TSTP Solution File: SWW965+1 by SnakeForV---1.0
View Problem
- Process Solution
%------------------------------------------------------------------------------
% File : SnakeForV---1.0
% Problem : SWW965+1 : TPTP v8.1.0. Released v7.4.0.
% Transfm : none
% Format : tptp:raw
% Command : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_uns --cores 0 -t %d %s
% Computer : n010.cluster.edu
% Model : x86_64 x86_64
% CPU : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory : 8042.1875MB
% OS : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit : 300s
% DateTime : Wed Aug 31 19:15:10 EDT 2022
% Result : Theorem 1.78s 0.59s
% Output : Refutation 1.78s
% Verified :
% SZS Type : Refutation
% Derivation depth : 7
% Number of leaves : 14
% Syntax : Number of formulae : 63 ( 17 unt; 0 def)
% Number of atoms : 147 ( 0 equ)
% Maximal formula atoms : 7 ( 2 avg)
% Number of connectives : 158 ( 74 ~; 58 |; 10 &)
% ( 4 <=>; 12 =>; 0 <=; 0 <~>)
% Maximal formula depth : 12 ( 4 avg)
% Maximal term depth : 4 ( 2 avg)
% Number of predicates : 7 ( 6 usr; 5 prp; 0-2 aty)
% Number of functors : 16 ( 16 usr; 5 con; 0-2 aty)
% Number of variables : 64 ( 64 !; 0 ?)
% Comments :
%------------------------------------------------------------------------------
fof(f728,plain,
$false,
inference(avatar_sat_refutation,[],[f570,f615,f660,f663,f720]) ).
fof(f720,plain,
~ spl0_1,
inference(avatar_contradiction_clause,[],[f685]) ).
fof(f685,plain,
( $false
| ~ spl0_1 ),
inference(resolution,[],[f669,f666]) ).
fof(f666,plain,
pred_attacker(constr_pkey(name_skS)),
inference(resolution,[],[f370,f468]) ).
fof(f468,plain,
pred_attacker(tuple_out_3(constr_pkey(name_skS))),
inference(cnf_transformation,[],[f179]) ).
fof(f179,axiom,
pred_attacker(tuple_out_3(constr_pkey(name_skS))),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax178) ).
fof(f370,plain,
! [X0] :
( ~ pred_attacker(tuple_out_3(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f313]) ).
fof(f313,plain,
! [X0] :
( ~ pred_attacker(tuple_out_3(X0))
| pred_attacker(X0) ),
inference(ennf_transformation,[],[f215]) ).
fof(f215,plain,
! [X0] :
( pred_attacker(tuple_out_3(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f114]) ).
fof(f114,axiom,
! [X35] :
( pred_attacker(tuple_out_3(X35))
=> pred_attacker(X35) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax113) ).
fof(f669,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl0_1 ),
inference(resolution,[],[f667,f476]) ).
fof(f476,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f282]) ).
fof(f282,plain,
! [X0] :
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_B_in_5(X0)) ),
inference(ennf_transformation,[],[f217]) ).
fof(f217,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_5(X0)) ),
inference(rectify,[],[f138]) ).
fof(f138,axiom,
! [X69] :
( pred_attacker(X69)
=> pred_attacker(tuple_client_B_in_5(X69)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax137) ).
fof(f667,plain,
( ! [X0] : ~ pred_attacker(tuple_client_B_in_5(X0))
| ~ spl0_1 ),
inference(resolution,[],[f559,f485]) ).
fof(f485,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
inference(cnf_transformation,[],[f263]) ).
fof(f263,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
inference(rectify,[],[f104]) ).
fof(f104,axiom,
! [X23,X24] : pred_eq_bitstring_bitstring(X23,X24),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax103) ).
fof(f559,plain,
( ! [X0,X1] :
( ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X1,name_skB))
| ~ pred_attacker(tuple_client_B_in_5(X1)) )
| ~ spl0_1 ),
inference(avatar_component_clause,[],[f558]) ).
fof(f558,plain,
( spl0_1
<=> ! [X0,X1] :
( ~ pred_attacker(tuple_client_B_in_5(X1))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X1,name_skB)) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_1])]) ).
fof(f663,plain,
~ spl0_4,
inference(avatar_contradiction_clause,[],[f662]) ).
fof(f662,plain,
( $false
| ~ spl0_4 ),
inference(resolution,[],[f661,f493]) ).
fof(f493,plain,
~ pred_attacker(name_objective),
inference(cnf_transformation,[],[f209]) ).
fof(f209,plain,
~ pred_attacker(name_objective),
inference(flattening,[],[f189]) ).
fof(f189,negated_conjecture,
~ pred_attacker(name_objective),
inference(negated_conjecture,[],[f188]) ).
fof(f188,conjecture,
pred_attacker(name_objective),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',co0) ).
fof(f661,plain,
( pred_attacker(name_objective)
| ~ spl0_4 ),
inference(resolution,[],[f569,f409]) ).
fof(f409,plain,
! [X0] :
( ~ pred_attacker(tuple_client_B_out_6(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f341]) ).
fof(f341,plain,
! [X0] :
( ~ pred_attacker(tuple_client_B_out_6(X0))
| pred_attacker(X0) ),
inference(ennf_transformation,[],[f193]) ).
fof(f193,plain,
! [X0] :
( pred_attacker(tuple_client_B_out_6(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f132]) ).
fof(f132,axiom,
! [X60] :
( pred_attacker(tuple_client_B_out_6(X60))
=> pred_attacker(X60) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax131) ).
fof(f569,plain,
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ spl0_4 ),
inference(avatar_component_clause,[],[f567]) ).
fof(f567,plain,
( spl0_4
<=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_4])]) ).
fof(f660,plain,
~ spl0_3,
inference(avatar_contradiction_clause,[],[f627]) ).
fof(f627,plain,
( $false
| ~ spl0_3 ),
inference(resolution,[],[f618,f529]) ).
fof(f529,plain,
pred_attacker(name_I),
inference(cnf_transformation,[],[f170]) ).
fof(f170,axiom,
pred_attacker(name_I),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax169) ).
fof(f618,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl0_3 ),
inference(resolution,[],[f616,f396]) ).
fof(f396,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_2(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f283]) ).
fof(f283,plain,
! [X0] :
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_B_in_2(X0)) ),
inference(ennf_transformation,[],[f210]) ).
fof(f210,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_2(X0)) ),
inference(rectify,[],[f142]) ).
fof(f142,axiom,
! [X73] :
( pred_attacker(X73)
=> pred_attacker(tuple_client_B_in_2(X73)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax141) ).
fof(f616,plain,
( ! [X0] : ~ pred_attacker(tuple_client_B_in_2(X0))
| ~ spl0_3 ),
inference(resolution,[],[f565,f485]) ).
fof(f565,plain,
( ! [X3] :
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_2(X3)) )
| ~ spl0_3 ),
inference(avatar_component_clause,[],[f564]) ).
fof(f564,plain,
( spl0_3
<=> ! [X3] :
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_2(X3)) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_3])]) ).
fof(f615,plain,
~ spl0_2,
inference(avatar_contradiction_clause,[],[f583]) ).
fof(f583,plain,
( $false
| ~ spl0_2 ),
inference(resolution,[],[f573,f529]) ).
fof(f573,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl0_2 ),
inference(resolution,[],[f480,f571]) ).
fof(f571,plain,
( ! [X0] : ~ pred_attacker(tuple_client_B_in_3(X0))
| ~ spl0_2 ),
inference(resolution,[],[f485,f562]) ).
fof(f562,plain,
( ! [X2] :
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X2,name_skB)))
| ~ pred_attacker(tuple_client_B_in_3(X2)) )
| ~ spl0_2 ),
inference(avatar_component_clause,[],[f561]) ).
fof(f561,plain,
( spl0_2
<=> ! [X2] :
( ~ pred_attacker(tuple_client_B_in_3(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X2,name_skB))) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_2])]) ).
fof(f480,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f331]) ).
fof(f331,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_3(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f254]) ).
fof(f254,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_3(X0)) ),
inference(rectify,[],[f140]) ).
fof(f140,axiom,
! [X71] :
( pred_attacker(X71)
=> pred_attacker(tuple_client_B_in_3(X71)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax139) ).
fof(f570,plain,
( spl0_1
| spl0_2
| spl0_3
| spl0_4 ),
inference(avatar_split_clause,[],[f533,f567,f564,f561,f558]) ).
fof(f533,plain,
! [X2,X3,X0,X1] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X2))
| ~ pred_attacker(tuple_client_B_in_5(X1))
| ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X1,name_skB))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X2,name_skB)))
| ~ pred_attacker(tuple_client_B_in_2(X3)) ),
inference(cnf_transformation,[],[f366]) ).
fof(f366,plain,
! [X0,X1,X2,X3] :
( ~ pred_eq_bitstring_bitstring(name_Nb(X0),constr_adec(X1,name_skB))
| ~ pred_attacker(tuple_client_B_in_5(X1))
| ~ pred_attacker(tuple_client_B_in_2(X3))
| pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X3,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X2))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X2,name_skB))) ),
inference(rectify,[],[f278]) ).
fof(f278,plain,
! [X3,X0,X1,X2] :
( ~ pred_eq_bitstring_bitstring(name_Nb(X3),constr_adec(X0,name_skB))
| ~ pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_attacker(tuple_client_B_in_2(X2))
| pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB))) ),
inference(flattening,[],[f277]) ).
fof(f277,plain,
! [X1,X3,X2,X0] :
( pred_attacker(tuple_client_B_out_6(name_objective))
| ~ pred_attacker(tuple_client_B_in_5(X0))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
| ~ pred_eq_bitstring_bitstring(name_Nb(X3),constr_adec(X0,name_skB))
| ~ pred_attacker(tuple_client_B_in_3(X1))
| ~ pred_attacker(tuple_client_B_in_2(X2)) ),
inference(ennf_transformation,[],[f241]) ).
fof(f241,plain,
! [X1,X3,X2,X0] :
( ( pred_attacker(tuple_client_B_in_5(X0))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X2,constr_pkey(name_skS))))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X1,name_skB)))
& pred_eq_bitstring_bitstring(name_Nb(X3),constr_adec(X0,name_skB))
& pred_attacker(tuple_client_B_in_3(X1))
& pred_attacker(tuple_client_B_in_2(X2)) )
=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
inference(rectify,[],[f185]) ).
fof(f185,axiom,
! [X117,X116,X118,X115] :
( ( pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_adec(X116,name_skB)))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_0x30(constr_checksign(X118,constr_pkey(name_skS))))
& pred_attacker(tuple_client_B_in_2(X118))
& pred_attacker(tuple_client_B_in_5(X117))
& pred_attacker(tuple_client_B_in_3(X116))
& pred_eq_bitstring_bitstring(name_Nb(X115),constr_adec(X117,name_skB)) )
=> pred_attacker(tuple_client_B_out_6(name_objective)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax184) ).
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.03/0.12 % Problem : SWW965+1 : TPTP v8.1.0. Released v7.4.0.
% 0.03/0.13 % Command : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_uns --cores 0 -t %d %s
% 0.14/0.34 % Computer : n010.cluster.edu
% 0.14/0.34 % Model : x86_64 x86_64
% 0.14/0.34 % CPU : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.14/0.34 % Memory : 8042.1875MB
% 0.14/0.34 % OS : Linux 3.10.0-693.el7.x86_64
% 0.14/0.34 % CPULimit : 300
% 0.14/0.34 % WCLimit : 300
% 0.14/0.34 % DateTime : Tue Aug 30 21:11:28 EDT 2022
% 0.14/0.34 % CPUTime :
% 0.20/0.54 % (24364)dis+1010_1:50_awrs=decay:awrsf=128:nwc=10.0:s2pl=no:sp=frequency:ss=axioms:i=39:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/39Mi)
% 0.20/0.55 % (24364)Refutation not found, incomplete strategy% (24364)------------------------------
% 0.20/0.55 % (24364)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.20/0.55 % (24380)dis+1010_2:3_fs=off:fsr=off:nm=0:nwc=5.0:s2a=on:s2agt=32:i=82:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/82Mi)
% 0.20/0.55 % (24364)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.20/0.55 % (24364)Termination reason: Refutation not found, incomplete strategy
% 0.20/0.55
% 0.20/0.55 % (24364)Memory used [KB]: 6012
% 0.20/0.55 % (24364)Time elapsed: 0.123 s
% 0.20/0.55 % (24364)Instructions burned: 3 (million)
% 0.20/0.55 % (24364)------------------------------
% 0.20/0.55 % (24364)------------------------------
% 1.57/0.56 % (24373)lrs+10_1:1_drc=off:sp=reverse_frequency:spb=goal:to=lpo:i=7:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/7Mi)
% 1.57/0.58 % (24372)lrs+10_1:1_ins=3:sp=reverse_frequency:spb=goal:to=lpo:i=3:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/3Mi)
% 1.57/0.58 % (24381)dis+10_1:1_av=off:sos=on:sp=reverse_arity:ss=included:st=2.0:to=lpo:urr=ec_only:i=45:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/45Mi)
% 1.57/0.58 % (24372)Instruction limit reached!
% 1.57/0.58 % (24372)------------------------------
% 1.57/0.58 % (24372)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.57/0.58 % (24372)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.57/0.58 % (24372)Termination reason: Unknown
% 1.57/0.58 % (24372)Termination phase: Naming
% 1.57/0.58
% 1.57/0.58 % (24372)Memory used [KB]: 1663
% 1.57/0.58 % (24372)Time elapsed: 0.006 s
% 1.57/0.58 % (24372)Instructions burned: 3 (million)
% 1.57/0.58 % (24372)------------------------------
% 1.57/0.58 % (24372)------------------------------
% 1.57/0.58 % (24381)Refutation not found, incomplete strategy% (24381)------------------------------
% 1.57/0.58 % (24381)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.57/0.58 % (24380)First to succeed.
% 1.57/0.59 % (24373)Instruction limit reached!
% 1.57/0.59 % (24373)------------------------------
% 1.57/0.59 % (24373)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.78/0.59 % (24380)Refutation found. Thanks to Tanya!
% 1.78/0.59 % SZS status Theorem for theBenchmark
% 1.78/0.59 % SZS output start Proof for theBenchmark
% See solution above
% 1.78/0.59 % (24380)------------------------------
% 1.78/0.59 % (24380)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 1.78/0.59 % (24380)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 1.78/0.59 % (24380)Termination reason: Refutation
% 1.78/0.59
% 1.78/0.59 % (24380)Memory used [KB]: 6396
% 1.78/0.59 % (24380)Time elapsed: 0.158 s
% 1.78/0.59 % (24380)Instructions burned: 9 (million)
% 1.78/0.59 % (24380)------------------------------
% 1.78/0.59 % (24380)------------------------------
% 1.78/0.59 % (24357)Success in time 0.237 s
%------------------------------------------------------------------------------