TSTP Solution File: SWW968+1 by SnakeForV---1.0

View Problem - Process Solution

%------------------------------------------------------------------------------
% File     : SnakeForV---1.0
% Problem  : SWW968+1 : TPTP v8.1.0. Released v7.4.0.
% Transfm  : none
% Format   : tptp:raw
% Command  : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_uns --cores 0 -t %d %s

% Computer : n018.cluster.edu
% Model    : x86_64 x86_64
% CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory   : 8042.1875MB
% OS       : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit  : 300s
% DateTime : Wed Aug 31 19:15:10 EDT 2022

% Result   : Theorem 0.15s 0.47s
% Output   : Refutation 0.15s
% Verified : 
% SZS Type : Refutation
%            Derivation depth      :   11
%            Number of leaves      :   35
% Syntax   : Number of formulae    :  165 (  28 unt;   0 def)
%            Number of atoms       :  484 (  16 equ)
%            Maximal formula atoms :    9 (   2 avg)
%            Number of connectives :  586 ( 267   ~; 241   |;  36   &)
%                                         (  12 <=>;  30  =>;   0  <=;   0 <~>)
%            Maximal formula depth :   15 (   6 avg)
%            Maximal term depth    :    5 (   2 avg)
%            Number of predicates  :   16 (  14 usr;  13 prp; 0-2 aty)
%            Number of functors    :   33 (  33 usr;   8 con; 0-5 aty)
%            Number of variables   :  321 ( 321   !;   0   ?)

% Comments : 
%------------------------------------------------------------------------------
fof(f1148,plain,
    $false,
    inference(avatar_sat_refutation,[],[f639,f685,f853,f900,f1028,f1033,f1036,f1038,f1040,f1042,f1064,f1139,f1146]) ).

fof(f1146,plain,
    ( spl1_27
    | spl1_4
    | ~ spl1_34 ),
    inference(avatar_split_clause,[],[f1145,f1137,f682,f1047]) ).

fof(f1047,plain,
    ( spl1_27
  <=> ! [X1] :
        ( ~ pred_attacker(constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))
        | ~ pred_attacker(tuple_client_A_in_6(X1)) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_27])]) ).

fof(f682,plain,
    ( spl1_4
  <=> pred_attacker(name_objective2) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_4])]) ).

fof(f1137,plain,
    ( spl1_34
  <=> ! [X4] :
        ( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas)))))
        | ~ pred_attacker(tuple_client_A_in_6(X4)) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_34])]) ).

fof(f1145,plain,
    ( ! [X0] :
        ( ~ pred_attacker(tuple_client_A_in_6(X0))
        | ~ pred_attacker(constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas))) )
    | spl1_4
    | ~ spl1_34 ),
    inference(subsumption_resolution,[],[f1143,f684]) ).

fof(f684,plain,
    ( ~ pred_attacker(name_objective2)
    | spl1_4 ),
    inference(avatar_component_clause,[],[f682]) ).

fof(f1143,plain,
    ( ! [X0] :
        ( ~ pred_attacker(constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))
        | ~ pred_attacker(tuple_client_A_in_6(X0))
        | pred_attacker(name_objective2) )
    | ~ spl1_34 ),
    inference(resolution,[],[f1140,f672]) ).

fof(f672,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(constr_enc(X0,X1))
      | ~ pred_attacker(X1)
      | pred_attacker(X0) ),
    inference(superposition,[],[f598,f540]) ).

fof(f540,plain,
    ! [X0,X1] : constr_dec(constr_enc(X0,X1),X1) = X0,
    inference(cnf_transformation,[],[f416]) ).

fof(f416,plain,
    ! [X0,X1] : constr_dec(constr_enc(X0,X1),X1) = X0,
    inference(rectify,[],[f206]) ).

fof(f206,plain,
    ! [X1,X0] : constr_dec(constr_enc(X1,X0),X0) = X1,
    inference(rectify,[],[f89]) ).

fof(f89,axiom,
    ! [X40,X41] : constr_dec(constr_enc(X41,X40),X40) = X41,
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax88) ).

fof(f598,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_dec(X0,X1))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(cnf_transformation,[],[f432]) ).

fof(f432,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(X1)
      | pred_attacker(constr_dec(X0,X1))
      | ~ pred_attacker(X0) ),
    inference(rectify,[],[f395]) ).

fof(f395,plain,
    ! [X1,X0] :
      ( ~ pred_attacker(X0)
      | pred_attacker(constr_dec(X1,X0))
      | ~ pred_attacker(X1) ),
    inference(flattening,[],[f394]) ).

fof(f394,plain,
    ! [X0,X1] :
      ( pred_attacker(constr_dec(X1,X0))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f225]) ).

fof(f225,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(constr_dec(X1,X0)) ),
    inference(rectify,[],[f114]) ).

fof(f114,axiom,
    ! [X89,X88] :
      ( ( pred_attacker(X88)
        & pred_attacker(X89) )
     => pred_attacker(constr_dec(X88,X89)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax113) ).

fof(f1140,plain,
    ( ! [X0] :
        ( pred_attacker(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas))))
        | ~ pred_attacker(tuple_client_A_in_6(X0)) )
    | ~ spl1_34 ),
    inference(resolution,[],[f1138,f453]) ).

fof(f453,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_A_out_10(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f312]) ).

fof(f312,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_A_out_10(X0))
      | pred_attacker(X0) ),
    inference(ennf_transformation,[],[f200]) ).

fof(f200,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_out_10(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f130]) ).

fof(f130,axiom,
    ! [X105] :
      ( pred_attacker(tuple_client_A_out_10(X105))
     => pred_attacker(X105) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax129) ).

fof(f1138,plain,
    ( ! [X4] :
        ( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas)))))
        | ~ pred_attacker(tuple_client_A_in_6(X4)) )
    | ~ spl1_34 ),
    inference(avatar_component_clause,[],[f1137]) ).

fof(f1139,plain,
    ( spl1_26
    | spl1_24
    | spl1_34
    | spl1_23 ),
    inference(avatar_split_clause,[],[f1135,f1014,f1137,f1017,f1023]) ).

fof(f1023,plain,
    ( spl1_26
  <=> ! [X1] : ~ pred_attacker(tuple_client_A_in_8(X1)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_26])]) ).

fof(f1017,plain,
    ( spl1_24
  <=> ! [X3] : ~ pred_attacker(tuple_client_A_in_4(X3)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_24])]) ).

fof(f1014,plain,
    ( spl1_23
  <=> ! [X0] : ~ pred_attacker(tuple_client_A_in_2(X0)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_23])]) ).

fof(f1135,plain,
    ! [X2,X0,X1,X4] :
      ( ~ pred_attacker(tuple_client_A_in_2(X1))
      | pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas)))))
      | ~ pred_attacker(tuple_client_A_in_4(X2))
      | ~ pred_attacker(tuple_client_A_in_8(X0))
      | ~ pred_attacker(tuple_client_A_in_6(X4)) ),
    inference(subsumption_resolution,[],[f1134,f489]) ).

fof(f489,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
    inference(cnf_transformation,[],[f213]) ).

fof(f213,plain,
    ! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
    inference(rectify,[],[f96]) ).

fof(f96,axiom,
    ! [X62,X63] : pred_eq_bitstring_bitstring(X62,X63),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax95) ).

fof(f1134,plain,
    ! [X2,X3,X0,X1,X4] :
      ( ~ pred_attacker(tuple_client_A_in_8(X0))
      | pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas)))))
      | ~ pred_attacker(tuple_client_A_in_6(X4))
      | ~ pred_attacker(tuple_client_A_in_4(X2))
      | ~ pred_attacker(tuple_client_A_in_2(X1))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X2,X1,X3)),constr_cbc_dec_1(X0,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas)))) ),
    inference(subsumption_resolution,[],[f1133,f489]) ).

fof(f1133,plain,
    ! [X2,X3,X0,X1,X4] :
      ( ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X4,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_6(X4))
      | ~ pred_attacker(tuple_client_A_in_2(X1))
      | ~ pred_attacker(tuple_client_A_in_4(X2))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X2,X1,X3)),constr_cbc_dec_1(X0,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas))))
      | ~ pred_attacker(tuple_client_A_in_8(X0))
      | pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas))))) ),
    inference(subsumption_resolution,[],[f1132,f489]) ).

fof(f1132,plain,
    ! [X2,X3,X0,X1,X4] :
      ( ~ pred_attacker(tuple_client_A_in_4(X2))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X1,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_6(X4))
      | pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas)))))
      | ~ pred_attacker(tuple_client_A_in_2(X1))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X2,X1,X3)),constr_cbc_dec_1(X0,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas))))
      | ~ pred_attacker(tuple_client_A_in_8(X0))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X4,name_Kas))) ),
    inference(subsumption_resolution,[],[f486,f489]) ).

fof(f486,plain,
    ! [X2,X3,X0,X1,X4] :
      ( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas)))))
      | ~ pred_attacker(tuple_client_A_in_6(X4))
      | ~ pred_eq_bitstring_bitstring(name_Na(X3),constr_tuple_4_get_0x30(constr_cbc_dec_4(X1,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_8(X0))
      | ~ pred_attacker(tuple_client_A_in_4(X2))
      | ~ pred_attacker(tuple_client_A_in_2(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X4,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X1,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X2,X1,X3)),constr_cbc_dec_1(X0,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas)))) ),
    inference(cnf_transformation,[],[f404]) ).

fof(f404,plain,
    ! [X0,X1,X2,X3,X4] :
      ( ~ pred_attacker(tuple_client_A_in_6(X4))
      | ~ pred_attacker(tuple_client_A_in_2(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X4,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X2,X1,X3)),constr_cbc_dec_1(X0,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas))))
      | pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas)))))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X1,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(name_Na(X3),constr_tuple_4_get_0x30(constr_cbc_dec_4(X1,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_4(X2))
      | ~ pred_attacker(tuple_client_A_in_8(X0)) ),
    inference(rectify,[],[f306]) ).

fof(f306,plain,
    ! [X0,X4,X1,X2,X3] :
      ( ~ pred_attacker(tuple_client_A_in_6(X3))
      | ~ pred_attacker(tuple_client_A_in_2(X4))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X3,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X1,X4,X2)),constr_cbc_dec_1(X0,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X3,name_Kas))))
      | pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X3,name_Kas)))))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X4,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_4_get_0x30(constr_cbc_dec_4(X4,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_4(X1))
      | ~ pred_attacker(tuple_client_A_in_8(X0)) ),
    inference(flattening,[],[f305]) ).

fof(f305,plain,
    ! [X4,X3,X1,X0,X2] :
      ( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X3,name_Kas)))))
      | ~ pred_attacker(tuple_client_A_in_2(X4))
      | ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_4_get_0x30(constr_cbc_dec_4(X4,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_8(X0))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X4,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X3,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_4(X1))
      | ~ pred_attacker(tuple_client_A_in_6(X3))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X1,X4,X2)),constr_cbc_dec_1(X0,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X3,name_Kas)))) ),
    inference(ennf_transformation,[],[f214]) ).

fof(f214,plain,
    ! [X4,X3,X1,X0,X2] :
      ( ( pred_attacker(tuple_client_A_in_2(X4))
        & pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_4_get_0x30(constr_cbc_dec_4(X4,name_Kas)))
        & pred_attacker(tuple_client_A_in_8(X0))
        & pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X4,name_Kas)))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X3,name_Kas)))
        & pred_attacker(tuple_client_A_in_4(X1))
        & pred_attacker(tuple_client_A_in_6(X3))
        & pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X1,X4,X2)),constr_cbc_dec_1(X0,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X3,name_Kas)))) )
     => pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X3,name_Kas))))) ),
    inference(rectify,[],[f187]) ).

fof(f187,axiom,
    ! [X217,X216,X213,X214,X215] :
      ( ( pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X215,name_Kas)))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X214,name_Kas)))
        & pred_attacker(tuple_client_A_in_4(X216))
        & pred_attacker(tuple_client_A_in_6(X214))
        & pred_attacker(tuple_client_A_in_2(X215))
        & pred_attacker(tuple_client_A_in_8(X217))
        & pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X216,X215,X213)),constr_cbc_dec_1(X217,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X214,name_Kas))))
        & pred_eq_bitstring_bitstring(name_Na(X213),constr_tuple_4_get_0x30(constr_cbc_dec_4(X215,name_Kas))) )
     => pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X214,name_Kas))))) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax186) ).

fof(f1064,plain,
    ( spl1_12
    | ~ spl1_27 ),
    inference(avatar_split_clause,[],[f1063,f1047,f863]) ).

fof(f863,plain,
    ( spl1_12
  <=> ! [X6,X4,X5] : ~ pred_attacker(tuple_server_S_in_1(X4,X5,X6)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_12])]) ).

fof(f1063,plain,
    ( ! [X2,X0,X1] : ~ pred_attacker(tuple_server_S_in_1(X1,X2,X0))
    | ~ spl1_27 ),
    inference(subsumption_resolution,[],[f1060,f588]) ).

fof(f588,plain,
    ! [X2,X0,X1] :
      ( ~ pred_attacker(tuple_server_S_in_1(X2,X0,X1))
      | pred_attacker(X1) ),
    inference(cnf_transformation,[],[f429]) ).

fof(f429,plain,
    ! [X0,X1,X2] :
      ( ~ pred_attacker(tuple_server_S_in_1(X2,X0,X1))
      | pred_attacker(X1) ),
    inference(rectify,[],[f384]) ).

fof(f384,plain,
    ! [X1,X2,X0] :
      ( ~ pred_attacker(tuple_server_S_in_1(X0,X1,X2))
      | pred_attacker(X2) ),
    inference(ennf_transformation,[],[f253]) ).

fof(f253,plain,
    ! [X2,X1,X0] :
      ( pred_attacker(tuple_server_S_in_1(X0,X1,X2))
     => pred_attacker(X2) ),
    inference(rectify,[],[f111]) ).

fof(f111,axiom,
    ! [X83,X84,X85] :
      ( pred_attacker(tuple_server_S_in_1(X83,X84,X85))
     => pred_attacker(X85) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax110) ).

fof(f1060,plain,
    ( ! [X2,X0,X1] :
        ( ~ pred_attacker(tuple_server_S_in_1(X1,X2,X0))
        | ~ pred_attacker(X0) )
    | ~ spl1_27 ),
    inference(resolution,[],[f1059,f757]) ).

fof(f757,plain,
    ! [X18,X16,X17] :
      ( pred_attacker(constr_cbc_enc_2(X18,X17,name_Kas))
      | ~ pred_attacker(tuple_server_S_in_1(X16,X17,X18)) ),
    inference(resolution,[],[f741,f708]) ).

fof(f708,plain,
    ! [X2,X3,X0,X1,X4] :
      ( ~ pred_attacker(constr_cbc_enc_4(X0,X1,X2,X3,X4))
      | pred_attacker(constr_cbc_enc_2(X0,X1,X4)) ),
    inference(superposition,[],[f477,f628]) ).

fof(f628,plain,
    ! [X2,X3,X0,X1,X4] : constr_cbc_4_get_2_prefixes(constr_cbc_enc_4(X1,X2,X3,X4,X0)) = constr_cbc_enc_2(X1,X2,X0),
    inference(cnf_transformation,[],[f440]) ).

fof(f440,plain,
    ! [X0,X1,X2,X3,X4] : constr_cbc_4_get_2_prefixes(constr_cbc_enc_4(X1,X2,X3,X4,X0)) = constr_cbc_enc_2(X1,X2,X0),
    inference(rectify,[],[f271]) ).

fof(f271,plain,
    ! [X4,X3,X0,X1,X2] : constr_cbc_enc_2(X3,X0,X4) = constr_cbc_4_get_2_prefixes(constr_cbc_enc_4(X3,X0,X1,X2,X4)),
    inference(rectify,[],[f84]) ).

fof(f84,axiom,
    ! [X21,X22,X23,X20,X19] : constr_cbc_4_get_2_prefixes(constr_cbc_enc_4(X20,X21,X22,X23,X19)) = constr_cbc_enc_2(X20,X21,X19),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax83) ).

fof(f477,plain,
    ! [X0] :
      ( pred_attacker(constr_cbc_4_get_2_prefixes(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f311]) ).

fof(f311,plain,
    ! [X0] :
      ( ~ pred_attacker(X0)
      | pred_attacker(constr_cbc_4_get_2_prefixes(X0)) ),
    inference(ennf_transformation,[],[f205]) ).

fof(f205,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(constr_cbc_4_get_2_prefixes(X0)) ),
    inference(rectify,[],[f152]) ).

fof(f152,axiom,
    ! [X149] :
      ( pred_attacker(X149)
     => pred_attacker(constr_cbc_4_get_2_prefixes(X149)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax151) ).

fof(f741,plain,
    ! [X2,X3,X0,X1] :
      ( pred_attacker(constr_cbc_enc_4(X2,X1,name_Kab_66(X3),constr_cbc_enc_2(name_Kab_66(X3),X0,name_Kbs),name_Kas))
      | ~ pred_attacker(tuple_server_S_in_1(X0,X1,X2)) ),
    inference(resolution,[],[f592,f581]) ).

fof(f581,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_server_S_out_2(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f307]) ).

fof(f307,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_server_S_out_2(X0)) ),
    inference(ennf_transformation,[],[f222]) ).

fof(f222,plain,
    ! [X0] :
      ( pred_attacker(tuple_server_S_out_2(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f107]) ).

fof(f107,axiom,
    ! [X73] :
      ( pred_attacker(tuple_server_S_out_2(X73))
     => pred_attacker(X73) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax106) ).

fof(f592,plain,
    ! [X2,X3,X0,X1] :
      ( pred_attacker(tuple_server_S_out_2(constr_cbc_enc_4(X0,X3,name_Kab_66(X1),constr_cbc_enc_2(name_Kab_66(X1),X2,name_Kbs),name_Kas)))
      | ~ pred_attacker(tuple_server_S_in_1(X2,X3,X0)) ),
    inference(cnf_transformation,[],[f430]) ).

fof(f430,plain,
    ! [X0,X1,X2,X3] :
      ( ~ pred_attacker(tuple_server_S_in_1(X2,X3,X0))
      | pred_attacker(tuple_server_S_out_2(constr_cbc_enc_4(X0,X3,name_Kab_66(X1),constr_cbc_enc_2(name_Kab_66(X1),X2,name_Kbs),name_Kas))) ),
    inference(rectify,[],[f345]) ).

fof(f345,plain,
    ! [X2,X1,X3,X0] :
      ( ~ pred_attacker(tuple_server_S_in_1(X3,X0,X2))
      | pred_attacker(tuple_server_S_out_2(constr_cbc_enc_4(X2,X0,name_Kab_66(X1),constr_cbc_enc_2(name_Kab_66(X1),X3,name_Kbs),name_Kas))) ),
    inference(ennf_transformation,[],[f221]) ).

fof(f221,plain,
    ! [X3,X1,X0,X2] :
      ( pred_attacker(tuple_server_S_in_1(X3,X0,X2))
     => pred_attacker(tuple_server_S_out_2(constr_cbc_enc_4(X2,X0,name_Kab_66(X1),constr_cbc_enc_2(name_Kab_66(X1),X3,name_Kbs),name_Kas))) ),
    inference(rectify,[],[f189]) ).

fof(f189,axiom,
    ! [X222,X220,X223,X221] :
      ( pred_attacker(tuple_server_S_in_1(X221,X222,X223))
     => pred_attacker(tuple_server_S_out_2(constr_cbc_enc_4(X223,X222,name_Kab_66(X220),constr_cbc_enc_2(name_Kab_66(X220),X221,name_Kbs),name_Kas))) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax188) ).

fof(f1059,plain,
    ( ! [X0,X1] :
        ( ~ pred_attacker(constr_cbc_enc_2(X0,X1,name_Kas))
        | ~ pred_attacker(X0) )
    | ~ spl1_27 ),
    inference(resolution,[],[f1056,f618]) ).

fof(f618,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_6(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f323]) ).

fof(f323,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_6(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f288]) ).

fof(f288,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_6(X0)) ),
    inference(rectify,[],[f137]) ).

fof(f137,axiom,
    ! [X120] :
      ( pred_attacker(X120)
     => pred_attacker(tuple_client_A_in_6(X120)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax136) ).

fof(f1056,plain,
    ( ! [X0,X1] :
        ( ~ pred_attacker(tuple_client_A_in_6(constr_cbc_enc_2(X0,X1,name_Kas)))
        | ~ pred_attacker(X0) )
    | ~ spl1_27 ),
    inference(forward_demodulation,[],[f1055,f610]) ).

fof(f610,plain,
    ! [X0,X1] : constr_tuple_2_get_0x30_bitstring(tuple_2(X1,X0)) = X1,
    inference(cnf_transformation,[],[f435]) ).

fof(f435,plain,
    ! [X0,X1] : constr_tuple_2_get_0x30_bitstring(tuple_2(X1,X0)) = X1,
    inference(rectify,[],[f233]) ).

fof(f233,plain,
    ! [X1,X0] : constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1)) = X0,
    inference(rectify,[],[f92]) ).

fof(f92,axiom,
    ! [X50,X51] : constr_tuple_2_get_0x30_bitstring(tuple_2(X50,X51)) = X50,
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax91) ).

fof(f1055,plain,
    ( ! [X0,X1] :
        ( ~ pred_attacker(constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1)))
        | ~ pred_attacker(tuple_client_A_in_6(constr_cbc_enc_2(X0,X1,name_Kas))) )
    | ~ spl1_27 ),
    inference(superposition,[],[f1048,f560]) ).

fof(f560,plain,
    ! [X2,X0,X1] : constr_cbc_dec_2(constr_cbc_enc_2(X2,X0,X1),X1) = tuple_2(X2,X0),
    inference(cnf_transformation,[],[f244]) ).

fof(f244,plain,
    ! [X0,X1,X2] : constr_cbc_dec_2(constr_cbc_enc_2(X2,X0,X1),X1) = tuple_2(X2,X0),
    inference(rectify,[],[f81]) ).

fof(f81,axiom,
    ! [X11,X9,X10] : constr_cbc_dec_2(constr_cbc_enc_2(X10,X11,X9),X9) = tuple_2(X10,X11),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax80) ).

fof(f1048,plain,
    ( ! [X1] :
        ( ~ pred_attacker(constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))
        | ~ pred_attacker(tuple_client_A_in_6(X1)) )
    | ~ spl1_27 ),
    inference(avatar_component_clause,[],[f1047]) ).

fof(f1042,plain,
    ( spl1_9
    | ~ spl1_26 ),
    inference(avatar_split_clause,[],[f1041,f1023,f769]) ).

fof(f769,plain,
    ( spl1_9
  <=> ! [X2] : ~ pred_attacker(X2) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_9])]) ).

fof(f1041,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl1_26 ),
    inference(resolution,[],[f1024,f517]) ).

fof(f517,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_8(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f315]) ).

fof(f315,plain,
    ! [X0] :
      ( ~ pred_attacker(X0)
      | pred_attacker(tuple_client_A_in_8(X0)) ),
    inference(ennf_transformation,[],[f278]) ).

fof(f278,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_8(X0)) ),
    inference(rectify,[],[f135]) ).

fof(f135,axiom,
    ! [X118] :
      ( pred_attacker(X118)
     => pred_attacker(tuple_client_A_in_8(X118)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax134) ).

fof(f1024,plain,
    ( ! [X1] : ~ pred_attacker(tuple_client_A_in_8(X1))
    | ~ spl1_26 ),
    inference(avatar_component_clause,[],[f1023]) ).

fof(f1040,plain,
    ( spl1_9
    | ~ spl1_25 ),
    inference(avatar_split_clause,[],[f1039,f1020,f769]) ).

fof(f1020,plain,
    ( spl1_25
  <=> ! [X4] : ~ pred_attacker(tuple_client_A_in_6(X4)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_25])]) ).

fof(f1039,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl1_25 ),
    inference(resolution,[],[f1021,f618]) ).

fof(f1021,plain,
    ( ! [X4] : ~ pred_attacker(tuple_client_A_in_6(X4))
    | ~ spl1_25 ),
    inference(avatar_component_clause,[],[f1020]) ).

fof(f1038,plain,
    ( spl1_9
    | ~ spl1_24 ),
    inference(avatar_split_clause,[],[f1037,f1017,f769]) ).

fof(f1037,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl1_24 ),
    inference(resolution,[],[f1018,f599]) ).

fof(f599,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f321]) ).

fof(f321,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f193]) ).

fof(f193,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_4(X0)) ),
    inference(rectify,[],[f139]) ).

fof(f139,axiom,
    ! [X122] :
      ( pred_attacker(X122)
     => pred_attacker(tuple_client_A_in_4(X122)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax138) ).

fof(f1018,plain,
    ( ! [X3] : ~ pred_attacker(tuple_client_A_in_4(X3))
    | ~ spl1_24 ),
    inference(avatar_component_clause,[],[f1017]) ).

fof(f1036,plain,
    ( spl1_9
    | ~ spl1_23 ),
    inference(avatar_split_clause,[],[f1035,f1014,f769]) ).

fof(f1035,plain,
    ( ! [X0] : ~ pred_attacker(X0)
    | ~ spl1_23 ),
    inference(resolution,[],[f1015,f502]) ).

fof(f502,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(cnf_transformation,[],[f355]) ).

fof(f355,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_in_2(X0))
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f260]) ).

fof(f260,plain,
    ! [X0] :
      ( pred_attacker(X0)
     => pred_attacker(tuple_client_A_in_2(X0)) ),
    inference(rectify,[],[f141]) ).

fof(f141,axiom,
    ! [X124] :
      ( pred_attacker(X124)
     => pred_attacker(tuple_client_A_in_2(X124)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax140) ).

fof(f1015,plain,
    ( ! [X0] : ~ pred_attacker(tuple_client_A_in_2(X0))
    | ~ spl1_23 ),
    inference(avatar_component_clause,[],[f1014]) ).

fof(f1033,plain,
    ( spl1_25
    | spl1_26
    | spl1_24
    | spl1_23
    | ~ spl1_2 ),
    inference(avatar_split_clause,[],[f1032,f637,f1014,f1017,f1023,f1020]) ).

fof(f637,plain,
    ( spl1_2
  <=> ! [X4,X0,X3,X2,X1] :
        ( ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_4_get_0x30(constr_cbc_dec_4(X0,name_Kas)))
        | ~ pred_attacker(tuple_client_A_in_2(X0))
        | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X0,name_Kas)))
        | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X4,name_Kas)))
        | ~ pred_attacker(tuple_client_A_in_4(X3))
        | ~ pred_attacker(tuple_client_A_in_6(X4))
        | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X0,X2)),constr_cbc_dec_1(X1,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas))))
        | ~ pred_attacker(tuple_client_A_in_8(X1)) ) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_2])]) ).

fof(f1032,plain,
    ( ! [X3,X0,X1,X4] :
        ( ~ pred_attacker(tuple_client_A_in_2(X0))
        | ~ pred_attacker(tuple_client_A_in_4(X3))
        | ~ pred_attacker(tuple_client_A_in_8(X1))
        | ~ pred_attacker(tuple_client_A_in_6(X4)) )
    | ~ spl1_2 ),
    inference(subsumption_resolution,[],[f1031,f489]) ).

fof(f1031,plain,
    ( ! [X2,X3,X0,X1,X4] :
        ( ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_4_get_0x30(constr_cbc_dec_4(X0,name_Kas)))
        | ~ pred_attacker(tuple_client_A_in_2(X0))
        | ~ pred_attacker(tuple_client_A_in_4(X3))
        | ~ pred_attacker(tuple_client_A_in_8(X1))
        | ~ pred_attacker(tuple_client_A_in_6(X4)) )
    | ~ spl1_2 ),
    inference(subsumption_resolution,[],[f1030,f489]) ).

fof(f1030,plain,
    ( ! [X2,X3,X0,X1,X4] :
        ( ~ pred_attacker(tuple_client_A_in_6(X4))
        | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X4,name_Kas)))
        | ~ pred_attacker(tuple_client_A_in_2(X0))
        | ~ pred_attacker(tuple_client_A_in_4(X3))
        | ~ pred_attacker(tuple_client_A_in_8(X1))
        | ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_4_get_0x30(constr_cbc_dec_4(X0,name_Kas))) )
    | ~ spl1_2 ),
    inference(subsumption_resolution,[],[f1029,f489]) ).

fof(f1029,plain,
    ( ! [X2,X3,X0,X1,X4] :
        ( ~ pred_attacker(tuple_client_A_in_4(X3))
        | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X0,name_Kas)))
        | ~ pred_attacker(tuple_client_A_in_2(X0))
        | ~ pred_attacker(tuple_client_A_in_8(X1))
        | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X4,name_Kas)))
        | ~ pred_attacker(tuple_client_A_in_6(X4))
        | ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_4_get_0x30(constr_cbc_dec_4(X0,name_Kas))) )
    | ~ spl1_2 ),
    inference(subsumption_resolution,[],[f638,f489]) ).

fof(f638,plain,
    ( ! [X2,X3,X0,X1,X4] :
        ( ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X0,X2)),constr_cbc_dec_1(X1,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas))))
        | ~ pred_attacker(tuple_client_A_in_8(X1))
        | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X4,name_Kas)))
        | ~ pred_attacker(tuple_client_A_in_6(X4))
        | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X0,name_Kas)))
        | ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_4_get_0x30(constr_cbc_dec_4(X0,name_Kas)))
        | ~ pred_attacker(tuple_client_A_in_4(X3))
        | ~ pred_attacker(tuple_client_A_in_2(X0)) )
    | ~ spl1_2 ),
    inference(avatar_component_clause,[],[f637]) ).

fof(f1028,plain,
    ( ~ spl1_1
    | spl1_3 ),
    inference(avatar_contradiction_clause,[],[f1027]) ).

fof(f1027,plain,
    ( $false
    | ~ spl1_1
    | spl1_3 ),
    inference(subsumption_resolution,[],[f1026,f680]) ).

fof(f680,plain,
    ( ~ pred_attacker(name_objective1)
    | spl1_3 ),
    inference(avatar_component_clause,[],[f678]) ).

fof(f678,plain,
    ( spl1_3
  <=> pred_attacker(name_objective1) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_3])]) ).

fof(f1026,plain,
    ( pred_attacker(name_objective1)
    | ~ spl1_1 ),
    inference(resolution,[],[f635,f621]) ).

fof(f621,plain,
    ! [X0] :
      ( ~ pred_attacker(tuple_client_A_out_9(X0))
      | pred_attacker(X0) ),
    inference(cnf_transformation,[],[f332]) ).

fof(f332,plain,
    ! [X0] :
      ( pred_attacker(X0)
      | ~ pred_attacker(tuple_client_A_out_9(X0)) ),
    inference(ennf_transformation,[],[f224]) ).

fof(f224,plain,
    ! [X0] :
      ( pred_attacker(tuple_client_A_out_9(X0))
     => pred_attacker(X0) ),
    inference(rectify,[],[f122]) ).

fof(f122,axiom,
    ! [X97] :
      ( pred_attacker(tuple_client_A_out_9(X97))
     => pred_attacker(X97) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax121) ).

fof(f635,plain,
    ( pred_attacker(tuple_client_A_out_9(name_objective1))
    | ~ spl1_1 ),
    inference(avatar_component_clause,[],[f633]) ).

fof(f633,plain,
    ( spl1_1
  <=> pred_attacker(tuple_client_A_out_9(name_objective1)) ),
    introduced(avatar_definition,[new_symbols(naming,[spl1_1])]) ).

fof(f900,plain,
    ( spl1_9
    | spl1_9
    | spl1_9
    | ~ spl1_12 ),
    inference(avatar_split_clause,[],[f899,f863,f769,f769,f769]) ).

fof(f899,plain,
    ( ! [X2,X0,X1] :
        ( ~ pred_attacker(X1)
        | ~ pred_attacker(X2)
        | ~ pred_attacker(X0) )
    | ~ spl1_12 ),
    inference(resolution,[],[f864,f549]) ).

fof(f549,plain,
    ! [X2,X0,X1] :
      ( pred_attacker(tuple_server_S_in_1(X1,X0,X2))
      | ~ pred_attacker(X2)
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(cnf_transformation,[],[f373]) ).

fof(f373,plain,
    ! [X0,X1,X2] :
      ( ~ pred_attacker(X2)
      | pred_attacker(tuple_server_S_in_1(X1,X0,X2))
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f372]) ).

fof(f372,plain,
    ! [X0,X1,X2] :
      ( pred_attacker(tuple_server_S_in_1(X1,X0,X2))
      | ~ pred_attacker(X2)
      | ~ pred_attacker(X1)
      | ~ pred_attacker(X0) ),
    inference(ennf_transformation,[],[f270]) ).

fof(f270,plain,
    ! [X0,X1,X2] :
      ( ( pred_attacker(X2)
        & pred_attacker(X1)
        & pred_attacker(X0) )
     => pred_attacker(tuple_server_S_in_1(X1,X0,X2)) ),
    inference(rectify,[],[f108]) ).

fof(f108,axiom,
    ! [X75,X74,X76] :
      ( ( pred_attacker(X76)
        & pred_attacker(X75)
        & pred_attacker(X74) )
     => pred_attacker(tuple_server_S_in_1(X74,X75,X76)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax107) ).

fof(f864,plain,
    ( ! [X6,X4,X5] : ~ pred_attacker(tuple_server_S_in_1(X4,X5,X6))
    | ~ spl1_12 ),
    inference(avatar_component_clause,[],[f863]) ).

fof(f853,plain,
    ~ spl1_9,
    inference(avatar_contradiction_clause,[],[f776]) ).

fof(f776,plain,
    ( $false
    | ~ spl1_9 ),
    inference(resolution,[],[f770,f593]) ).

fof(f593,plain,
    pred_attacker(constr_CONST_1),
    inference(cnf_transformation,[],[f160]) ).

fof(f160,axiom,
    pred_attacker(constr_CONST_1),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax159) ).

fof(f770,plain,
    ( ! [X2] : ~ pred_attacker(X2)
    | ~ spl1_9 ),
    inference(avatar_component_clause,[],[f769]) ).

fof(f685,plain,
    ( ~ spl1_3
    | ~ spl1_4 ),
    inference(avatar_split_clause,[],[f676,f682,f678]) ).

fof(f676,plain,
    ( ~ pred_attacker(name_objective2)
    | ~ pred_attacker(name_objective1) ),
    inference(subsumption_resolution,[],[f675,f631]) ).

fof(f631,plain,
    ~ pred_attacker(sF0),
    inference(definition_folding,[],[f553,f630]) ).

fof(f630,plain,
    tuple_2(name_objective1,name_objective2) = sF0,
    introduced(function_definition,[]) ).

fof(f553,plain,
    ~ pred_attacker(tuple_2(name_objective1,name_objective2)),
    inference(cnf_transformation,[],[f292]) ).

fof(f292,plain,
    ~ pred_attacker(tuple_2(name_objective1,name_objective2)),
    inference(flattening,[],[f191]) ).

fof(f191,negated_conjecture,
    ~ pred_attacker(tuple_2(name_objective1,name_objective2)),
    inference(negated_conjecture,[],[f190]) ).

fof(f190,conjecture,
    pred_attacker(tuple_2(name_objective1,name_objective2)),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',co0) ).

fof(f675,plain,
    ( ~ pred_attacker(name_objective2)
    | ~ pred_attacker(name_objective1)
    | pred_attacker(sF0) ),
    inference(superposition,[],[f601,f630]) ).

fof(f601,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X1,X0))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(cnf_transformation,[],[f433]) ).

fof(f433,plain,
    ! [X0,X1] :
      ( ~ pred_attacker(X0)
      | pred_attacker(tuple_2(X1,X0))
      | ~ pred_attacker(X1) ),
    inference(rectify,[],[f351]) ).

fof(f351,plain,
    ! [X1,X0] :
      ( ~ pred_attacker(X1)
      | pred_attacker(tuple_2(X0,X1))
      | ~ pred_attacker(X0) ),
    inference(flattening,[],[f350]) ).

fof(f350,plain,
    ! [X0,X1] :
      ( pred_attacker(tuple_2(X0,X1))
      | ~ pred_attacker(X0)
      | ~ pred_attacker(X1) ),
    inference(ennf_transformation,[],[f240]) ).

fof(f240,plain,
    ! [X0,X1] :
      ( ( pred_attacker(X0)
        & pred_attacker(X1) )
     => pred_attacker(tuple_2(X0,X1)) ),
    inference(rectify,[],[f171]) ).

fof(f171,axiom,
    ! [X186,X187] :
      ( ( pred_attacker(X186)
        & pred_attacker(X187) )
     => pred_attacker(tuple_2(X186,X187)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax170) ).

fof(f639,plain,
    ( spl1_1
    | spl1_2 ),
    inference(avatar_split_clause,[],[f608,f637,f633]) ).

fof(f608,plain,
    ! [X2,X3,X0,X1,X4] :
      ( ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_4_get_0x30(constr_cbc_dec_4(X0,name_Kas)))
      | pred_attacker(tuple_client_A_out_9(name_objective1))
      | ~ pred_attacker(tuple_client_A_in_8(X1))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X0,X2)),constr_cbc_dec_1(X1,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas))))
      | ~ pred_attacker(tuple_client_A_in_6(X4))
      | ~ pred_attacker(tuple_client_A_in_4(X3))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X4,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X0,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_2(X0)) ),
    inference(cnf_transformation,[],[f434]) ).

fof(f434,plain,
    ! [X0,X1,X2,X3,X4] :
      ( ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_4_get_0x30(constr_cbc_dec_4(X0,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X0,X2)),constr_cbc_dec_1(X1,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas))))
      | ~ pred_attacker(tuple_client_A_in_8(X1))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X4,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_6(X4))
      | ~ pred_attacker(tuple_client_A_in_2(X0))
      | ~ pred_attacker(tuple_client_A_in_4(X3))
      | pred_attacker(tuple_client_A_out_9(name_objective1))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X0,name_Kas))) ),
    inference(rectify,[],[f338]) ).

fof(f338,plain,
    ! [X1,X2,X3,X0,X4] :
      ( ~ pred_eq_bitstring_bitstring(name_Na(X3),constr_tuple_4_get_0x30(constr_cbc_dec_4(X1,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X0,X1,X3)),constr_cbc_dec_1(X2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas))))
      | ~ pred_attacker(tuple_client_A_in_8(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X4,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_6(X4))
      | ~ pred_attacker(tuple_client_A_in_2(X1))
      | ~ pred_attacker(tuple_client_A_in_4(X0))
      | pred_attacker(tuple_client_A_out_9(name_objective1))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X1,name_Kas))) ),
    inference(flattening,[],[f337]) ).

fof(f337,plain,
    ! [X3,X4,X2,X1,X0] :
      ( pred_attacker(tuple_client_A_out_9(name_objective1))
      | ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X0,X1,X3)),constr_cbc_dec_1(X2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas))))
      | ~ pred_eq_bitstring_bitstring(name_Na(X3),constr_tuple_4_get_0x30(constr_cbc_dec_4(X1,name_Kas)))
      | ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X1,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_4(X0))
      | ~ pred_attacker(tuple_client_A_in_2(X1))
      | ~ pred_attacker(tuple_client_A_in_8(X2))
      | ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X4,name_Kas)))
      | ~ pred_attacker(tuple_client_A_in_6(X4)) ),
    inference(ennf_transformation,[],[f275]) ).

fof(f275,plain,
    ! [X3,X4,X2,X1,X0] :
      ( ( pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X0,X1,X3)),constr_cbc_dec_1(X2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas))))
        & pred_eq_bitstring_bitstring(name_Na(X3),constr_tuple_4_get_0x30(constr_cbc_dec_4(X1,name_Kas)))
        & pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X1,name_Kas)))
        & pred_attacker(tuple_client_A_in_4(X0))
        & pred_attacker(tuple_client_A_in_2(X1))
        & pred_attacker(tuple_client_A_in_8(X2))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X4,name_Kas)))
        & pred_attacker(tuple_client_A_in_6(X4)) )
     => pred_attacker(tuple_client_A_out_9(name_objective1)) ),
    inference(rectify,[],[f186]) ).

fof(f186,axiom,
    ! [X211,X210,X212,X208,X209] :
      ( ( pred_eq_bitstring_bitstring(name_Na(X208),constr_tuple_4_get_0x30(constr_cbc_dec_4(X210,name_Kas)))
        & pred_attacker(tuple_client_A_in_4(X211))
        & pred_attacker(tuple_client_A_in_8(X212))
        & pred_attacker(tuple_client_A_in_2(X210))
        & pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X209,name_Kas)))
        & pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X211,X210,X208)),constr_cbc_dec_1(X212,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X209,name_Kas))))
        & pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X210,name_Kas)))
        & pred_attacker(tuple_client_A_in_6(X209)) )
     => pred_attacker(tuple_client_A_out_9(name_objective1)) ),
    file('/export/starexec/sandbox/benchmark/theBenchmark.p',ax185) ).

%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.02/0.10  % Problem    : SWW968+1 : TPTP v8.1.0. Released v7.4.0.
% 0.02/0.10  % Command    : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule snake_tptp_uns --cores 0 -t %d %s
% 0.10/0.30  % Computer : n018.cluster.edu
% 0.10/0.30  % Model    : x86_64 x86_64
% 0.10/0.30  % CPU      : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.10/0.30  % Memory   : 8042.1875MB
% 0.10/0.30  % OS       : Linux 3.10.0-693.el7.x86_64
% 0.10/0.30  % CPULimit   : 300
% 0.10/0.30  % WCLimit    : 300
% 0.10/0.30  % DateTime   : Tue Aug 30 21:22:55 EDT 2022
% 0.10/0.30  % CPUTime    : 
% 0.15/0.39  % (29841)dis+1010_1:50_awrs=decay:awrsf=128:nwc=10.0:s2pl=no:sp=frequency:ss=axioms:i=39:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/39Mi)
% 0.15/0.41  % (29841)Refutation not found, incomplete strategy% (29841)------------------------------
% 0.15/0.41  % (29841)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.15/0.41  % (29841)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.15/0.41  % (29841)Termination reason: Refutation not found, incomplete strategy
% 0.15/0.41  
% 0.15/0.41  % (29841)Memory used [KB]: 6140
% 0.15/0.41  % (29841)Time elapsed: 0.071 s
% 0.15/0.41  % (29841)Instructions burned: 3 (million)
% 0.15/0.41  % (29841)------------------------------
% 0.15/0.41  % (29841)------------------------------
% 0.15/0.41  % (29840)dis+21_1:1_av=off:sos=on:sp=frequency:ss=included:to=lpo:i=15:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/15Mi)
% 0.15/0.42  % (29835)dis+1002_1:12_drc=off:fd=preordered:tgt=full:i=99978:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/99978Mi)
% 0.15/0.43  % (29849)lrs+10_1:1_ins=3:sp=reverse_frequency:spb=goal:to=lpo:i=3:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/3Mi)
% 0.15/0.43  % (29849)Instruction limit reached!
% 0.15/0.43  % (29849)------------------------------
% 0.15/0.43  % (29849)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.15/0.43  % (29849)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.15/0.43  % (29849)Termination reason: Unknown
% 0.15/0.43  % (29849)Termination phase: Property scanning
% 0.15/0.43  
% 0.15/0.43  % (29849)Memory used [KB]: 1918
% 0.15/0.43  % (29849)Time elapsed: 0.006 s
% 0.15/0.43  % (29849)Instructions burned: 5 (million)
% 0.15/0.43  % (29849)------------------------------
% 0.15/0.43  % (29849)------------------------------
% 0.15/0.44  % (29854)dis-10_3:2_amm=sco:ep=RS:fsr=off:nm=10:sd=2:sos=on:ss=axioms:st=3.0:i=11:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/11Mi)
% 0.15/0.44  % (29840)Refutation not found, incomplete strategy% (29840)------------------------------
% 0.15/0.44  % (29840)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.15/0.44  % (29840)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.15/0.44  % (29840)Termination reason: Refutation not found, incomplete strategy
% 0.15/0.44  
% 0.15/0.44  % (29840)Memory used [KB]: 2046
% 0.15/0.44  % (29840)Time elapsed: 0.094 s
% 0.15/0.44  % (29840)Instructions burned: 7 (million)
% 0.15/0.44  % (29840)------------------------------
% 0.15/0.44  % (29840)------------------------------
% 0.15/0.44  % (29839)lrs+10_1:1024_nm=0:nwc=5.0:ss=axioms:i=13:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/13Mi)
% 0.15/0.44  % (29838)lrs+10_5:1_br=off:fde=none:nwc=3.0:sd=1:sgt=10:sos=on:ss=axioms:urr=on:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 0.15/0.44  % (29854)Refutation not found, incomplete strategy% (29854)------------------------------
% 0.15/0.44  % (29854)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.15/0.44  % (29854)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.15/0.44  % (29854)Termination reason: Refutation not found, incomplete strategy
% 0.15/0.44  
% 0.15/0.44  % (29854)Memory used [KB]: 6268
% 0.15/0.44  % (29854)Time elapsed: 0.092 s
% 0.15/0.44  % (29854)Instructions burned: 4 (million)
% 0.15/0.44  % (29854)------------------------------
% 0.15/0.44  % (29854)------------------------------
% 0.15/0.44  % (29839)Refutation not found, incomplete strategy% (29839)------------------------------
% 0.15/0.44  % (29839)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.15/0.44  % (29839)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.15/0.44  % (29839)Termination reason: Refutation not found, incomplete strategy
% 0.15/0.44  
% 0.15/0.44  % (29839)Memory used [KB]: 6140
% 0.15/0.44  % (29839)Time elapsed: 0.090 s
% 0.15/0.44  % (29839)Instructions burned: 2 (million)
% 0.15/0.44  % (29839)------------------------------
% 0.15/0.44  % (29839)------------------------------
% 0.15/0.44  % (29857)dis+1010_2:3_fs=off:fsr=off:nm=0:nwc=5.0:s2a=on:s2agt=32:i=82:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/82Mi)
% 0.15/0.44  % (29864)lrs-11_1:1_nm=0:sac=on:sd=4:ss=axioms:st=3.0:i=24:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/24Mi)
% 0.15/0.45  % (29842)lrs+2_1:1_lcm=reverse:lma=on:sos=all:spb=goal_then_units:ss=included:urr=on:i=39:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/39Mi)
% 0.15/0.45  % (29858)dis+10_1:1_av=off:sos=on:sp=reverse_arity:ss=included:st=2.0:to=lpo:urr=ec_only:i=45:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/45Mi)
% 0.15/0.45  % (29848)lrs+10_1:32_br=off:nm=16:sd=2:ss=axioms:st=2.0:urr=on:i=51:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/51Mi)
% 0.15/0.45  % (29851)lrs+1011_1:1_fd=preordered:fsd=on:sos=on:thsq=on:thsqc=64:thsqd=32:uwa=ground:i=50:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/50Mi)
% 0.15/0.45  % (29836)lrs+10_1:1_gsp=on:sd=1:sgt=32:sos=on:ss=axioms:i=13:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/13Mi)
% 0.15/0.46  % (29836)Refutation not found, incomplete strategy% (29836)------------------------------
% 0.15/0.46  % (29836)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.15/0.46  % (29836)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.15/0.46  % (29836)Termination reason: Refutation not found, incomplete strategy
% 0.15/0.46  
% 0.15/0.46  % (29836)Memory used [KB]: 6140
% 0.15/0.46  % (29836)Time elapsed: 0.096 s
% 0.15/0.46  % (29836)Instructions burned: 2 (million)
% 0.15/0.46  % (29836)------------------------------
% 0.15/0.46  % (29836)------------------------------
% 0.15/0.46  % (29851)Refutation not found, incomplete strategy% (29851)------------------------------
% 0.15/0.46  % (29851)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.15/0.46  % (29850)lrs+10_1:1_drc=off:sp=reverse_frequency:spb=goal:to=lpo:i=7:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/7Mi)
% 0.15/0.46  % (29862)dis+21_1:1_aac=none:abs=on:er=known:fde=none:fsr=off:nwc=5.0:s2a=on:s2at=4.0:sp=const_frequency:to=lpo:urr=ec_only:i=25:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/25Mi)
% 0.15/0.46  % (29844)lrs+10_1:1_br=off:sos=on:ss=axioms:st=2.0:urr=on:i=33:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/33Mi)
% 0.15/0.46  % (29846)lrs+10_1:2_br=off:nm=4:ss=included:urr=on:i=7:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/7Mi)
% 0.15/0.46  % (29850)Instruction limit reached!
% 0.15/0.46  % (29850)------------------------------
% 0.15/0.46  % (29850)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.15/0.47  % (29846)Instruction limit reached!
% 0.15/0.47  % (29846)------------------------------
% 0.15/0.47  % (29846)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.15/0.47  % (29846)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.15/0.47  % (29846)Termination reason: Unknown
% 0.15/0.47  % (29846)Termination phase: Saturation
% 0.15/0.47  
% 0.15/0.47  % (29846)Memory used [KB]: 6524
% 0.15/0.47  % (29846)Time elapsed: 0.005 s
% 0.15/0.47  % (29846)Instructions burned: 7 (million)
% 0.15/0.47  % (29846)------------------------------
% 0.15/0.47  % (29846)------------------------------
% 0.15/0.47  % (29850)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.15/0.47  % (29850)Termination reason: Unknown
% 0.15/0.47  % (29850)Termination phase: Saturation
% 0.15/0.47  
% 0.15/0.47  % (29850)Memory used [KB]: 6396
% 0.15/0.47  % (29850)Time elapsed: 0.005 s
% 0.15/0.47  % (29850)Instructions burned: 7 (million)
% 0.15/0.47  % (29850)------------------------------
% 0.15/0.47  % (29850)------------------------------
% 0.15/0.47  % (29852)fmb+10_1:1_nm=2:i=3:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/3Mi)
% 0.15/0.47  % (29837)dis+1002_1:1_aac=none:bd=off:sac=on:sos=on:spb=units:i=3:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/3Mi)
% 0.15/0.47  % (29837)Instruction limit reached!
% 0.15/0.47  % (29837)------------------------------
% 0.15/0.47  % (29837)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.15/0.47  % (29837)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.15/0.47  % (29837)Termination reason: Unknown
% 0.15/0.47  % (29837)Termination phase: Naming
% 0.15/0.47  
% 0.15/0.47  % (29837)Memory used [KB]: 1791
% 0.15/0.47  % (29837)Time elapsed: 0.003 s
% 0.15/0.47  % (29837)Instructions burned: 3 (million)
% 0.15/0.47  % (29837)------------------------------
% 0.15/0.47  % (29837)------------------------------
% 0.15/0.47  % (29851)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.15/0.47  % (29851)Termination reason: Refutation not found, incomplete strategy
% 0.15/0.47  
% 0.15/0.47  % (29851)Memory used [KB]: 6780
% 0.15/0.47  % (29851)Time elapsed: 0.105 s
% 0.15/0.47  % (29851)Instructions burned: 9 (million)
% 0.15/0.47  % (29852)Instruction limit reached!
% 0.15/0.47  % (29852)------------------------------
% 0.15/0.47  % (29852)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.15/0.47  % (29852)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.15/0.47  % (29852)Termination reason: Unknown
% 0.15/0.47  % (29852)Termination phase: Preprocessing 3
% 0.15/0.47  
% 0.15/0.47  % (29852)Memory used [KB]: 1918
% 0.15/0.47  % (29852)Time elapsed: 0.003 s
% 0.15/0.47  % (29852)Instructions burned: 4 (million)
% 0.15/0.47  % (29852)------------------------------
% 0.15/0.47  % (29852)------------------------------
% 0.15/0.47  % (29851)------------------------------
% 0.15/0.47  % (29851)------------------------------
% 0.15/0.47  % (29835)First to succeed.
% 0.15/0.47  % (29858)Refutation not found, incomplete strategy% (29858)------------------------------
% 0.15/0.47  % (29858)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.15/0.47  % (29858)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.15/0.47  % (29858)Termination reason: Refutation not found, incomplete strategy
% 0.15/0.47  
% 0.15/0.47  % (29858)Memory used [KB]: 2174
% 0.15/0.47  % (29858)Time elapsed: 0.120 s
% 0.15/0.47  % (29858)Instructions burned: 8 (million)
% 0.15/0.47  % (29858)------------------------------
% 0.15/0.47  % (29858)------------------------------
% 0.15/0.47  % (29843)dis+10_1:1_newcnf=on:sgt=8:sos=on:ss=axioms:to=lpo:urr=on:i=49:si=on:rawr=on:rtra=on_0 on theBenchmark for (2999ds/49Mi)
% 0.15/0.47  % (29835)Refutation found. Thanks to Tanya!
% 0.15/0.47  % SZS status Theorem for theBenchmark
% 0.15/0.47  % SZS output start Proof for theBenchmark
% See solution above
% 0.15/0.47  % (29835)------------------------------
% 0.15/0.47  % (29835)Version: Vampire 4.7 (commit 807e37dd9 on 2022-08-23 09:55:27 +0200)
% 0.15/0.47  % (29835)Linked with Z3 4.8.13.0 f03d756e086f81f2596157241e0decfb1c982299 z3-4.8.4-5390-gf03d756e0
% 0.15/0.47  % (29835)Termination reason: Refutation
% 0.15/0.47  
% 0.15/0.47  % (29835)Memory used [KB]: 6908
% 0.15/0.47  % (29835)Time elapsed: 0.097 s
% 0.15/0.47  % (29835)Instructions burned: 41 (million)
% 0.15/0.47  % (29835)------------------------------
% 0.15/0.47  % (29835)------------------------------
% 0.15/0.47  % (29834)Success in time 0.159 s
%------------------------------------------------------------------------------