TSTP Solution File: SWW964+1 by Vampire---4.8
View Problem
- Process Solution
%------------------------------------------------------------------------------
% File : Vampire---4.8
% Problem : SWW964+1 : TPTP v8.1.2. Released v7.4.0.
% Transfm : none
% Format : tptp:raw
% Command : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule file --schedule_file /export/starexec/sandbox2/solver/bin/quickGreedyProduceRating_steal_pow3.txt --cores 8 -m 12000 -t %d %s
% Computer : n015.cluster.edu
% Model : x86_64 x86_64
% CPU : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory : 8042.1875MB
% OS : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit : 300s
% DateTime : Wed May 1 04:32:45 EDT 2024
% Result : Theorem 1.31s 0.98s
% Output : Refutation 1.31s
% Verified :
% SZS Type : Refutation
% Derivation depth : 16
% Number of leaves : 39
% Syntax : Number of formulae : 170 ( 32 unt; 0 def)
% Number of atoms : 450 ( 39 equ)
% Maximal formula atoms : 8 ( 2 avg)
% Number of connectives : 495 ( 215 ~; 205 |; 30 &)
% ( 12 <=>; 33 =>; 0 <=; 0 <~>)
% Maximal formula depth : 12 ( 5 avg)
% Maximal term depth : 7 ( 2 avg)
% Number of predicates : 17 ( 15 usr; 13 prp; 0-2 aty)
% Number of functors : 30 ( 30 usr; 7 con; 0-4 aty)
% Number of variables : 277 ( 275 !; 2 ?)
% Comments :
%------------------------------------------------------------------------------
fof(f1381,plain,
$false,
inference(avatar_sat_refutation,[],[f494,f506,f524,f533,f539,f541,f897,f1152,f1235,f1340,f1355,f1375,f1380]) ).
fof(f1380,plain,
( spl1_7
| ~ spl1_1 ),
inference(avatar_split_clause,[],[f1379,f482,f510]) ).
fof(f510,plain,
( spl1_7
<=> ! [X1] : ~ pred_attacker(X1) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_7])]) ).
fof(f482,plain,
( spl1_1
<=> ! [X2,X0] :
( ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X2,name_skB)) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_1])]) ).
fof(f1379,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl1_1 ),
inference(resolution,[],[f1376,f413]) ).
fof(f413,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f304]) ).
fof(f304,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f221]) ).
fof(f221,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_5(X0)) ),
inference(rectify,[],[f140]) ).
fof(f140,axiom,
! [X118] :
( pred_attacker(X118)
=> pred_attacker(tuple_client_B_in_5(X118)) ),
file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax139) ).
fof(f1376,plain,
( ! [X2] : ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ spl1_1 ),
inference(subsumption_resolution,[],[f483,f398]) ).
fof(f398,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
inference(cnf_transformation,[],[f206]) ).
fof(f206,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
inference(rectify,[],[f96]) ).
fof(f96,axiom,
! [X49,X50] : pred_eq_bitstring_bitstring(X49,X50),
file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax95) ).
fof(f483,plain,
( ! [X2,X0] :
( ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X2,name_skB)) )
| ~ spl1_1 ),
inference(avatar_component_clause,[],[f482]) ).
fof(f1375,plain,
( spl1_5
| ~ spl1_66 ),
inference(avatar_contradiction_clause,[],[f1374]) ).
fof(f1374,plain,
( $false
| spl1_5
| ~ spl1_66 ),
inference(resolution,[],[f1354,f501]) ).
fof(f501,plain,
( ~ pred_attacker(name_Nb(sK0))
| spl1_5 ),
inference(avatar_component_clause,[],[f499]) ).
fof(f499,plain,
( spl1_5
<=> pred_attacker(name_Nb(sK0)) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_5])]) ).
fof(f1354,plain,
( ! [X1] : pred_attacker(name_Nb(X1))
| ~ spl1_66 ),
inference(avatar_component_clause,[],[f1353]) ).
fof(f1353,plain,
( spl1_66
<=> ! [X1] : pred_attacker(name_Nb(X1)) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_66])]) ).
fof(f1355,plain,
( spl1_66
| spl1_7
| ~ spl1_63 ),
inference(avatar_split_clause,[],[f1351,f1298,f510,f1353]) ).
fof(f1298,plain,
( spl1_63
<=> ! [X2,X1] :
( pred_attacker(constr_ecb_enc_1(name_Nb(X1),X2))
| ~ pred_attacker(X2) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_63])]) ).
fof(f1351,plain,
( ! [X0,X1] :
( ~ pred_attacker(X0)
| pred_attacker(name_Nb(X1)) )
| ~ spl1_63 ),
inference(subsumption_resolution,[],[f1342,f399]) ).
fof(f399,plain,
! [X0] :
( pred_attacker(constr_pkey(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f292]) ).
fof(f292,plain,
! [X0] :
( pred_attacker(constr_pkey(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f207]) ).
fof(f207,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(constr_pkey(X0)) ),
inference(rectify,[],[f106]) ).
fof(f106,axiom,
! [X60] :
( pred_attacker(X60)
=> pred_attacker(constr_pkey(X60)) ),
file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax105) ).
fof(f1342,plain,
( ! [X0,X1] :
( ~ pred_attacker(constr_pkey(X0))
| ~ pred_attacker(X0)
| pred_attacker(name_Nb(X1)) )
| ~ spl1_63 ),
inference(resolution,[],[f1299,f558]) ).
fof(f558,plain,
! [X0,X1] :
( ~ pred_attacker(constr_ecb_enc_1(X0,constr_pkey(X1)))
| ~ pred_attacker(X1)
| pred_attacker(X0) ),
inference(superposition,[],[f404,f405]) ).
fof(f405,plain,
! [X0,X1] : constr_ecb_dec_1(constr_ecb_enc_1(X1,constr_pkey(X0)),X0) = X1,
inference(cnf_transformation,[],[f213]) ).
fof(f213,plain,
! [X0,X1] : constr_ecb_dec_1(constr_ecb_enc_1(X1,constr_pkey(X0)),X0) = X1,
inference(rectify,[],[f85]) ).
fof(f85,axiom,
! [X18,X19] : constr_ecb_dec_1(constr_ecb_enc_1(X19,constr_pkey(X18)),X18) = X19,
file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax84) ).
fof(f404,plain,
! [X0,X1] :
( pred_attacker(constr_ecb_dec_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f298]) ).
fof(f298,plain,
! [X0,X1] :
( pred_attacker(constr_ecb_dec_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f297]) ).
fof(f297,plain,
! [X0,X1] :
( pred_attacker(constr_ecb_dec_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f212]) ).
fof(f212,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(constr_ecb_dec_1(X0,X1)) ),
inference(rectify,[],[f131]) ).
fof(f131,axiom,
! [X104,X105] :
( ( pred_attacker(X105)
& pred_attacker(X104) )
=> pred_attacker(constr_ecb_dec_1(X104,X105)) ),
file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax130) ).
fof(f1299,plain,
( ! [X2,X1] :
( pred_attacker(constr_ecb_enc_1(name_Nb(X1),X2))
| ~ pred_attacker(X2) )
| ~ spl1_63 ),
inference(avatar_component_clause,[],[f1298]) ).
fof(f1340,plain,
( spl1_7
| spl1_63
| ~ spl1_58 ),
inference(avatar_split_clause,[],[f1331,f1233,f1298,f510]) ).
fof(f1233,plain,
( spl1_58
<=> ! [X2,X1,X3] :
( ~ pred_attacker(X1)
| ~ pred_attacker(X2)
| pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),X2),constr_ecb_enc_1(name_Nb(X3),X2),constr_ecb_enc_1(name_B,X2))) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_58])]) ).
fof(f1331,plain,
( ! [X2,X0,X1] :
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(constr_ecb_enc_1(name_Nb(X2),X0)) )
| ~ spl1_58 ),
inference(resolution,[],[f1234,f450]) ).
fof(f450,plain,
! [X2,X0,X1] :
( ~ pred_attacker(tuple_3(X0,X1,X2))
| pred_attacker(X1) ),
inference(cnf_transformation,[],[f337]) ).
fof(f337,plain,
! [X0,X1,X2] :
( pred_attacker(X1)
| ~ pred_attacker(tuple_3(X0,X1,X2)) ),
inference(ennf_transformation,[],[f258]) ).
fof(f258,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_3(X0,X1,X2))
=> pred_attacker(X1) ),
inference(rectify,[],[f170]) ).
fof(f170,axiom,
! [X166,X167,X168] :
( pred_attacker(tuple_3(X166,X167,X168))
=> pred_attacker(X167) ),
file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax169) ).
fof(f1234,plain,
( ! [X2,X3,X1] :
( pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),X2),constr_ecb_enc_1(name_Nb(X3),X2),constr_ecb_enc_1(name_B,X2)))
| ~ pred_attacker(X2)
| ~ pred_attacker(X1) )
| ~ spl1_58 ),
inference(avatar_component_clause,[],[f1233]) ).
fof(f1235,plain,
( spl1_58
| spl1_17
| ~ spl1_52 ),
inference(avatar_split_clause,[],[f1229,f1150,f686,f1233]) ).
fof(f686,plain,
( spl1_17
<=> ! [X0] :
( ~ pred_attacker(X0)
| name_B = X0
| name_A = X0 ) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_17])]) ).
fof(f1150,plain,
( spl1_52
<=> ! [X0,X3,X2,X1] :
( ~ pred_attacker(X0)
| ~ pred_attacker(X3)
| ~ pred_table(tuple_keys(X3,X1))
| pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),X1),constr_ecb_enc_1(name_Nb(X2),X1),constr_ecb_enc_1(name_B,X1))) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_52])]) ).
fof(f1229,plain,
( ! [X2,X3,X0,X1] :
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),X2),constr_ecb_enc_1(name_Nb(X3),X2),constr_ecb_enc_1(name_B,X2)))
| ~ pred_attacker(X2)
| name_A = X0
| name_B = X0 )
| ~ spl1_52 ),
inference(duplicate_literal_removal,[],[f1228]) ).
fof(f1228,plain,
( ! [X2,X3,X0,X1] :
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),X2),constr_ecb_enc_1(name_Nb(X3),X2),constr_ecb_enc_1(name_B,X2)))
| ~ pred_attacker(X0)
| ~ pred_attacker(X2)
| name_A = X0
| name_B = X0 )
| ~ spl1_52 ),
inference(resolution,[],[f1151,f586]) ).
fof(f586,plain,
! [X0,X1] :
( pred_table(tuple_keys(X1,X0))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0)
| name_A = X1
| name_B = X1 ),
inference(resolution,[],[f472,f460]) ).
fof(f460,plain,
! [X0,X1] :
( ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
| pred_table(tuple_keys(X0,X1))
| name_A = X0
| name_B = X0 ),
inference(cnf_transformation,[],[f350]) ).
fof(f350,plain,
! [X0,X1] :
( pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
| name_A = X0
| name_B = X0 ),
inference(flattening,[],[f349]) ).
fof(f349,plain,
! [X0,X1] :
( pred_table(tuple_keys(X0,X1))
| ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
| name_A = X0
| name_B = X0 ),
inference(ennf_transformation,[],[f268]) ).
fof(f268,plain,
! [X0,X1] :
( ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
& name_A != X0
& name_B != X0 )
=> pred_table(tuple_keys(X0,X1)) ),
inference(rectify,[],[f195]) ).
fof(f195,axiom,
! [X199,X200] :
( ( pred_attacker(tuple_key_register_server_in_1(X199,X200))
& name_A != X199
& name_B != X199 )
=> pred_table(tuple_keys(X199,X200)) ),
file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax194) ).
fof(f472,plain,
! [X0,X1] :
( pred_attacker(tuple_key_register_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f363]) ).
fof(f363,plain,
! [X0,X1] :
( pred_attacker(tuple_key_register_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f362]) ).
fof(f362,plain,
! [X0,X1] :
( pred_attacker(tuple_key_register_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f278]) ).
fof(f278,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(tuple_key_register_server_in_1(X0,X1)) ),
inference(rectify,[],[f118]) ).
fof(f118,axiom,
! [X75,X76] :
( ( pred_attacker(X76)
& pred_attacker(X75) )
=> pred_attacker(tuple_key_register_server_in_1(X75,X76)) ),
file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax117) ).
fof(f1151,plain,
( ! [X2,X3,X0,X1] :
( ~ pred_table(tuple_keys(X3,X1))
| ~ pred_attacker(X3)
| ~ pred_attacker(X0)
| pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),X1),constr_ecb_enc_1(name_Nb(X2),X1),constr_ecb_enc_1(name_B,X1))) )
| ~ spl1_52 ),
inference(avatar_component_clause,[],[f1150]) ).
fof(f1152,plain,
( spl1_7
| spl1_52 ),
inference(avatar_split_clause,[],[f1148,f1150,f510]) ).
fof(f1148,plain,
! [X2,X3,X0,X1,X4] :
( ~ pred_attacker(X0)
| pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),X1),constr_ecb_enc_1(name_Nb(X2),X1),constr_ecb_enc_1(name_B,X1)))
| ~ pred_table(tuple_keys(X3,X1))
| ~ pred_attacker(X3)
| ~ pred_attacker(X4) ),
inference(resolution,[],[f809,f467]) ).
fof(f467,plain,
! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f356]) ).
fof(f356,plain,
! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f355]) ).
fof(f355,plain,
! [X0,X1] :
( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f273]) ).
fof(f273,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
inference(rectify,[],[f115]) ).
fof(f115,axiom,
! [X69,X70] :
( ( pred_attacker(X70)
& pred_attacker(X69) )
=> pred_attacker(tuple_key_retrieval_server_in_1(X69,X70)) ),
file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax114) ).
fof(f809,plain,
! [X2,X3,X0,X1,X4] :
( ~ pred_attacker(tuple_key_retrieval_server_in_1(X4,X1))
| ~ pred_attacker(X0)
| pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),X2),constr_ecb_enc_1(name_Nb(X3),X2),constr_ecb_enc_1(name_B,X2)))
| ~ pred_table(tuple_keys(X1,X2)) ),
inference(forward_demodulation,[],[f808,f422]) ).
fof(f422,plain,
! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
inference(cnf_transformation,[],[f230]) ).
fof(f230,plain,
! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
inference(rectify,[],[f90]) ).
fof(f90,axiom,
! [X35,X36] : constr_tuple_2_get_1_bitstring(tuple_2(X35,X36)) = X36,
file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax89) ).
fof(f808,plain,
! [X2,X3,X0,X1,X4] :
( pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),constr_tuple_2_get_1_bitstring(tuple_2(X1,X2))),constr_ecb_enc_1(name_Nb(X3),constr_tuple_2_get_1_bitstring(tuple_2(X1,X2))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(tuple_2(X1,X2)))))
| ~ pred_attacker(X0)
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X4,X1))
| ~ pred_table(tuple_keys(X1,X2)) ),
inference(resolution,[],[f740,f549]) ).
fof(f549,plain,
! [X2,X0,X1] :
( pred_attacker(constr_sign(tuple_2(X0,X1),name_skS))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
| ~ pred_table(tuple_keys(X0,X1)) ),
inference(resolution,[],[f463,f446]) ).
fof(f446,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
| ~ pred_table(tuple_keys(X0,X1)) ),
inference(cnf_transformation,[],[f333]) ).
fof(f333,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
| ~ pred_table(tuple_keys(X0,X1)) ),
inference(flattening,[],[f332]) ).
fof(f332,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
| ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
| ~ pred_table(tuple_keys(X0,X1)) ),
inference(ennf_transformation,[],[f254]) ).
fof(f254,plain,
! [X0,X1,X2] :
( ( pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
& pred_table(tuple_keys(X0,X1)) )
=> pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
inference(rectify,[],[f194]) ).
fof(f194,axiom,
! [X196,X197,X198] :
( ( pred_attacker(tuple_key_retrieval_server_in_1(X198,X196))
& pred_table(tuple_keys(X196,X197)) )
=> pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X196,X197),name_skS))) ),
file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax193) ).
fof(f463,plain,
! [X0] :
( ~ pred_attacker(tuple_key_retrieval_server_out_2(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f351]) ).
fof(f351,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_key_retrieval_server_out_2(X0)) ),
inference(ennf_transformation,[],[f269]) ).
fof(f269,plain,
! [X0] :
( pred_attacker(tuple_key_retrieval_server_out_2(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f114]) ).
fof(f114,axiom,
! [X68] :
( pred_attacker(tuple_key_retrieval_server_out_2(X68))
=> pred_attacker(X68) ),
file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax113) ).
fof(f740,plain,
! [X2,X0,X1] :
( ~ pred_attacker(constr_sign(X0,name_skS))
| pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(X0)),constr_ecb_enc_1(name_Nb(X2),constr_tuple_2_get_1_bitstring(X0)),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(X0))))
| ~ pred_attacker(X1) ),
inference(superposition,[],[f652,f401]) ).
fof(f401,plain,
! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
inference(cnf_transformation,[],[f209]) ).
fof(f209,plain,
! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
inference(rectify,[],[f81]) ).
fof(f81,axiom,
! [X4,X5] : constr_checksign(constr_sign(X5,X4),constr_pkey(X4)) = X5,
file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax80) ).
fof(f652,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X2),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(resolution,[],[f612,f415]) ).
fof(f415,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f306]) ).
fof(f306,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f223]) ).
fof(f223,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_3(X0)) ),
inference(rectify,[],[f142]) ).
fof(f142,axiom,
! [X120] :
( pred_attacker(X120)
=> pred_attacker(tuple_client_B_in_3(X120)) ),
file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax141) ).
fof(f612,plain,
! [X2,X0,X1] :
( ~ pred_attacker(tuple_client_B_in_3(X0))
| pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X2),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
| ~ pred_attacker(X1) ),
inference(resolution,[],[f547,f417]) ).
fof(f417,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f308]) ).
fof(f308,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f225]) ).
fof(f225,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_2(X0)) ),
inference(rectify,[],[f144]) ).
fof(f144,axiom,
! [X122] :
( pred_attacker(X122)
=> pred_attacker(tuple_client_B_in_2(X122)) ),
file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax143) ).
fof(f547,plain,
! [X2,X0,X1] :
( ~ pred_attacker(tuple_client_B_in_2(X1))
| pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X2),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_3(X0)) ),
inference(resolution,[],[f425,f535]) ).
fof(f535,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_B_out_4(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_attacker(tuple_client_B_in_3(X1)) ),
inference(subsumption_resolution,[],[f534,f398]) ).
fof(f534,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_B_out_4(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ),
inference(subsumption_resolution,[],[f473,f398]) ).
fof(f473,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_B_out_4(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ),
inference(definition_unfolding,[],[f377,f419]) ).
fof(f419,plain,
! [X2,X3,X0,X1] : constr_ecb_enc_3(X1,X2,X3,X0) = tuple_3(constr_ecb_enc_1(X1,X0),constr_ecb_enc_1(X2,X0),constr_ecb_enc_1(X3,X0)),
inference(cnf_transformation,[],[f227]) ).
fof(f227,plain,
! [X0,X1,X2,X3] : constr_ecb_enc_3(X1,X2,X3,X0) = tuple_3(constr_ecb_enc_1(X1,X0),constr_ecb_enc_1(X2,X0),constr_ecb_enc_1(X3,X0)),
inference(rectify,[],[f87]) ).
fof(f87,axiom,
! [X25,X26,X27,X28] : constr_ecb_enc_3(X26,X27,X28,X25) = tuple_3(constr_ecb_enc_1(X26,X25),constr_ecb_enc_1(X27,X25),constr_ecb_enc_1(X28,X25)),
file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax86) ).
fof(f377,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X0),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ),
inference(cnf_transformation,[],[f287]) ).
fof(f287,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X0),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ),
inference(flattening,[],[f286]) ).
fof(f286,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X0),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ),
inference(ennf_transformation,[],[f203]) ).
fof(f203,plain,
! [X0,X1,X2] :
( ( pred_attacker(tuple_client_B_in_2(X2))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X1))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) )
=> pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X0),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
inference(rectify,[],[f192]) ).
fof(f192,axiom,
! [X189,X190,X191] :
( ( pred_attacker(tuple_client_B_in_2(X191))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X191,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X190))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X190,name_skB))) )
=> pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X190,name_skB)),name_Nb(X189),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X191,constr_pkey(name_skS)))))) ),
file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax191) ).
fof(f425,plain,
! [X0] :
( ~ pred_attacker(tuple_client_B_out_4(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f313]) ).
fof(f313,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_B_out_4(X0)) ),
inference(ennf_transformation,[],[f233]) ).
fof(f233,plain,
! [X0] :
( pred_attacker(tuple_client_B_out_4(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f136]) ).
fof(f136,axiom,
! [X111] :
( pred_attacker(tuple_client_B_out_4(X111))
=> pred_attacker(X111) ),
file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax135) ).
fof(f897,plain,
~ spl1_17,
inference(avatar_contradiction_clause,[],[f896]) ).
fof(f896,plain,
( $false
| ~ spl1_17 ),
inference(subsumption_resolution,[],[f895,f391]) ).
fof(f391,plain,
name_A != name_I,
inference(cnf_transformation,[],[f52]) ).
fof(f52,axiom,
name_A != name_I,
file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax51) ).
fof(f895,plain,
( name_A = name_I
| ~ spl1_17 ),
inference(subsumption_resolution,[],[f832,f390]) ).
fof(f390,plain,
name_B != name_I,
inference(cnf_transformation,[],[f58]) ).
fof(f58,axiom,
name_B != name_I,
file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax57) ).
fof(f832,plain,
( name_B = name_I
| name_A = name_I
| ~ spl1_17 ),
inference(resolution,[],[f687,f388]) ).
fof(f388,plain,
pred_attacker(name_I),
inference(cnf_transformation,[],[f178]) ).
fof(f178,axiom,
pred_attacker(name_I),
file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax177) ).
fof(f687,plain,
( ! [X0] :
( ~ pred_attacker(X0)
| name_B = X0
| name_A = X0 )
| ~ spl1_17 ),
inference(avatar_component_clause,[],[f686]) ).
fof(f541,plain,
( spl1_6
| ~ spl1_4 ),
inference(avatar_split_clause,[],[f540,f491,f503]) ).
fof(f503,plain,
( spl1_6
<=> pred_attacker(name_objective) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_6])]) ).
fof(f491,plain,
( spl1_4
<=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_4])]) ).
fof(f540,plain,
( pred_attacker(name_objective)
| ~ spl1_4 ),
inference(resolution,[],[f493,f410]) ).
fof(f410,plain,
! [X0] :
( ~ pred_attacker(tuple_client_B_out_6(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f301]) ).
fof(f301,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_B_out_6(X0)) ),
inference(ennf_transformation,[],[f218]) ).
fof(f218,plain,
! [X0] :
( pred_attacker(tuple_client_B_out_6(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f134]) ).
fof(f134,axiom,
! [X109] :
( pred_attacker(tuple_client_B_out_6(X109))
=> pred_attacker(X109) ),
file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax133) ).
fof(f493,plain,
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ spl1_4 ),
inference(avatar_component_clause,[],[f491]) ).
fof(f539,plain,
( spl1_7
| ~ spl1_3 ),
inference(avatar_split_clause,[],[f538,f488,f510]) ).
fof(f488,plain,
( spl1_3
<=> ! [X3] :
( ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS)))) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_3])]) ).
fof(f538,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl1_3 ),
inference(subsumption_resolution,[],[f417,f536]) ).
fof(f536,plain,
( ! [X3] : ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ spl1_3 ),
inference(subsumption_resolution,[],[f489,f398]) ).
fof(f489,plain,
( ! [X3] :
( ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS)))) )
| ~ spl1_3 ),
inference(avatar_component_clause,[],[f488]) ).
fof(f533,plain,
( spl1_7
| ~ spl1_2 ),
inference(avatar_split_clause,[],[f532,f485,f510]) ).
fof(f485,plain,
( spl1_2
<=> ! [X1] :
( ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl1_2])]) ).
fof(f532,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl1_2 ),
inference(subsumption_resolution,[],[f415,f527]) ).
fof(f527,plain,
( ! [X0] : ~ pred_attacker(tuple_client_B_in_3(X0))
| ~ spl1_2 ),
inference(resolution,[],[f398,f486]) ).
fof(f486,plain,
( ! [X1] :
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X1)) )
| ~ spl1_2 ),
inference(avatar_component_clause,[],[f485]) ).
fof(f524,plain,
~ spl1_7,
inference(avatar_contradiction_clause,[],[f517]) ).
fof(f517,plain,
( $false
| ~ spl1_7 ),
inference(resolution,[],[f511,f395]) ).
fof(f395,plain,
pred_attacker(name_A),
inference(cnf_transformation,[],[f180]) ).
fof(f180,axiom,
pred_attacker(name_A),
file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax179) ).
fof(f511,plain,
( ! [X1] : ~ pred_attacker(X1)
| ~ spl1_7 ),
inference(avatar_component_clause,[],[f510]) ).
fof(f506,plain,
( ~ spl1_5
| ~ spl1_6 ),
inference(avatar_split_clause,[],[f495,f503,f499]) ).
fof(f495,plain,
( ~ pred_attacker(name_objective)
| ~ pred_attacker(name_Nb(sK0)) ),
inference(resolution,[],[f375,f366]) ).
fof(f366,plain,
~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
inference(cnf_transformation,[],[f365]) ).
fof(f365,plain,
~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
inference(skolemisation,[status(esa),new_symbols(skolem,[sK0])],[f279,f364]) ).
fof(f364,plain,
( ? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective))
=> ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)) ),
introduced(choice_axiom,[]) ).
fof(f279,plain,
? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective)),
inference(ennf_transformation,[],[f198]) ).
fof(f198,plain,
~ ! [X0] : pred_attacker(tuple_2(name_Nb(X0),name_objective)),
inference(rectify,[],[f197]) ).
fof(f197,negated_conjecture,
~ ! [X201] : pred_attacker(tuple_2(name_Nb(X201),name_objective)),
inference(negated_conjecture,[],[f196]) ).
fof(f196,conjecture,
! [X201] : pred_attacker(tuple_2(name_Nb(X201),name_objective)),
file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',co0) ).
fof(f375,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f283]) ).
fof(f283,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f282]) ).
fof(f282,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f201]) ).
fof(f201,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(tuple_2(X0,X1)) ),
inference(rectify,[],[f172]) ).
fof(f172,axiom,
! [X172,X173] :
( ( pred_attacker(X173)
& pred_attacker(X172) )
=> pred_attacker(tuple_2(X172,X173)) ),
file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax171) ).
fof(f494,plain,
( spl1_1
| spl1_2
| spl1_3
| spl1_4 ),
inference(avatar_split_clause,[],[f376,f491,f488,f485,f482]) ).
fof(f376,plain,
! [X2,X3,X0,X1] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X2,name_skB)) ),
inference(cnf_transformation,[],[f285]) ).
fof(f285,plain,
! [X0,X1,X2,X3] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X2,name_skB)) ),
inference(flattening,[],[f284]) ).
fof(f284,plain,
! [X0,X1,X2,X3] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
| ~ pred_attacker(tuple_client_B_in_5(X2))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X2,name_skB)) ),
inference(ennf_transformation,[],[f202]) ).
fof(f202,plain,
! [X0,X1,X2,X3] :
( ( pred_attacker(tuple_client_B_in_2(X3))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X1))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
& pred_attacker(tuple_client_B_in_5(X2))
& pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X2,name_skB)) )
=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(rectify,[],[f193]) ).
fof(f193,axiom,
! [X192,X193,X194,X195] :
( ( pred_attacker(tuple_client_B_in_2(X195))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X195,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_3(X193))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X193,name_skB)))
& pred_attacker(tuple_client_B_in_5(X194))
& pred_eq_bitstring_bitstring(name_Nb(X192),constr_ecb_dec_1(X194,name_skB)) )
=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax192) ).
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.03/0.13 % Problem : SWW964+1 : TPTP v8.1.2. Released v7.4.0.
% 0.03/0.15 % Command : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule file --schedule_file /export/starexec/sandbox2/solver/bin/quickGreedyProduceRating_steal_pow3.txt --cores 8 -m 12000 -t %d %s
% 0.14/0.36 % Computer : n015.cluster.edu
% 0.14/0.36 % Model : x86_64 x86_64
% 0.14/0.36 % CPU : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.14/0.36 % Memory : 8042.1875MB
% 0.14/0.36 % OS : Linux 3.10.0-693.el7.x86_64
% 0.14/0.36 % CPULimit : 300
% 0.14/0.36 % WCLimit : 300
% 0.14/0.36 % DateTime : Tue Apr 30 18:19:48 EDT 2024
% 0.14/0.36 % CPUTime :
% 0.14/0.36 This is a FOF_THM_RFO_SEQ problem
% 0.14/0.36 Running vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule file --schedule_file /export/starexec/sandbox2/solver/bin/quickGreedyProduceRating_steal_pow3.txt --cores 8 -m 12000 -t 300 /export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603
% 0.70/0.88 % (30854)lrs+1011_1:1_sil=8000:sp=occurrence:nwc=10.0:i=78:ss=axioms:sgt=8_0 on Vampire---4 for (2994ds/78Mi)
% 0.70/0.88 % (30855)ott+1011_1:1_sil=2000:urr=on:i=33:sd=1:kws=inv_frequency:ss=axioms:sup=off_0 on Vampire---4 for (2994ds/33Mi)
% 0.70/0.88 % (30852)dis-1011_2:1_sil=2000:lsd=20:nwc=5.0:flr=on:mep=off:st=3.0:i=34:sd=1:ep=RS:ss=axioms_0 on Vampire---4 for (2994ds/34Mi)
% 0.70/0.88 % (30857)lrs+1002_1:16_to=lpo:sil=32000:sp=unary_frequency:sos=on:i=45:bd=off:ss=axioms_0 on Vampire---4 for (2994ds/45Mi)
% 0.70/0.88 % (30853)lrs+1011_461:32768_sil=16000:irw=on:sp=frequency:lsd=20:fd=preordered:nwc=10.0:s2agt=32:alpa=false:cond=fast:s2a=on:i=51:s2at=3.0:awrs=decay:awrsf=691:bd=off:nm=20:fsr=off:amm=sco:uhcvi=on:rawr=on_0 on Vampire---4 for (2994ds/51Mi)
% 0.70/0.88 % (30856)lrs+2_1:1_sil=16000:fde=none:sos=all:nwc=5.0:i=34:ep=RS:s2pl=on:lma=on:afp=100000_0 on Vampire---4 for (2994ds/34Mi)
% 0.70/0.88 % (30858)lrs+21_1:5_sil=2000:sos=on:urr=on:newcnf=on:slsq=on:i=83:slsql=off:bd=off:nm=2:ss=axioms:st=1.5:sp=const_min:gsp=on:rawr=on_0 on Vampire---4 for (2994ds/83Mi)
% 0.70/0.88 % (30859)lrs-21_1:1_to=lpo:sil=2000:sp=frequency:sos=on:lma=on:i=56:sd=2:ss=axioms:ep=R_0 on Vampire---4 for (2994ds/56Mi)
% 0.70/0.88 % (30852)Refutation not found, incomplete strategy% (30852)------------------------------
% 0.70/0.88 % (30852)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.88 % (30852)Termination reason: Refutation not found, incomplete strategy
% 0.70/0.88
% 0.70/0.88 % (30852)Memory used [KB]: 1159
% 0.70/0.88 % (30852)Time elapsed: 0.004 s
% 0.70/0.88 % (30852)Instructions burned: 4 (million)
% 0.70/0.88 % (30852)------------------------------
% 0.70/0.88 % (30852)------------------------------
% 0.70/0.88 % (30859)Refutation not found, incomplete strategy% (30859)------------------------------
% 0.70/0.88 % (30859)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.88 % (30859)Termination reason: Refutation not found, incomplete strategy
% 0.70/0.88
% 0.70/0.88 % (30859)Memory used [KB]: 1175
% 0.70/0.88 % (30859)Time elapsed: 0.004 s
% 0.70/0.88 % (30859)Instructions burned: 4 (million)
% 0.70/0.88 % (30859)------------------------------
% 0.70/0.88 % (30859)------------------------------
% 0.70/0.88 % (30857)Refutation not found, incomplete strategy% (30857)------------------------------
% 0.70/0.88 % (30857)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.88 % (30857)Termination reason: Refutation not found, incomplete strategy
% 0.70/0.88
% 0.70/0.88 % (30857)Memory used [KB]: 1176
% 0.70/0.88 % (30857)Time elapsed: 0.004 s
% 0.70/0.88 % (30857)Instructions burned: 5 (million)
% 0.70/0.88 % (30857)------------------------------
% 0.70/0.88 % (30857)------------------------------
% 0.70/0.88 % (30856)Refutation not found, incomplete strategy% (30856)------------------------------
% 0.70/0.88 % (30856)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.88 % (30856)Termination reason: Refutation not found, incomplete strategy
% 0.70/0.88
% 0.70/0.88 % (30856)Memory used [KB]: 1270
% 0.70/0.88 % (30856)Time elapsed: 0.006 s
% 0.70/0.89 % (30856)Instructions burned: 8 (million)
% 0.70/0.89 % (30856)------------------------------
% 0.70/0.89 % (30856)------------------------------
% 0.70/0.89 % (30860)lrs+21_1:16_sil=2000:sp=occurrence:urr=on:flr=on:i=55:sd=1:nm=0:ins=3:ss=included:rawr=on:br=off_0 on Vampire---4 for (2994ds/55Mi)
% 0.70/0.89 % (30861)dis+3_25:4_sil=16000:sos=all:erd=off:i=50:s2at=4.0:bd=off:nm=60:sup=off:cond=on:av=off:ins=2:nwc=10.0:etr=on:to=lpo:s2agt=20:fd=off:bsr=unit_only:slsq=on:slsqr=28,19:awrs=converge:awrsf=500:tgt=ground:bs=unit_only_0 on Vampire---4 for (2994ds/50Mi)
% 0.70/0.89 % (30862)lrs+1010_1:2_sil=4000:tgt=ground:nwc=10.0:st=2.0:i=208:sd=1:bd=off:ss=axioms_0 on Vampire---4 for (2994ds/208Mi)
% 0.70/0.89 % (30864)lrs-1011_1:1_sil=4000:plsq=on:plsqr=32,1:sp=frequency:plsql=on:nwc=10.0:i=52:aac=none:afr=on:ss=axioms:er=filter:sgt=16:rawr=on:etr=on:lma=on_0 on Vampire---4 for (2994ds/52Mi)
% 0.70/0.89 % (30862)Refutation not found, incomplete strategy% (30862)------------------------------
% 0.70/0.89 % (30862)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.89 % (30862)Termination reason: Refutation not found, incomplete strategy
% 0.70/0.89
% 0.70/0.89 % (30862)Memory used [KB]: 1156
% 0.70/0.89 % (30862)Time elapsed: 0.004 s
% 0.70/0.89 % (30862)Instructions burned: 4 (million)
% 0.70/0.89 % (30862)------------------------------
% 0.70/0.89 % (30862)------------------------------
% 0.70/0.89 % (30866)lrs-1010_1:1_to=lpo:sil=2000:sp=reverse_arity:sos=on:urr=ec_only:i=518:sd=2:bd=off:ss=axioms:sgt=16_0 on Vampire---4 for (2994ds/518Mi)
% 0.70/0.90 % (30866)Refutation not found, incomplete strategy% (30866)------------------------------
% 0.70/0.90 % (30866)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.90 % (30866)Termination reason: Refutation not found, incomplete strategy
% 0.70/0.90
% 0.70/0.90 % (30866)Memory used [KB]: 1190
% 0.70/0.90 % (30866)Time elapsed: 0.006 s
% 0.70/0.90 % (30866)Instructions burned: 8 (million)
% 0.70/0.90 % (30866)------------------------------
% 0.70/0.90 % (30866)------------------------------
% 0.70/0.90 % (30855)Instruction limit reached!
% 0.70/0.90 % (30855)------------------------------
% 0.70/0.90 % (30855)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.90 % (30855)Termination reason: Unknown
% 0.70/0.90 % (30855)Termination phase: Saturation
% 0.70/0.90
% 0.70/0.90 % (30855)Memory used [KB]: 1686
% 0.70/0.90 % (30855)Time elapsed: 0.020 s
% 0.70/0.90 % (30855)Instructions burned: 33 (million)
% 0.70/0.90 % (30855)------------------------------
% 0.70/0.90 % (30855)------------------------------
% 0.70/0.90 % (30867)lrs+1011_87677:1048576_sil=8000:sos=on:spb=non_intro:nwc=10.0:kmz=on:i=42:ep=RS:nm=0:ins=1:uhcvi=on:rawr=on:fde=unused:afp=2000:afq=1.444:plsq=on:nicw=on_0 on Vampire---4 for (2994ds/42Mi)
% 0.70/0.90 % (30868)dis+1011_1258907:1048576_bsr=unit_only:to=lpo:drc=off:sil=2000:tgt=full:fde=none:sp=frequency:spb=goal:rnwc=on:nwc=6.70083:sac=on:newcnf=on:st=2:i=243:bs=unit_only:sd=3:afp=300:awrs=decay:awrsf=218:nm=16:ins=3:afq=3.76821:afr=on:ss=axioms:sgt=5:rawr=on:add=off:bsd=on_0 on Vampire---4 for (2994ds/243Mi)
% 0.70/0.91 % (30853)Instruction limit reached!
% 0.70/0.91 % (30853)------------------------------
% 0.70/0.91 % (30853)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.91 % (30853)Termination reason: Unknown
% 0.70/0.91 % (30853)Termination phase: Saturation
% 0.70/0.91
% 0.70/0.91 % (30853)Memory used [KB]: 1852
% 0.70/0.91 % (30853)Time elapsed: 0.032 s
% 0.70/0.91 % (30853)Instructions burned: 51 (million)
% 0.70/0.91 % (30853)------------------------------
% 0.70/0.91 % (30853)------------------------------
% 0.70/0.91 % (30861)Instruction limit reached!
% 0.70/0.91 % (30861)------------------------------
% 0.70/0.91 % (30861)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.91 % (30861)Termination reason: Unknown
% 0.70/0.91 % (30861)Termination phase: Saturation
% 0.70/0.91
% 0.70/0.91 % (30861)Memory used [KB]: 1981
% 0.70/0.91 % (30861)Time elapsed: 0.028 s
% 0.70/0.91 % (30861)Instructions burned: 51 (million)
% 0.70/0.91 % (30861)------------------------------
% 0.70/0.91 % (30861)------------------------------
% 0.70/0.91 % (30872)lrs+1011_2:9_sil=2000:lsd=10:newcnf=on:i=117:sd=2:awrs=decay:ss=included:amm=off:ep=R_0 on Vampire---4 for (2994ds/117Mi)
% 0.70/0.92 % (30860)Instruction limit reached!
% 0.70/0.92 % (30860)------------------------------
% 0.70/0.92 % (30860)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.92 % (30860)Termination reason: Unknown
% 0.70/0.92 % (30860)Termination phase: Saturation
% 0.70/0.92
% 0.70/0.92 % (30860)Memory used [KB]: 2177
% 0.70/0.92 % (30860)Time elapsed: 0.031 s
% 0.70/0.92 % (30860)Instructions burned: 56 (million)
% 0.70/0.92 % (30860)------------------------------
% 0.70/0.92 % (30860)------------------------------
% 0.70/0.92 % (30874)dis+1011_11:1_sil=2000:avsq=on:i=143:avsqr=1,16:ep=RS:rawr=on:aac=none:lsd=100:mep=off:fde=none:newcnf=on:bsr=unit_only_0 on Vampire---4 for (2994ds/143Mi)
% 0.70/0.92 % (30875)lrs+1011_1:2_to=lpo:sil=8000:plsqc=1:plsq=on:plsqr=326,59:sp=weighted_frequency:plsql=on:nwc=10.0:newcnf=on:i=93:awrs=converge:awrsf=200:bd=off:ins=1:rawr=on:alpa=false:avsq=on:avsqr=1,16_0 on Vampire---4 for (2994ds/93Mi)
% 0.70/0.92 % (30864)Instruction limit reached!
% 0.70/0.92 % (30864)------------------------------
% 0.70/0.92 % (30864)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.92 % (30864)Termination reason: Unknown
% 0.70/0.92 % (30864)Termination phase: Saturation
% 0.70/0.92
% 0.70/0.92 % (30864)Memory used [KB]: 1763
% 0.70/0.92 % (30864)Time elapsed: 0.034 s
% 0.70/0.92 % (30864)Instructions burned: 52 (million)
% 0.70/0.92 % (30864)------------------------------
% 0.70/0.92 % (30864)------------------------------
% 0.70/0.92 % (30872)Refutation not found, incomplete strategy% (30872)------------------------------
% 0.70/0.92 % (30872)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.92 % (30872)Termination reason: Refutation not found, incomplete strategy
% 0.70/0.92
% 0.70/0.92 % (30872)Memory used [KB]: 1335
% 0.70/0.92 % (30872)Time elapsed: 0.011 s
% 0.70/0.92 % (30872)Instructions burned: 16 (million)
% 0.70/0.92 % (30872)------------------------------
% 0.70/0.92 % (30872)------------------------------
% 0.70/0.92 % (30854)Instruction limit reached!
% 0.70/0.92 % (30854)------------------------------
% 0.70/0.92 % (30854)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.92 % (30854)Termination reason: Unknown
% 0.70/0.92 % (30854)Termination phase: Saturation
% 0.70/0.92
% 0.70/0.92 % (30854)Memory used [KB]: 1948
% 0.70/0.92 % (30854)Time elapsed: 0.045 s
% 0.70/0.92 % (30854)Instructions burned: 78 (million)
% 0.70/0.92 % (30854)------------------------------
% 0.70/0.92 % (30854)------------------------------
% 0.70/0.92 % (30867)Instruction limit reached!
% 0.70/0.92 % (30867)------------------------------
% 0.70/0.92 % (30867)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.92 % (30867)Termination reason: Unknown
% 0.70/0.92 % (30867)Termination phase: Saturation
% 0.70/0.92
% 0.70/0.92 % (30867)Memory used [KB]: 2042
% 0.70/0.92 % (30867)Time elapsed: 0.024 s
% 0.70/0.92 % (30867)Instructions burned: 42 (million)
% 0.70/0.92 % (30867)------------------------------
% 0.70/0.92 % (30867)------------------------------
% 0.99/0.92 % (30877)lrs+1666_1:1_sil=4000:sp=occurrence:sos=on:urr=on:newcnf=on:i=62:amm=off:ep=R:erd=off:nm=0:plsq=on:plsqr=14,1_0 on Vampire---4 for (2994ds/62Mi)
% 0.99/0.93 % (30858)Instruction limit reached!
% 0.99/0.93 % (30858)------------------------------
% 0.99/0.93 % (30858)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.99/0.93 % (30858)Termination reason: Unknown
% 0.99/0.93 % (30858)Termination phase: Saturation
% 0.99/0.93
% 0.99/0.93 % (30858)Memory used [KB]: 2417
% 0.99/0.93 % (30858)Time elapsed: 0.047 s
% 0.99/0.93 % (30858)Instructions burned: 83 (million)
% 0.99/0.93 % (30858)------------------------------
% 0.99/0.93 % (30858)------------------------------
% 0.99/0.93 % (30878)lrs+21_2461:262144_anc=none:drc=off:sil=2000:sp=occurrence:nwc=6.0:updr=off:st=3.0:i=32:sd=2:afp=4000:erml=3:nm=14:afq=2.0:uhcvi=on:ss=included:er=filter:abs=on:nicw=on:ile=on:sims=off:s2a=on:s2agt=50:s2at=-1.0:plsq=on:plsql=on:plsqc=2:plsqr=1,32:newcnf=on:bd=off:to=lpo_0 on Vampire---4 for (2994ds/32Mi)
% 0.99/0.93 % (30879)dis+1011_1:1_sil=16000:nwc=7.0:s2agt=64:s2a=on:i=1919:ss=axioms:sgt=8:lsd=50:sd=7_0 on Vampire---4 for (2994ds/1919Mi)
% 0.99/0.93 % (30880)ott-32_5:1_sil=4000:sp=occurrence:urr=full:rp=on:nwc=5.0:newcnf=on:st=5.0:s2pl=on:i=55:sd=2:ins=2:ss=included:rawr=on:anc=none:sos=on:s2agt=8:spb=intro:ep=RS:avsq=on:avsqr=27,155:lma=on_0 on Vampire---4 for (2994ds/55Mi)
% 0.99/0.93 % (30874)Refutation not found, incomplete strategy% (30874)------------------------------
% 0.99/0.93 % (30874)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.99/0.93 % (30874)Termination reason: Refutation not found, incomplete strategy
% 0.99/0.93
% 0.99/0.93 % (30874)Memory used [KB]: 1351
% 0.99/0.93 % (30874)Time elapsed: 0.013 s
% 0.99/0.93 % (30874)Instructions burned: 21 (million)
% 0.99/0.93 % (30874)------------------------------
% 0.99/0.93 % (30874)------------------------------
% 0.99/0.93 % (30882)lrs-1011_1:1_sil=2000:sos=on:urr=on:i=53:sd=1:bd=off:ins=3:av=off:ss=axioms:sgt=16:gsp=on:lsd=10_0 on Vampire---4 for (2994ds/53Mi)
% 0.99/0.93 % (30884)lrs+1011_6929:65536_anc=all_dependent:sil=2000:fde=none:plsqc=1:plsq=on:plsqr=19,8:plsql=on:nwc=3.0:i=46:afp=4000:ep=R:nm=3:fsr=off:afr=on:aer=off:gsp=on_0 on Vampire---4 for (2994ds/46Mi)
% 0.99/0.94 % (30878)Instruction limit reached!
% 0.99/0.94 % (30878)------------------------------
% 0.99/0.94 % (30878)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.99/0.94 % (30878)Termination reason: Unknown
% 0.99/0.94 % (30878)Termination phase: Saturation
% 0.99/0.94
% 0.99/0.94 % (30878)Memory used [KB]: 1618
% 0.99/0.94 % (30878)Time elapsed: 0.019 s
% 0.99/0.94 % (30878)Instructions burned: 32 (million)
% 0.99/0.94 % (30878)------------------------------
% 0.99/0.94 % (30878)------------------------------
% 0.99/0.95 % (30886)dis+10_3:31_sil=2000:sp=frequency:abs=on:acc=on:lcm=reverse:nwc=3.0:alpa=random:st=3.0:i=102:sd=1:nm=4:ins=1:aer=off:ss=axioms_0 on Vampire---4 for (2994ds/102Mi)
% 0.99/0.95 % (30886)Refutation not found, incomplete strategy% (30886)------------------------------
% 0.99/0.95 % (30886)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.99/0.95 % (30886)Termination reason: Refutation not found, incomplete strategy
% 0.99/0.95
% 0.99/0.95 % (30886)Memory used [KB]: 1193
% 0.99/0.95 % (30886)Time elapsed: 0.005 s
% 0.99/0.95 % (30886)Instructions burned: 5 (million)
% 0.99/0.95 % (30886)------------------------------
% 0.99/0.95 % (30886)------------------------------
% 0.99/0.95 % (30880)Instruction limit reached!
% 0.99/0.95 % (30880)------------------------------
% 0.99/0.95 % (30880)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.99/0.95 % (30880)Termination reason: Unknown
% 0.99/0.95 % (30880)Termination phase: Saturation
% 0.99/0.95
% 0.99/0.95 % (30880)Memory used [KB]: 2492
% 0.99/0.95 % (30880)Time elapsed: 0.029 s
% 0.99/0.95 % (30880)Instructions burned: 55 (million)
% 0.99/0.95 % (30880)------------------------------
% 0.99/0.95 % (30880)------------------------------
% 0.99/0.95 % (30887)ott+1011_9:29_slsqr=3,2:sil=2000:tgt=ground:lsd=10:lcm=predicate:avsqc=4:slsq=on:avsq=on:i=35:s2at=4.0:add=large:sd=1:avsqr=1,16:aer=off:ss=axioms:sgt=100:rawr=on:s2a=on:sac=on:afp=1:nwc=10.0:nm=64:bd=preordered:abs=on:rnwc=on:er=filter:nicw=on:spb=non_intro:lma=on_0 on Vampire---4 for (2994ds/35Mi)
% 0.99/0.96 % (30877)Instruction limit reached!
% 0.99/0.96 % (30877)------------------------------
% 0.99/0.96 % (30877)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.99/0.96 % (30877)Termination reason: Unknown
% 0.99/0.96 % (30877)Termination phase: Saturation
% 0.99/0.96
% 0.99/0.96 % (30877)Memory used [KB]: 2388
% 0.99/0.96 % (30877)Time elapsed: 0.034 s
% 0.99/0.96 % (30877)Instructions burned: 62 (million)
% 0.99/0.96 % (30877)------------------------------
% 0.99/0.96 % (30877)------------------------------
% 0.99/0.96 % (30882)Instruction limit reached!
% 0.99/0.96 % (30882)------------------------------
% 0.99/0.96 % (30882)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.99/0.96 % (30882)Termination reason: Unknown
% 0.99/0.96 % (30882)Termination phase: Saturation
% 0.99/0.96
% 0.99/0.96 % (30882)Memory used [KB]: 1773
% 0.99/0.96 % (30882)Time elapsed: 0.030 s
% 0.99/0.96 % (30882)Instructions burned: 54 (million)
% 0.99/0.96 % (30882)------------------------------
% 0.99/0.96 % (30882)------------------------------
% 0.99/0.96 % (30888)dis+1003_1:1024_sil=4000:urr=on:newcnf=on:i=87:av=off:fsr=off:bce=on_0 on Vampire---4 for (2994ds/87Mi)
% 0.99/0.96 % (30884)Instruction limit reached!
% 0.99/0.96 % (30884)------------------------------
% 0.99/0.96 % (30884)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.99/0.96 % (30884)Termination reason: Unknown
% 0.99/0.96 % (30884)Termination phase: Saturation
% 0.99/0.96
% 0.99/0.96 % (30884)Memory used [KB]: 1717
% 0.99/0.96 % (30884)Time elapsed: 0.029 s
% 0.99/0.96 % (30884)Instructions burned: 47 (million)
% 0.99/0.96 % (30884)------------------------------
% 0.99/0.96 % (30884)------------------------------
% 0.99/0.96 % (30889)dis+1010_12107:524288_anc=none:drc=encompass:sil=2000:bsd=on:rp=on:nwc=10.0:alpa=random:i=109:kws=precedence:awrs=decay:awrsf=2:nm=16:ins=3:rawr=on:s2a=on:s2at=4.5:acc=on:flr=on_0 on Vampire---4 for (2994ds/109Mi)
% 0.99/0.96 % (30890)lrs+1002_1:16_sil=2000:sp=occurrence:sos=on:i=161:aac=none:bd=off:ss=included:sd=5:st=2.5:sup=off_0 on Vampire---4 for (2994ds/161Mi)
% 0.99/0.96 % (30887)Refutation not found, incomplete strategy% (30887)------------------------------
% 0.99/0.96 % (30887)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.99/0.96 % (30887)Termination reason: Refutation not found, incomplete strategy
% 0.99/0.96
% 0.99/0.96 % (30887)Memory used [KB]: 1265
% 0.99/0.96 % (30887)Time elapsed: 0.010 s
% 0.99/0.96 % (30887)Instructions burned: 16 (million)
% 0.99/0.96 % (30887)------------------------------
% 0.99/0.96 % (30887)------------------------------
% 0.99/0.96 % (30893)lrs-1002_2:9_anc=none:sil=2000:plsqc=1:plsq=on:avsql=on:plsqr=2859761,1048576:erd=off:rp=on:nwc=21.7107:newcnf=on:avsq=on:i=69:aac=none:avsqr=6317,1048576:ep=RS:fsr=off:rawr=on:afp=50:afq=2.133940627822616:sac=on_0 on Vampire---4 for (2994ds/69Mi)
% 0.99/0.97 % (30890)Refutation not found, incomplete strategy% (30890)------------------------------
% 0.99/0.97 % (30890)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.99/0.97 % (30890)Termination reason: Refutation not found, incomplete strategy
% 0.99/0.97
% 0.99/0.97 % (30890)Memory used [KB]: 1203
% 0.99/0.97 % (30890)Time elapsed: 0.006 s
% 0.99/0.97 % (30890)Instructions burned: 8 (million)
% 0.99/0.97 % (30890)------------------------------
% 0.99/0.97 % (30890)------------------------------
% 0.99/0.97 % (30894)lrs+1010_1:512_sil=8000:tgt=ground:spb=units:gs=on:lwlo=on:nicw=on:gsem=on:st=1.5:i=40:nm=21:ss=included:nwc=5.3:afp=4000:afq=1.38:ins=1:bs=unit_only:awrs=converge:awrsf=10:bce=on_0 on Vampire---4 for (2994ds/40Mi)
% 0.99/0.97 % (30895)ott+1011_1:3_drc=off:sil=4000:tgt=ground:fde=unused:plsq=on:sp=unary_first:fd=preordered:nwc=10.0:i=360:ins=1:rawr=on:bd=preordered_0 on Vampire---4 for (2994ds/360Mi)
% 0.99/0.97 % (30875)Instruction limit reached!
% 0.99/0.97 % (30875)------------------------------
% 0.99/0.97 % (30875)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.99/0.97 % (30875)Termination reason: Unknown
% 0.99/0.97 % (30875)Termination phase: Saturation
% 0.99/0.97
% 0.99/0.97 % (30875)Memory used [KB]: 2303
% 0.99/0.97 % (30875)Time elapsed: 0.053 s
% 0.99/0.97 % (30875)Instructions burned: 94 (million)
% 0.99/0.97 % (30875)------------------------------
% 0.99/0.97 % (30875)------------------------------
% 0.99/0.97 % (30893)Refutation not found, incomplete strategy% (30893)------------------------------
% 0.99/0.97 % (30893)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.99/0.97 % (30893)Termination reason: Refutation not found, incomplete strategy
% 0.99/0.97
% 0.99/0.97 % (30893)Memory used [KB]: 1327
% 0.99/0.97 % (30893)Time elapsed: 0.032 s
% 0.99/0.97 % (30893)Instructions burned: 16 (million)
% 0.99/0.97 % (30893)------------------------------
% 0.99/0.97 % (30893)------------------------------
% 0.99/0.97 % (30896)dis+10_1:4_to=lpo:sil=2000:sos=on:spb=goal:rp=on:sac=on:newcnf=on:i=161:ss=axioms:aac=none_0 on Vampire---4 for (2993ds/161Mi)
% 0.99/0.97 % (30879)First to succeed.
% 1.31/0.98 % (30897)lrs+1011_1:20_sil=4000:tgt=ground:i=80:sd=1:bd=off:nm=32:av=off:ss=axioms:lsd=60_0 on Vampire---4 for (2993ds/80Mi)
% 1.31/0.98 % (30868)Refutation not found, incomplete strategy% (30868)------------------------------
% 1.31/0.98 % (30868)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 1.31/0.98 % (30868)Termination reason: Refutation not found, incomplete strategy
% 1.31/0.98
% 1.31/0.98 % (30868)Memory used [KB]: 1777
% 1.31/0.98 % (30868)Time elapsed: 0.077 s
% 1.31/0.98 % (30868)Instructions burned: 130 (million)
% 1.31/0.98 % (30868)------------------------------
% 1.31/0.98 % (30868)------------------------------
% 1.31/0.98 % (30896)Refutation not found, incomplete strategy% (30896)------------------------------
% 1.31/0.98 % (30896)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 1.31/0.98 % (30896)Termination reason: Refutation not found, incomplete strategy
% 1.31/0.98
% 1.31/0.98 % (30896)Memory used [KB]: 1178
% 1.31/0.98 % (30896)Time elapsed: 0.005 s
% 1.31/0.98 % (30896)Instructions burned: 5 (million)
% 1.31/0.98 % (30896)------------------------------
% 1.31/0.98 % (30896)------------------------------
% 1.31/0.98 % (30897)Refutation not found, incomplete strategy% (30897)------------------------------
% 1.31/0.98 % (30897)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 1.31/0.98 % (30897)Termination reason: Refutation not found, incomplete strategy
% 1.31/0.98
% 1.31/0.98 % (30897)Memory used [KB]: 1153
% 1.31/0.98 % (30897)Time elapsed: 0.003 s
% 1.31/0.98 % (30897)Instructions burned: 3 (million)
% 1.31/0.98 % (30897)------------------------------
% 1.31/0.98 % (30897)------------------------------
% 1.31/0.98 % (30879)Refutation found. Thanks to Tanya!
% 1.31/0.98 % SZS status Theorem for Vampire---4
% 1.31/0.98 % SZS output start Proof for Vampire---4
% See solution above
% 1.31/0.98 % (30879)------------------------------
% 1.31/0.98 % (30879)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 1.31/0.98 % (30879)Termination reason: Refutation
% 1.31/0.98
% 1.31/0.98 % (30879)Memory used [KB]: 1698
% 1.31/0.98 % (30879)Time elapsed: 0.053 s
% 1.31/0.98 % (30879)Instructions burned: 84 (million)
% 1.31/0.98 % (30879)------------------------------
% 1.31/0.98 % (30879)------------------------------
% 1.31/0.98 % (30787)Success in time 0.615 s
% 1.31/0.98 % Vampire---4.8 exiting
%------------------------------------------------------------------------------