TSTP Solution File: SWW960+1 by Vampire---4.9
View Problem
- Process Solution
%------------------------------------------------------------------------------
% File : Vampire---4.9
% Problem : SWW960+1 : TPTP v8.2.0. Released v7.4.0.
% Transfm : none
% Format : tptp:raw
% Command : run_vampire %s %d THM
% Computer : n016.cluster.edu
% Model : x86_64 x86_64
% CPU : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory : 8042.1875MB
% OS : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit : 300s
% DateTime : Mon Jun 24 18:47:14 EDT 2024
% Result : Theorem 0.21s 0.47s
% Output : Refutation 0.21s
% Verified :
% SZS Type : Refutation
% Derivation depth : 15
% Number of leaves : 44
% Syntax : Number of formulae : 203 ( 34 unt; 0 def)
% Number of atoms : 548 ( 45 equ)
% Maximal formula atoms : 7 ( 2 avg)
% Number of connectives : 605 ( 260 ~; 256 |; 36 &)
% ( 12 <=>; 41 =>; 0 <=; 0 <~>)
% Maximal formula depth : 12 ( 5 avg)
% Maximal term depth : 6 ( 2 avg)
% Number of predicates : 17 ( 15 usr; 13 prp; 0-2 aty)
% Number of functors : 34 ( 34 usr; 10 con; 0-2 aty)
% Number of variables : 295 ( 293 !; 2 ?)
% Comments :
%------------------------------------------------------------------------------
fof(f1695,plain,
$false,
inference(avatar_sat_refutation,[],[f516,f567,f619,f686,f832,f956,f1023,f1172,f1416,f1516,f1542,f1545,f1694]) ).
fof(f1694,plain,
~ spl1_14,
inference(avatar_contradiction_clause,[],[f1560]) ).
fof(f1560,plain,
( $false
| ~ spl1_14 ),
inference(resolution,[],[f785,f334]) ).
fof(f334,plain,
pred_attacker(constr_CONST_0x30),
inference(cnf_transformation,[],[f144]) ).
fof(f144,axiom,
pred_attacker(constr_CONST_0x30),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f785,plain,
( ! [X1] : ~ pred_attacker(X1)
| ~ spl1_14 ),
inference(avatar_component_clause,[],[f784]) ).
fof(f784,plain,
( spl1_14
<=> ! [X1] : ~ pred_attacker(X1) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_14])]) ).
fof(f1545,plain,
( spl1_14
| ~ spl1_1 ),
inference(avatar_split_clause,[],[f1544,f504,f784]) ).
fof(f504,plain,
( spl1_1
<=> ! [X2] : ~ pred_attacker(tuple_client_B_in_5(X2)) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_1])]) ).
fof(f1544,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl1_1 ),
inference(resolution,[],[f505,f436]) ).
fof(f436,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f256]) ).
fof(f256,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f185]) ).
fof(f185,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_5(X0)) ),
inference(rectify,[],[f120]) ).
fof(f120,axiom,
! [X60] :
( pred_attacker(X60)
=> pred_attacker(tuple_client_B_in_5(X60)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f505,plain,
( ! [X2] : ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ spl1_1 ),
inference(avatar_component_clause,[],[f504]) ).
fof(f1542,plain,
( ~ spl1_4
| ~ spl1_84 ),
inference(avatar_contradiction_clause,[],[f1541]) ).
fof(f1541,plain,
( $false
| ~ spl1_4
| ~ spl1_84 ),
inference(resolution,[],[f1515,f663]) ).
fof(f663,plain,
( ~ pred_attacker(name_Nb(sK0))
| ~ spl1_4 ),
inference(subsumption_resolution,[],[f660,f627]) ).
fof(f627,plain,
( pred_attacker(name_objective)
| ~ spl1_4 ),
inference(resolution,[],[f449,f515]) ).
fof(f515,plain,
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ spl1_4 ),
inference(avatar_component_clause,[],[f513]) ).
fof(f513,plain,
( spl1_4
<=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_4])]) ).
fof(f449,plain,
! [X0] :
( ~ pred_attacker(tuple_client_B_out_6(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f269]) ).
fof(f269,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_B_out_6(X0)) ),
inference(ennf_transformation,[],[f198]) ).
fof(f198,plain,
! [X0] :
( pred_attacker(tuple_client_B_out_6(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f114]) ).
fof(f114,axiom,
! [X51] :
( pred_attacker(tuple_client_B_out_6(X51))
=> pred_attacker(X51) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f660,plain,
( ~ pred_attacker(name_objective)
| ~ pred_attacker(name_Nb(sK0)) ),
inference(resolution,[],[f487,f327]) ).
fof(f327,plain,
~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
inference(cnf_transformation,[],[f326]) ).
fof(f326,plain,
~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
inference(skolemisation,[status(esa),new_symbols(skolem,[sK0])],[f244,f325]) ).
fof(f325,plain,
( ? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective))
=> ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)) ),
introduced(choice_axiom,[]) ).
fof(f244,plain,
? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective)),
inference(ennf_transformation,[],[f171]) ).
fof(f171,plain,
~ ! [X0] : pred_attacker(tuple_2(name_Nb(X0),name_objective)),
inference(rectify,[],[f170]) ).
fof(f170,negated_conjecture,
~ ! [X115] : pred_attacker(tuple_2(name_Nb(X115),name_objective)),
inference(negated_conjecture,[],[f169]) ).
fof(f169,conjecture,
! [X115] : pred_attacker(tuple_2(name_Nb(X115),name_objective)),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f487,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f310]) ).
fof(f310,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f309]) ).
fof(f309,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f235]) ).
fof(f235,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(tuple_2(X0,X1)) ),
inference(rectify,[],[f145]) ).
fof(f145,axiom,
! [X86,X87] :
( ( pred_attacker(X87)
& pred_attacker(X86) )
=> pred_attacker(tuple_2(X86,X87)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f1515,plain,
( ! [X1] : pred_attacker(name_Nb(X1))
| ~ spl1_84 ),
inference(avatar_component_clause,[],[f1514]) ).
fof(f1514,plain,
( spl1_84
<=> ! [X1] : pred_attacker(name_Nb(X1)) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_84])]) ).
fof(f1516,plain,
( spl1_2
| spl1_84
| ~ spl1_7
| ~ spl1_80 ),
inference(avatar_split_clause,[],[f1512,f1414,f680,f1514,f507]) ).
fof(f507,plain,
( spl1_2
<=> ! [X1] : ~ pred_attacker(tuple_client_B_in_3(X1)) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_2])]) ).
fof(f680,plain,
( spl1_7
<=> pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(name_A,constr_pkey(name_skA)),name_skS))) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_7])]) ).
fof(f1414,plain,
( spl1_80
<=> ! [X0] :
( ~ pred_attacker(tuple_client_A_in_4(X0))
| pred_attacker(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA))) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_80])]) ).
fof(f1512,plain,
( ! [X0,X1] :
( pred_attacker(name_Nb(X1))
| ~ pred_attacker(tuple_client_B_in_3(X0)) )
| ~ spl1_7
| ~ spl1_80 ),
inference(forward_demodulation,[],[f1499,f461]) ).
fof(f461,plain,
! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
inference(cnf_transformation,[],[f210]) ).
fof(f210,plain,
! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
inference(rectify,[],[f83]) ).
fof(f83,axiom,
! [X8,X9] : constr_tuple_2_get_1_bitstring(tuple_2(X8,X9)) = X9,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f1499,plain,
( ! [X0,X1] :
( ~ pred_attacker(tuple_client_B_in_3(X0))
| pred_attacker(constr_tuple_2_get_1_bitstring(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X1)))) )
| ~ spl1_7
| ~ spl1_80 ),
inference(resolution,[],[f1000,f1426]) ).
fof(f1426,plain,
( ! [X0] :
( ~ pred_attacker(constr_aenc(X0,constr_pkey(name_skA)))
| pred_attacker(constr_tuple_2_get_1_bitstring(X0)) )
| ~ spl1_80 ),
inference(resolution,[],[f1425,f427]) ).
fof(f427,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f247]) ).
fof(f247,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f176]) ).
fof(f176,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_A_in_4(X0)) ),
inference(rectify,[],[f133]) ).
fof(f133,axiom,
! [X76] :
( pred_attacker(X76)
=> pred_attacker(tuple_client_A_in_4(X76)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f1425,plain,
( ! [X0] :
( ~ pred_attacker(tuple_client_A_in_4(constr_aenc(X0,constr_pkey(name_skA))))
| pred_attacker(constr_tuple_2_get_1_bitstring(X0)) )
| ~ spl1_80 ),
inference(superposition,[],[f1415,f464]) ).
fof(f464,plain,
! [X0,X1] : constr_adec(constr_aenc(X1,constr_pkey(X0)),X0) = X1,
inference(cnf_transformation,[],[f79]) ).
fof(f79,axiom,
! [X0,X1] : constr_adec(constr_aenc(X1,constr_pkey(X0)),X0) = X1,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f1415,plain,
( ! [X0] :
( pred_attacker(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA)))
| ~ pred_attacker(tuple_client_A_in_4(X0)) )
| ~ spl1_80 ),
inference(avatar_component_clause,[],[f1414]) ).
fof(f1000,plain,
( ! [X0,X1] :
( pred_attacker(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X1)),constr_pkey(name_skA)))
| ~ pred_attacker(tuple_client_B_in_3(X0)) )
| ~ spl1_7 ),
inference(resolution,[],[f964,f447]) ).
fof(f447,plain,
! [X0] :
( ~ pred_attacker(tuple_client_B_out_4(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f267]) ).
fof(f267,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_B_out_4(X0)) ),
inference(ennf_transformation,[],[f196]) ).
fof(f196,plain,
! [X0] :
( pred_attacker(tuple_client_B_out_4(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f116]) ).
fof(f116,axiom,
! [X53] :
( pred_attacker(tuple_client_B_out_4(X53))
=> pred_attacker(X53) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f964,plain,
( ! [X0,X1] :
( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X1)),constr_pkey(name_skA))))
| ~ pred_attacker(tuple_client_B_in_3(X0)) )
| ~ spl1_7 ),
inference(resolution,[],[f959,f868]) ).
fof(f868,plain,
! [X2,X3,X0,X1] :
( ~ pred_attacker(constr_sign(tuple_2(X3,X2),name_skS))
| ~ pred_attacker(tuple_client_B_in_3(X0))
| pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X1)),X2))) ),
inference(resolution,[],[f766,f438]) ).
fof(f438,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f258]) ).
fof(f258,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f187]) ).
fof(f187,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_2(X0)) ),
inference(rectify,[],[f124]) ).
fof(f124,axiom,
! [X64] :
( pred_attacker(X64)
=> pred_attacker(tuple_client_B_in_2(X64)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f766,plain,
! [X2,X3,X0,X1] :
( ~ pred_attacker(tuple_client_B_in_2(constr_sign(tuple_2(X0,X1),name_skS)))
| pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X2,name_skB)),name_Nb(X3)),X1)))
| ~ pred_attacker(tuple_client_B_in_3(X2)) ),
inference(superposition,[],[f708,f461]) ).
fof(f708,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(X0))))
| ~ pred_attacker(tuple_client_B_in_2(constr_sign(X0,name_skS)))
| ~ pred_attacker(tuple_client_B_in_3(X1)) ),
inference(superposition,[],[f497,f465]) ).
fof(f465,plain,
! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
inference(cnf_transformation,[],[f213]) ).
fof(f213,plain,
! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
inference(rectify,[],[f82]) ).
fof(f82,axiom,
! [X6,X7] : constr_checksign(constr_sign(X7,X6),constr_pkey(X6)) = X7,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f497,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_attacker(tuple_client_B_in_3(X1)) ),
inference(subsumption_resolution,[],[f496,f457]) ).
fof(f457,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
inference(cnf_transformation,[],[f206]) ).
fof(f206,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
inference(rectify,[],[f87]) ).
fof(f87,axiom,
! [X16,X17] : pred_eq_bitstring_bitstring(X16,X17),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f496,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) ),
inference(subsumption_resolution,[],[f492,f457]) ).
fof(f492,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) ),
inference(cnf_transformation,[],[f320]) ).
fof(f320,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) ),
inference(flattening,[],[f319]) ).
fof(f319,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) ),
inference(ennf_transformation,[],[f240]) ).
fof(f240,plain,
! [X0,X1,X2] :
( ( pred_attacker(tuple_client_B_in_2(X2))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X1))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) )
=> pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
inference(rectify,[],[f165]) ).
fof(f165,axiom,
! [X103,X104,X105] :
( ( pred_attacker(tuple_client_B_in_2(X105))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X105,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X104))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X104,name_skB))) )
=> pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X104,name_skB)),name_Nb(X103)),constr_tuple_2_get_1_bitstring(constr_checksign(X105,constr_pkey(name_skS)))))) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f959,plain,
( pred_attacker(constr_sign(tuple_2(name_A,constr_pkey(name_skA)),name_skS))
| ~ spl1_7 ),
inference(resolution,[],[f682,f445]) ).
fof(f445,plain,
! [X0] :
( ~ pred_attacker(tuple_key_retrieval_server_out_2(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f265]) ).
fof(f265,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_key_retrieval_server_out_2(X0)) ),
inference(ennf_transformation,[],[f194]) ).
fof(f194,plain,
! [X0] :
( pred_attacker(tuple_key_retrieval_server_out_2(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f102]) ).
fof(f102,axiom,
! [X32] :
( pred_attacker(tuple_key_retrieval_server_out_2(X32))
=> pred_attacker(X32) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f682,plain,
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(name_A,constr_pkey(name_skA)),name_skS)))
| ~ spl1_7 ),
inference(avatar_component_clause,[],[f680]) ).
fof(f1416,plain,
( spl1_14
| spl1_80
| ~ spl1_28 ),
inference(avatar_split_clause,[],[f1412,f1021,f1414,f784]) ).
fof(f1021,plain,
( spl1_28
<=> ! [X2,X0] :
( ~ pred_attacker(X0)
| ~ pred_attacker(tuple_client_A_in_4(X2))
| pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X2,name_skA)),X0)) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_28])]) ).
fof(f1412,plain,
( ! [X0,X1] :
( ~ pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_attacker(X1)
| pred_attacker(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA))) )
| ~ spl1_28 ),
inference(subsumption_resolution,[],[f1410,f443]) ).
fof(f443,plain,
! [X0] :
( pred_attacker(constr_pkey(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f263]) ).
fof(f263,plain,
! [X0] :
( pred_attacker(constr_pkey(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f192]) ).
fof(f192,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(constr_pkey(X0)) ),
inference(rectify,[],[f94]) ).
fof(f94,axiom,
! [X24] :
( pred_attacker(X24)
=> pred_attacker(constr_pkey(X24)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f1410,plain,
( ! [X0,X1] :
( ~ pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_attacker(constr_pkey(X1))
| ~ pred_attacker(X1)
| pred_attacker(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA))) )
| ~ spl1_28 ),
inference(resolution,[],[f1022,f658]) ).
fof(f658,plain,
! [X0,X1] :
( ~ pred_attacker(constr_aenc(X0,constr_pkey(X1)))
| ~ pred_attacker(X1)
| pred_attacker(X0) ),
inference(superposition,[],[f485,f464]) ).
fof(f485,plain,
! [X0,X1] :
( pred_attacker(constr_adec(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f306]) ).
fof(f306,plain,
! [X0,X1] :
( pred_attacker(constr_adec(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f305]) ).
fof(f305,plain,
! [X0,X1] :
( pred_attacker(constr_adec(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f233]) ).
fof(f233,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(constr_adec(X0,X1)) ),
inference(rectify,[],[f139]) ).
fof(f139,axiom,
! [X84,X85] :
( ( pred_attacker(X85)
& pred_attacker(X84) )
=> pred_attacker(constr_adec(X84,X85)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f1022,plain,
( ! [X2,X0] :
( pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X2,name_skA)),X0))
| ~ pred_attacker(tuple_client_A_in_4(X2))
| ~ pred_attacker(X0) )
| ~ spl1_28 ),
inference(avatar_component_clause,[],[f1021]) ).
fof(f1172,plain,
~ spl1_25,
inference(avatar_contradiction_clause,[],[f1171]) ).
fof(f1171,plain,
( $false
| ~ spl1_25 ),
inference(subsumption_resolution,[],[f1170,f410]) ).
fof(f410,plain,
name_A != name_c,
inference(cnf_transformation,[],[f53]) ).
fof(f53,axiom,
name_A != name_c,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f1170,plain,
( name_A = name_c
| ~ spl1_25 ),
inference(subsumption_resolution,[],[f1050,f397]) ).
fof(f397,plain,
name_B != name_c,
inference(cnf_transformation,[],[f59]) ).
fof(f59,axiom,
name_B != name_c,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f1050,plain,
( name_B = name_c
| name_A = name_c
| ~ spl1_25 ),
inference(resolution,[],[f1011,f335]) ).
fof(f335,plain,
pred_attacker(name_c),
inference(cnf_transformation,[],[f150]) ).
fof(f150,axiom,
pred_attacker(name_c),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f1011,plain,
( ! [X1] :
( ~ pred_attacker(X1)
| name_B = X1
| name_A = X1 )
| ~ spl1_25 ),
inference(avatar_component_clause,[],[f1010]) ).
fof(f1010,plain,
( spl1_25
<=> ! [X1] :
( name_B = X1
| ~ pred_attacker(X1)
| name_A = X1 ) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_25])]) ).
fof(f1023,plain,
( spl1_25
| spl1_28
| ~ spl1_17 ),
inference(avatar_split_clause,[],[f1004,f830,f1021,f1010]) ).
fof(f830,plain,
( spl1_17
<=> ! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| name_B = X0
| name_A = X0 ) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_17])]) ).
fof(f1004,plain,
( ! [X2,X0,X1] :
( ~ pred_attacker(X0)
| name_B = X1
| name_A = X1
| ~ pred_attacker(X1)
| pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X2,name_skA)),X0))
| ~ pred_attacker(tuple_client_A_in_4(X2)) )
| ~ spl1_17 ),
inference(resolution,[],[f881,f756]) ).
fof(f756,plain,
! [X2,X0,X1] :
( ~ pred_attacker(constr_sign(tuple_2(X2,X1),name_skS))
| pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X0,name_skA)),X1))
| ~ pred_attacker(tuple_client_A_in_4(X0)) ),
inference(resolution,[],[f750,f437]) ).
fof(f437,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_2(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f257]) ).
fof(f257,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_2(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f186]) ).
fof(f186,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_A_in_2(X0)) ),
inference(rectify,[],[f135]) ).
fof(f135,axiom,
! [X78] :
( pred_attacker(X78)
=> pred_attacker(tuple_client_A_in_2(X78)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f750,plain,
! [X2,X0,X1] :
( ~ pred_attacker(tuple_client_A_in_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(tuple_client_A_in_4(X2))
| pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X2,name_skA)),X1)) ),
inference(superposition,[],[f721,f461]) ).
fof(f721,plain,
! [X0,X1] :
( pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(X0)))
| ~ pred_attacker(tuple_client_A_in_4(X1))
| ~ pred_attacker(tuple_client_A_in_2(constr_sign(X0,name_skS))) ),
inference(superposition,[],[f699,f465]) ).
fof(f699,plain,
! [X0,X1] :
( pred_attacker(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X0,constr_pkey(name_skS)))))
| ~ pred_attacker(tuple_client_A_in_4(X1))
| ~ pred_attacker(tuple_client_A_in_2(X0)) ),
inference(resolution,[],[f499,f450]) ).
fof(f450,plain,
! [X0] :
( ~ pred_attacker(tuple_client_A_out_5(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f270]) ).
fof(f270,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_A_out_5(X0)) ),
inference(ennf_transformation,[],[f199]) ).
fof(f199,plain,
! [X0] :
( pred_attacker(tuple_client_A_out_5(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f127]) ).
fof(f127,axiom,
! [X67] :
( pred_attacker(tuple_client_A_out_5(X67))
=> pred_attacker(X67) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f499,plain,
! [X2,X1] :
( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_attacker(tuple_client_A_in_4(X1)) ),
inference(subsumption_resolution,[],[f498,f457]) ).
fof(f498,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_attacker(tuple_client_A_in_4(X1))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X1,name_skA))) ),
inference(subsumption_resolution,[],[f493,f457]) ).
fof(f493,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_A_in_4(X1))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X1,name_skA))) ),
inference(cnf_transformation,[],[f322]) ).
fof(f322,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_A_in_4(X1))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X1,name_skA))) ),
inference(flattening,[],[f321]) ).
fof(f321,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_A_in_4(X1))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X1,name_skA))) ),
inference(ennf_transformation,[],[f241]) ).
fof(f241,plain,
! [X0,X1,X2] :
( ( pred_attacker(tuple_client_A_in_2(X2))
& pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
& pred_attacker(tuple_client_A_in_4(X1))
& pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_2_get_0x30(constr_adec(X1,name_skA))) )
=> pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X1,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
inference(rectify,[],[f163]) ).
fof(f163,axiom,
! [X100,X101,X102] :
( ( pred_attacker(tuple_client_A_in_2(X102))
& pred_eq_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(X102,constr_pkey(name_skS))))
& pred_attacker(tuple_client_A_in_4(X101))
& pred_eq_bitstring_bitstring(name_Na(X100),constr_tuple_2_get_0x30(constr_adec(X101,name_skA))) )
=> pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(X101,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(X102,constr_pkey(name_skS)))))) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f881,plain,
( ! [X0,X1] :
( pred_attacker(constr_sign(tuple_2(X0,X1),name_skS))
| ~ pred_attacker(X1)
| name_B = X0
| name_A = X0
| ~ pred_attacker(X0) )
| ~ spl1_17 ),
inference(resolution,[],[f831,f445]) ).
fof(f831,plain,
( ! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| name_B = X0
| name_A = X0 )
| ~ spl1_17 ),
inference(avatar_component_clause,[],[f830]) ).
fof(f956,plain,
( spl1_14
| ~ spl1_8 ),
inference(avatar_split_clause,[],[f955,f684,f784]) ).
fof(f684,plain,
( spl1_8
<=> ! [X0] : ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,name_A)) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_8])]) ).
fof(f955,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl1_8 ),
inference(subsumption_resolution,[],[f954,f338]) ).
fof(f338,plain,
pred_attacker(name_A),
inference(cnf_transformation,[],[f153]) ).
fof(f153,axiom,
pred_attacker(name_A),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f954,plain,
( ! [X0] :
( ~ pred_attacker(name_A)
| ~ pred_attacker(X0) )
| ~ spl1_8 ),
inference(resolution,[],[f685,f481]) ).
fof(f481,plain,
! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f298]) ).
fof(f298,plain,
! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f297]) ).
fof(f297,plain,
! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f229]) ).
fof(f229,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
inference(rectify,[],[f103]) ).
fof(f103,axiom,
! [X33,X34] :
( ( pred_attacker(X34)
& pred_attacker(X33) )
=> pred_attacker(tuple_key_retrieval_server_in_1(X33,X34)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f685,plain,
( ! [X0] : ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,name_A))
| ~ spl1_8 ),
inference(avatar_component_clause,[],[f684]) ).
fof(f832,plain,
( spl1_14
| spl1_17 ),
inference(avatar_split_clause,[],[f828,f830,f784]) ).
fof(f828,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| name_A = X0
| name_B = X0
| ~ pred_attacker(X1)
| ~ pred_attacker(X0)
| ~ pred_attacker(X2) ),
inference(resolution,[],[f687,f481]) ).
fof(f687,plain,
! [X2,X0,X1] :
( ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X2),name_skS)))
| name_A = X1
| name_B = X1
| ~ pred_attacker(X2) ),
inference(subsumption_resolution,[],[f670,f470]) ).
fof(f470,plain,
! [X0,X1] :
( ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| pred_attacker(X1) ),
inference(cnf_transformation,[],[f281]) ).
fof(f281,plain,
! [X0,X1] :
( pred_attacker(X1)
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
inference(ennf_transformation,[],[f218]) ).
fof(f218,plain,
! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
=> pred_attacker(X1) ),
inference(rectify,[],[f105]) ).
fof(f105,axiom,
! [X37,X38] :
( pred_attacker(tuple_key_retrieval_server_in_1(X37,X38))
=> pred_attacker(X38) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f670,plain,
! [X2,X0,X1] :
( ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X1,X2),name_skS)))
| name_A = X1
| name_B = X1
| ~ pred_attacker(X2)
| ~ pred_attacker(X1) ),
inference(resolution,[],[f491,f664]) ).
fof(f664,plain,
! [X0,X1] :
( pred_table(tuple_keys(X0,X1))
| name_A = X0
| name_B = X0
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(resolution,[],[f488,f480]) ).
fof(f480,plain,
! [X0,X1] :
( pred_attacker(tuple_key_register_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f296]) ).
fof(f296,plain,
! [X0,X1] :
( pred_attacker(tuple_key_register_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f295]) ).
fof(f295,plain,
! [X0,X1] :
( pred_attacker(tuple_key_register_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f228]) ).
fof(f228,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(tuple_key_register_server_in_1(X0,X1)) ),
inference(rectify,[],[f106]) ).
fof(f106,axiom,
! [X39,X40] :
( ( pred_attacker(X40)
& pred_attacker(X39) )
=> pred_attacker(tuple_key_register_server_in_1(X39,X40)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f488,plain,
! [X0,X1] :
( ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
| pred_table(tuple_keys(X0,X1))
| name_A = X0
| name_B = X0 ),
inference(cnf_transformation,[],[f312]) ).
fof(f312,plain,
! [X0,X1] :
( pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
| name_A = X0
| name_B = X0 ),
inference(flattening,[],[f311]) ).
fof(f311,plain,
! [X0,X1] :
( pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
| name_A = X0
| name_B = X0 ),
inference(ennf_transformation,[],[f236]) ).
fof(f236,plain,
! [X0,X1] :
( ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
& name_A != X0
& name_B != X0 )
=> pred_table(tuple_keys(X0,X1)) ),
inference(rectify,[],[f168]) ).
fof(f168,axiom,
! [X113,X114] :
( ( pred_attacker(tuple_key_register_server_in_1(X113,X114))
& name_A != X113
& name_B != X113 )
=> pred_table(tuple_keys(X113,X114)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f491,plain,
! [X2,X0,X1] :
( ~ pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
inference(cnf_transformation,[],[f318]) ).
fof(f318,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
| ~ pred_table(tuple_keys(X0,X1)) ),
inference(flattening,[],[f317]) ).
fof(f317,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
| ~ pred_table(tuple_keys(X0,X1)) ),
inference(ennf_transformation,[],[f239]) ).
fof(f239,plain,
! [X0,X1,X2] :
( ( pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
& pred_table(tuple_keys(X0,X1)) )
=> pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
inference(rectify,[],[f167]) ).
fof(f167,axiom,
! [X110,X111,X112] :
( ( pred_attacker(tuple_key_retrieval_server_in_1(X112,X110))
& pred_table(tuple_keys(X110,X111)) )
=> pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X110,X111),name_skS))) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f686,plain,
( spl1_7
| spl1_8 ),
inference(avatar_split_clause,[],[f669,f684,f680]) ).
fof(f669,plain,
! [X0] :
( ~ pred_attacker(tuple_key_retrieval_server_in_1(X0,name_A))
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(name_A,constr_pkey(name_skA)),name_skS))) ),
inference(resolution,[],[f491,f423]) ).
fof(f423,plain,
pred_table(tuple_keys(name_A,constr_pkey(name_skA))),
inference(cnf_transformation,[],[f156]) ).
fof(f156,axiom,
pred_table(tuple_keys(name_A,constr_pkey(name_skA))),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f619,plain,
~ spl1_3,
inference(avatar_contradiction_clause,[],[f569]) ).
fof(f569,plain,
( $false
| ~ spl1_3 ),
inference(resolution,[],[f568,f334]) ).
fof(f568,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl1_3 ),
inference(resolution,[],[f511,f438]) ).
fof(f511,plain,
( ! [X3] : ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ spl1_3 ),
inference(avatar_component_clause,[],[f510]) ).
fof(f510,plain,
( spl1_3
<=> ! [X3] : ~ pred_attacker(tuple_client_B_in_2(X3)) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_3])]) ).
fof(f567,plain,
~ spl1_2,
inference(avatar_contradiction_clause,[],[f518]) ).
fof(f518,plain,
( $false
| ~ spl1_2 ),
inference(resolution,[],[f517,f334]) ).
fof(f517,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl1_2 ),
inference(resolution,[],[f440,f508]) ).
fof(f508,plain,
( ! [X1] : ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ spl1_2 ),
inference(avatar_component_clause,[],[f507]) ).
fof(f440,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f260]) ).
fof(f260,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f189]) ).
fof(f189,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_3(X0)) ),
inference(rectify,[],[f122]) ).
fof(f122,axiom,
! [X62] :
( pred_attacker(X62)
=> pred_attacker(tuple_client_B_in_3(X62)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f516,plain,
( spl1_1
| spl1_2
| spl1_3
| spl1_4 ),
inference(avatar_split_clause,[],[f502,f513,f510,f507,f504]) ).
fof(f502,plain,
! [X2,X3,X1] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_attacker(tuple_client_B_in_5(X2)) ),
inference(subsumption_resolution,[],[f501,f457]) ).
fof(f501,plain,
! [X2,X3,X0,X1] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ),
inference(subsumption_resolution,[],[f500,f457]) ).
fof(f500,plain,
! [X2,X3,X0,X1] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ),
inference(subsumption_resolution,[],[f494,f457]) ).
fof(f494,plain,
! [X2,X3,X0,X1] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ),
inference(cnf_transformation,[],[f324]) ).
fof(f324,plain,
! [X0,X1,X2,X3] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ),
inference(flattening,[],[f323]) ).
fof(f323,plain,
! [X0,X1,X2,X3] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ),
inference(ennf_transformation,[],[f242]) ).
fof(f242,plain,
! [X0,X1,X2,X3] :
( ( pred_attacker(tuple_client_B_in_2(X3))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X1))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
& pred_attacker(tuple_client_B_in_5(X2))
& pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) )
=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(rectify,[],[f166]) ).
fof(f166,axiom,
! [X106,X107,X108,X109] :
( ( pred_attacker(tuple_client_B_in_2(X109))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X109,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X107))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X107,name_skB)))
& pred_attacker(tuple_client_B_in_5(X108))
& pred_eq_bitstring_bitstring(name_Nb(X106),constr_adec(X108,name_skB)) )
=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.03/0.12 % Problem : SWW960+1 : TPTP v8.2.0. Released v7.4.0.
% 0.03/0.12 % Command : run_vampire %s %d THM
% 0.11/0.33 % Computer : n016.cluster.edu
% 0.11/0.33 % Model : x86_64 x86_64
% 0.11/0.33 % CPU : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.11/0.33 % Memory : 8042.1875MB
% 0.11/0.33 % OS : Linux 3.10.0-693.el7.x86_64
% 0.11/0.33 % CPULimit : 300
% 0.11/0.33 % WCLimit : 300
% 0.11/0.33 % DateTime : Wed Jun 19 08:47:09 EDT 2024
% 0.11/0.33 % CPUTime :
% 0.11/0.35 This is a FOF_THM_RFO_SEQ problem
% 0.11/0.35 Running first-order theorem proving
% 0.11/0.35 Running /export/starexec/sandbox2/solver/bin/vampire --mode casc -m 16384 --cores 7 -t 300 /export/starexec/sandbox2/benchmark/theBenchmark.p
% 0.21/0.42 % (22257)Running in auto input_syntax mode. Trying TPTP
% 0.21/0.42 % (22259)dis+11_1:1_nwc=5.0:s2a=on:i=66616:s2at=3.0:sil=128000:bd=off_0 on theBenchmark for (2999ds/66616Mi)
% 0.21/0.42 % (22257)Running in auto input_syntax mode. Trying TPTP
% 0.21/0.42 % (22262)dis+1011_3:1_sil=256000:tgt=ground:sac=on:i=109:sd=1:ss=included_0 on theBenchmark for (2999ds/109Mi)
% 0.21/0.42 % (22257)Running in auto input_syntax mode. Trying TPTP
% 0.21/0.42 % (22258)lrs+1011_1:12_anc=none:drc=off:sil=64000:sims=off:sp=unary_first:spb=goal_then_units:lsd=20:rnwc=on:nwc=2.0:i=53554:add=off:awrs=converge:bd=off:uhcvi=on:tgt=ground:afp=300:afq=1.63_0 on theBenchmark for (2999ds/53554Mi)
% 0.21/0.42 % (22257)Running in auto input_syntax mode. Trying TPTP
% 0.21/0.42 % (22261)lrs+10_1:3_drc=off:sil=256000:sp=unary_first:lwlo=on:i=216875:kws=precedence:ins=3:rawr=on:nwc=10.0_0 on theBenchmark for (2999ds/216875Mi)
% 0.21/0.42 % (22257)Running in auto input_syntax mode. Trying TPTP
% 0.21/0.42 % (22263)dis+1010_1:1_sil=2000:nwc=3.0:s2a=on:i=132:ins=5:fsr=off:ss=axioms:sd=2:fd=off_0 on theBenchmark for (2999ds/132Mi)
% 0.21/0.43 % (22257)Running in auto input_syntax mode. Trying TPTP
% 0.21/0.43 % (22264)dis+1010_159245:1048576_to=lpo:sil=2000:etr=on:sp=unary_frequency:spb=goal:rnwc=on:nwc=10.9066:st=2:i=124:sd=1:nm=3:av=off:ss=axioms:rawr=on:drc=encompass:foolp=on:sgt=5:cond=fast:er=filter:erape=on:erml=2:s2a=on_0 on theBenchmark for (2999ds/124Mi)
% 0.21/0.43 % (22263)Refutation not found, incomplete strategy% (22263)------------------------------
% 0.21/0.43 % (22263)Version: Vampire 4.9 (commit 18c118a85 on 2024-06-08 21:14:20 +0100)
% 0.21/0.43 % (22263)Linked with Z3 4.12.3.0 79bbbf76d0c123481c8ca05cd3a98939270074d3 z3-4.8.4-7980-g79bbbf76d
% 0.21/0.43 % (22263)Termination reason: Refutation not found, incomplete strategy
% 0.21/0.43
% 0.21/0.43 % (22263)Memory used [KB]: 1229
% 0.21/0.43 % (22263)Time elapsed: 0.004 s
% 0.21/0.43 % (22263)Instructions burned: 7 (million)
% 0.21/0.43 % (22263)------------------------------
% 0.21/0.43 % (22263)------------------------------
% 0.21/0.43 % (22257)Running in auto input_syntax mode. Trying TPTP
% 0.21/0.43 % (22260)lrs+1010_2201:262144_anc=all:drc=encompass:sil=256000:sims=off:sp=frequency:spb=goal_then_units:rp=on:lwlo=on:st=3.0:i=179501:bs=unit_only:nm=6:ins=2:fsd=on:ss=axioms:sgt=16:afr=on:tgt=ground:awrs=decay:awrsf=200:acc=on:ccuc=first_0 on theBenchmark for (2999ds/179501Mi)
% 0.21/0.43 % (22264)Refutation not found, incomplete strategy% (22264)------------------------------
% 0.21/0.43 % (22264)Version: Vampire 4.9 (commit 18c118a85 on 2024-06-08 21:14:20 +0100)
% 0.21/0.43 % (22264)Linked with Z3 4.12.3.0 79bbbf76d0c123481c8ca05cd3a98939270074d3 z3-4.8.4-7980-g79bbbf76d
% 0.21/0.43 % (22264)Termination reason: Refutation not found, incomplete strategy
% 0.21/0.43
% 0.21/0.43 % (22264)Memory used [KB]: 1160
% 0.21/0.43 % (22264)Time elapsed: 0.005 s
% 0.21/0.43 % (22264)Instructions burned: 5 (million)
% 0.21/0.43 % (22264)------------------------------
% 0.21/0.43 % (22264)------------------------------
% 0.21/0.46 % (22261)First to succeed.
% 0.21/0.47 % (22257)Running in auto input_syntax mode. Trying TPTP
% 0.21/0.47 % (22265)lrs+1011_1:1_sil=16000:sos=on:erd=off:i=126:nm=2:ep=RST_0 on theBenchmark for (2999ds/126Mi)
% 0.21/0.47 % (22261)Solution written to "/export/starexec/sandbox2/tmp/vampire-proof-22257"
% 0.21/0.47 % (22262)Also succeeded, but the first one will report.
% 0.21/0.47 % (22257)Running in auto input_syntax mode. Trying TPTP
% 0.21/0.47 % (22261)Refutation found. Thanks to Tanya!
% 0.21/0.47 % SZS status Theorem for theBenchmark
% 0.21/0.47 % SZS output start Proof for theBenchmark
% See solution above
% 0.21/0.47 % (22261)------------------------------
% 0.21/0.47 % (22261)Version: Vampire 4.9 (commit 18c118a85 on 2024-06-08 21:14:20 +0100)
% 0.21/0.47 % (22261)Linked with Z3 4.12.3.0 79bbbf76d0c123481c8ca05cd3a98939270074d3 z3-4.8.4-7980-g79bbbf76d
% 0.21/0.47 % (22261)Termination reason: Refutation
% 0.21/0.47
% 0.21/0.47 % (22261)Memory used [KB]: 1860
% 0.21/0.47 % (22261)Time elapsed: 0.048 s
% 0.21/0.47 % (22261)Instructions burned: 69 (million)
% 0.21/0.47 % (22261)------------------------------
% 0.21/0.47 % (22261)------------------------------
% 0.21/0.47 % (22257)Success in time 0.11 s
%------------------------------------------------------------------------------