TSTP Solution File: SWW964+1 by Vampire---4.8

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : Vampire---4.8
% Problem  : SWW964+1 : TPTP v8.1.2. Released v7.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule file --schedule_file /export/starexec/sandbox2/solver/bin/quickGreedyProduceRating_steal_pow3.txt --cores 8 -m 12000 -t %d %s

% Computer : n015.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Wed May  1 04:32:45 EDT 2024

% Result   : Theorem 1.31s 0.98s
% Output   : Refutation 1.31s
% Verified : 
% SZS Type : Refutation
%            Derivation depth      :   16
%            Number of leaves      :   39
% Syntax   : Number of formulae    :  170 (  32 unt;   0 def)
%            Number of atoms       :  450 (  39 equ)
%            Maximal formula atoms :    8 (   2 avg)
%            Number of connectives :  495 ( 215   ~; 205   |;  30   &)
%                                         (  12 <=>;  33  =>;   0  <=;   0 <~>)
%            Maximal formula depth :   12 (   5 avg)
%            Maximal term depth    :    7 (   2 avg)
%            Number of predicates  :   17 (  15 usr;  13 prp; 0-2 aty)
%            Number of functors    :   30 (  30 usr;   7 con; 0-4 aty)
%            Number of variables   :  277 ( 275   !;   2   ?)

% Comments : 
%------------------------------------------------------------------------------
fof(f1381,plain,
    $false,
    inference(avatar_sat_refutation,[],[f494,f506,f524,f533,f539,f541,f897,f1152,f1235,f1340,f1355,f1375,f1380]) ).

fof(f1380,plain,
    ( spl1_7
    | ~ spl1_1 ),
    inference(avatar_split_clause,[],[f1379,f482,f510]) ).

fof(f510,plain,
    ( spl1_7
  <=> ! [X1] : ~ pred_attacker(X1) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_7])]) ).

fof(f482,plain,
    ( spl1_1
  <=> ! [X2,X0] :
        ( ~ pred_attacker(tuple_client_B_in_5(X2))
        | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X2,name_skB)) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_1])]) ).

fof(f1379,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl1_1 ),
    inference(resolution,[],[f1376,f413]) ).

fof(f413,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_5(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f304]) ).

fof(f304,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_5(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f221]) ).

fof(f221,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_5(X0)) ),
    inference(rectify,[],[f140]) ).

fof(f140,axiom,
    ! [X118] :
      ( pred_attacker(X118)
     => pred_attacker(tuple_client_B_in_5(X118)) ),
    file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax139) ).

fof(f1376,plain,
    ( ! [X2] : ~ pred_attacker(tuple_client_B_in_5(X2))
    | ~ spl1_1 ),
    inference(subsumption_resolution,[],[f483,f398]) ).

fof(f398,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
    inference(cnf_transformation,[],[f206]) ).

fof(f206,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
    inference(rectify,[],[f96]) ).

fof(f96,axiom,
    ! [X49,X50] : pred_eq_bitstring_bitstring(X49,X50),
    file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax95) ).

fof(f483,plain,
    ( ! [X2,X0] :
        ( ~ pred_attacker(tuple_client_B_in_5(X2))
        | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X2,name_skB)) )
    | ~ spl1_1 ),
    inference(avatar_component_clause,[],[f482]) ).

fof(f1375,plain,
    ( spl1_5
    | ~ spl1_66 ),
    inference(avatar_contradiction_clause,[],[f1374]) ).

fof(f1374,plain,
    ( $false
    | spl1_5
    | ~ spl1_66 ),
    inference(resolution,[],[f1354,f501]) ).

fof(f501,plain,
    ( ~ pred_attacker(name_Nb(sK0))
    | spl1_5 ),
    inference(avatar_component_clause,[],[f499]) ).

fof(f499,plain,
    ( spl1_5
  <=> pred_attacker(name_Nb(sK0)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_5])]) ).

fof(f1354,plain,
    ( ! [X1] : pred_attacker(name_Nb(X1))
    | ~ spl1_66 ),
    inference(avatar_component_clause,[],[f1353]) ).

fof(f1353,plain,
    ( spl1_66
  <=> ! [X1] : pred_attacker(name_Nb(X1)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_66])]) ).

fof(f1355,plain,
    ( spl1_66
    | spl1_7
    | ~ spl1_63 ),
    inference(avatar_split_clause,[],[f1351,f1298,f510,f1353]) ).

fof(f1298,plain,
    ( spl1_63
  <=> ! [X2,X1] :
        ( pred_attacker(constr_ecb_enc_1(name_Nb(X1),X2))
        | ~ pred_attacker(X2) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_63])]) ).

fof(f1351,plain,
    ( ! [X0,X1] :
        ( ~ pred_attacker(X0)
        | pred_attacker(name_Nb(X1)) )
    | ~ spl1_63 ),
    inference(subsumption_resolution,[],[f1342,f399]) ).

fof(f399,plain,
    ! [X0] :
      ( pred_attacker(constr_pkey(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f292]) ).

fof(f292,plain,
    ! [X0] :
      ( pred_attacker(constr_pkey(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f207]) ).

fof(f207,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(constr_pkey(X0)) ),
    inference(rectify,[],[f106]) ).

fof(f106,axiom,
    ! [X60] :
      ( pred_attacker(X60)
     => pred_attacker(constr_pkey(X60)) ),
    file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax105) ).

fof(f1342,plain,
    ( ! [X0,X1] :
        ( ~ pred_attacker(constr_pkey(X0))
        | ~ pred_attacker(X0)
        | pred_attacker(name_Nb(X1)) )
    | ~ spl1_63 ),
    inference(resolution,[],[f1299,f558]) ).

fof(f558,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(constr_ecb_enc_1(X0,constr_pkey(X1)))
      | ~ pred_attacker(X1)
      | pred_attacker(X0) ),
    inference(superposition,[],[f404,f405]) ).

fof(f405,plain,
    ! [X0,X1] : constr_ecb_dec_1(constr_ecb_enc_1(X1,constr_pkey(X0)),X0) = X1,
    inference(cnf_transformation,[],[f213]) ).

fof(f213,plain,
    ! [X0,X1] : constr_ecb_dec_1(constr_ecb_enc_1(X1,constr_pkey(X0)),X0) = X1,
    inference(rectify,[],[f85]) ).

fof(f85,axiom,
    ! [X18,X19] : constr_ecb_dec_1(constr_ecb_enc_1(X19,constr_pkey(X18)),X18) = X19,
    file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax84) ).

fof(f404,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_ecb_dec_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f298]) ).

fof(f298,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_ecb_dec_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f297]) ).

fof(f297,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_ecb_dec_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f212]) ).

fof(f212,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(constr_ecb_dec_1(X0,X1)) ),
    inference(rectify,[],[f131]) ).

fof(f131,axiom,
    ! [X104,X105] :
      ( ( pred_attacker(X105)
        & pred_attacker(X104) )
     => pred_attacker(constr_ecb_dec_1(X104,X105)) ),
    file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax130) ).

fof(f1299,plain,
    ( ! [X2,X1] :
        ( pred_attacker(constr_ecb_enc_1(name_Nb(X1),X2))
        | ~ pred_attacker(X2) )
    | ~ spl1_63 ),
    inference(avatar_component_clause,[],[f1298]) ).

fof(f1340,plain,
    ( spl1_7
    | spl1_63
    | ~ spl1_58 ),
    inference(avatar_split_clause,[],[f1331,f1233,f1298,f510]) ).

fof(f1233,plain,
    ( spl1_58
  <=> ! [X2,X1,X3] :
        ( ~ pred_attacker(X1)
        | ~ pred_attacker(X2)
        | pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),X2),constr_ecb_enc_1(name_Nb(X3),X2),constr_ecb_enc_1(name_B,X2))) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_58])]) ).

fof(f1331,plain,
    ( ! [X2,X0,X1] :
        ( ~ pred_attacker(X0)
        | ~ pred_attacker(X1)
        | pred_attacker(constr_ecb_enc_1(name_Nb(X2),X0)) )
    | ~ spl1_58 ),
    inference(resolution,[],[f1234,f450]) ).

fof(f450,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(tuple_3(X0,X1,X2))
      | pred_attacker(X1) ),
    inference(cnf_transformation,[],[f337]) ).

fof(f337,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(X1)
      | ~ pred_attacker(tuple_3(X0,X1,X2)) ),
    inference(ennf_transformation,[],[f258]) ).

fof(f258,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_3(X0,X1,X2))
     => pred_attacker(X1) ),
    inference(rectify,[],[f170]) ).

fof(f170,axiom,
    ! [X166,X167,X168] :
      ( pred_attacker(tuple_3(X166,X167,X168))
     => pred_attacker(X167) ),
    file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax169) ).

fof(f1234,plain,
    ( ! [X2,X3,X1] :
        ( pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),X2),constr_ecb_enc_1(name_Nb(X3),X2),constr_ecb_enc_1(name_B,X2)))
        | ~ pred_attacker(X2)
        | ~ pred_attacker(X1) )
    | ~ spl1_58 ),
    inference(avatar_component_clause,[],[f1233]) ).

fof(f1235,plain,
    ( spl1_58
    | spl1_17
    | ~ spl1_52 ),
    inference(avatar_split_clause,[],[f1229,f1150,f686,f1233]) ).

fof(f686,plain,
    ( spl1_17
  <=> ! [X0] :
        ( ~ pred_attacker(X0)
        | name_B = X0
        | name_A = X0 ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_17])]) ).

fof(f1150,plain,
    ( spl1_52
  <=> ! [X0,X3,X2,X1] :
        ( ~ pred_attacker(X0)
        | ~ pred_attacker(X3)
        | ~ pred_table(tuple_keys(X3,X1))
        | pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),X1),constr_ecb_enc_1(name_Nb(X2),X1),constr_ecb_enc_1(name_B,X1))) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_52])]) ).

fof(f1229,plain,
    ( ! [X2,X3,X0,X1] :
        ( ~ pred_attacker(X0)
        | ~ pred_attacker(X1)
        | pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),X2),constr_ecb_enc_1(name_Nb(X3),X2),constr_ecb_enc_1(name_B,X2)))
        | ~ pred_attacker(X2)
        | name_A = X0
        | name_B = X0 )
    | ~ spl1_52 ),
    inference(duplicate_literal_removal,[],[f1228]) ).

fof(f1228,plain,
    ( ! [X2,X3,X0,X1] :
        ( ~ pred_attacker(X0)
        | ~ pred_attacker(X1)
        | pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),X2),constr_ecb_enc_1(name_Nb(X3),X2),constr_ecb_enc_1(name_B,X2)))
        | ~ pred_attacker(X0)
        | ~ pred_attacker(X2)
        | name_A = X0
        | name_B = X0 )
    | ~ spl1_52 ),
    inference(resolution,[],[f1151,f586]) ).

fof(f586,plain,
    ! [X0,X1] :
      ( pred_table(tuple_keys(X1,X0))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0)
      | name_A = X1
      | name_B = X1 ),
    inference(resolution,[],[f472,f460]) ).

fof(f460,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | pred_table(tuple_keys(X0,X1))
      | name_A = X0
      | name_B = X0 ),
    inference(cnf_transformation,[],[f350]) ).

fof(f350,plain,
    ! [X0,X1] :
      ( pred_table(tuple_keys(X0,X1))
      | ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | name_A = X0
      | name_B = X0 ),
    inference(flattening,[],[f349]) ).

fof(f349,plain,
    ! [X0,X1] :
      ( pred_table(tuple_keys(X0,X1))
      | ~ pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | name_A = X0
      | name_B = X0 ),
    inference(ennf_transformation,[],[f268]) ).

fof(f268,plain,
    ! [X0,X1] :
      ( ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
        & name_A != X0
        & name_B != X0 )
     => pred_table(tuple_keys(X0,X1)) ),
    inference(rectify,[],[f195]) ).

fof(f195,axiom,
    ! [X199,X200] :
      ( ( pred_attacker(tuple_key_register_server_in_1(X199,X200))
        & name_A != X199
        & name_B != X199 )
     => pred_table(tuple_keys(X199,X200)) ),
    file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax194) ).

fof(f472,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f363]) ).

fof(f363,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f362]) ).

fof(f362,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_register_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f278]) ).

fof(f278,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(tuple_key_register_server_in_1(X0,X1)) ),
    inference(rectify,[],[f118]) ).

fof(f118,axiom,
    ! [X75,X76] :
      ( ( pred_attacker(X76)
        & pred_attacker(X75) )
     => pred_attacker(tuple_key_register_server_in_1(X75,X76)) ),
    file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax117) ).

fof(f1151,plain,
    ( ! [X2,X3,X0,X1] :
        ( ~ pred_table(tuple_keys(X3,X1))
        | ~ pred_attacker(X3)
        | ~ pred_attacker(X0)
        | pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),X1),constr_ecb_enc_1(name_Nb(X2),X1),constr_ecb_enc_1(name_B,X1))) )
    | ~ spl1_52 ),
    inference(avatar_component_clause,[],[f1150]) ).

fof(f1152,plain,
    ( spl1_7
    | spl1_52 ),
    inference(avatar_split_clause,[],[f1148,f1150,f510]) ).

fof(f1148,plain,
    ! [X2,X3,X0,X1,X4] :
      ( ~ pred_attacker(X0)
      | pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),X1),constr_ecb_enc_1(name_Nb(X2),X1),constr_ecb_enc_1(name_B,X1)))
      | ~ pred_table(tuple_keys(X3,X1))
      | ~ pred_attacker(X3)
      | ~ pred_attacker(X4) ),
    inference(resolution,[],[f809,f467]) ).

fof(f467,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f356]) ).

fof(f356,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f355]) ).

fof(f355,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_in_1(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f273]) ).

fof(f273,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(tuple_key_retrieval_server_in_1(X0,X1)) ),
    inference(rectify,[],[f115]) ).

fof(f115,axiom,
    ! [X69,X70] :
      ( ( pred_attacker(X70)
        & pred_attacker(X69) )
     => pred_attacker(tuple_key_retrieval_server_in_1(X69,X70)) ),
    file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax114) ).

fof(f809,plain,
    ! [X2,X3,X0,X1,X4] :
      ( ~ pred_attacker(tuple_key_retrieval_server_in_1(X4,X1))
      | ~ pred_attacker(X0)
      | pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),X2),constr_ecb_enc_1(name_Nb(X3),X2),constr_ecb_enc_1(name_B,X2)))
      | ~ pred_table(tuple_keys(X1,X2)) ),
    inference(forward_demodulation,[],[f808,f422]) ).

fof(f422,plain,
    ! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
    inference(cnf_transformation,[],[f230]) ).

fof(f230,plain,
    ! [X0,X1] : constr_tuple_2_get_1_bitstring(tuple_2(X0,X1)) = X1,
    inference(rectify,[],[f90]) ).

fof(f90,axiom,
    ! [X35,X36] : constr_tuple_2_get_1_bitstring(tuple_2(X35,X36)) = X36,
    file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax89) ).

fof(f808,plain,
    ! [X2,X3,X0,X1,X4] :
      ( pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),constr_tuple_2_get_1_bitstring(tuple_2(X1,X2))),constr_ecb_enc_1(name_Nb(X3),constr_tuple_2_get_1_bitstring(tuple_2(X1,X2))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(tuple_2(X1,X2)))))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X4,X1))
      | ~ pred_table(tuple_keys(X1,X2)) ),
    inference(resolution,[],[f740,f549]) ).

fof(f549,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(constr_sign(tuple_2(X0,X1),name_skS))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
      | ~ pred_table(tuple_keys(X0,X1)) ),
    inference(resolution,[],[f463,f446]) ).

fof(f446,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
      | ~ pred_table(tuple_keys(X0,X1)) ),
    inference(cnf_transformation,[],[f333]) ).

fof(f333,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
      | ~ pred_table(tuple_keys(X0,X1)) ),
    inference(flattening,[],[f332]) ).

fof(f332,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS)))
      | ~ pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
      | ~ pred_table(tuple_keys(X0,X1)) ),
    inference(ennf_transformation,[],[f254]) ).

fof(f254,plain,
    ! [X0,X1,X2] :
      ( ( pred_attacker(tuple_key_retrieval_server_in_1(X2,X0))
        & pred_table(tuple_keys(X0,X1)) )
     => pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X0,X1),name_skS))) ),
    inference(rectify,[],[f194]) ).

fof(f194,axiom,
    ! [X196,X197,X198] :
      ( ( pred_attacker(tuple_key_retrieval_server_in_1(X198,X196))
        & pred_table(tuple_keys(X196,X197)) )
     => pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(X196,X197),name_skS))) ),
    file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax193) ).

fof(f463,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_key_retrieval_server_out_2(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f351]) ).

fof(f351,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_key_retrieval_server_out_2(X0)) ),
    inference(ennf_transformation,[],[f269]) ).

fof(f269,plain,
    ! [X0] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f114]) ).

fof(f114,axiom,
    ! [X68] :
      ( pred_attacker(tuple_key_retrieval_server_out_2(X68))
     => pred_attacker(X68) ),
    file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax113) ).

fof(f740,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(constr_sign(X0,name_skS))
      | pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(X0)),constr_ecb_enc_1(name_Nb(X2),constr_tuple_2_get_1_bitstring(X0)),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(X0))))
      | ~ pred_attacker(X1) ),
    inference(superposition,[],[f652,f401]) ).

fof(f401,plain,
    ! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
    inference(cnf_transformation,[],[f209]) ).

fof(f209,plain,
    ! [X0,X1] : constr_checksign(constr_sign(X1,X0),constr_pkey(X0)) = X1,
    inference(rectify,[],[f81]) ).

fof(f81,axiom,
    ! [X4,X5] : constr_checksign(constr_sign(X5,X4),constr_pkey(X4)) = X5,
    file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax80) ).

fof(f652,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X2),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(resolution,[],[f612,f415]) ).

fof(f415,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_3(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f306]) ).

fof(f306,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_3(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f223]) ).

fof(f223,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_3(X0)) ),
    inference(rectify,[],[f142]) ).

fof(f142,axiom,
    ! [X120] :
      ( pred_attacker(X120)
     => pred_attacker(tuple_client_B_in_3(X120)) ),
    file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax141) ).

fof(f612,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(tuple_client_B_in_3(X0))
      | pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X2),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
      | ~ pred_attacker(X1) ),
    inference(resolution,[],[f547,f417]) ).

fof(f417,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f308]) ).

fof(f308,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f225]) ).

fof(f225,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_B_in_2(X0)) ),
    inference(rectify,[],[f144]) ).

fof(f144,axiom,
    ! [X122] :
      ( pred_attacker(X122)
     => pred_attacker(tuple_client_B_in_2(X122)) ),
    file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax143) ).

fof(f547,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(tuple_client_B_in_2(X1))
      | pred_attacker(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X0,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X2),constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X1,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_3(X0)) ),
    inference(resolution,[],[f425,f535]) ).

fof(f535,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_B_out_4(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_attacker(tuple_client_B_in_3(X1)) ),
    inference(subsumption_resolution,[],[f534,f398]) ).

fof(f534,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_B_out_4(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ),
    inference(subsumption_resolution,[],[f473,f398]) ).

fof(f473,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_B_out_4(tuple_3(constr_ecb_enc_1(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_Nb(X0),constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))),constr_ecb_enc_1(name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ),
    inference(definition_unfolding,[],[f377,f419]) ).

fof(f419,plain,
    ! [X2,X3,X0,X1] : constr_ecb_enc_3(X1,X2,X3,X0) = tuple_3(constr_ecb_enc_1(X1,X0),constr_ecb_enc_1(X2,X0),constr_ecb_enc_1(X3,X0)),
    inference(cnf_transformation,[],[f227]) ).

fof(f227,plain,
    ! [X0,X1,X2,X3] : constr_ecb_enc_3(X1,X2,X3,X0) = tuple_3(constr_ecb_enc_1(X1,X0),constr_ecb_enc_1(X2,X0),constr_ecb_enc_1(X3,X0)),
    inference(rectify,[],[f87]) ).

fof(f87,axiom,
    ! [X25,X26,X27,X28] : constr_ecb_enc_3(X26,X27,X28,X25) = tuple_3(constr_ecb_enc_1(X26,X25),constr_ecb_enc_1(X27,X25),constr_ecb_enc_1(X28,X25)),
    file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax86) ).

fof(f377,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X0),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ),
    inference(cnf_transformation,[],[f287]) ).

fof(f287,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X0),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ),
    inference(flattening,[],[f286]) ).

fof(f286,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X0),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS))))))
      | ~ pred_attacker(tuple_client_B_in_2(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ),
    inference(ennf_transformation,[],[f203]) ).

fof(f203,plain,
    ! [X0,X1,X2] :
      ( ( pred_attacker(tuple_client_B_in_2(X2))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_3(X1))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) )
     => pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X1,name_skB)),name_Nb(X0),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X2,constr_pkey(name_skS)))))) ),
    inference(rectify,[],[f192]) ).

fof(f192,axiom,
    ! [X189,X190,X191] :
      ( ( pred_attacker(tuple_client_B_in_2(X191))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X191,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_3(X190))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X190,name_skB))) )
     => pred_attacker(tuple_client_B_out_4(constr_ecb_enc_3(constr_tuple_2_get_0x30_bitstring(constr_ecb_dec_2(X190,name_skB)),name_Nb(X189),name_B,constr_tuple_2_get_1_bitstring(constr_checksign(X191,constr_pkey(name_skS)))))) ),
    file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax191) ).

fof(f425,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_B_out_4(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f313]) ).

fof(f313,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_B_out_4(X0)) ),
    inference(ennf_transformation,[],[f233]) ).

fof(f233,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_out_4(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f136]) ).

fof(f136,axiom,
    ! [X111] :
      ( pred_attacker(tuple_client_B_out_4(X111))
     => pred_attacker(X111) ),
    file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax135) ).

fof(f897,plain,
    ~ spl1_17,
    inference(avatar_contradiction_clause,[],[f896]) ).

fof(f896,plain,
    ( $false
    | ~ spl1_17 ),
    inference(subsumption_resolution,[],[f895,f391]) ).

fof(f391,plain,
    name_A != name_I,
    inference(cnf_transformation,[],[f52]) ).

fof(f52,axiom,
    name_A != name_I,
    file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax51) ).

fof(f895,plain,
    ( name_A = name_I
    | ~ spl1_17 ),
    inference(subsumption_resolution,[],[f832,f390]) ).

fof(f390,plain,
    name_B != name_I,
    inference(cnf_transformation,[],[f58]) ).

fof(f58,axiom,
    name_B != name_I,
    file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax57) ).

fof(f832,plain,
    ( name_B = name_I
    | name_A = name_I
    | ~ spl1_17 ),
    inference(resolution,[],[f687,f388]) ).

fof(f388,plain,
    pred_attacker(name_I),
    inference(cnf_transformation,[],[f178]) ).

fof(f178,axiom,
    pred_attacker(name_I),
    file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax177) ).

fof(f687,plain,
    ( ! [X0] :
        ( ~ pred_attacker(X0)
        | name_B = X0
        | name_A = X0 )
    | ~ spl1_17 ),
    inference(avatar_component_clause,[],[f686]) ).

fof(f541,plain,
    ( spl1_6
    | ~ spl1_4 ),
    inference(avatar_split_clause,[],[f540,f491,f503]) ).

fof(f503,plain,
    ( spl1_6
  <=> pred_attacker(name_objective) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_6])]) ).

fof(f491,plain,
    ( spl1_4
  <=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_4])]) ).

fof(f540,plain,
    ( pred_attacker(name_objective)
    | ~ spl1_4 ),
    inference(resolution,[],[f493,f410]) ).

fof(f410,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_B_out_6(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f301]) ).

fof(f301,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_B_out_6(X0)) ),
    inference(ennf_transformation,[],[f218]) ).

fof(f218,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_B_out_6(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f134]) ).

fof(f134,axiom,
    ! [X109] :
      ( pred_attacker(tuple_client_B_out_6(X109))
     => pred_attacker(X109) ),
    file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax133) ).

fof(f493,plain,
    ( pred_attacker(tuple_client_B_out_6(name_objective))
    | ~ spl1_4 ),
    inference(avatar_component_clause,[],[f491]) ).

fof(f539,plain,
    ( spl1_7
    | ~ spl1_3 ),
    inference(avatar_split_clause,[],[f538,f488,f510]) ).

fof(f488,plain,
    ( spl1_3
  <=> ! [X3] :
        ( ~ pred_attacker(tuple_client_B_in_2(X3))
        | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS)))) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_3])]) ).

fof(f538,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl1_3 ),
    inference(subsumption_resolution,[],[f417,f536]) ).

fof(f536,plain,
    ( ! [X3] : ~ pred_attacker(tuple_client_B_in_2(X3))
    | ~ spl1_3 ),
    inference(subsumption_resolution,[],[f489,f398]) ).

fof(f489,plain,
    ( ! [X3] :
        ( ~ pred_attacker(tuple_client_B_in_2(X3))
        | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS)))) )
    | ~ spl1_3 ),
    inference(avatar_component_clause,[],[f488]) ).

fof(f533,plain,
    ( spl1_7
    | ~ spl1_2 ),
    inference(avatar_split_clause,[],[f532,f485,f510]) ).

fof(f485,plain,
    ( spl1_2
  <=> ! [X1] :
        ( ~ pred_attacker(tuple_client_B_in_3(X1))
        | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB))) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_2])]) ).

fof(f532,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl1_2 ),
    inference(subsumption_resolution,[],[f415,f527]) ).

fof(f527,plain,
    ( ! [X0] : ~ pred_attacker(tuple_client_B_in_3(X0))
    | ~ spl1_2 ),
    inference(resolution,[],[f398,f486]) ).

fof(f486,plain,
    ( ! [X1] :
        ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
        | ~ pred_attacker(tuple_client_B_in_3(X1)) )
    | ~ spl1_2 ),
    inference(avatar_component_clause,[],[f485]) ).

fof(f524,plain,
    ~ spl1_7,
    inference(avatar_contradiction_clause,[],[f517]) ).

fof(f517,plain,
    ( $false
    | ~ spl1_7 ),
    inference(resolution,[],[f511,f395]) ).

fof(f395,plain,
    pred_attacker(name_A),
    inference(cnf_transformation,[],[f180]) ).

fof(f180,axiom,
    pred_attacker(name_A),
    file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax179) ).

fof(f511,plain,
    ( ! [X1] : ~ pred_attacker(X1)
    | ~ spl1_7 ),
    inference(avatar_component_clause,[],[f510]) ).

fof(f506,plain,
    ( ~ spl1_5
    | ~ spl1_6 ),
    inference(avatar_split_clause,[],[f495,f503,f499]) ).

fof(f495,plain,
    ( ~ pred_attacker(name_objective)
    | ~ pred_attacker(name_Nb(sK0)) ),
    inference(resolution,[],[f375,f366]) ).

fof(f366,plain,
    ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
    inference(cnf_transformation,[],[f365]) ).

fof(f365,plain,
    ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)),
    inference(skolemisation,[status(esa),new_symbols(skolem,[sK0])],[f279,f364]) ).

fof(f364,plain,
    ( ? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective))
   => ~ pred_attacker(tuple_2(name_Nb(sK0),name_objective)) ),
    introduced(choice_axiom,[]) ).

fof(f279,plain,
    ? [X0] : ~ pred_attacker(tuple_2(name_Nb(X0),name_objective)),
    inference(ennf_transformation,[],[f198]) ).

fof(f198,plain,
    ~ ! [X0] : pred_attacker(tuple_2(name_Nb(X0),name_objective)),
    inference(rectify,[],[f197]) ).

fof(f197,negated_conjecture,
    ~ ! [X201] : pred_attacker(tuple_2(name_Nb(X201),name_objective)),
    inference(negated_conjecture,[],[f196]) ).

fof(f196,conjecture,
    ! [X201] : pred_attacker(tuple_2(name_Nb(X201),name_objective)),
    file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',co0) ).

fof(f375,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f283]) ).

fof(f283,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f282]) ).

fof(f282,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X0,X1))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f201]) ).

fof(f201,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(tuple_2(X0,X1)) ),
    inference(rectify,[],[f172]) ).

fof(f172,axiom,
    ! [X172,X173] :
      ( ( pred_attacker(X173)
        & pred_attacker(X172) )
     => pred_attacker(tuple_2(X172,X173)) ),
    file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax171) ).

fof(f494,plain,
    ( spl1_1
    | spl1_2
    | spl1_3
    | spl1_4 ),
    inference(avatar_split_clause,[],[f376,f491,f488,f485,f482]) ).

fof(f376,plain,
    ! [X2,X3,X0,X1] :
      ( pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_2(X3))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_5(X2))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X2,name_skB)) ),
    inference(cnf_transformation,[],[f285]) ).

fof(f285,plain,
    ! [X0,X1,X2,X3] :
      ( pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_2(X3))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_5(X2))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X2,name_skB)) ),
    inference(flattening,[],[f284]) ).

fof(f284,plain,
    ! [X0,X1,X2,X3] :
      ( pred_attacker(tuple_client_B_out_6(name_objective))
      | ~ pred_attacker(tuple_client_B_in_2(X3))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
      | ~ pred_attacker(tuple_client_B_in_3(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
      | ~ pred_attacker(tuple_client_B_in_5(X2))
      | ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X2,name_skB)) ),
    inference(ennf_transformation,[],[f202]) ).

fof(f202,plain,
    ! [X0,X1,X2,X3] :
      ( ( pred_attacker(tuple_client_B_in_2(X3))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_3(X1))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X1,name_skB)))
        & pred_attacker(tuple_client_B_in_5(X2))
        & pred_eq_bitstring_bitstring(name_Nb(X0),constr_ecb_dec_1(X2,name_skB)) )
     => pred_attacker(tuple_client_B_out_6(name_objective)) ),
    inference(rectify,[],[f193]) ).

fof(f193,axiom,
    ! [X192,X193,X194,X195] :
      ( ( pred_attacker(tuple_client_B_in_2(X195))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X195,constr_pkey(name_skS))))
        & pred_attacker(tuple_client_B_in_3(X193))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_ecb_dec_2(X193,name_skB)))
        & pred_attacker(tuple_client_B_in_5(X194))
        & pred_eq_bitstring_bitstring(name_Nb(X192),constr_ecb_dec_1(X194,name_skB)) )
     => pred_attacker(tuple_client_B_out_6(name_objective)) ),
    file('/export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603',ax192) ).

%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.03/0.13  % Problem    : SWW964+1 : TPTP v8.1.2. Released v7.4.0.
% 0.03/0.15  % Command    : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule file --schedule_file /export/starexec/sandbox2/solver/bin/quickGreedyProduceRating_steal_pow3.txt --cores 8 -m 12000 -t %d %s
% 0.14/0.36  % Computer : n015.cluster.edu
% 0.14/0.36  % Model    : x86_64 x86_64
% 0.14/0.36  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.14/0.36  % Memory   : 8042.1875MB
% 0.14/0.36  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.14/0.36  % CPULimit   : 300
% 0.14/0.36  % WCLimit    : 300
% 0.14/0.36  % DateTime   : Tue Apr 30 18:19:48 EDT 2024
% 0.14/0.36  % CPUTime    : 
% 0.14/0.36  This is a FOF_THM_RFO_SEQ problem
% 0.14/0.36  Running vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule file --schedule_file /export/starexec/sandbox2/solver/bin/quickGreedyProduceRating_steal_pow3.txt --cores 8 -m 12000 -t 300 /export/starexec/sandbox2/tmp/tmp.S4amWH0v1Q/Vampire---4.8_30603
% 0.70/0.88  % (30854)lrs+1011_1:1_sil=8000:sp=occurrence:nwc=10.0:i=78:ss=axioms:sgt=8_0 on Vampire---4 for (2994ds/78Mi)
% 0.70/0.88  % (30855)ott+1011_1:1_sil=2000:urr=on:i=33:sd=1:kws=inv_frequency:ss=axioms:sup=off_0 on Vampire---4 for (2994ds/33Mi)
% 0.70/0.88  % (30852)dis-1011_2:1_sil=2000:lsd=20:nwc=5.0:flr=on:mep=off:st=3.0:i=34:sd=1:ep=RS:ss=axioms_0 on Vampire---4 for (2994ds/34Mi)
% 0.70/0.88  % (30857)lrs+1002_1:16_to=lpo:sil=32000:sp=unary_frequency:sos=on:i=45:bd=off:ss=axioms_0 on Vampire---4 for (2994ds/45Mi)
% 0.70/0.88  % (30853)lrs+1011_461:32768_sil=16000:irw=on:sp=frequency:lsd=20:fd=preordered:nwc=10.0:s2agt=32:alpa=false:cond=fast:s2a=on:i=51:s2at=3.0:awrs=decay:awrsf=691:bd=off:nm=20:fsr=off:amm=sco:uhcvi=on:rawr=on_0 on Vampire---4 for (2994ds/51Mi)
% 0.70/0.88  % (30856)lrs+2_1:1_sil=16000:fde=none:sos=all:nwc=5.0:i=34:ep=RS:s2pl=on:lma=on:afp=100000_0 on Vampire---4 for (2994ds/34Mi)
% 0.70/0.88  % (30858)lrs+21_1:5_sil=2000:sos=on:urr=on:newcnf=on:slsq=on:i=83:slsql=off:bd=off:nm=2:ss=axioms:st=1.5:sp=const_min:gsp=on:rawr=on_0 on Vampire---4 for (2994ds/83Mi)
% 0.70/0.88  % (30859)lrs-21_1:1_to=lpo:sil=2000:sp=frequency:sos=on:lma=on:i=56:sd=2:ss=axioms:ep=R_0 on Vampire---4 for (2994ds/56Mi)
% 0.70/0.88  % (30852)Refutation not found, incomplete strategy% (30852)------------------------------
% 0.70/0.88  % (30852)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.88  % (30852)Termination reason: Refutation not found, incomplete strategy
% 0.70/0.88  
% 0.70/0.88  % (30852)Memory used [KB]: 1159
% 0.70/0.88  % (30852)Time elapsed: 0.004 s
% 0.70/0.88  % (30852)Instructions burned: 4 (million)
% 0.70/0.88  % (30852)------------------------------
% 0.70/0.88  % (30852)------------------------------
% 0.70/0.88  % (30859)Refutation not found, incomplete strategy% (30859)------------------------------
% 0.70/0.88  % (30859)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.88  % (30859)Termination reason: Refutation not found, incomplete strategy
% 0.70/0.88  
% 0.70/0.88  % (30859)Memory used [KB]: 1175
% 0.70/0.88  % (30859)Time elapsed: 0.004 s
% 0.70/0.88  % (30859)Instructions burned: 4 (million)
% 0.70/0.88  % (30859)------------------------------
% 0.70/0.88  % (30859)------------------------------
% 0.70/0.88  % (30857)Refutation not found, incomplete strategy% (30857)------------------------------
% 0.70/0.88  % (30857)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.88  % (30857)Termination reason: Refutation not found, incomplete strategy
% 0.70/0.88  
% 0.70/0.88  % (30857)Memory used [KB]: 1176
% 0.70/0.88  % (30857)Time elapsed: 0.004 s
% 0.70/0.88  % (30857)Instructions burned: 5 (million)
% 0.70/0.88  % (30857)------------------------------
% 0.70/0.88  % (30857)------------------------------
% 0.70/0.88  % (30856)Refutation not found, incomplete strategy% (30856)------------------------------
% 0.70/0.88  % (30856)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.88  % (30856)Termination reason: Refutation not found, incomplete strategy
% 0.70/0.88  
% 0.70/0.88  % (30856)Memory used [KB]: 1270
% 0.70/0.88  % (30856)Time elapsed: 0.006 s
% 0.70/0.89  % (30856)Instructions burned: 8 (million)
% 0.70/0.89  % (30856)------------------------------
% 0.70/0.89  % (30856)------------------------------
% 0.70/0.89  % (30860)lrs+21_1:16_sil=2000:sp=occurrence:urr=on:flr=on:i=55:sd=1:nm=0:ins=3:ss=included:rawr=on:br=off_0 on Vampire---4 for (2994ds/55Mi)
% 0.70/0.89  % (30861)dis+3_25:4_sil=16000:sos=all:erd=off:i=50:s2at=4.0:bd=off:nm=60:sup=off:cond=on:av=off:ins=2:nwc=10.0:etr=on:to=lpo:s2agt=20:fd=off:bsr=unit_only:slsq=on:slsqr=28,19:awrs=converge:awrsf=500:tgt=ground:bs=unit_only_0 on Vampire---4 for (2994ds/50Mi)
% 0.70/0.89  % (30862)lrs+1010_1:2_sil=4000:tgt=ground:nwc=10.0:st=2.0:i=208:sd=1:bd=off:ss=axioms_0 on Vampire---4 for (2994ds/208Mi)
% 0.70/0.89  % (30864)lrs-1011_1:1_sil=4000:plsq=on:plsqr=32,1:sp=frequency:plsql=on:nwc=10.0:i=52:aac=none:afr=on:ss=axioms:er=filter:sgt=16:rawr=on:etr=on:lma=on_0 on Vampire---4 for (2994ds/52Mi)
% 0.70/0.89  % (30862)Refutation not found, incomplete strategy% (30862)------------------------------
% 0.70/0.89  % (30862)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.89  % (30862)Termination reason: Refutation not found, incomplete strategy
% 0.70/0.89  
% 0.70/0.89  % (30862)Memory used [KB]: 1156
% 0.70/0.89  % (30862)Time elapsed: 0.004 s
% 0.70/0.89  % (30862)Instructions burned: 4 (million)
% 0.70/0.89  % (30862)------------------------------
% 0.70/0.89  % (30862)------------------------------
% 0.70/0.89  % (30866)lrs-1010_1:1_to=lpo:sil=2000:sp=reverse_arity:sos=on:urr=ec_only:i=518:sd=2:bd=off:ss=axioms:sgt=16_0 on Vampire---4 for (2994ds/518Mi)
% 0.70/0.90  % (30866)Refutation not found, incomplete strategy% (30866)------------------------------
% 0.70/0.90  % (30866)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.90  % (30866)Termination reason: Refutation not found, incomplete strategy
% 0.70/0.90  
% 0.70/0.90  % (30866)Memory used [KB]: 1190
% 0.70/0.90  % (30866)Time elapsed: 0.006 s
% 0.70/0.90  % (30866)Instructions burned: 8 (million)
% 0.70/0.90  % (30866)------------------------------
% 0.70/0.90  % (30866)------------------------------
% 0.70/0.90  % (30855)Instruction limit reached!
% 0.70/0.90  % (30855)------------------------------
% 0.70/0.90  % (30855)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.90  % (30855)Termination reason: Unknown
% 0.70/0.90  % (30855)Termination phase: Saturation
% 0.70/0.90  
% 0.70/0.90  % (30855)Memory used [KB]: 1686
% 0.70/0.90  % (30855)Time elapsed: 0.020 s
% 0.70/0.90  % (30855)Instructions burned: 33 (million)
% 0.70/0.90  % (30855)------------------------------
% 0.70/0.90  % (30855)------------------------------
% 0.70/0.90  % (30867)lrs+1011_87677:1048576_sil=8000:sos=on:spb=non_intro:nwc=10.0:kmz=on:i=42:ep=RS:nm=0:ins=1:uhcvi=on:rawr=on:fde=unused:afp=2000:afq=1.444:plsq=on:nicw=on_0 on Vampire---4 for (2994ds/42Mi)
% 0.70/0.90  % (30868)dis+1011_1258907:1048576_bsr=unit_only:to=lpo:drc=off:sil=2000:tgt=full:fde=none:sp=frequency:spb=goal:rnwc=on:nwc=6.70083:sac=on:newcnf=on:st=2:i=243:bs=unit_only:sd=3:afp=300:awrs=decay:awrsf=218:nm=16:ins=3:afq=3.76821:afr=on:ss=axioms:sgt=5:rawr=on:add=off:bsd=on_0 on Vampire---4 for (2994ds/243Mi)
% 0.70/0.91  % (30853)Instruction limit reached!
% 0.70/0.91  % (30853)------------------------------
% 0.70/0.91  % (30853)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.91  % (30853)Termination reason: Unknown
% 0.70/0.91  % (30853)Termination phase: Saturation
% 0.70/0.91  
% 0.70/0.91  % (30853)Memory used [KB]: 1852
% 0.70/0.91  % (30853)Time elapsed: 0.032 s
% 0.70/0.91  % (30853)Instructions burned: 51 (million)
% 0.70/0.91  % (30853)------------------------------
% 0.70/0.91  % (30853)------------------------------
% 0.70/0.91  % (30861)Instruction limit reached!
% 0.70/0.91  % (30861)------------------------------
% 0.70/0.91  % (30861)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.91  % (30861)Termination reason: Unknown
% 0.70/0.91  % (30861)Termination phase: Saturation
% 0.70/0.91  
% 0.70/0.91  % (30861)Memory used [KB]: 1981
% 0.70/0.91  % (30861)Time elapsed: 0.028 s
% 0.70/0.91  % (30861)Instructions burned: 51 (million)
% 0.70/0.91  % (30861)------------------------------
% 0.70/0.91  % (30861)------------------------------
% 0.70/0.91  % (30872)lrs+1011_2:9_sil=2000:lsd=10:newcnf=on:i=117:sd=2:awrs=decay:ss=included:amm=off:ep=R_0 on Vampire---4 for (2994ds/117Mi)
% 0.70/0.92  % (30860)Instruction limit reached!
% 0.70/0.92  % (30860)------------------------------
% 0.70/0.92  % (30860)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.92  % (30860)Termination reason: Unknown
% 0.70/0.92  % (30860)Termination phase: Saturation
% 0.70/0.92  
% 0.70/0.92  % (30860)Memory used [KB]: 2177
% 0.70/0.92  % (30860)Time elapsed: 0.031 s
% 0.70/0.92  % (30860)Instructions burned: 56 (million)
% 0.70/0.92  % (30860)------------------------------
% 0.70/0.92  % (30860)------------------------------
% 0.70/0.92  % (30874)dis+1011_11:1_sil=2000:avsq=on:i=143:avsqr=1,16:ep=RS:rawr=on:aac=none:lsd=100:mep=off:fde=none:newcnf=on:bsr=unit_only_0 on Vampire---4 for (2994ds/143Mi)
% 0.70/0.92  % (30875)lrs+1011_1:2_to=lpo:sil=8000:plsqc=1:plsq=on:plsqr=326,59:sp=weighted_frequency:plsql=on:nwc=10.0:newcnf=on:i=93:awrs=converge:awrsf=200:bd=off:ins=1:rawr=on:alpa=false:avsq=on:avsqr=1,16_0 on Vampire---4 for (2994ds/93Mi)
% 0.70/0.92  % (30864)Instruction limit reached!
% 0.70/0.92  % (30864)------------------------------
% 0.70/0.92  % (30864)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.92  % (30864)Termination reason: Unknown
% 0.70/0.92  % (30864)Termination phase: Saturation
% 0.70/0.92  
% 0.70/0.92  % (30864)Memory used [KB]: 1763
% 0.70/0.92  % (30864)Time elapsed: 0.034 s
% 0.70/0.92  % (30864)Instructions burned: 52 (million)
% 0.70/0.92  % (30864)------------------------------
% 0.70/0.92  % (30864)------------------------------
% 0.70/0.92  % (30872)Refutation not found, incomplete strategy% (30872)------------------------------
% 0.70/0.92  % (30872)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.92  % (30872)Termination reason: Refutation not found, incomplete strategy
% 0.70/0.92  
% 0.70/0.92  % (30872)Memory used [KB]: 1335
% 0.70/0.92  % (30872)Time elapsed: 0.011 s
% 0.70/0.92  % (30872)Instructions burned: 16 (million)
% 0.70/0.92  % (30872)------------------------------
% 0.70/0.92  % (30872)------------------------------
% 0.70/0.92  % (30854)Instruction limit reached!
% 0.70/0.92  % (30854)------------------------------
% 0.70/0.92  % (30854)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.92  % (30854)Termination reason: Unknown
% 0.70/0.92  % (30854)Termination phase: Saturation
% 0.70/0.92  
% 0.70/0.92  % (30854)Memory used [KB]: 1948
% 0.70/0.92  % (30854)Time elapsed: 0.045 s
% 0.70/0.92  % (30854)Instructions burned: 78 (million)
% 0.70/0.92  % (30854)------------------------------
% 0.70/0.92  % (30854)------------------------------
% 0.70/0.92  % (30867)Instruction limit reached!
% 0.70/0.92  % (30867)------------------------------
% 0.70/0.92  % (30867)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.70/0.92  % (30867)Termination reason: Unknown
% 0.70/0.92  % (30867)Termination phase: Saturation
% 0.70/0.92  
% 0.70/0.92  % (30867)Memory used [KB]: 2042
% 0.70/0.92  % (30867)Time elapsed: 0.024 s
% 0.70/0.92  % (30867)Instructions burned: 42 (million)
% 0.70/0.92  % (30867)------------------------------
% 0.70/0.92  % (30867)------------------------------
% 0.99/0.92  % (30877)lrs+1666_1:1_sil=4000:sp=occurrence:sos=on:urr=on:newcnf=on:i=62:amm=off:ep=R:erd=off:nm=0:plsq=on:plsqr=14,1_0 on Vampire---4 for (2994ds/62Mi)
% 0.99/0.93  % (30858)Instruction limit reached!
% 0.99/0.93  % (30858)------------------------------
% 0.99/0.93  % (30858)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.99/0.93  % (30858)Termination reason: Unknown
% 0.99/0.93  % (30858)Termination phase: Saturation
% 0.99/0.93  
% 0.99/0.93  % (30858)Memory used [KB]: 2417
% 0.99/0.93  % (30858)Time elapsed: 0.047 s
% 0.99/0.93  % (30858)Instructions burned: 83 (million)
% 0.99/0.93  % (30858)------------------------------
% 0.99/0.93  % (30858)------------------------------
% 0.99/0.93  % (30878)lrs+21_2461:262144_anc=none:drc=off:sil=2000:sp=occurrence:nwc=6.0:updr=off:st=3.0:i=32:sd=2:afp=4000:erml=3:nm=14:afq=2.0:uhcvi=on:ss=included:er=filter:abs=on:nicw=on:ile=on:sims=off:s2a=on:s2agt=50:s2at=-1.0:plsq=on:plsql=on:plsqc=2:plsqr=1,32:newcnf=on:bd=off:to=lpo_0 on Vampire---4 for (2994ds/32Mi)
% 0.99/0.93  % (30879)dis+1011_1:1_sil=16000:nwc=7.0:s2agt=64:s2a=on:i=1919:ss=axioms:sgt=8:lsd=50:sd=7_0 on Vampire---4 for (2994ds/1919Mi)
% 0.99/0.93  % (30880)ott-32_5:1_sil=4000:sp=occurrence:urr=full:rp=on:nwc=5.0:newcnf=on:st=5.0:s2pl=on:i=55:sd=2:ins=2:ss=included:rawr=on:anc=none:sos=on:s2agt=8:spb=intro:ep=RS:avsq=on:avsqr=27,155:lma=on_0 on Vampire---4 for (2994ds/55Mi)
% 0.99/0.93  % (30874)Refutation not found, incomplete strategy% (30874)------------------------------
% 0.99/0.93  % (30874)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.99/0.93  % (30874)Termination reason: Refutation not found, incomplete strategy
% 0.99/0.93  
% 0.99/0.93  % (30874)Memory used [KB]: 1351
% 0.99/0.93  % (30874)Time elapsed: 0.013 s
% 0.99/0.93  % (30874)Instructions burned: 21 (million)
% 0.99/0.93  % (30874)------------------------------
% 0.99/0.93  % (30874)------------------------------
% 0.99/0.93  % (30882)lrs-1011_1:1_sil=2000:sos=on:urr=on:i=53:sd=1:bd=off:ins=3:av=off:ss=axioms:sgt=16:gsp=on:lsd=10_0 on Vampire---4 for (2994ds/53Mi)
% 0.99/0.93  % (30884)lrs+1011_6929:65536_anc=all_dependent:sil=2000:fde=none:plsqc=1:plsq=on:plsqr=19,8:plsql=on:nwc=3.0:i=46:afp=4000:ep=R:nm=3:fsr=off:afr=on:aer=off:gsp=on_0 on Vampire---4 for (2994ds/46Mi)
% 0.99/0.94  % (30878)Instruction limit reached!
% 0.99/0.94  % (30878)------------------------------
% 0.99/0.94  % (30878)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.99/0.94  % (30878)Termination reason: Unknown
% 0.99/0.94  % (30878)Termination phase: Saturation
% 0.99/0.94  
% 0.99/0.94  % (30878)Memory used [KB]: 1618
% 0.99/0.94  % (30878)Time elapsed: 0.019 s
% 0.99/0.94  % (30878)Instructions burned: 32 (million)
% 0.99/0.94  % (30878)------------------------------
% 0.99/0.94  % (30878)------------------------------
% 0.99/0.95  % (30886)dis+10_3:31_sil=2000:sp=frequency:abs=on:acc=on:lcm=reverse:nwc=3.0:alpa=random:st=3.0:i=102:sd=1:nm=4:ins=1:aer=off:ss=axioms_0 on Vampire---4 for (2994ds/102Mi)
% 0.99/0.95  % (30886)Refutation not found, incomplete strategy% (30886)------------------------------
% 0.99/0.95  % (30886)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.99/0.95  % (30886)Termination reason: Refutation not found, incomplete strategy
% 0.99/0.95  
% 0.99/0.95  % (30886)Memory used [KB]: 1193
% 0.99/0.95  % (30886)Time elapsed: 0.005 s
% 0.99/0.95  % (30886)Instructions burned: 5 (million)
% 0.99/0.95  % (30886)------------------------------
% 0.99/0.95  % (30886)------------------------------
% 0.99/0.95  % (30880)Instruction limit reached!
% 0.99/0.95  % (30880)------------------------------
% 0.99/0.95  % (30880)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.99/0.95  % (30880)Termination reason: Unknown
% 0.99/0.95  % (30880)Termination phase: Saturation
% 0.99/0.95  
% 0.99/0.95  % (30880)Memory used [KB]: 2492
% 0.99/0.95  % (30880)Time elapsed: 0.029 s
% 0.99/0.95  % (30880)Instructions burned: 55 (million)
% 0.99/0.95  % (30880)------------------------------
% 0.99/0.95  % (30880)------------------------------
% 0.99/0.95  % (30887)ott+1011_9:29_slsqr=3,2:sil=2000:tgt=ground:lsd=10:lcm=predicate:avsqc=4:slsq=on:avsq=on:i=35:s2at=4.0:add=large:sd=1:avsqr=1,16:aer=off:ss=axioms:sgt=100:rawr=on:s2a=on:sac=on:afp=1:nwc=10.0:nm=64:bd=preordered:abs=on:rnwc=on:er=filter:nicw=on:spb=non_intro:lma=on_0 on Vampire---4 for (2994ds/35Mi)
% 0.99/0.96  % (30877)Instruction limit reached!
% 0.99/0.96  % (30877)------------------------------
% 0.99/0.96  % (30877)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.99/0.96  % (30877)Termination reason: Unknown
% 0.99/0.96  % (30877)Termination phase: Saturation
% 0.99/0.96  
% 0.99/0.96  % (30877)Memory used [KB]: 2388
% 0.99/0.96  % (30877)Time elapsed: 0.034 s
% 0.99/0.96  % (30877)Instructions burned: 62 (million)
% 0.99/0.96  % (30877)------------------------------
% 0.99/0.96  % (30877)------------------------------
% 0.99/0.96  % (30882)Instruction limit reached!
% 0.99/0.96  % (30882)------------------------------
% 0.99/0.96  % (30882)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.99/0.96  % (30882)Termination reason: Unknown
% 0.99/0.96  % (30882)Termination phase: Saturation
% 0.99/0.96  
% 0.99/0.96  % (30882)Memory used [KB]: 1773
% 0.99/0.96  % (30882)Time elapsed: 0.030 s
% 0.99/0.96  % (30882)Instructions burned: 54 (million)
% 0.99/0.96  % (30882)------------------------------
% 0.99/0.96  % (30882)------------------------------
% 0.99/0.96  % (30888)dis+1003_1:1024_sil=4000:urr=on:newcnf=on:i=87:av=off:fsr=off:bce=on_0 on Vampire---4 for (2994ds/87Mi)
% 0.99/0.96  % (30884)Instruction limit reached!
% 0.99/0.96  % (30884)------------------------------
% 0.99/0.96  % (30884)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.99/0.96  % (30884)Termination reason: Unknown
% 0.99/0.96  % (30884)Termination phase: Saturation
% 0.99/0.96  
% 0.99/0.96  % (30884)Memory used [KB]: 1717
% 0.99/0.96  % (30884)Time elapsed: 0.029 s
% 0.99/0.96  % (30884)Instructions burned: 47 (million)
% 0.99/0.96  % (30884)------------------------------
% 0.99/0.96  % (30884)------------------------------
% 0.99/0.96  % (30889)dis+1010_12107:524288_anc=none:drc=encompass:sil=2000:bsd=on:rp=on:nwc=10.0:alpa=random:i=109:kws=precedence:awrs=decay:awrsf=2:nm=16:ins=3:rawr=on:s2a=on:s2at=4.5:acc=on:flr=on_0 on Vampire---4 for (2994ds/109Mi)
% 0.99/0.96  % (30890)lrs+1002_1:16_sil=2000:sp=occurrence:sos=on:i=161:aac=none:bd=off:ss=included:sd=5:st=2.5:sup=off_0 on Vampire---4 for (2994ds/161Mi)
% 0.99/0.96  % (30887)Refutation not found, incomplete strategy% (30887)------------------------------
% 0.99/0.96  % (30887)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.99/0.96  % (30887)Termination reason: Refutation not found, incomplete strategy
% 0.99/0.96  
% 0.99/0.96  % (30887)Memory used [KB]: 1265
% 0.99/0.96  % (30887)Time elapsed: 0.010 s
% 0.99/0.96  % (30887)Instructions burned: 16 (million)
% 0.99/0.96  % (30887)------------------------------
% 0.99/0.96  % (30887)------------------------------
% 0.99/0.96  % (30893)lrs-1002_2:9_anc=none:sil=2000:plsqc=1:plsq=on:avsql=on:plsqr=2859761,1048576:erd=off:rp=on:nwc=21.7107:newcnf=on:avsq=on:i=69:aac=none:avsqr=6317,1048576:ep=RS:fsr=off:rawr=on:afp=50:afq=2.133940627822616:sac=on_0 on Vampire---4 for (2994ds/69Mi)
% 0.99/0.97  % (30890)Refutation not found, incomplete strategy% (30890)------------------------------
% 0.99/0.97  % (30890)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.99/0.97  % (30890)Termination reason: Refutation not found, incomplete strategy
% 0.99/0.97  
% 0.99/0.97  % (30890)Memory used [KB]: 1203
% 0.99/0.97  % (30890)Time elapsed: 0.006 s
% 0.99/0.97  % (30890)Instructions burned: 8 (million)
% 0.99/0.97  % (30890)------------------------------
% 0.99/0.97  % (30890)------------------------------
% 0.99/0.97  % (30894)lrs+1010_1:512_sil=8000:tgt=ground:spb=units:gs=on:lwlo=on:nicw=on:gsem=on:st=1.5:i=40:nm=21:ss=included:nwc=5.3:afp=4000:afq=1.38:ins=1:bs=unit_only:awrs=converge:awrsf=10:bce=on_0 on Vampire---4 for (2994ds/40Mi)
% 0.99/0.97  % (30895)ott+1011_1:3_drc=off:sil=4000:tgt=ground:fde=unused:plsq=on:sp=unary_first:fd=preordered:nwc=10.0:i=360:ins=1:rawr=on:bd=preordered_0 on Vampire---4 for (2994ds/360Mi)
% 0.99/0.97  % (30875)Instruction limit reached!
% 0.99/0.97  % (30875)------------------------------
% 0.99/0.97  % (30875)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.99/0.97  % (30875)Termination reason: Unknown
% 0.99/0.97  % (30875)Termination phase: Saturation
% 0.99/0.97  
% 0.99/0.97  % (30875)Memory used [KB]: 2303
% 0.99/0.97  % (30875)Time elapsed: 0.053 s
% 0.99/0.97  % (30875)Instructions burned: 94 (million)
% 0.99/0.97  % (30875)------------------------------
% 0.99/0.97  % (30875)------------------------------
% 0.99/0.97  % (30893)Refutation not found, incomplete strategy% (30893)------------------------------
% 0.99/0.97  % (30893)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.99/0.97  % (30893)Termination reason: Refutation not found, incomplete strategy
% 0.99/0.97  
% 0.99/0.97  % (30893)Memory used [KB]: 1327
% 0.99/0.97  % (30893)Time elapsed: 0.032 s
% 0.99/0.97  % (30893)Instructions burned: 16 (million)
% 0.99/0.97  % (30893)------------------------------
% 0.99/0.97  % (30893)------------------------------
% 0.99/0.97  % (30896)dis+10_1:4_to=lpo:sil=2000:sos=on:spb=goal:rp=on:sac=on:newcnf=on:i=161:ss=axioms:aac=none_0 on Vampire---4 for (2993ds/161Mi)
% 0.99/0.97  % (30879)First to succeed.
% 1.31/0.98  % (30897)lrs+1011_1:20_sil=4000:tgt=ground:i=80:sd=1:bd=off:nm=32:av=off:ss=axioms:lsd=60_0 on Vampire---4 for (2993ds/80Mi)
% 1.31/0.98  % (30868)Refutation not found, incomplete strategy% (30868)------------------------------
% 1.31/0.98  % (30868)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 1.31/0.98  % (30868)Termination reason: Refutation not found, incomplete strategy
% 1.31/0.98  
% 1.31/0.98  % (30868)Memory used [KB]: 1777
% 1.31/0.98  % (30868)Time elapsed: 0.077 s
% 1.31/0.98  % (30868)Instructions burned: 130 (million)
% 1.31/0.98  % (30868)------------------------------
% 1.31/0.98  % (30868)------------------------------
% 1.31/0.98  % (30896)Refutation not found, incomplete strategy% (30896)------------------------------
% 1.31/0.98  % (30896)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 1.31/0.98  % (30896)Termination reason: Refutation not found, incomplete strategy
% 1.31/0.98  
% 1.31/0.98  % (30896)Memory used [KB]: 1178
% 1.31/0.98  % (30896)Time elapsed: 0.005 s
% 1.31/0.98  % (30896)Instructions burned: 5 (million)
% 1.31/0.98  % (30896)------------------------------
% 1.31/0.98  % (30896)------------------------------
% 1.31/0.98  % (30897)Refutation not found, incomplete strategy% (30897)------------------------------
% 1.31/0.98  % (30897)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 1.31/0.98  % (30897)Termination reason: Refutation not found, incomplete strategy
% 1.31/0.98  
% 1.31/0.98  % (30897)Memory used [KB]: 1153
% 1.31/0.98  % (30897)Time elapsed: 0.003 s
% 1.31/0.98  % (30897)Instructions burned: 3 (million)
% 1.31/0.98  % (30897)------------------------------
% 1.31/0.98  % (30897)------------------------------
% 1.31/0.98  % (30879)Refutation found. Thanks to Tanya!
% 1.31/0.98  % SZS status Theorem for Vampire---4
% 1.31/0.98  % SZS output start Proof for Vampire---4
% See solution above
% 1.31/0.98  % (30879)------------------------------
% 1.31/0.98  % (30879)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 1.31/0.98  % (30879)Termination reason: Refutation
% 1.31/0.98  
% 1.31/0.98  % (30879)Memory used [KB]: 1698
% 1.31/0.98  % (30879)Time elapsed: 0.053 s
% 1.31/0.98  % (30879)Instructions burned: 84 (million)
% 1.31/0.98  % (30879)------------------------------
% 1.31/0.98  % (30879)------------------------------
% 1.31/0.98  % (30787)Success in time 0.615 s
% 1.31/0.98  % Vampire---4.8 exiting
%------------------------------------------------------------------------------