TSTP Solution File: SWW960+1 by SnakeForV-SAT---1.0

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : SnakeForV-SAT---1.0
% Problem  : SWW960+1 : TPTP v8.1.0. Released v7.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_sat --cores 0 -t %d %s

% Computer : n027.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Wed Aug 31 19:25:06 EDT 2022

% Result   : Theorem 2.21s 0.69s
% Output   : Refutation 2.21s
% Verified : 
% SZS Type : Refutation
%            Derivation depth      :   16
%            Number of leaves      :   48
% Syntax   : Number of formulae    :  222 (  40 unt;   0 def)
%            Number of atoms       :  595 (  48 equ)
%            Maximal formula atoms :    7 (   2 avg)
%            Number of connectives :  659 ( 286   ~; 282   |;  36   &)
%                                         (  12 <=>;  43  =>;   0  <=;   0 <~>)
%            Maximal formula depth :   12 (   5 avg)
%            Maximal term depth    :    6 (   2 avg)
%            Number of predicates  :   17 (  15 usr;  13 prp; 0-2 aty)
%            Number of functors    :   36 (  36 usr;  11 con; 0-2 aty)
%            Number of variables   :  317 ( 315   !;   2   ?)

% Comments : 
%------------------------------------------------------------------------------
fof(f1739,plain,
    $false,
    inference(avatar_sat_refutation,[],[f535,f603,f691,f916,f1025,f1184,f1492,f1598,f1695,f1705,f1710,f1736,f1738]) ).

fof(f1738,plain,
    ( spl3_22
    | ~ spl3_3 ),
    inference(avatar_split_clause,[],[f1737,f530,f911]) ).

fof(f911,plain,
    ( spl3_22
  <=> ! [X2] : ~ pred_attacker(X2) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_22])]) ).

fof(f530,plain,
    ( spl3_3
  <=> ! [X1] : ~ pred_attacker(tuple_client_B_in_5(X1)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_3])]) ).

fof(f1737,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl3_3 ),
    inference(resolution,[],[f531,f480]) ).

fof(f480,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_5(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f290]) ).

fof(f290,plain,
    ! [X0] :
      ( ~ pred_attacker(X0)
      | pred_attacker(tuple_client_B_in_5(X0)) ),
    inference(ennf_transformation,[],[f225]) ).

fof(f225,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_5(X0)) ),
    inference(rectify,[],[f120]) ).

fof(f120,axiom,
    ! [X60] :
      ( pred_attacker(X60)
     => pred_attacker(tuple_client_B_in_5(X60)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax119) ).

fof(f531,plain,
    ( ! [X1] : ~ pred_attacker(tuple_client_B_in_5(X1))
    | ~ spl3_3 ),
    inference(avatar_component_clause,[],[f530]) ).

fof(f1736,plain,
    ( spl3_22
    | ~ spl3_4 ),
    inference(avatar_split_clause,[],[f1735,f533,f911]) ).

fof(f533,plain,
    ( spl3_4
  <=> ! [X2] : ~ pred_attacker(tuple_client_B_in_2(X2)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_4])]) ).

fof(f1735,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl3_4 ),
    inference(resolution,[],[f534,f381]) ).

fof(f381,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f264]) ).

fof(f264,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f196]) ).

fof(f196,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_2(X0)) ),
    inference(rectify,[],[f124]) ).

fof(f124,axiom,
    ! [X64] :
      ( pred_attacker(X64)
     => pred_attacker(tuple_client_B_in_2(X64)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax123) ).

fof(f534,plain,
    ( ! [X2] : ~ pred_attacker(tuple_client_B_in_2(X2))
    | ~ spl3_4 ),
    inference(avatar_component_clause,[],[f533]) ).

fof(f1710,plain,
    ( ~ spl3_2
    | ~ spl3_79 ),
    inference(avatar_contradiction_clause,[],[f1709]) ).

fof(f1709,plain,
    ( $false
    | ~ spl3_2
    | ~ spl3_79 ),
    inference(subsumption_resolution,[],[f1708,f582]) ).

fof(f582,plain,
    ( ~ pred_attacker(sF1)
    | ~ spl3_2 ),
    inference(subsumption_resolution,[],[f581,f542]) ).

fof(f542,plain,
    ( pred_attacker(name_objective)
    | ~ spl3_2 ),
    inference(resolution,[],[f440,f528]) ).

fof(f528,plain,
    ( pred_attacker(tuple_client_B_out_6(name_objective))
    | ~ spl3_2 ),
    inference(avatar_component_clause,[],[f526]) ).

fof(f526,plain,
    ( spl3_2
  <=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_2])]) ).

fof(f440,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_B_out_6(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f263]) ).

fof(f263,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_B_out_6(X0)) ),
    inference(ennf_transformation,[],[f190]) ).

fof(f190,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_out_6(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f114]) ).

fof(f114,axiom,
    ! [X51] :
      ( pred_attacker(tuple_client_B_out_6(X51))
     => pred_attacker(X51) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax113) ).

fof(f581,plain,
    ( ~ pred_attacker(sF1)
    | ~ pred_attacker(name_objective) ),
    inference(subsumption_resolution,[],[f580,f514]) ).

fof(f514,plain,
    ~ pred_attacker(sF2),
    inference(definition_folding,[],[f433,f513,f512]) ).

fof(f512,plain,
    name_Nb(sK0) = sF1,
    introduced(function_definition,[]) ).

fof(f513,plain,
    tuple_2(sF1,name_objective) = sF2,
    introduced(function_definition,[]) ).

fof(f433,plain,
    ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
    inference(cnf_transformation,[],[f337]) ).

fof(f337,plain,
    ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
    inference(skolemisation,[status(esa),new_symbols(skolem,[sK0])],[f309,f336]) ).

fof(f336,plain,
    ( ? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective))
   => ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)) ),
    introduced(choice_axiom,[]) ).

fof(f309,plain,
    ? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective)),
    inference(ennf_transformation,[],[f206]) ).

fof(f206,plain,
    ~ ! [X0] : pred_attacker(tuple_2(name_Nb(X0),name_objective)),
    inference(rectify,[],[f170]) ).

fof(f170,negated_conjecture,
    ~ ! [X115] : pred_attacker(tuple_2(name_Nb(X115),name_objective)),
    inference(negated_conjecture,[],[f169]) ).

fof(f169,conjecture,
    ! [X115] : pred_attacker(tuple_2(name_Nb(X115),name_objective)),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',co0) ).

fof(f580,plain,
    ( pred_attacker(sF2)
    | ~ pred_attacker(name_objective)
    | ~ pred_attacker(sF1) ),
    inference(superposition,[],[f376,f513]) ).

fof(f376,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X0,X1))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(cnf_transformation,[],[f329]) ).

fof(f329,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(X0)
      | ~ pred_attacker(X1)
      | pred_attacker(tuple_2(X0,X1)) ),
    inference(rectify,[],[f269]) ).

fof(f269,plain,
    ! [X1,X0] :
      ( ~ pred_attacker(X1)
      | ~ pred_attacker(X0)
      | pred_attacker(tuple_2(X1,X0)) ),
    inference(flattening,[],[f268]) ).

fof(f268,plain,
    ! [X1,X0] :
      ( pred_attacker(tuple_2(X1,X0))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(ennf_transformation,[],[f212]) ).

fof(f212,plain,
    ! [X1,X0] :
      ( ( pred_attacker(X0)
        & pred_attacker(X1) )
     => pred_attacker(tuple_2(X1,X0)) ),
    inference(rectify,[],[f145]) ).

fof(f145,axiom,
    ! [X87,X86] :
      ( ( pred_attacker(X87)
        & pred_attacker(X86) )
     => pred_attacker(tuple_2(X86,X87)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax144) ).

fof(f1708,plain,
    ( pred_attacker(sF1)
    | ~ spl3_79 ),
    inference(superposition,[],[f1694,f512]) ).

fof(f1694,plain,
    ( ! [X17] : pred_attacker(name_Nb(X17))
    | ~ spl3_79 ),
    inference(avatar_component_clause,[],[f1693]) ).

fof(f1693,plain,
    ( spl3_79
  <=> ! [X17] : pred_attacker(name_Nb(X17)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_79])]) ).

fof(f1705,plain,
    ( spl3_22
    | ~ spl3_1 ),
    inference(avatar_split_clause,[],[f1704,f523,f911]) ).

fof(f523,plain,
    ( spl3_1
  <=> ! [X3] : ~ pred_attacker(tuple_client_B_in_3(X3)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_1])]) ).

fof(f1704,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl3_1 ),
    inference(resolution,[],[f524,f445]) ).

fof(f445,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_3(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f273]) ).

fof(f273,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_3(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f229]) ).

fof(f229,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_3(X0)) ),
    inference(rectify,[],[f122]) ).

fof(f122,axiom,
    ! [X62] :
      ( pred_attacker(X62)
     => pred_attacker(tuple_client_B_in_3(X62)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax121) ).

fof(f524,plain,
    ( ! [X3] : ~ pred_attacker(tuple_client_B_in_3(X3))
    | ~ spl3_1 ),
    inference(avatar_component_clause,[],[f523]) ).

fof(f1695,plain,
    ( spl3_1
    | spl3_79
    | ~ spl3_6
    | ~ spl3_74 ),
    inference(avatar_split_clause,[],[f1691,f1596,f600,f1693,f523]) ).

fof(f600,plain,
    ( spl3_6
  <=> pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(name_A,constr_pkey(name_skA)),name_skS))) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_6])]) ).

fof(f1596,plain,
    ( spl3_74
  <=> ! [X1] :
        ( ~ pred_attacker(tuple_client_A_in_4(X1))
        | pred_attacker(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA))) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_74])]) ).

fof(f1691,plain,
    ( ! [X16,X17] :
        ( pred_attacker(name_Nb(X17))
        | ~ pred_attacker(tuple_client_B_in_3(X16)) )
    | ~ spl3_6
    | ~ spl3_74 ),
    inference(forward_demodulation,[],[f1670,f350]) ).

fof(f350,plain,
    ! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X1,X0)) = X0,
    inference(cnf_transformation,[],[f327]) ).

fof(f327,plain,
    ! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X1,X0)) = X0,
    inference(rectify,[],[f201]) ).

fof(f201,plain,
    ! [X1,X0] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
    inference(rectify,[],[f83]) ).

fof(f83,axiom,
    ! [X8,X9] : constr_tuple_2_get_1_bitstring(tuple_2(X8,X9)) = X9,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax82) ).

fof(f1670,plain,
    ( ! [X16,X17] :
        ( pred_attacker(constr_tuple_2_get_1_bitstring(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X16,name_skB)),name_Nb(X17))))
        | ~ pred_attacker(tuple_client_B_in_3(X16)) )
    | ~ spl3_6
    | ~ spl3_74 ),
    inference(resolution,[],[f1148,f1600]) ).

fof(f1600,plain,
    ( ! [X0] :
        ( ~ pred_attacker(constr_aenc(X0,constr_pkey(name_skA)))
        | pred_attacker(constr_tuple_2_get_1_bitstring(X0)) )
    | ~ spl3_74 ),
    inference(resolution,[],[f1599,f488]) ).

fof(f488,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f308]) ).

fof(f308,plain,
    ! [X0] :
      ( ~ pred_attacker(X0)
      | pred_attacker(tuple_client_A_in_4(X0)) ),
    inference(ennf_transformation,[],[f222]) ).

fof(f222,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_4(X0)) ),
    inference(rectify,[],[f133]) ).

fof(f133,axiom,
    ! [X76] :
      ( pred_attacker(X76)
     => pred_attacker(tuple_client_A_in_4(X76)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax132) ).

fof(f1599,plain,
    ( ! [X0] :
        ( ~ pred_attacker(tuple_client_A_in_4(constr_aenc(X0,constr_pkey(name_skA))))
        | pred_attacker(constr_tuple_2_get_1_bitstring(X0)) )
    | ~ spl3_74 ),
    inference(superposition,[],[f1597,f363]) ).

fof(f363,plain,
    ! [X0,X1] : constr_adec(constr_aenc(X1,constr_pkey(X0)),X0) = X1,
    inference(cnf_transformation,[],[f79]) ).

fof(f79,axiom,
    ! [X0,X1] : constr_adec(constr_aenc(X1,constr_pkey(X0)),X0) = X1,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax78) ).

fof(f1597,plain,
    ( ! [X1] :
        ( pred_attacker(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)))
        | ~ pred_attacker(tuple_client_A_in_4(X1)) )
    | ~ spl3_74 ),
    inference(avatar_component_clause,[],[f1596]) ).

fof(f1148,plain,
    ( ! [X0,X1] :
        ( pred_attacker(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X1)),constr_pkey(name_skA)))
        | ~ pred_attacker(tuple_client_B_in_3(X0)) )
    | ~ spl3_6 ),
    inference(resolution,[],[f1129,f483]) ).

fof(f483,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_B_out_4(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f244]) ).

fof(f244,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_B_out_4(X0)) ),
    inference(ennf_transformation,[],[f202]) ).

fof(f202,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_out_4(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f116]) ).

fof(f116,axiom,
    ! [X53] :
      ( pred_attacker(tuple_client_B_out_4(X53))
     => pred_attacker(X53) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax115) ).

fof(f1129,plain,
    ( ! [X0,X1] :
        ( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X1)),constr_pkey(name_skA))))
        | ~ pred_attacker(tuple_client_B_in_3(X0)) )
    | ~ spl3_6 ),
    inference(resolution,[],[f1063,f777]) ).

fof(f777,plain,
    ( pred_attacker(constr_sign(tuple_2(name_A,constr_pkey(name_skA)),name_skS))
    | ~ spl3_6 ),
    inference(resolution,[],[f602,f403]) ).

fof(f403,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_key_retrieval_server_out_2(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f305]) ).

fof(f305,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_key_retrieval_server_out_2(X0)) ),
    inference(ennf_transformation,[],[f221]) ).

fof(f221,plain,
    ! [X0] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f102]) ).

fof(f102,axiom,
    ! [X32] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(X32))
     => pred_attacker(X32) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax101) ).

fof(f602,plain,
    ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(name_A,constr_pkey(name_skA)),name_skS)))
    | ~ spl3_6 ),
    inference(avatar_component_clause,[],[f600]) ).

fof(f1063,plain,
    ! [X2,X3,X0,X1] :
      ( ~ pred_attacker(constr_sign(tuple_2(X3,X2),name_skS))
      | ~ pred_attacker(tuple_client_B_in_3(X0))
      | pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X1)),X2))) ),
    inference(resolution,[],[f827,f381]) ).

fof(f827,plain,
    ! [X2,X3,X0,X1] :
      ( ~ pred_attacker(tuple_client_B_in_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X2,name_skB)),name_Nb(X3)),X1)))
      | ~ pred_attacker(tuple_client_B_in_3(X2)) ),
    inference(superposition,[],[f772,f350]) ).

fof(f772,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(X0))))
      | ~ pred_attacker(tuple_client_B_in_2(constr_sign(X0,name_skS)))
      | ~ pred_attacker(tuple_client_B_in_3(X1)) ),
    inference(superposition,[],[f516,f392]) ).

fof(f392,plain,
    ! [X0,X1] : constr_checksign(constr_sign(X0,X1),constr_pkey(X1)) = X0,
    inference(cnf_transformation,[],[f228]) ).

fof(f228,plain,
    ! [X0,X1] : constr_checksign(constr_sign(X0,X1),constr_pkey(X1)) = X0,
    inference(rectify,[],[f82]) ).

fof(f82,axiom,
    ! [X7,X6] : constr_checksign(constr_sign(X7,X6),constr_pkey(X6)) = X7,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax81) ).

fof(f516,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_attacker(tuple_client_B_in_3(X1)) ),
    inference(subsumption_resolution,[],[f515,f411]) ).

fof(f411,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
    inference(cnf_transformation,[],[f199]) ).

fof(f199,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
    inference(rectify,[],[f87]) ).

fof(f87,axiom,
    ! [X16,X17] : pred_eq_bitstring_bitstring(X16,X17),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax86) ).

fof(f515,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
      | pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
    inference(subsumption_resolution,[],[f420,f411]) ).

fof(f420,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
      | pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_3(X1)) ),
    inference(cnf_transformation,[],[f333]) ).

fof(f333,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1)) ),
    inference(rectify,[],[f295]) ).

fof(f295,plain,
    ! [X0,X2,X1] :
      ( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X2,name_skB)),name_Nb(X1)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X2,name_skB)))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X2)) ),
    inference(flattening,[],[f294]) ).

fof(f294,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X2,name_skB)),name_Nb(X1)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X2,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X2)) ),
    inference(ennf_transformation,[],[f233]) ).

fof(f233,plain,
    ! [X2,X0,X1] :
      ( ( pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X2,name_skB)))
        & pred_attacker(tuple_client_B_in_2(X0))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_3(X2)) )
     => pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X2,name_skB)),name_Nb(X1)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
    inference(rectify,[],[f165]) ).

fof(f165,axiom,
    ! [X105,X103,X104] :
      ( ( pred_attacker(tuple_client_B_in_2(X105))
        & pred_attacker(tuple_client_B_in_3(X104))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X104,name_skB)))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X105,constr_pkey(name_skS)))) )
     => pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X104,name_skB)),name_Nb(X103)),constr_tuple_2_get_1_bitstring(constr_checksign(X105,constr_pkey(name_skS)))))) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax164) ).

fof(f1598,plain,
    ( spl3_22
    | spl3_74
    | ~ spl3_26 ),
    inference(avatar_split_clause,[],[f1594,f1182,f1596,f911]) ).

fof(f1182,plain,
    ( spl3_26
  <=> ! [X2,X1] :
        ( ~ pred_attacker(X1)
        | ~ pred_attacker(tuple_client_A_in_4(X2))
        | pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X2,name_skA)),X1)) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_26])]) ).

fof(f1594,plain,
    ( ! [X0,X1] :
        ( ~ pred_attacker(tuple_client_A_in_4(X1))
        | pred_attacker(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)))
        | ~ pred_attacker(X0) )
    | ~ spl3_26 ),
    inference(subsumption_resolution,[],[f1592,f395]) ).

fof(f395,plain,
    ! [X0] :
      ( pred_attacker(constr_pkey(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f245]) ).

fof(f245,plain,
    ! [X0] :
      ( ~ pred_attacker(X0)
      | pred_attacker(constr_pkey(X0)) ),
    inference(ennf_transformation,[],[f179]) ).

fof(f179,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(constr_pkey(X0)) ),
    inference(rectify,[],[f94]) ).

fof(f94,axiom,
    ! [X24] :
      ( pred_attacker(X24)
     => pred_attacker(constr_pkey(X24)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax93) ).

fof(f1592,plain,
    ( ! [X0,X1] :
        ( pred_attacker(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)))
        | ~ pred_attacker(X0)
        | ~ pred_attacker(constr_pkey(X0))
        | ~ pred_attacker(tuple_client_A_in_4(X1)) )
    | ~ spl3_26 ),
    inference(resolution,[],[f1183,f574]) ).

fof(f574,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(constr_aenc(X0,constr_pkey(X1)))
      | pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(superposition,[],[f352,f363]) ).

fof(f352,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_adec(X1,X0))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(cnf_transformation,[],[f285]) ).

fof(f285,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(X0)
      | ~ pred_attacker(X1)
      | pred_attacker(constr_adec(X1,X0)) ),
    inference(flattening,[],[f284]) ).

fof(f284,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_adec(X1,X0))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(ennf_transformation,[],[f174]) ).

fof(f174,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X0)
        & pred_attacker(X1) )
     => pred_attacker(constr_adec(X1,X0)) ),
    inference(rectify,[],[f139]) ).

fof(f139,axiom,
    ! [X85,X84] :
      ( ( pred_attacker(X84)
        & pred_attacker(X85) )
     => pred_attacker(constr_adec(X84,X85)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax138) ).

fof(f1183,plain,
    ( ! [X2,X1] :
        ( pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X2,name_skA)),X1))
        | ~ pred_attacker(X1)
        | ~ pred_attacker(tuple_client_A_in_4(X2)) )
    | ~ spl3_26 ),
    inference(avatar_component_clause,[],[f1182]) ).

fof(f1492,plain,
    ~ spl3_24,
    inference(avatar_contradiction_clause,[],[f1491]) ).

fof(f1491,plain,
    ( $false
    | ~ spl3_24 ),
    inference(subsumption_resolution,[],[f1490,f370]) ).

fof(f370,plain,
    name_A != name_I,
    inference(cnf_transformation,[],[f52]) ).

fof(f52,axiom,
    name_A != name_I,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax51) ).

fof(f1490,plain,
    ( name_A = name_I
    | ~ spl3_24 ),
    inference(subsumption_resolution,[],[f1208,f431]) ).

fof(f431,plain,
    name_B != name_I,
    inference(cnf_transformation,[],[f58]) ).

fof(f58,axiom,
    name_B != name_I,
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax57) ).

fof(f1208,plain,
    ( name_B = name_I
    | name_A = name_I
    | ~ spl3_24 ),
    inference(resolution,[],[f1176,f493]) ).

fof(f493,plain,
    pred_attacker(name_I),
    inference(cnf_transformation,[],[f151]) ).

fof(f151,axiom,
    pred_attacker(name_I),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax150) ).

fof(f1176,plain,
    ( ! [X15] :
        ( ~ pred_attacker(X15)
        | name_A = X15
        | name_B = X15 )
    | ~ spl3_24 ),
    inference(avatar_component_clause,[],[f1175]) ).

fof(f1175,plain,
    ( spl3_24
  <=> ! [X15] :
        ( name_B = X15
        | ~ pred_attacker(X15)
        | name_A = X15 ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_24])]) ).

fof(f1184,plain,
    ( spl3_24
    | spl3_26
    | ~ spl3_23 ),
    inference(avatar_split_clause,[],[f1166,f914,f1182,f1175]) ).

fof(f914,plain,
    ( spl3_23
  <=> ! [X0,X1] :
        ( ~ pred_attacker(X0)
        | name_B = X0
        | name_A = X0
        | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
        | ~ pred_attacker(X1) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_23])]) ).

fof(f1166,plain,
    ( ! [X2,X0,X1] :
        ( ~ pred_attacker(X1)
        | name_B = X0
        | pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X2,name_skA)),X1))
        | ~ pred_attacker(X0)
        | name_A = X0
        | ~ pred_attacker(tuple_client_A_in_4(X2)) )
    | ~ spl3_23 ),
    inference(resolution,[],[f1075,f1069]) ).

fof(f1069,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(constr_sign(tuple_2(X2,X1),name_skS))
      | pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA)),X1))
      | ~ pred_attacker(tuple_client_A_in_4(X0)) ),
    inference(resolution,[],[f864,f494]) ).

fof(f494,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f314]) ).

fof(f314,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f178]) ).

fof(f178,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_2(X0)) ),
    inference(rectify,[],[f135]) ).

fof(f135,axiom,
    ! [X78] :
      ( pred_attacker(X78)
     => pred_attacker(tuple_client_A_in_2(X78)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax134) ).

fof(f864,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(tuple_client_A_in_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X2,name_skA)),X1))
      | ~ pred_attacker(tuple_client_A_in_4(X2)) ),
    inference(superposition,[],[f798,f350]) ).

fof(f798,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(X0)))
      | ~ pred_attacker(tuple_client_A_in_4(X1))
      | ~ pred_attacker(tuple_client_A_in_2(constr_sign(X0,name_skS))) ),
    inference(superposition,[],[f612,f392]) ).

fof(f612,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))))
      | ~ pred_attacker(tuple_client_A_in_2(X1))
      | ~ pred_attacker(tuple_client_A_in_4(X0)) ),
    inference(resolution,[],[f518,f359]) ).

fof(f359,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_A_out_5(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f310]) ).

fof(f310,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_A_out_5(X0)) ),
    inference(ennf_transformation,[],[f208]) ).

fof(f208,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_out_5(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f127]) ).

fof(f127,axiom,
    ! [X67] :
      ( pred_attacker(tuple_client_A_out_5(X67))
     => pred_attacker(X67) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax126) ).

fof(f518,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_attacker(tuple_client_A_in_2(X1)) ),
    inference(subsumption_resolution,[],[f517,f411]) ).

fof(f517,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(tuple_client_A_in_2(X1))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
      | pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_A_in_4(X0)) ),
    inference(subsumption_resolution,[],[f345,f411]) ).

fof(f345,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
      | ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_2_get_0x30(constr_adec(X0,name_skA)))
      | ~ pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_attacker(tuple_client_A_in_2(X1))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS)))) ),
    inference(cnf_transformation,[],[f325]) ).

fof(f325,plain,
    ! [X0,X1,X2] :
      ( ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
      | ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_2_get_0x30(constr_adec(X0,name_skA)))
      | pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_attacker(tuple_client_A_in_2(X1)) ),
    inference(rectify,[],[f256]) ).

fof(f256,plain,
    ! [X2,X1,X0] :
      ( ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
      | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X2,name_skA)))
      | pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X2,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_A_in_4(X2))
      | ~ pred_attacker(tuple_client_A_in_2(X1)) ),
    inference(flattening,[],[f255]) ).

fof(f255,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X2,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
      | ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X2,name_skA)))
      | ~ pred_attacker(tuple_client_A_in_2(X1))
      | ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_A_in_4(X2)) ),
    inference(ennf_transformation,[],[f239]) ).

fof(f239,plain,
    ! [X0,X1,X2] :
      ( ( pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X2,name_skA)))
        & pred_attacker(tuple_client_A_in_2(X1))
        & pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_A_in_4(X2)) )
     => pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X2,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))))) ),
    inference(rectify,[],[f163]) ).

fof(f163,axiom,
    ! [X100,X102,X101] :
      ( ( pred_attacker(tuple_client_A_in_4(X101))
        & pred_eq_bitstring_bitstring(name_Na(X100),constr_tuple_2_get_0x30(constr_adec(X101,name_skA)))
        & pred_attacker(tuple_client_A_in_2(X102))
        & pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X102,constr_pkey(name_skS)))) )
     => pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X101,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X102,constr_pkey(name_skS)))))) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax162) ).

fof(f1075,plain,
    ( ! [X0,X1] :
        ( pred_attacker(constr_sign(tuple_2(X0,X1),name_skS))
        | name_A = X0
        | ~ pred_attacker(X1)
        | name_B = X0
        | ~ pred_attacker(X0) )
    | ~ spl3_23 ),
    inference(resolution,[],[f915,f403]) ).

fof(f915,plain,
    ( ! [X0,X1] :
        ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
        | name_A = X0
        | ~ pred_attacker(X0)
        | ~ pred_attacker(X1)
        | name_B = X0 )
    | ~ spl3_23 ),
    inference(avatar_component_clause,[],[f914]) ).

fof(f1025,plain,
    ~ spl3_22,
    inference(avatar_contradiction_clause,[],[f929]) ).

fof(f929,plain,
    ( $false
    | ~ spl3_22 ),
    inference(resolution,[],[f912,f537]) ).

fof(f537,plain,
    pred_attacker(constr_pkey(name_skB)),
    inference(resolution,[],[f380,f471]) ).

fof(f471,plain,
    pred_attacker(tuple_out_2(constr_pkey(name_skB))),
    inference(cnf_transformation,[],[f159]) ).

fof(f159,axiom,
    pred_attacker(tuple_out_2(constr_pkey(name_skB))),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax158) ).

fof(f380,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_out_2(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f297]) ).

fof(f297,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_out_2(X0))
      | pred_attacker(X0) ),
    inference(ennf_transformation,[],[f186]) ).

fof(f186,plain,
    ! [X0] :
      ( pred_attacker(tuple_out_2(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f98]) ).

fof(f98,axiom,
    ! [X28] :
      ( pred_attacker(tuple_out_2(X28))
     => pred_attacker(X28) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax97) ).

fof(f912,plain,
    ( ! [X2] : ~ pred_attacker(X2)
    | ~ spl3_22 ),
    inference(avatar_component_clause,[],[f911]) ).

fof(f916,plain,
    ( spl3_22
    | spl3_23 ),
    inference(avatar_split_clause,[],[f909,f914,f911]) ).

fof(f909,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(X0)
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X2)
      | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | name_A = X0
      | name_B = X0 ),
    inference(resolution,[],[f781,f371]) ).

fof(f371,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(cnf_transformation,[],[f247]) ).

fof(f247,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(X0)
      | ~ pred_attacker(X1)
      | pred_attacker(tuple_key_retrieval_server_in_1(X1,X0)) ),
    inference(flattening,[],[f246]) ).

fof(f246,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(ennf_transformation,[],[f192]) ).

fof(f192,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X0)
        & pred_attacker(X1) )
     => pred_attacker(tuple_key_retrieval_server_in_1(X1,X0)) ),
    inference(rectify,[],[f103]) ).

fof(f103,axiom,
    ! [X34,X33] :
      ( ( pred_attacker(X33)
        & pred_attacker(X34) )
     => pred_attacker(tuple_key_retrieval_server_in_1(X33,X34)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax102) ).

fof(f781,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
      | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | name_B = X0
      | ~ pred_attacker(X1)
      | name_A = X0 ),
    inference(subsumption_resolution,[],[f780,f439]) ).

fof(f439,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f338]) ).

fof(f338,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
      | pred_attacker(X0) ),
    inference(rectify,[],[f303]) ).

fof(f303,plain,
    ! [X1,X0] :
      ( ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
      | pred_attacker(X1) ),
    inference(ennf_transformation,[],[f175]) ).

fof(f175,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
     => pred_attacker(X1) ),
    inference(rectify,[],[f105]) ).

fof(f105,axiom,
    ! [X37,X38] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X37,X38))
     => pred_attacker(X38) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax104) ).

fof(f780,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
      | name_A = X0
      | name_B = X0
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(resolution,[],[f591,f443]) ).

fof(f443,plain,
    ! [X2,X0,X1] :
      ( ~ pred_table(tuple_keys(X1,X2))
      | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X2),name_skS)))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
    inference(cnf_transformation,[],[f339]) ).

fof(f339,plain,
    ! [X0,X1,X2] :
      ( ~ pred_table(tuple_keys(X1,X2))
      | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X2),name_skS)))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
    inference(rectify,[],[f307]) ).

fof(f307,plain,
    ! [X2,X1,X0] :
      ( ~ pred_table(tuple_keys(X1,X0))
      | pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X0),name_skS)))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X1)) ),
    inference(flattening,[],[f306]) ).

fof(f306,plain,
    ! [X1,X2,X0] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X0),name_skS)))
      | ~ pred_table(tuple_keys(X1,X0))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X1)) ),
    inference(ennf_transformation,[],[f215]) ).

fof(f215,plain,
    ! [X1,X2,X0] :
      ( ( pred_table(tuple_keys(X1,X0))
        & pred_attacker(tuple_key_retrieval_server_in_1(X2,X1)) )
     => pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X0),name_skS))) ),
    inference(rectify,[],[f167]) ).

fof(f167,axiom,
    ! [X111,X110,X112] :
      ( ( pred_attacker(tuple_key_retrieval_server_in_1(X112,X110))
        & pred_table(tuple_keys(X110,X111)) )
     => pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X110,X111),name_skS))) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax166) ).

fof(f591,plain,
    ! [X0,X1] :
      ( pred_table(tuple_keys(X0,X1))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1)
      | name_B = X0
      | name_A = X0 ),
    inference(resolution,[],[f500,f410]) ).

fof(f410,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f332]) ).

fof(f332,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(rectify,[],[f266]) ).

fof(f266,plain,
    ! [X1,X0] :
      ( pred_attacker(tuple_key_register_server_in_1(X1,X0))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f265]) ).

fof(f265,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_register_server_in_1(X1,X0))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(ennf_transformation,[],[f197]) ).

fof(f197,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X0)
        & pred_attacker(X1) )
     => pred_attacker(tuple_key_register_server_in_1(X1,X0)) ),
    inference(rectify,[],[f106]) ).

fof(f106,axiom,
    ! [X40,X39] :
      ( ( pred_attacker(X40)
        & pred_attacker(X39) )
     => pred_attacker(tuple_key_register_server_in_1(X39,X40)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax105) ).

fof(f500,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | name_B = X0
      | pred_table(tuple_keys(X0,X1))
      | name_A = X0 ),
    inference(cnf_transformation,[],[f323]) ).

fof(f323,plain,
    ! [X0,X1] :
      ( name_A = X0
      | ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | name_B = X0
      | pred_table(tuple_keys(X0,X1)) ),
    inference(flattening,[],[f322]) ).

fof(f322,plain,
    ! [X0,X1] :
      ( pred_table(tuple_keys(X0,X1))
      | ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | name_B = X0
      | name_A = X0 ),
    inference(ennf_transformation,[],[f219]) ).

fof(f219,plain,
    ! [X0,X1] :
      ( ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
        & name_B != X0
        & name_A != X0 )
     => pred_table(tuple_keys(X0,X1)) ),
    inference(rectify,[],[f168]) ).

fof(f168,axiom,
    ! [X113,X114] :
      ( ( name_A != X113
        & pred_attacker(tuple_key_register_server_in_1(X113,X114))
        & name_B != X113 )
     => pred_table(tuple_keys(X113,X114)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax167) ).

fof(f691,plain,
    ~ spl3_5,
    inference(avatar_contradiction_clause,[],[f653]) ).

fof(f653,plain,
    ( $false
    | ~ spl3_5 ),
    inference(resolution,[],[f616,f442]) ).

fof(f442,plain,
    pred_attacker(tuple_false),
    inference(cnf_transformation,[],[f110]) ).

fof(f110,axiom,
    pred_attacker(tuple_false),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax109) ).

fof(f616,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl3_5 ),
    inference(subsumption_resolution,[],[f615,f454]) ).

fof(f454,plain,
    pred_attacker(name_A),
    inference(cnf_transformation,[],[f153]) ).

fof(f153,axiom,
    pred_attacker(name_A),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax152) ).

fof(f615,plain,
    ( ! [X0] :
        ( ~ pred_attacker(name_A)
        | ~ pred_attacker(X0) )
    | ~ spl3_5 ),
    inference(resolution,[],[f598,f371]) ).

fof(f598,plain,
    ( ! [X0] : ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,name_A))
    | ~ spl3_5 ),
    inference(avatar_component_clause,[],[f597]) ).

fof(f597,plain,
    ( spl3_5
  <=> ! [X0] : ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,name_A)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl3_5])]) ).

fof(f603,plain,
    ( spl3_5
    | spl3_6 ),
    inference(avatar_split_clause,[],[f594,f600,f597]) ).

fof(f594,plain,
    ! [X0] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(name_A,constr_pkey(name_skA)),name_skS)))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,name_A)) ),
    inference(resolution,[],[f443,f375]) ).

fof(f375,plain,
    pred_table(tuple_keys(name_A,constr_pkey(name_skA))),
    inference(cnf_transformation,[],[f156]) ).

fof(f156,axiom,
    pred_table(tuple_keys(name_A,constr_pkey(name_skA))),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax155) ).

fof(f535,plain,
    ( spl3_1
    | spl3_2
    | spl3_3
    | spl3_4 ),
    inference(avatar_split_clause,[],[f521,f533,f530,f526,f523]) ).

fof(f521,plain,
    ! [X2,X3,X1] :
      ( ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_attacker(tuple_client_B_in_5(X1))
      | pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_3(X3)) ),
    inference(subsumption_resolution,[],[f520,f411]) ).

fof(f520,plain,
    ! [X2,X3,X1] :
      ( ~ pred_attacker(tuple_client_B_in_3(X3))
      | pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_5(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_2(X2)) ),
    inference(subsumption_resolution,[],[f519,f411]) ).

fof(f519,plain,
    ! [X2,X3,X1] :
      ( ~ pred_attacker(tuple_client_B_in_5(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_3(X3)) ),
    inference(subsumption_resolution,[],[f464,f411]) ).

fof(f464,plain,
    ! [X2,X3,X0,X1] :
      ( ~ pred_attacker(tuple_client_B_in_5(X1))
      | pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X1,name_skB))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_attacker(tuple_client_B_in_3(X3))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS)))) ),
    inference(cnf_transformation,[],[f340]) ).

fof(f340,plain,
    ! [X0,X1,X2,X3] :
      ( ~ pred_attacker(tuple_client_B_in_5(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X3))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X1,name_skB))
      | pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(rectify,[],[f254]) ).

fof(f254,plain,
    ! [X1,X0,X2,X3] :
      ( ~ pred_attacker(tuple_client_B_in_5(X0))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X3))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X1),constr_adec(X0,name_skB))
      | pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(flattening,[],[f253]) ).

fof(f253,plain,
    ! [X0,X1,X3,X2] :
      ( pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_attacker(tuple_client_B_in_5(X0))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X1),constr_adec(X0,name_skB))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_3(X3)) ),
    inference(ennf_transformation,[],[f205]) ).

fof(f205,plain,
    ! [X0,X1,X3,X2] :
      ( ( pred_attacker(tuple_client_B_in_2(X2))
        & pred_attacker(tuple_client_B_in_5(X0))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
        & pred_eq_bitstring_bitstring(name_Nb(X1),constr_adec(X0,name_skB))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
        & pred_attacker(tuple_client_B_in_3(X3)) )
     => pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(rectify,[],[f166]) ).

fof(f166,axiom,
    ! [X108,X106,X109,X107] :
      ( ( pred_attacker(tuple_client_B_in_2(X109))
        & pred_attacker(tuple_client_B_in_3(X107))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X107,name_skB)))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X109,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_5(X108))
        & pred_eq_bitstring_bitstring(name_Nb(X106),constr_adec(X108,name_skB)) )
     => pred_attacker(tuple_client_B_out_6(name_objective)) ),
    file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax165) ).

%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.13/0.13  % Problem    : SWW960+1 : TPTP v8.1.0. Released v7.4.0.
% 0.13/0.14  % Command    : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_sat --cores 0 -t %d %s
% 0.14/0.35  % Computer : n027.cluster.edu
% 0.14/0.35  % Model    : x86_64 x86_64
% 0.14/0.35  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.14/0.35  % Memory   : 8042.1875MB
% 0.14/0.35  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.14/0.35  % CPULimit   : 300
% 0.14/0.35  % WCLimit    : 300
% 0.14/0.35  % DateTime   : Tue Aug 30 21:33:16 EDT 2022
% 0.14/0.35  % CPUTime    : 
% 0.21/0.51  % (11423)dis+10_1:1_fsd=on:sp=occurrence:i=7:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/7Mi)
% 0.21/0.52  % (11425)ott-1_1:6_av=off:cond=on:fsr=off:nwc=3.0:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 0.21/0.53  % (11439)ott+11_1:1_drc=off:nwc=5.0:slsq=on:slsqc=1:spb=goal_then_units:to=lpo:i=467:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/467Mi)
% 0.21/0.53  % (11417)ott+10_1:32_abs=on:br=off:urr=ec_only:i=50:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/50Mi)
% 0.21/0.53  % (11423)Instruction limit reached!
% 0.21/0.53  % (11423)------------------------------
% 0.21/0.53  % (11423)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.21/0.53  % (11431)ott+11_2:3_av=off:fde=unused:nwc=5.0:tgt=ground:i=75:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/75Mi)
% 0.21/0.53  % (11419)ott+10_1:32_bd=off:fsr=off:newcnf=on:tgt=full:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 0.21/0.54  % (11444)ott+33_1:4_s2a=on:tgt=ground:i=439:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/439Mi)
% 0.21/0.54  % (11423)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.21/0.54  % (11423)Termination reason: Unknown
% 0.21/0.54  % (11423)Termination phase: Saturation
% 0.21/0.54  
% 0.21/0.54  % (11423)Memory used [KB]: 5756
% 0.21/0.54  % (11423)Time elapsed: 0.109 s
% 0.21/0.54  % (11423)Instructions burned: 7 (million)
% 0.21/0.54  % (11423)------------------------------
% 0.21/0.54  % (11423)------------------------------
% 0.21/0.54  % (11416)fmb+10_1:1_bce=on:fmbsr=1.5:nm=4:skr=on:i=191324:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/191324Mi)
% 0.21/0.54  % (11420)ott+33_1:4_s2a=on:tgt=ground:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 0.21/0.54  % (11418)ott+4_1:1_av=off:bd=off:nwc=5.0:s2a=on:s2at=2.0:slsq=on:slsqc=2:slsql=off:slsqr=1,2:sp=frequency:i=37:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/37Mi)
% 0.21/0.54  % (11424)dis+2_1:64_add=large:bce=on:bd=off:i=2:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/2Mi)
% 0.21/0.54  % (11421)dis+34_1:32_abs=on:add=off:bsr=on:gsp=on:sp=weighted_frequency:i=48:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/48Mi)
% 0.21/0.54  % (11424)Instruction limit reached!
% 0.21/0.54  % (11424)------------------------------
% 0.21/0.54  % (11424)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.21/0.54  % (11424)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.21/0.54  % (11424)Termination reason: Unknown
% 0.21/0.54  % (11424)Termination phase: Preprocessing 3
% 0.21/0.54  
% 0.21/0.54  % (11424)Memory used [KB]: 1151
% 0.21/0.54  % (11424)Time elapsed: 0.002 s
% 0.21/0.54  % (11424)Instructions burned: 3 (million)
% 0.21/0.54  % (11424)------------------------------
% 0.21/0.54  % (11424)------------------------------
% 0.21/0.54  % (11440)ott+10_1:1_kws=precedence:tgt=ground:i=482:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/482Mi)
% 0.21/0.54  % (11433)fmb+10_1:1_bce=on:i=59:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/59Mi)
% 0.21/0.54  % (11441)ott+10_1:5_bd=off:tgt=full:i=500:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/500Mi)
% 0.21/0.55  % (11422)fmb+10_1:1_fmbsr=2.0:nm=4:skr=on:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 0.21/0.55  % (11436)ott+10_1:8_bsd=on:fsd=on:lcm=predicate:nwc=5.0:s2a=on:s2at=1.5:spb=goal_then_units:i=176:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/176Mi)
% 0.21/0.55  % (11434)ott+10_1:1_tgt=ground:i=100:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/100Mi)
% 0.21/0.55  % (11435)ott+4_1:1_av=off:bd=off:nwc=5.0:rp=on:s2a=on:s2at=2.0:slsq=on:slsqc=2:slsql=off:slsqr=1,2:sp=frequency:i=100:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/100Mi)
% 0.21/0.55  % (11428)ott+10_1:28_bd=off:bs=on:tgt=ground:i=101:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/101Mi)
% 0.21/0.55  % (11417)Refutation not found, incomplete strategy% (11417)------------------------------
% 0.21/0.55  % (11417)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.21/0.55  % (11417)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.21/0.55  % (11417)Termination reason: Refutation not found, incomplete strategy
% 0.21/0.55  
% 0.21/0.55  % (11417)Memory used [KB]: 5884
% 0.21/0.55  % (11417)Time elapsed: 0.135 s
% 0.21/0.55  % (11417)Instructions burned: 14 (million)
% 0.21/0.55  % (11417)------------------------------
% 0.21/0.55  % (11417)------------------------------
% 0.21/0.55  % (11429)ott+10_1:5_bd=off:tgt=full:i=99:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/99Mi)
% 0.21/0.56  % (11426)ott+2_1:1_fsr=off:gsp=on:i=50:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/50Mi)
% 0.21/0.56  % (11427)ott+10_1:32_bd=off:fsr=off:newcnf=on:tgt=full:i=100:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/100Mi)
% 0.21/0.56  % (11442)ins+10_1:1_awrs=decay:awrsf=30:bsr=unit_only:foolp=on:igrr=8/457:igs=10:igwr=on:nwc=1.5:sp=weighted_frequency:to=lpo:uhcvi=on:i=68:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/68Mi)
% 1.52/0.56  % (11430)ins+10_1:1_awrs=decay:awrsf=30:bsr=unit_only:foolp=on:igrr=8/457:igs=10:igwr=on:nwc=1.5:sp=weighted_frequency:to=lpo:uhcvi=on:i=68:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/68Mi)
% 1.52/0.56  % (11443)ott+11_2:3_av=off:fde=unused:nwc=5.0:tgt=ground:i=177:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/177Mi)
% 1.52/0.56  % (11432)dis+34_1:32_abs=on:add=off:bsr=on:gsp=on:sp=weighted_frequency:i=99:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/99Mi)
% 1.52/0.57  % (11437)ott+3_1:1_gsp=on:lcm=predicate:i=138:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/138Mi)
% 1.52/0.57  % (11438)dis+21_1:1_av=off:er=filter:slsq=on:slsqc=0:slsqr=1,1:sp=frequency:to=lpo:i=498:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/498Mi)
% 1.52/0.57  % (11445)ott+10_7:2_awrs=decay:awrsf=8:bd=preordered:drc=off:fd=preordered:fde=unused:fsr=off:slsq=on:slsqc=2:slsqr=5,8:sp=const_min:spb=units:to=lpo:i=355:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/355Mi)
% 1.63/0.60  % (11418)Instruction limit reached!
% 1.63/0.60  % (11418)------------------------------
% 1.63/0.60  % (11418)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.63/0.60  % (11418)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.63/0.60  % (11418)Termination reason: Unknown
% 1.63/0.60  % (11418)Termination phase: Saturation
% 1.63/0.60  
% 1.63/0.60  % (11418)Memory used [KB]: 1663
% 1.63/0.60  % (11418)Time elapsed: 0.171 s
% 1.63/0.60  % (11418)Instructions burned: 38 (million)
% 1.63/0.60  % (11418)------------------------------
% 1.63/0.60  % (11418)------------------------------
% 1.63/0.61  TRYING [13]
% 1.63/0.61  TRYING [13]
% 1.63/0.62  TRYING [13]
% 1.63/0.62  % (11425)Instruction limit reached!
% 1.63/0.62  % (11425)------------------------------
% 1.63/0.62  % (11425)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.63/0.62  % (11425)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.63/0.62  % (11425)Termination reason: Unknown
% 1.63/0.62  % (11425)Termination phase: Saturation
% 1.63/0.62  
% 1.63/0.62  % (11425)Memory used [KB]: 2430
% 1.63/0.62  % (11425)Time elapsed: 0.181 s
% 1.63/0.62  % (11425)Instructions burned: 52 (million)
% 1.63/0.62  % (11425)------------------------------
% 1.63/0.62  % (11425)------------------------------
% 1.63/0.62  % (11422)Instruction limit reached!
% 1.63/0.62  % (11422)------------------------------
% 1.63/0.62  % (11422)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.63/0.62  % (11422)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.63/0.62  % (11422)Termination reason: Unknown
% 1.63/0.62  % (11422)Termination phase: Finite model building constraint generation
% 1.63/0.62  
% 1.63/0.62  % (11422)Memory used [KB]: 14839
% 1.63/0.62  % (11422)Time elapsed: 0.159 s
% 1.63/0.62  % (11422)Instructions burned: 51 (million)
% 1.63/0.62  % (11422)------------------------------
% 1.63/0.62  % (11422)------------------------------
% 1.63/0.62  % (11420)Instruction limit reached!
% 1.63/0.62  % (11420)------------------------------
% 1.63/0.62  % (11420)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.63/0.62  % (11420)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.63/0.62  % (11420)Termination reason: Unknown
% 1.63/0.62  % (11420)Termination phase: Saturation
% 1.63/0.62  
% 1.63/0.62  % (11420)Memory used [KB]: 6908
% 1.63/0.62  % (11420)Time elapsed: 0.210 s
% 1.63/0.62  % (11420)Instructions burned: 52 (million)
% 1.63/0.62  % (11420)------------------------------
% 1.63/0.62  % (11420)------------------------------
% 2.05/0.63  % (11421)Instruction limit reached!
% 2.05/0.63  % (11421)------------------------------
% 2.05/0.63  % (11421)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.05/0.63  % (11421)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.05/0.63  % (11421)Termination reason: Unknown
% 2.05/0.63  % (11421)Termination phase: Saturation
% 2.05/0.63  
% 2.05/0.63  % (11421)Memory used [KB]: 6268
% 2.05/0.63  % (11421)Time elapsed: 0.199 s
% 2.05/0.63  % (11421)Instructions burned: 48 (million)
% 2.05/0.63  % (11421)------------------------------
% 2.05/0.63  % (11421)------------------------------
% 2.05/0.63  % (11433)Instruction limit reached!
% 2.05/0.63  % (11433)------------------------------
% 2.05/0.63  % (11433)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.05/0.63  % (11433)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.05/0.63  % (11433)Termination reason: Unknown
% 2.05/0.63  % (11433)Termination phase: Finite model building constraint generation
% 2.05/0.63  
% 2.05/0.63  % (11433)Memory used [KB]: 15735
% 2.05/0.63  % (11433)Time elapsed: 0.200 s
% 2.05/0.63  % (11433)Instructions burned: 62 (million)
% 2.05/0.63  % (11433)------------------------------
% 2.05/0.63  % (11433)------------------------------
% 2.05/0.63  % (11431)Instruction limit reached!
% 2.05/0.63  % (11431)------------------------------
% 2.05/0.63  % (11431)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.05/0.64  % (11431)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.05/0.64  % (11431)Termination reason: Unknown
% 2.05/0.64  % (11431)Termination phase: Saturation
% 2.05/0.64  
% 2.05/0.64  % (11431)Memory used [KB]: 2302
% 2.05/0.64  % (11431)Time elapsed: 0.215 s
% 2.05/0.64  % (11431)Instructions burned: 75 (million)
% 2.05/0.64  % (11431)------------------------------
% 2.05/0.64  % (11431)------------------------------
% 2.05/0.64  % (11419)Instruction limit reached!
% 2.05/0.64  % (11419)------------------------------
% 2.05/0.64  % (11419)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.05/0.64  % (11419)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.05/0.64  % (11419)Termination reason: Unknown
% 2.05/0.64  % (11419)Termination phase: Saturation
% 2.05/0.64  
% 2.05/0.64  % (11419)Memory used [KB]: 6652
% 2.05/0.64  % (11419)Time elapsed: 0.209 s
% 2.05/0.64  % (11419)Instructions burned: 51 (million)
% 2.05/0.64  % (11419)------------------------------
% 2.05/0.64  % (11419)------------------------------
% 2.21/0.66  % (11440)First to succeed.
% 2.21/0.66  % (11430)Instruction limit reached!
% 2.21/0.66  % (11430)------------------------------
% 2.21/0.66  % (11430)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.21/0.66  % (11430)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.21/0.66  % (11430)Termination reason: Unknown
% 2.21/0.66  % (11430)Termination phase: Saturation
% 2.21/0.66  
% 2.21/0.66  % (11430)Memory used [KB]: 7036
% 2.21/0.66  % (11430)Time elapsed: 0.039 s
% 2.21/0.66  % (11430)Instructions burned: 68 (million)
% 2.21/0.66  % (11430)------------------------------
% 2.21/0.66  % (11430)------------------------------
% 2.21/0.67  % (11442)Instruction limit reached!
% 2.21/0.67  % (11442)------------------------------
% 2.21/0.67  % (11442)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.21/0.67  % (11442)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.21/0.67  % (11442)Termination reason: Unknown
% 2.21/0.67  % (11442)Termination phase: Saturation
% 2.21/0.67  
% 2.21/0.67  % (11442)Memory used [KB]: 7036
% 2.21/0.67  % (11442)Time elapsed: 0.039 s
% 2.21/0.67  % (11442)Instructions burned: 68 (million)
% 2.21/0.67  % (11442)------------------------------
% 2.21/0.67  % (11442)------------------------------
% 2.21/0.67  % (11426)Instruction limit reached!
% 2.21/0.67  % (11426)------------------------------
% 2.21/0.67  % (11426)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.21/0.67  % (11426)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.21/0.67  % (11426)Termination reason: Unknown
% 2.21/0.67  % (11426)Termination phase: Saturation
% 2.21/0.67  
% 2.21/0.67  % (11426)Memory used [KB]: 6652
% 2.21/0.67  % (11426)Time elapsed: 0.244 s
% 2.21/0.67  % (11426)Instructions burned: 51 (million)
% 2.21/0.67  % (11426)------------------------------
% 2.21/0.67  % (11426)------------------------------
% 2.21/0.68  % (11448)dis+22_1:128_bsd=on:rp=on:slsq=on:slsqc=1:slsqr=1,6:sp=frequency:spb=goal:thsq=on:thsqc=16:thsqd=1:thsql=off:i=90:si=on:rawr=on:rtra=on_0 on theBenchmark for (2998ds/90Mi)
% 2.21/0.68  % (11447)ott-1_1:6_av=off:cond=on:fsr=off:nwc=3.0:i=211:si=on:rawr=on:rtra=on_0 on theBenchmark for (2998ds/211Mi)
% 2.21/0.68  % (11446)dis+34_1:32_abs=on:add=off:bsr=on:gsp=on:sp=weighted_frequency:i=388:si=on:rawr=on:rtra=on_0 on theBenchmark for (2998ds/388Mi)
% 2.21/0.69  % (11434)Also succeeded, but the first one will report.
% 2.21/0.69  % (11440)Refutation found. Thanks to Tanya!
% 2.21/0.69  % SZS status Theorem for theBenchmark
% 2.21/0.69  % SZS output start Proof for theBenchmark
% See solution above
% 2.21/0.69  % (11440)------------------------------
% 2.21/0.69  % (11440)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.21/0.69  % (11440)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.21/0.69  % (11440)Termination reason: Refutation
% 2.21/0.69  
% 2.21/0.69  % (11440)Memory used [KB]: 6652
% 2.21/0.69  % (11440)Time elapsed: 0.208 s
% 2.21/0.69  % (11440)Instructions burned: 58 (million)
% 2.21/0.69  % (11440)------------------------------
% 2.21/0.69  % (11440)------------------------------
% 2.21/0.69  % (11415)Success in time 0.321 s
%------------------------------------------------------------------------------