TSTP Solution File: SWW965+1 by Otter---3.3

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : Otter---3.3
% Problem  : SWW965+1 : TPTP v8.1.0. Released v7.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : otter-tptp-script %s

% Computer : n028.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Wed Jul 27 13:23:15 EDT 2022

% Result   : Theorem 3.54s 3.70s
% Output   : Refutation 3.54s
% Verified : 
% SZS Type : Refutation
%            Derivation depth      :    4
%            Number of leaves      :    8
% Syntax   : Number of clauses     :   14 (   9 unt;   0 nHn;  13 RR)
%            Number of literals    :   24 (   0 equ;  11 neg)
%            Maximal clause size   :    7 (   1 avg)
%            Maximal term depth    :    4 (   1 avg)
%            Number of predicates  :    3 (   2 usr;   1 prp; 0-2 aty)
%            Number of functors    :   15 (  15 usr;   5 con; 0-2 aty)
%            Number of variables   :   10 (   3 sgn)

% Comments : 
%------------------------------------------------------------------------------
cnf(208,axiom,
    ( ~ pred_attacker(tuple_client_B_out_6(A))
    | pred_attacker(A) ),
    file('SWW965+1.p',unknown),
    [] ).

cnf(214,axiom,
    ( ~ pred_attacker(A)
    | pred_attacker(tuple_client_B_in_5(A)) ),
    file('SWW965+1.p',unknown),
    [] ).

cnf(216,axiom,
    ( ~ pred_attacker(A)
    | pred_attacker(tuple_client_B_in_3(A)) ),
    file('SWW965+1.p',unknown),
    [] ).

cnf(218,axiom,
    ( ~ pred_attacker(A)
    | pred_attacker(tuple_client_B_in_2(A)) ),
    file('SWW965+1.p',unknown),
    [] ).

cnf(242,axiom,
    ( ~ pred_e_q_bitstring_bitstring(name_Nb(A),constr_adec(B,name_skB))
    | ~ pred_attacker(tuple_client_B_in_5(B))
    | ~ pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(C,name_skB)))
    | ~ pred_attacker(tuple_client_B_in_3(C))
    | ~ pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(D,constr_pkey(name_skS))))
    | ~ pred_attacker(tuple_client_B_in_2(D))
    | pred_attacker(tuple_client_B_out_6(name_objective)) ),
    file('SWW965+1.p',unknown),
    [] ).

cnf(245,axiom,
    ~ pred_attacker(name_objective),
    file('SWW965+1.p',unknown),
    [] ).

cnf(284,axiom,
    pred_e_q_bitstring_bitstring(A,B),
    file('SWW965+1.p',unknown),
    [] ).

cnf(285,axiom,
    pred_attacker(tuple_true),
    file('SWW965+1.p',unknown),
    [] ).

cnf(322,plain,
    pred_attacker(tuple_client_B_in_2(tuple_true)),
    inference(hyper,[status(thm)],[285,218]),
    [iquote('hyper,285,218')] ).

cnf(323,plain,
    pred_attacker(tuple_client_B_in_3(tuple_true)),
    inference(hyper,[status(thm)],[285,216]),
    [iquote('hyper,285,216')] ).

cnf(324,plain,
    pred_attacker(tuple_client_B_in_5(tuple_true)),
    inference(hyper,[status(thm)],[285,214]),
    [iquote('hyper,285,214')] ).

cnf(2123,plain,
    pred_attacker(tuple_client_B_out_6(name_objective)),
    inference(hyper,[status(thm)],[324,242,284,284,323,284,322]),
    [iquote('hyper,324,242,284,284,323,284,322')] ).

cnf(2127,plain,
    pred_attacker(name_objective),
    inference(hyper,[status(thm)],[2123,208]),
    [iquote('hyper,2123,208')] ).

cnf(2128,plain,
    $false,
    inference(binary,[status(thm)],[2127,245]),
    [iquote('binary,2127.1,245.1')] ).

%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.11/0.11  % Problem  : SWW965+1 : TPTP v8.1.0. Released v7.4.0.
% 0.11/0.12  % Command  : otter-tptp-script %s
% 0.12/0.33  % Computer : n028.cluster.edu
% 0.12/0.33  % Model    : x86_64 x86_64
% 0.12/0.33  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.12/0.33  % Memory   : 8042.1875MB
% 0.12/0.33  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.12/0.33  % CPULimit : 300
% 0.12/0.33  % WCLimit  : 300
% 0.12/0.33  % DateTime : Wed Jul 27 03:13:18 EDT 2022
% 0.12/0.33  % CPUTime  : 
% 2.07/2.28  ----- Otter 3.3f, August 2004 -----
% 2.07/2.28  The process was started by sandbox on n028.cluster.edu,
% 2.07/2.28  Wed Jul 27 03:13:18 2022
% 2.07/2.28  The command was "./otter".  The process ID is 28997.
% 2.07/2.28  
% 2.07/2.28  set(prolog_style_variables).
% 2.07/2.28  set(auto).
% 2.07/2.28     dependent: set(auto1).
% 2.07/2.28     dependent: set(process_input).
% 2.07/2.28     dependent: clear(print_kept).
% 2.07/2.28     dependent: clear(print_new_demod).
% 2.07/2.28     dependent: clear(print_back_demod).
% 2.07/2.28     dependent: clear(print_back_sub).
% 2.07/2.28     dependent: set(control_memory).
% 2.07/2.28     dependent: assign(max_mem, 12000).
% 2.07/2.28     dependent: assign(pick_given_ratio, 4).
% 2.07/2.28     dependent: assign(stats_level, 1).
% 2.07/2.28     dependent: assign(max_seconds, 10800).
% 2.07/2.28  clear(print_given).
% 2.07/2.28  
% 2.07/2.28  formula_list(usable).
% 2.07/2.28  all A (A=A).
% 2.07/2.28  constr_CONST_0x30!=constr_CONST_1.
% 2.07/2.28  constr_CONST_0x30!=constr_CONST_2.
% 2.07/2.28  constr_CONST_0x30!=constr_CONST_3.
% 2.07/2.28  constr_CONST_0x30!=constr_CONST_4.
% 2.07/2.28  constr_CONST_0x30!=constr_ZERO.
% 2.07/2.28  constr_CONST_0x30!=name_A.
% 2.07/2.28  constr_CONST_0x30!=name_B.
% 2.07/2.28  constr_CONST_0x30!=name_I.
% 2.07/2.28  constr_CONST_0x30!=name_c.
% 2.07/2.28  constr_CONST_0x30!=name_objective.
% 2.07/2.28  constr_CONST_0x30!=name_skA.
% 2.07/2.28  constr_CONST_0x30!=name_skB.
% 2.07/2.28  constr_CONST_0x30!=name_skS.
% 2.07/2.28  constr_CONST_1!=constr_CONST_2.
% 2.07/2.28  constr_CONST_1!=constr_CONST_3.
% 2.07/2.28  constr_CONST_1!=constr_CONST_4.
% 2.07/2.28  constr_CONST_1!=constr_ZERO.
% 2.07/2.28  constr_CONST_1!=name_A.
% 2.07/2.28  constr_CONST_1!=name_B.
% 2.07/2.28  constr_CONST_1!=name_I.
% 2.07/2.28  constr_CONST_1!=name_c.
% 2.07/2.28  constr_CONST_1!=name_objective.
% 2.07/2.28  constr_CONST_1!=name_skA.
% 2.07/2.28  constr_CONST_1!=name_skB.
% 2.07/2.28  constr_CONST_1!=name_skS.
% 2.07/2.28  constr_CONST_2!=constr_CONST_3.
% 2.07/2.28  constr_CONST_2!=constr_CONST_4.
% 2.07/2.28  constr_CONST_2!=constr_ZERO.
% 2.07/2.28  constr_CONST_2!=name_A.
% 2.07/2.28  constr_CONST_2!=name_B.
% 2.07/2.28  constr_CONST_2!=name_I.
% 2.07/2.28  constr_CONST_2!=name_c.
% 2.07/2.28  constr_CONST_2!=name_objective.
% 2.07/2.28  constr_CONST_2!=name_skA.
% 2.07/2.28  constr_CONST_2!=name_skB.
% 2.07/2.28  constr_CONST_2!=name_skS.
% 2.07/2.28  constr_CONST_3!=constr_CONST_4.
% 2.07/2.28  constr_CONST_3!=constr_ZERO.
% 2.07/2.28  constr_CONST_3!=name_A.
% 2.07/2.28  constr_CONST_3!=name_B.
% 2.07/2.28  constr_CONST_3!=name_I.
% 2.07/2.28  constr_CONST_3!=name_c.
% 2.07/2.28  constr_CONST_3!=name_objective.
% 2.07/2.28  constr_CONST_3!=name_skA.
% 2.07/2.28  constr_CONST_3!=name_skB.
% 2.07/2.28  constr_CONST_3!=name_skS.
% 2.07/2.28  constr_CONST_4!=constr_ZERO.
% 2.07/2.28  constr_CONST_4!=name_A.
% 2.07/2.28  constr_CONST_4!=name_B.
% 2.07/2.28  constr_CONST_4!=name_I.
% 2.07/2.28  constr_CONST_4!=name_c.
% 2.07/2.28  constr_CONST_4!=name_objective.
% 2.07/2.28  constr_CONST_4!=name_skA.
% 2.07/2.28  constr_CONST_4!=name_skB.
% 2.07/2.28  constr_CONST_4!=name_skS.
% 2.07/2.28  constr_ZERO!=name_A.
% 2.07/2.28  constr_ZERO!=name_B.
% 2.07/2.28  constr_ZERO!=name_I.
% 2.07/2.28  constr_ZERO!=name_c.
% 2.07/2.28  constr_ZERO!=name_objective.
% 2.07/2.28  constr_ZERO!=name_skA.
% 2.07/2.28  constr_ZERO!=name_skB.
% 2.07/2.28  constr_ZERO!=name_skS.
% 2.07/2.28  name_A!=name_B.
% 2.07/2.28  name_A!=name_I.
% 2.07/2.28  name_A!=name_c.
% 2.07/2.28  name_A!=name_objective.
% 2.07/2.28  name_A!=name_skA.
% 2.07/2.28  name_A!=name_skB.
% 2.07/2.28  name_A!=name_skS.
% 2.07/2.28  name_B!=name_I.
% 2.07/2.28  name_B!=name_c.
% 2.07/2.28  name_B!=name_objective.
% 2.07/2.28  name_B!=name_skA.
% 2.07/2.28  name_B!=name_skB.
% 2.07/2.28  name_B!=name_skS.
% 2.07/2.28  name_I!=name_c.
% 2.07/2.28  name_I!=name_objective.
% 2.07/2.28  name_I!=name_skA.
% 2.07/2.28  name_I!=name_skB.
% 2.07/2.28  name_I!=name_skS.
% 2.07/2.28  name_c!=name_objective.
% 2.07/2.28  name_c!=name_skA.
% 2.07/2.28  name_c!=name_skB.
% 2.07/2.28  name_c!=name_skS.
% 2.07/2.28  name_objective!=name_skA.
% 2.07/2.28  name_objective!=name_skB.
% 2.07/2.28  name_objective!=name_skS.
% 2.07/2.28  name_skA!=name_skB.
% 2.07/2.28  name_skA!=name_skS.
% 2.07/2.28  name_skB!=name_skS.
% 2.07/2.28  all VAR_K_24 VAR_M_23 (constr_adec(constr_aenc(VAR_M_23,constr_pkey(VAR_K_24)),VAR_K_24)=VAR_M_23).
% 2.07/2.28  all VAR_K_22 VAR_M_21 (constr_dec(constr_enc(VAR_M_21,VAR_K_22),VAR_K_22)=VAR_M_21).
% 2.07/2.28  all VAR_K_20X30 VAR_M_19 (constr_getmess(constr_sign(VAR_M_19,VAR_K_20X30))=VAR_M_19).
% 2.07/2.28  all VAR_K_0X30 VAR_M_0X30 (constr_checksign(constr_sign(VAR_M_0X30,VAR_K_0X30),constr_pkey(VAR_K_0X30))=VAR_M_0X30).
% 2.07/2.28  all VAR_X_18 (constr_xor(VAR_X_18,VAR_X_18)=constr_ZERO).
% 2.07/2.28  all VAR_X_17 (constr_xor(VAR_X_17,constr_ZERO)=VAR_X_17).
% 2.07/2.28  all VAR_X_15 VAR_Y_16 (constr_xor(VAR_X_15,VAR_Y_16)=constr_xor(VAR_Y_16,VAR_X_15)).
% 2.07/2.28  all VAR_X_13 VAR_Y_14 VAR_Z_0X30 (constr_xor(VAR_X_13,constr_xor(VAR_Y_14,VAR_Z_0X30))=constr_xor(constr_xor(VAR_X_13,VAR_Y_14),VAR_Z_0X30)).
% 2.07/2.28  all VAR_X0X30_11 VAR_X1_12 (constr_tuple_2_get_1_bitstring(tuple_2(VAR_X0X30_11,VAR_X1_12))=VAR_X1_12).
% 2.07/2.28  all VAR_X0X30_9 VAR_X1_10X30 (constr_tuple_2_get_0x30_bitstring(tuple_2(VAR_X0X30_9,VAR_X1_10X30))=VAR_X0X30_9).
% 2.07/2.28  all VAR_X0X30_7 VAR_X1_8 (constr_tuple_2_get_1(tuple_2(VAR_X0X30_7,VAR_X1_8))=VAR_X1_8).
% 2.07/2.28  all VAR_X0X30_0X30 VAR_X1_0X30 (constr_tuple_2_get_0x30(tuple_2(VAR_X0X30_0X30,VAR_X1_0X30))=VAR_X0X30_0X30).
% 2.07/2.28  all VAR_X_41 VAR_Y_42 pred_e_q_bitstring_bitstring(VAR_X_41,VAR_Y_42).
% 2.07/2.28  all VAR_V_49 VAR_V_50X30 (pred_attacker(VAR_V_49)&pred_attacker(VAR_V_50X30)->pred_attacker(constr_xor(VAR_V_49,VAR_V_50X30))).
% 2.07/2.28  all VAR_V_52 (pred_attacker(VAR_V_52)->pred_attacker(constr_tuple_2_get_1_bitstring(VAR_V_52))).
% 2.07/2.28  all VAR_V_54 (pred_attacker(VAR_V_54)->pred_attacker(constr_tuple_2_get_1(VAR_V_54))).
% 2.07/2.28  all VAR_V_56 (pred_attacker(VAR_V_56)->pred_attacker(constr_tuple_2_get_0x30_bitstring(VAR_V_56))).
% 2.07/2.28  all VAR_V_58 (pred_attacker(VAR_V_58)->pred_attacker(constr_tuple_2_get_0x30(VAR_V_58))).
% 2.07/2.28  pred_attacker(tuple_true).
% 2.07/2.28  all VAR_V_61 VAR_V_62 (pred_attacker(VAR_V_61)&pred_attacker(VAR_V_62)->pred_attacker(constr_sign(VAR_V_61,VAR_V_62))).
% 2.07/2.28  all VAR_V_64 (pred_attacker(VAR_V_64)->pred_attacker(constr_pkey(VAR_V_64))).
% 2.07/2.28  all VAR_V_66 (pred_attacker(VAR_V_66)->pred_attacker(tuple_out_3(VAR_V_66))).
% 2.07/2.28  all VAR_V_69 (pred_attacker(tuple_out_3(VAR_V_69))->pred_attacker(VAR_V_69)).
% 2.07/2.28  all VAR_V_72 (pred_attacker(VAR_V_72)->pred_attacker(tuple_out_2(VAR_V_72))).
% 2.07/2.28  all VAR_V_75 (pred_attacker(tuple_out_2(VAR_V_75))->pred_attacker(VAR_V_75)).
% 2.07/2.28  all VAR_V_78 (pred_attacker(VAR_V_78)->pred_attacker(tuple_out_1(VAR_V_78))).
% 2.07/2.28  all VAR_V_81 (pred_attacker(tuple_out_1(VAR_V_81))->pred_attacker(VAR_V_81)).
% 2.07/2.28  all VAR_V_85 (pred_attacker(VAR_V_85)->pred_attacker(tuple_key_retrieval_server_out_2(VAR_V_85))).
% 2.07/2.28  all VAR_V_88 (pred_attacker(tuple_key_retrieval_server_out_2(VAR_V_88))->pred_attacker(VAR_V_88)).
% 2.07/2.28  all VAR_V_92 VAR_V_93 (pred_attacker(VAR_V_92)&pred_attacker(VAR_V_93)->pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_92,VAR_V_93))).
% 2.07/2.28  all VAR_V_10X300X30 VAR_V_10X301 (pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_10X300X30,VAR_V_10X301))->pred_attacker(VAR_V_10X300X30)).
% 2.07/2.28  all VAR_V_10X303 VAR_V_10X304 (pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_10X303,VAR_V_10X304))->pred_attacker(VAR_V_10X304)).
% 2.07/2.28  all VAR_V_10X308 VAR_V_10X309 (pred_attacker(VAR_V_10X308)&pred_attacker(VAR_V_10X309)->pred_attacker(tuple_key_register_server_in_1(VAR_V_10X308,VAR_V_10X309))).
% 2.07/2.28  all VAR_V_116 VAR_V_117 (pred_attacker(tuple_key_register_server_in_1(VAR_V_116,VAR_V_117))->pred_attacker(VAR_V_116)).
% 2.07/2.28  all VAR_V_119 VAR_V_120X30 (pred_attacker(tuple_key_register_server_in_1(VAR_V_119,VAR_V_120X30))->pred_attacker(VAR_V_120X30)).
% 2.07/2.28  all VAR_V_123 (pred_attacker(VAR_V_123)->pred_attacker(constr_getmess(VAR_V_123))).
% 2.07/2.28  pred_attacker(tuple_false).
% 2.07/2.28  all VAR_V_126 VAR_V_127 (pred_attacker(VAR_V_126)&pred_attacker(VAR_V_127)->pred_attacker(constr_enc(VAR_V_126,VAR_V_127))).
% 2.07/2.28  all VAR_V_130X30 VAR_V_131 (pred_attacker(VAR_V_130X30)&pred_attacker(VAR_V_131)->pred_attacker(constr_dec(VAR_V_130X30,VAR_V_131))).
% 2.07/2.28  all VAR_V_133 (pred_attacker(VAR_V_133)->pred_attacker(tuple_client_B_out_6(VAR_V_133))).
% 2.07/2.28  all VAR_V_136 (pred_attacker(tuple_client_B_out_6(VAR_V_136))->pred_attacker(VAR_V_136)).
% 2.07/2.28  all VAR_V_139 (pred_attacker(VAR_V_139)->pred_attacker(tuple_client_B_out_4(VAR_V_139))).
% 2.07/2.28  all VAR_V_142 (pred_attacker(tuple_client_B_out_4(VAR_V_142))->pred_attacker(VAR_V_142)).
% 2.07/2.28  all VAR_V_146 VAR_V_147 (pred_attacker(VAR_V_146)&pred_attacker(VAR_V_147)->pred_attacker(tuple_client_B_out_1(VAR_V_146,VAR_V_147))).
% 2.07/2.28  all VAR_V_154 VAR_V_155 (pred_attacker(tuple_client_B_out_1(VAR_V_154,VAR_V_155))->pred_attacker(VAR_V_154)).
% 2.07/2.28  all VAR_V_157 VAR_V_158 (pred_attacker(tuple_client_B_out_1(VAR_V_157,VAR_V_158))->pred_attacker(VAR_V_158)).
% 2.07/2.28  all VAR_V_161 (pred_attacker(VAR_V_161)->pred_attacker(tuple_client_B_in_5(VAR_V_161))).
% 2.07/2.28  all VAR_V_164 (pred_attacker(tuple_client_B_in_5(VAR_V_164))->pred_attacker(VAR_V_164)).
% 2.07/2.28  all VAR_V_167 (pred_attacker(VAR_V_167)->pred_attacker(tuple_client_B_in_3(VAR_V_167))).
% 2.07/2.28  all VAR_V_170X30 (pred_attacker(tuple_client_B_in_3(VAR_V_170X30))->pred_attacker(VAR_V_170X30)).
% 2.07/2.28  all VAR_V_173 (pred_attacker(VAR_V_173)->pred_attacker(tuple_client_B_in_2(VAR_V_173))).
% 2.07/2.28  all VAR_V_176 (pred_attacker(tuple_client_B_in_2(VAR_V_176))->pred_attacker(VAR_V_176)).
% 2.07/2.28  all VAR_V_179 (pred_attacker(VAR_V_179)->pred_attacker(tuple_client_A_out_5(VAR_V_179))).
% 2.07/2.28  all VAR_V_182 (pred_attacker(tuple_client_A_out_5(VAR_V_182))->pred_attacker(VAR_V_182)).
% 2.07/2.28  all VAR_V_185 (pred_attacker(VAR_V_185)->pred_attacker(tuple_client_A_out_3(VAR_V_185))).
% 2.07/2.28  all VAR_V_188 (pred_attacker(tuple_client_A_out_3(VAR_V_188))->pred_attacker(VAR_V_188)).
% 2.07/2.28  all VAR_V_192 VAR_V_193 (pred_attacker(VAR_V_192)&pred_attacker(VAR_V_193)->pred_attacker(tuple_client_A_out_1(VAR_V_192,VAR_V_193))).
% 2.07/2.28  all VAR_V_20X300X30 VAR_V_20X301 (pred_attacker(tuple_client_A_out_1(VAR_V_20X300X30,VAR_V_20X301))->pred_attacker(VAR_V_20X300X30)).
% 2.07/2.28  all VAR_V_20X303 VAR_V_20X304 (pred_attacker(tuple_client_A_out_1(VAR_V_20X303,VAR_V_20X304))->pred_attacker(VAR_V_20X304)).
% 2.07/2.28  all VAR_V_20X307 (pred_attacker(VAR_V_20X307)->pred_attacker(tuple_client_A_in_4(VAR_V_20X307))).
% 2.07/2.28  all VAR_V_210X30 (pred_attacker(tuple_client_A_in_4(VAR_V_210X30))->pred_attacker(VAR_V_210X30)).
% 2.07/2.28  all VAR_V_213 (pred_attacker(VAR_V_213)->pred_attacker(tuple_client_A_in_2(VAR_V_213))).
% 2.07/2.28  all VAR_V_216 (pred_attacker(tuple_client_A_in_2(VAR_V_216))->pred_attacker(VAR_V_216)).
% 2.07/2.28  all VAR_V_220X30 VAR_V_221 (pred_attacker(VAR_V_220X30)&pred_attacker(VAR_V_221)->pred_attacker(constr_checksign(VAR_V_220X30,VAR_V_221))).
% 2.07/2.28  all VAR_V_224 VAR_V_225 (pred_attacker(VAR_V_224)&pred_attacker(VAR_V_225)->pred_attacker(constr_aenc(VAR_V_224,VAR_V_225))).
% 2.07/2.28  all VAR_V_228 VAR_V_229 (pred_attacker(VAR_V_228)&pred_attacker(VAR_V_229)->pred_attacker(constr_adec(VAR_V_228,VAR_V_229))).
% 2.07/2.28  pred_attacker(constr_ZERO).
% 2.07/2.28  pred_attacker(constr_CONST_4).
% 2.07/2.28  pred_attacker(constr_CONST_3).
% 2.07/2.28  pred_attacker(constr_CONST_2).
% 2.07/2.28  pred_attacker(constr_CONST_1).
% 2.07/2.28  pred_attacker(constr_CONST_0x30).
% 2.07/2.28  all VAR_V_236 VAR_V_237 (pred_attacker(VAR_V_236)&pred_attacker(VAR_V_237)->pred_attacker(tuple_2(VAR_V_236,VAR_V_237))).
% 2.07/2.28  all VAR_V_244 VAR_V_245 (pred_attacker(tuple_2(VAR_V_244,VAR_V_245))->pred_attacker(VAR_V_244)).
% 2.07/2.28  all VAR_V_247 VAR_V_248 (pred_attacker(tuple_2(VAR_V_247,VAR_V_248))->pred_attacker(VAR_V_248)).
% 2.07/2.28  all VAR_V_250X30 VAR_V_251 (pred_mess(VAR_V_251,VAR_V_250X30)&pred_attacker(VAR_V_251)->pred_attacker(VAR_V_250X30)).
% 2.07/2.28  all VAR_V_252 VAR_V_253 (pred_attacker(VAR_V_253)&pred_attacker(VAR_V_252)->pred_mess(VAR_V_253,VAR_V_252)).
% 2.07/2.28  pred_attacker(name_c).
% 2.07/2.28  pred_attacker(name_I).
% 2.07/2.28  pred_attacker(name_B).
% 2.07/2.28  pred_attacker(name_A).
% 2.07/2.28  all VAR_V_255 pred_e_qual(VAR_V_255,VAR_V_255).
% 2.07/2.28  all VAR_V_256 pred_attacker(name_new0x2Dname(VAR_V_256)).
% 2.07/2.28  pred_table(tuple_keys(name_A,constr_pkey(name_skA))).
% 2.07/2.28  pred_table(tuple_keys(name_B,constr_pkey(name_skB))).
% 2.07/2.28  pred_attacker(tuple_out_1(constr_pkey(name_skA))).
% 2.07/2.28  pred_attacker(tuple_out_2(constr_pkey(name_skB))).
% 2.07/2.28  pred_attacker(tuple_out_3(constr_pkey(name_skS))).
% 2.07/2.28  pred_attacker(tuple_client_A_out_1(name_A,name_I)).
% 2.07/2.28  all VAR_0X40SID_376 VAR_SIGN_I_PKI_375 (pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_I_PKI_375,constr_pkey(name_skS))))&pred_attacker(tuple_client_A_in_2(VAR_SIGN_I_PKI_375))->pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(VAR_0X40SID_376),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_I_PKI_375,constr_pkey(name_skS))))))).
% 2.07/2.28  all VAR_0X40SID_435 VAR_AENC_NA_XOR_I_NI_434 VAR_SIGN_I_PKI_436 (pred_e_q_bitstring_bitstring(name_I,constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(VAR_AENC_NA_XOR_I_NI_434,name_skA)),name_Na(VAR_0X40SID_435)))&pred_attacker(tuple_client_A_in_4(VAR_AENC_NA_XOR_I_NI_434))&pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_I_PKI_436,constr_pkey(name_skS))))&pred_attacker(tuple_client_A_in_2(VAR_SIGN_I_PKI_436))->pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(VAR_AENC_NA_XOR_I_NI_434,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_I_PKI_436,constr_pkey(name_skS))))))).
% 2.07/2.28  pred_attacker(tuple_client_B_out_1(name_B,name_A)).
% 2.07/2.28  all VAR_0X40SID_553 VAR_AENC_NA_A_551 VAR_SIGN_A_PKA_552 (pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(VAR_AENC_NA_A_551,name_skB)))&pred_attacker(tuple_client_B_in_3(VAR_AENC_NA_A_551))&pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_A_PKA_552,constr_pkey(name_skS))))&pred_attacker(tuple_client_B_in_2(VAR_SIGN_A_PKA_552))->pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(VAR_AENC_NA_A_551,name_skB)),name_B),name_Nb(VAR_0X40SID_553)),constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_A_PKA_552,constr_pkey(name_skS))))))).
% 2.07/2.28  all VAR_0X40SID_577 VAR_AENC_NA_A_579 VAR_AENC_NB_578 VAR_SIGN_A_PKA_580X30 (pred_e_q_bitstring_bitstring(name_Nb(VAR_0X40SID_577),constr_adec(VAR_AENC_NB_578,name_skB))&pred_attacker(tuple_client_B_in_5(VAR_AENC_NB_578))&pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(VAR_AENC_NA_A_579,name_skB)))&pred_attacker(tuple_client_B_in_3(VAR_AENC_NA_A_579))&pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_A_PKA_580X30,constr_pkey(name_skS))))&pred_attacker(tuple_client_B_in_2(VAR_SIGN_A_PKA_580X30))->pred_attacker(tuple_client_B_out_6(name_objective))).
% 2.07/2.28  all VAR_DST_619 VAR_PKDST_620X30 VAR_SRC_621 (pred_table(tuple_keys(VAR_DST_619,VAR_PKDST_620X30))&pred_attacker(tuple_key_retrieval_server_in_1(VAR_SRC_621,VAR_DST_619))->pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(VAR_DST_619,VAR_PKDST_620X30),name_skS)))).
% 2.07/2.28  all VAR_HOST_673 VAR_PK_674 (VAR_HOST_673!=name_B&VAR_HOST_673!=name_A&pred_attacker(tuple_key_register_server_in_1(VAR_HOST_673,VAR_PK_674))->pred_table(tuple_keys(VAR_HOST_673,VAR_PK_674))).
% 2.07/2.28  -pred_attacker(name_objective).
% 2.07/2.28  end_of_list.
% 2.07/2.28  
% 2.07/2.28  -------> usable clausifies to:
% 2.07/2.28  
% 2.07/2.28  list(usable).
% 2.07/2.28  0 [] A=A.
% 2.07/2.28  0 [] constr_CONST_0x30!=constr_CONST_1.
% 2.07/2.28  0 [] constr_CONST_0x30!=constr_CONST_2.
% 2.07/2.28  0 [] constr_CONST_0x30!=constr_CONST_3.
% 2.07/2.28  0 [] constr_CONST_0x30!=constr_CONST_4.
% 2.07/2.28  0 [] constr_CONST_0x30!=constr_ZERO.
% 2.07/2.28  0 [] constr_CONST_0x30!=name_A.
% 2.07/2.28  0 [] constr_CONST_0x30!=name_B.
% 2.07/2.28  0 [] constr_CONST_0x30!=name_I.
% 2.07/2.28  0 [] constr_CONST_0x30!=name_c.
% 2.07/2.28  0 [] constr_CONST_0x30!=name_objective.
% 2.07/2.28  0 [] constr_CONST_0x30!=name_skA.
% 2.07/2.28  0 [] constr_CONST_0x30!=name_skB.
% 2.07/2.28  0 [] constr_CONST_0x30!=name_skS.
% 2.07/2.28  0 [] constr_CONST_1!=constr_CONST_2.
% 2.07/2.28  0 [] constr_CONST_1!=constr_CONST_3.
% 2.07/2.28  0 [] constr_CONST_1!=constr_CONST_4.
% 2.07/2.28  0 [] constr_CONST_1!=constr_ZERO.
% 2.07/2.28  0 [] constr_CONST_1!=name_A.
% 2.07/2.28  0 [] constr_CONST_1!=name_B.
% 2.07/2.28  0 [] constr_CONST_1!=name_I.
% 2.07/2.28  0 [] constr_CONST_1!=name_c.
% 2.07/2.28  0 [] constr_CONST_1!=name_objective.
% 2.07/2.28  0 [] constr_CONST_1!=name_skA.
% 2.07/2.28  0 [] constr_CONST_1!=name_skB.
% 2.07/2.28  0 [] constr_CONST_1!=name_skS.
% 2.07/2.28  0 [] constr_CONST_2!=constr_CONST_3.
% 2.07/2.28  0 [] constr_CONST_2!=constr_CONST_4.
% 2.07/2.28  0 [] constr_CONST_2!=constr_ZERO.
% 2.07/2.28  0 [] constr_CONST_2!=name_A.
% 2.07/2.28  0 [] constr_CONST_2!=name_B.
% 2.07/2.28  0 [] constr_CONST_2!=name_I.
% 2.07/2.28  0 [] constr_CONST_2!=name_c.
% 2.07/2.28  0 [] constr_CONST_2!=name_objective.
% 2.07/2.28  0 [] constr_CONST_2!=name_skA.
% 2.07/2.28  0 [] constr_CONST_2!=name_skB.
% 2.07/2.28  0 [] constr_CONST_2!=name_skS.
% 2.07/2.28  0 [] constr_CONST_3!=constr_CONST_4.
% 2.07/2.28  0 [] constr_CONST_3!=constr_ZERO.
% 2.07/2.28  0 [] constr_CONST_3!=name_A.
% 2.07/2.28  0 [] constr_CONST_3!=name_B.
% 2.07/2.28  0 [] constr_CONST_3!=name_I.
% 2.07/2.28  0 [] constr_CONST_3!=name_c.
% 2.07/2.28  0 [] constr_CONST_3!=name_objective.
% 2.07/2.28  0 [] constr_CONST_3!=name_skA.
% 2.07/2.28  0 [] constr_CONST_3!=name_skB.
% 2.07/2.28  0 [] constr_CONST_3!=name_skS.
% 2.07/2.28  0 [] constr_CONST_4!=constr_ZERO.
% 2.07/2.28  0 [] constr_CONST_4!=name_A.
% 2.07/2.28  0 [] constr_CONST_4!=name_B.
% 2.07/2.28  0 [] constr_CONST_4!=name_I.
% 2.07/2.28  0 [] constr_CONST_4!=name_c.
% 2.07/2.28  0 [] constr_CONST_4!=name_objective.
% 2.07/2.28  0 [] constr_CONST_4!=name_skA.
% 2.07/2.28  0 [] constr_CONST_4!=name_skB.
% 2.07/2.28  0 [] constr_CONST_4!=name_skS.
% 2.07/2.28  0 [] constr_ZERO!=name_A.
% 2.07/2.28  0 [] constr_ZERO!=name_B.
% 2.07/2.28  0 [] constr_ZERO!=name_I.
% 2.07/2.28  0 [] constr_ZERO!=name_c.
% 2.07/2.28  0 [] constr_ZERO!=name_objective.
% 2.07/2.28  0 [] constr_ZERO!=name_skA.
% 2.07/2.28  0 [] constr_ZERO!=name_skB.
% 2.07/2.28  0 [] constr_ZERO!=name_skS.
% 2.07/2.28  0 [] name_A!=name_B.
% 2.07/2.28  0 [] name_A!=name_I.
% 2.07/2.28  0 [] name_A!=name_c.
% 2.07/2.28  0 [] name_A!=name_objective.
% 2.07/2.28  0 [] name_A!=name_skA.
% 2.07/2.28  0 [] name_A!=name_skB.
% 2.07/2.28  0 [] name_A!=name_skS.
% 2.07/2.28  0 [] name_B!=name_I.
% 2.07/2.28  0 [] name_B!=name_c.
% 2.07/2.28  0 [] name_B!=name_objective.
% 2.07/2.28  0 [] name_B!=name_skA.
% 2.07/2.28  0 [] name_B!=name_skB.
% 2.07/2.28  0 [] name_B!=name_skS.
% 2.07/2.28  0 [] name_I!=name_c.
% 2.07/2.28  0 [] name_I!=name_objective.
% 2.07/2.28  0 [] name_I!=name_skA.
% 2.07/2.28  0 [] name_I!=name_skB.
% 2.07/2.28  0 [] name_I!=name_skS.
% 2.07/2.28  0 [] name_c!=name_objective.
% 2.07/2.28  0 [] name_c!=name_skA.
% 2.07/2.28  0 [] name_c!=name_skB.
% 2.07/2.28  0 [] name_c!=name_skS.
% 2.07/2.28  0 [] name_objective!=name_skA.
% 2.07/2.28  0 [] name_objective!=name_skB.
% 2.07/2.28  0 [] name_objective!=name_skS.
% 2.07/2.28  0 [] name_skA!=name_skB.
% 2.07/2.28  0 [] name_skA!=name_skS.
% 2.07/2.28  0 [] name_skB!=name_skS.
% 2.07/2.28  0 [] constr_adec(constr_aenc(VAR_M_23,constr_pkey(VAR_K_24)),VAR_K_24)=VAR_M_23.
% 2.07/2.28  0 [] constr_dec(constr_enc(VAR_M_21,VAR_K_22),VAR_K_22)=VAR_M_21.
% 2.07/2.28  0 [] constr_getmess(constr_sign(VAR_M_19,VAR_K_20X30))=VAR_M_19.
% 2.07/2.28  0 [] constr_checksign(constr_sign(VAR_M_0X30,VAR_K_0X30),constr_pkey(VAR_K_0X30))=VAR_M_0X30.
% 2.07/2.28  0 [] constr_xor(VAR_X_18,VAR_X_18)=constr_ZERO.
% 2.07/2.28  0 [] constr_xor(VAR_X_17,constr_ZERO)=VAR_X_17.
% 2.07/2.28  0 [] constr_xor(VAR_X_15,VAR_Y_16)=constr_xor(VAR_Y_16,VAR_X_15).
% 2.07/2.28  0 [] constr_xor(VAR_X_13,constr_xor(VAR_Y_14,VAR_Z_0X30))=constr_xor(constr_xor(VAR_X_13,VAR_Y_14),VAR_Z_0X30).
% 2.07/2.28  0 [] constr_tuple_2_get_1_bitstring(tuple_2(VAR_X0X30_11,VAR_X1_12))=VAR_X1_12.
% 2.07/2.28  0 [] constr_tuple_2_get_0x30_bitstring(tuple_2(VAR_X0X30_9,VAR_X1_10X30))=VAR_X0X30_9.
% 2.07/2.28  0 [] constr_tuple_2_get_1(tuple_2(VAR_X0X30_7,VAR_X1_8))=VAR_X1_8.
% 2.07/2.28  0 [] constr_tuple_2_get_0x30(tuple_2(VAR_X0X30_0X30,VAR_X1_0X30))=VAR_X0X30_0X30.
% 2.07/2.28  0 [] pred_e_q_bitstring_bitstring(VAR_X_41,VAR_Y_42).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_49)| -pred_attacker(VAR_V_50X30)|pred_attacker(constr_xor(VAR_V_49,VAR_V_50X30)).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_52)|pred_attacker(constr_tuple_2_get_1_bitstring(VAR_V_52)).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_54)|pred_attacker(constr_tuple_2_get_1(VAR_V_54)).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_56)|pred_attacker(constr_tuple_2_get_0x30_bitstring(VAR_V_56)).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_58)|pred_attacker(constr_tuple_2_get_0x30(VAR_V_58)).
% 2.07/2.28  0 [] pred_attacker(tuple_true).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_61)| -pred_attacker(VAR_V_62)|pred_attacker(constr_sign(VAR_V_61,VAR_V_62)).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_64)|pred_attacker(constr_pkey(VAR_V_64)).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_66)|pred_attacker(tuple_out_3(VAR_V_66)).
% 2.07/2.28  0 [] -pred_attacker(tuple_out_3(VAR_V_69))|pred_attacker(VAR_V_69).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_72)|pred_attacker(tuple_out_2(VAR_V_72)).
% 2.07/2.28  0 [] -pred_attacker(tuple_out_2(VAR_V_75))|pred_attacker(VAR_V_75).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_78)|pred_attacker(tuple_out_1(VAR_V_78)).
% 2.07/2.28  0 [] -pred_attacker(tuple_out_1(VAR_V_81))|pred_attacker(VAR_V_81).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_85)|pred_attacker(tuple_key_retrieval_server_out_2(VAR_V_85)).
% 2.07/2.28  0 [] -pred_attacker(tuple_key_retrieval_server_out_2(VAR_V_88))|pred_attacker(VAR_V_88).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_92)| -pred_attacker(VAR_V_93)|pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_92,VAR_V_93)).
% 2.07/2.28  0 [] -pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_10X300X30,VAR_V_10X301))|pred_attacker(VAR_V_10X300X30).
% 2.07/2.28  0 [] -pred_attacker(tuple_key_retrieval_server_in_1(VAR_V_10X303,VAR_V_10X304))|pred_attacker(VAR_V_10X304).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_10X308)| -pred_attacker(VAR_V_10X309)|pred_attacker(tuple_key_register_server_in_1(VAR_V_10X308,VAR_V_10X309)).
% 2.07/2.28  0 [] -pred_attacker(tuple_key_register_server_in_1(VAR_V_116,VAR_V_117))|pred_attacker(VAR_V_116).
% 2.07/2.28  0 [] -pred_attacker(tuple_key_register_server_in_1(VAR_V_119,VAR_V_120X30))|pred_attacker(VAR_V_120X30).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_123)|pred_attacker(constr_getmess(VAR_V_123)).
% 2.07/2.28  0 [] pred_attacker(tuple_false).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_126)| -pred_attacker(VAR_V_127)|pred_attacker(constr_enc(VAR_V_126,VAR_V_127)).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_130X30)| -pred_attacker(VAR_V_131)|pred_attacker(constr_dec(VAR_V_130X30,VAR_V_131)).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_133)|pred_attacker(tuple_client_B_out_6(VAR_V_133)).
% 2.07/2.28  0 [] -pred_attacker(tuple_client_B_out_6(VAR_V_136))|pred_attacker(VAR_V_136).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_139)|pred_attacker(tuple_client_B_out_4(VAR_V_139)).
% 2.07/2.28  0 [] -pred_attacker(tuple_client_B_out_4(VAR_V_142))|pred_attacker(VAR_V_142).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_146)| -pred_attacker(VAR_V_147)|pred_attacker(tuple_client_B_out_1(VAR_V_146,VAR_V_147)).
% 2.07/2.28  0 [] -pred_attacker(tuple_client_B_out_1(VAR_V_154,VAR_V_155))|pred_attacker(VAR_V_154).
% 2.07/2.28  0 [] -pred_attacker(tuple_client_B_out_1(VAR_V_157,VAR_V_158))|pred_attacker(VAR_V_158).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_161)|pred_attacker(tuple_client_B_in_5(VAR_V_161)).
% 2.07/2.28  0 [] -pred_attacker(tuple_client_B_in_5(VAR_V_164))|pred_attacker(VAR_V_164).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_167)|pred_attacker(tuple_client_B_in_3(VAR_V_167)).
% 2.07/2.28  0 [] -pred_attacker(tuple_client_B_in_3(VAR_V_170X30))|pred_attacker(VAR_V_170X30).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_173)|pred_attacker(tuple_client_B_in_2(VAR_V_173)).
% 2.07/2.28  0 [] -pred_attacker(tuple_client_B_in_2(VAR_V_176))|pred_attacker(VAR_V_176).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_179)|pred_attacker(tuple_client_A_out_5(VAR_V_179)).
% 2.07/2.28  0 [] -pred_attacker(tuple_client_A_out_5(VAR_V_182))|pred_attacker(VAR_V_182).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_185)|pred_attacker(tuple_client_A_out_3(VAR_V_185)).
% 2.07/2.28  0 [] -pred_attacker(tuple_client_A_out_3(VAR_V_188))|pred_attacker(VAR_V_188).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_192)| -pred_attacker(VAR_V_193)|pred_attacker(tuple_client_A_out_1(VAR_V_192,VAR_V_193)).
% 2.07/2.28  0 [] -pred_attacker(tuple_client_A_out_1(VAR_V_20X300X30,VAR_V_20X301))|pred_attacker(VAR_V_20X300X30).
% 2.07/2.28  0 [] -pred_attacker(tuple_client_A_out_1(VAR_V_20X303,VAR_V_20X304))|pred_attacker(VAR_V_20X304).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_20X307)|pred_attacker(tuple_client_A_in_4(VAR_V_20X307)).
% 2.07/2.28  0 [] -pred_attacker(tuple_client_A_in_4(VAR_V_210X30))|pred_attacker(VAR_V_210X30).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_213)|pred_attacker(tuple_client_A_in_2(VAR_V_213)).
% 2.07/2.28  0 [] -pred_attacker(tuple_client_A_in_2(VAR_V_216))|pred_attacker(VAR_V_216).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_220X30)| -pred_attacker(VAR_V_221)|pred_attacker(constr_checksign(VAR_V_220X30,VAR_V_221)).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_224)| -pred_attacker(VAR_V_225)|pred_attacker(constr_aenc(VAR_V_224,VAR_V_225)).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_228)| -pred_attacker(VAR_V_229)|pred_attacker(constr_adec(VAR_V_228,VAR_V_229)).
% 2.07/2.28  0 [] pred_attacker(constr_ZERO).
% 2.07/2.28  0 [] pred_attacker(constr_CONST_4).
% 2.07/2.28  0 [] pred_attacker(constr_CONST_3).
% 2.07/2.28  0 [] pred_attacker(constr_CONST_2).
% 2.07/2.28  0 [] pred_attacker(constr_CONST_1).
% 2.07/2.28  0 [] pred_attacker(constr_CONST_0x30).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_236)| -pred_attacker(VAR_V_237)|pred_attacker(tuple_2(VAR_V_236,VAR_V_237)).
% 2.07/2.28  0 [] -pred_attacker(tuple_2(VAR_V_244,VAR_V_245))|pred_attacker(VAR_V_244).
% 2.07/2.28  0 [] -pred_attacker(tuple_2(VAR_V_247,VAR_V_248))|pred_attacker(VAR_V_248).
% 2.07/2.28  0 [] -pred_mess(VAR_V_251,VAR_V_250X30)| -pred_attacker(VAR_V_251)|pred_attacker(VAR_V_250X30).
% 2.07/2.28  0 [] -pred_attacker(VAR_V_253)| -pred_attacker(VAR_V_252)|pred_mess(VAR_V_253,VAR_V_252).
% 2.07/2.28  0 [] pred_attacker(name_c).
% 2.07/2.28  0 [] pred_attacker(name_I).
% 2.07/2.28  0 [] pred_attacker(name_B).
% 2.07/2.28  0 [] pred_attacker(name_A).
% 2.07/2.28  0 [] pred_e_qual(VAR_V_255,VAR_V_255).
% 2.07/2.28  0 [] pred_attacker(name_new0x2Dname(VAR_V_256)).
% 2.07/2.28  0 [] pred_table(tuple_keys(name_A,constr_pkey(name_skA))).
% 2.07/2.28  0 [] pred_table(tuple_keys(name_B,constr_pkey(name_skB))).
% 2.07/2.28  0 [] pred_attacker(tuple_out_1(constr_pkey(name_skA))).
% 2.07/2.28  0 [] pred_attacker(tuple_out_2(constr_pkey(name_skB))).
% 2.07/2.28  0 [] pred_attacker(tuple_out_3(constr_pkey(name_skS))).
% 2.07/2.28  0 [] pred_attacker(tuple_client_A_out_1(name_A,name_I)).
% 2.07/2.28  0 [] -pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_I_PKI_375,constr_pkey(name_skS))))| -pred_attacker(tuple_client_A_in_2(VAR_SIGN_I_PKI_375))|pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(VAR_0X40SID_376),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_I_PKI_375,constr_pkey(name_skS)))))).
% 2.07/2.28  0 [] -pred_e_q_bitstring_bitstring(name_I,constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(VAR_AENC_NA_XOR_I_NI_434,name_skA)),name_Na(VAR_0X40SID_435)))| -pred_attacker(tuple_client_A_in_4(VAR_AENC_NA_XOR_I_NI_434))| -pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_I_PKI_436,constr_pkey(name_skS))))| -pred_attacker(tuple_client_A_in_2(VAR_SIGN_I_PKI_436))|pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(VAR_AENC_NA_XOR_I_NI_434,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_I_PKI_436,constr_pkey(name_skS)))))).
% 2.07/2.28  0 [] pred_attacker(tuple_client_B_out_1(name_B,name_A)).
% 2.07/2.28  0 [] -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(VAR_AENC_NA_A_551,name_skB)))| -pred_attacker(tuple_client_B_in_3(VAR_AENC_NA_A_551))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_A_PKA_552,constr_pkey(name_skS))))| -pred_attacker(tuple_client_B_in_2(VAR_SIGN_A_PKA_552))|pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(VAR_AENC_NA_A_551,name_skB)),name_B),name_Nb(VAR_0X40SID_553)),constr_tuple_2_get_1_bitstring(constr_checksign(VAR_SIGN_A_PKA_552,constr_pkey(name_skS)))))).
% 2.07/2.28  0 [] -pred_e_q_bitstring_bitstring(name_Nb(VAR_0X40SID_577),constr_adec(VAR_AENC_NB_578,name_skB))| -pred_attacker(tuple_client_B_in_5(VAR_AENC_NB_578))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(VAR_AENC_NA_A_579,name_skB)))| -pred_attacker(tuple_client_B_in_3(VAR_AENC_NA_A_579))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(VAR_SIGN_A_PKA_580X30,constr_pkey(name_skS))))| -pred_attacker(tuple_client_B_in_2(VAR_SIGN_A_PKA_580X30))|pred_attacker(tuple_client_B_out_6(name_objective)).
% 2.07/2.28  0 [] -pred_table(tuple_keys(VAR_DST_619,VAR_PKDST_620X30))| -pred_attacker(tuple_key_retrieval_server_in_1(VAR_SRC_621,VAR_DST_619))|pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(VAR_DST_619,VAR_PKDST_620X30),name_skS))).
% 2.07/2.28  0 [] VAR_HOST_673=name_B|VAR_HOST_673=name_A| -pred_attacker(tuple_key_register_server_in_1(VAR_HOST_673,VAR_PK_674))|pred_table(tuple_keys(VAR_HOST_673,VAR_PK_674)).
% 2.07/2.28  0 [] -pred_attacker(name_objective).
% 2.07/2.28  end_of_list.
% 2.07/2.28  
% 2.07/2.28  SCAN INPUT: prop=0, horn=0, equality=1, symmetry=0, max_lits=7.
% 2.07/2.28  
% 2.07/2.28  This ia a non-Horn set with equality.  The strategy will be
% 2.07/2.28  Knuth-Bendix, ordered hyper_res, factoring, and unit
% 2.07/2.28  deletion, with positive clauses in sos and nonpositive
% 2.07/2.28  clauses in usable.
% 2.07/2.28  
% 2.07/2.28     dependent: set(knuth_bendix).
% 2.07/2.28     dependent: set(anl_eq).
% 2.07/2.28     dependent: set(para_from).
% 2.07/2.28     dependent: set(para_into).
% 2.07/2.28     dependent: clear(para_from_right).
% 2.07/2.28     dependent: clear(para_into_right).
% 2.07/2.28     dependent: set(para_from_vars).
% 2.07/2.28     dependent: set(eq_units_both_ways).
% 2.07/2.28     dependent: set(dynamic_demod_all).
% 2.07/2.28     dependent: set(dynamic_demod).
% 2.07/2.28     dependent: set(order_eq).
% 2.07/2.28     dependent: set(back_demod).
% 2.07/2.28     dependent: set(lrpo).
% 2.07/2.28     dependent: set(hyper_res).
% 2.07/2.28     dependent: set(unit_deletion).
% 2.07/2.28     dependent: set(factor).
% 2.07/2.28  
% 2.07/2.28  ------------> process usable:
% 2.07/2.28  ** KEPT (pick-wt=3): 2 [copy,1,flip.1] constr_CONST_1!=constr_CONST_0x30.
% 2.07/2.28  ** KEPT (pick-wt=3): 4 [copy,3,flip.1] constr_CONST_2!=constr_CONST_0x30.
% 2.07/2.28  ** KEPT (pick-wt=3): 6 [copy,5,flip.1] constr_CONST_3!=constr_CONST_0x30.
% 2.07/2.28  ** KEPT (pick-wt=3): 8 [copy,7,flip.1] constr_CONST_4!=constr_CONST_0x30.
% 2.07/2.28  ** KEPT (pick-wt=3): 10 [copy,9,flip.1] constr_ZERO!=constr_CONST_0x30.
% 2.07/2.28  ** KEPT (pick-wt=3): 12 [copy,11,flip.1] name_A!=constr_CONST_0x30.
% 2.07/2.28  ** KEPT (pick-wt=3): 14 [copy,13,flip.1] name_B!=constr_CONST_0x30.
% 2.07/2.28  ** KEPT (pick-wt=3): 16 [copy,15,flip.1] name_I!=constr_CONST_0x30.
% 2.07/2.28  ** KEPT (pick-wt=3): 18 [copy,17,flip.1] name_c!=constr_CONST_0x30.
% 2.07/2.28  ** KEPT (pick-wt=3): 20 [copy,19,flip.1] name_objective!=constr_CONST_0x30.
% 2.07/2.28  ** KEPT (pick-wt=3): 22 [copy,21,flip.1] name_skA!=constr_CONST_0x30.
% 2.07/2.28  ** KEPT (pick-wt=3): 24 [copy,23,flip.1] name_skB!=constr_CONST_0x30.
% 2.07/2.28  ** KEPT (pick-wt=3): 26 [copy,25,flip.1] name_skS!=constr_CONST_0x30.
% 2.07/2.28  ** KEPT (pick-wt=3): 28 [copy,27,flip.1] constr_CONST_2!=constr_CONST_1.
% 2.07/2.28  ** KEPT (pick-wt=3): 30 [copy,29,flip.1] constr_CONST_3!=constr_CONST_1.
% 2.07/2.28  ** KEPT (pick-wt=3): 32 [copy,31,flip.1] constr_CONST_4!=constr_CONST_1.
% 2.07/2.28  ** KEPT (pick-wt=3): 34 [copy,33,flip.1] constr_ZERO!=constr_CONST_1.
% 2.07/2.28  ** KEPT (pick-wt=3): 36 [copy,35,flip.1] name_A!=constr_CONST_1.
% 2.07/2.28  ** KEPT (pick-wt=3): 38 [copy,37,flip.1] name_B!=constr_CONST_1.
% 2.07/2.28  ** KEPT (pick-wt=3): 40 [copy,39,flip.1] name_I!=constr_CONST_1.
% 2.07/2.28  ** KEPT (pick-wt=3): 42 [copy,41,flip.1] name_c!=constr_CONST_1.
% 2.07/2.28  ** KEPT (pick-wt=3): 44 [copy,43,flip.1] name_objective!=constr_CONST_1.
% 2.07/2.28  ** KEPT (pick-wt=3): 46 [copy,45,flip.1] name_skA!=constr_CONST_1.
% 2.07/2.28  ** KEPT (pick-wt=3): 48 [copy,47,flip.1] name_skB!=constr_CONST_1.
% 2.07/2.28  ** KEPT (pick-wt=3): 50 [copy,49,flip.1] name_skS!=constr_CONST_1.
% 2.07/2.28  ** KEPT (pick-wt=3): 52 [copy,51,flip.1] constr_CONST_3!=constr_CONST_2.
% 2.07/2.28  ** KEPT (pick-wt=3): 54 [copy,53,flip.1] constr_CONST_4!=constr_CONST_2.
% 2.07/2.28  ** KEPT (pick-wt=3): 56 [copy,55,flip.1] constr_ZERO!=constr_CONST_2.
% 2.07/2.28  ** KEPT (pick-wt=3): 58 [copy,57,flip.1] name_A!=constr_CONST_2.
% 2.07/2.28  ** KEPT (pick-wt=3): 60 [copy,59,flip.1] name_B!=constr_CONST_2.
% 2.07/2.28  ** KEPT (pick-wt=3): 62 [copy,61,flip.1] name_I!=constr_CONST_2.
% 2.07/2.28  ** KEPT (pick-wt=3): 64 [copy,63,flip.1] name_c!=constr_CONST_2.
% 2.07/2.28  ** KEPT (pick-wt=3): 66 [copy,65,flip.1] name_objective!=constr_CONST_2.
% 2.07/2.28  ** KEPT (pick-wt=3): 68 [copy,67,flip.1] name_skA!=constr_CONST_2.
% 2.07/2.28  ** KEPT (pick-wt=3): 70 [copy,69,flip.1] name_skB!=constr_CONST_2.
% 2.07/2.28  ** KEPT (pick-wt=3): 72 [copy,71,flip.1] name_skS!=constr_CONST_2.
% 2.07/2.28  ** KEPT (pick-wt=3): 74 [copy,73,flip.1] constr_CONST_4!=constr_CONST_3.
% 2.07/2.28  ** KEPT (pick-wt=3): 76 [copy,75,flip.1] constr_ZERO!=constr_CONST_3.
% 2.07/2.28  ** KEPT (pick-wt=3): 78 [copy,77,flip.1] name_A!=constr_CONST_3.
% 2.07/2.28  ** KEPT (pick-wt=3): 80 [copy,79,flip.1] name_B!=constr_CONST_3.
% 2.07/2.28  ** KEPT (pick-wt=3): 82 [copy,81,flip.1] name_I!=constr_CONST_3.
% 2.07/2.28  ** KEPT (pick-wt=3): 84 [copy,83,flip.1] name_c!=constr_CONST_3.
% 2.07/2.28  ** KEPT (pick-wt=3): 86 [copy,85,flip.1] name_objective!=constr_CONST_3.
% 2.07/2.28  ** KEPT (pick-wt=3): 88 [copy,87,flip.1] name_skA!=constr_CONST_3.
% 2.07/2.28  ** KEPT (pick-wt=3): 90 [copy,89,flip.1] name_skB!=constr_CONST_3.
% 2.07/2.28  ** KEPT (pick-wt=3): 92 [copy,91,flip.1] name_skS!=constr_CONST_3.
% 2.07/2.28  ** KEPT (pick-wt=3): 94 [copy,93,flip.1] constr_ZERO!=constr_CONST_4.
% 2.07/2.28  ** KEPT (pick-wt=3): 96 [copy,95,flip.1] name_A!=constr_CONST_4.
% 2.07/2.28  ** KEPT (pick-wt=3): 98 [copy,97,flip.1] name_B!=constr_CONST_4.
% 2.07/2.28  ** KEPT (pick-wt=3): 100 [copy,99,flip.1] name_I!=constr_CONST_4.
% 2.07/2.28  ** KEPT (pick-wt=3): 102 [copy,101,flip.1] name_c!=constr_CONST_4.
% 2.07/2.28  ** KEPT (pick-wt=3): 104 [copy,103,flip.1] name_objective!=constr_CONST_4.
% 2.07/2.28  ** KEPT (pick-wt=3): 106 [copy,105,flip.1] name_skA!=constr_CONST_4.
% 2.07/2.28  ** KEPT (pick-wt=3): 108 [copy,107,flip.1] name_skB!=constr_CONST_4.
% 2.07/2.28  ** KEPT (pick-wt=3): 110 [copy,109,flip.1] name_skS!=constr_CONST_4.
% 2.07/2.28  ** KEPT (pick-wt=3): 112 [copy,111,flip.1] name_A!=constr_ZERO.
% 2.07/2.28  ** KEPT (pick-wt=3): 114 [copy,113,flip.1] name_B!=constr_ZERO.
% 2.07/2.28  ** KEPT (pick-wt=3): 116 [copy,115,flip.1] name_I!=constr_ZERO.
% 2.07/2.28  ** KEPT (pick-wt=3): 118 [copy,117,flip.1] name_c!=constr_ZERO.
% 2.07/2.28  ** KEPT (pick-wt=3): 120 [copy,119,flip.1] name_objective!=constr_ZERO.
% 2.07/2.28  ** KEPT (pick-wt=3): 122 [copy,121,flip.1] name_skA!=constr_ZERO.
% 2.07/2.28  ** KEPT (pick-wt=3): 124 [copy,123,flip.1] name_skB!=constr_ZERO.
% 2.07/2.28  ** KEPT (pick-wt=3): 126 [copy,125,flip.1] name_skS!=constr_ZERO.
% 2.07/2.28  ** KEPT (pick-wt=3): 128 [copy,127,flip.1] name_B!=name_A.
% 2.07/2.28  ** KEPT (pick-wt=3): 130 [copy,129,flip.1] name_I!=name_A.
% 2.07/2.28  ** KEPT (pick-wt=3): 132 [copy,131,flip.1] name_c!=name_A.
% 2.07/2.28  ** KEPT (pick-wt=3): 134 [copy,133,flip.1] name_objective!=name_A.
% 2.07/2.28  ** KEPT (pick-wt=3): 136 [copy,135,flip.1] name_skA!=name_A.
% 2.07/2.28  ** KEPT (pick-wt=3): 138 [copy,137,flip.1] name_skB!=name_A.
% 2.07/2.28  ** KEPT (pick-wt=3): 140 [copy,139,flip.1] name_skS!=name_A.
% 2.07/2.28  ** KEPT (pick-wt=3): 142 [copy,141,flip.1] name_I!=name_B.
% 2.07/2.28  ** KEPT (pick-wt=3): 144 [copy,143,flip.1] name_c!=name_B.
% 2.07/2.28  ** KEPT (pick-wt=3): 146 [copy,145,flip.1] name_objective!=name_B.
% 2.07/2.28  ** KEPT (pick-wt=3): 148 [copy,147,flip.1] name_skA!=name_B.
% 2.07/2.28  ** KEPT (pick-wt=3): 150 [copy,149,flip.1] name_skB!=name_B.
% 2.07/2.28  ** KEPT (pick-wt=3): 152 [copy,151,flip.1] name_skS!=name_B.
% 2.07/2.28  ** KEPT (pick-wt=3): 154 [copy,153,flip.1] name_c!=name_I.
% 2.07/2.28  ** KEPT (pick-wt=3): 156 [copy,155,flip.1] name_objective!=name_I.
% 2.07/2.28  ** KEPT (pick-wt=3): 158 [copy,157,flip.1] name_skA!=name_I.
% 2.07/2.28  ** KEPT (pick-wt=3): 160 [copy,159,flip.1] name_skB!=name_I.
% 2.07/2.28  ** KEPT (pick-wt=3): 162 [copy,161,flip.1] name_skS!=name_I.
% 2.07/2.28  ** KEPT (pick-wt=3): 164 [copy,163,flip.1] name_objective!=name_c.
% 2.07/2.28  ** KEPT (pick-wt=3): 166 [copy,165,flip.1] name_skA!=name_c.
% 2.07/2.28  ** KEPT (pick-wt=3): 168 [copy,167,flip.1] name_skB!=name_c.
% 2.07/2.28  ** KEPT (pick-wt=3): 170 [copy,169,flip.1] name_skS!=name_c.
% 2.07/2.28  ** KEPT (pick-wt=3): 172 [copy,171,flip.1] name_skA!=name_objective.
% 2.07/2.28  ** KEPT (pick-wt=3): 174 [copy,173,flip.1] name_skB!=name_objective.
% 2.07/2.28  ** KEPT (pick-wt=3): 176 [copy,175,flip.1] name_skS!=name_objective.
% 2.07/2.28  ** KEPT (pick-wt=3): 178 [copy,177,flip.1] name_skB!=name_skA.
% 2.07/2.28  ** KEPT (pick-wt=3): 180 [copy,179,flip.1] name_skS!=name_skA.
% 2.07/2.28  ** KEPT (pick-wt=3): 182 [copy,181,flip.1] name_skS!=name_skB.
% 2.07/2.29  ** KEPT (pick-wt=8): 183 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_xor(A,B)).
% 2.07/2.29  ** KEPT (pick-wt=5): 184 [] -pred_attacker(A)|pred_attacker(constr_tuple_2_get_1_bitstring(A)).
% 2.07/2.29  ** KEPT (pick-wt=5): 185 [] -pred_attacker(A)|pred_attacker(constr_tuple_2_get_1(A)).
% 2.07/2.29  ** KEPT (pick-wt=5): 186 [] -pred_attacker(A)|pred_attacker(constr_tuple_2_get_0x30_bitstring(A)).
% 2.07/2.29  ** KEPT (pick-wt=5): 187 [] -pred_attacker(A)|pred_attacker(constr_tuple_2_get_0x30(A)).
% 2.07/2.29  ** KEPT (pick-wt=8): 188 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_sign(A,B)).
% 2.07/2.29  ** KEPT (pick-wt=5): 189 [] -pred_attacker(A)|pred_attacker(constr_pkey(A)).
% 2.07/2.29  ** KEPT (pick-wt=5): 190 [] -pred_attacker(A)|pred_attacker(tuple_out_3(A)).
% 2.07/2.29  ** KEPT (pick-wt=5): 191 [] -pred_attacker(tuple_out_3(A))|pred_attacker(A).
% 2.07/2.29  ** KEPT (pick-wt=5): 192 [] -pred_attacker(A)|pred_attacker(tuple_out_2(A)).
% 2.07/2.29  ** KEPT (pick-wt=5): 193 [] -pred_attacker(tuple_out_2(A))|pred_attacker(A).
% 2.07/2.29  ** KEPT (pick-wt=5): 194 [] -pred_attacker(A)|pred_attacker(tuple_out_1(A)).
% 2.07/2.29  ** KEPT (pick-wt=5): 195 [] -pred_attacker(tuple_out_1(A))|pred_attacker(A).
% 2.07/2.29  ** KEPT (pick-wt=5): 196 [] -pred_attacker(A)|pred_attacker(tuple_key_retrieval_server_out_2(A)).
% 2.07/2.29  ** KEPT (pick-wt=5): 197 [] -pred_attacker(tuple_key_retrieval_server_out_2(A))|pred_attacker(A).
% 2.07/2.29  ** KEPT (pick-wt=8): 198 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(tuple_key_retrieval_server_in_1(A,B)).
% 2.07/2.29  ** KEPT (pick-wt=6): 199 [] -pred_attacker(tuple_key_retrieval_server_in_1(A,B))|pred_attacker(A).
% 2.07/2.29  ** KEPT (pick-wt=6): 200 [] -pred_attacker(tuple_key_retrieval_server_in_1(A,B))|pred_attacker(B).
% 2.07/2.29  ** KEPT (pick-wt=8): 201 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(tuple_key_register_server_in_1(A,B)).
% 2.07/2.29  ** KEPT (pick-wt=6): 202 [] -pred_attacker(tuple_key_register_server_in_1(A,B))|pred_attacker(A).
% 2.07/2.29  ** KEPT (pick-wt=6): 203 [] -pred_attacker(tuple_key_register_server_in_1(A,B))|pred_attacker(B).
% 2.07/2.29  ** KEPT (pick-wt=5): 204 [] -pred_attacker(A)|pred_attacker(constr_getmess(A)).
% 2.07/2.29  ** KEPT (pick-wt=8): 205 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_enc(A,B)).
% 2.07/2.29  ** KEPT (pick-wt=8): 206 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_dec(A,B)).
% 2.07/2.29  ** KEPT (pick-wt=5): 207 [] -pred_attacker(A)|pred_attacker(tuple_client_B_out_6(A)).
% 2.07/2.29  ** KEPT (pick-wt=5): 208 [] -pred_attacker(tuple_client_B_out_6(A))|pred_attacker(A).
% 2.07/2.29  ** KEPT (pick-wt=5): 209 [] -pred_attacker(A)|pred_attacker(tuple_client_B_out_4(A)).
% 2.07/2.29  ** KEPT (pick-wt=5): 210 [] -pred_attacker(tuple_client_B_out_4(A))|pred_attacker(A).
% 2.07/2.29  ** KEPT (pick-wt=8): 211 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(tuple_client_B_out_1(A,B)).
% 2.07/2.29  ** KEPT (pick-wt=6): 212 [] -pred_attacker(tuple_client_B_out_1(A,B))|pred_attacker(A).
% 2.07/2.29  ** KEPT (pick-wt=6): 213 [] -pred_attacker(tuple_client_B_out_1(A,B))|pred_attacker(B).
% 2.07/2.29  ** KEPT (pick-wt=5): 214 [] -pred_attacker(A)|pred_attacker(tuple_client_B_in_5(A)).
% 2.07/2.29  ** KEPT (pick-wt=5): 215 [] -pred_attacker(tuple_client_B_in_5(A))|pred_attacker(A).
% 2.07/2.29  ** KEPT (pick-wt=5): 216 [] -pred_attacker(A)|pred_attacker(tuple_client_B_in_3(A)).
% 2.07/2.29  ** KEPT (pick-wt=5): 217 [] -pred_attacker(tuple_client_B_in_3(A))|pred_attacker(A).
% 2.07/2.29  ** KEPT (pick-wt=5): 218 [] -pred_attacker(A)|pred_attacker(tuple_client_B_in_2(A)).
% 2.07/2.29  ** KEPT (pick-wt=5): 219 [] -pred_attacker(tuple_client_B_in_2(A))|pred_attacker(A).
% 2.07/2.29  ** KEPT (pick-wt=5): 220 [] -pred_attacker(A)|pred_attacker(tuple_client_A_out_5(A)).
% 2.07/2.29  ** KEPT (pick-wt=5): 221 [] -pred_attacker(tuple_client_A_out_5(A))|pred_attacker(A).
% 2.07/2.29  ** KEPT (pick-wt=5): 222 [] -pred_attacker(A)|pred_attacker(tuple_client_A_out_3(A)).
% 2.07/2.29  ** KEPT (pick-wt=5): 223 [] -pred_attacker(tuple_client_A_out_3(A))|pred_attacker(A).
% 2.07/2.29  ** KEPT (pick-wt=8): 224 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(tuple_client_A_out_1(A,B)).
% 2.07/2.29  ** KEPT (pick-wt=6): 225 [] -pred_attacker(tuple_client_A_out_1(A,B))|pred_attacker(A).
% 2.07/2.29  ** KEPT (pick-wt=6): 226 [] -pred_attacker(tuple_client_A_out_1(A,B))|pred_attacker(B).
% 2.07/2.29  ** KEPT (pick-wt=5): 227 [] -pred_attacker(A)|pred_attacker(tuple_client_A_in_4(A)).
% 2.07/2.29  ** KEPT (pick-wt=5): 228 [] -pred_attacker(tuple_client_A_in_4(A))|pred_attacker(A).
% 2.07/2.29  ** KEPT (pick-wt=5): 229 [] -pred_attacker(A)|pred_attacker(tuple_client_A_in_2(A)).
% 2.07/2.29  ** KEPT (pick-wt=5): 230 [] -pred_attacker(tuple_client_A_in_2(A))|pred_attacker(A).
% 2.07/2.29  ** KEPT (pick-wt=8): 231 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_checksign(A,B)).
% 2.07/2.29  ** KEPT (pick-wt=8): 232 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_aenc(A,B)).
% 2.07/2.29  ** KEPT (pick-wt=8): 233 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(constr_adec(A,B)).
% 2.07/2.29  ** KEPT (pick-wt=8): 234 [] -pred_attacker(A)| -pred_attacker(B)|pred_attacker(tuple_2(A,B)).
% 2.07/2.29  ** KEPT (pick-wt=6): 235 [] -pred_attacker(tuple_2(A,B))|pred_attacker(A).
% 2.07/2.29  ** KEPT (pick-wt=6): 236 [] -pred_attacker(tuple_2(A,B))|pred_attacker(B).
% 2.07/2.29  ** KEPT (pick-wt=7): 237 [] -pred_mess(A,B)| -pred_attacker(A)|pred_attacker(B).
% 2.07/2.29  ** KEPT (pick-wt=7): 238 [] -pred_attacker(A)| -pred_attacker(B)|pred_mess(A,B).
% 2.07/2.29  ** KEPT (pick-wt=22): 239 [] -pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(A,constr_pkey(name_skS))))| -pred_attacker(tuple_client_A_in_2(A))|pred_attacker(tuple_client_A_out_3(constr_aenc(tuple_2(name_Na(B),name_A),constr_tuple_2_get_1_bitstring(constr_checksign(A,constr_pkey(name_skS)))))).
% 2.07/2.29  ** KEPT (pick-wt=34): 240 [] -pred_e_q_bitstring_bitstring(name_I,constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(A,name_skA)),name_Na(B)))| -pred_attacker(tuple_client_A_in_4(A))| -pred_e_q_bitstring_bitstring(name_I,constr_tuple_2_get_0x30(constr_checksign(C,constr_pkey(name_skS))))| -pred_attacker(tuple_client_A_in_2(C))|pred_attacker(tuple_client_A_out_5(constr_aenc(constr_tuple_2_get_1_bitstring(constr_adec(A,name_skA)),constr_tuple_2_get_1_bitstring(constr_checksign(C,constr_pkey(name_skS)))))).
% 2.07/2.29  ** KEPT (pick-wt=36): 241 [] -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(A,name_skB)))| -pred_attacker(tuple_client_B_in_3(A))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(B,constr_pkey(name_skS))))| -pred_attacker(tuple_client_B_in_2(B))|pred_attacker(tuple_client_B_out_4(constr_aenc(tuple_2(constr_xor(constr_tuple_2_get_0x30_bitstring(constr_adec(A,name_skB)),name_B),name_Nb(C)),constr_tuple_2_get_1_bitstring(constr_checksign(B,constr_pkey(name_skS)))))).
% 2.07/2.29  ** KEPT (pick-wt=31): 242 [] -pred_e_q_bitstring_bitstring(name_Nb(A),constr_adec(B,name_skB))| -pred_attacker(tuple_client_B_in_5(B))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(C,name_skB)))| -pred_attacker(tuple_client_B_in_3(C))| -pred_e_q_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(D,constr_pkey(name_skS))))| -pred_attacker(tuple_client_B_in_2(D))|pred_attacker(tuple_client_B_out_6(name_objective)).
% 2.07/2.29  ** KEPT (pick-wt=15): 243 [] -pred_table(tuple_keys(A,B))| -pred_attacker(tuple_key_retrieval_server_in_1(C,A))|pred_attacker(tuple_key_retrieval_server_out_2(constr_sign(tuple_2(A,B),name_skS))).
% 2.07/2.29  ** KEPT (pick-wt=14): 244 [] A=name_B|A=name_A| -pred_attacker(tuple_key_register_server_in_1(A,B))|pred_table(tuple_keys(A,B)).
% 2.07/2.29  ** KEPT (pick-wt=2): 245 [] -pred_attacker(name_objective).
% 2.07/2.29  
% 2.07/2.29  ------------> process sos:
% 2.07/2.29  ** KEPT (pick-wt=3): 259 [] A=A.
% 2.07/2.29  ** KEPT (pick-wt=8): 260 [] constr_adec(constr_aenc(A,constr_pkey(B)),B)=A.
% 2.07/2.29  ---> New Demodulator: 261 [new_demod,260] constr_adec(constr_aenc(A,constr_pkey(B)),B)=A.
% 2.07/2.29  ** KEPT (pick-wt=7): 262 [] constr_dec(constr_enc(A,B),B)=A.
% 2.07/2.29  ---> New Demodulator: 263 [new_demod,262] constr_dec(constr_enc(A,B),B)=A.
% 2.07/2.29  ** KEPT (pick-wt=6): 264 [] constr_getmess(constr_sign(A,B))=A.
% 2.07/2.29  ---> New Demodulator: 265 [new_demod,264] constr_getmess(constr_sign(A,B))=A.
% 2.07/2.29  ** KEPT (pick-wt=8): 266 [] constr_checksign(constr_sign(A,B),constr_pkey(B))=A.
% 2.07/2.29  ---> New Demodulator: 267 [new_demod,266] constr_checksign(constr_sign(A,B),constr_pkey(B))=A.
% 2.07/2.29  ** KEPT (pick-wt=5): 268 [] constr_xor(A,A)=constr_ZERO.
% 2.07/2.29  ---> New Demodulator: 269 [new_demod,268] constr_xor(A,A)=constr_ZERO.
% 2.07/2.29  ** KEPT (pick-wt=5): 270 [] constr_xor(A,constr_ZERO)=A.
% 2.07/2.29  ---> New Demodulator: 271 [new_demod,270] constr_xor(A,constr_ZERO)=A.
% 2.07/2.29  ** KEPT (pick-wt=7): 272 [] constr_xor(A,B)=constr_xor(B,A).
% 3.54/3.70  ** KEPT (pick-wt=11): 274 [copy,273,flip.1] constr_xor(constr_xor(A,B),C)=constr_xor(A,constr_xor(B,C)).
% 3.54/3.70  ---> New Demodulator: 275 [new_demod,274] constr_xor(constr_xor(A,B),C)=constr_xor(A,constr_xor(B,C)).
% 3.54/3.70  ** KEPT (pick-wt=6): 276 [] constr_tuple_2_get_1_bitstring(tuple_2(A,B))=B.
% 3.54/3.70  ---> New Demodulator: 277 [new_demod,276] constr_tuple_2_get_1_bitstring(tuple_2(A,B))=B.
% 3.54/3.70  ** KEPT (pick-wt=6): 278 [] constr_tuple_2_get_0x30_bitstring(tuple_2(A,B))=A.
% 3.54/3.70  ---> New Demodulator: 279 [new_demod,278] constr_tuple_2_get_0x30_bitstring(tuple_2(A,B))=A.
% 3.54/3.70  ** KEPT (pick-wt=6): 280 [] constr_tuple_2_get_1(tuple_2(A,B))=B.
% 3.54/3.70  ---> New Demodulator: 281 [new_demod,280] constr_tuple_2_get_1(tuple_2(A,B))=B.
% 3.54/3.70  ** KEPT (pick-wt=6): 282 [] constr_tuple_2_get_0x30(tuple_2(A,B))=A.
% 3.54/3.70  ---> New Demodulator: 283 [new_demod,282] constr_tuple_2_get_0x30(tuple_2(A,B))=A.
% 3.54/3.70  ** KEPT (pick-wt=3): 284 [] pred_e_q_bitstring_bitstring(A,B).
% 3.54/3.70  ** KEPT (pick-wt=2): 285 [] pred_attacker(tuple_true).
% 3.54/3.70  ** KEPT (pick-wt=2): 286 [] pred_attacker(tuple_false).
% 3.54/3.70  ** KEPT (pick-wt=2): 287 [] pred_attacker(constr_ZERO).
% 3.54/3.70  ** KEPT (pick-wt=2): 288 [] pred_attacker(constr_CONST_4).
% 3.54/3.70  ** KEPT (pick-wt=2): 289 [] pred_attacker(constr_CONST_3).
% 3.54/3.70  ** KEPT (pick-wt=2): 290 [] pred_attacker(constr_CONST_2).
% 3.54/3.70  ** KEPT (pick-wt=2): 291 [] pred_attacker(constr_CONST_1).
% 3.54/3.70  ** KEPT (pick-wt=2): 292 [] pred_attacker(constr_CONST_0x30).
% 3.54/3.70  ** KEPT (pick-wt=2): 293 [] pred_attacker(name_c).
% 3.54/3.70  ** KEPT (pick-wt=2): 294 [] pred_attacker(name_I).
% 3.54/3.70  ** KEPT (pick-wt=2): 295 [] pred_attacker(name_B).
% 3.54/3.70  ** KEPT (pick-wt=2): 296 [] pred_attacker(name_A).
% 3.54/3.70  ** KEPT (pick-wt=3): 297 [] pred_e_qual(A,A).
% 3.54/3.70  ** KEPT (pick-wt=3): 298 [] pred_attacker(name_new0x2Dname(A)).
% 3.54/3.70  ** KEPT (pick-wt=5): 299 [] pred_table(tuple_keys(name_A,constr_pkey(name_skA))).
% 3.54/3.70  ** KEPT (pick-wt=5): 300 [] pred_table(tuple_keys(name_B,constr_pkey(name_skB))).
% 3.54/3.70  ** KEPT (pick-wt=4): 301 [] pred_attacker(tuple_out_1(constr_pkey(name_skA))).
% 3.54/3.70  ** KEPT (pick-wt=4): 302 [] pred_attacker(tuple_out_2(constr_pkey(name_skB))).
% 3.54/3.70  ** KEPT (pick-wt=4): 303 [] pred_attacker(tuple_out_3(constr_pkey(name_skS))).
% 3.54/3.70  ** KEPT (pick-wt=4): 304 [] pred_attacker(tuple_client_A_out_1(name_A,name_I)).
% 3.54/3.70  ** KEPT (pick-wt=4): 305 [] pred_attacker(tuple_client_B_out_1(name_B,name_A)).
% 3.54/3.70    Following clause subsumed by 259 during input processing: 0 [copy,259,flip.1] A=A.
% 3.54/3.70  >>>> Starting back demodulation with 261.
% 3.54/3.70  >>>> Starting back demodulation with 263.
% 3.54/3.70  >>>> Starting back demodulation with 265.
% 3.54/3.70  >>>> Starting back demodulation with 267.
% 3.54/3.70  >>>> Starting back demodulation with 269.
% 3.54/3.70      >> back demodulating 246 with 269.
% 3.54/3.70  >>>> Starting back demodulation with 271.
% 3.54/3.70    Following clause subsumed by 272 during input processing: 0 [copy,272,flip.1] constr_xor(A,B)=constr_xor(B,A).
% 3.54/3.70  >>>> Starting back demodulation with 275.
% 3.54/3.70  >>>> Starting back demodulation with 277.
% 3.54/3.70  >>>> Starting back demodulation with 279.
% 3.54/3.70  >>>> Starting back demodulation with 281.
% 3.54/3.70  >>>> Starting back demodulation with 283.
% 3.54/3.70  
% 3.54/3.70  ======= end of input processing =======
% 3.54/3.70  
% 3.54/3.70  =========== start of search ===========
% 3.54/3.70  
% 3.54/3.70  
% 3.54/3.70  Resetting weight limit to 3.
% 3.54/3.70  
% 3.54/3.70  
% 3.54/3.70  Resetting weight limit to 3.
% 3.54/3.70  
% 3.54/3.70  sos_size=1795
% 3.54/3.70  
% 3.54/3.70  -------- PROOF -------- 
% 3.54/3.70  
% 3.54/3.70  ----> UNIT CONFLICT at   1.43 sec ----> 2128 [binary,2127.1,245.1] $F.
% 3.54/3.70  
% 3.54/3.70  Length of proof is 5.  Level of proof is 3.
% 3.54/3.70  
% 3.54/3.70  ---------------- PROOF ----------------
% 3.54/3.70  % SZS status Theorem
% 3.54/3.70  % SZS output start Refutation
% See solution above
% 3.54/3.70  ------------ end of proof -------------
% 3.54/3.70  
% 3.54/3.70  
% 3.54/3.70  Search stopped by max_proofs option.
% 3.54/3.70  
% 3.54/3.70  
% 3.54/3.70  Search stopped by max_proofs option.
% 3.54/3.70  
% 3.54/3.70  ============ end of search ============
% 3.54/3.70  
% 3.54/3.70  -------------- statistics -------------
% 3.54/3.70  clauses given                485
% 3.54/3.70  clauses generated        1377878
% 3.54/3.70  clauses kept                2024
% 3.54/3.70  clauses forward subsumed    1626
% 3.54/3.70  clauses back subsumed          3
% 3.54/3.70  Kbytes malloced             5859
% 3.54/3.70  
% 3.54/3.70  ----------- times (seconds) -----------
% 3.54/3.70  user CPU time          1.43          (0 hr, 0 min, 1 sec)
% 3.54/3.70  system CPU time        0.00          (0 hr, 0 min, 0 sec)
% 3.54/3.70  wall-clock time        4             (0 hr, 0 min, 4 sec)
% 3.54/3.70  
% 3.54/3.70  That finishes the proof of the theorem.
% 3.54/3.70  
% 3.54/3.70  Process 28997 finished Wed Jul 27 03:13:22 2022
% 3.54/3.70  Otter interrupted
% 3.54/3.70  PROOF FOUND
%------------------------------------------------------------------------------