TSTP Solution File: SWW968+1 by Enigma---0.5.1
View Problem
- Process Solution
%------------------------------------------------------------------------------
% File : Enigma---0.5.1
% Problem : SWW968+1 : TPTP v8.1.0. Released v7.4.0.
% Transfm : none
% Format : tptp:raw
% Command : enigmatic-eprover.py %s %d 1
% Computer : n017.cluster.edu
% Model : x86_64 x86_64
% CPU : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory : 8042.1875MB
% OS : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit : 600s
% DateTime : Thu Jul 21 00:03:12 EDT 2022
% Result : Theorem 8.56s 2.55s
% Output : CNFRefutation 8.56s
% Verified :
% SZS Type : Refutation
% Derivation depth : 18
% Number of leaves : 20
% Syntax : Number of clauses : 69 ( 19 unt; 0 nHn; 56 RR)
% Number of literals : 173 ( 8 equ; 108 neg)
% Maximal clause size : 5 ( 2 avg)
% Maximal term depth : 5 ( 2 avg)
% Number of predicates : 3 ( 1 usr; 1 prp; 0-2 aty)
% Number of functors : 25 ( 25 usr; 6 con; 0-5 aty)
% Number of variables : 144 ( 67 sgn)
% Comments :
%------------------------------------------------------------------------------
cnf(i_0_186,plain,
( pred_attacker(tuple_client_A_out_9(name_objective1))
| ~ pred_attacker(tuple_client_A_in_8(X1))
| ~ pred_attacker(tuple_client_A_in_6(X2))
| ~ pred_attacker(tuple_client_A_in_4(X3))
| ~ pred_attacker(tuple_client_A_in_2(X4)) ),
file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-7cglgvu0/input.p',i_0_186) ).
cnf(i_0_135,plain,
( pred_attacker(tuple_client_A_in_8(X1))
| ~ pred_attacker(X1) ),
file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-7cglgvu0/input.p',i_0_135) ).
cnf(i_0_137,plain,
( pred_attacker(tuple_client_A_in_6(X1))
| ~ pred_attacker(X1) ),
file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-7cglgvu0/input.p',i_0_137) ).
cnf(i_0_139,plain,
( pred_attacker(tuple_client_A_in_4(X1))
| ~ pred_attacker(X1) ),
file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-7cglgvu0/input.p',i_0_139) ).
cnf(i_0_141,plain,
( pred_attacker(tuple_client_A_in_2(X1))
| ~ pred_attacker(X1) ),
file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-7cglgvu0/input.p',i_0_141) ).
cnf(i_0_182,plain,
pred_attacker(tuple_client_A_out_1(name_A,name_B,name_Na(X1))),
file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-7cglgvu0/input.p',i_0_182) ).
cnf(i_0_152,plain,
( pred_attacker(constr_cbc_4_get_2_prefixes(X1))
| ~ pred_attacker(X1) ),
file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-7cglgvu0/input.p',i_0_152) ).
cnf(i_0_84,plain,
constr_cbc_4_get_2_prefixes(constr_cbc_enc_4(X1,X2,X3,X4,X5)) = constr_cbc_enc_2(X1,X2,X5),
file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-7cglgvu0/input.p',i_0_84) ).
cnf(i_0_107,plain,
( pred_attacker(X1)
| ~ pred_attacker(tuple_server_S_out_2(X1)) ),
file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-7cglgvu0/input.p',i_0_107) ).
cnf(i_0_189,plain,
( pred_attacker(tuple_server_S_out_2(constr_cbc_enc_4(X1,X2,name_Kab_66(X3),constr_cbc_enc_2(name_Kab_66(X3),X4,name_Kbs),name_Kas)))
| ~ pred_attacker(tuple_server_S_in_1(X4,X2,X1)) ),
file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-7cglgvu0/input.p',i_0_189) ).
cnf(i_0_187,plain,
( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))))
| ~ pred_attacker(tuple_client_A_in_8(X2))
| ~ pred_attacker(tuple_client_A_in_6(X1))
| ~ pred_attacker(tuple_client_A_in_4(X3))
| ~ pred_attacker(tuple_client_A_in_2(X4)) ),
file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-7cglgvu0/input.p',i_0_187) ).
cnf(i_0_108,plain,
( pred_attacker(tuple_server_S_in_1(X1,X2,X3))
| ~ pred_attacker(X3)
| ~ pred_attacker(X2)
| ~ pred_attacker(X1) ),
file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-7cglgvu0/input.p',i_0_108) ).
cnf(i_0_122,plain,
( pred_attacker(X1)
| ~ pred_attacker(tuple_client_A_out_9(X1)) ),
file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-7cglgvu0/input.p',i_0_122) ).
cnf(i_0_81,plain,
constr_cbc_dec_2(constr_cbc_enc_2(X1,X2,X3),X3) = tuple_2(X1,X2),
file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-7cglgvu0/input.p',i_0_81) ).
cnf(i_0_92,plain,
constr_tuple_2_get_0x30_bitstring(tuple_2(X1,X2)) = X1,
file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-7cglgvu0/input.p',i_0_92) ).
cnf(i_0_190,negated_conjecture,
~ pred_attacker(tuple_2(name_objective1,name_objective2)),
file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-7cglgvu0/input.p',i_0_190) ).
cnf(i_0_171,plain,
( pred_attacker(tuple_2(X1,X2))
| ~ pred_attacker(X2)
| ~ pred_attacker(X1) ),
file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-7cglgvu0/input.p',i_0_171) ).
cnf(i_0_114,plain,
( pred_attacker(constr_dec(X1,X2))
| ~ pred_attacker(X2)
| ~ pred_attacker(X1) ),
file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-7cglgvu0/input.p',i_0_114) ).
cnf(i_0_89,plain,
constr_dec(constr_enc(X1,X2),X2) = X1,
file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-7cglgvu0/input.p',i_0_89) ).
cnf(i_0_130,plain,
( pred_attacker(X1)
| ~ pred_attacker(tuple_client_A_out_10(X1)) ),
file('/export/starexec/sandbox/tmp/enigma-theBenchmark.p-7cglgvu0/input.p',i_0_130) ).
cnf(c_0_211,plain,
( pred_attacker(tuple_client_A_out_9(name_objective1))
| ~ pred_attacker(tuple_client_A_in_8(X1))
| ~ pred_attacker(tuple_client_A_in_6(X2))
| ~ pred_attacker(tuple_client_A_in_4(X3))
| ~ pred_attacker(tuple_client_A_in_2(X4)) ),
i_0_186 ).
cnf(c_0_212,plain,
( pred_attacker(tuple_client_A_in_8(X1))
| ~ pred_attacker(X1) ),
i_0_135 ).
cnf(c_0_213,plain,
( pred_attacker(tuple_client_A_out_9(name_objective1))
| ~ pred_attacker(tuple_client_A_in_6(X1))
| ~ pred_attacker(tuple_client_A_in_4(X2))
| ~ pred_attacker(tuple_client_A_in_2(X3))
| ~ pred_attacker(X4) ),
inference(spm,[status(thm)],[c_0_211,c_0_212]) ).
cnf(c_0_214,plain,
( pred_attacker(tuple_client_A_in_6(X1))
| ~ pred_attacker(X1) ),
i_0_137 ).
cnf(c_0_215,plain,
( pred_attacker(tuple_client_A_out_9(name_objective1))
| ~ pred_attacker(tuple_client_A_in_4(X1))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_attacker(X3)
| ~ pred_attacker(X4) ),
inference(spm,[status(thm)],[c_0_213,c_0_214]) ).
cnf(c_0_216,plain,
( pred_attacker(tuple_client_A_in_4(X1))
| ~ pred_attacker(X1) ),
i_0_139 ).
cnf(c_0_217,plain,
( pred_attacker(tuple_client_A_out_9(name_objective1))
| ~ pred_attacker(tuple_client_A_in_2(X1))
| ~ pred_attacker(X2)
| ~ pred_attacker(X3)
| ~ pred_attacker(X4) ),
inference(spm,[status(thm)],[c_0_215,c_0_216]) ).
cnf(c_0_218,plain,
( pred_attacker(tuple_client_A_in_2(X1))
| ~ pred_attacker(X1) ),
i_0_141 ).
cnf(c_0_219,plain,
( pred_attacker(tuple_client_A_out_9(name_objective1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X2)
| ~ pred_attacker(X3)
| ~ pred_attacker(X4) ),
inference(spm,[status(thm)],[c_0_217,c_0_218]) ).
cnf(c_0_220,plain,
pred_attacker(tuple_client_A_out_1(name_A,name_B,name_Na(X1))),
i_0_182 ).
cnf(c_0_221,plain,
( pred_attacker(tuple_client_A_out_9(name_objective1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X2)
| ~ pred_attacker(X3) ),
inference(spm,[status(thm)],[c_0_219,c_0_220]) ).
cnf(c_0_222,plain,
( pred_attacker(constr_cbc_4_get_2_prefixes(X1))
| ~ pred_attacker(X1) ),
i_0_152 ).
cnf(c_0_223,plain,
constr_cbc_4_get_2_prefixes(constr_cbc_enc_4(X1,X2,X3,X4,X5)) = constr_cbc_enc_2(X1,X2,X5),
i_0_84 ).
cnf(c_0_224,plain,
( pred_attacker(X1)
| ~ pred_attacker(tuple_server_S_out_2(X1)) ),
i_0_107 ).
cnf(c_0_225,plain,
( pred_attacker(tuple_server_S_out_2(constr_cbc_enc_4(X1,X2,name_Kab_66(X3),constr_cbc_enc_2(name_Kab_66(X3),X4,name_Kbs),name_Kas)))
| ~ pred_attacker(tuple_server_S_in_1(X4,X2,X1)) ),
i_0_189 ).
cnf(c_0_226,plain,
( pred_attacker(tuple_client_A_out_9(name_objective1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X2) ),
inference(spm,[status(thm)],[c_0_221,c_0_220]) ).
cnf(c_0_227,plain,
( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))))
| ~ pred_attacker(tuple_client_A_in_8(X2))
| ~ pred_attacker(tuple_client_A_in_6(X1))
| ~ pred_attacker(tuple_client_A_in_4(X3))
| ~ pred_attacker(tuple_client_A_in_2(X4)) ),
i_0_187 ).
cnf(c_0_228,plain,
( pred_attacker(constr_cbc_enc_2(X1,X2,X3))
| ~ pred_attacker(constr_cbc_enc_4(X1,X2,X4,X5,X3)) ),
inference(spm,[status(thm)],[c_0_222,c_0_223]) ).
cnf(c_0_229,plain,
( pred_attacker(constr_cbc_enc_4(X1,X2,name_Kab_66(X3),constr_cbc_enc_2(name_Kab_66(X3),X4,name_Kbs),name_Kas))
| ~ pred_attacker(tuple_server_S_in_1(X4,X2,X1)) ),
inference(spm,[status(thm)],[c_0_224,c_0_225]) ).
cnf(c_0_230,plain,
( pred_attacker(tuple_client_A_out_9(name_objective1))
| ~ pred_attacker(X1) ),
inference(spm,[status(thm)],[c_0_226,c_0_220]) ).
cnf(c_0_231,plain,
( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))))
| ~ pred_attacker(tuple_client_A_in_6(X1))
| ~ pred_attacker(tuple_client_A_in_4(X2))
| ~ pred_attacker(tuple_client_A_in_2(X3))
| ~ pred_attacker(X4) ),
inference(spm,[status(thm)],[c_0_227,c_0_212]) ).
cnf(c_0_232,plain,
( pred_attacker(constr_cbc_enc_2(X1,X2,name_Kas))
| ~ pred_attacker(tuple_server_S_in_1(X3,X2,X1)) ),
inference(spm,[status(thm)],[c_0_228,c_0_229]) ).
cnf(c_0_233,plain,
( pred_attacker(tuple_server_S_in_1(X1,X2,X3))
| ~ pred_attacker(X3)
| ~ pred_attacker(X2)
| ~ pred_attacker(X1) ),
i_0_108 ).
cnf(c_0_234,plain,
( pred_attacker(X1)
| ~ pred_attacker(tuple_client_A_out_9(X1)) ),
i_0_122 ).
cnf(c_0_235,plain,
pred_attacker(tuple_client_A_out_9(name_objective1)),
inference(spm,[status(thm)],[c_0_230,c_0_220]) ).
cnf(c_0_236,plain,
( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))))
| ~ pred_attacker(tuple_client_A_in_4(X2))
| ~ pred_attacker(tuple_client_A_in_2(X3))
| ~ pred_attacker(X4)
| ~ pred_attacker(X1) ),
inference(spm,[status(thm)],[c_0_231,c_0_214]) ).
cnf(c_0_237,plain,
( pred_attacker(constr_cbc_enc_2(X1,X2,name_Kas))
| ~ pred_attacker(X1)
| ~ pred_attacker(X2)
| ~ pred_attacker(X3) ),
inference(spm,[status(thm)],[c_0_232,c_0_233]) ).
cnf(c_0_238,plain,
pred_attacker(name_objective1),
inference(spm,[status(thm)],[c_0_234,c_0_235]) ).
cnf(c_0_239,plain,
( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_attacker(X3)
| ~ pred_attacker(X1)
| ~ pred_attacker(X4) ),
inference(spm,[status(thm)],[c_0_236,c_0_216]) ).
cnf(c_0_240,plain,
( pred_attacker(constr_cbc_enc_2(name_objective1,X1,name_Kas))
| ~ pred_attacker(X1)
| ~ pred_attacker(X2) ),
inference(spm,[status(thm)],[c_0_237,c_0_238]) ).
cnf(c_0_241,plain,
( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))))
| ~ pred_attacker(X2)
| ~ pred_attacker(X1)
| ~ pred_attacker(X3)
| ~ pred_attacker(X4) ),
inference(spm,[status(thm)],[c_0_239,c_0_218]) ).
cnf(c_0_242,plain,
( pred_attacker(constr_cbc_enc_2(name_objective1,name_objective1,name_Kas))
| ~ pred_attacker(X1) ),
inference(spm,[status(thm)],[c_0_240,c_0_238]) ).
cnf(c_0_243,plain,
( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))))
| ~ pred_attacker(X1)
| ~ pred_attacker(X2)
| ~ pred_attacker(X3) ),
inference(spm,[status(thm)],[c_0_241,c_0_235]) ).
cnf(c_0_244,plain,
pred_attacker(constr_cbc_enc_2(name_objective1,name_objective1,name_Kas)),
inference(spm,[status(thm)],[c_0_242,c_0_235]) ).
cnf(c_0_245,plain,
constr_cbc_dec_2(constr_cbc_enc_2(X1,X2,X3),X3) = tuple_2(X1,X2),
i_0_81 ).
cnf(c_0_246,plain,
constr_tuple_2_get_0x30_bitstring(tuple_2(X1,X2)) = X1,
i_0_92 ).
cnf(c_0_247,plain,
( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,name_objective1)))
| ~ pred_attacker(X1)
| ~ pred_attacker(X2) ),
inference(rw,[status(thm)],[inference(rw,[status(thm)],[inference(spm,[status(thm)],[c_0_243,c_0_244]),c_0_245]),c_0_246]) ).
cnf(c_0_248,plain,
( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,name_objective1)))
| ~ pred_attacker(X1) ),
inference(spm,[status(thm)],[c_0_247,c_0_235]) ).
cnf(c_0_249,negated_conjecture,
~ pred_attacker(tuple_2(name_objective1,name_objective2)),
i_0_190 ).
cnf(c_0_250,plain,
( pred_attacker(tuple_2(X1,X2))
| ~ pred_attacker(X2)
| ~ pred_attacker(X1) ),
i_0_171 ).
cnf(c_0_251,plain,
( pred_attacker(constr_dec(X1,X2))
| ~ pred_attacker(X2)
| ~ pred_attacker(X1) ),
i_0_114 ).
cnf(c_0_252,plain,
constr_dec(constr_enc(X1,X2),X2) = X1,
i_0_89 ).
cnf(c_0_253,plain,
( pred_attacker(X1)
| ~ pred_attacker(tuple_client_A_out_10(X1)) ),
i_0_130 ).
cnf(c_0_254,plain,
pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,name_objective1))),
inference(spm,[status(thm)],[c_0_248,c_0_235]) ).
cnf(c_0_255,negated_conjecture,
( ~ pred_attacker(name_objective2)
| ~ pred_attacker(name_objective1) ),
inference(spm,[status(thm)],[c_0_249,c_0_250]) ).
cnf(c_0_256,plain,
( pred_attacker(X1)
| ~ pred_attacker(constr_enc(X1,X2))
| ~ pred_attacker(X2) ),
inference(spm,[status(thm)],[c_0_251,c_0_252]) ).
cnf(c_0_257,plain,
pred_attacker(constr_enc(name_objective2,name_objective1)),
inference(spm,[status(thm)],[c_0_253,c_0_254]) ).
cnf(c_0_258,negated_conjecture,
~ pred_attacker(name_objective2),
inference(cn,[status(thm)],[inference(rw,[status(thm)],[c_0_255,c_0_238])]) ).
cnf(c_0_259,plain,
$false,
inference(sr,[status(thm)],[inference(cn,[status(thm)],[inference(rw,[status(thm)],[inference(spm,[status(thm)],[c_0_256,c_0_257]),c_0_238])]),c_0_258]),
[proof] ).
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.13/0.14 % Problem : SWW968+1 : TPTP v8.1.0. Released v7.4.0.
% 0.13/0.14 % Command : enigmatic-eprover.py %s %d 1
% 0.14/0.36 % Computer : n017.cluster.edu
% 0.14/0.36 % Model : x86_64 x86_64
% 0.14/0.36 % CPU : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.14/0.36 % Memory : 8042.1875MB
% 0.14/0.36 % OS : Linux 3.10.0-693.el7.x86_64
% 0.14/0.36 % CPULimit : 300
% 0.14/0.36 % WCLimit : 600
% 0.14/0.36 % DateTime : Mon Jun 6 08:44:03 EDT 2022
% 0.14/0.36 % CPUTime :
% 0.21/0.48 # ENIGMATIC: Selected complete mode:
% 8.56/2.55 # ENIGMATIC: Solved by autoschedule:
% 8.56/2.55 # No SInE strategy applied
% 8.56/2.55 # Trying AutoSched0 for 150 seconds
% 8.56/2.55 # AutoSched0-Mode selected heuristic G_E___208_C18_F1_SE_CS_SP_PS_S5PRR_RG_S04AN
% 8.56/2.55 # and selection function SelectComplexExceptUniqMaxHorn.
% 8.56/2.55 #
% 8.56/2.55 # Preprocessing time : 0.027 s
% 8.56/2.55 # Presaturation interreduction done
% 8.56/2.55
% 8.56/2.55 # Proof found!
% 8.56/2.55 # SZS status Theorem
% 8.56/2.55 # SZS output start CNFRefutation
% See solution above
% 8.56/2.55 # Training examples: 0 positive, 0 negative
% 8.56/2.55
% 8.56/2.55 # -------------------------------------------------
% 8.56/2.55 # User time : 0.070 s
% 8.56/2.55 # System time : 0.008 s
% 8.56/2.55 # Total time : 0.078 s
% 8.56/2.55 # Maximum resident set size: 7120 pages
% 8.56/2.55
%------------------------------------------------------------------------------