TSTP Solution File: SWW967+1 by SnakeForV---1.0
View Problem
- Process Solution
%------------------------------------------------------------------------------
% File : SnakeForV---1.0
% Problem : SWW967+1 : TPTP v8.1.0. Released v7.4.0.
% Transfm : none
% Format : tptp:raw
% Command : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_uns --cores 0 -t %d %s
% Computer : n027.cluster.edu
% Model : x86_64 x86_64
% CPU : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory : 8042.1875MB
% OS : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit : 300s
% DateTime : Wed Aug 31 19:15:10 EDT 2022
% Result : Theorem 0.16s 0.47s
% Output : Refutation 0.16s
% Verified :
% SZS Type : Refutation
% Derivation depth : 8
% Number of leaves : 19
% Syntax : Number of formulae : 82 ( 20 unt; 0 def)
% Number of atoms : 216 ( 0 equ)
% Maximal formula atoms : 9 ( 2 avg)
% Number of connectives : 256 ( 122 ~; 99 |; 14 &)
% ( 7 <=>; 14 =>; 0 <=; 0 <~>)
% Maximal formula depth : 15 ( 5 avg)
% Maximal term depth : 4 ( 2 avg)
% Number of predicates : 10 ( 9 usr; 8 prp; 0-2 aty)
% Number of functors : 21 ( 21 usr; 5 con; 0-3 aty)
% Number of variables : 108 ( 108 !; 0 ?)
% Comments :
%------------------------------------------------------------------------------
fof(f906,plain,
$false,
inference(avatar_sat_refutation,[],[f592,f606,f640,f679,f818,f897,f902,f905]) ).
fof(f905,plain,
~ spl0_1,
inference(avatar_contradiction_clause,[],[f904]) ).
fof(f904,plain,
( $false
| ~ spl0_1 ),
inference(resolution,[],[f903,f506]) ).
fof(f506,plain,
~ pred_attacker(name_objective),
inference(cnf_transformation,[],[f263]) ).
fof(f263,plain,
~ pred_attacker(name_objective),
inference(flattening,[],[f176]) ).
fof(f176,negated_conjecture,
~ pred_attacker(name_objective),
inference(negated_conjecture,[],[f175]) ).
fof(f175,conjecture,
pred_attacker(name_objective),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',co0) ).
fof(f903,plain,
( pred_attacker(name_objective)
| ~ spl0_1 ),
inference(resolution,[],[f588,f562]) ).
fof(f562,plain,
! [X0] :
( ~ pred_attacker(tuple_client_A_out_9(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f333]) ).
fof(f333,plain,
! [X0] :
( ~ pred_attacker(tuple_client_A_out_9(X0))
| pred_attacker(X0) ),
inference(ennf_transformation,[],[f237]) ).
fof(f237,plain,
! [X0] :
( pred_attacker(tuple_client_A_out_9(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f110]) ).
fof(f110,axiom,
! [X97] :
( pred_attacker(tuple_client_A_out_9(X97))
=> pred_attacker(X97) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax109) ).
fof(f588,plain,
( pred_attacker(tuple_client_A_out_9(name_objective))
| ~ spl0_1 ),
inference(avatar_component_clause,[],[f586]) ).
fof(f586,plain,
( spl0_1
<=> pred_attacker(tuple_client_A_out_9(name_objective)) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_1])]) ).
fof(f902,plain,
( spl0_7
| ~ spl0_6 ),
inference(avatar_split_clause,[],[f901,f604,f742]) ).
fof(f742,plain,
( spl0_7
<=> ! [X1] : ~ pred_attacker(X1) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_7])]) ).
fof(f604,plain,
( spl0_6
<=> ! [X4] :
( ~ pred_attacker(tuple_client_A_in_6(X4))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X4,name_Kas))) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_6])]) ).
fof(f901,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl0_6 ),
inference(resolution,[],[f898,f431]) ).
fof(f431,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_6(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f309]) ).
fof(f309,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_6(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f219]) ).
fof(f219,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_A_in_6(X0)) ),
inference(rectify,[],[f123]) ).
fof(f123,axiom,
! [X118] :
( pred_attacker(X118)
=> pred_attacker(tuple_client_A_in_6(X118)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax122) ).
fof(f898,plain,
( ! [X0] : ~ pred_attacker(tuple_client_A_in_6(X0))
| ~ spl0_6 ),
inference(resolution,[],[f605,f445]) ).
fof(f445,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X1,X0),
inference(cnf_transformation,[],[f264]) ).
fof(f264,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X1,X0),
inference(rectify,[],[f84]) ).
fof(f84,axiom,
! [X63,X62] : pred_eq_bitstring_bitstring(X62,X63),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax83) ).
fof(f605,plain,
( ! [X4] :
( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X4,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_6(X4)) )
| ~ spl0_6 ),
inference(avatar_component_clause,[],[f604]) ).
fof(f897,plain,
( spl0_7
| ~ spl0_5 ),
inference(avatar_split_clause,[],[f896,f601,f742]) ).
fof(f601,plain,
( spl0_5
<=> ! [X2,X3] :
( ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X3,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_4_get_0x30(constr_cbc_dec_4(X3,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_2(X3)) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_5])]) ).
fof(f896,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl0_5 ),
inference(resolution,[],[f893,f496]) ).
fof(f496,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_2(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f356]) ).
fof(f356,plain,
! [X0] :
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_A_in_2(X0)) ),
inference(ennf_transformation,[],[f239]) ).
fof(f239,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_A_in_2(X0)) ),
inference(rectify,[],[f127]) ).
fof(f127,axiom,
! [X122] :
( pred_attacker(X122)
=> pred_attacker(tuple_client_A_in_2(X122)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax126) ).
fof(f893,plain,
( ! [X0] : ~ pred_attacker(tuple_client_A_in_2(X0))
| ~ spl0_5 ),
inference(resolution,[],[f868,f445]) ).
fof(f868,plain,
( ! [X0] :
( ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X0,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_2(X0)) )
| ~ spl0_5 ),
inference(resolution,[],[f602,f445]) ).
fof(f602,plain,
( ! [X2,X3] :
( ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_4_get_0x30(constr_cbc_dec_4(X3,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X3,name_Kas))) )
| ~ spl0_5 ),
inference(avatar_component_clause,[],[f601]) ).
fof(f818,plain,
~ spl0_7,
inference(avatar_contradiction_clause,[],[f755]) ).
fof(f755,plain,
( $false
| ~ spl0_7 ),
inference(resolution,[],[f743,f714]) ).
fof(f714,plain,
pred_attacker(name_B),
inference(resolution,[],[f458,f499]) ).
fof(f499,plain,
! [X0] : pred_attacker(tuple_client_A_out_1(name_A,name_B,name_Na(X0))),
inference(cnf_transformation,[],[f184]) ).
fof(f184,plain,
! [X0] : pred_attacker(tuple_client_A_out_1(name_A,name_B,name_Na(X0))),
inference(rectify,[],[f168]) ).
fof(f168,axiom,
! [X196] : pred_attacker(tuple_client_A_out_1(name_A,name_B,name_Na(X196))),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax167) ).
fof(f458,plain,
! [X2,X0,X1] :
( ~ pred_attacker(tuple_client_A_out_1(X2,X0,X1))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f384]) ).
fof(f384,plain,
! [X0,X1,X2] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_A_out_1(X2,X0,X1)) ),
inference(rectify,[],[f364]) ).
fof(f364,plain,
! [X1,X2,X0] :
( pred_attacker(X1)
| ~ pred_attacker(tuple_client_A_out_1(X0,X1,X2)) ),
inference(ennf_transformation,[],[f212]) ).
fof(f212,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_client_A_out_1(X0,X1,X2))
=> pred_attacker(X1) ),
inference(rectify,[],[f119]) ).
fof(f119,axiom,
! [X110,X111,X112] :
( pred_attacker(tuple_client_A_out_1(X110,X111,X112))
=> pred_attacker(X111) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax118) ).
fof(f743,plain,
( ! [X1] : ~ pred_attacker(X1)
| ~ spl0_7 ),
inference(avatar_component_clause,[],[f742]) ).
fof(f679,plain,
~ spl0_4,
inference(avatar_contradiction_clause,[],[f651]) ).
fof(f651,plain,
( $false
| ~ spl0_4 ),
inference(resolution,[],[f644,f564]) ).
fof(f564,plain,
pred_attacker(name_A),
inference(cnf_transformation,[],[f165]) ).
fof(f165,axiom,
pred_attacker(name_A),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax164) ).
fof(f644,plain,
( ! [X1] : ~ pred_attacker(X1)
| ~ spl0_4 ),
inference(resolution,[],[f551,f599]) ).
fof(f599,plain,
( ! [X1] : ~ pred_attacker(tuple_client_A_in_8(X1))
| ~ spl0_4 ),
inference(avatar_component_clause,[],[f598]) ).
fof(f598,plain,
( spl0_4
<=> ! [X1] : ~ pred_attacker(tuple_client_A_in_8(X1)) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_4])]) ).
fof(f551,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_8(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f355]) ).
fof(f355,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_8(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f195]) ).
fof(f195,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_A_in_8(X0)) ),
inference(rectify,[],[f121]) ).
fof(f121,axiom,
! [X116] :
( pred_attacker(X116)
=> pred_attacker(tuple_client_A_in_8(X116)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax120) ).
fof(f640,plain,
~ spl0_3,
inference(avatar_contradiction_clause,[],[f616]) ).
fof(f616,plain,
( $false
| ~ spl0_3 ),
inference(resolution,[],[f608,f480]) ).
fof(f480,plain,
pred_attacker(name_I),
inference(cnf_transformation,[],[f163]) ).
fof(f163,axiom,
pred_attacker(name_I),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax162) ).
fof(f608,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl0_3 ),
inference(resolution,[],[f533,f596]) ).
fof(f596,plain,
( ! [X0] : ~ pred_attacker(tuple_client_A_in_4(X0))
| ~ spl0_3 ),
inference(avatar_component_clause,[],[f595]) ).
fof(f595,plain,
( spl0_3
<=> ! [X0] : ~ pred_attacker(tuple_client_A_in_4(X0)) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_3])]) ).
fof(f533,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f303]) ).
fof(f303,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f213]) ).
fof(f213,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_A_in_4(X0)) ),
inference(rectify,[],[f125]) ).
fof(f125,axiom,
! [X120] :
( pred_attacker(X120)
=> pred_attacker(tuple_client_A_in_4(X120)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax124) ).
fof(f606,plain,
( spl0_3
| spl0_4
| spl0_5
| spl0_6
| ~ spl0_2 ),
inference(avatar_split_clause,[],[f593,f590,f604,f601,f598,f595]) ).
fof(f590,plain,
( spl0_2
<=> ! [X2,X4,X0,X3,X1] :
( ~ pred_attacker(tuple_client_A_in_6(X0))
| ~ pred_attacker(tuple_client_A_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X0,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X3,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_4(X1))
| ~ pred_eq_bitstring_bitstring(name_Na(X4),constr_tuple_4_get_0x30(constr_cbc_dec_4(X3,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_8(X2))
| ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X1,X3,X4)),constr_cbc_dec_1(X2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_2])]) ).
fof(f593,plain,
( ! [X2,X3,X0,X1,X4] :
( ~ pred_attacker(tuple_client_A_in_6(X4))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X3,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_8(X1))
| ~ pred_attacker(tuple_client_A_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X4,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_4_get_0x30(constr_cbc_dec_4(X3,name_Kas))) )
| ~ spl0_2 ),
inference(resolution,[],[f445,f591]) ).
fof(f591,plain,
( ! [X2,X3,X0,X1,X4] :
( ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X1,X3,X4)),constr_cbc_dec_1(X2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas))))
| ~ pred_attacker(tuple_client_A_in_4(X1))
| ~ pred_attacker(tuple_client_A_in_8(X2))
| ~ pred_eq_bitstring_bitstring(name_Na(X4),constr_tuple_4_get_0x30(constr_cbc_dec_4(X3,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X3,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_2(X3))
| ~ pred_attacker(tuple_client_A_in_6(X0))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X0,name_Kas))) )
| ~ spl0_2 ),
inference(avatar_component_clause,[],[f590]) ).
fof(f592,plain,
( spl0_1
| spl0_2 ),
inference(avatar_split_clause,[],[f474,f590,f586]) ).
fof(f474,plain,
! [X2,X3,X0,X1,X4] :
( ~ pred_attacker(tuple_client_A_in_6(X0))
| ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X1,X3,X4)),constr_cbc_dec_1(X2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas))))
| pred_attacker(tuple_client_A_out_9(name_objective))
| ~ pred_attacker(tuple_client_A_in_8(X2))
| ~ pred_eq_bitstring_bitstring(name_Na(X4),constr_tuple_4_get_0x30(constr_cbc_dec_4(X3,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_4(X1))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X3,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X0,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_2(X3)) ),
inference(cnf_transformation,[],[f386]) ).
fof(f386,plain,
! [X0,X1,X2,X3,X4] :
( ~ pred_attacker(tuple_client_A_in_8(X2))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X3,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_Na(X4),constr_tuple_4_get_0x30(constr_cbc_dec_4(X3,name_Kas)))
| pred_attacker(tuple_client_A_out_9(name_objective))
| ~ pred_attacker(tuple_client_A_in_6(X0))
| ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X1,X3,X4)),constr_cbc_dec_1(X2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas))))
| ~ pred_attacker(tuple_client_A_in_4(X1))
| ~ pred_attacker(tuple_client_A_in_2(X3))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X0,name_Kas))) ),
inference(rectify,[],[f330]) ).
fof(f330,plain,
! [X2,X1,X4,X0,X3] :
( ~ pred_attacker(tuple_client_A_in_8(X4))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X0,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_Na(X3),constr_tuple_4_get_0x30(constr_cbc_dec_4(X0,name_Kas)))
| pred_attacker(tuple_client_A_out_9(name_objective))
| ~ pred_attacker(tuple_client_A_in_6(X2))
| ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X1,X0,X3)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X2,name_Kas))))
| ~ pred_attacker(tuple_client_A_in_4(X1))
| ~ pred_attacker(tuple_client_A_in_2(X0))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X2,name_Kas))) ),
inference(flattening,[],[f329]) ).
fof(f329,plain,
! [X2,X4,X1,X3,X0] :
( pred_attacker(tuple_client_A_out_9(name_objective))
| ~ pred_attacker(tuple_client_A_in_4(X1))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X0,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X2,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_8(X4))
| ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X1,X0,X3)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X2,name_Kas))))
| ~ pred_attacker(tuple_client_A_in_2(X0))
| ~ pred_eq_bitstring_bitstring(name_Na(X3),constr_tuple_4_get_0x30(constr_cbc_dec_4(X0,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_6(X2)) ),
inference(ennf_transformation,[],[f193]) ).
fof(f193,plain,
! [X2,X4,X1,X3,X0] :
( ( pred_attacker(tuple_client_A_in_4(X1))
& pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X0,name_Kas)))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X2,name_Kas)))
& pred_attacker(tuple_client_A_in_8(X4))
& pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X1,X0,X3)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X2,name_Kas))))
& pred_attacker(tuple_client_A_in_2(X0))
& pred_eq_bitstring_bitstring(name_Na(X3),constr_tuple_4_get_0x30(constr_cbc_dec_4(X0,name_Kas)))
& pred_attacker(tuple_client_A_in_6(X2)) )
=> pred_attacker(tuple_client_A_out_9(name_objective)) ),
inference(rectify,[],[f172]) ).
fof(f172,axiom,
! [X208,X209,X207,X206,X210] :
( ( pred_attacker(tuple_client_A_in_2(X208))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X207,name_Kas)))
& pred_attacker(tuple_client_A_in_8(X210))
& pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X209,X208,X206)),constr_cbc_dec_1(X210,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X207,name_Kas))))
& pred_eq_bitstring_bitstring(name_Na(X206),constr_tuple_4_get_0x30(constr_cbc_dec_4(X208,name_Kas)))
& pred_attacker(tuple_client_A_in_6(X207))
& pred_attacker(tuple_client_A_in_4(X209))
& pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X208,name_Kas))) )
=> pred_attacker(tuple_client_A_out_9(name_objective)) ),
file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax171) ).
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.09/0.10 % Problem : SWW967+1 : TPTP v8.1.0. Released v7.4.0.
% 0.09/0.11 % Command : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_uns --cores 0 -t %d %s
% 0.10/0.31 % Computer : n027.cluster.edu
% 0.10/0.31 % Model : x86_64 x86_64
% 0.10/0.31 % CPU : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.10/0.31 % Memory : 8042.1875MB
% 0.10/0.31 % OS : Linux 3.10.0-693.el7.x86_64
% 0.10/0.31 % CPULimit : 300
% 0.10/0.31 % WCLimit : 300
% 0.10/0.31 % DateTime : Tue Aug 30 21:34:01 EDT 2022
% 0.10/0.31 % CPUTime :
% 0.16/0.42 % (13275)lrs+10_1:1_ins=3:sp=reverse_frequency:spb=goal:to=lpo:i=3:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/3Mi)
% 0.16/0.44 % (13275)Instruction limit reached!
% 0.16/0.44 % (13275)------------------------------
% 0.16/0.44 % (13275)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.16/0.44 % (13275)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.16/0.44 % (13275)Termination reason: Unknown
% 0.16/0.44 % (13275)Termination phase: Preprocessing 3
% 0.16/0.44
% 0.16/0.44 % (13275)Memory used [KB]: 1791
% 0.16/0.44 % (13275)Time elapsed: 0.005 s
% 0.16/0.44 % (13275)Instructions burned: 4 (million)
% 0.16/0.44 % (13275)------------------------------
% 0.16/0.44 % (13275)------------------------------
% 0.16/0.44 % (13283)dis+1010_2:3_fs=off:fsr=off:nm=0:nwc=5.0:s2a=on:s2agt=32:i=82:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/82Mi)
% 0.16/0.46 % (13283)First to succeed.
% 0.16/0.47 % (13283)Refutation found. Thanks to Tanya!
% 0.16/0.47 % SZS status Theorem for theBenchmark
% 0.16/0.47 % SZS output start Proof for theBenchmark
% See solution above
% 0.16/0.47 % (13283)------------------------------
% 0.16/0.47 % (13283)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.16/0.47 % (13283)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.16/0.47 % (13283)Termination reason: Refutation
% 0.16/0.47
% 0.16/0.47 % (13283)Memory used [KB]: 6652
% 0.16/0.47 % (13283)Time elapsed: 0.073 s
% 0.16/0.47 % (13283)Instructions burned: 15 (million)
% 0.16/0.47 % (13283)------------------------------
% 0.16/0.47 % (13283)------------------------------
% 0.16/0.47 % (13260)Success in time 0.145 s
%------------------------------------------------------------------------------