TSTP Solution File: SWW967+1 by SnakeForV---1.0

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : SnakeForV---1.0
% Problem  : SWW967+1 : TPTP v8.1.0. Released v7.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_uns --cores 0 -t %d %s

% Computer : n027.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Wed Aug 31 19:15:10 EDT 2022

% Result   : Theorem 0.16s 0.47s
% Output   : Refutation 0.16s
% Verified : 
% SZS Type : Refutation
%            Derivation depth      :    8
%            Number of leaves      :   19
% Syntax   : Number of formulae    :   82 (  20 unt;   0 def)
%            Number of atoms       :  216 (   0 equ)
%            Maximal formula atoms :    9 (   2 avg)
%            Number of connectives :  256 ( 122   ~;  99   |;  14   &)
%                                         (   7 <=>;  14  =>;   0  <=;   0 <~>)
%            Maximal formula depth :   15 (   5 avg)
%            Maximal term depth    :    4 (   2 avg)
%            Number of predicates  :   10 (   9 usr;   8 prp; 0-2 aty)
%            Number of functors    :   21 (  21 usr;   5 con; 0-3 aty)
%            Number of variables   :  108 ( 108   !;   0   ?)

% Comments : 
%------------------------------------------------------------------------------
fof(f906,plain,
    $false,
    inference(avatar_sat_refutation,[],[f592,f606,f640,f679,f818,f897,f902,f905]) ).

fof(f905,plain,
    ~ spl0_1,
    inference(avatar_contradiction_clause,[],[f904]) ).

fof(f904,plain,
    ( $false
    | ~ spl0_1 ),
    inference(resolution,[],[f903,f506]) ).

fof(f506,plain,
    ~ pred_attacker(name_objective),
    inference(cnf_transformation,[],[f263]) ).

fof(f263,plain,
    ~ pred_attacker(name_objective),
    inference(flattening,[],[f176]) ).

fof(f176,negated_conjecture,
    ~ pred_attacker(name_objective),
    inference(negated_conjecture,[],[f175]) ).

fof(f175,conjecture,
    pred_attacker(name_objective),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',co0) ).

fof(f903,plain,
    ( pred_attacker(name_objective)
    | ~ spl0_1 ),
    inference(resolution,[],[f588,f562]) ).

fof(f562,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_A_out_9(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f333]) ).

fof(f333,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_A_out_9(X0))
      | pred_attacker(X0) ),
    inference(ennf_transformation,[],[f237]) ).

fof(f237,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_out_9(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f110]) ).

fof(f110,axiom,
    ! [X97] :
      ( pred_attacker(tuple_client_A_out_9(X97))
     => pred_attacker(X97) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax109) ).

fof(f588,plain,
    ( pred_attacker(tuple_client_A_out_9(name_objective))
    | ~ spl0_1 ),
    inference(avatar_component_clause,[],[f586]) ).

fof(f586,plain,
    ( spl0_1
  <=> pred_attacker(tuple_client_A_out_9(name_objective)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_1])]) ).

fof(f902,plain,
    ( spl0_7
    | ~ spl0_6 ),
    inference(avatar_split_clause,[],[f901,f604,f742]) ).

fof(f742,plain,
    ( spl0_7
  <=> ! [X1] : ~ pred_attacker(X1) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_7])]) ).

fof(f604,plain,
    ( spl0_6
  <=> ! [X4] :
        ( ~ pred_attacker(tuple_client_A_in_6(X4))
        | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X4,name_Kas))) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_6])]) ).

fof(f901,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl0_6 ),
    inference(resolution,[],[f898,f431]) ).

fof(f431,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_6(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f309]) ).

fof(f309,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_6(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f219]) ).

fof(f219,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_6(X0)) ),
    inference(rectify,[],[f123]) ).

fof(f123,axiom,
    ! [X118] :
      ( pred_attacker(X118)
     => pred_attacker(tuple_client_A_in_6(X118)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax122) ).

fof(f898,plain,
    ( ! [X0] : ~ pred_attacker(tuple_client_A_in_6(X0))
    | ~ spl0_6 ),
    inference(resolution,[],[f605,f445]) ).

fof(f445,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X1,X0),
    inference(cnf_transformation,[],[f264]) ).

fof(f264,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X1,X0),
    inference(rectify,[],[f84]) ).

fof(f84,axiom,
    ! [X63,X62] : pred_eq_bitstring_bitstring(X62,X63),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax83) ).

fof(f605,plain,
    ( ! [X4] :
        ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X4,name_Kas)))
        | ~ pred_attacker(tuple_client_A_in_6(X4)) )
    | ~ spl0_6 ),
    inference(avatar_component_clause,[],[f604]) ).

fof(f897,plain,
    ( spl0_7
    | ~ spl0_5 ),
    inference(avatar_split_clause,[],[f896,f601,f742]) ).

fof(f601,plain,
    ( spl0_5
  <=> ! [X2,X3] :
        ( ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X3,name_Kas)))
        | ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_4_get_0x30(constr_cbc_dec_4(X3,name_Kas)))
        | ~ pred_attacker(tuple_client_A_in_2(X3)) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_5])]) ).

fof(f896,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl0_5 ),
    inference(resolution,[],[f893,f496]) ).

fof(f496,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f356]) ).

fof(f356,plain,
    ! [X0] :
      ( ~ pred_attacker(X0)
      | pred_attacker(tuple_client_A_in_2(X0)) ),
    inference(ennf_transformation,[],[f239]) ).

fof(f239,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_2(X0)) ),
    inference(rectify,[],[f127]) ).

fof(f127,axiom,
    ! [X122] :
      ( pred_attacker(X122)
     => pred_attacker(tuple_client_A_in_2(X122)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax126) ).

fof(f893,plain,
    ( ! [X0] : ~ pred_attacker(tuple_client_A_in_2(X0))
    | ~ spl0_5 ),
    inference(resolution,[],[f868,f445]) ).

fof(f868,plain,
    ( ! [X0] :
        ( ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X0,name_Kas)))
        | ~ pred_attacker(tuple_client_A_in_2(X0)) )
    | ~ spl0_5 ),
    inference(resolution,[],[f602,f445]) ).

fof(f602,plain,
    ( ! [X2,X3] :
        ( ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_4_get_0x30(constr_cbc_dec_4(X3,name_Kas)))
        | ~ pred_attacker(tuple_client_A_in_2(X3))
        | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X3,name_Kas))) )
    | ~ spl0_5 ),
    inference(avatar_component_clause,[],[f601]) ).

fof(f818,plain,
    ~ spl0_7,
    inference(avatar_contradiction_clause,[],[f755]) ).

fof(f755,plain,
    ( $false
    | ~ spl0_7 ),
    inference(resolution,[],[f743,f714]) ).

fof(f714,plain,
    pred_attacker(name_B),
    inference(resolution,[],[f458,f499]) ).

fof(f499,plain,
    ! [X0] : pred_attacker(tuple_client_A_out_1(name_A,name_B,name_Na(X0))),
    inference(cnf_transformation,[],[f184]) ).

fof(f184,plain,
    ! [X0] : pred_attacker(tuple_client_A_out_1(name_A,name_B,name_Na(X0))),
    inference(rectify,[],[f168]) ).

fof(f168,axiom,
    ! [X196] : pred_attacker(tuple_client_A_out_1(name_A,name_B,name_Na(X196))),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax167) ).

fof(f458,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(tuple_client_A_out_1(X2,X0,X1))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f384]) ).

fof(f384,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_A_out_1(X2,X0,X1)) ),
    inference(rectify,[],[f364]) ).

fof(f364,plain,
    ! [X1,X2,X0] :
      ( pred_attacker(X1)
      | ~ pred_attacker(tuple_client_A_out_1(X0,X1,X2)) ),
    inference(ennf_transformation,[],[f212]) ).

fof(f212,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_client_A_out_1(X0,X1,X2))
     => pred_attacker(X1) ),
    inference(rectify,[],[f119]) ).

fof(f119,axiom,
    ! [X110,X111,X112] :
      ( pred_attacker(tuple_client_A_out_1(X110,X111,X112))
     => pred_attacker(X111) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax118) ).

fof(f743,plain,
    ( ! [X1] : ~ pred_attacker(X1)
    | ~ spl0_7 ),
    inference(avatar_component_clause,[],[f742]) ).

fof(f679,plain,
    ~ spl0_4,
    inference(avatar_contradiction_clause,[],[f651]) ).

fof(f651,plain,
    ( $false
    | ~ spl0_4 ),
    inference(resolution,[],[f644,f564]) ).

fof(f564,plain,
    pred_attacker(name_A),
    inference(cnf_transformation,[],[f165]) ).

fof(f165,axiom,
    pred_attacker(name_A),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax164) ).

fof(f644,plain,
    ( ! [X1] : ~ pred_attacker(X1)
    | ~ spl0_4 ),
    inference(resolution,[],[f551,f599]) ).

fof(f599,plain,
    ( ! [X1] : ~ pred_attacker(tuple_client_A_in_8(X1))
    | ~ spl0_4 ),
    inference(avatar_component_clause,[],[f598]) ).

fof(f598,plain,
    ( spl0_4
  <=> ! [X1] : ~ pred_attacker(tuple_client_A_in_8(X1)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_4])]) ).

fof(f551,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_8(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f355]) ).

fof(f355,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_8(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f195]) ).

fof(f195,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_8(X0)) ),
    inference(rectify,[],[f121]) ).

fof(f121,axiom,
    ! [X116] :
      ( pred_attacker(X116)
     => pred_attacker(tuple_client_A_in_8(X116)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax120) ).

fof(f640,plain,
    ~ spl0_3,
    inference(avatar_contradiction_clause,[],[f616]) ).

fof(f616,plain,
    ( $false
    | ~ spl0_3 ),
    inference(resolution,[],[f608,f480]) ).

fof(f480,plain,
    pred_attacker(name_I),
    inference(cnf_transformation,[],[f163]) ).

fof(f163,axiom,
    pred_attacker(name_I),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax162) ).

fof(f608,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl0_3 ),
    inference(resolution,[],[f533,f596]) ).

fof(f596,plain,
    ( ! [X0] : ~ pred_attacker(tuple_client_A_in_4(X0))
    | ~ spl0_3 ),
    inference(avatar_component_clause,[],[f595]) ).

fof(f595,plain,
    ( spl0_3
  <=> ! [X0] : ~ pred_attacker(tuple_client_A_in_4(X0)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_3])]) ).

fof(f533,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f303]) ).

fof(f303,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f213]) ).

fof(f213,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_4(X0)) ),
    inference(rectify,[],[f125]) ).

fof(f125,axiom,
    ! [X120] :
      ( pred_attacker(X120)
     => pred_attacker(tuple_client_A_in_4(X120)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax124) ).

fof(f606,plain,
    ( spl0_3
    | spl0_4
    | spl0_5
    | spl0_6
    | ~ spl0_2 ),
    inference(avatar_split_clause,[],[f593,f590,f604,f601,f598,f595]) ).

fof(f590,plain,
    ( spl0_2
  <=> ! [X2,X4,X0,X3,X1] :
        ( ~ pred_attacker(tuple_client_A_in_6(X0))
        | ~ pred_attacker(tuple_client_A_in_2(X3))
        | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X0,name_Kas)))
        | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X3,name_Kas)))
        | ~ pred_attacker(tuple_client_A_in_4(X1))
        | ~ pred_eq_bitstring_bitstring(name_Na(X4),constr_tuple_4_get_0x30(constr_cbc_dec_4(X3,name_Kas)))
        | ~ pred_attacker(tuple_client_A_in_8(X2))
        | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X1,X3,X4)),constr_cbc_dec_1(X2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl0_2])]) ).

fof(f593,plain,
    ( ! [X2,X3,X0,X1,X4] :
        ( ~ pred_attacker(tuple_client_A_in_6(X4))
        | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X3,name_Kas)))
        | ~ pred_attacker(tuple_client_A_in_8(X1))
        | ~ pred_attacker(tuple_client_A_in_2(X3))
        | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X4,name_Kas)))
        | ~ pred_attacker(tuple_client_A_in_4(X0))
        | ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_4_get_0x30(constr_cbc_dec_4(X3,name_Kas))) )
    | ~ spl0_2 ),
    inference(resolution,[],[f445,f591]) ).

fof(f591,plain,
    ( ! [X2,X3,X0,X1,X4] :
        ( ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X1,X3,X4)),constr_cbc_dec_1(X2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas))))
        | ~ pred_attacker(tuple_client_A_in_4(X1))
        | ~ pred_attacker(tuple_client_A_in_8(X2))
        | ~ pred_eq_bitstring_bitstring(name_Na(X4),constr_tuple_4_get_0x30(constr_cbc_dec_4(X3,name_Kas)))
        | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X3,name_Kas)))
        | ~ pred_attacker(tuple_client_A_in_2(X3))
        | ~ pred_attacker(tuple_client_A_in_6(X0))
        | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X0,name_Kas))) )
    | ~ spl0_2 ),
    inference(avatar_component_clause,[],[f590]) ).

fof(f592,plain,
    ( spl0_1
    | spl0_2 ),
    inference(avatar_split_clause,[],[f474,f590,f586]) ).

fof(f474,plain,
    ! [X2,X3,X0,X1,X4] :
      ( ~ pred_attacker(tuple_client_A_in_6(X0))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X1,X3,X4)),constr_cbc_dec_1(X2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas))))
      | pred_attacker(tuple_client_A_out_9(name_objective))
      | ~ pred_attacker(tuple_client_A_in_8(X2))
      | ~ pred_eq_bitstring_bitstring(name_Na(X4),constr_tuple_4_get_0x30(constr_cbc_dec_4(X3,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_4(X1))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X3,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X0,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_2(X3)) ),
    inference(cnf_transformation,[],[f386]) ).

fof(f386,plain,
    ! [X0,X1,X2,X3,X4] :
      ( ~ pred_attacker(tuple_client_A_in_8(X2))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X3,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(name_Na(X4),constr_tuple_4_get_0x30(constr_cbc_dec_4(X3,name_Kas)))
      | pred_attacker(tuple_client_A_out_9(name_objective))
      | ~ pred_attacker(tuple_client_A_in_6(X0))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X1,X3,X4)),constr_cbc_dec_1(X2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas))))
      | ~ pred_attacker(tuple_client_A_in_4(X1))
      | ~ pred_attacker(tuple_client_A_in_2(X3))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X0,name_Kas))) ),
    inference(rectify,[],[f330]) ).

fof(f330,plain,
    ! [X2,X1,X4,X0,X3] :
      ( ~ pred_attacker(tuple_client_A_in_8(X4))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X0,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(name_Na(X3),constr_tuple_4_get_0x30(constr_cbc_dec_4(X0,name_Kas)))
      | pred_attacker(tuple_client_A_out_9(name_objective))
      | ~ pred_attacker(tuple_client_A_in_6(X2))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X1,X0,X3)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X2,name_Kas))))
      | ~ pred_attacker(tuple_client_A_in_4(X1))
      | ~ pred_attacker(tuple_client_A_in_2(X0))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X2,name_Kas))) ),
    inference(flattening,[],[f329]) ).

fof(f329,plain,
    ! [X2,X4,X1,X3,X0] :
      ( pred_attacker(tuple_client_A_out_9(name_objective))
      | ~ pred_attacker(tuple_client_A_in_4(X1))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X0,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X2,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_8(X4))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X1,X0,X3)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X2,name_Kas))))
      | ~ pred_attacker(tuple_client_A_in_2(X0))
      | ~ pred_eq_bitstring_bitstring(name_Na(X3),constr_tuple_4_get_0x30(constr_cbc_dec_4(X0,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_6(X2)) ),
    inference(ennf_transformation,[],[f193]) ).

fof(f193,plain,
    ! [X2,X4,X1,X3,X0] :
      ( ( pred_attacker(tuple_client_A_in_4(X1))
        & pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X0,name_Kas)))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X2,name_Kas)))
        & pred_attacker(tuple_client_A_in_8(X4))
        & pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X1,X0,X3)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X2,name_Kas))))
        & pred_attacker(tuple_client_A_in_2(X0))
        & pred_eq_bitstring_bitstring(name_Na(X3),constr_tuple_4_get_0x30(constr_cbc_dec_4(X0,name_Kas)))
        & pred_attacker(tuple_client_A_in_6(X2)) )
     => pred_attacker(tuple_client_A_out_9(name_objective)) ),
    inference(rectify,[],[f172]) ).

fof(f172,axiom,
    ! [X208,X209,X207,X206,X210] :
      ( ( pred_attacker(tuple_client_A_in_2(X208))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X207,name_Kas)))
        & pred_attacker(tuple_client_A_in_8(X210))
        & pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X209,X208,X206)),constr_cbc_dec_1(X210,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X207,name_Kas))))
        & pred_eq_bitstring_bitstring(name_Na(X206),constr_tuple_4_get_0x30(constr_cbc_dec_4(X208,name_Kas)))
        & pred_attacker(tuple_client_A_in_6(X207))
        & pred_attacker(tuple_client_A_in_4(X209))
        & pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X208,name_Kas))) )
     => pred_attacker(tuple_client_A_out_9(name_objective)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax171) ).

%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.09/0.10  % Problem    : SWW967+1 : TPTP v8.1.0. Released v7.4.0.
% 0.09/0.11  % Command    : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_uns --cores 0 -t %d %s
% 0.10/0.31  % Computer : n027.cluster.edu
% 0.10/0.31  % Model    : x86_64 x86_64
% 0.10/0.31  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.10/0.31  % Memory   : 8042.1875MB
% 0.10/0.31  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.10/0.31  % CPULimit   : 300
% 0.10/0.31  % WCLimit    : 300
% 0.10/0.31  % DateTime   : Tue Aug 30 21:34:01 EDT 2022
% 0.10/0.31  % CPUTime    : 
% 0.16/0.42  % (13275)lrs+10_1:1_ins=3:sp=reverse_frequency:spb=goal:to=lpo:i=3:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/3Mi)
% 0.16/0.44  % (13275)Instruction limit reached!
% 0.16/0.44  % (13275)------------------------------
% 0.16/0.44  % (13275)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.16/0.44  % (13275)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.16/0.44  % (13275)Termination reason: Unknown
% 0.16/0.44  % (13275)Termination phase: Preprocessing 3
% 0.16/0.44  
% 0.16/0.44  % (13275)Memory used [KB]: 1791
% 0.16/0.44  % (13275)Time elapsed: 0.005 s
% 0.16/0.44  % (13275)Instructions burned: 4 (million)
% 0.16/0.44  % (13275)------------------------------
% 0.16/0.44  % (13275)------------------------------
% 0.16/0.44  % (13283)dis+1010_2:3_fs=off:fsr=off:nm=0:nwc=5.0:s2a=on:s2agt=32:i=82:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/82Mi)
% 0.16/0.46  % (13283)First to succeed.
% 0.16/0.47  % (13283)Refutation found. Thanks to Tanya!
% 0.16/0.47  % SZS status Theorem for theBenchmark
% 0.16/0.47  % SZS output start Proof for theBenchmark
% See solution above
% 0.16/0.47  % (13283)------------------------------
% 0.16/0.47  % (13283)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.16/0.47  % (13283)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.16/0.47  % (13283)Termination reason: Refutation
% 0.16/0.47  
% 0.16/0.47  % (13283)Memory used [KB]: 6652
% 0.16/0.47  % (13283)Time elapsed: 0.073 s
% 0.16/0.47  % (13283)Instructions burned: 15 (million)
% 0.16/0.47  % (13283)------------------------------
% 0.16/0.47  % (13283)------------------------------
% 0.16/0.47  % (13260)Success in time 0.145 s
%------------------------------------------------------------------------------