_attacker(X4)
        | ~ pred_attacker(constr_pkey(X4)) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_20])]) ).

fof(f1265,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl1_20 ),
    inference(duplicate_literal_removal,[],[f1254]) ).

fof(f1254,plain,
    ( ! [X0] :
        ( ~ pred_attacker(X0)
        | ~ pred_attacker(X0) )
    | ~ spl1_20 ),
    inference(resolution,[],[f842,f468]) ).

fof(f468,plain,
    ! [X0] :
      ( pred_attacker(constr_pkey(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f287]) ).

fof(f287,plain,
    ! [X0] :
      ( ~ pred_attacker(X0)
      | pred_attacker(constr_pkey(X0)) ),
    inference(ennf_transformation,[],[f195]) ).

fof(f195,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(constr_pkey(X0)) ),
    inference(rectify,[],[f94]) ).

fof(f94,axiom,
    ! [X24] :
      ( pred_attacker(X24)
     => pred_attacker(constr_pkey(X24)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax93) ).

fof(f842,plain,
    ( ! [X4] :
        ( ~ pred_attacker(constr_pkey(X4))
        | ~ pred_attacker(X4) )
    | ~ spl1_20 ),
    inference(avatar_component_clause,[],[f841]) ).

fof(f1239,plain,
    ( spl1_20
    | spl1_21
    | ~ spl1_54 ),
    inference(avatar_split_clause,[],[f1237,f1221,f844,f841]) ).

fof(f844,plain,
    ( spl1_21
  <=> ! [X2,X3] :
        ( name_B = X2
        | ~ pred_attacker(tuple_key_retrieval_server_in_1(X3,X2))
        | ~ pred_eq_bitstring_bitstring(name_I,X2)
        | ~ pred_attacker(X2)
        | name_A = X2 ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_21])]) ).

fof(f1221,plain,
    ( spl1_54
  <=> ! [X2,X0,X1] :
        ( ~ pred_attacker(X2)
        | ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
        | ~ pred_eq_bitstring_bitstring(name_I,X1)
        | ~ pred_table(tuple_keys(X1,constr_pkey(X2))) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_54])]) ).

fof(f1237,plain,
    ( ! [X2,X3,X4] :
        ( name_A = X2
        | ~ pred_attacker(constr_pkey(X3))
        | ~ pred_attacker(X2)
        | name_B = X2
        | ~ pred_attacker(X3)
        | ~ pred_attacker(tuple_key_retrieval_server_in_1(X4,X2))
        | ~ pred_eq_bitstring_bitstring(name_I,X2) )
    | ~ spl1_54 ),
    inference(resolution,[],[f1222,f703]) ).

fof(f703,plain,
    ! [X4,X5] :
      ( pred_table(tuple_keys(X5,X4))
      | ~ pred_attacker(X4)
      | name_A = X5
      | name_B = X5
      | ~ pred_attacker(X5) ),
    inference(resolution,[],[f411,f394]) ).

fof(f394,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(tuple_key_register_server_in_1(X1,X0))
      | name_A = X1
      | name_B = X1
      | pred_table(tuple_keys(X1,X0)) ),
    inference(cnf_transformation,[],[f283]) ).

fof(f283,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(tuple_key_register_server_in_1(X1,X0))
      | name_A = X1
      | pred_table(tuple_keys(X1,X0))
      | name_B = X1 ),
    inference(flattening,[],[f282]) ).

fof(f282,plain,
    ! [X0,X1] :
      ( pred_table(tuple_keys(X1,X0))
      | ~ pred_attacker(tuple_key_register_server_in_1(X1,X0))
      | name_A = X1
      | name_B = X1 ),
    inference(ennf_transformation,[],[f188]) ).

fof(f188,plain,
    ! [X0,X1] :
      ( ( pred_attacker(tuple_key_register_server_in_1(X1,X0))
        & name_A != X1
        & name_B != X1 )
     => pred_table(tuple_keys(X1,X0)) ),
    inference(rectify,[],[f168]) ).

fof(f168,axiom,
    ! [X114,X113] :
      ( ( name_B != X113
        & pred_attacker(tuple_key_register_server_in_1(X113,X114))
        & name_A != X113 )
     => pred_table(tuple_keys(X113,X114)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax167) ).

fof(f411,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f332]) ).

fof(f332,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(X1)
      | pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | ~ pred_attacker(X0) ),
    inference(rectify,[],[f295]) ).

fof(f295,plain,
    ! [X1,X0] :
      ( ~ pred_attacker(X0)
      | pred_attacker(tuple_key_register_server_in_1(X1,X0))
      | ~ pred_attacker(X1) ),
    inference(flattening,[],[f294]) ).

fof(f294,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_register_server_in_1(X1,X0))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(ennf_transformation,[],[f197]) ).

fof(f197,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X0)
        & pred_attacker(X1) )
     => pred_attacker(tuple_key_register_server_in_1(X1,X0)) ),
    inference(rectify,[],[f106]) ).

fof(f106,axiom,
    ! [X40,X39] :
      ( ( pred_attacker(X39)
        & pred_attacker(X40) )
     => pred_attacker(tuple_key_register_server_in_1(X39,X40)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax105) ).

fof(f1222,plain,
    ( ! [X2,X0,X1] :
        ( ~ pred_table(tuple_keys(X1,constr_pkey(X2)))
        | ~ pred_eq_bitstring_bitstring(name_I,X1)
        | ~ pred_attacker(X2)
        | ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) )
    | ~ spl1_54 ),
    inference(avatar_component_clause,[],[f1221]) ).

fof(f1234,plain,
    ( spl1_6
    | ~ spl1_53 ),
    inference(avatar_contradiction_clause,[],[f1233]) ).

fof(f1233,plain,
    ( $false
    | spl1_6
    | ~ spl1_53 ),
    inference(resolution,[],[f1219,f538]) ).

fof(f538,plain,
    ( ~ pred_attacker(name_Nb(sK0))
    | spl1_6 ),
    inference(avatar_component_clause,[],[f536]) ).

fof(f536,plain,
    ( spl1_6
  <=> pred_attacker(name_Nb(sK0)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_6])]) ).

fof(f1219,plain,
    ( ! [X3] : pred_attacker(name_Nb(X3))
    | ~ spl1_53 ),
    inference(avatar_component_clause,[],[f1218]) ).

fof(f1218,plain,
    ( spl1_53
  <=> ! [X3] : pred_attacker(name_Nb(X3)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_53])]) ).

fof(f1231,plain,
    spl1_51,
    inference(avatar_contradiction_clause,[],[f1230]) ).

fof(f1230,plain,
    ( $false
    | spl1_51 ),
    inference(resolution,[],[f1205,f462]) ).

fof(f462,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X1,X0),
    inference(cnf_transformation,[],[f338]) ).

fof(f338,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X1,X0),
    inference(rectify,[],[f215]) ).

fof(f215,plain,
    ! [X1,X0] : pred_eq_bitstring_bitstring(X0,X1),
    inference(rectify,[],[f87]) ).

fof(f87,axiom,
    ! [X16,X17] : pred_eq_bitstring_bitstring(X16,X17),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax86) ).

fof(f1205,plain,
    ( ~ pred_eq_bitstring_bitstring(name_A,name_A)
    | spl1_51 ),
    inference(avatar_component_clause,[],[f1203]) ).

fof(f1203,plain,
    ( spl1_51
  <=> pred_eq_bitstring_bitstring(name_A,name_A) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_51])]) ).

fof(f1229,plain,
    ( spl1_4
    | ~ spl1_42 ),
    inference(avatar_split_clause,[],[f1227,f1099,f525]) ).

fof(f525,plain,
    ( spl1_4
  <=> ! [X1] :
        ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
        | ~ pred_attacker(tuple_client_B_in_3(X1)) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_4])]) ).

fof(f1099,plain,
    ( spl1_42
  <=> ! [X4,X0] :
        ( ~ pred_eq_bitstring_bitstring(name_Na(X4),constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)))
        | ~ pred_attacker(tuple_client_B_in_3(X0))
        | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X0,name_skB))) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_42])]) ).

fof(f1227,plain,
    ( ! [X0] :
        ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X0,name_skB)))
        | ~ pred_attacker(tuple_client_B_in_3(X0)) )
    | ~ spl1_42 ),
    inference(resolution,[],[f1100,f462]) ).

fof(f1100,plain,
    ( ! [X0,X4] :
        ( ~ pred_eq_bitstring_bitstring(name_Na(X4),constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)))
        | ~ pred_attacker(tuple_client_B_in_3(X0))
        | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X0,name_skB))) )
    | ~ spl1_42 ),
    inference(avatar_component_clause,[],[f1099]) ).

fof(f1223,plain,
    ( spl1_53
    | spl1_54
    | ~ spl1_41 ),
    inference(avatar_split_clause,[],[f1216,f1096,f1221,f1218]) ).

fof(f1096,plain,
    ( spl1_41
  <=> ! [X2,X3] :
        ( ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(X2))
        | ~ pred_attacker(tuple_client_A_in_2(constr_sign(X2,name_skS)))
        | pred_attacker(constr_aenc(name_Nb(X3),constr_tuple_2_get_1_bitstring(X2))) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_41])]) ).

fof(f1216,plain,
    ( ! [X2,X3,X0,X1] :
        ( ~ pred_attacker(X2)
        | ~ pred_eq_bitstring_bitstring(name_I,X1)
        | pred_attacker(name_Nb(X3))
        | ~ pred_table(tuple_keys(X1,constr_pkey(X2)))
        | ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) )
    | ~ spl1_41 ),
    inference(resolution,[],[f1210,f685]) ).

fof(f685,plain,
    ! [X3,X4] :
      ( ~ pred_attacker(constr_aenc(X3,constr_pkey(X4)))
      | ~ pred_attacker(X4)
      | pred_attacker(X3) ),
    inference(superposition,[],[f412,f487]) ).

fof(f487,plain,
    ! [X0,X1] : constr_adec(constr_aenc(X1,constr_pkey(X0)),X0) = X1,
    inference(cnf_transformation,[],[f79]) ).

fof(f79,axiom,
    ! [X0,X1] : constr_adec(constr_aenc(X1,constr_pkey(X0)),X0) = X1,
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax78) ).

fof(f412,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_adec(X0,X1))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(cnf_transformation,[],[f333]) ).

fof(f333,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_adec(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(rectify,[],[f286]) ).

fof(f286,plain,
    ! [X1,X0] :
      ( pred_attacker(constr_adec(X1,X0))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(flattening,[],[f285]) ).

fof(f285,plain,
    ! [X1,X0] :
      ( pred_attacker(constr_adec(X1,X0))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(ennf_transformation,[],[f218]) ).

fof(f218,plain,
    ! [X1,X0] :
      ( ( pred_attacker(X0)
        & pred_attacker(X1) )
     => pred_attacker(constr_adec(X1,X0)) ),
    inference(rectify,[],[f139]) ).

fof(f139,axiom,
    ! [X85,X84] :
      ( ( pred_attacker(X85)
        & pred_attacker(X84) )
     => pred_attacker(constr_adec(X84,X85)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax138) ).

fof(f1210,plain,
    ( ! [X2,X3,X0,X1] :
        ( pred_attacker(constr_aenc(name_Nb(X1),X2))
        | ~ pred_attacker(tuple_key_retrieval_server_in_1(X3,X0))
        | ~ pred_table(tuple_keys(X0,X2))
        | ~ pred_eq_bitstring_bitstring(name_I,X0) )
    | ~ spl1_41 ),
    inference(resolution,[],[f1209,f541]) ).

fof(f541,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(constr_sign(tuple_2(X0,X1),name_skS))
      | ~ pred_table(tuple_keys(X0,X1))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0)) ),
    inference(resolution,[],[f381,f433]) ).

fof(f433,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X2,X1),name_skS)))
      | ~ pred_table(tuple_keys(X2,X1))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X2)) ),
    inference(cnf_transformation,[],[f335]) ).

fof(f335,plain,
    ! [X0,X1,X2] :
      ( ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X2))
      | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X2,X1),name_skS)))
      | ~ pred_table(tuple_keys(X2,X1)) ),
    inference(rectify,[],[f245]) ).

fof(f245,plain,
    ! [X0,X2,X1] :
      ( ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
      | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X2),name_skS)))
      | ~ pred_table(tuple_keys(X1,X2)) ),
    inference(flattening,[],[f244]) ).

fof(f244,plain,
    ! [X2,X1,X0] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X2),name_skS)))
      | ~ pred_table(tuple_keys(X1,X2))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
    inference(ennf_transformation,[],[f176]) ).

fof(f176,plain,
    ! [X2,X1,X0] :
      ( ( pred_table(tuple_keys(X1,X2))
        & pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) )
     => pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X2),name_skS))) ),
    inference(rectify,[],[f167]) ).

fof(f167,axiom,
    ! [X112,X110,X111] :
      ( ( pred_attacker(tuple_key_retrieval_server_in_1(X112,X110))
        & pred_table(tuple_keys(X110,X111)) )
     => pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X110,X111),name_skS))) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax166) ).

fof(f381,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_key_retrieval_server_out_2(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f276]) ).

fof(f276,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_key_retrieval_server_out_2(X0))
      | pred_attacker(X0) ),
    inference(ennf_transformation,[],[f174]) ).

fof(f174,plain,
    ! [X0] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f102]) ).

fof(f102,axiom,
    ! [X32] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(X32))
     => pred_attacker(X32) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax101) ).

fof(f1209,plain,
    ( ! [X2,X0,X1] :
        ( ~ pred_attacker(constr_sign(tuple_2(X2,X1),name_skS))
        | ~ pred_eq_bitstring_bitstring(name_I,X2)
        | pred_attacker(constr_aenc(name_Nb(X0),X1)) )
    | ~ spl1_41 ),
    inference(resolution,[],[f1208,f375]) ).

fof(f375,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f302]) ).

fof(f302,plain,
    ! [X0] :
      ( ~ pred_attacker(X0)
      | pred_attacker(tuple_client_A_in_2(X0)) ),
    inference(ennf_transformation,[],[f232]) ).

fof(f232,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_2(X0)) ),
    inference(rectify,[],[f135]) ).

fof(f135,axiom,
    ! [X78] :
      ( pred_attacker(X78)
     => pred_attacker(tuple_client_A_in_2(X78)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax134) ).

fof(f1208,plain,
    ( ! [X2,X0,X1] :
        ( ~ pred_attacker(tuple_client_A_in_2(constr_sign(tuple_2(X0,X1),name_skS)))
        | pred_attacker(constr_aenc(name_Nb(X2),X1))
        | ~ pred_eq_bitstring_bitstring(name_I,X0) )
    | ~ spl1_41 ),
    inference(forward_demodulation,[],[f1207,f357]) ).

fof(f357,plain,
    ! [X0,X1] : constr_tuple_2_get_0x30(tuple_2(X0,X1)) = X0,
    inference(cnf_transformation,[],[f187]) ).

fof(f187,plain,
    ! [X0,X1] : constr_tuple_2_get_0x30(tuple_2(X0,X1)) = X0,
    inference(rectify,[],[f86]) ).

fof(f86,axiom,
    ! [X14,X15] : constr_tuple_2_get_0x30(tuple_2(X14,X15)) = X14,
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax85) ).

fof(f1207,plain,
    ( ! [X2,X0,X1] :
        ( ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(tuple_2(X0,X1)))
        | ~ pred_attacker(tuple_client_A_in_2(constr_sign(tuple_2(X0,X1),name_skS)))
        | pred_attacker(constr_aenc(name_Nb(X2),X1)) )
    | ~ spl1_41 ),
    inference(superposition,[],[f1097,f455]) ).

fof(f455,plain,
    ! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
    inference(cnf_transformation,[],[f206]) ).

fof(f206,plain,
    ! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
    inference(rectify,[],[f83]) ).

fof(f83,axiom,
    ! [X8,X9] : constr_tuple_2_get_1_bitstring(tuple_2(X8,X9)) = X9,
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax82) ).

fof(f1097,plain,
    ( ! [X2,X3] :
        ( pred_attacker(constr_aenc(name_Nb(X3),constr_tuple_2_get_1_bitstring(X2)))
        | ~ pred_attacker(tuple_client_A_in_2(constr_sign(X2,name_skS)))
        | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(X2)) )
    | ~ spl1_41 ),
    inference(avatar_component_clause,[],[f1096]) ).

fof(f1206,plain,
    ( spl1_13
    | ~ spl1_51
    | ~ spl1_40 ),
    inference(avatar_split_clause,[],[f1196,f1093,f1203,f748]) ).

fof(f748,plain,
    ( spl1_13
  <=> ! [X0] : ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,name_A)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_13])]) ).

fof(f1093,plain,
    ( spl1_40
  <=> ! [X1] :
        ( ~ pred_eq_bitstring_bitstring(name_A,X1)
        | ~ pred_attacker(tuple_client_B_in_2(constr_sign(tuple_2(X1,constr_pkey(name_skA)),name_skS))) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_40])]) ).

fof(f1196,plain,
    ( ! [X0] :
        ( ~ pred_eq_bitstring_bitstring(name_A,name_A)
        | ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,name_A)) )
    | ~ spl1_40 ),
    inference(resolution,[],[f1120,f398]) ).

fof(f398,plain,
    pred_table(tuple_keys(name_A,constr_pkey(name_skA))),
    inference(cnf_transformation,[],[f156]) ).

fof(f156,axiom,
    pred_table(tuple_keys(name_A,constr_pkey(name_skA))),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax155) ).

fof(f1120,plain,
    ( ! [X0,X1] :
        ( ~ pred_table(tuple_keys(X0,constr_pkey(name_skA)))
        | ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
        | ~ pred_eq_bitstring_bitstring(name_A,X0) )
    | ~ spl1_40 ),
    inference(resolution,[],[f1119,f541]) ).

fof(f1119,plain,
    ( ! [X0] :
        ( ~ pred_attacker(constr_sign(tuple_2(X0,constr_pkey(name_skA)),name_skS))
        | ~ pred_eq_bitstring_bitstring(name_A,X0) )
    | ~ spl1_40 ),
    inference(resolution,[],[f1094,f509]) ).

fof(f509,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f279]) ).

fof(f279,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f179]) ).

fof(f179,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_2(X0)) ),
    inference(rectify,[],[f124]) ).

fof(f124,axiom,
    ! [X64] :
      ( pred_attacker(X64)
     => pred_attacker(tuple_client_B_in_2(X64)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax123) ).

fof(f1094,plain,
    ( ! [X1] :
        ( ~ pred_attacker(tuple_client_B_in_2(constr_sign(tuple_2(X1,constr_pkey(name_skA)),name_skS)))
        | ~ pred_eq_bitstring_bitstring(name_A,X1) )
    | ~ spl1_40 ),
    inference(avatar_component_clause,[],[f1093]) ).

fof(f1190,plain,
    spl1_49,
    inference(avatar_contradiction_clause,[],[f1189]) ).

fof(f1189,plain,
    ( $false
    | spl1_49 ),
    inference(resolution,[],[f1186,f355]) ).

fof(f355,plain,
    pred_attacker(constr_CONST_4),
    inference(cnf_transformation,[],[f140]) ).

fof(f140,axiom,
    pred_attacker(constr_CONST_4),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax139) ).

fof(f1186,plain,
    ( ~ pred_attacker(constr_CONST_4)
    | spl1_49 ),
    inference(avatar_component_clause,[],[f1184]) ).

fof(f1184,plain,
    ( spl1_49
  <=> pred_attacker(constr_CONST_4) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_49])]) ).

fof(f1187,plain,
    ( spl1_48
    | ~ spl1_49
    | ~ spl1_35 ),
    inference(avatar_split_clause,[],[f1178,f1027,f1184,f1180]) ).

fof(f1027,plain,
    ( spl1_35
  <=> ! [X0] :
        ( name_A = X0
        | ~ pred_eq_bitstring_bitstring(name_I,X0)
        | ~ pred_attacker(X0)
        | name_B = X0 ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_35])]) ).

fof(f1178,plain,
    ( ~ pred_attacker(constr_CONST_4)
    | constr_CONST_4 = name_A
    | ~ spl1_35 ),
    inference(equality_resolution,[],[f1149]) ).

fof(f1149,plain,
    ( ! [X0] :
        ( constr_CONST_4 != X0
        | ~ pred_attacker(X0)
        | name_A = X0 )
    | ~ spl1_35 ),
    inference(superposition,[],[f354,f1136]) ).

fof(f1136,plain,
    ( ! [X0] :
        ( name_B = X0
        | ~ pred_attacker(X0)
        | name_A = X0 )
    | ~ spl1_35 ),
    inference(resolution,[],[f1028,f462]) ).

fof(f1028,plain,
    ( ! [X0] :
        ( ~ pred_eq_bitstring_bitstring(name_I,X0)
        | ~ pred_attacker(X0)
        | name_A = X0
        | name_B = X0 )
    | ~ spl1_35 ),
    inference(avatar_component_clause,[],[f1027]) ).

fof(f354,plain,
    constr_CONST_4 != name_B,
    inference(cnf_transformation,[],[f44]) ).

fof(f44,axiom,
    constr_CONST_4 != name_B,
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax43) ).

fof(f1143,plain,
    ( spl1_40
    | spl1_41
    | spl1_42 ),
    inference(avatar_split_clause,[],[f1140,f1099,f1096,f1093]) ).

fof(f1140,plain,
    ! [X2,X3,X0,X1,X4] :
      ( ~ pred_attacker(tuple_client_B_in_3(X0))
      | ~ pred_attacker(tuple_client_A_in_2(constr_sign(X2,name_skS)))
      | pred_attacker(constr_aenc(name_Nb(X3),constr_tuple_2_get_1_bitstring(X2)))
      | ~ pred_eq_bitstring_bitstring(name_Na(X4),constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X0,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_2(constr_sign(tuple_2(X1,constr_pkey(name_skA)),name_skS)))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,X1) ),
    inference(resolution,[],[f867,f917]) ).

fof(f917,plain,
    ! [X2,X3,X0,X1] :
      ( ~ pred_attacker(constr_aenc(tuple_2(X0,X1),constr_pkey(name_skA)))
      | ~ pred_attacker(tuple_client_A_in_2(constr_sign(X2,name_skS)))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(X2))
      | pred_attacker(constr_aenc(X1,constr_tuple_2_get_1_bitstring(X2)))
      | ~ pred_eq_bitstring_bitstring(name_Na(X3),X0) ),
    inference(forward_demodulation,[],[f915,f357]) ).

fof(f915,plain,
    ! [X2,X3,X0,X1] :
      ( pred_attacker(constr_aenc(X1,constr_tuple_2_get_1_bitstring(X2)))
      | ~ pred_eq_bitstring_bitstring(name_Na(X3),constr_tuple_2_get_0x30(tuple_2(X0,X1)))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(X2))
      | ~ pred_attacker(tuple_client_A_in_2(constr_sign(X2,name_skS)))
      | ~ pred_attacker(constr_aenc(tuple_2(X0,X1),constr_pkey(name_skA))) ),
    inference(superposition,[],[f894,f455]) ).

fof(f894,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(X1),constr_tuple_2_get_1_bitstring(X0)))
      | ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_2_get_0x30(X1))
      | ~ pred_attacker(tuple_client_A_in_2(constr_sign(X0,name_skS)))
      | ~ pred_attacker(constr_aenc(X1,constr_pkey(name_skA)))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(X0)) ),
    inference(resolution,[],[f783,f436]) ).

fof(f436,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f256]) ).

fof(f256,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f233]) ).

fof(f233,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_4(X0)) ),
    inference(rectify,[],[f133]) ).

fof(f133,axiom,
    ! [X76] :
      ( pred_attacker(X76)
     => pred_attacker(tuple_client_A_in_4(X76)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax132) ).

fof(f783,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(tuple_client_A_in_4(constr_aenc(X0,constr_pkey(name_skA))))
      | ~ pred_attacker(tuple_client_A_in_2(constr_sign(X1,name_skS)))
      | pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(X0),constr_tuple_2_get_1_bitstring(X1)))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(X1))
      | ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_2_get_0x30(X0)) ),
    inference(superposition,[],[f724,f487]) ).

fof(f724,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X2,name_skA)),constr_tuple_2_get_1_bitstring(X0)))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(X0))
      | ~ pred_attacker(tuple_client_A_in_4(X2))
      | ~ pred_attacker(tuple_client_A_in_2(constr_sign(X0,name_skS)))
      | ~ pred_eq_bitstring_bitstring(name_Na(X1),constr_tuple_2_get_0x30(constr_adec(X2,name_skA))) ),
    inference(resolution,[],[f692,f400]) ).

fof(f400,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_A_out_5(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f246]) ).

fof(f246,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_A_out_5(X0))
      | pred_attacker(X0) ),
    inference(ennf_transformation,[],[f199]) ).

fof(f199,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_out_5(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f127]) ).

fof(f127,axiom,
    ! [X67] :
      ( pred_attacker(tuple_client_A_out_5(X67))
     => pred_attacker(X67) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax126) ).

fof(f692,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(X0))))
      | ~ pred_attacker(tuple_client_A_in_2(constr_sign(X0,name_skS)))
      | ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_2_get_0x30(constr_adec(X1,name_skA)))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(X0))
      | ~ pred_attacker(tuple_client_A_in_4(X1)) ),
    inference(superposition,[],[f494,f477]) ).

fof(f477,plain,
    ! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
    inference(cnf_transformation,[],[f341]) ).

fof(f341,plain,
    ! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
    inference(rectify,[],[f202]) ).

fof(f202,plain,
    ! [X1,X0] : constr_checksign(constr_sign(X0,X1),constr_pkey(X1)) = X0,
    inference(rectify,[],[f82]) ).

fof(f82,axiom,
    ! [X7,X6] : constr_checksign(constr_sign(X7,X6),constr_pkey(X6)) = X7,
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax81) ).

fof(f494,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_Na(X1),constr_tuple_2_get_0x30(constr_adec(X0,name_skA)))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_A_in_4(X0)) ),
    inference(cnf_transformation,[],[f344]) ).

fof(f344,plain,
    ! [X0,X1,X2] :
      ( ~ pred_eq_bitstring_bitstring(name_Na(X1),constr_tuple_2_get_0x30(constr_adec(X0,name_skA)))
      | pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_A_in_2(X2))
      | ~ pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS)))) ),
    inference(rectify,[],[f265]) ).

fof(f265,plain,
    ! [X0,X2,X1] :
      ( ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_2_get_0x30(constr_adec(X0,name_skA)))
      | pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_A_in_2(X1))
      | ~ pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS)))) ),
    inference(flattening,[],[f264]) ).

fof(f264,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_A_in_2(X1))
      | ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_2_get_0x30(constr_adec(X0,name_skA)))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_A_in_4(X0)) ),
    inference(ennf_transformation,[],[f225]) ).

fof(f225,plain,
    ! [X2,X0,X1] :
      ( ( pred_attacker(tuple_client_A_in_2(X1))
        & pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_2_get_0x30(constr_adec(X0,name_skA)))
        & pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_A_in_4(X0)) )
     => pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))))) ),
    inference(rectify,[],[f163]) ).

fof(f163,axiom,
    ! [X101,X102,X100] :
      ( ( pred_attacker(tuple_client_A_in_4(X101))
        & pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X102,constr_pkey(name_skS))))
        & pred_eq_bitstring_bitstring(name_Na(X100),constr_tuple_2_get_0x30(constr_adec(X101,name_skA)))
        & pred_attacker(tuple_client_A_in_2(X102)) )
     => pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X101,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X102,constr_pkey(name_skS)))))) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax162) ).

fof(f867,plain,
    ! [X2,X3,X0,X1] :
      ( pred_attacker(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X2,name_skB)),name_Nb(X3)),X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X2,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | ~ pred_eq_bitstring_bitstring(name_A,X0)
      | ~ pred_attacker(tuple_client_B_in_3(X2)) ),
    inference(resolution,[],[f760,f475]) ).

fof(f475,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_B_out_4(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f315]) ).

fof(f315,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_B_out_4(X0)) ),
    inference(ennf_transformation,[],[f219]) ).

fof(f219,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_out_4(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f116]) ).

fof(f116,axiom,
    ! [X53] :
      ( pred_attacker(tuple_client_B_out_4(X53))
     => pred_attacker(X53) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax115) ).

fof(f760,plain,
    ! [X2,X3,X0,X1] :
      ( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X2,name_skB)),name_Nb(X3)),X1)))
      | ~ pred_attacker(tuple_client_B_in_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | ~ pred_attacker(tuple_client_B_in_3(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,X0)
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X2,name_skB))) ),
    inference(forward_demodulation,[],[f759,f357]) ).

fof(f759,plain,
    ! [X2,X3,X0,X1] :
      ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X2,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_3(X2))
      | ~ pred_attacker(tuple_client_B_in_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X2,name_skB)),name_Nb(X3)),X1)))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(tuple_2(X0,X1))) ),
    inference(superposition,[],[f677,f455]) ).

fof(f677,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(X0))))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(X0))
      | ~ pred_attacker(tuple_client_B_in_2(constr_sign(X0,name_skS)))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) ),
    inference(superposition,[],[f409,f477]) ).

fof(f409,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_2(X2)) ),
    inference(cnf_transformation,[],[f331]) ).

fof(f331,plain,
    ! [X0,X1,X2] :
      ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) ),
    inference(rectify,[],[f260]) ).

fof(f260,plain,
    ! [X2,X1,X0] :
      ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_attacker(tuple_client_B_in_2(X0))
      | pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) ),
    inference(flattening,[],[f259]) ).

fof(f259,plain,
    ! [X1,X2,X0] :
      ( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_attacker(tuple_client_B_in_2(X0)) ),
    inference(ennf_transformation,[],[f237]) ).

fof(f237,plain,
    ! [X1,X2,X0] :
      ( ( pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_3(X1))
        & pred_attacker(tuple_client_B_in_2(X0)) )
     => pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
    inference(rectify,[],[f165]) ).

fof(f165,axiom,
    ! [X105,X104,X103] :
      ( ( pred_attacker(tuple_client_B_in_3(X104))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X104,name_skB)))
        & pred_attacker(tuple_client_B_in_2(X105))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X105,constr_pkey(name_skS)))) )
     => pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X104,name_skB)),name_Nb(X103)),constr_tuple_2_get_1_bitstring(constr_checksign(X105,constr_pkey(name_skS)))))) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax164) ).

fof(f1029,plain,
    ( spl1_35
    | spl1_7
    | ~ spl1_21 ),
    inference(avatar_split_clause,[],[f1025,f844,f601,f1027]) ).

fof(f1025,plain,
    ( ! [X0,X1] :
        ( ~ pred_attacker(X1)
        | name_A = X0
        | name_B = X0
        | ~ pred_attacker(X0)
        | ~ pred_eq_bitstring_bitstring(name_I,X0) )
    | ~ spl1_21 ),
    inference(duplicate_literal_removal,[],[f1024]) ).

fof(f1024,plain,
    ( ! [X0,X1] :
        ( name_A = X0
        | ~ pred_attacker(X0)
        | ~ pred_attacker(X0)
        | name_B = X0
        | ~ pred_eq_bitstring_bitstring(name_I,X0)
        | ~ pred_attacker(X1) )
    | ~ spl1_21 ),
    inference(resolution,[],[f845,f497]) ).

fof(f497,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f289]) ).

fof(f289,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(X0)
      | ~ pred_attacker(X1)
      | pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
    inference(flattening,[],[f288]) ).

fof(f288,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f222]) ).

fof(f222,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
    inference(rectify,[],[f103]) ).

fof(f103,axiom,
    ! [X33,X34] :
      ( ( pred_attacker(X34)
        & pred_attacker(X33) )
     => pred_attacker(tuple_key_retrieval_server_in_1(X33,X34)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax102) ).

fof(f845,plain,
    ( ! [X2,X3] :
        ( ~ pred_attacker(tuple_key_retrieval_server_in_1(X3,X2))
        | ~ pred_eq_bitstring_bitstring(name_I,X2)
        | name_B = X2
        | ~ pred_attacker(X2)
        | name_A = X2 )
    | ~ spl1_21 ),
    inference(avatar_component_clause,[],[f844]) ).

fof(f1009,plain,
    spl1_33,
    inference(avatar_contradiction_clause,[],[f998]) ).

fof(f998,plain,
    ( $false
    | spl1_33 ),
    inference(resolution,[],[f994,f686]) ).

fof(f686,plain,
    pred_attacker(name_A),
    inference(resolution,[],[f365,f349]) ).

fof(f349,plain,
    pred_attacker(tuple_client_A_out_1(name_A,name_I)),
    inference(cnf_transformation,[],[f161]) ).

fof(f161,axiom,
    pred_attacker(tuple_client_A_out_1(name_A,name_I)),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax160) ).

fof(f365,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(tuple_client_A_out_1(X1,X0))
      | pred_attacker(X1) ),
    inference(cnf_transformation,[],[f326]) ).

fof(f326,plain,
    ! [X0,X1] :
      ( pred_attacker(X1)
      | ~ pred_attacker(tuple_client_A_out_1(X1,X0)) ),
    inference(rectify,[],[f263]) ).

fof(f263,plain,
    ! [X1,X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_A_out_1(X0,X1)) ),
    inference(ennf_transformation,[],[f185]) ).

fof(f185,plain,
    ! [X1,X0] :
      ( pred_attacker(tuple_client_A_out_1(X0,X1))
     => pred_attacker(X0) ),
    inference(rectify,[],[f131]) ).

fof(f131,axiom,
    ! [X72,X73] :
      ( pred_attacker(tuple_client_A_out_1(X72,X73))
     => pred_attacker(X72) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax130) ).

fof(f994,plain,
    ( ~ pred_attacker(name_A)
    | spl1_33 ),
    inference(avatar_component_clause,[],[f992]) ).

fof(f992,plain,
    ( spl1_33
  <=> pred_attacker(name_A) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_33])]) ).

fof(f995,plain,
    ( ~ spl1_33
    | spl1_7
    | ~ spl1_13 ),
    inference(avatar_split_clause,[],[f990,f748,f601,f992]) ).

fof(f990,plain,
    ( ! [X0] :
        ( ~ pred_attacker(X0)
        | ~ pred_attacker(name_A) )
    | ~ spl1_13 ),
    inference(resolution,[],[f749,f497]) ).

fof(f749,plain,
    ( ! [X0] : ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,name_A))
    | ~ spl1_13 ),
    inference(avatar_component_clause,[],[f748]) ).

fof(f672,plain,
    ( spl1_5
    | ~ spl1_1 ),
    inference(avatar_split_clause,[],[f671,f515,f532]) ).

fof(f532,plain,
    ( spl1_5
  <=> pred_attacker(name_objective) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_5])]) ).

fof(f515,plain,
    ( spl1_1
  <=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_1])]) ).

fof(f671,plain,
    ( pred_attacker(name_objective)
    | ~ spl1_1 ),
    inference(resolution,[],[f517,f350]) ).

fof(f350,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_B_out_6(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f293]) ).

fof(f293,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_B_out_6(X0)) ),
    inference(ennf_transformation,[],[f203]) ).

fof(f203,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_out_6(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f114]) ).

fof(f114,axiom,
    ! [X51] :
      ( pred_attacker(tuple_client_B_out_6(X51))
     => pred_attacker(X51) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax113) ).

fof(f517,plain,
    ( pred_attacker(tuple_client_B_out_6(name_objective))
    | ~ spl1_1 ),
    inference(avatar_component_clause,[],[f515]) ).

fof(f670,plain,
    ( spl1_7
    | ~ spl1_4 ),
    inference(avatar_split_clause,[],[f669,f525,f601]) ).

fof(f669,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl1_4 ),
    inference(resolution,[],[f668,f486]) ).

fof(f486,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_3(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f275]) ).

fof(f275,plain,
    ! [X0] :
      ( ~ pred_attacker(X0)
      | pred_attacker(tuple_client_B_in_3(X0)) ),
    inference(ennf_transformation,[],[f173]) ).

fof(f173,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_3(X0)) ),
    inference(rectify,[],[f122]) ).

fof(f122,axiom,
    ! [X62] :
      ( pred_attacker(X62)
     => pred_attacker(tuple_client_B_in_3(X62)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax121) ).

fof(f668,plain,
    ( ! [X0] : ~ pred_attacker(tuple_client_B_in_3(X0))
    | ~ spl1_4 ),
    inference(resolution,[],[f526,f462]) ).

fof(f526,plain,
    ( ! [X1] :
        ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
        | ~ pred_attacker(tuple_client_B_in_3(X1)) )
    | ~ spl1_4 ),
    inference(avatar_component_clause,[],[f525]) ).

fof(f665,plain,
    ~ spl1_7,
    inference(avatar_contradiction_clause,[],[f630]) ).

fof(f630,plain,
    ( $false
    | ~ spl1_7 ),
    inference(resolution,[],[f602,f440]) ).

fof(f440,plain,
    pred_attacker(tuple_true),
    inference(cnf_transformation,[],[f92]) ).

fof(f92,axiom,
    pred_attacker(tuple_true),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax91) ).

fof(f602,plain,
    ( ! [X1] : ~ pred_attacker(X1)
    | ~ spl1_7 ),
    inference(avatar_component_clause,[],[f601]) ).

fof(f614,plain,
    ( spl1_7
    | ~ spl1_3 ),
    inference(avatar_split_clause,[],[f613,f522,f601]) ).

fof(f522,plain,
    ( spl1_3
  <=> ! [X3] :
        ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
        | ~ pred_attacker(tuple_client_B_in_2(X3)) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_3])]) ).

fof(f613,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl1_3 ),
    inference(resolution,[],[f612,f509]) ).

fof(f612,plain,
    ( ! [X0] : ~ pred_attacker(tuple_client_B_in_2(X0))
    | ~ spl1_3 ),
    inference(resolution,[],[f523,f462]) ).

fof(f523,plain,
    ( ! [X3] :
        ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
        | ~ pred_attacker(tuple_client_B_in_2(X3)) )
    | ~ spl1_3 ),
    inference(avatar_component_clause,[],[f522]) ).

fof(f605,plain,
    ( spl1_7
    | ~ spl1_2 ),
    inference(avatar_split_clause,[],[f562,f519,f601]) ).

fof(f519,plain,
    ( spl1_2
  <=> ! [X2,X0] :
        ( ~ pred_attacker(tuple_client_B_in_5(X2))
        | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_2])]) ).

fof(f562,plain,
    ( ! [X2] : ~ pred_attacker(X2)
    | ~ spl1_2 ),
    inference(resolution,[],[f551,f439]) ).

fof(f439,plain,
    ! [X0] :
      ( pred_attacker(constr_tuple_2_get_1_bitstring(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f301]) ).

fof(f301,plain,
    ! [X0] :
      ( pred_attacker(constr_tuple_2_get_1_bitstring(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f235]) ).

fof(f235,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(constr_tuple_2_get_1_bitstring(X0)) ),
    inference(rectify,[],[f88]) ).

fof(f88,axiom,
    ! [X18] :
      ( pred_attacker(X18)
     => pred_attacker(constr_tuple_2_get_1_bitstring(X18)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax87) ).

fof(f551,plain,
    ( ! [X1] : ~ pred_attacker(X1)
    | ~ spl1_2 ),
    inference(resolution,[],[f460,f540]) ).

fof(f540,plain,
    ( ! [X0] : ~ pred_attacker(tuple_client_B_in_5(X0))
    | ~ spl1_2 ),
    inference(resolution,[],[f462,f520]) ).

fof(f520,plain,
    ( ! [X2,X0] :
        ( ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB))
        | ~ pred_attacker(tuple_client_B_in_5(X2)) )
    | ~ spl1_2 ),
    inference(avatar_component_clause,[],[f519]) ).

fof(f460,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_5(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f306]) ).

fof(f306,plain,
    ! [X0] :
      ( ~ pred_attacker(X0)
      | pred_attacker(tuple_client_B_in_5(X0)) ),
    inference(ennf_transformation,[],[f228]) ).

fof(f228,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_5(X0)) ),
    inference(rectify,[],[f120]) ).

fof(f120,axiom,
    ! [X60] :
      ( pred_attacker(X60)
     => pred_attacker(tuple_client_B_in_5(X60)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax119) ).

fof(f539,plain,
    ( ~ spl1_5
    | ~ spl1_6 ),
    inference(avatar_split_clause,[],[f528,f536,f532]) ).

fof(f528,plain,
    ( ~ pred_attacker(name_Nb(sK0))
    | ~ pred_attacker(name_objective) ),
    inference(resolution,[],[f474,f383]) ).

fof(f383,plain,
    ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
    inference(cnf_transformation,[],[f329]) ).

fof(f329,plain,
    ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
    inference(skolemisation,[status(esa),new_symbols(skolem,[sK0])],[f303,f328]) ).

fof(f328,plain,
    ( ? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective))
   => ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)) ),
    introduced(choice_axiom,[]) ).

fof(f303,plain,
    ? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective)),
    inference(ennf_transformation,[],[f221]) ).

fof(f221,plain,
    ~ ! [X0] : pred_attacker(tuple_2(name_Nb(X0),name_objective)),
    inference(rectify,[],[f170]) ).

fof(f170,negated_conjecture,
    ~ ! [X115] : pred_attacker(tuple_2(name_Nb(X115),name_objective)),
    inference(negated_conjecture,[],[f169]) ).

fof(f169,conjecture,
    ! [X115] : pred_attacker(tuple_2(name_Nb(X115),name_objective)),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',co0) ).

fof(f474,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X1,X0))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(cnf_transformation,[],[f340]) ).

fof(f340,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(X1)
      | ~ pred_attacker(X0)
      | pred_attacker(tuple_2(X1,X0)) ),
    inference(rectify,[],[f308]) ).

fof(f308,plain,
    ! [X1,X0] :
      ( ~ pred_attacker(X0)
      | ~ pred_attacker(X1)
      | pred_attacker(tuple_2(X0,X1)) ),
    inference(flattening,[],[f307]) ).

fof(f307,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X0,X1))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(ennf_transformation,[],[f178]) ).

fof(f178,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X0)
        & pred_attacker(X1) )
     => pred_attacker(tuple_2(X0,X1)) ),
    inference(rectify,[],[f145]) ).

fof(f145,axiom,
    ! [X86,X87] :
      ( ( pred_attacker(X87)
        & pred_attacker(X86) )
     => pred_attacker(tuple_2(X86,X87)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax144) ).

fof(f527,plain,
    ( spl1_1
    | spl1_2
    | spl1_3
    | spl1_4 ),
    inference(avatar_split_clause,[],[f388,f525,f522,f519,f515]) ).

fof(f388,plain,
    ! [X2,X3,X0,X1] :
      ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_5(X2))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_2(X3))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ),
    inference(cnf_transformation,[],[f330]) ).

fof(f330,plain,
    ! [X0,X1,X2,X3] :
      ( ~ pred_attacker(tuple_client_B_in_2(X3))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
      | pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB))
      | ~ pred_attacker(tuple_client_B_in_5(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) ),
    inference(rectify,[],[f312]) ).

fof(f312,plain,
    ! [X0,X2,X3,X1] :
      ( ~ pred_attacker(tuple_client_B_in_2(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
      | pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_3(X2))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X3,name_skB))
      | ~ pred_attacker(tuple_client_B_in_5(X3))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X2,name_skB))) ),
    inference(flattening,[],[f311]) ).

fof(f311,plain,
    ! [X2,X0,X3,X1] :
      ( pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X2,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_5(X3))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X3,name_skB))
      | ~ pred_attacker(tuple_client_B_in_2(X1))
      | ~ pred_attacker(tuple_client_B_in_3(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS)))) ),
    inference(ennf_transformation,[],[f207]) ).

fof(f207,plain,
    ! [X2,X0,X3,X1] :
      ( ( pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X2,name_skB)))
        & pred_attacker(tuple_client_B_in_5(X3))
        & pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X3,name_skB))
        & pred_attacker(tuple_client_B_in_2(X1))
        & pred_attacker(tuple_client_B_in_3(X2))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS)))) )
     => pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(rectify,[],[f166]) ).

fof(f166,axiom,
    ! [X106,X109,X107,X108] :
      ( ( pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X107,name_skB)))
        & pred_attacker(tuple_client_B_in_3(X107))
        & pred_attacker(tuple_client_B_in_2(X109))
        & pred_attacker(tuple_client_B_in_5(X108))
        & pred_eq_bitstring_bitstring(name_Nb(X106),constr_adec(X108,name_skB))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X109,constr_pkey(name_skS)))) )
     => pred_attacker(tuple_client_B_out_6(name_objective)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax165) ).

%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.07/0.12  % Problem    : SWW960+1 : TPTP v8.1.0. Released v7.4.0.
% 0.07/0.13  % Command    : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_uns --cores 0 -t %d %s
% 0.13/0.34  % Computer : n023.cluster.edu
% 0.13/0.34  % Model    : x86_64 x86_64
% 0.13/0.34  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.13/0.34  % Memory   : 8042.1875MB
% 0.13/0.34  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.13/0.34  % CPULimit   : 300
% 0.13/0.34  % WCLimit    : 300
% 0.13/0.34  % DateTime   : Tue Aug 30 21:39:35 EDT 2022
% 0.13/0.34  % CPUTime    : 
% 0.20/0.50  % (18705)lrs+10_1:1_gsp=on:sd=1:sgt=32:sos=on:ss=axioms:i=13:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/13Mi)
% 0.20/0.50  % (18728)dis+10_1:1_av=off:sos=on:sp=reverse_arity:ss=included:st=2.0:to=lpo:urr=ec_only:i=45:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/45Mi)
% 0.20/0.50  % (18730)lrs+11_1:1_plsq=on:plsqc=1:plsqr=32,1:ss=included:i=95:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/95Mi)
% 0.20/0.51  % (18720)lrs+10_1:1_drc=off:sp=reverse_frequency:spb=goal:to=lpo:i=7:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/7Mi)
% 0.20/0.51  % (18711)lrs+2_1:1_lcm=reverse:lma=on:sos=all:spb=goal_then_units:ss=included:urr=on:i=39:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/39Mi)
% 0.20/0.51  % (18728)Refutation not found, incomplete strategy% (18728)------------------------------
% 0.20/0.51  % (18728)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.20/0.51  % (18728)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.20/0.51  % (18728)Termination reason: Refutation not found, incomplete strategy
% 0.20/0.51  
% 0.20/0.51  % (18728)Memory used [KB]: 1791
% 0.20/0.51  % (18728)Time elapsed: 0.069 s
% 0.20/0.51  % (18728)Instructions burned: 7 (million)
% 0.20/0.51  % (18728)------------------------------
% 0.20/0.51  % (18728)------------------------------
% 0.20/0.52  % (18720)Instruction limit reached!
% 0.20/0.52  % (18720)------------------------------
% 0.20/0.52  % (18720)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.20/0.52  % (18720)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.20/0.52  % (18720)Termination reason: Unknown
% 0.20/0.52  % (18720)Termination phase: Saturation
% 0.20/0.52  
% 0.20/0.52  % (18720)Memory used [KB]: 6268
% 0.20/0.52  % (18720)Time elapsed: 0.008 s
% 0.20/0.52  % (18720)Instructions burned: 7 (million)
% 0.20/0.52  % (18720)------------------------------
% 0.20/0.52  % (18720)------------------------------
% 1.32/0.52  % (18705)Refutation not found, incomplete strategy% (18705)------------------------------
% 1.32/0.52  % (18705)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.32/0.53  % (18713)lrs+10_1:1_br=off:sos=on:ss=axioms:st=2.0:urr=on:i=33:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/33Mi)
% 1.32/0.53  % (18705)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.32/0.53  % (18705)Termination reason: Refutation not found, incomplete strategy
% 1.32/0.53  
% 1.32/0.53  % (18705)Memory used [KB]: 6012
% 1.32/0.53  % (18705)Time elapsed: 0.119 s
% 1.32/0.53  % (18705)Instructions burned: 2 (million)
% 1.32/0.53  % (18705)------------------------------
% 1.32/0.53  % (18705)------------------------------
% 1.32/0.53  % (18707)lrs+10_5:1_br=off:fde=none:nwc=3.0:sd=1:sgt=10:sos=on:ss=axioms:urr=on:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 1.32/0.53  % (18704)dis+1002_1:12_drc=off:fd=preordered:tgt=full:i=99978:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/99978Mi)
% 1.32/0.53  % (18709)dis+21_1:1_av=off:sos=on:sp=frequency:ss=included:to=lpo:i=15:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/15Mi)
% 1.32/0.53  % (18710)dis+1010_1:50_awrs=decay:awrsf=128:nwc=10.0:s2pl=no:sp=frequency:ss=axioms:i=39:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/39Mi)
% 1.32/0.53  % (18706)dis+1002_1:1_aac=none:bd=off:sac=on:sos=on:spb=units:i=3:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/3Mi)
% 1.32/0.53  % (18721)lrs+1011_1:1_fd=preordered:fsd=on:sos=on:thsq=on:thsqc=64:thsqd=32:uwa=ground:i=50:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/50Mi)
% 1.32/0.53  % (18706)Instruction limit reached!
% 1.32/0.53  % (18706)------------------------------
% 1.32/0.53  % (18706)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.32/0.53  % (18706)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.32/0.53  % (18706)Termination reason: Unknown
% 1.32/0.53  % (18706)Termination phase: Naming
% 1.32/0.53  
% 1.32/0.53  % (18706)Memory used [KB]: 1663
% 1.32/0.53  % (18706)Time elapsed: 0.002 s
% 1.32/0.53  % (18706)Instructions burned: 3 (million)
% 1.32/0.53  % (18706)------------------------------
% 1.32/0.53  % (18706)------------------------------
% 1.32/0.53  % (18709)Refutation not found, incomplete strategy% (18709)------------------------------
% 1.32/0.53  % (18709)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.32/0.53  % (18709)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.32/0.53  % (18709)Termination reason: Refutation not found, incomplete strategy
% 1.32/0.53  
% 1.32/0.53  % (18709)Memory used [KB]: 1791
% 1.32/0.53  % (18709)Time elapsed: 0.134 s
% 1.32/0.53  % (18709)Instructions burned: 5 (million)
% 1.32/0.53  % (18709)------------------------------
% 1.32/0.53  % (18709)------------------------------
% 1.32/0.54  % (18717)lrs+10_1:4_av=off:bs=unit_only:bsr=unit_only:ep=RS:s2a=on:sos=on:sp=frequency:to=lpo:i=16:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/16Mi)
% 1.32/0.54  % (18708)lrs+10_1:1024_nm=0:nwc=5.0:ss=axioms:i=13:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/13Mi)
% 1.32/0.54  % (18718)lrs+10_1:32_br=off:nm=16:sd=2:ss=axioms:st=2.0:urr=on:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 1.32/0.54  % (18723)ott+1010_1:1_sd=2:sos=on:sp=occurrence:ss=axioms:urr=on:i=2:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/2Mi)
% 1.32/0.54  % (18727)dis+1010_2:3_fs=off:fsr=off:nm=0:nwc=5.0:s2a=on:s2agt=32:i=82:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/82Mi)
% 1.32/0.54  % (18717)Refutation not found, incomplete strategy% (18717)------------------------------
% 1.32/0.54  % (18717)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.32/0.54  % (18717)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.32/0.54  % (18717)Termination reason: Refutation not found, incomplete strategy
% 1.32/0.54  
% 1.32/0.54  % (18717)Memory used [KB]: 1791
% 1.32/0.54  % (18717)Time elapsed: 0.133 s
% 1.32/0.54  % (18717)Instructions burned: 7 (million)
% 1.32/0.54  % (18717)------------------------------
% 1.32/0.54  % (18717)------------------------------
% 1.32/0.54  % (18722)fmb+10_1:1_nm=2:i=3:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/3Mi)
% 1.32/0.54  % (18732)dis+21_1:1_aac=none:abs=on:er=known:fde=none:fsr=off:nwc=5.0:s2a=on:s2at=4.0:sp=const_frequency:to=lpo:urr=ec_only:i=25:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/25Mi)
% 1.32/0.54  % (18733)dis+2_3:1_aac=none:abs=on:ep=R:lcm=reverse:nwc=10.0:sos=on:sp=const_frequency:spb=units:urr=ec_only:i=8:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/8Mi)
% 1.32/0.54  % (18714)lrs+10_1:1_ep=R:lcm=predicate:lma=on:sos=all:spb=goal:ss=included:i=12:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/12Mi)
% 1.32/0.54  % (18725)dis+1010_1:1_bs=on:ep=RS:erd=off:newcnf=on:nwc=10.0:s2a=on:sgt=32:ss=axioms:i=30:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/30Mi)
% 1.32/0.54  % (18708)Refutation not found, incomplete strategy% (18708)------------------------------
% 1.32/0.54  % (18708)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.32/0.54  % (18723)Instruction limit reached!
% 1.32/0.54  % (18723)------------------------------
% 1.32/0.54  % (18723)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.32/0.54  % (18729)dis+21_1:1_ep=RS:nwc=10.0:s2a=on:s2at=1.5:i=50:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/50Mi)
% 1.32/0.54  % (18731)lrs+1011_1:1_fd=preordered:fsd=on:sos=on:thsq=on:thsqc=64:thsqd=32:uwa=ground:i=99:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/99Mi)
% 1.32/0.54  % (18724)dis-10_3:2_amm=sco:ep=RS:fsr=off:nm=10:sd=2:sos=on:ss=axioms:st=3.0:i=11:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/11Mi)
% 1.32/0.54  % (18719)lrs+10_1:1_ins=3:sp=reverse_frequency:spb=goal:to=lpo:i=3:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/3Mi)
% 1.32/0.54  % (18733)Refutation not found, incomplete strategy% (18733)------------------------------
% 1.32/0.54  % (18733)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.32/0.55  % (18715)lrs+10_1:2_br=off:nm=4:ss=included:urr=on:i=7:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/7Mi)
% 1.32/0.55  % (18714)Refutation not found, incomplete strategy% (18714)------------------------------
% 1.32/0.55  % (18714)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.32/0.55  % (18723)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.32/0.55  % (18723)Termination reason: Unknown
% 1.32/0.55  % (18723)Termination phase: Preprocessing 3
% 1.32/0.55  
% 1.32/0.55  % (18723)Memory used [KB]: 1535
% 1.32/0.55  % (18723)Time elapsed: 0.003 s
% 1.32/0.55  % (18723)Instructions burned: 2 (million)
% 1.32/0.55  % (18723)------------------------------
% 1.32/0.55  % (18723)------------------------------
% 1.32/0.55  % (18734)lrs-11_1:1_nm=0:sac=on:sd=4:ss=axioms:st=3.0:i=24:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/24Mi)
% 1.45/0.55  % (18715)Instruction limit reached!
% 1.45/0.55  % (18715)------------------------------
% 1.45/0.55  % (18715)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.45/0.55  % (18715)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.45/0.55  % (18715)Termination reason: Unknown
% 1.45/0.55  % (18715)Termination phase: Saturation
% 1.45/0.55  
% 1.45/0.55  % (18715)Memory used [KB]: 6268
% 1.45/0.55  % (18715)Time elapsed: 0.005 s
% 1.45/0.55  % (18715)Instructions burned: 7 (million)
% 1.45/0.55  % (18715)------------------------------
% 1.45/0.55  % (18715)------------------------------
% 1.45/0.55  % (18724)Refutation not found, incomplete strategy% (18724)------------------------------
% 1.45/0.55  % (18724)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.45/0.55  % (18724)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.45/0.55  % (18724)Termination reason: Refutation not found, incomplete strategy
% 1.45/0.55  
% 1.45/0.55  % (18724)Memory used [KB]: 6140
% 1.45/0.55  % (18724)Time elapsed: 0.146 s
% 1.45/0.55  % (18724)Instructions burned: 5 (million)
% 1.45/0.55  % (18724)------------------------------
% 1.45/0.55  % (18724)------------------------------
% 1.45/0.55  % (18731)Refutation not found, incomplete strategy% (18731)------------------------------
% 1.45/0.55  % (18731)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.45/0.55  % (18714)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.45/0.55  % (18714)Termination reason: Refutation not found, incomplete strategy
% 1.45/0.55  
% 1.45/0.55  % (18714)Memory used [KB]: 6268
% 1.45/0.55  % (18714)Time elapsed: 0.146 s
% 1.45/0.55  % (18714)Instructions burned: 6 (million)
% 1.45/0.55  % (18712)dis+10_1:1_newcnf=on:sgt=8:sos=on:ss=axioms:to=lpo:urr=on:i=49:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/49Mi)
% 1.45/0.55  % (18714)------------------------------
% 1.45/0.55  % (18714)------------------------------
% 1.45/0.55  % (18726)ott+21_1:1_erd=off:s2a=on:sac=on:sd=1:sgt=64:sos=on:ss=included:st=3.0:to=lpo:urr=on:i=99:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/99Mi)
% 1.45/0.55  % (18713)Instruction limit reached!
% 1.45/0.55  % (18713)------------------------------
% 1.45/0.55  % (18713)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.45/0.55  % (18731)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.45/0.55  % (18731)Termination reason: Refutation not found, incomplete strategy
% 1.45/0.55  
% 1.45/0.55  % (18731)Memory used [KB]: 6396
% 1.45/0.55  % (18731)Time elapsed: 0.146 s
% 1.45/0.55  % (18731)Instructions burned: 7 (million)
% 1.45/0.55  % (18731)------------------------------
% 1.45/0.55  % (18731)------------------------------
% 1.45/0.56  % (18708)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.45/0.56  % (18708)Termination reason: Refutation not found, incomplete strategy
% 1.45/0.56  
% 1.45/0.56  % (18708)Memory used [KB]: 6140
% 1.45/0.56  % (18708)Time elapsed: 0.134 s
% 1.45/0.56  % (18708)Instructions burned: 6 (million)
% 1.45/0.56  % (18708)------------------------------
% 1.45/0.56  % (18708)------------------------------
% 1.45/0.56  % (18725)Refutation not found, incomplete strategy% (18725)------------------------------
% 1.45/0.56  % (18725)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.45/0.56  % (18725)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.45/0.56  % (18725)Termination reason: Refutation not found, incomplete strategy
% 1.45/0.56  
% 1.45/0.56  % (18725)Memory used [KB]: 6268
% 1.45/0.56  % (18725)Time elapsed: 0.163 s
% 1.45/0.56  % (18725)Instructions burned: 13 (million)
% 1.45/0.56  % (18725)------------------------------
% 1.45/0.56  % (18725)------------------------------
% 1.45/0.56  % (18710)Refutation not found, incomplete strategy% (18710)------------------------------
% 1.45/0.56  % (18710)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.45/0.56  % (18710)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.45/0.56  % (18710)Termination reason: Refutation not found, incomplete strategy
% 1.45/0.56  
% 1.45/0.56  % (18710)Memory used [KB]: 6140
% 1.45/0.56  % (18710)Time elapsed: 0.136 s
% 1.45/0.56  % (18710)Instructions burned: 7 (million)
% 1.45/0.56  % (18710)------------------------------
% 1.45/0.56  % (18710)------------------------------
% 1.45/0.56  % (18733)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.45/0.56  % (18733)Termination reason: Refutation not found, incomplete strategy
% 1.45/0.56  
% 1.45/0.56  % (18733)Memory used [KB]: 6268
% 1.45/0.56  % (18733)Time elapsed: 0.149 s
% 1.45/0.56  % (18733)Instructions burned: 5 (million)
% 1.45/0.56  % (18733)------------------------------
% 1.45/0.56  % (18733)------------------------------
% 1.45/0.56  % (18719)Instruction limit reached!
% 1.45/0.56  % (18719)------------------------------
% 1.45/0.56  % (18719)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.45/0.56  % (18719)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.45/0.56  % (18719)Termination reason: Unknown
% 1.45/0.56  % (18719)Termination phase: Saturation
% 1.45/0.56  
% 1.45/0.56  % (18719)Memory used [KB]: 1663
% 1.45/0.56  % (18719)Time elapsed: 0.005 s
% 1.45/0.56  % (18719)Instructions burned: 4 (million)
% 1.45/0.56  % (18719)------------------------------
% 1.45/0.56  % (18719)------------------------------
% 1.45/0.56  % (18722)Instruction limit reached!
% 1.45/0.56  % (18722)------------------------------
% 1.45/0.56  % (18722)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.45/0.56  % (18722)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.45/0.56  % (18722)Termination reason: Unknown
% 1.45/0.56  % (18722)Termination phase: Property scanning
% 1.45/0.56  
% 1.45/0.56  % (18722)Memory used [KB]: 1663
% 1.45/0.56  % (18722)Time elapsed: 0.004 s
% 1.45/0.56  % (18722)Instructions burned: 3 (million)
% 1.45/0.56  % (18722)------------------------------
% 1.45/0.56  % (18722)------------------------------
% 1.45/0.56  % (18711)Instruction limit reached!
% 1.45/0.56  % (18711)------------------------------
% 1.45/0.56  % (18711)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.45/0.56  % (18711)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.45/0.56  % (18711)Termination reason: Unknown
% 1.45/0.56  % (18711)Termination phase: Saturation
% 1.45/0.56  
% 1.45/0.56  % (18711)Memory used [KB]: 6908
% 1.45/0.56  % (18711)Time elapsed: 0.110 s
% 1.45/0.56  % (18711)Instructions burned: 40 (million)
% 1.45/0.56  % (18711)------------------------------
% 1.45/0.56  % (18711)------------------------------
% 1.45/0.56  % (18721)Refutation not found, incomplete strategy% (18721)------------------------------
% 1.45/0.56  % (18721)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.45/0.56  % (18721)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.45/0.56  % (18721)Termination reason: Refutation not found, incomplete strategy
% 1.45/0.56  
% 1.45/0.56  % (18721)Memory used [KB]: 6396
% 1.45/0.56  % (18721)Time elapsed: 0.152 s
% 1.45/0.56  % (18721)Instructions burned: 6 (million)
% 1.45/0.56  % (18721)------------------------------
% 1.45/0.56  % (18721)------------------------------
% 1.45/0.57  % (18713)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.45/0.57  % (18713)Termination reason: Unknown
% 1.45/0.57  % (18713)Termination phase: Saturation
% 1.45/0.57  
% 1.45/0.57  % (18713)Memory used [KB]: 6908
% 1.45/0.57  % (18713)Time elapsed: 0.141 s
% 1.45/0.57  % (18713)Instructions burned: 34 (million)
% 1.45/0.57  % (18713)------------------------------
% 1.45/0.57  % (18713)------------------------------
% 1.45/0.59  % (18732)Instruction limit reached!
% 1.45/0.59  % (18732)------------------------------
% 1.45/0.59  % (18732)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.45/0.59  % (18732)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.45/0.59  % (18732)Termination reason: Unknown
% 1.45/0.59  % (18732)Termination phase: Saturation
% 1.45/0.59  
% 1.45/0.59  % (18732)Memory used [KB]: 6908
% 1.45/0.59  % (18732)Time elapsed: 0.187 s
% 1.45/0.59  % (18732)Instructions burned: 26 (million)
% 1.45/0.59  % (18732)------------------------------
% 1.45/0.59  % (18732)------------------------------
% 1.45/0.59  % (18729)Refutation not found, incomplete strategy% (18729)------------------------------
% 1.45/0.59  % (18729)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.45/0.59  % (18729)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.45/0.59  % (18729)Termination reason: Refutation not found, incomplete strategy
% 1.45/0.59  
% 1.45/0.59  % (18729)Memory used [KB]: 6652
% 1.45/0.59  % (18729)Time elapsed: 0.185 s
% 1.45/0.59  % (18729)Instructions burned: 28 (million)
% 1.45/0.59  % (18729)------------------------------
% 1.45/0.59  % (18729)------------------------------
% 1.45/0.59  % (18734)Instruction limit reached!
% 1.45/0.59  % (18734)------------------------------
% 1.45/0.59  % (18734)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.45/0.59  % (18734)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.45/0.59  % (18734)Termination reason: Unknown
% 1.45/0.59  % (18734)Termination phase: Saturation
% 1.45/0.59  
% 1.45/0.59  % (18734)Memory used [KB]: 6524
% 1.45/0.59  % (18734)Time elapsed: 0.198 s
% 1.45/0.59  % (18734)Instructions burned: 25 (million)
% 1.45/0.59  % (18734)------------------------------
% 1.45/0.59  % (18734)------------------------------
% 1.45/0.60  % (18727)First to succeed.
% 1.45/0.60  % (18712)Instruction limit reached!
% 1.45/0.60  % (18712)------------------------------
% 1.45/0.60  % (18712)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.45/0.61  % (18718)Instruction limit reached!
% 1.45/0.61  % (18718)------------------------------
% 1.45/0.61  % (18718)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.45/0.61  % (18718)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.45/0.61  % (18718)Termination reason: Unknown
% 1.45/0.61  % (18718)Termination phase: Saturation
% 1.45/0.61  
% 1.45/0.61  % (18718)Memory used [KB]: 7164
% 1.45/0.61  % (18718)Time elapsed: 0.208 s
% 1.45/0.61  % (18718)Instructions burned: 52 (million)
% 1.45/0.61  % (18718)------------------------------
% 1.45/0.61  % (18718)------------------------------
% 1.45/0.61  % (18712)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.45/0.61  % (18712)Termination reason: Unknown
% 1.45/0.61  % (18712)Termination phase: Saturation
% 1.45/0.61  
% 1.45/0.61  % (18712)Memory used [KB]: 7036
% 1.45/0.61  % (18712)Time elapsed: 0.204 s
% 1.45/0.61  % (18712)Instructions burned: 49 (million)
% 1.45/0.61  % (18712)------------------------------
% 1.45/0.61  % (18712)------------------------------
% 1.45/0.62  % (18707)Instruction limit reached!
% 1.45/0.62  % (18707)------------------------------
% 1.45/0.62  % (18707)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.45/0.62  % (18707)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.45/0.62  % (18707)Termination reason: Unknown
% 1.45/0.62  % (18707)Termination phase: Saturation
% 1.45/0.62  
% 1.45/0.62  % (18707)Memory used [KB]: 7164
% 1.45/0.62  % (18707)Time elapsed: 0.214 s
% 1.45/0.62  % (18707)Instructions burned: 51 (million)
% 1.45/0.62  % (18707)------------------------------
% 1.45/0.62  % (18707)------------------------------
% 1.45/0.62  % (18704)Also succeeded, but the first one will report.
% 1.45/0.62  % (18727)Refutation found. Thanks to Tanya!
% 1.45/0.62  % SZS status Theorem for theBenchmark
% 1.45/0.62  % SZS output start Proof for theBenchmark
% See solution above
% 1.45/0.62  % (18727)------------------------------
% 1.45/0.62  % (18727)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.45/0.62  % (18727)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.45/0.62  % (18727)Termination reason: Refutation
% 1.45/0.62  
% 1.45/0.62  % (18727)Memory used [KB]: 6780
% 1.45/0.62  % (18727)Time elapsed: 0.205 s
% 1.45/0.62  % (18727)Instructions burned: 38 (million)
% 1.45/0.62  % (18727)------------------------------
% 1.45/0.62  % (18727)------------------------------
% 1.45/0.62  % (18697)Success in time 0.272 s
%------------------------------------------------------------------------------