TSTP Solution File: SWW963+1 by Otter---3.3

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : Otter---3.3
% Problem  : SWW963+1 : TPTP v8.1.0. Released v7.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : otter-tptp-script %s

% Computer : n010.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Wed Jul 27 13:23:14 EDT 2022

% Result   : Timeout 299.96s 300.09s
% Output   : None 
% Verified : 
% SZS Type : -

% Comments : 
%------------------------------------------------------------------------------
%----No solution output by system
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.07/0.12  % Problem  : SWW963+1 : TPTP v8.1.0. Released v7.4.0.
% 0.07/0.13  % Command  : otter-tptp-script %s
% 0.13/0.34  % Computer : n010.cluster.edu
% 0.13/0.34  % Model    : x86_64 x86_64
% 0.13/0.34  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.13/0.34  % Memory   : 8042.1875MB
% 0.13/0.34  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.13/0.34  % CPULimit : 300
% 0.13/0.34  % WCLimit  : 300
% 0.13/0.34  % DateTime : Wed Jul 27 02:42:25 EDT 2022
% 0.13/0.34  % CPUTime  : 
% 2.20/2.38  ----- Otter 3.3f, August 2004 -----
% 2.20/2.38  The process was started by sandbox2 on n010.cluster.edu,
% 2.20/2.38  Wed Jul 27 02:42:25 2022
% 2.20/2.38  The command was "./otter".  The process ID is 29154.
% 2.20/2.38  
% 2.20/2.38  set(prolog_style_variables).
% 2.20/2.38  set(auto).
% 2.20/2.38     dependent: set(auto1).
% 2.20/2.38     dependent: set(process_input).
% 2.20/2.38     dependent: clear(print_kept).
% 2.20/2.38     dependent: clear(print_new_demod).
% 2.20/2.38     dependent: clear(print_back_demod).
% 2.20/2.38     dependent: clear(print_back_sub).
% 2.20/2.38     dependent: set(control_memory).
% 2.20/2.38     dependent: assign(max_mem, 12000).
% 2.20/2.38     dependent: assign(pick_given_ratio, 4).
% 2.20/2.38     dependent: assign(stats_level, 1).
% 2.20/2.38     dependent: assign(max_seconds, 10800).
% 2.20/2.38  clear(print_given).
% 2.20/2.38  
% 2.20/2.38  formula_list(usable).
% 2.20/2.38  all A (A=A).
% 2.20/2.38  constr_CONST_0x30!=constr_CONST_1.
% 2.20/2.38  constr_CONST_0x30!=constr_CONST_2.
% 2.20/2.38  constr_CONST_0x30!=constr_CONST_3.
% 2.20/2.38  constr_CONST_0x30!=constr_CONST_4.
% 2.20/2.38  constr_CONST_0x30!=name_A.
% 2.20/2.38  constr_CONST_0x30!=name_B.
% 2.20/2.38  constr_CONST_0x30!=name_I.
% 2.20/2.38  constr_CONST_0x30!=name_c.
% 2.20/2.38  constr_CONST_0x30!=name_objective.
% 2.20/2.38  constr_CONST_0x30!=name_skA.
% 2.20/2.38  constr_CONST_0x30!=name_skB.
% 2.20/2.38  constr_CONST_0x30!=name_skS.
% 2.20/2.38  constr_CONST_1!=constr_CONST_2.
% 2.20/2.38  constr_CONST_1!=constr_CONST_3.
% 2.20/2.38  constr_CONST_1!=constr_CONST_4.
% 2.20/2.38  constr_CONST_1!=name_A.
% 2.20/2.38  constr_CONST_1!=name_B.
% 2.20/2.38  constr_CONST_1!=name_I.
% 2.20/2.38  constr_CONST_1!=name_c.
% 2.20/2.38  constr_CONST_1!=name_objective.
% 2.20/2.38  constr_CONST_1!=name_skA.
% 2.20/2.38  constr_CONST_1!=name_skB.
% 2.20/2.38  constr_CONST_1!=name_skS.
% 2.20/2.38  constr_CONST_2!=constr_CONST_3.
% 2.20/2.38  constr_CONST_2!=constr_CONST_4.
% 2.20/2.38  constr_CONST_2!=name_A.
% 2.20/2.38  constr_CONST_2!=name_B.
% 2.20/2.38  constr_CONST_2!=name_I.
% 2.20/2.38  constr_CONST_2!=name_c.
% 2.20/2.38  constr_CONST_2!=name_objective.
% 2.20/2.38  constr_CONST_2!=name_skA.
% 2.20/2.38  constr_CONST_2!=name_skB.
% 2.20/2.38  constr_CONST_2!=name_skS.
% 2.20/2.38  constr_CONST_3!=constr_CONST_4.
% 2.20/2.38  constr_CONST_3!=name_A.
% 2.20/2.38  constr_CONST_3!=name_B.
% 2.20/2.38  constr_CONST_3!=name_I.
% 2.20/2.38  constr_CONST_3!=name_c.
% 2.20/2.38  constr_CONST_3!=name_objective.
% 2.20/2.38  constr_CONST_3!=name_skA.
% 2.20/2.38  constr_CONST_3!=name_skB.
% 2.20/2.38  constr_CONST_3!=name_skS.
% 2.20/2.38  constr_CONST_4!=name_A.
% 2.20/2.38  constr_CONST_4!=name_B.
% 2.20/2.38  constr_CONST_4!=name_I.
% 2.20/2.38  constr_CONST_4!=name_c.
% 2.20/2.38  constr_CONST_4!=name_objective.
% 2.20/2.38  constr_CONST_4!=name_skA.
% 2.20/2.38  constr_CONST_4!=name_skB.
% 2.20/2.38  constr_CONST_4!=name_skS.
% 2.20/2.38  name_A!=name_B.
% 2.20/2.38  name_A!=name_I.
% 2.20/2.38  name_A!=name_c.
% 2.20/2.38  name_A!=name_objective.
% 2.20/2.38  name_A!=name_skA.
% 2.20/2.38  name_A!=name_skB.
% 2.20/2.38  name_A!=name_skS.
% 2.20/2.38  name_B!=name_I.
% 2.20/2.38  name_B!=name_c.
% 2.20/2.38  name_B!=name_objective.
% 2.20/2.38  name_B!=name_skA.
% 2.20/2.38  name_B!=name_skB.
% 2.20/2.38  name_B!=name_skS.
% 2.20/2.38  name_I!=name_c.
% 2.20/2.38  name_I!=name_objective.
% 2.20/2.38  name_I!=name_skA.
% 2.20/2.38  name_I!=name_skB.
% 2.20/2.38  name_I!=name_skS.
% 2.20/2.38  name_c!=name_objective.
% 2.20/2.38  name_c!=name_skA.
% 2.20/2.38  name_c!=name_skB.
% 2.20/2.38  name_c!=name_skS.
% 2.20/2.38  name_objective!=name_skA.
% 2.20/2.38  name_objective!=name_skB.
% 2.20/2.38  name_objective!=name_skS.
% 2.20/2.38  name_skA!=name_skB.
% 2.20/2.38  name_skA!=name_skS.
% 2.20/2.38  name_skB!=name_skS.
% 2.20/2.38  all VAR_K_48 VAR_M_47 (constr_dec(constr_enc(VAR_M_47,VAR_K_48),VAR_K_48)=VAR_M_47).
% 2.20/2.38  all VAR_K_46 VAR_M_45 (constr_getmess(constr_sign(VAR_M_45,VAR_K_46))=VAR_M_45).
% 2.20/2.38  all VAR_K_44 VAR_M_0X30 (constr_checksign(constr_sign(VAR_M_0X30,VAR_K_44),constr_pkey(VAR_K_44))=VAR_M_0X30).
% 2.20/2.38  all VAR_K_43 VAR_X1_39 VAR_X2_40X30 VAR_X3_41 VAR_X4_42 (constr_ecb_dec_4(constr_ecb_enc_4(VAR_X1_39,VAR_X2_40X30,VAR_X3_41,VAR_X4_42,constr_pkey(VAR_K_43)),VAR_K_43)=tuple_4(VAR_X1_39,VAR_X2_40X30,VAR_X3_41,VAR_X4_42)).
% 2.20/2.38  all VAR_K_38 VAR_X1_35 VAR_X2_36 VAR_X3_37 (constr_ecb_dec_3(constr_ecb_enc_3(VAR_X1_35,VAR_X2_36,VAR_X3_37,constr_pkey(VAR_K_38)),VAR_K_38)=tuple_3(VAR_X1_35,VAR_X2_36,VAR_X3_37)).
% 2.20/2.38  all VAR_K_34 VAR_X1_32 VAR_X2_33 (constr_ecb_dec_2(constr_ecb_enc_2(VAR_X1_32,VAR_X2_33,constr_pkey(VAR_K_34)),VAR_K_34)=tuple_2(VAR_X1_32,VAR_X2_33)).
% 2.20/2.38  all VAR_K_31 VAR_X1_30X30 (constr_ecb_dec_1(constr_ecb_enc_1(VAR_X1_30X30,constr_pkey(VAR_K_31)),VAR_K_31)=VAR_X1_30X30).
% 2.20/2.38  all VAR_K_29 VAR_X1_26 VAR_X2_27 VAR_X3_28 VAR_X4_0X30 (constr_ecb_enc_4(VAR_X1_26,VAR_X2_27,VAR_X3_28,VAR_X4_0X30,VAR_K_29)=tuple_4(constr_ecb_enc_1(VAR_X1_26,VAR_K_29),constr_ecb_enc_1(VAR_X2_27,VAR_K_29),constr_ecb_enc_1(VAR_X3_28,VAR_K_29),constr_ecb_enc_1(VAR_X4_0X30,VAR_K_29))).
% 2.20/2.38  all VAR_K_25 VAR_X1_23 VAR_X2_24 VAR_X3_0X30 (constr_ecb_enc_3(VAR_X1_23,VAR_X2_24,VAR_X3_0X30,VAR_K_25)=tuple_3(constr_ecb_enc_1(VAR_X1_23,VAR_K_25),constr_ecb_enc_1(VAR_X2_24,VAR_K_25),constr_ecb_enc_1(VAR_X3_0X30,VAR_K_25))).
% 2.20/2.38  all VAR_K_0X30 VAR_X1_21 VAR_X2_22 (constr_ecb_enc_2(VAR_X1_21,VAR_X2_22,VAR_K_0X30)=tuple_2(constr_ecb_enc_1(VAR_X1_21,VAR_K_0X30),constr_ecb_enc_1(VAR_X2_22,VAR_K_0X30))).
% 2.20/2.38  all VAR_X0X30_18 VAR_X1_19 VAR_X2_20X30 (constr_tuple_3_get_1_bitstring(tuple_3(VAR_X0X30_18,VAR_X1_19,VAR_X2_20X30))=VAR_X1_19).
% 2.20/2.38  all VAR_X0X30_16 VAR_X1_17 (constr_tuple_2_get_1_bitstring(tuple_2(VAR_X0X30_16,VAR_X1_17))=VAR_X1_17).
% 2.20/2.38  all VAR_X0X30_14 VAR_X1_15 (constr_tuple_2_get_0x30_bitstring(tuple_2(VAR_X0X30_14,VAR_X1_15))=VAR_X0X30_14).
% 2.20/2.38  all VAR_X0X30_11 VAR_X1_12 VAR_X2_13 (constr_tuple_3_get_2(tuple_3(VAR_X0X30_11,VAR_X1_12,VAR_X2_13))=VAR_X2_13).
% 2.20/2.38  all VAR_X0X30_9 VAR_X1_10X30 VAR_X2_0X30 (constr_tuple_3_get_0x30(tuple_3(VAR_X0X30_9,VAR_X1_10X30,VAR_X2_0X30))=VAR_X0X30_9).
% 2.20/2.38  all VAR_X0X30_7 VAR_X1_8 (constr_tuple_2_get_1(tuple_2(VAR_X0X30_7,VAR_X1_8))=VAR_X1_8).
% 2.20/2.38  all VAR_X0X30_0X30 VAR_X1_0X30 (constr_tuple_2_get_0x30(tuple_2(VAR_X0X30_0X30,VAR_X1_0X30))=VAR_X0X30_0X30).
% 2.20/2.38  all VAR_X_65 VAR_Y_66 pred_e_q_bitstring_bitstring(VAR_X_65,VAR_Y_66).
% 2.20/2.38  all VAR_V_72 (pred_attacker(VAR_V_72)->pred_attacker(constr_tuple_3_get_2(VAR_V_72))).
% 2.20/2.38  all VAR_V_74 (pred_attacker(VAR_V_74)->pred_attacker(constr_tuple_3_get_1_bitstring(VAR_V_74))).
% 2.20/2.38  all VAR_V_76 (pred_attacker(VAR_V_76)->pred_attacker(constr_tuple_3_get_0x30(VAR_V_76))).
% 2.20/2.38  all VAR_V_78 (pred_attacker(VAR_V_78)->pred_attacker(constr_tuple_2_get_1_bitstring(VAR_V_78))).
% 2.20/2.38  all VAR_V_80X30 (pred_attacker(VAR_V_80X30)->pred_attacker(constr_tuple_2_get_1(VAR_V_80X30))).
% 2.20/2.38  all VAR_V_82 (pred_attacker(VAR_V_82)->pred_attacker(constr_tuple_2_get_0x30_bitstring(VAR_V_82))).
% 2.20/2.38  all VAR_V_84 (pred_attacker(VAR_V_84)->pred_attacker(constr_tuple_2_get_0x30(VAR_V_84))).
% 2.20/2.38  pred_attacker(tuple_true).
% 2.20/2.38  all VAR_V_87 VAR_V_88 (pred_attacker(VAR_V_87)&pred_attacker(VAR_V_88)->pred_attacker(constr_sign(VAR_V_87,VAR_V_88))).
% 2.20/2.38  all VAR_V_90X30 (pred_attacker(VAR_V_90X30)->pred_attacker(constr_pkey(VAR_V_90X30))).
% 2.20/2.38  all VAR_V_92 (pred_attacker(VAR_V_92)->pred_attacker(tuple_out_3(VAR_V_92))).
% 2.20/2.38  all VAR_V_95 (pred_attacker(tuple_out_3(VAR_V_95))->pred_attacker(VAR_V_95)).
% 2.20/2.38  all VAR_V_98 (pred_attacker(VAR_V_98)->pred_attacker(tuple_out_2(VAR_V_98))).
% 2.20/2.38  all VAR_V_10X301 (pred_attacker(tuple_out_2(VAR_V_10X301))->pred_attacker(VAR_V_10X301)).
% 2.20/2.38  all VAR_V_10X304 (pred_attacker(VAR_V_10X304)->pred_attacker(tuple_out_1(VAR_V_10X304))).
% 2.20/2.38  all VAR_V_10X307 (pred_attacker(tuple_out_1(VAR_V_10X307))->pred_attacker(VAR_V_10X307)).
% 2.20/2.38  all VAR_V_111 (pred_attacker(VAR_V_111)->pred_attacker(tuple_key_retrieval_server_out_2(VAR_V_111))).
% 2.20/2.38  all VAR_V_114 (pred_attacker(tuple_key_retrieval_server_out_2(VAR_V_114))->pred_attacker(VAR_V_114)).
% 2.20/2.38  all VAR_V_118 VAR_V_119 (pred_attacker(VAR_V_118)&pred_attacker(VAR_V_119)->pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_118,VAR_V_119))).
% 2.20/2.38  all VAR_V_126 VAR_V_127 (pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_126,VAR_V_127))->pred_attacker(VAR_V_126)).
% 2.20/2.38  all VAR_V_129 VAR_V_130X30 (pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_129,VAR_V_130X30))->pred_attacker(VAR_V_130X30)).
% 2.20/2.38  all VAR_V_134 VAR_V_135 (pred_attacker(VAR_V_134)&pred_attacker(VAR_V_135)->pred_attacker(tuple_key_register_server_in_1(VAR_V_134,VAR_V_135))).
% 2.20/2.38  all VAR_V_142 VAR_V_143 (pred_attacker(tuple_key_register_server_in_1(VAR_V_142,VAR_V_143))->pred_attacker(VAR_V_142)).
% 2.20/2.38  all VAR_V_145 VAR_V_146 (pred_attacker(tuple_key_register_server_in_1(VAR_V_145,VAR_V_146))->pred_attacker(VAR_V_146)).
% 2.20/2.38  all VAR_V_149 (pred_attacker(VAR_V_149)->pred_attacker(constr_getmess(VAR_V_149))).
% 2.20/2.38  pred_attacker(tuple_false).
% 2.20/2.38  all VAR_V_152 VAR_V_153 (pred_attacker(VAR_V_152)&pred_attacker(VAR_V_153)->pred_attacker(constr_enc(VAR_V_152,VAR_V_153))).
% 2.20/2.38  all VAR_V_159 VAR_V_160X30 VAR_V_161 VAR_V_162 VAR_V_163 (pred_attacker(VAR_V_159)&pred_attacker(VAR_V_160X30)&pred_attacker(VAR_V_161)&pred_attacker(VAR_V_162)&pred_attacker(VAR_V_163)->pred_attacker(constr_ecb_enc_4(VAR_V_159,VAR_V_160X30,VAR_V_161,VAR_V_162,VAR_V_163))).
% 2.20/2.38  all VAR_V_168 VAR_V_169 VAR_V_170X30 VAR_V_171 (pred_attacker(VAR_V_168)&pred_attacker(VAR_V_169)&pred_attacker(VAR_V_170X30)&pred_attacker(VAR_V_171)->pred_attacker(constr_ecb_enc_3(VAR_V_168,VAR_V_169,VAR_V_170X30,VAR_V_171))).
% 2.20/2.38  all VAR_V_175 VAR_V_176 VAR_V_177 (pred_attacker(VAR_V_175)&pred_attacker(VAR_V_176)&pred_attacker(VAR_V_177)->pred_attacker(constr_ecb_enc_2(VAR_V_175,VAR_V_176,VAR_V_177))).
% 2.20/2.38  all VAR_V_180X30 VAR_V_181 (pred_attacker(VAR_V_180X30)&pred_attacker(VAR_V_181)->pred_attacker(constr_ecb_enc_1(VAR_V_180X30,VAR_V_181))).
% 2.20/2.38  all VAR_V_184 VAR_V_185 (pred_attacker(VAR_V_184)&pred_attacker(VAR_V_185)->pred_attacker(constr_ecb_dec_4(VAR_V_184,VAR_V_185))).
% 2.20/2.38  all VAR_V_188 VAR_V_189 (pred_attacker(VAR_V_188)&pred_attacker(VAR_V_189)->pred_attacker(constr_ecb_dec_3(VAR_V_188,VAR_V_189))).
% 2.20/2.38  all VAR_V_192 VAR_V_193 (pred_attacker(VAR_V_192)&pred_attacker(VAR_V_193)->pred_attacker(constr_ecb_dec_2(VAR_V_192,VAR_V_193))).
% 2.20/2.38  all VAR_V_196 VAR_V_197 (pred_attacker(VAR_V_196)&pred_attacker(VAR_V_197)->pred_attacker(constr_ecb_dec_1(VAR_V_196,VAR_V_197))).
% 2.20/2.38  all VAR_V_20X300X30 VAR_V_20X301 (pred_attacker(VAR_V_20X300X30)&pred_attacker(VAR_V_20X301)->pred_attacker(constr_dec(VAR_V_20X300X30,VAR_V_20X301))).
% 2.20/2.38  all VAR_V_20X303 (pred_attacker(VAR_V_20X303)->pred_attacker(tuple_client_B_out_6(VAR_V_20X303))).
% 2.20/2.38  all VAR_V_20X306 (pred_attacker(tuple_client_B_out_6(VAR_V_20X306))->pred_attacker(VAR_V_20X306)).
% 2.20/2.38  all VAR_V_20X309 (pred_attacker(VAR_V_20X309)->pred_attacker(tuple_client_B_out_4(VAR_V_20X309))).
% 2.20/2.38  all VAR_V_212 (pred_attacker(tuple_client_B_out_4(VAR_V_212))->pred_attacker(VAR_V_212)).
% 2.20/2.38  all VAR_V_216 VAR_V_217 (pred_attacker(VAR_V_216)&pred_attacker(VAR_V_217)->pred_attacker(tuple_client_B_out_1(VAR_V_216,VAR_V_217))).
% 2.20/2.38  all VAR_V_224 VAR_V_225 (pred_attacker(tuple_client_B_out_1(VAR_V_224,VAR_V_225))->pred_attacker(VAR_V_224)).
% 2.20/2.38  all VAR_V_227 VAR_V_228 (pred_attacker(tuple_client_B_out_1(VAR_V_227,VAR_V_228))->pred_attacker(VAR_V_228)).
% 2.20/2.38  all VAR_V_231 (pred_attacker(VAR_V_231)->pred_attacker(tuple_client_B_in_5(VAR_V_231))).
% 2.20/2.38  all VAR_V_234 (pred_attacker(tuple_client_B_in_5(VAR_V_234))->pred_attacker(VAR_V_234)).
% 2.20/2.38  all VAR_V_237 (pred_attacker(VAR_V_237)->pred_attacker(tuple_client_B_in_3(VAR_V_237))).
% 2.20/2.38  all VAR_V_240X30 (pred_attacker(tuple_client_B_in_3(VAR_V_240X30))->pred_attacker(VAR_V_240X30)).
% 2.20/2.38  all VAR_V_243 (pred_attacker(VAR_V_243)->pred_attacker(tuple_client_B_in_2(VAR_V_243))).
% 2.20/2.38  all VAR_V_246 (pred_attacker(tuple_client_B_in_2(VAR_V_246))->pred_attacker(VAR_V_246)).
% 2.20/2.38  all VAR_V_249 (pred_attacker(VAR_V_249)->pred_attacker(tuple_client_A_out_5(VAR_V_249))).
% 2.20/2.38  all VAR_V_252 (pred_attacker(tuple_client_A_out_5(VAR_V_252))->pred_attacker(VAR_V_252)).
% 2.20/2.38  all VAR_V_255 (pred_attacker(VAR_V_255)->pred_attacker(tuple_client_A_out_3(VAR_V_255))).
% 2.20/2.38  all VAR_V_258 (pred_attacker(tuple_client_A_out_3(VAR_V_258))->pred_attacker(VAR_V_258)).
% 2.20/2.38  all VAR_V_262 VAR_V_263 (pred_attacker(VAR_V_262)&pred_attacker(VAR_V_263)->pred_attacker(tuple_client_A_out_1(VAR_V_262,VAR_V_263))).
% 2.20/2.38  all VAR_V_270X30 VAR_V_271 (pred_attacker(tuple_client_A_out_1(VAR_V_270X30,VAR_V_271))->pred_attacker(VAR_V_270X30)).
% 2.20/2.38  all VAR_V_273 VAR_V_274 (pred_attacker(tuple_client_A_out_1(VAR_V_273,VAR_V_274))->pred_attacker(VAR_V_274)).
% 2.20/2.38  all VAR_V_277 (pred_attacker(VAR_V_277)->pred_attacker(tuple_client_A_in_4(VAR_V_277))).
% 2.20/2.38  all VAR_V_280X30 (pred_attacker(tuple_client_A_in_4(VAR_V_280X30))->pred_attacker(VAR_V_280X30)).
% 2.20/2.38  all VAR_V_283 (pred_attacker(VAR_V_283)->pred_attacker(tuple_client_A_in_2(VAR_V_283))).
% 2.20/2.38  all VAR_V_286 (pred_attacker(tuple_client_A_in_2(VAR_V_286))->pred_attacker(VAR_V_286)).
% 2.20/2.38  all VAR_V_290X30 VAR_V_291 (pred_attacker(VAR_V_290X30)&pred_attacker(VAR_V_291)->pred_attacker(constr_checksign(VAR_V_290X30,VAR_V_291))).
% 2.20/2.38  pred_attacker(constr_CONST_4).
% 2.20/2.38  pred_attacker(constr_CONST_3).
% 2.20/2.38  pred_attacker(constr_CONST_2).
% 2.20/2.38  pred_attacker(constr_CONST_1).
% 2.20/2.38  pred_attacker(constr_CONST_0x30).
% 2.20/2.38  all VAR_V_30X300X30 VAR_V_30X301 VAR_V_30X302 VAR_V_30X303 (pred_attacker(VAR_V_30X300X30)&pred_attacker(VAR_V_30X301)&pred_attacker(VAR_V_30X302)&pred_attacker(VAR_V_30X303)->pred_attacker(tuple_4(VAR_V_30X300X30,VAR_V_30X301,VAR_V_30X302,VAR_V_30X303))).
% 2.20/2.38  all VAR_V_324 VAR_V_325 VAR_V_326 VAR_V_327 (pred_attacker(tuple_4(VAR_V_324,VAR_V_325,VAR_V_326,VAR_V_327))->pred_attacker(VAR_V_324)).
% 2.20/2.38  all VAR_V_329 VAR_V_330X30 VAR_V_331 VAR_V_332 (pred_attacker(tuple_4(VAR_V_329,VAR_V_330X30,VAR_V_331,VAR_V_332))->pred_attacker(VAR_V_330X30)).
% 2.20/2.38  all VAR_V_334 VAR_V_335 VAR_V_336 VAR_V_337 (pred_attacker(tuple_4(VAR_V_334,VAR_V_335,VAR_V_336,VAR_V_337))->pred_attacker(VAR_V_336)).
% 2.20/2.38  all VAR_V_339 VAR_V_340X30 VAR_V_341 VAR_V_342 (pred_attacker(tuple_4(VAR_V_339,VAR_V_340X30,VAR_V_341,VAR_V_342))->pred_attacker(VAR_V_342)).
% 2.20/2.38  all VAR_V_347 VAR_V_348 VAR_V_349 (pred_attacker(VAR_V_347)&pred_attacker(VAR_V_348)&pred_attacker(VAR_V_349)->pred_attacker(tuple_3(VAR_V_347,VAR_V_348,VAR_V_349))).
% 2.20/2.38  all VAR_V_362 VAR_V_363 VAR_V_364 (pred_attacker(tuple_3(VAR_V_362,VAR_V_363,VAR_V_364))->pred_attacker(VAR_V_362)).
% 2.20/2.38  all VAR_V_366 VAR_V_367 VAR_V_368 (pred_attacker(tuple_3(VAR_V_366,VAR_V_367,VAR_V_368))->pred_attacker(VAR_V_367)).
% 2.20/2.38  all VAR_V_370X30 VAR_V_371 VAR_V_372 (pred_attacker(tuple_3(VAR_V_370X30,VAR_V_371,VAR_V_372))->pred_attacker(VAR_V_372)).
% 2.20/2.38  all VAR_V_376 VAR_V_377 (pred_attacker(VAR_V_376)&pred_attacker(VAR_V_377)->pred_attacker(tuple_2(VAR_V_376,VAR_V_377))).
% 2.20/2.38  all VAR_V_384 VAR_V_385 (pred_attacker(tuple_2(VAR_V_384,VAR_V_385))->pred_attacker(VAR_V_384)).
% 2.20/2.38  all VAR_V_387 VAR_V_388 (pred_attacker(tuple_2(VAR_V_387,VAR_V_388))->pred_attacker(VAR_V_388)).
% 2.20/2.38  all VAR_V_390X30 VAR_V_391 (pred_mess(VAR_V_391,VAR_V_390X30)&pred_attacker(VAR_V_391)->pred_attacker(VAR_V_390X30)).
% 2.20/2.38  all VAR_V_392 VAR_V_393 (pred_attacker(VAR_V_393)&pred_attacker(VAR_V_392)->pred_mess(VAR_V_393,VAR_V_392)).
% 2.20/2.38  pred_attacker(name_c).
% 2.20/2.38  pred_attacker(name_I).
% 2.20/2.38  pred_attacker(name_B).
% 2.20/2.38  pred_attacker(name_A).
% 2.20/2.38  all VAR_V_395 pred_e_qual(VAR_V_395,VAR_V_395).
% 2.20/2.38  all VAR_V_396 pred_attacker(name_new0x2Dname(VAR_V_396)).
% 2.20/2.38  pred_table(tuple_keys(name_A,constr_pkey(name_skA))).
% 2.20/2.38  pred_table(tuple_keys(name_B,constr_pkey(name_skB))).
% 2.20/2.38  pred_attacker(tuple_out_1(constr_pkey(name_skA))).
% 2.20/2.38  pred_attacker(tuple_out_2(constr_pkey(name_skB))).
% 2.20/2.38  pred_attacker(tuple_out_3(constr_pkey(name_skS))).
% 2.20/2.38  pred_attacker(tuple_client_A_out_1(name_A,name_I)).
% 2.20/2.38  all VAR_0X40SID_512 VAR_SIGN_I_PKI_511 (pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_I_PKI_511,constr_pkey(name_skS))))&pred_attacker(tuple_client_A_in_2(VAR_SIGN_I_PKI_511))->pred_attacker(tuple_client_A_out_3(constr_ecb_enc_2(name_Na(VAR_0X40SID_512),name_A,constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_I_PKI_511,constr_pkey(name_skS))))))).
% 2.20/2.38  all VAR_0X40SID_577 VAR_ECB_ENC_NA_NI_I_576 VAR_SIGN_I_PKI_578 (pred_e_q_bitstring_bitstring(name_I,constr_tuple_3_get_2(constr_ecb_dec_3(VAR_ECB_ENC_NA_NI_I_576,name_skA)))&pred_e_q_bitstring_bitstring(name_Na(VAR_0X40SID_577),constr_tuple_3_get_0x30(constr_ecb_dec_3(VAR_ECB_ENC_NA_NI_I_576,name_skA)))&pred_attacker(tuple_client_A_in_4(VAR_ECB_ENC_NA_NI_I_576))&pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_I_PKI_578,constr_pkey(name_skS))))&pred_attacker(tuple_client_A_in_2(VAR_SIGN_I_PKI_578))->pred_attacker(tuple_client_A_out_5(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(VAR_ECB_ENC_NA_NI_I_576,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_I_PKI_578,constr_pkey(name_skS))))))).
% 2.20/2.38  pred_attacker(tuple_client_B_out_1(name_B,name_A)).
% 2.20/2.38  all VAR_0X40SID_687 VAR_ECB_ENC_NA_A_685 VAR_SIGN_A_PKA_686 (pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(VAR_ECB_ENC_NA_A_685,name_skB)))&pred_attacker(tuple_client_B_in_3(VAR_ECB_ENC_NA_A_685))&pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_A_PKA_686,constr_pkey(name_skS))))&pred_attacker(tuple_client_B_in_2(VAR_SIGN_A_PKA_686))->pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(VAR_ECB_ENC_NA_A_685,name_skB)),name_Nb(VAR_0X40SID_687),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_A_PKA_686,constr_pkey(name_skS))))))).
% 2.20/2.38  all VAR_0X40SID_717 VAR_ECB_ENC_NA_A_719 VAR_ECB_ENC_NB_718 VAR_SIGN_A_PKA_720X30 (pred_e_q_bitstring_bitstring(name_Nb(VAR_0X40SID_717),constr_ecb_dec_1(VAR_ECB_ENC_NB_718,name_skB))&pred_attacker(tuple_client_B_in_5(VAR_ECB_ENC_NB_718))&pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(VAR_ECB_ENC_NA_A_719,name_skB)))&pred_attacker(tuple_client_B_in_3(VAR_ECB_ENC_NA_A_719))&pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_A_PKA_720X30,constr_pkey(name_skS))))&pred_attacker(tuple_client_B_in_2(VAR_SIGN_A_PKA_720X30))->pred_attacker(tuple_client_B_out_6(name_objective))).
% 2.20/2.38  all VAR_DST_759 VAR_PKDST_760X30 VAR_SRC_761 (pred_table(tuple_keys(VAR_DST_759,VAR_PKDST_760X30))&pred_attacker(tuple_key_retrieval_server_in_1(VAR_SRC_761,VAR_DST_759))->pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(VAR_DST_759,VAR_PKDST_760X30),name_skS)))).
% 2.20/2.38  all VAR_HOST_813 VAR_PK_814 (VAR_HOST_813!=name_B&VAR_HOST_813!=name_A&pred_attacker(tuple_key_register_server_in_1(VAR_HOST_813,VAR_PK_814))->pred_table(tuple_keys(VAR_HOST_813,VAR_PK_814))).
% 2.20/2.38  -pred_attacker(name_objective).
% 2.20/2.38  end_of_list.
% 2.20/2.38  
% 2.20/2.38  -------> usable clausifies to:
% 2.20/2.38  
% 2.20/2.38  list(usable).
% 2.20/2.38  0 [] A=A.
% 2.20/2.38  0 [] constr_CONST_0x30!=constr_CONST_1.
% 2.20/2.38  0 [] constr_CONST_0x30!=constr_CONST_2.
% 2.20/2.38  0 [] constr_CONST_0x30!=constr_CONST_3.
% 2.20/2.38  0 [] constr_CONST_0x30!=constr_CONST_4.
% 2.20/2.38  0 [] constr_CONST_0x30!=name_A.
% 2.20/2.38  0 [] constr_CONST_0x30!=name_B.
% 2.20/2.38  0 [] constr_CONST_0x30!=name_I.
% 2.20/2.38  0 [] constr_CONST_0x30!=name_c.
% 2.20/2.38  0 [] constr_CONST_0x30!=name_objective.
% 2.20/2.38  0 [] constr_CONST_0x30!=name_skA.
% 2.20/2.38  0 [] constr_CONST_0x30!=name_skB.
% 2.20/2.38  0 [] constr_CONST_0x30!=name_skS.
% 2.20/2.38  0 [] constr_CONST_1!=constr_CONST_2.
% 2.20/2.38  0 [] constr_CONST_1!=constr_CONST_3.
% 2.20/2.38  0 [] constr_CONST_1!=constr_CONST_4.
% 2.20/2.38  0 [] constr_CONST_1!=name_A.
% 2.20/2.38  0 [] constr_CONST_1!=name_B.
% 2.20/2.38  0 [] constr_CONST_1!=name_I.
% 2.20/2.38  0 [] constr_CONST_1!=name_c.
% 2.20/2.38  0 [] constr_CONST_1!=name_objective.
% 2.20/2.38  0 [] constr_CONST_1!=name_skA.
% 2.20/2.38  0 [] constr_CONST_1!=name_skB.
% 2.20/2.38  0 [] constr_CONST_1!=name_skS.
% 2.20/2.38  0 [] constr_CONST_2!=constr_CONST_3.
% 2.20/2.38  0 [] constr_CONST_2!=constr_CONST_4.
% 2.20/2.38  0 [] constr_CONST_2!=name_A.
% 2.20/2.38  0 [] constr_CONST_2!=name_B.
% 2.20/2.38  0 [] constr_CONST_2!=name_I.
% 2.20/2.38  0 [] constr_CONST_2!=name_c.
% 2.20/2.38  0 [] constr_CONST_2!=name_objective.
% 2.20/2.38  0 [] constr_CONST_2!=name_skA.
% 2.20/2.38  0 [] constr_CONST_2!=name_skB.
% 2.20/2.38  0 [] constr_CONST_2!=name_skS.
% 2.20/2.38  0 [] constr_CONST_3!=constr_CONST_4.
% 2.20/2.38  0 [] constr_CONST_3!=name_A.
% 2.20/2.38  0 [] constr_CONST_3!=name_B.
% 2.20/2.38  0 [] constr_CONST_3!=name_I.
% 2.20/2.38  0 [] constr_CONST_3!=name_c.
% 2.20/2.38  0 [] constr_CONST_3!=name_objective.
% 2.20/2.38  0 [] constr_CONST_3!=name_skA.
% 2.20/2.38  0 [] constr_CONST_3!=name_skB.
% 2.20/2.38  0 [] constr_CONST_3!=name_skS.
% 2.20/2.38  0 [] constr_CONST_4!=name_A.
% 2.20/2.38  0 [] constr_CONST_4!=name_B.
% 2.20/2.38  0 [] constr_CONST_4!=name_I.
% 2.20/2.38  0 [] constr_CONST_4!=name_c.
% 2.20/2.38  0 [] constr_CONST_4!=name_objective.
% 2.20/2.38  0 [] constr_CONST_4!=name_skA.
% 2.20/2.38  0 [] constr_CONST_4!=name_skB.
% 2.20/2.38  0 [] constr_CONST_4!=name_skS.
% 2.20/2.38  0 [] name_A!=name_B.
% 2.20/2.38  0 [] name_A!=name_I.
% 2.20/2.38  0 [] name_A!=name_c.
% 2.20/2.38  0 [] name_A!=name_objective.
% 2.20/2.38  0 [] name_A!=name_skA.
% 2.20/2.38  0 [] name_A!=name_skB.
% 2.20/2.38  0 [] name_A!=name_skS.
% 2.20/2.38  0 [] name_B!=name_I.
% 2.20/2.38  0 [] name_B!=name_c.
% 2.20/2.38  0 [] name_B!=name_objective.
% 2.20/2.38  0 [] name_B!=name_skA.
% 2.20/2.38  0 [] name_B!=name_skB.
% 2.20/2.38  0 [] name_B!=name_skS.
% 2.20/2.38  0 [] name_I!=name_c.
% 2.20/2.38  0 [] name_I!=name_objective.
% 2.20/2.38  0 [] name_I!=name_skA.
% 2.20/2.38  0 [] name_I!=name_skB.
% 2.20/2.38  0 [] name_I!=name_skS.
% 2.20/2.38  0 [] name_c!=name_objective.
% 2.20/2.38  0 [] name_c!=name_skA.
% 2.20/2.38  0 [] name_c!=name_skB.
% 2.20/2.38  0 [] name_c!=name_skS.
% 2.20/2.38  0 [] name_objective!=name_skA.
% 2.20/2.38  0 [] name_objective!=name_skB.
% 2.20/2.38  0 [] name_objective!=name_skS.
% 2.20/2.38  0 [] name_skA!=name_skB.
% 2.20/2.38  0 [] name_skA!=name_skS.
% 2.20/2.38  0 [] name_skB!=name_skS.
% 2.20/2.38  0 [] constr_dec(constr_enc(VAR_M_47,VAR_K_48),VAR_K_48)=VAR_M_47.
% 2.20/2.38  0 [] constr_getmess(constr_sign(VAR_M_45,VAR_K_46))=VAR_M_45.
% 2.20/2.38  0 [] constr_checksign(constr_sign(VAR_M_0X30,VAR_K_44),constr_pkey(VAR_K_44))=VAR_M_0X30.
% 2.20/2.38  0 [] constr_ecb_dec_4(constr_ecb_enc_4(VAR_X1_39,VAR_X2_40X30,VAR_X3_41,VAR_X4_42,constr_pkey(VAR_K_43)),VAR_K_43)=tuple_4(VAR_X1_39,VAR_X2_40X30,VAR_X3_41,VAR_X4_42).
% 2.20/2.38  0 [] constr_ecb_dec_3(constr_ecb_enc_3(VAR_X1_35,VAR_X2_36,VAR_X3_37,constr_pkey(VAR_K_38)),VAR_K_38)=tuple_3(VAR_X1_35,VAR_X2_36,VAR_X3_37).
% 2.20/2.38  0 [] constr_ecb_dec_2(constr_ecb_enc_2(VAR_X1_32,VAR_X2_33,constr_pkey(VAR_K_34)),VAR_K_34)=tuple_2(VAR_X1_32,VAR_X2_33).
% 2.20/2.38  0 [] constr_ecb_dec_1(constr_ecb_enc_1(VAR_X1_30X30,constr_pkey(VAR_K_31)),VAR_K_31)=VAR_X1_30X30.
% 2.20/2.38  0 [] constr_ecb_enc_4(VAR_X1_26,VAR_X2_27,VAR_X3_28,VAR_X4_0X30,VAR_K_29)=tuple_4(constr_ecb_enc_1(VAR_X1_26,VAR_K_29),constr_ecb_enc_1(VAR_X2_27,VAR_K_29),constr_ecb_enc_1(VAR_X3_28,VAR_K_29),constr_ecb_enc_1(VAR_X4_0X30,VAR_K_29)).
% 2.20/2.38  0 [] constr_ecb_enc_3(VAR_X1_23,VAR_X2_24,VAR_X3_0X30,VAR_K_25)=tuple_3(constr_ecb_enc_1(VAR_X1_23,VAR_K_25),constr_ecb_enc_1(VAR_X2_24,VAR_K_25),constr_ecb_enc_1(VAR_X3_0X30,VAR_K_25)).
% 2.20/2.38  0 [] constr_ecb_enc_2(VAR_X1_21,VAR_X2_22,VAR_K_0X30)=tuple_2(constr_ecb_enc_1(VAR_X1_21,VAR_K_0X30),constr_ecb_enc_1(VAR_X2_22,VAR_K_0X30)).
% 2.20/2.38  0 [] constr_tuple_3_get_1_bitstring(tuple_3(VAR_X0X30_18,VAR_X1_19,VAR_X2_20X30))=VAR_X1_19.
% 2.20/2.38  0 [] constr_tuple_2_get_1_bitstring(tuple_2(VAR_X0X30_16,VAR_X1_17))=VAR_X1_17.
% 2.20/2.38  0 [] constr_tuple_2_get_0x30_bitstring(tuple_2(VAR_X0X30_14,VAR_X1_15))=VAR_X0X30_14.
% 2.20/2.38  0 [] constr_tuple_3_get_2(tuple_3(VAR_X0X30_11,VAR_X1_12,VAR_X2_13))=VAR_X2_13.
% 2.20/2.38  0 [] constr_tuple_3_get_0x30(tuple_3(VAR_X0X30_9,VAR_X1_10X30,VAR_X2_0X30))=VAR_X0X30_9.
% 2.20/2.38  0 [] constr_tuple_2_get_1(tuple_2(VAR_X0X30_7,VAR_X1_8))=VAR_X1_8.
% 2.20/2.38  0 [] constr_tuple_2_get_0x30(tuple_2(VAR_X0X30_0X30,VAR_X1_0X30))=VAR_X0X30_0X30.
% 2.20/2.38  0 [] pred_e_q_bitstring_bitstring(VAR_X_65,VAR_Y_66).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_72)|pred_attacker(constr_tuple_3_get_2(VAR_V_72)).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_74)|pred_attacker(constr_tuple_3_get_1_bitstring(VAR_V_74)).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_76)|pred_attacker(constr_tuple_3_get_0x30(VAR_V_76)).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_78)|pred_attacker(constr_tuple_2_get_1_bitstring(VAR_V_78)).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_80X30)|pred_attacker(constr_tuple_2_get_1(VAR_V_80X30)).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_82)|pred_attacker(constr_tuple_2_get_0x30_bitstring(VAR_V_82)).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_84)|pred_attacker(constr_tuple_2_get_0x30(VAR_V_84)).
% 2.20/2.38  0 [] pred_attacker(tuple_true).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_87)| -pred_attacker(VAR_V_88)|pred_attacker(constr_sign(VAR_V_87,VAR_V_88)).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_90X30)|pred_attacker(constr_pkey(VAR_V_90X30)).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_92)|pred_attacker(tuple_out_3(VAR_V_92)).
% 2.20/2.38  0 [] -pred_attacker(tuple_out_3(VAR_V_95))|pred_attacker(VAR_V_95).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_98)|pred_attacker(tuple_out_2(VAR_V_98)).
% 2.20/2.38  0 [] -pred_attacker(tuple_out_2(VAR_V_10X301))|pred_attacker(VAR_V_10X301).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_10X304)|pred_attacker(tuple_out_1(VAR_V_10X304)).
% 2.20/2.38  0 [] -pred_attacker(tuple_out_1(VAR_V_10X307))|pred_attacker(VAR_V_10X307).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_111)|pred_attacker(tuple_key_retrieval_server_out_2(VAR_V_111)).
% 2.20/2.38  0 [] -pred_attacker(tuple_key_retrieval_server_out_2(VAR_V_114))|pred_attacker(VAR_V_114).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_118)| -pred_attacker(VAR_V_119)|pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_118,VAR_V_119)).
% 2.20/2.38  0 [] -pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_126,VAR_V_127))|pred_attacker(VAR_V_126).
% 2.20/2.38  0 [] -pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_129,VAR_V_130X30))|pred_attacker(VAR_V_130X30).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_134)| -pred_attacker(VAR_V_135)|pred_attacker(tuple_key_register_server_in_1(VAR_V_134,VAR_V_135)).
% 2.20/2.38  0 [] -pred_attacker(tuple_key_register_server_in_1(VAR_V_142,VAR_V_143))|pred_attacker(VAR_V_142).
% 2.20/2.38  0 [] -pred_attacker(tuple_key_register_server_in_1(VAR_V_145,VAR_V_146))|pred_attacker(VAR_V_146).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_149)|pred_attacker(constr_getmess(VAR_V_149)).
% 2.20/2.38  0 [] pred_attacker(tuple_false).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_152)| -pred_attacker(VAR_V_153)|pred_attacker(constr_enc(VAR_V_152,VAR_V_153)).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_159)| -pred_attacker(VAR_V_160X30)| -pred_attacker(VAR_V_161)| -pred_attacker(VAR_V_162)| -pred_attacker(VAR_V_163)|pred_attacker(constr_ecb_enc_4(VAR_V_159,VAR_V_160X30,VAR_V_161,VAR_V_162,VAR_V_163)).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_168)| -pred_attacker(VAR_V_169)| -pred_attacker(VAR_V_170X30)| -pred_attacker(VAR_V_171)|pred_attacker(constr_ecb_enc_3(VAR_V_168,VAR_V_169,VAR_V_170X30,VAR_V_171)).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_175)| -pred_attacker(VAR_V_176)| -pred_attacker(VAR_V_177)|pred_attacker(constr_ecb_enc_2(VAR_V_175,VAR_V_176,VAR_V_177)).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_180X30)| -pred_attacker(VAR_V_181)|pred_attacker(constr_ecb_enc_1(VAR_V_180X30,VAR_V_181)).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_184)| -pred_attacker(VAR_V_185)|pred_attacker(constr_ecb_dec_4(VAR_V_184,VAR_V_185)).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_188)| -pred_attacker(VAR_V_189)|pred_attacker(constr_ecb_dec_3(VAR_V_188,VAR_V_189)).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_192)| -pred_attacker(VAR_V_193)|pred_attacker(constr_ecb_dec_2(VAR_V_192,VAR_V_193)).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_196)| -pred_attacker(VAR_V_197)|pred_attacker(constr_ecb_dec_1(VAR_V_196,VAR_V_197)).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_20X300X30)| -pred_attacker(VAR_V_20X301)|pred_attacker(constr_dec(VAR_V_20X300X30,VAR_V_20X301)).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_20X303)|pred_attacker(tuple_client_B_out_6(VAR_V_20X303)).
% 2.20/2.38  0 [] -pred_attacker(tuple_client_B_out_6(VAR_V_20X306))|pred_attacker(VAR_V_20X306).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_20X309)|pred_attacker(tuple_client_B_out_4(VAR_V_20X309)).
% 2.20/2.38  0 [] -pred_attacker(tuple_client_B_out_4(VAR_V_212))|pred_attacker(VAR_V_212).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_216)| -pred_attacker(VAR_V_217)|pred_attacker(tuple_client_B_out_1(VAR_V_216,VAR_V_217)).
% 2.20/2.38  0 [] -pred_attacker(tuple_client_B_out_1(VAR_V_224,VAR_V_225))|pred_attacker(VAR_V_224).
% 2.20/2.38  0 [] -pred_attacker(tuple_client_B_out_1(VAR_V_227,VAR_V_228))|pred_attacker(VAR_V_228).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_231)|pred_attacker(tuple_client_B_in_5(VAR_V_231)).
% 2.20/2.38  0 [] -pred_attacker(tuple_client_B_in_5(VAR_V_234))|pred_attacker(VAR_V_234).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_237)|pred_attacker(tuple_client_B_in_3(VAR_V_237)).
% 2.20/2.38  0 [] -pred_attacker(tuple_client_B_in_3(VAR_V_240X30))|pred_attacker(VAR_V_240X30).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_243)|pred_attacker(tuple_client_B_in_2(VAR_V_243)).
% 2.20/2.38  0 [] -pred_attacker(tuple_client_B_in_2(VAR_V_246))|pred_attacker(VAR_V_246).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_249)|pred_attacker(tuple_client_A_out_5(VAR_V_249)).
% 2.20/2.38  0 [] -pred_attacker(tuple_client_A_out_5(VAR_V_252))|pred_attacker(VAR_V_252).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_255)|pred_attacker(tuple_client_A_out_3(VAR_V_255)).
% 2.20/2.38  0 [] -pred_attacker(tuple_client_A_out_3(VAR_V_258))|pred_attacker(VAR_V_258).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_262)| -pred_attacker(VAR_V_263)|pred_attacker(tuple_client_A_out_1(VAR_V_262,VAR_V_263)).
% 2.20/2.38  0 [] -pred_attacker(tuple_client_A_out_1(VAR_V_270X30,VAR_V_271))|pred_attacker(VAR_V_270X30).
% 2.20/2.38  0 [] -pred_attacker(tuple_client_A_out_1(VAR_V_273,VAR_V_274))|pred_attacker(VAR_V_274).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_277)|pred_attacker(tuple_client_A_in_4(VAR_V_277)).
% 2.20/2.38  0 [] -pred_attacker(tuple_client_A_in_4(VAR_V_280X30))|pred_attacker(VAR_V_280X30).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_283)|pred_attacker(tuple_client_A_in_2(VAR_V_283)).
% 2.20/2.38  0 [] -pred_attacker(tuple_client_A_in_2(VAR_V_286))|pred_attacker(VAR_V_286).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_290X30)| -pred_attacker(VAR_V_291)|pred_attacker(constr_checksign(VAR_V_290X30,VAR_V_291)).
% 2.20/2.38  0 [] pred_attacker(constr_CONST_4).
% 2.20/2.38  0 [] pred_attacker(constr_CONST_3).
% 2.20/2.38  0 [] pred_attacker(constr_CONST_2).
% 2.20/2.38  0 [] pred_attacker(constr_CONST_1).
% 2.20/2.38  0 [] pred_attacker(constr_CONST_0x30).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_30X300X30)| -pred_attacker(VAR_V_30X301)| -pred_attacker(VAR_V_30X302)| -pred_attacker(VAR_V_30X303)|pred_attacker(tuple_4(VAR_V_30X300X30,VAR_V_30X301,VAR_V_30X302,VAR_V_30X303)).
% 2.20/2.38  0 [] -pred_attacker(tuple_4(VAR_V_324,VAR_V_325,VAR_V_326,VAR_V_327))|pred_attacker(VAR_V_324).
% 2.20/2.38  0 [] -pred_attacker(tuple_4(VAR_V_329,VAR_V_330X30,VAR_V_331,VAR_V_332))|pred_attacker(VAR_V_330X30).
% 2.20/2.38  0 [] -pred_attacker(tuple_4(VAR_V_334,VAR_V_335,VAR_V_336,VAR_V_337))|pred_attacker(VAR_V_336).
% 2.20/2.38  0 [] -pred_attacker(tuple_4(VAR_V_339,VAR_V_340X30,VAR_V_341,VAR_V_342))|pred_attacker(VAR_V_342).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_347)| -pred_attacker(VAR_V_348)| -pred_attacker(VAR_V_349)|pred_attacker(tuple_3(VAR_V_347,VAR_V_348,VAR_V_349)).
% 2.20/2.38  0 [] -pred_attacker(tuple_3(VAR_V_362,VAR_V_363,VAR_V_364))|pred_attacker(VAR_V_362).
% 2.20/2.38  0 [] -pred_attacker(tuple_3(VAR_V_366,VAR_V_367,VAR_V_368))|pred_attacker(VAR_V_367).
% 2.20/2.38  0 [] -pred_attacker(tuple_3(VAR_V_370X30,VAR_V_371,VAR_V_372))|pred_attacker(VAR_V_372).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_376)| -pred_attacker(VAR_V_377)|pred_attacker(tuple_2(VAR_V_376,VAR_V_377)).
% 2.20/2.38  0 [] -pred_attacker(tuple_2(VAR_V_384,VAR_V_385))|pred_attacker(VAR_V_384).
% 2.20/2.38  0 [] -pred_attacker(tuple_2(VAR_V_387,VAR_V_388))|pred_attacker(VAR_V_388).
% 2.20/2.38  0 [] -pred_mess(VAR_V_391,VAR_V_390X30)| -pred_attacker(VAR_V_391)|pred_attacker(VAR_V_390X30).
% 2.20/2.38  0 [] -pred_attacker(VAR_V_393)| -pred_attacker(VAR_V_392)|pred_mess(VAR_V_393,VAR_V_392).
% 2.20/2.38  0 [] pred_attacker(name_c).
% 2.20/2.38  0 [] pred_attacker(name_I).
% 2.20/2.38  0 [] pred_attacker(name_B).
% 2.20/2.38  0 [] pred_attacker(name_A).
% 2.20/2.38  0 [] pred_e_qual(VAR_V_395,VAR_V_395).
% 2.20/2.38  0 [] pred_attacker(name_new0x2Dname(VAR_V_396)).
% 2.20/2.38  0 [] pred_table(tuple_keys(name_A,constr_pkey(name_skA))).
% 2.20/2.38  0 [] pred_table(tuple_keys(name_B,constr_pkey(name_skB))).
% 2.20/2.38  0 [] pred_attacker(tuple_out_1(constr_pkey(name_skA))).
% 2.20/2.38  0 [] pred_attacker(tuple_out_2(constr_pkey(name_skB))).
% 2.20/2.38  0 [] pred_attacker(tuple_out_3(constr_pkey(name_skS))).
% 2.20/2.38  0 [] pred_attacker(tuple_client_A_out_1(name_A,name_I)).
% 2.20/2.38  0 [] -pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_I_PKI_511,constr_pkey(name_skS))))| -pred_attacker(tuple_client_A_in_2(VAR_SIGN_I_PKI_511))|pred_attacker(tuple_client_A_out_3(constr_ecb_enc_2(name_Na(VAR_0X40SID_512),name_A,constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_I_PKI_511,constr_pkey(name_skS)))))).
% 2.20/2.38  0 [] -pred_e_q_bitstring_bitstring(name_I,constr_tuple_3_get_2(constr_ecb_dec_3(VAR_ECB_ENC_NA_NI_I_576,name_skA)))| -pred_e_q_bitstring_bitstring(name_Na(VAR_0X40SID_577),constr_tuple_3_get_0x30(constr_ecb_dec_3(VAR_ECB_ENC_NA_NI_I_576,name_skA)))| -pred_attacker(tuple_client_A_in_4(VAR_ECB_ENC_NA_NI_I_576))| -pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_I_PKI_578,constr_pkey(name_skS))))| -pred_attacker(tuple_client_A_in_2(VAR_SIGN_I_PKI_578))|pred_attacker(tuple_client_A_out_5(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(VAR_ECB_ENC_NA_NI_I_576,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_I_PKI_578,constr_pkey(name_skS)))))).
% 2.20/2.38  0 [] pred_attacker(tuple_client_B_out_1(name_B,name_A)).
% 2.20/2.38  0 [] -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(VAR_ECB_ENC_NA_A_685,name_skB)))| -pred_attacker(tuple_client_B_in_3(VAR_ECB_ENC_NA_A_685))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_A_PKA_686,constr_pkey(name_skS))))| -pred_attacker(tuple_client_B_in_2(VAR_SIGN_A_PKA_686))|pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(VAR_ECB_ENC_NA_A_685,name_skB)),name_Nb(VAR_0X40SID_687),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_A_PKA_686,constr_pkey(name_skS)))))).
% 2.20/2.38  0 [] -pred_e_q_bitstring_bitstring(name_Nb(VAR_0X40SID_717),constr_ecb_dec_1(VAR_ECB_ENC_NB_718,name_skB))| -pred_attacker(tuple_client_B_in_5(VAR_ECB_ENC_NB_718))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(VAR_ECB_ENC_NA_A_719,name_skB)))| -pred_attacker(tuple_client_B_in_3(VAR_ECB_ENC_NA_A_719))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_A_PKA_720X30,constr_pkey(name_skS))))| -pred_attacker(tuple_client_B_in_2(VAR_SIGN_A_PKA_720X30))|pred_attacker(tuple_client_B_out_6(name_objective)).
% 2.20/2.38  0 [] -pred_table(tuple_keys(VAR_DST_759,VAR_PKDST_760X30))| -pred_attacker(tuple_key_retrieval_server_in_1(VAR_SRC_761,VAR_DST_759))|pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(VAR_DST_759,VAR_PKDST_760X30),name_skS))).
% 2.20/2.38  0 [] VAR_HOST_813=name_B|VAR_HOST_813=name_A| -pred_attacker(tuple_key_register_server_in_1(VAR_HOST_813,VAR_PK_814))|pred_table(tuple_keys(VAR_HOST_813,VAR_PK_814)).
% 2.20/2.38  0 [] -pred_attacker(name_objective).
% 2.20/2.38  end_of_list.
% 2.20/2.38  
% 2.20/2.38  SCAN INPUT: prop=0, horn=0, equality=1, symmetry=0, max_lits=7.
% 2.20/2.38  
% 2.20/2.38  This ia a non-Horn set with equality.  The strategy will be
% 2.20/2.38  Knuth-Bendix, ordered hyper_res, factoring, and unit
% 2.20/2.38  deletion, with positive clauses in sos and nonpositive
% 2.20/2.38  clauses in usable.
% 2.20/2.38  
% 2.20/2.38     dependent: set(knuth_bendix).
% 2.20/2.38     dependent: set(anl_eq).
% 2.20/2.38     dependent: set(para_from).
% 2.20/2.38     dependent: set(para_into).
% 2.20/2.38     dependent: clear(para_from_right).
% 2.20/2.38     dependent: clear(para_into_right).
% 2.20/2.38     dependent: set(para_from_vars).
% 2.20/2.39     dependent: set(eq_units_both_ways).
% 2.20/2.39     dependent: set(dynamic_demod_all).
% 2.20/2.39     dependent: set(dynamic_demod).
% 2.20/2.39     dependent: set(order_eq).
% 2.20/2.39     dependent: set(back_demod).
% 2.20/2.39     dependent: set(lrpo).
% 2.20/2.39     dependent: set(hyper_res).
% 2.20/2.39     dependent: set(unit_deletion).
% 2.20/2.39     dependent: set(factor).
% 2.20/2.39  
% 2.20/2.39  ------------> process usable:
% 2.20/2.39  ** KEPT (pick-wt=3): 2 [copy,1,flip.1] constr_CONST_1!=constr_CONST_0x30.
% 2.20/2.39  ** KEPT (pick-wt=3): 4 [copy,3,flip.1] constr_CONST_2!=constr_CONST_0x30.
% 2.20/2.39  ** KEPT (pick-wt=3): 6 [copy,5,flip.1] constr_CONST_3!=constr_CONST_0x30.
% 2.20/2.39  ** KEPT (pick-wt=3): 8 [copy,7,flip.1] constr_CONST_4!=constr_CONST_0x30.
% 2.20/2.39  ** KEPT (pick-wt=3): 10 [copy,9,flip.1] name_A!=constr_CONST_0x30.
% 2.20/2.39  ** KEPT (pick-wt=3): 12 [copy,11,flip.1] name_B!=constr_CONST_0x30.
% 2.20/2.39  ** KEPT (pick-wt=3): 14 [copy,13,flip.1] name_I!=constr_CONST_0x30.
% 2.20/2.39  ** KEPT (pick-wt=3): 16 [copy,15,flip.1] name_c!=constr_CONST_0x30.
% 2.20/2.39  ** KEPT (pick-wt=3): 18 [copy,17,flip.1] name_objective!=constr_CONST_0x30.
% 2.20/2.39  ** KEPT (pick-wt=3): 20 [copy,19,flip.1] name_skA!=constr_CONST_0x30.
% 2.20/2.39  ** KEPT (pick-wt=3): 22 [copy,21,flip.1] name_skB!=constr_CONST_0x30.
% 2.20/2.39  ** KEPT (pick-wt=3): 24 [copy,23,flip.1] name_skS!=constr_CONST_0x30.
% 2.20/2.39  ** KEPT (pick-wt=3): 26 [copy,25,flip.1] constr_CONST_2!=constr_CONST_1.
% 2.20/2.39  ** KEPT (pick-wt=3): 28 [copy,27,flip.1] constr_CONST_3!=constr_CONST_1.
% 2.20/2.39  ** KEPT (pick-wt=3): 30 [copy,29,flip.1] constr_CONST_4!=constr_CONST_1.
% 2.20/2.39  ** KEPT (pick-wt=3): 32 [copy,31,flip.1] name_A!=constr_CONST_1.
% 2.20/2.39  ** KEPT (pick-wt=3): 34 [copy,33,flip.1] name_B!=constr_CONST_1.
% 2.20/2.39  ** KEPT (pick-wt=3): 36 [copy,35,flip.1] name_I!=constr_CONST_1.
% 2.20/2.39  ** KEPT (pick-wt=3): 38 [copy,37,flip.1] name_c!=constr_CONST_1.
% 2.20/2.39  ** KEPT (pick-wt=3): 40 [copy,39,flip.1] name_objective!=constr_CONST_1.
% 2.20/2.39  ** KEPT (pick-wt=3): 42 [copy,41,flip.1] name_skA!=constr_CONST_1.
% 2.20/2.39  ** KEPT (pick-wt=3): 44 [copy,43,flip.1] name_skB!=constr_CONST_1.
% 2.20/2.39  ** KEPT (pick-wt=3): 46 [copy,45,flip.1] name_skS!=constr_CONST_1.
% 2.20/2.39  ** KEPT (pick-wt=3): 48 [copy,47,flip.1] constr_CONST_3!=constr_CONST_2.
% 2.20/2.39  ** KEPT (pick-wt=3): 50 [copy,49,flip.1] constr_CONST_4!=constr_CONST_2.
% 2.20/2.39  ** KEPT (pick-wt=3): 52 [copy,51,flip.1] name_A!=constr_CONST_2.
% 2.20/2.39  ** KEPT (pick-wt=3): 54 [copy,53,flip.1] name_B!=constr_CONST_2.
% 2.20/2.39  ** KEPT (pick-wt=3): 56 [copy,55,flip.1] name_I!=constr_CONST_2.
% 2.20/2.39  ** KEPT (pick-wt=3): 58 [copy,57,flip.1] name_c!=constr_CONST_2.
% 2.20/2.39  ** KEPT (pick-wt=3): 60 [copy,59,flip.1] name_objective!=constr_CONST_2.
% 2.20/2.39  ** KEPT (pick-wt=3): 62 [copy,61,flip.1] name_skA!=constr_CONST_2.
% 2.20/2.39  ** KEPT (pick-wt=3): 64 [copy,63,flip.1] name_skB!=constr_CONST_2.
% 2.20/2.39  ** KEPT (pick-wt=3): 66 [copy,65,flip.1] name_skS!=constr_CONST_2.
% 2.20/2.39  ** KEPT (pick-wt=3): 68 [copy,67,flip.1] constr_CONST_4!=constr_CONST_3.
% 2.20/2.39  ** KEPT (pick-wt=3): 70 [copy,69,flip.1] name_A!=constr_CONST_3.
% 2.20/2.39  ** KEPT (pick-wt=3): 72 [copy,71,flip.1] name_B!=constr_CONST_3.
% 2.20/2.39  ** KEPT (pick-wt=3): 74 [copy,73,flip.1] name_I!=constr_CONST_3.
% 2.20/2.39  ** KEPT (pick-wt=3): 76 [copy,75,flip.1] name_c!=constr_CONST_3.
% 2.20/2.39  ** KEPT (pick-wt=3): 78 [copy,77,flip.1] name_objective!=constr_CONST_3.
% 2.20/2.39  ** KEPT (pick-wt=3): 80 [copy,79,flip.1] name_skA!=constr_CONST_3.
% 2.20/2.39  ** KEPT (pick-wt=3): 82 [copy,81,flip.1] name_skB!=constr_CONST_3.
% 2.20/2.39  ** KEPT (pick-wt=3): 84 [copy,83,flip.1] name_skS!=constr_CONST_3.
% 2.20/2.39  ** KEPT (pick-wt=3): 86 [copy,85,flip.1] name_A!=constr_CONST_4.
% 2.20/2.39  ** KEPT (pick-wt=3): 88 [copy,87,flip.1] name_B!=constr_CONST_4.
% 2.20/2.39  ** KEPT (pick-wt=3): 90 [copy,89,flip.1] name_I!=constr_CONST_4.
% 2.20/2.39  ** KEPT (pick-wt=3): 92 [copy,91,flip.1] name_c!=constr_CONST_4.
% 2.20/2.39  ** KEPT (pick-wt=3): 94 [copy,93,flip.1] name_objective!=constr_CONST_4.
% 2.20/2.39  ** KEPT (pick-wt=3): 96 [copy,95,flip.1] name_skA!=constr_CONST_4.
% 2.20/2.39  ** KEPT (pick-wt=3): 98 [copy,97,flip.1] name_skB!=constr_CONST_4.
% 2.20/2.39  ** KEPT (pick-wt=3): 100 [copy,99,flip.1] name_skS!=constr_CONST_4.
% 2.20/2.39  ** KEPT (pick-wt=3): 102 [copy,101,flip.1] name_B!=name_A.
% 2.20/2.39  ** KEPT (pick-wt=3): 104 [copy,103,flip.1] name_I!=name_A.
% 2.20/2.39  ** KEPT (pick-wt=3): 106 [copy,105,flip.1] name_c!=name_A.
% 2.20/2.39  ** KEPT (pick-wt=3): 108 [copy,107,flip.1] name_objective!=name_A.
% 2.20/2.39  ** KEPT (pick-wt=3): 110 [copy,109,flip.1] name_skA!=name_A.
% 2.20/2.39  ** KEPT (pick-wt=3): 112 [copy,111,flip.1] name_skB!=name_A.
% 2.20/2.39  ** KEPT (pick-wt=3): 114 [copy,113,flip.1] name_skS!=name_A.
% 2.20/2.39  ** KEPT (pick-wt=3): 116 [copy,115,flip.1] name_I!=name_B.
% 2.20/2.39  ** KEPT (pick-wt=3): 118 [copy,117,flip.1] name_c!=name_B.
% 2.20/2.39  ** KEPT (pick-wt=3): 120 [copy,119,flip.1] name_objective!=name_B.
% 2.20/2.39  ** KEPT (pick-wt=3): 122 [copy,121,flip.1] name_skA!=name_B.
% 2.20/2.39  ** KEPT (pick-wt=3): 124 [copy,123,flip.1] name_skB!=name_B.
% 2.20/2.39  ** KEPT (pick-wt=3): 126 [copy,125,flip.1] name_skS!=name_B.
% 2.20/2.39  ** KEPT (pick-wt=3): 128 [copy,127,flip.1] name_c!=name_I.
% 2.20/2.39  ** KEPT (pick-wt=3): 130 [copy,129,flip.1] name_objective!=name_I.
% 2.20/2.39  ** KEPT (pick-wt=3): 132 [copy,131,flip.1] name_skA!=name_I.
% 2.20/2.39  ** KEPT (pick-wt=3): 134 [copy,133,flip.1] name_skB!=name_I.
% 2.20/2.39  ** KEPT (pick-wt=3): 136 [copy,135,flip.1] name_skS!=name_I.
% 2.20/2.39  ** KEPT (pick-wt=3): 138 [copy,137,flip.1] name_objective!=name_c.
% 2.20/2.39  ** KEPT (pick-wt=3): 140 [copy,139,flip.1] name_skA!=name_c.
% 2.20/2.39  ** KEPT (pick-wt=3): 142 [copy,141,flip.1] name_skB!=name_c.
% 2.20/2.39  ** KEPT (pick-wt=3): 144 [copy,143,flip.1] name_skS!=name_c.
% 2.20/2.39  ** KEPT (pick-wt=3): 146 [copy,145,flip.1] name_skA!=name_objective.
% 2.20/2.39  ** KEPT (pick-wt=3): 148 [copy,147,flip.1] name_skB!=name_objective.
% 2.20/2.39  ** KEPT (pick-wt=3): 150 [copy,149,flip.1] name_skS!=name_objective.
% 2.20/2.39  ** KEPT (pick-wt=3): 152 [copy,151,flip.1] name_skB!=name_skA.
% 2.20/2.39  ** KEPT (pick-wt=3): 154 [copy,153,flip.1] name_skS!=name_skA.
% 2.20/2.39  ** KEPT (pick-wt=3): 156 [copy,155,flip.1] name_skS!=name_skB.
% 2.20/2.39  ** KEPT (pick-wt=5): 157 [] -pred_attacker(A)|pred_attacker(constr_tuple_3_get_2(A)).
% 2.20/2.39  ** KEPT (pick-wt=5): 158 [] -pred_attacker(A)|pred_attacker(constr_tuple_3_get_1_bitstring(A)).
% 2.20/2.39  ** KEPT (pick-wt=5): 159 [] -pred_attacker(A)|pred_attacker(constr_tuple_3_get_0x30(A)).
% 2.20/2.39  ** KEPT (pick-wt=5): 160 [] -pred_attacker(A)|pred_attacker(constr_tuple_2_get_1_bitstring(A)).
% 2.20/2.39  ** KEPT (pick-wt=5): 161 [] -pred_attacker(A)|pred_attacker(constr_tuple_2_get_1(A)).
% 2.20/2.39  ** KEPT (pick-wt=5): 162 [] -pred_attacker(A)|pred_attacker(constr_tuple_2_get_0x30_bitstring(A)).
% 2.20/2.39  ** KEPT (pick-wt=5): 163 [] -pred_attacker(A)|pred_attacker(constr_tuple_2_get_0x30(A)).
% 2.20/2.39  ** KEPT (pick-wt=8): 164 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_sign(A,B)).
% 2.20/2.39  ** KEPT (pick-wt=5): 165 [] -pred_attacker(A)|pred_attacker(constr_pkey(A)).
% 2.20/2.39  ** KEPT (pick-wt=5): 166 [] -pred_attacker(A)|pred_attacker(tuple_out_3(A)).
% 2.20/2.39  ** KEPT (pick-wt=5): 167 [] -pred_attacker(tuple_out_3(A))|pred_attacker(A).
% 2.20/2.39  ** KEPT (pick-wt=5): 168 [] -pred_attacker(A)|pred_attacker(tuple_out_2(A)).
% 2.20/2.39  ** KEPT (pick-wt=5): 169 [] -pred_attacker(tuple_out_2(A))|pred_attacker(A).
% 2.20/2.39  ** KEPT (pick-wt=5): 170 [] -pred_attacker(A)|pred_attacker(tuple_out_1(A)).
% 2.20/2.39  ** KEPT (pick-wt=5): 171 [] -pred_attacker(tuple_out_1(A))|pred_attacker(A).
% 2.20/2.39  ** KEPT (pick-wt=5): 172 [] -pred_attacker(A)|pred_attacker(tuple_key_retrieval_server_out_2(A)).
% 2.20/2.39  ** KEPT (pick-wt=5): 173 [] -pred_attacker(tuple_key_retrieval_server_out_2(A))|pred_attacker(A).
% 2.20/2.39  ** KEPT (pick-wt=8): 174 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(tuple_key_retrieval_server_in_1(A,B)).
% 2.20/2.39  ** KEPT (pick-wt=6): 175 [] -pred_attacker(tuple_key_retrieval_server_in_1(A,B))|pred_attacker(A).
% 2.20/2.39  ** KEPT (pick-wt=6): 176 [] -pred_attacker(tuple_key_retrieval_server_in_1(A,B))|pred_attacker(B).
% 2.20/2.39  ** KEPT (pick-wt=8): 177 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(tuple_key_register_server_in_1(A,B)).
% 2.20/2.39  ** KEPT (pick-wt=6): 178 [] -pred_attacker(tuple_key_register_server_in_1(A,B))|pred_attacker(A).
% 2.20/2.39  ** KEPT (pick-wt=6): 179 [] -pred_attacker(tuple_key_register_server_in_1(A,B))|pred_attacker(B).
% 2.20/2.39  ** KEPT (pick-wt=5): 180 [] -pred_attacker(A)|pred_attacker(constr_getmess(A)).
% 2.20/2.39  ** KEPT (pick-wt=8): 181 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_enc(A,B)).
% 2.20/2.39  ** KEPT (pick-wt=17): 182 [] -pred_attacker(A)| -pred_attacker(B)| -pred_attacker(C)| -pred_attacker(D)| -pred_attacker(E)|pred_attacker(constr_ecb_enc_4(A,B,C,D,E)).
% 2.20/2.39  ** KEPT (pick-wt=14): 183 [] -pred_attacker(A)| -pred_attacker(B)| -pred_attacker(C)| -pred_attacker(D)|pred_attacker(constr_ecb_enc_3(A,B,C,D)).
% 2.20/2.39  ** KEPT (pick-wt=11): 184 [] -pred_attacker(A)| -pred_attacker(B)| -pred_attacker(C)|pred_attacker(constr_ecb_enc_2(A,B,C)).
% 2.27/2.45  ** KEPT (pick-wt=8): 185 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_ecb_enc_1(A,B)).
% 2.27/2.45  ** KEPT (pick-wt=8): 186 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_ecb_dec_4(A,B)).
% 2.27/2.45  ** KEPT (pick-wt=8): 187 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_ecb_dec_3(A,B)).
% 2.27/2.45  ** KEPT (pick-wt=8): 188 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_ecb_dec_2(A,B)).
% 2.27/2.45  ** KEPT (pick-wt=8): 189 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_ecb_dec_1(A,B)).
% 2.27/2.45  ** KEPT (pick-wt=8): 190 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_dec(A,B)).
% 2.27/2.45  ** KEPT (pick-wt=5): 191 [] -pred_attacker(A)|pred_attacker(tuple_client_B_out_6(A)).
% 2.27/2.45  ** KEPT (pick-wt=5): 192 [] -pred_attacker(tuple_client_B_out_6(A))|pred_attacker(A).
% 2.27/2.45  ** KEPT (pick-wt=5): 193 [] -pred_attacker(A)|pred_attacker(tuple_client_B_out_4(A)).
% 2.27/2.45  ** KEPT (pick-wt=5): 194 [] -pred_attacker(tuple_client_B_out_4(A))|pred_attacker(A).
% 2.27/2.45  ** KEPT (pick-wt=8): 195 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(tuple_client_B_out_1(A,B)).
% 2.27/2.45  ** KEPT (pick-wt=6): 196 [] -pred_attacker(tuple_client_B_out_1(A,B))|pred_attacker(A).
% 2.27/2.45  ** KEPT (pick-wt=6): 197 [] -pred_attacker(tuple_client_B_out_1(A,B))|pred_attacker(B).
% 2.27/2.45  ** KEPT (pick-wt=5): 198 [] -pred_attacker(A)|pred_attacker(tuple_client_B_in_5(A)).
% 2.27/2.45  ** KEPT (pick-wt=5): 199 [] -pred_attacker(tuple_client_B_in_5(A))|pred_attacker(A).
% 2.27/2.45  ** KEPT (pick-wt=5): 200 [] -pred_attacker(A)|pred_attacker(tuple_client_B_in_3(A)).
% 2.27/2.45  ** KEPT (pick-wt=5): 201 [] -pred_attacker(tuple_client_B_in_3(A))|pred_attacker(A).
% 2.27/2.45  ** KEPT (pick-wt=5): 202 [] -pred_attacker(A)|pred_attacker(tuple_client_B_in_2(A)).
% 2.27/2.45  ** KEPT (pick-wt=5): 203 [] -pred_attacker(tuple_client_B_in_2(A))|pred_attacker(A).
% 2.27/2.45  ** KEPT (pick-wt=5): 204 [] -pred_attacker(A)|pred_attacker(tuple_client_A_out_5(A)).
% 2.27/2.45  ** KEPT (pick-wt=5): 205 [] -pred_attacker(tuple_client_A_out_5(A))|pred_attacker(A).
% 2.27/2.45  ** KEPT (pick-wt=5): 206 [] -pred_attacker(A)|pred_attacker(tuple_client_A_out_3(A)).
% 2.27/2.45  ** KEPT (pick-wt=5): 207 [] -pred_attacker(tuple_client_A_out_3(A))|pred_attacker(A).
% 2.27/2.45  ** KEPT (pick-wt=8): 208 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(tuple_client_A_out_1(A,B)).
% 2.27/2.45  ** KEPT (pick-wt=6): 209 [] -pred_attacker(tuple_client_A_out_1(A,B))|pred_attacker(A).
% 2.27/2.45  ** KEPT (pick-wt=6): 210 [] -pred_attacker(tuple_client_A_out_1(A,B))|pred_attacker(B).
% 2.27/2.45  ** KEPT (pick-wt=5): 211 [] -pred_attacker(A)|pred_attacker(tuple_client_A_in_4(A)).
% 2.27/2.45  ** KEPT (pick-wt=5): 212 [] -pred_attacker(tuple_client_A_in_4(A))|pred_attacker(A).
% 2.27/2.45  ** KEPT (pick-wt=5): 213 [] -pred_attacker(A)|pred_attacker(tuple_client_A_in_2(A)).
% 2.27/2.45  ** KEPT (pick-wt=5): 214 [] -pred_attacker(tuple_client_A_in_2(A))|pred_attacker(A).
% 2.27/2.45  ** KEPT (pick-wt=8): 215 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_checksign(A,B)).
% 2.27/2.45  ** KEPT (pick-wt=14): 216 [] -pred_attacker(A)| -pred_attacker(B)| -pred_attacker(C)| -pred_attacker(D)|pred_attacker(tuple_4(A,B,C,D)).
% 2.27/2.45  ** KEPT (pick-wt=8): 217 [] -pred_attacker(tuple_4(A,B,C,D))|pred_attacker(A).
% 2.27/2.45  ** KEPT (pick-wt=8): 218 [] -pred_attacker(tuple_4(A,B,C,D))|pred_attacker(B).
% 2.27/2.45  ** KEPT (pick-wt=8): 219 [] -pred_attacker(tuple_4(A,B,C,D))|pred_attacker(C).
% 2.27/2.45  ** KEPT (pick-wt=8): 220 [] -pred_attacker(tuple_4(A,B,C,D))|pred_attacker(D).
% 2.27/2.45  ** KEPT (pick-wt=11): 221 [] -pred_attacker(A)| -pred_attacker(B)| -pred_attacker(C)|pred_attacker(tuple_3(A,B,C)).
% 2.27/2.45  ** KEPT (pick-wt=7): 222 [] -pred_attacker(tuple_3(A,B,C))|pred_attacker(A).
% 2.27/2.45  ** KEPT (pick-wt=7): 223 [] -pred_attacker(tuple_3(A,B,C))|pred_attacker(B).
% 2.27/2.45  ** KEPT (pick-wt=7): 224 [] -pred_attacker(tuple_3(A,B,C))|pred_attacker(C).
% 2.27/2.45  ** KEPT (pick-wt=8): 225 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(tuple_2(A,B)).
% 2.27/2.45  ** KEPT (pick-wt=6): 226 [] -pred_attacker(tuple_2(A,B))|pred_attacker(A).
% 2.27/2.45  ** KEPT (pick-wt=6): 227 [] -pred_attacker(tuple_2(A,B))|pred_attacker(B).
% 2.27/2.45  ** KEPT (pick-wt=7): 228 [] -pred_mess(A,B)| -pred_attacker(A)|pred_attacker(B).
% 2.27/2.45  ** KEPT (pick-wt=7): 229 [] -pred_attacker(A)| -pred_attacker(B)|pred_mess(A,B).
% 2.27/2.45  ** KEPT (pick-wt=21): 230 [] -pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(A,constr_pkey(name_skS))))| -pred_attacker(tuple_client_A_in_2(A))|pred_attacker(tuple_client_A_out_3(constr_ecb_enc_2(name_Na(B),name_A,constr_tuple_2_get_1_bitstring(constr_checksign(A,constr_pkey(name_skS)))))).
% 2.27/2.45  ** KEPT (pick-wt=38): 231 [] -pred_e_q_bitstring_bitstring(name_I,constr_tuple_3_get_2(constr_ecb_dec_3(A,name_skA)))| -pred_e_q_bitstring_bitstring(name_Na(B),constr_tuple_3_get_0x30(constr_ecb_dec_3(A,name_skA)))| -pred_attacker(tuple_client_A_in_4(A))| -pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(C,constr_pkey(name_skS))))| -pred_attacker(tuple_client_A_in_2(C))|pred_attacker(tuple_client_A_out_5(constr_ecb_enc_1(constr_tuple_3_get_1_bitstring(constr_ecb_dec_3(A,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(C,constr_pkey(name_skS)))))).
% 2.27/2.45  ** KEPT (pick-wt=34): 232 [] -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(A,name_skB)))| -pred_attacker(tuple_client_B_in_3(A))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(B,constr_pkey(name_skS))))| -pred_attacker(tuple_client_B_in_2(B))|pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(A,name_skB)),name_Nb(C),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(B,constr_pkey(name_skS)))))).
% 2.27/2.45  ** KEPT (pick-wt=31): 233 [] -pred_e_q_bitstring_bitstring(name_Nb(A),constr_ecb_dec_1(B,name_skB))| -pred_attacker(tuple_client_B_in_5(B))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(C,name_skB)))| -pred_attacker(tuple_client_B_in_3(C))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(D,constr_pkey(name_skS))))| -pred_attacker(tuple_client_B_in_2(D))|pred_attacker(tuple_client_B_out_6(name_objective)).
% 2.27/2.45  ** KEPT (pick-wt=15): 234 [] -pred_table(tuple_keys(A,B))| -pred_attacker(tuple_key_retrieval_server_in_1(C,A))|pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(A,B),name_skS))).
% 2.27/2.45  ** KEPT (pick-wt=14): 235 [] A=name_B|A=name_A| -pred_attacker(tuple_key_register_server_in_1(A,B))|pred_table(tuple_keys(A,B)).
% 2.27/2.45  ** KEPT (pick-wt=2): 236 [] -pred_attacker(name_objective).
% 2.27/2.45  
% 2.27/2.45  ------------> process sos:
% 2.27/2.45  ** KEPT (pick-wt=3): 339 [] A=A.
% 2.27/2.45  ** KEPT (pick-wt=7): 340 [] constr_dec(constr_enc(A,B),B)=A.
% 2.27/2.45  ---> New Demodulator: 341 [new_demod,340] constr_dec(constr_enc(A,B),B)=A.
% 2.27/2.45  ** KEPT (pick-wt=6): 342 [] constr_getmess(constr_sign(A,B))=A.
% 2.27/2.45  ---> New Demodulator: 343 [new_demod,342] constr_getmess(constr_sign(A,B))=A.
% 2.27/2.45  ** KEPT (pick-wt=8): 344 [] constr_checksign(constr_sign(A,B),constr_pkey(B))=A.
% 2.27/2.45  ---> New Demodulator: 345 [new_demod,344] constr_checksign(constr_sign(A,B),constr_pkey(B))=A.
% 2.27/2.45  ** KEPT (pick-wt=15): 346 [] constr_ecb_dec_4(constr_ecb_enc_4(A,B,C,D,constr_pkey(E)),E)=tuple_4(A,B,C,D).
% 2.27/2.45  ---> New Demodulator: 347 [new_demod,346] constr_ecb_dec_4(constr_ecb_enc_4(A,B,C,D,constr_pkey(E)),E)=tuple_4(A,B,C,D).
% 2.27/2.45  ** KEPT (pick-wt=13): 348 [] constr_ecb_dec_3(constr_ecb_enc_3(A,B,C,constr_pkey(D)),D)=tuple_3(A,B,C).
% 2.27/2.45  ---> New Demodulator: 349 [new_demod,348] constr_ecb_dec_3(constr_ecb_enc_3(A,B,C,constr_pkey(D)),D)=tuple_3(A,B,C).
% 2.27/2.45  ** KEPT (pick-wt=11): 350 [] constr_ecb_dec_2(constr_ecb_enc_2(A,B,constr_pkey(C)),C)=tuple_2(A,B).
% 2.27/2.45  ** KEPT (pick-wt=8): 351 [] constr_ecb_dec_1(constr_ecb_enc_1(A,constr_pkey(B)),B)=A.
% 2.27/2.45  ---> New Demodulator: 352 [new_demod,351] constr_ecb_dec_1(constr_ecb_enc_1(A,constr_pkey(B)),B)=A.
% 2.27/2.45  ** KEPT (pick-wt=20): 354 [copy,353,flip.1] tuple_4(constr_ecb_enc_1(A,B),constr_ecb_enc_1(C,B),constr_ecb_enc_1(D,B),constr_ecb_enc_1(E,B))=constr_ecb_enc_4(A,C,D,E,B).
% 2.27/2.45  ---> New Demodulator: 355 [new_demod,354] tuple_4(constr_ecb_enc_1(A,B),constr_ecb_enc_1(C,B),constr_ecb_enc_1(D,B),constr_ecb_enc_1(E,B))=constr_ecb_enc_4(A,C,D,E,B).
% 2.27/2.45  ** KEPT (pick-wt=16): 357 [copy,356,flip.1] tuple_3(constr_ecb_enc_1(A,B),constr_ecb_enc_1(C,B),constr_ecb_enc_1(D,B))=constr_ecb_enc_3(A,C,D,B).
% 2.27/2.45  ---> New Demodulator: 358 [new_demod,357] tuple_3(constr_ecb_enc_1(A,B),constr_ecb_enc_1(C,B),constr_ecb_encAlarm clock 
% 299.96/300.09  Otter interrupted
% 299.96/300.09  PROOF NOT FOUND
%------------------------------------------------------------------------------