TSTP Solution File: SWW960+1 by Vampire-SAT---4.9
View Problem
- Process Solution
%------------------------------------------------------------------------------
% File : Vampire-SAT---4.9
% Problem : SWW960+1 : TPTP v8.2.0. Released v7.4.0.
% Transfm : none
% Format : tptp:raw
% Command : run_vampire %s %d SAT
% Computer : n006.cluster.edu
% Model : x86_64 x86_64
% CPU : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory : 8042.1875MB
% OS : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit : 300s
% DateTime : Mon Jun 24 19:04:07 EDT 2024
% Result : Theorem 0.21s 0.51s
% Output : Refutation 0.21s
% Verified :
% SZS Type : Refutation
% Derivation depth : 15
% Number of leaves : 36
% Syntax : Number of formulae : 165 ( 30 unt; 0 def)
% Number of atoms : 441 ( 35 equ)
% Maximal formula atoms : 7 ( 2 avg)
% Number of connectives : 487 ( 211 ~; 202 |; 30 &)
% ( 10 <=>; 34 =>; 0 <=; 0 <~>)
% Maximal formula depth : 12 ( 5 avg)
% Maximal term depth : 6 ( 2 avg)
% Number of predicates : 15 ( 13 usr; 11 prp; 0-2 aty)
% Number of functors : 28 ( 28 usr; 8 con; 0-2 aty)
% Number of variables : 259 ( 258 !; 1 ?)
% Comments :
%------------------------------------------------------------------------------
fof(f1929,plain,
$false,
inference(avatar_sat_refutation,[],[f514,f563,f614,f665,f719,f998,f1299,f1498,f1748,f1912,f1928]) ).
fof(f1928,plain,
( ~ spl1_1
| ~ spl1_70 ),
inference(avatar_contradiction_clause,[],[f1927]) ).
fof(f1927,plain,
( $false
| ~ spl1_1
| ~ spl1_70 ),
inference(resolution,[],[f1911,f709]) ).
fof(f709,plain,
( ~ pred_attacker(name_Nb(sK0))
| ~ spl1_1 ),
inference(subsumption_resolution,[],[f706,f673]) ).
fof(f673,plain,
( pred_attacker(name_objective)
| ~ spl1_1 ),
inference(resolution,[],[f447,f504]) ).
fof(f504,plain,
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ spl1_1 ),
inference(avatar_component_clause,[],[f502]) ).
fof(f502,plain,
( spl1_1
<=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_1])]) ).
fof(f447,plain,
! [X0] :
( ~ pred_attacker(tuple_client_B_out_6(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f269]) ).
fof(f269,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_B_out_6(X0)) ),
inference(ennf_transformation,[],[f198]) ).
fof(f198,plain,
! [X0] :
( pred_attacker(tuple_client_B_out_6(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f114]) ).
fof(f114,axiom,
! [X51] :
( pred_attacker(tuple_client_B_out_6(X51))
=> pred_attacker(X51) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f706,plain,
( ~ pred_attacker(name_objective)
| ~ pred_attacker(name_Nb(sK0)) ),
inference(resolution,[],[f485,f325]) ).
fof(f325,plain,
~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
inference(cnf_transformation,[],[f244]) ).
fof(f244,plain,
? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective)),
inference(ennf_transformation,[],[f171]) ).
fof(f171,plain,
~ ! [X0] : pred_attacker(tuple_2(name_Nb(X0),name_objective)),
inference(rectify,[],[f170]) ).
fof(f170,negated_conjecture,
~ ! [X115] : pred_attacker(tuple_2(name_Nb(X115),name_objective)),
inference(negated_conjecture,[],[f169]) ).
fof(f169,conjecture,
! [X115] : pred_attacker(tuple_2(name_Nb(X115),name_objective)),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f485,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f310]) ).
fof(f310,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f309]) ).
fof(f309,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f235]) ).
fof(f235,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(tuple_2(X0,X1)) ),
inference(rectify,[],[f145]) ).
fof(f145,axiom,
! [X86,X87] :
( ( pred_attacker(X87)
& pred_attacker(X86) )
=> pred_attacker(tuple_2(X86,X87)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f1911,plain,
( ! [X1] : pred_attacker(name_Nb(X1))
| ~ spl1_70 ),
inference(avatar_component_clause,[],[f1910]) ).
fof(f1910,plain,
( spl1_70
<=> ! [X1] : pred_attacker(name_Nb(X1)) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_70])]) ).
fof(f1912,plain,
( spl1_70
| spl1_3
| ~ spl1_66 ),
inference(avatar_split_clause,[],[f1895,f1746,f509,f1910]) ).
fof(f509,plain,
( spl1_3
<=> ! [X1] : ~ pred_attacker(tuple_client_B_in_3(X1)) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_3])]) ).
fof(f1746,plain,
( spl1_66
<=> ! [X2,X0] :
( ~ pred_attacker(tuple_client_B_in_3(X0))
| pred_attacker(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X2))) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_66])]) ).
fof(f1895,plain,
( ! [X0,X1] :
( ~ pred_attacker(tuple_client_B_in_3(X0))
| pred_attacker(name_Nb(X1)) )
| ~ spl1_66 ),
inference(resolution,[],[f1747,f472]) ).
fof(f472,plain,
! [X0,X1] :
( ~ pred_attacker(tuple_2(X0,X1))
| pred_attacker(X1) ),
inference(cnf_transformation,[],[f285]) ).
fof(f285,plain,
! [X0,X1] :
( pred_attacker(X1)
| ~ pred_attacker(tuple_2(X0,X1)) ),
inference(ennf_transformation,[],[f222]) ).
fof(f222,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X0,X1))
=> pred_attacker(X1) ),
inference(rectify,[],[f147]) ).
fof(f147,axiom,
! [X90,X91] :
( pred_attacker(tuple_2(X90,X91))
=> pred_attacker(X91) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f1747,plain,
( ! [X2,X0] :
( pred_attacker(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X2)))
| ~ pred_attacker(tuple_client_B_in_3(X0)) )
| ~ spl1_66 ),
inference(avatar_component_clause,[],[f1746]) ).
fof(f1748,plain,
( spl1_5
| spl1_66
| ~ spl1_59 ),
inference(avatar_split_clause,[],[f1744,f1496,f1746,f714]) ).
fof(f714,plain,
( spl1_5
<=> ! [X2] : ~ pred_attacker(X2) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_5])]) ).
fof(f1496,plain,
( spl1_59
<=> ! [X2,X0,X3] :
( ~ pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X3)
| pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X2)),X3))) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_59])]) ).
fof(f1744,plain,
( ! [X2,X0,X1] :
( ~ pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X1)
| pred_attacker(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X2))) )
| ~ spl1_59 ),
inference(subsumption_resolution,[],[f1737,f441]) ).
fof(f441,plain,
! [X0] :
( pred_attacker(constr_pkey(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f263]) ).
fof(f263,plain,
! [X0] :
( pred_attacker(constr_pkey(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f192]) ).
fof(f192,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(constr_pkey(X0)) ),
inference(rectify,[],[f94]) ).
fof(f94,axiom,
! [X24] :
( pred_attacker(X24)
=> pred_attacker(constr_pkey(X24)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f1737,plain,
( ! [X2,X0,X1] :
( ~ pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(constr_pkey(X1))
| ~ pred_attacker(X1)
| pred_attacker(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X2))) )
| ~ spl1_59 ),
inference(resolution,[],[f1581,f704]) ).
fof(f704,plain,
! [X0,X1] :
( ~ pred_attacker(constr_aenc(X0,constr_pkey(X1)))
| ~ pred_attacker(X1)
| pred_attacker(X0) ),
inference(superposition,[],[f483,f462]) ).
fof(f462,plain,
! [X0,X1] : constr_adec(constr_aenc(X1,constr_pkey(X0)),X0) = X1,
inference(cnf_transformation,[],[f79]) ).
fof(f79,axiom,
! [X0,X1] : constr_adec(constr_aenc(X1,constr_pkey(X0)),X0) = X1,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f483,plain,
! [X0,X1] :
( pred_attacker(constr_adec(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f306]) ).
fof(f306,plain,
! [X0,X1] :
( pred_attacker(constr_adec(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f305]) ).
fof(f305,plain,
! [X0,X1] :
( pred_attacker(constr_adec(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f233]) ).
fof(f233,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(constr_adec(X0,X1)) ),
inference(rectify,[],[f139]) ).
fof(f139,axiom,
! [X84,X85] :
( ( pred_attacker(X85)
& pred_attacker(X84) )
=> pred_attacker(constr_adec(X84,X85)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f1581,plain,
( ! [X2,X0,X1] :
( pred_attacker(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X2)),X0))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_attacker(X0) )
| ~ spl1_59 ),
inference(resolution,[],[f1497,f445]) ).
fof(f445,plain,
! [X0] :
( ~ pred_attacker(tuple_client_B_out_4(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f267]) ).
fof(f267,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_B_out_4(X0)) ),
inference(ennf_transformation,[],[f196]) ).
fof(f196,plain,
! [X0] :
( pred_attacker(tuple_client_B_out_4(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f116]) ).
fof(f116,axiom,
! [X53] :
( pred_attacker(tuple_client_B_out_4(X53))
=> pred_attacker(X53) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f1497,plain,
( ! [X2,X3,X0] :
( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X2)),X3)))
| ~ pred_attacker(X3)
| ~ pred_attacker(tuple_client_B_in_3(X0)) )
| ~ spl1_59 ),
inference(avatar_component_clause,[],[f1496]) ).
fof(f1498,plain,
( spl1_15
| spl1_59
| ~ spl1_6 ),
inference(avatar_split_clause,[],[f1494,f717,f1496,f1116]) ).
fof(f1116,plain,
( spl1_15
<=> ! [X0] :
( name_A = X0
| ~ pred_attacker(X0)
| name_B = X0 ) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_15])]) ).
fof(f717,plain,
( spl1_6
<=> ! [X0,X1] :
( ~ pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(X0)
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_6])]) ).
fof(f1494,plain,
( ! [X2,X3,X0,X1] :
( ~ pred_attacker(tuple_client_B_in_3(X0))
| name_A = X1
| pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X2)),X3)))
| name_B = X1
| ~ pred_attacker(X3)
| ~ pred_attacker(X1) )
| ~ spl1_6 ),
inference(resolution,[],[f1045,f478]) ).
fof(f478,plain,
! [X0,X1] :
( pred_attacker(tuple_key_register_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f296]) ).
fof(f296,plain,
! [X0,X1] :
( pred_attacker(tuple_key_register_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f295]) ).
fof(f295,plain,
! [X0,X1] :
( pred_attacker(tuple_key_register_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f228]) ).
fof(f228,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(tuple_key_register_server_in_1(X0,X1)) ),
inference(rectify,[],[f106]) ).
fof(f106,axiom,
! [X39,X40] :
( ( pred_attacker(X40)
& pred_attacker(X39) )
=> pred_attacker(tuple_key_register_server_in_1(X39,X40)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f1045,plain,
( ! [X2,X3,X0,X1] :
( ~ pred_attacker(tuple_key_register_server_in_1(X3,X2))
| ~ pred_attacker(tuple_client_B_in_3(X0))
| name_A = X3
| pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X1)),X2)))
| name_B = X3 )
| ~ spl1_6 ),
inference(subsumption_resolution,[],[f1042,f469]) ).
fof(f469,plain,
! [X0,X1] :
( ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f282]) ).
fof(f282,plain,
! [X0,X1] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_key_register_server_in_1(X0,X1)) ),
inference(ennf_transformation,[],[f219]) ).
fof(f219,plain,
! [X0,X1] :
( pred_attacker(tuple_key_register_server_in_1(X0,X1))
=> pred_attacker(X0) ),
inference(rectify,[],[f107]) ).
fof(f107,axiom,
! [X41,X42] :
( pred_attacker(tuple_key_register_server_in_1(X41,X42))
=> pred_attacker(X41) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f1042,plain,
( ! [X2,X3,X0,X1] :
( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X1)),X2)))
| ~ pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X3)
| name_A = X3
| ~ pred_attacker(tuple_key_register_server_in_1(X3,X2))
| name_B = X3 )
| ~ spl1_6 ),
inference(resolution,[],[f856,f486]) ).
fof(f486,plain,
! [X0,X1] :
( pred_table(tuple_keys(X0,X1))
| name_A = X0
| ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
| name_B = X0 ),
inference(cnf_transformation,[],[f312]) ).
fof(f312,plain,
! [X0,X1] :
( pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
| name_A = X0
| name_B = X0 ),
inference(flattening,[],[f311]) ).
fof(f311,plain,
! [X0,X1] :
( pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
| name_A = X0
| name_B = X0 ),
inference(ennf_transformation,[],[f236]) ).
fof(f236,plain,
! [X0,X1] :
( ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
& name_A != X0
& name_B != X0 )
=> pred_table(tuple_keys(X0,X1)) ),
inference(rectify,[],[f168]) ).
fof(f168,axiom,
! [X113,X114] :
( ( pred_attacker(tuple_key_register_server_in_1(X113,X114))
& name_A != X113
& name_B != X113 )
=> pred_table(tuple_keys(X113,X114)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f856,plain,
( ! [X2,X3,X0,X1] :
( ~ pred_table(tuple_keys(X3,X2))
| pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X1)),X2)))
| ~ pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X3) )
| ~ spl1_6 ),
inference(resolution,[],[f823,f723]) ).
fof(f723,plain,
( ! [X0,X1] :
( pred_attacker(constr_sign(tuple_2(X0,X1),name_skS))
| ~ pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(X0) )
| ~ spl1_6 ),
inference(resolution,[],[f718,f443]) ).
fof(f443,plain,
! [X0] :
( ~ pred_attacker(tuple_key_retrieval_server_out_2(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f265]) ).
fof(f265,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_key_retrieval_server_out_2(X0)) ),
inference(ennf_transformation,[],[f194]) ).
fof(f194,plain,
! [X0] :
( pred_attacker(tuple_key_retrieval_server_out_2(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f102]) ).
fof(f102,axiom,
! [X32] :
( pred_attacker(tuple_key_retrieval_server_out_2(X32))
=> pred_attacker(X32) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f718,plain,
( ! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(X0)
| ~ pred_table(tuple_keys(X0,X1)) )
| ~ spl1_6 ),
inference(avatar_component_clause,[],[f717]) ).
fof(f823,plain,
! [X2,X3,X0,X1] :
( ~ pred_attacker(constr_sign(tuple_2(X3,X2),name_skS))
| ~ pred_attacker(tuple_client_B_in_3(X0))
| pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X0,name_skB)),name_Nb(X1)),X2))) ),
inference(resolution,[],[f768,f436]) ).
fof(f436,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f258]) ).
fof(f258,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f187]) ).
fof(f187,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_2(X0)) ),
inference(rectify,[],[f124]) ).
fof(f124,axiom,
! [X64] :
( pred_attacker(X64)
=> pred_attacker(tuple_client_B_in_2(X64)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f768,plain,
! [X2,X3,X0,X1] :
( ~ pred_attacker(tuple_client_B_in_2(constr_sign(tuple_2(X0,X1),name_skS)))
| pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X2,name_skB)),name_Nb(X3)),X1)))
| ~ pred_attacker(tuple_client_B_in_3(X2)) ),
inference(superposition,[],[f730,f459]) ).
fof(f459,plain,
! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
inference(cnf_transformation,[],[f210]) ).
fof(f210,plain,
! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
inference(rectify,[],[f83]) ).
fof(f83,axiom,
! [X8,X9] : constr_tuple_2_get_1_bitstring(tuple_2(X8,X9)) = X9,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f730,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X2)),constr_tuple_2_get_1_bitstring(X0))))
| ~ pred_attacker(tuple_client_B_in_2(constr_sign(X0,name_skS)))
| ~ pred_attacker(tuple_client_B_in_3(X1)) ),
inference(superposition,[],[f495,f463]) ).
fof(f463,plain,
! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
inference(cnf_transformation,[],[f213]) ).
fof(f213,plain,
! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
inference(rectify,[],[f82]) ).
fof(f82,axiom,
! [X6,X7] : constr_checksign(constr_sign(X7,X6),constr_pkey(X6)) = X7,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f495,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_attacker(tuple_client_B_in_3(X1)) ),
inference(subsumption_resolution,[],[f494,f455]) ).
fof(f455,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
inference(cnf_transformation,[],[f206]) ).
fof(f206,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
inference(rectify,[],[f87]) ).
fof(f87,axiom,
! [X16,X17] : pred_eq_bitstring_bitstring(X16,X17),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f494,plain,
! [X2,X0,X1] :
( ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
inference(subsumption_resolution,[],[f490,f455]) ).
fof(f490,plain,
! [X2,X0,X1] :
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
inference(cnf_transformation,[],[f320]) ).
fof(f320,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) ),
inference(flattening,[],[f319]) ).
fof(f319,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) ),
inference(ennf_transformation,[],[f240]) ).
fof(f240,plain,
! [X0,X1,X2] :
( ( pred_attacker(tuple_client_B_in_2(X2))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X1))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) )
=> pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X1,name_skB)),name_Nb(X0)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
inference(rectify,[],[f165]) ).
fof(f165,axiom,
! [X103,X104,X105] :
( ( pred_attacker(tuple_client_B_in_2(X105))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X105,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X104))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X104,name_skB))) )
=> pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_tuple_2_get_0x30_bitstring(constr_adec(X104,name_skB)),name_Nb(X103)),constr_tuple_2_get_1_bitstring(constr_checksign(X105,constr_pkey(name_skS)))))) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f1299,plain,
~ spl1_15,
inference(avatar_contradiction_clause,[],[f1298]) ).
fof(f1298,plain,
( $false
| ~ spl1_15 ),
inference(subsumption_resolution,[],[f1297,f395]) ).
fof(f395,plain,
name_B != name_c,
inference(cnf_transformation,[],[f59]) ).
fof(f59,axiom,
name_B != name_c,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f1297,plain,
( name_B = name_c
| ~ spl1_15 ),
inference(subsumption_resolution,[],[f1169,f408]) ).
fof(f408,plain,
name_A != name_c,
inference(cnf_transformation,[],[f53]) ).
fof(f53,axiom,
name_A != name_c,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f1169,plain,
( name_A = name_c
| name_B = name_c
| ~ spl1_15 ),
inference(resolution,[],[f1117,f333]) ).
fof(f333,plain,
pred_attacker(name_c),
inference(cnf_transformation,[],[f150]) ).
fof(f150,axiom,
pred_attacker(name_c),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f1117,plain,
( ! [X0] :
( ~ pred_attacker(X0)
| name_A = X0
| name_B = X0 )
| ~ spl1_15 ),
inference(avatar_component_clause,[],[f1116]) ).
fof(f998,plain,
~ spl1_5,
inference(avatar_contradiction_clause,[],[f883]) ).
fof(f883,plain,
( $false
| ~ spl1_5 ),
inference(resolution,[],[f715,f332]) ).
fof(f332,plain,
pred_attacker(constr_CONST_0x30),
inference(cnf_transformation,[],[f144]) ).
fof(f144,axiom,
pred_attacker(constr_CONST_0x30),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f715,plain,
( ! [X2] : ~ pred_attacker(X2)
| ~ spl1_5 ),
inference(avatar_component_clause,[],[f714]) ).
fof(f719,plain,
( spl1_5
| spl1_6 ),
inference(avatar_split_clause,[],[f712,f717,f714]) ).
fof(f712,plain,
! [X2,X0,X1] :
( ~ pred_table(tuple_keys(X0,X1))
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(X0)
| ~ pred_attacker(X2) ),
inference(resolution,[],[f489,f479]) ).
fof(f479,plain,
! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f298]) ).
fof(f298,plain,
! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f297]) ).
fof(f297,plain,
! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f229]) ).
fof(f229,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
inference(rectify,[],[f103]) ).
fof(f103,axiom,
! [X33,X34] :
( ( pred_attacker(X34)
& pred_attacker(X33) )
=> pred_attacker(tuple_key_retrieval_server_in_1(X33,X34)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f489,plain,
! [X2,X0,X1] :
( ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
| ~ pred_table(tuple_keys(X0,X1))
| pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
inference(cnf_transformation,[],[f318]) ).
fof(f318,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
| ~ pred_table(tuple_keys(X0,X1)) ),
inference(flattening,[],[f317]) ).
fof(f317,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
| ~ pred_table(tuple_keys(X0,X1)) ),
inference(ennf_transformation,[],[f239]) ).
fof(f239,plain,
! [X0,X1,X2] :
( ( pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
& pred_table(tuple_keys(X0,X1)) )
=> pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
inference(rectify,[],[f167]) ).
fof(f167,axiom,
! [X110,X111,X112] :
( ( pred_attacker(tuple_key_retrieval_server_in_1(X112,X110))
& pred_table(tuple_keys(X110,X111)) )
=> pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X110,X111),name_skS))) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f665,plain,
~ spl1_4,
inference(avatar_contradiction_clause,[],[f616]) ).
fof(f616,plain,
( $false
| ~ spl1_4 ),
inference(resolution,[],[f615,f332]) ).
fof(f615,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl1_4 ),
inference(resolution,[],[f513,f434]) ).
fof(f434,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f256]) ).
fof(f256,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f185]) ).
fof(f185,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_5(X0)) ),
inference(rectify,[],[f120]) ).
fof(f120,axiom,
! [X60] :
( pred_attacker(X60)
=> pred_attacker(tuple_client_B_in_5(X60)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f513,plain,
( ! [X2] : ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ spl1_4 ),
inference(avatar_component_clause,[],[f512]) ).
fof(f512,plain,
( spl1_4
<=> ! [X2] : ~ pred_attacker(tuple_client_B_in_5(X2)) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_4])]) ).
fof(f614,plain,
~ spl1_3,
inference(avatar_contradiction_clause,[],[f565]) ).
fof(f565,plain,
( $false
| ~ spl1_3 ),
inference(resolution,[],[f564,f332]) ).
fof(f564,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl1_3 ),
inference(resolution,[],[f438,f510]) ).
fof(f510,plain,
( ! [X1] : ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ spl1_3 ),
inference(avatar_component_clause,[],[f509]) ).
fof(f438,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f260]) ).
fof(f260,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f189]) ).
fof(f189,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_3(X0)) ),
inference(rectify,[],[f122]) ).
fof(f122,axiom,
! [X62] :
( pred_attacker(X62)
=> pred_attacker(tuple_client_B_in_3(X62)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
fof(f563,plain,
~ spl1_2,
inference(avatar_contradiction_clause,[],[f516]) ).
fof(f516,plain,
( $false
| ~ spl1_2 ),
inference(resolution,[],[f515,f332]) ).
fof(f515,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl1_2 ),
inference(resolution,[],[f436,f507]) ).
fof(f507,plain,
( ! [X3] : ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ spl1_2 ),
inference(avatar_component_clause,[],[f506]) ).
fof(f506,plain,
( spl1_2
<=> ! [X3] : ~ pred_attacker(tuple_client_B_in_2(X3)) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_2])]) ).
fof(f514,plain,
( spl1_1
| spl1_2
| spl1_3
| spl1_4 ),
inference(avatar_split_clause,[],[f500,f512,f509,f506,f502]) ).
fof(f500,plain,
! [X2,X3,X1] :
( ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(subsumption_resolution,[],[f499,f455]) ).
fof(f499,plain,
! [X2,X3,X1] :
( ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(subsumption_resolution,[],[f498,f455]) ).
fof(f498,plain,
! [X2,X3,X1] :
( ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(subsumption_resolution,[],[f492,f455]) ).
fof(f492,plain,
! [X2,X3,X0,X1] :
( ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(cnf_transformation,[],[f324]) ).
fof(f324,plain,
! [X0,X1,X2,X3] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ),
inference(flattening,[],[f323]) ).
fof(f323,plain,
! [X0,X1,X2,X3] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) ),
inference(ennf_transformation,[],[f242]) ).
fof(f242,plain,
! [X0,X1,X2,X3] :
( ( pred_attacker(tuple_client_B_in_2(X3))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X1))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
& pred_attacker(tuple_client_B_in_5(X2))
& pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X2,name_skB)) )
=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(rectify,[],[f166]) ).
fof(f166,axiom,
! [X106,X107,X108,X109] :
( ( pred_attacker(tuple_client_B_in_2(X109))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X109,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X107))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X107,name_skB)))
& pred_attacker(tuple_client_B_in_5(X108))
& pred_eq_bitstring_bitstring(name_Nb(X106),constr_adec(X108,name_skB)) )
=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',unknown) ).
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.12/0.12 % Problem : SWW960+1 : TPTP v8.2.0. Released v7.4.0.
% 0.12/0.12 % Command : run_vampire %s %d SAT
% 0.12/0.34 % Computer : n006.cluster.edu
% 0.12/0.34 % Model : x86_64 x86_64
% 0.12/0.34 % CPU : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.12/0.34 % Memory : 8042.1875MB
% 0.12/0.34 % OS : Linux 3.10.0-693.el7.x86_64
% 0.12/0.34 % CPULimit : 300
% 0.12/0.34 % WCLimit : 300
% 0.12/0.34 % DateTime : Wed Jun 19 08:47:09 EDT 2024
% 0.19/0.34 % CPUTime :
% 0.19/0.36 This is a FOF_THM_RFO_SEQ problem
% 0.19/0.36 Running first-order model finding
% 0.19/0.36 Running /export/starexec/sandbox2/solver/bin/vampire --mode casc_sat -m 16384 --cores 7 -t 300 /export/starexec/sandbox2/benchmark/theBenchmark.p
% 0.21/0.44 % (20200)Running in auto input_syntax mode. Trying TPTP
% 0.21/0.44 % (20204)fmb+10_1:1_sil=256000:fmbss=23:fmbes=contour:newcnf=on:fmbsr=1.14:i=152523:nm=2:gsp=on:rp=on_0 on theBenchmark for (2999ds/152523Mi)
% 0.21/0.44 % (20200)Running in auto input_syntax mode. Trying TPTP
% 0.21/0.44 % (20201)fmb+10_1:1_sil=256000:i=98885:tgt=full:fmbsr=1.3:fmbss=10_0 on theBenchmark for (2999ds/98885Mi)
% 0.21/0.45 Detected minimum model sizes of [13]
% 0.21/0.45 Detected maximum model sizes of [max]
% 0.21/0.45 Detected minimum model sizes of [13]
% 0.21/0.45 Detected maximum model sizes of [max]
% 0.21/0.45 % (20200)Running in auto input_syntax mode. Trying TPTP
% 0.21/0.45 % (20205)ott+21_1:1_sil=4000:i=104:fsd=on:fd=off:newcnf=on_0 on theBenchmark for (2999ds/104Mi)
% 0.21/0.46 % (20200)Running in auto input_syntax mode. Trying TPTP
% 0.21/0.46 % (20207)ott-4_1:1_sil=4000:sp=reverse_arity:lcm=predicate:newcnf=on:i=115:bce=on:fd=off:fs=off:fsr=off_0 on theBenchmark for (2999ds/115Mi)
% 0.21/0.46 % (20200)Running in auto input_syntax mode. Trying TPTP
% 0.21/0.46 % (20206)ott+11_8:59_sil=16000:sp=occurrence:lsd=20:abs=on:i=146:aac=none:nm=16:fdi=10:rawr=on:nicw=on_0 on theBenchmark for (2999ds/146Mi)
% 0.21/0.46 TRYING [13]
% 0.21/0.48 % (20200)Running in auto input_syntax mode. Trying TPTP
% 0.21/0.48 % (20202)ott+10_10:1_add=off:afr=on:amm=off:anc=all:bd=off:bs=on:fsr=off:irw=on:lma=on:msp=off:nm=4:nwc=4.0:sac=on:sp=reverse_frequency:i=99418_0 on theBenchmark for (2999ds/99418Mi)
% 0.21/0.48 % (20200)Running in auto input_syntax mode. Trying TPTP
% 0.21/0.48 % (20203)fmb+10_1:1_sil=256000:fmbes=contour:i=214858:bce=on_0 on theBenchmark for (2999ds/214858Mi)
% 0.21/0.49 Detected minimum model sizes of [13]
% 0.21/0.49 Detected maximum model sizes of [max]
% 0.21/0.51 % (20205)First to succeed.
% 0.21/0.51 % (20205)Solution written to "/export/starexec/sandbox2/tmp/vampire-proof-20200"
% 0.21/0.51 TRYING [23]
% 0.21/0.51 % (20200)Running in auto input_syntax mode. Trying TPTP
% 0.21/0.51 % (20205)Refutation found. Thanks to Tanya!
% 0.21/0.51 % SZS status Theorem for theBenchmark
% 0.21/0.51 % SZS output start Proof for theBenchmark
% See solution above
% 0.21/0.51 % (20205)------------------------------
% 0.21/0.51 % (20205)Version: Vampire 4.9 (commit 18c118a85 on 2024-06-08 21:14:20 +0100)
% 0.21/0.51 % (20205)Linked with Z3 4.12.3.0 79bbbf76d0c123481c8ca05cd3a98939270074d3 z3-4.8.4-7980-g79bbbf76d
% 0.21/0.51 % (20205)Termination reason: Refutation
% 0.21/0.51
% 0.21/0.51 % (20205)Memory used [KB]: 1766
% 0.21/0.51 % (20205)Time elapsed: 0.080 s
% 0.21/0.51 % (20205)Instructions burned: 90 (million)
% 0.21/0.51 % (20205)------------------------------
% 0.21/0.51 % (20205)------------------------------
% 0.21/0.51 % (20200)Success in time 0.145 s
%------------------------------------------------------------------------------