TSTP Solution File: SWW960+1 by SnakeForV-SAT---1.0
View Problem
- Process Solution
%------------------------------------------------------------------------------
% File : SnakeForV-SAT---1.0
% Problem : SWW960+1 : TPTP v8.1.0. Released v7.4.0.
% Transfm : none
% Format : tptp:raw
% Command : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_sat --cores 0 -t %d %s
% Computer : n027.cluster.edu
% Model : x86_64 x86_64
% CPU : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory : 8042.1875MB
% OS : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit : 300s
% DateTime : Wed Aug 31 19:25:06 EDT 2022
% Result : Theorem 2.21s 0.69s
% Output : Refutation 2.21s
% Verified :
% SZS Type : Refutation
% Derivation depth : 16
% Number of leaves : 48
% Syntax : Number of formulae : 222 ( 40 unt; 0 def)
% Number of atoms : 595 ( 48 equ)
% Maximal formula atoms : 7 ( 2 avg)
% Number of connectives : 659 ( 286 ~; 282 |; 36 &)
% ( 12 <=>; 43 =>; 0 <=; 0 <~>)
% Maximal formula depth : 12 ( 5 avg)
% Maximal term depth : 6 ( 2 avg)
% Number of predicates : 17 ( 15 usr; 13 prp; 0-2 aty)
% Number of functors : 36 ( 36 usr; 11 con; 0-2 aty)
% Number of variables : 317 ( 315 !; 2 ?)
% Comments :
%------------------------------------------------------------------------------
fof(f1739,plain,
$false,
inference(avatar_sat_refutation,[],[f535,f603,f691,f916,f1025,f1184,f1492,f1598,f1695,f1705,f1710,f1736,f1738]) ).
fof(f1738,plain,
( spl3_22
| ~ spl3_3 ),
inference(avatar_split_clause,[],[f1737,f530,f911]) ).
fof(f911,plain,
( spl3_22
<=> ! [X2] : ~ pred_attacker(X2) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_22])]) ).
fof(f530,plain,
( spl3_3
<=> ! [X1] : ~ pred_attacker(tuple_client_B_in_5(X1)) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_3])]) ).
fof(f1737,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl3_3 ),
inference(resolution,[],[f531,f480]) ).
fof(f480,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f290]) ).
fof(f290,plain,
! [X0] :
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_B_in_5(X0)) ),
inference(ennf_transformation,[],[f225]) ).
fof(f225,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_5(X0)) ),
inference(rectify,[],[f120]) ).
fof(f120,axiom,
! [X60] :
( pred_attacker(X60)
=> pred_attacker(tuple_client_B_in_5(X60)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax119) ).
fof(f531,plain,
( ! [X1] : ~ pred_attacker(tuple_client_B_in_5(X1))
| ~ spl3_3 ),
inference(avatar_component_clause,[],[f530]) ).
fof(f1736,plain,
( spl3_22
| ~ spl3_4 ),
inference(avatar_split_clause,[],[f1735,f533,f911]) ).
fof(f533,plain,
( spl3_4
<=> ! [X2] : ~ pred_attacker(tuple_client_B_in_2(X2)) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_4])]) ).
fof(f1735,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl3_4 ),
inference(resolution,[],[f534,f381]) ).
fof(f381,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f264]) ).
fof(f264,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f196]) ).
fof(f196,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_2(X0)) ),
inference(rectify,[],[f124]) ).
fof(f124,axiom,
! [X64] :
( pred_attacker(X64)
=> pred_attacker(tuple_client_B_in_2(X64)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax123) ).
fof(f534,plain,
( ! [X2] : ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ spl3_4 ),
inference(avatar_component_clause,[],[f533]) ).
fof(f1710,plain,
( ~ spl3_2
| ~ spl3_79 ),
inference(avatar_contradiction_clause,[],[f1709]) ).
fof(f1709,plain,
( $false
| ~ spl3_2
| ~ spl3_79 ),
inference(subsumption_resolution,[],[f1708,f582]) ).
fof(f582,plain,
( ~ pred_attacker(sF1)
| ~ spl3_2 ),
inference(subsumption_resolution,[],[f581,f542]) ).
fof(f542,plain,
( pred_attacker(name_objective)
| ~ spl3_2 ),
inference(resolution,[],[f440,f528]) ).
fof(f528,plain,
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ spl3_2 ),
inference(avatar_component_clause,[],[f526]) ).
fof(f526,plain,
( spl3_2
<=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_2])]) ).
fof(f440,plain,
! [X0] :
( ~ pred_attacker(tuple_client_B_out_6(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f263]) ).
fof(f263,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_B_out_6(X0)) ),
inference(ennf_transformation,[],[f190]) ).
fof(f190,plain,
! [X0] :
( pred_attacker(tuple_client_B_out_6(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f114]) ).
fof(f114,axiom,
! [X51] :
( pred_attacker(tuple_client_B_out_6(X51))
=> pred_attacker(X51) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax113) ).
fof(f581,plain,
( ~ pred_attacker(sF1)
| ~ pred_attacker(name_objective) ),
inference(subsumption_resolution,[],[f580,f514]) ).
fof(f514,plain,
~ pred_attacker(sF2),
inference(definition_folding,[],[f433,f513,f512]) ).
fof(f512,plain,
name_Nb(sK0) = sF1,
introduced(function_definition,[]) ).
fof(f513,plain,
tuple_2(sF1,name_objective) = sF2,
introduced(function_definition,[]) ).
fof(f433,plain,
~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
inference(cnf_transformation,[],[f337]) ).
fof(f337,plain,
~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
inference(skolemisation,[status(esa),new_symbols(skolem,[sK0])],[f309,f336]) ).
fof(f336,plain,
( ? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective))
=> ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)) ),
introduced(choice_axiom,[]) ).
fof(f309,plain,
? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective)),
inference(ennf_transformation,[],[f206]) ).
fof(f206,plain,
~ ! [X0] : pred_attacker(tuple_2(name_Nb(X0),name_objective)),
inference(rectify,[],[f170]) ).
fof(f170,negated_conjecture,
~ ! [X115] : pred_attacker(tuple_2(name_Nb(X115),name_objective)),
inference(negated_conjecture,[],[f169]) ).
fof(f169,conjecture,
! [X115] : pred_attacker(tuple_2(name_Nb(X115),name_objective)),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',co0) ).
fof(f580,plain,
( pred_attacker(sF2)
| ~ pred_attacker(name_objective)
| ~ pred_attacker(sF1) ),
inference(superposition,[],[f376,f513]) ).
fof(f376,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X0)
| ~ pred_attacker(X1) ),
inference(cnf_transformation,[],[f329]) ).
fof(f329,plain,
! [X0,X1] :
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(tuple_2(X0,X1)) ),
inference(rectify,[],[f269]) ).
fof(f269,plain,
! [X1,X0] :
( ~ pred_attacker(X1)
| ~ pred_attacker(X0)
| pred_attacker(tuple_2(X1,X0)) ),
inference(flattening,[],[f268]) ).
fof(f268,plain,
! [X1,X0] :
( pred_attacker(tuple_2(X1,X0))
| ~ pred_attacker(X0)
| ~ pred_attacker(X1) ),
inference(ennf_transformation,[],[f212]) ).
fof(f212,plain,
! [X1,X0] :
( ( pred_attacker(X0)
& pred_attacker(X1) )
=> pred_attacker(tuple_2(X1,X0)) ),
inference(rectify,[],[f145]) ).
fof(f145,axiom,
! [X87,X86] :
( ( pred_attacker(X87)
& pred_attacker(X86) )
=> pred_attacker(tuple_2(X86,X87)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax144) ).
fof(f1708,plain,
( pred_attacker(sF1)
| ~ spl3_79 ),
inference(superposition,[],[f1694,f512]) ).
fof(f1694,plain,
( ! [X17] : pred_attacker(name_Nb(X17))
| ~ spl3_79 ),
inference(avatar_component_clause,[],[f1693]) ).
fof(f1693,plain,
( spl3_79
<=> ! [X17] : pred_attacker(name_Nb(X17)) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_79])]) ).
fof(f1705,plain,
( spl3_22
| ~ spl3_1 ),
inference(avatar_split_clause,[],[f1704,f523,f911]) ).
fof(f523,plain,
( spl3_1
<=> ! [X3] : ~ pred_attacker(tuple_client_B_in_3(X3)) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_1])]) ).
fof(f1704,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl3_1 ),
inference(resolution,[],[f524,f445]) ).
fof(f445,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f273]) ).
fof(f273,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f229]) ).
fof(f229,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_3(X0)) ),
inference(rectify,[],[f122]) ).
fof(f122,axiom,
! [X62] :
( pred_attacker(X62)
=> pred_attacker(tuple_client_B_in_3(X62)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax121) ).
fof(f524,plain,
( ! [X3] : ~ pred_attacker(tuple_client_B_in_3(X3))
| ~ spl3_1 ),
inference(avatar_component_clause,[],[f523]) ).
fof(f1695,plain,
( spl3_1
| spl3_79
| ~ spl3_6
| ~ spl3_74 ),
inference(avatar_split_clause,[],[f1691,f1596,f600,f1693,f523]) ).
fof(f600,plain,
( spl3_6
<=> pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(name_A,constr_pkey(name_skA)),name_skS))) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_6])]) ).
fof(f1596,plain,
( spl3_74
<=> ! [X1] :
( ~ pred_attacker(tuple_client_A_in_4(X1))
| pred_attacker(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA))) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_74])]) ).
fof(f1691,plain,
( ! [X16,X17] :
( pred_attacker(name_Nb(X17))
| ~ pred_attacker(tuple_client_B_in_3(X16)) )
| ~ spl3_6
| ~ spl3_74 ),
inference(forward_demodulation,[],[f1670,f350]) ).
fof(f350,plain,
! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X1,X0)) = X0,
inference(cnf_transformation,[],[f327]) ).
fof(f327,plain,
! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X1,X0)) = X0,
inference(rectify,[],[f201]) ).
fof(f201,plain,
! [X1,X0] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
inference(rectify,[],[f83]) ).
fof(f83,axiom,
! [X8,X9] : constr_tuple_2_get_1_bitstring(tuple_2(X8,X9)) = X9,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax82) ).
fof(f1670,plain,
( ! [X16,X17] :
( pred_attacker(constr_tuple_2_get_1_bitstring(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X16,name_skB)),name_Nb(X17))))
| ~ pred_attacker(tuple_client_B_in_3(X16)) )
| ~ spl3_6
| ~ spl3_74 ),
inference(resolution,[],[f1148,f1600]) ).
fof(f1600,plain,
( ! [X0] :
( ~ pred_attacker(constr_aenc(X0,constr_pkey(name_skA)))
| pred_attacker(constr_tuple_2_get_1_bitstring(X0)) )
| ~ spl3_74 ),
inference(resolution,[],[f1599,f488]) ).
fof(f488,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f308]) ).
fof(f308,plain,
! [X0] :
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_A_in_4(X0)) ),
inference(ennf_transformation,[],[f222]) ).
fof(f222,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_A_in_4(X0)) ),
inference(rectify,[],[f133]) ).
fof(f133,axiom,
! [X76] :
( pred_attacker(X76)
=> pred_attacker(tuple_client_A_in_4(X76)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax132) ).
fof(f1599,plain,
( ! [X0] :
( ~ pred_attacker(tuple_client_A_in_4(constr_aenc(X0,constr_pkey(name_skA))))
| pred_attacker(constr_tuple_2_get_1_bitstring(X0)) )
| ~ spl3_74 ),
inference(superposition,[],[f1597,f363]) ).
fof(f363,plain,
! [X0,X1] : constr_adec(constr_aenc(X1,constr_pkey(X0)),X0) = X1,
inference(cnf_transformation,[],[f79]) ).
fof(f79,axiom,
! [X0,X1] : constr_adec(constr_aenc(X1,constr_pkey(X0)),X0) = X1,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax78) ).
fof(f1597,plain,
( ! [X1] :
( pred_attacker(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)))
| ~ pred_attacker(tuple_client_A_in_4(X1)) )
| ~ spl3_74 ),
inference(avatar_component_clause,[],[f1596]) ).
fof(f1148,plain,
( ! [X0,X1] :
( pred_attacker(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X1)),constr_pkey(name_skA)))
| ~ pred_attacker(tuple_client_B_in_3(X0)) )
| ~ spl3_6 ),
inference(resolution,[],[f1129,f483]) ).
fof(f483,plain,
! [X0] :
( ~ pred_attacker(tuple_client_B_out_4(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f244]) ).
fof(f244,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_B_out_4(X0)) ),
inference(ennf_transformation,[],[f202]) ).
fof(f202,plain,
! [X0] :
( pred_attacker(tuple_client_B_out_4(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f116]) ).
fof(f116,axiom,
! [X53] :
( pred_attacker(tuple_client_B_out_4(X53))
=> pred_attacker(X53) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax115) ).
fof(f1129,plain,
( ! [X0,X1] :
( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X1)),constr_pkey(name_skA))))
| ~ pred_attacker(tuple_client_B_in_3(X0)) )
| ~ spl3_6 ),
inference(resolution,[],[f1063,f777]) ).
fof(f777,plain,
( pred_attacker(constr_sign(tuple_2(name_A,constr_pkey(name_skA)),name_skS))
| ~ spl3_6 ),
inference(resolution,[],[f602,f403]) ).
fof(f403,plain,
! [X0] :
( ~ pred_attacker(tuple_key_retrieval_server_out_2(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f305]) ).
fof(f305,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_key_retrieval_server_out_2(X0)) ),
inference(ennf_transformation,[],[f221]) ).
fof(f221,plain,
! [X0] :
( pred_attacker(tuple_key_retrieval_server_out_2(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f102]) ).
fof(f102,axiom,
! [X32] :
( pred_attacker(tuple_key_retrieval_server_out_2(X32))
=> pred_attacker(X32) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax101) ).
fof(f602,plain,
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(name_A,constr_pkey(name_skA)),name_skS)))
| ~ spl3_6 ),
inference(avatar_component_clause,[],[f600]) ).
fof(f1063,plain,
! [X2,X3,X0,X1] :
( ~ pred_attacker(constr_sign(tuple_2(X3,X2),name_skS))
| ~ pred_attacker(tuple_client_B_in_3(X0))
| pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X1)),X2))) ),
inference(resolution,[],[f827,f381]) ).
fof(f827,plain,
! [X2,X3,X0,X1] :
( ~ pred_attacker(tuple_client_B_in_2(constr_sign(tuple_2(X0,X1),name_skS)))
| pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X2,name_skB)),name_Nb(X3)),X1)))
| ~ pred_attacker(tuple_client_B_in_3(X2)) ),
inference(superposition,[],[f772,f350]) ).
fof(f772,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(X0))))
| ~ pred_attacker(tuple_client_B_in_2(constr_sign(X0,name_skS)))
| ~ pred_attacker(tuple_client_B_in_3(X1)) ),
inference(superposition,[],[f516,f392]) ).
fof(f392,plain,
! [X0,X1] : constr_checksign(constr_sign(X0,X1),constr_pkey(X1)) = X0,
inference(cnf_transformation,[],[f228]) ).
fof(f228,plain,
! [X0,X1] : constr_checksign(constr_sign(X0,X1),constr_pkey(X1)) = X0,
inference(rectify,[],[f82]) ).
fof(f82,axiom,
! [X7,X6] : constr_checksign(constr_sign(X7,X6),constr_pkey(X6)) = X7,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax81) ).
fof(f516,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(tuple_client_B_in_3(X1)) ),
inference(subsumption_resolution,[],[f515,f411]) ).
fof(f411,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
inference(cnf_transformation,[],[f199]) ).
fof(f199,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
inference(rectify,[],[f87]) ).
fof(f87,axiom,
! [X16,X17] : pred_eq_bitstring_bitstring(X16,X17),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax86) ).
fof(f515,plain,
! [X2,X0,X1] :
( ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
| pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
inference(subsumption_resolution,[],[f420,f411]) ).
fof(f420,plain,
! [X2,X0,X1] :
( ~ pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
| pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_3(X1)) ),
inference(cnf_transformation,[],[f333]) ).
fof(f333,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1)) ),
inference(rectify,[],[f295]) ).
fof(f295,plain,
! [X0,X2,X1] :
( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X2,name_skB)),name_Nb(X1)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X2,name_skB)))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X2)) ),
inference(flattening,[],[f294]) ).
fof(f294,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X2,name_skB)),name_Nb(X1)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS))))))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X2,name_skB)))
| ~ pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X2)) ),
inference(ennf_transformation,[],[f233]) ).
fof(f233,plain,
! [X2,X0,X1] :
( ( pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X2,name_skB)))
& pred_attacker(tuple_client_B_in_2(X0))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X0,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X2)) )
=> pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X2,name_skB)),name_Nb(X1)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))) ),
inference(rectify,[],[f165]) ).
fof(f165,axiom,
! [X105,X103,X104] :
( ( pred_attacker(tuple_client_B_in_2(X105))
& pred_attacker(tuple_client_B_in_3(X104))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X104,name_skB)))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X105,constr_pkey(name_skS)))) )
=> pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X104,name_skB)),name_Nb(X103)),constr_tuple_2_get_1_bitstring(constr_checksign(X105,constr_pkey(name_skS)))))) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax164) ).
fof(f1598,plain,
( spl3_22
| spl3_74
| ~ spl3_26 ),
inference(avatar_split_clause,[],[f1594,f1182,f1596,f911]) ).
fof(f1182,plain,
( spl3_26
<=> ! [X2,X1] :
( ~ pred_attacker(X1)
| ~ pred_attacker(tuple_client_A_in_4(X2))
| pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X2,name_skA)),X1)) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_26])]) ).
fof(f1594,plain,
( ! [X0,X1] :
( ~ pred_attacker(tuple_client_A_in_4(X1))
| pred_attacker(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)))
| ~ pred_attacker(X0) )
| ~ spl3_26 ),
inference(subsumption_resolution,[],[f1592,f395]) ).
fof(f395,plain,
! [X0] :
( pred_attacker(constr_pkey(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f245]) ).
fof(f245,plain,
! [X0] :
( ~ pred_attacker(X0)
| pred_attacker(constr_pkey(X0)) ),
inference(ennf_transformation,[],[f179]) ).
fof(f179,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(constr_pkey(X0)) ),
inference(rectify,[],[f94]) ).
fof(f94,axiom,
! [X24] :
( pred_attacker(X24)
=> pred_attacker(constr_pkey(X24)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax93) ).
fof(f1592,plain,
( ! [X0,X1] :
( pred_attacker(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)))
| ~ pred_attacker(X0)
| ~ pred_attacker(constr_pkey(X0))
| ~ pred_attacker(tuple_client_A_in_4(X1)) )
| ~ spl3_26 ),
inference(resolution,[],[f1183,f574]) ).
fof(f574,plain,
! [X0,X1] :
( ~ pred_attacker(constr_aenc(X0,constr_pkey(X1)))
| pred_attacker(X0)
| ~ pred_attacker(X1) ),
inference(superposition,[],[f352,f363]) ).
fof(f352,plain,
! [X0,X1] :
( pred_attacker(constr_adec(X1,X0))
| ~ pred_attacker(X0)
| ~ pred_attacker(X1) ),
inference(cnf_transformation,[],[f285]) ).
fof(f285,plain,
! [X0,X1] :
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(constr_adec(X1,X0)) ),
inference(flattening,[],[f284]) ).
fof(f284,plain,
! [X0,X1] :
( pred_attacker(constr_adec(X1,X0))
| ~ pred_attacker(X0)
| ~ pred_attacker(X1) ),
inference(ennf_transformation,[],[f174]) ).
fof(f174,plain,
! [X0,X1] :
( ( pred_attacker(X0)
& pred_attacker(X1) )
=> pred_attacker(constr_adec(X1,X0)) ),
inference(rectify,[],[f139]) ).
fof(f139,axiom,
! [X85,X84] :
( ( pred_attacker(X84)
& pred_attacker(X85) )
=> pred_attacker(constr_adec(X84,X85)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax138) ).
fof(f1183,plain,
( ! [X2,X1] :
( pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X2,name_skA)),X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(tuple_client_A_in_4(X2)) )
| ~ spl3_26 ),
inference(avatar_component_clause,[],[f1182]) ).
fof(f1492,plain,
~ spl3_24,
inference(avatar_contradiction_clause,[],[f1491]) ).
fof(f1491,plain,
( $false
| ~ spl3_24 ),
inference(subsumption_resolution,[],[f1490,f370]) ).
fof(f370,plain,
name_A != name_I,
inference(cnf_transformation,[],[f52]) ).
fof(f52,axiom,
name_A != name_I,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax51) ).
fof(f1490,plain,
( name_A = name_I
| ~ spl3_24 ),
inference(subsumption_resolution,[],[f1208,f431]) ).
fof(f431,plain,
name_B != name_I,
inference(cnf_transformation,[],[f58]) ).
fof(f58,axiom,
name_B != name_I,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax57) ).
fof(f1208,plain,
( name_B = name_I
| name_A = name_I
| ~ spl3_24 ),
inference(resolution,[],[f1176,f493]) ).
fof(f493,plain,
pred_attacker(name_I),
inference(cnf_transformation,[],[f151]) ).
fof(f151,axiom,
pred_attacker(name_I),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax150) ).
fof(f1176,plain,
( ! [X15] :
( ~ pred_attacker(X15)
| name_A = X15
| name_B = X15 )
| ~ spl3_24 ),
inference(avatar_component_clause,[],[f1175]) ).
fof(f1175,plain,
( spl3_24
<=> ! [X15] :
( name_B = X15
| ~ pred_attacker(X15)
| name_A = X15 ) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_24])]) ).
fof(f1184,plain,
( spl3_24
| spl3_26
| ~ spl3_23 ),
inference(avatar_split_clause,[],[f1166,f914,f1182,f1175]) ).
fof(f914,plain,
( spl3_23
<=> ! [X0,X1] :
( ~ pred_attacker(X0)
| name_B = X0
| name_A = X0
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(X1) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_23])]) ).
fof(f1166,plain,
( ! [X2,X0,X1] :
( ~ pred_attacker(X1)
| name_B = X0
| pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X2,name_skA)),X1))
| ~ pred_attacker(X0)
| name_A = X0
| ~ pred_attacker(tuple_client_A_in_4(X2)) )
| ~ spl3_23 ),
inference(resolution,[],[f1075,f1069]) ).
fof(f1069,plain,
! [X2,X0,X1] :
( ~ pred_attacker(constr_sign(tuple_2(X2,X1),name_skS))
| pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA)),X1))
| ~ pred_attacker(tuple_client_A_in_4(X0)) ),
inference(resolution,[],[f864,f494]) ).
fof(f494,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_2(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f314]) ).
fof(f314,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_2(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f178]) ).
fof(f178,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_A_in_2(X0)) ),
inference(rectify,[],[f135]) ).
fof(f135,axiom,
! [X78] :
( pred_attacker(X78)
=> pred_attacker(tuple_client_A_in_2(X78)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax134) ).
fof(f864,plain,
! [X2,X0,X1] :
( ~ pred_attacker(tuple_client_A_in_2(constr_sign(tuple_2(X0,X1),name_skS)))
| pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X2,name_skA)),X1))
| ~ pred_attacker(tuple_client_A_in_4(X2)) ),
inference(superposition,[],[f798,f350]) ).
fof(f798,plain,
! [X0,X1] :
( pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(X0)))
| ~ pred_attacker(tuple_client_A_in_4(X1))
| ~ pred_attacker(tuple_client_A_in_2(constr_sign(X0,name_skS))) ),
inference(superposition,[],[f612,f392]) ).
fof(f612,plain,
! [X0,X1] :
( pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))))
| ~ pred_attacker(tuple_client_A_in_2(X1))
| ~ pred_attacker(tuple_client_A_in_4(X0)) ),
inference(resolution,[],[f518,f359]) ).
fof(f359,plain,
! [X0] :
( ~ pred_attacker(tuple_client_A_out_5(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f310]) ).
fof(f310,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_A_out_5(X0)) ),
inference(ennf_transformation,[],[f208]) ).
fof(f208,plain,
! [X0] :
( pred_attacker(tuple_client_A_out_5(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f127]) ).
fof(f127,axiom,
! [X67] :
( pred_attacker(tuple_client_A_out_5(X67))
=> pred_attacker(X67) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax126) ).
fof(f518,plain,
! [X0,X1] :
( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_attacker(tuple_client_A_in_2(X1)) ),
inference(subsumption_resolution,[],[f517,f411]) ).
fof(f517,plain,
! [X0,X1] :
( ~ pred_attacker(tuple_client_A_in_2(X1))
| ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
| pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_A_in_4(X0)) ),
inference(subsumption_resolution,[],[f345,f411]) ).
fof(f345,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
| ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_2_get_0x30(constr_adec(X0,name_skA)))
| ~ pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_attacker(tuple_client_A_in_2(X1))
| ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS)))) ),
inference(cnf_transformation,[],[f325]) ).
fof(f325,plain,
! [X0,X1,X2] :
( ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
| ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_2_get_0x30(constr_adec(X0,name_skA)))
| pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_attacker(tuple_client_A_in_2(X1)) ),
inference(rectify,[],[f256]) ).
fof(f256,plain,
! [X2,X1,X0] :
( ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X2,name_skA)))
| pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X2,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_A_in_4(X2))
| ~ pred_attacker(tuple_client_A_in_2(X1)) ),
inference(flattening,[],[f255]) ).
fof(f255,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X2,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X2,name_skA)))
| ~ pred_attacker(tuple_client_A_in_2(X1))
| ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_A_in_4(X2)) ),
inference(ennf_transformation,[],[f239]) ).
fof(f239,plain,
! [X0,X1,X2] :
( ( pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X2,name_skA)))
& pred_attacker(tuple_client_A_in_2(X1))
& pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X1,constr_pkey(name_skS))))
& pred_attacker(tuple_client_A_in_4(X2)) )
=> pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X2,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))))) ),
inference(rectify,[],[f163]) ).
fof(f163,axiom,
! [X100,X102,X101] :
( ( pred_attacker(tuple_client_A_in_4(X101))
& pred_eq_bitstring_bitstring(name_Na(X100),constr_tuple_2_get_0x30(constr_adec(X101,name_skA)))
& pred_attacker(tuple_client_A_in_2(X102))
& pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X102,constr_pkey(name_skS)))) )
=> pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X101,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X102,constr_pkey(name_skS)))))) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax162) ).
fof(f1075,plain,
( ! [X0,X1] :
( pred_attacker(constr_sign(tuple_2(X0,X1),name_skS))
| name_A = X0
| ~ pred_attacker(X1)
| name_B = X0
| ~ pred_attacker(X0) )
| ~ spl3_23 ),
inference(resolution,[],[f915,f403]) ).
fof(f915,plain,
( ! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| name_A = X0
| ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| name_B = X0 )
| ~ spl3_23 ),
inference(avatar_component_clause,[],[f914]) ).
fof(f1025,plain,
~ spl3_22,
inference(avatar_contradiction_clause,[],[f929]) ).
fof(f929,plain,
( $false
| ~ spl3_22 ),
inference(resolution,[],[f912,f537]) ).
fof(f537,plain,
pred_attacker(constr_pkey(name_skB)),
inference(resolution,[],[f380,f471]) ).
fof(f471,plain,
pred_attacker(tuple_out_2(constr_pkey(name_skB))),
inference(cnf_transformation,[],[f159]) ).
fof(f159,axiom,
pred_attacker(tuple_out_2(constr_pkey(name_skB))),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax158) ).
fof(f380,plain,
! [X0] :
( ~ pred_attacker(tuple_out_2(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f297]) ).
fof(f297,plain,
! [X0] :
( ~ pred_attacker(tuple_out_2(X0))
| pred_attacker(X0) ),
inference(ennf_transformation,[],[f186]) ).
fof(f186,plain,
! [X0] :
( pred_attacker(tuple_out_2(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f98]) ).
fof(f98,axiom,
! [X28] :
( pred_attacker(tuple_out_2(X28))
=> pred_attacker(X28) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax97) ).
fof(f912,plain,
( ! [X2] : ~ pred_attacker(X2)
| ~ spl3_22 ),
inference(avatar_component_clause,[],[f911]) ).
fof(f916,plain,
( spl3_22
| spl3_23 ),
inference(avatar_split_clause,[],[f909,f914,f911]) ).
fof(f909,plain,
! [X2,X0,X1] :
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| ~ pred_attacker(X2)
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| name_A = X0
| name_B = X0 ),
inference(resolution,[],[f781,f371]) ).
fof(f371,plain,
! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
| ~ pred_attacker(X0)
| ~ pred_attacker(X1) ),
inference(cnf_transformation,[],[f247]) ).
fof(f247,plain,
! [X0,X1] :
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(tuple_key_retrieval_server_in_1(X1,X0)) ),
inference(flattening,[],[f246]) ).
fof(f246,plain,
! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
| ~ pred_attacker(X0)
| ~ pred_attacker(X1) ),
inference(ennf_transformation,[],[f192]) ).
fof(f192,plain,
! [X0,X1] :
( ( pred_attacker(X0)
& pred_attacker(X1) )
=> pred_attacker(tuple_key_retrieval_server_in_1(X1,X0)) ),
inference(rectify,[],[f103]) ).
fof(f103,axiom,
! [X34,X33] :
( ( pred_attacker(X33)
& pred_attacker(X34) )
=> pred_attacker(tuple_key_retrieval_server_in_1(X33,X34)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax102) ).
fof(f781,plain,
! [X2,X0,X1] :
( ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| name_B = X0
| ~ pred_attacker(X1)
| name_A = X0 ),
inference(subsumption_resolution,[],[f780,f439]) ).
fof(f439,plain,
! [X0,X1] :
( ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f338]) ).
fof(f338,plain,
! [X0,X1] :
( ~ pred_attacker(tuple_key_retrieval_server_in_1(X1,X0))
| pred_attacker(X0) ),
inference(rectify,[],[f303]) ).
fof(f303,plain,
! [X1,X0] :
( ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| pred_attacker(X1) ),
inference(ennf_transformation,[],[f175]) ).
fof(f175,plain,
! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
=> pred_attacker(X1) ),
inference(rectify,[],[f105]) ).
fof(f105,axiom,
! [X37,X38] :
( pred_attacker(tuple_key_retrieval_server_in_1(X37,X38))
=> pred_attacker(X38) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax104) ).
fof(f780,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
| name_A = X0
| name_B = X0
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(resolution,[],[f591,f443]) ).
fof(f443,plain,
! [X2,X0,X1] :
( ~ pred_table(tuple_keys(X1,X2))
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X2),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
inference(cnf_transformation,[],[f339]) ).
fof(f339,plain,
! [X0,X1,X2] :
( ~ pred_table(tuple_keys(X1,X2))
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X2),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
inference(rectify,[],[f307]) ).
fof(f307,plain,
! [X2,X1,X0] :
( ~ pred_table(tuple_keys(X1,X0))
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X0),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X1)) ),
inference(flattening,[],[f306]) ).
fof(f306,plain,
! [X1,X2,X0] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X0),name_skS)))
| ~ pred_table(tuple_keys(X1,X0))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X1)) ),
inference(ennf_transformation,[],[f215]) ).
fof(f215,plain,
! [X1,X2,X0] :
( ( pred_table(tuple_keys(X1,X0))
& pred_attacker(tuple_key_retrieval_server_in_1(X2,X1)) )
=> pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X0),name_skS))) ),
inference(rectify,[],[f167]) ).
fof(f167,axiom,
! [X111,X110,X112] :
( ( pred_attacker(tuple_key_retrieval_server_in_1(X112,X110))
& pred_table(tuple_keys(X110,X111)) )
=> pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X110,X111),name_skS))) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax166) ).
fof(f591,plain,
! [X0,X1] :
( pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| name_B = X0
| name_A = X0 ),
inference(resolution,[],[f500,f410]) ).
fof(f410,plain,
! [X0,X1] :
( pred_attacker(tuple_key_register_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f332]) ).
fof(f332,plain,
! [X0,X1] :
( pred_attacker(tuple_key_register_server_in_1(X0,X1))
| ~ pred_attacker(X0)
| ~ pred_attacker(X1) ),
inference(rectify,[],[f266]) ).
fof(f266,plain,
! [X1,X0] :
( pred_attacker(tuple_key_register_server_in_1(X1,X0))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f265]) ).
fof(f265,plain,
! [X0,X1] :
( pred_attacker(tuple_key_register_server_in_1(X1,X0))
| ~ pred_attacker(X0)
| ~ pred_attacker(X1) ),
inference(ennf_transformation,[],[f197]) ).
fof(f197,plain,
! [X0,X1] :
( ( pred_attacker(X0)
& pred_attacker(X1) )
=> pred_attacker(tuple_key_register_server_in_1(X1,X0)) ),
inference(rectify,[],[f106]) ).
fof(f106,axiom,
! [X40,X39] :
( ( pred_attacker(X40)
& pred_attacker(X39) )
=> pred_attacker(tuple_key_register_server_in_1(X39,X40)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax105) ).
fof(f500,plain,
! [X0,X1] :
( ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
| name_B = X0
| pred_table(tuple_keys(X0,X1))
| name_A = X0 ),
inference(cnf_transformation,[],[f323]) ).
fof(f323,plain,
! [X0,X1] :
( name_A = X0
| ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
| name_B = X0
| pred_table(tuple_keys(X0,X1)) ),
inference(flattening,[],[f322]) ).
fof(f322,plain,
! [X0,X1] :
( pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
| name_B = X0
| name_A = X0 ),
inference(ennf_transformation,[],[f219]) ).
fof(f219,plain,
! [X0,X1] :
( ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
& name_B != X0
& name_A != X0 )
=> pred_table(tuple_keys(X0,X1)) ),
inference(rectify,[],[f168]) ).
fof(f168,axiom,
! [X113,X114] :
( ( name_A != X113
& pred_attacker(tuple_key_register_server_in_1(X113,X114))
& name_B != X113 )
=> pred_table(tuple_keys(X113,X114)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax167) ).
fof(f691,plain,
~ spl3_5,
inference(avatar_contradiction_clause,[],[f653]) ).
fof(f653,plain,
( $false
| ~ spl3_5 ),
inference(resolution,[],[f616,f442]) ).
fof(f442,plain,
pred_attacker(tuple_false),
inference(cnf_transformation,[],[f110]) ).
fof(f110,axiom,
pred_attacker(tuple_false),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax109) ).
fof(f616,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl3_5 ),
inference(subsumption_resolution,[],[f615,f454]) ).
fof(f454,plain,
pred_attacker(name_A),
inference(cnf_transformation,[],[f153]) ).
fof(f153,axiom,
pred_attacker(name_A),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax152) ).
fof(f615,plain,
( ! [X0] :
( ~ pred_attacker(name_A)
| ~ pred_attacker(X0) )
| ~ spl3_5 ),
inference(resolution,[],[f598,f371]) ).
fof(f598,plain,
( ! [X0] : ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,name_A))
| ~ spl3_5 ),
inference(avatar_component_clause,[],[f597]) ).
fof(f597,plain,
( spl3_5
<=> ! [X0] : ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,name_A)) ),
introduced(avatar_definition,[new_symbols(naming,[spl3_5])]) ).
fof(f603,plain,
( spl3_5
| spl3_6 ),
inference(avatar_split_clause,[],[f594,f600,f597]) ).
fof(f594,plain,
! [X0] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(name_A,constr_pkey(name_skA)),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,name_A)) ),
inference(resolution,[],[f443,f375]) ).
fof(f375,plain,
pred_table(tuple_keys(name_A,constr_pkey(name_skA))),
inference(cnf_transformation,[],[f156]) ).
fof(f156,axiom,
pred_table(tuple_keys(name_A,constr_pkey(name_skA))),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax155) ).
fof(f535,plain,
( spl3_1
| spl3_2
| spl3_3
| spl3_4 ),
inference(avatar_split_clause,[],[f521,f533,f530,f526,f523]) ).
fof(f521,plain,
! [X2,X3,X1] :
( ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_attacker(tuple_client_B_in_5(X1))
| pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_3(X3)) ),
inference(subsumption_resolution,[],[f520,f411]) ).
fof(f520,plain,
! [X2,X3,X1] :
( ~ pred_attacker(tuple_client_B_in_3(X3))
| pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_5(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
| ~ pred_attacker(tuple_client_B_in_2(X2)) ),
inference(subsumption_resolution,[],[f519,f411]) ).
fof(f519,plain,
! [X2,X3,X1] :
( ~ pred_attacker(tuple_client_B_in_5(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X3)) ),
inference(subsumption_resolution,[],[f464,f411]) ).
fof(f464,plain,
! [X2,X3,X0,X1] :
( ~ pred_attacker(tuple_client_B_in_5(X1))
| pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X1,name_skB))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_attacker(tuple_client_B_in_3(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS)))) ),
inference(cnf_transformation,[],[f340]) ).
fof(f340,plain,
! [X0,X1,X2,X3] :
( ~ pred_attacker(tuple_client_B_in_5(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X3))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X1,name_skB))
| pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(rectify,[],[f254]) ).
fof(f254,plain,
! [X1,X0,X2,X3] :
( ~ pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X3))
| ~ pred_eq_bitstring_bitstring(name_Nb(X1),constr_adec(X0,name_skB))
| pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(flattening,[],[f253]) ).
fof(f253,plain,
! [X0,X1,X3,X2] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_eq_bitstring_bitstring(name_Nb(X1),constr_adec(X0,name_skB))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X3)) ),
inference(ennf_transformation,[],[f205]) ).
fof(f205,plain,
! [X0,X1,X3,X2] :
( ( pred_attacker(tuple_client_B_in_2(X2))
& pred_attacker(tuple_client_B_in_5(X0))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
& pred_eq_bitstring_bitstring(name_Nb(X1),constr_adec(X0,name_skB))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X3,name_skB)))
& pred_attacker(tuple_client_B_in_3(X3)) )
=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(rectify,[],[f166]) ).
fof(f166,axiom,
! [X108,X106,X109,X107] :
( ( pred_attacker(tuple_client_B_in_2(X109))
& pred_attacker(tuple_client_B_in_3(X107))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X107,name_skB)))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X109,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_5(X108))
& pred_eq_bitstring_bitstring(name_Nb(X106),constr_adec(X108,name_skB)) )
=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax165) ).
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.13/0.13 % Problem : SWW960+1 : TPTP v8.1.0. Released v7.4.0.
% 0.13/0.14 % Command : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_sat --cores 0 -t %d %s
% 0.14/0.35 % Computer : n027.cluster.edu
% 0.14/0.35 % Model : x86_64 x86_64
% 0.14/0.35 % CPU : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.14/0.35 % Memory : 8042.1875MB
% 0.14/0.35 % OS : Linux 3.10.0-693.el7.x86_64
% 0.14/0.35 % CPULimit : 300
% 0.14/0.35 % WCLimit : 300
% 0.14/0.35 % DateTime : Tue Aug 30 21:33:16 EDT 2022
% 0.14/0.35 % CPUTime :
% 0.21/0.51 % (11423)dis+10_1:1_fsd=on:sp=occurrence:i=7:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/7Mi)
% 0.21/0.52 % (11425)ott-1_1:6_av=off:cond=on:fsr=off:nwc=3.0:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 0.21/0.53 % (11439)ott+11_1:1_drc=off:nwc=5.0:slsq=on:slsqc=1:spb=goal_then_units:to=lpo:i=467:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/467Mi)
% 0.21/0.53 % (11417)ott+10_1:32_abs=on:br=off:urr=ec_only:i=50:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/50Mi)
% 0.21/0.53 % (11423)Instruction limit reached!
% 0.21/0.53 % (11423)------------------------------
% 0.21/0.53 % (11423)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.21/0.53 % (11431)ott+11_2:3_av=off:fde=unused:nwc=5.0:tgt=ground:i=75:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/75Mi)
% 0.21/0.53 % (11419)ott+10_1:32_bd=off:fsr=off:newcnf=on:tgt=full:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 0.21/0.54 % (11444)ott+33_1:4_s2a=on:tgt=ground:i=439:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/439Mi)
% 0.21/0.54 % (11423)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.21/0.54 % (11423)Termination reason: Unknown
% 0.21/0.54 % (11423)Termination phase: Saturation
% 0.21/0.54
% 0.21/0.54 % (11423)Memory used [KB]: 5756
% 0.21/0.54 % (11423)Time elapsed: 0.109 s
% 0.21/0.54 % (11423)Instructions burned: 7 (million)
% 0.21/0.54 % (11423)------------------------------
% 0.21/0.54 % (11423)------------------------------
% 0.21/0.54 % (11416)fmb+10_1:1_bce=on:fmbsr=1.5:nm=4:skr=on:i=191324:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/191324Mi)
% 0.21/0.54 % (11420)ott+33_1:4_s2a=on:tgt=ground:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 0.21/0.54 % (11418)ott+4_1:1_av=off:bd=off:nwc=5.0:s2a=on:s2at=2.0:slsq=on:slsqc=2:slsql=off:slsqr=1,2:sp=frequency:i=37:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/37Mi)
% 0.21/0.54 % (11424)dis+2_1:64_add=large:bce=on:bd=off:i=2:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/2Mi)
% 0.21/0.54 % (11421)dis+34_1:32_abs=on:add=off:bsr=on:gsp=on:sp=weighted_frequency:i=48:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/48Mi)
% 0.21/0.54 % (11424)Instruction limit reached!
% 0.21/0.54 % (11424)------------------------------
% 0.21/0.54 % (11424)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.21/0.54 % (11424)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.21/0.54 % (11424)Termination reason: Unknown
% 0.21/0.54 % (11424)Termination phase: Preprocessing 3
% 0.21/0.54
% 0.21/0.54 % (11424)Memory used [KB]: 1151
% 0.21/0.54 % (11424)Time elapsed: 0.002 s
% 0.21/0.54 % (11424)Instructions burned: 3 (million)
% 0.21/0.54 % (11424)------------------------------
% 0.21/0.54 % (11424)------------------------------
% 0.21/0.54 % (11440)ott+10_1:1_kws=precedence:tgt=ground:i=482:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/482Mi)
% 0.21/0.54 % (11433)fmb+10_1:1_bce=on:i=59:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/59Mi)
% 0.21/0.54 % (11441)ott+10_1:5_bd=off:tgt=full:i=500:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/500Mi)
% 0.21/0.55 % (11422)fmb+10_1:1_fmbsr=2.0:nm=4:skr=on:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 0.21/0.55 % (11436)ott+10_1:8_bsd=on:fsd=on:lcm=predicate:nwc=5.0:s2a=on:s2at=1.5:spb=goal_then_units:i=176:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/176Mi)
% 0.21/0.55 % (11434)ott+10_1:1_tgt=ground:i=100:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/100Mi)
% 0.21/0.55 % (11435)ott+4_1:1_av=off:bd=off:nwc=5.0:rp=on:s2a=on:s2at=2.0:slsq=on:slsqc=2:slsql=off:slsqr=1,2:sp=frequency:i=100:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/100Mi)
% 0.21/0.55 % (11428)ott+10_1:28_bd=off:bs=on:tgt=ground:i=101:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/101Mi)
% 0.21/0.55 % (11417)Refutation not found, incomplete strategy% (11417)------------------------------
% 0.21/0.55 % (11417)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.21/0.55 % (11417)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.21/0.55 % (11417)Termination reason: Refutation not found, incomplete strategy
% 0.21/0.55
% 0.21/0.55 % (11417)Memory used [KB]: 5884
% 0.21/0.55 % (11417)Time elapsed: 0.135 s
% 0.21/0.55 % (11417)Instructions burned: 14 (million)
% 0.21/0.55 % (11417)------------------------------
% 0.21/0.55 % (11417)------------------------------
% 0.21/0.55 % (11429)ott+10_1:5_bd=off:tgt=full:i=99:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/99Mi)
% 0.21/0.56 % (11426)ott+2_1:1_fsr=off:gsp=on:i=50:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/50Mi)
% 0.21/0.56 % (11427)ott+10_1:32_bd=off:fsr=off:newcnf=on:tgt=full:i=100:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/100Mi)
% 0.21/0.56 % (11442)ins+10_1:1_awrs=decay:awrsf=30:bsr=unit_only:foolp=on:igrr=8/457:igs=10:igwr=on:nwc=1.5:sp=weighted_frequency:to=lpo:uhcvi=on:i=68:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/68Mi)
% 1.52/0.56 % (11430)ins+10_1:1_awrs=decay:awrsf=30:bsr=unit_only:foolp=on:igrr=8/457:igs=10:igwr=on:nwc=1.5:sp=weighted_frequency:to=lpo:uhcvi=on:i=68:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/68Mi)
% 1.52/0.56 % (11443)ott+11_2:3_av=off:fde=unused:nwc=5.0:tgt=ground:i=177:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/177Mi)
% 1.52/0.56 % (11432)dis+34_1:32_abs=on:add=off:bsr=on:gsp=on:sp=weighted_frequency:i=99:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/99Mi)
% 1.52/0.57 % (11437)ott+3_1:1_gsp=on:lcm=predicate:i=138:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/138Mi)
% 1.52/0.57 % (11438)dis+21_1:1_av=off:er=filter:slsq=on:slsqc=0:slsqr=1,1:sp=frequency:to=lpo:i=498:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/498Mi)
% 1.52/0.57 % (11445)ott+10_7:2_awrs=decay:awrsf=8:bd=preordered:drc=off:fd=preordered:fde=unused:fsr=off:slsq=on:slsqc=2:slsqr=5,8:sp=const_min:spb=units:to=lpo:i=355:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/355Mi)
% 1.63/0.60 % (11418)Instruction limit reached!
% 1.63/0.60 % (11418)------------------------------
% 1.63/0.60 % (11418)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.63/0.60 % (11418)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.63/0.60 % (11418)Termination reason: Unknown
% 1.63/0.60 % (11418)Termination phase: Saturation
% 1.63/0.60
% 1.63/0.60 % (11418)Memory used [KB]: 1663
% 1.63/0.60 % (11418)Time elapsed: 0.171 s
% 1.63/0.60 % (11418)Instructions burned: 38 (million)
% 1.63/0.60 % (11418)------------------------------
% 1.63/0.60 % (11418)------------------------------
% 1.63/0.61 TRYING [13]
% 1.63/0.61 TRYING [13]
% 1.63/0.62 TRYING [13]
% 1.63/0.62 % (11425)Instruction limit reached!
% 1.63/0.62 % (11425)------------------------------
% 1.63/0.62 % (11425)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.63/0.62 % (11425)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.63/0.62 % (11425)Termination reason: Unknown
% 1.63/0.62 % (11425)Termination phase: Saturation
% 1.63/0.62
% 1.63/0.62 % (11425)Memory used [KB]: 2430
% 1.63/0.62 % (11425)Time elapsed: 0.181 s
% 1.63/0.62 % (11425)Instructions burned: 52 (million)
% 1.63/0.62 % (11425)------------------------------
% 1.63/0.62 % (11425)------------------------------
% 1.63/0.62 % (11422)Instruction limit reached!
% 1.63/0.62 % (11422)------------------------------
% 1.63/0.62 % (11422)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.63/0.62 % (11422)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.63/0.62 % (11422)Termination reason: Unknown
% 1.63/0.62 % (11422)Termination phase: Finite model building constraint generation
% 1.63/0.62
% 1.63/0.62 % (11422)Memory used [KB]: 14839
% 1.63/0.62 % (11422)Time elapsed: 0.159 s
% 1.63/0.62 % (11422)Instructions burned: 51 (million)
% 1.63/0.62 % (11422)------------------------------
% 1.63/0.62 % (11422)------------------------------
% 1.63/0.62 % (11420)Instruction limit reached!
% 1.63/0.62 % (11420)------------------------------
% 1.63/0.62 % (11420)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.63/0.62 % (11420)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.63/0.62 % (11420)Termination reason: Unknown
% 1.63/0.62 % (11420)Termination phase: Saturation
% 1.63/0.62
% 1.63/0.62 % (11420)Memory used [KB]: 6908
% 1.63/0.62 % (11420)Time elapsed: 0.210 s
% 1.63/0.62 % (11420)Instructions burned: 52 (million)
% 1.63/0.62 % (11420)------------------------------
% 1.63/0.62 % (11420)------------------------------
% 2.05/0.63 % (11421)Instruction limit reached!
% 2.05/0.63 % (11421)------------------------------
% 2.05/0.63 % (11421)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.05/0.63 % (11421)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.05/0.63 % (11421)Termination reason: Unknown
% 2.05/0.63 % (11421)Termination phase: Saturation
% 2.05/0.63
% 2.05/0.63 % (11421)Memory used [KB]: 6268
% 2.05/0.63 % (11421)Time elapsed: 0.199 s
% 2.05/0.63 % (11421)Instructions burned: 48 (million)
% 2.05/0.63 % (11421)------------------------------
% 2.05/0.63 % (11421)------------------------------
% 2.05/0.63 % (11433)Instruction limit reached!
% 2.05/0.63 % (11433)------------------------------
% 2.05/0.63 % (11433)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.05/0.63 % (11433)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.05/0.63 % (11433)Termination reason: Unknown
% 2.05/0.63 % (11433)Termination phase: Finite model building constraint generation
% 2.05/0.63
% 2.05/0.63 % (11433)Memory used [KB]: 15735
% 2.05/0.63 % (11433)Time elapsed: 0.200 s
% 2.05/0.63 % (11433)Instructions burned: 62 (million)
% 2.05/0.63 % (11433)------------------------------
% 2.05/0.63 % (11433)------------------------------
% 2.05/0.63 % (11431)Instruction limit reached!
% 2.05/0.63 % (11431)------------------------------
% 2.05/0.63 % (11431)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.05/0.64 % (11431)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.05/0.64 % (11431)Termination reason: Unknown
% 2.05/0.64 % (11431)Termination phase: Saturation
% 2.05/0.64
% 2.05/0.64 % (11431)Memory used [KB]: 2302
% 2.05/0.64 % (11431)Time elapsed: 0.215 s
% 2.05/0.64 % (11431)Instructions burned: 75 (million)
% 2.05/0.64 % (11431)------------------------------
% 2.05/0.64 % (11431)------------------------------
% 2.05/0.64 % (11419)Instruction limit reached!
% 2.05/0.64 % (11419)------------------------------
% 2.05/0.64 % (11419)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.05/0.64 % (11419)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.05/0.64 % (11419)Termination reason: Unknown
% 2.05/0.64 % (11419)Termination phase: Saturation
% 2.05/0.64
% 2.05/0.64 % (11419)Memory used [KB]: 6652
% 2.05/0.64 % (11419)Time elapsed: 0.209 s
% 2.05/0.64 % (11419)Instructions burned: 51 (million)
% 2.05/0.64 % (11419)------------------------------
% 2.05/0.64 % (11419)------------------------------
% 2.21/0.66 % (11440)First to succeed.
% 2.21/0.66 % (11430)Instruction limit reached!
% 2.21/0.66 % (11430)------------------------------
% 2.21/0.66 % (11430)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.21/0.66 % (11430)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.21/0.66 % (11430)Termination reason: Unknown
% 2.21/0.66 % (11430)Termination phase: Saturation
% 2.21/0.66
% 2.21/0.66 % (11430)Memory used [KB]: 7036
% 2.21/0.66 % (11430)Time elapsed: 0.039 s
% 2.21/0.66 % (11430)Instructions burned: 68 (million)
% 2.21/0.66 % (11430)------------------------------
% 2.21/0.66 % (11430)------------------------------
% 2.21/0.67 % (11442)Instruction limit reached!
% 2.21/0.67 % (11442)------------------------------
% 2.21/0.67 % (11442)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.21/0.67 % (11442)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.21/0.67 % (11442)Termination reason: Unknown
% 2.21/0.67 % (11442)Termination phase: Saturation
% 2.21/0.67
% 2.21/0.67 % (11442)Memory used [KB]: 7036
% 2.21/0.67 % (11442)Time elapsed: 0.039 s
% 2.21/0.67 % (11442)Instructions burned: 68 (million)
% 2.21/0.67 % (11442)------------------------------
% 2.21/0.67 % (11442)------------------------------
% 2.21/0.67 % (11426)Instruction limit reached!
% 2.21/0.67 % (11426)------------------------------
% 2.21/0.67 % (11426)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.21/0.67 % (11426)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.21/0.67 % (11426)Termination reason: Unknown
% 2.21/0.67 % (11426)Termination phase: Saturation
% 2.21/0.67
% 2.21/0.67 % (11426)Memory used [KB]: 6652
% 2.21/0.67 % (11426)Time elapsed: 0.244 s
% 2.21/0.67 % (11426)Instructions burned: 51 (million)
% 2.21/0.67 % (11426)------------------------------
% 2.21/0.67 % (11426)------------------------------
% 2.21/0.68 % (11448)dis+22_1:128_bsd=on:rp=on:slsq=on:slsqc=1:slsqr=1,6:sp=frequency:spb=goal:thsq=on:thsqc=16:thsqd=1:thsql=off:i=90:si=on:rawr=on:rtra=on_0 on theBenchmark for (2998ds/90Mi)
% 2.21/0.68 % (11447)ott-1_1:6_av=off:cond=on:fsr=off:nwc=3.0:i=211:si=on:rawr=on:rtra=on_0 on theBenchmark for (2998ds/211Mi)
% 2.21/0.68 % (11446)dis+34_1:32_abs=on:add=off:bsr=on:gsp=on:sp=weighted_frequency:i=388:si=on:rawr=on:rtra=on_0 on theBenchmark for (2998ds/388Mi)
% 2.21/0.69 % (11434)Also succeeded, but the first one will report.
% 2.21/0.69 % (11440)Refutation found. Thanks to Tanya!
% 2.21/0.69 % SZS status Theorem for theBenchmark
% 2.21/0.69 % SZS output start Proof for theBenchmark
% See solution above
% 2.21/0.69 % (11440)------------------------------
% 2.21/0.69 % (11440)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 2.21/0.69 % (11440)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 2.21/0.69 % (11440)Termination reason: Refutation
% 2.21/0.69
% 2.21/0.69 % (11440)Memory used [KB]: 6652
% 2.21/0.69 % (11440)Time elapsed: 0.208 s
% 2.21/0.69 % (11440)Instructions burned: 58 (million)
% 2.21/0.69 % (11440)------------------------------
% 2.21/0.69 % (11440)------------------------------
% 2.21/0.69 % (11415)Success in time 0.321 s
%------------------------------------------------------------------------------