TSTP Solution File: SWW968+1 by Vampire---4.8
View Problem
- Process Solution
%------------------------------------------------------------------------------
% File : Vampire---4.8
% Problem : SWW968+1 : TPTP v8.1.2. Released v7.4.0.
% Transfm : none
% Format : tptp:raw
% Command : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule file --schedule_file /export/starexec/sandbox2/solver/bin/quickGreedyProduceRating_steal_pow3.txt --cores 8 -m 12000 -t %d %s
% Computer : n004.cluster.edu
% Model : x86_64 x86_64
% CPU : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory : 8042.1875MB
% OS : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit : 300s
% DateTime : Wed May 1 04:32:46 EDT 2024
% Result : Theorem 0.61s 0.82s
% Output : Refutation 0.61s
% Verified :
% SZS Type : Refutation
% Derivation depth : 13
% Number of leaves : 30
% Syntax : Number of formulae : 141 ( 23 unt; 0 def)
% Number of atoms : 444 ( 12 equ)
% Maximal formula atoms : 9 ( 3 avg)
% Number of connectives : 555 ( 252 ~; 230 |; 36 &)
% ( 9 <=>; 28 =>; 0 <=; 0 <~>)
% Maximal formula depth : 15 ( 6 avg)
% Maximal term depth : 5 ( 2 avg)
% Number of predicates : 13 ( 11 usr; 10 prp; 0-2 aty)
% Number of functors : 31 ( 31 usr; 6 con; 0-5 aty)
% Number of variables : 278 ( 278 !; 0 ?)
% Comments :
%------------------------------------------------------------------------------
fof(f783,plain,
$false,
inference(avatar_sat_refutation,[],[f501,f608,f663,f665,f667,f715,f753,f777,f780,f782]) ).
fof(f782,plain,
( spl0_3
| ~ spl0_22 ),
inference(avatar_split_clause,[],[f781,f775,f597]) ).
fof(f597,plain,
( spl0_3
<=> ! [X2] : ~ pred_attacker(X2) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_3])]) ).
fof(f775,plain,
( spl0_22
<=> ! [X2] : ~ pred_attacker(tuple_client_A_in_2(X2)) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_22])]) ).
fof(f781,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl0_22 ),
inference(resolution,[],[f776,f449]) ).
fof(f449,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_2(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f334]) ).
fof(f334,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_2(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f241]) ).
fof(f241,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_A_in_2(X0)) ),
inference(rectify,[],[f141]) ).
fof(f141,axiom,
! [X124] :
( pred_attacker(X124)
=> pred_attacker(tuple_client_A_in_2(X124)) ),
file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax140) ).
fof(f776,plain,
( ! [X2] : ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ spl0_22 ),
inference(avatar_component_clause,[],[f775]) ).
fof(f780,plain,
( spl0_3
| ~ spl0_21 ),
inference(avatar_split_clause,[],[f779,f772,f597]) ).
fof(f772,plain,
( spl0_21
<=> ! [X1] : ~ pred_attacker(tuple_client_A_in_6(X1)) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_21])]) ).
fof(f779,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl0_21 ),
inference(resolution,[],[f773,f445]) ).
fof(f445,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_6(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f330]) ).
fof(f330,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_6(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f237]) ).
fof(f237,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_A_in_6(X0)) ),
inference(rectify,[],[f137]) ).
fof(f137,axiom,
! [X120] :
( pred_attacker(X120)
=> pred_attacker(tuple_client_A_in_6(X120)) ),
file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax136) ).
fof(f773,plain,
( ! [X1] : ~ pred_attacker(tuple_client_A_in_6(X1))
| ~ spl0_21 ),
inference(avatar_component_clause,[],[f772]) ).
fof(f777,plain,
( spl0_5
| spl0_21
| spl0_4
| spl0_22
| ~ spl0_1 ),
inference(avatar_split_clause,[],[f770,f495,f775,f600,f772,f603]) ).
fof(f603,plain,
( spl0_5
<=> ! [X3] : ~ pred_attacker(tuple_client_A_in_4(X3)) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_5])]) ).
fof(f600,plain,
( spl0_4
<=> ! [X4] : ~ pred_attacker(tuple_client_A_in_8(X4)) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_4])]) ).
fof(f495,plain,
( spl0_1
<=> ! [X4,X0,X3,X2,X1] :
( ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas))))
| ~ pred_attacker(tuple_client_A_in_8(X4))
| ~ pred_attacker(tuple_client_A_in_6(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_4(X3))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas))) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_1])]) ).
fof(f770,plain,
( ! [X2,X3,X1,X4] :
( ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_attacker(tuple_client_A_in_8(X4))
| ~ pred_attacker(tuple_client_A_in_6(X1))
| ~ pred_attacker(tuple_client_A_in_4(X3)) )
| ~ spl0_1 ),
inference(subsumption_resolution,[],[f769,f420]) ).
fof(f420,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
inference(cnf_transformation,[],[f213]) ).
fof(f213,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
inference(rectify,[],[f96]) ).
fof(f96,axiom,
! [X62,X63] : pred_eq_bitstring_bitstring(X62,X63),
file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax95) ).
fof(f769,plain,
( ! [X2,X3,X0,X1,X4] :
( ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_attacker(tuple_client_A_in_8(X4))
| ~ pred_attacker(tuple_client_A_in_6(X1))
| ~ pred_attacker(tuple_client_A_in_4(X3))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas))) )
| ~ spl0_1 ),
inference(subsumption_resolution,[],[f768,f420]) ).
fof(f768,plain,
( ! [X2,X3,X0,X1,X4] :
( ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_attacker(tuple_client_A_in_8(X4))
| ~ pred_attacker(tuple_client_A_in_6(X1))
| ~ pred_attacker(tuple_client_A_in_4(X3))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas))) )
| ~ spl0_1 ),
inference(subsumption_resolution,[],[f767,f420]) ).
fof(f767,plain,
( ! [X2,X3,X0,X1,X4] :
( ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_attacker(tuple_client_A_in_8(X4))
| ~ pred_attacker(tuple_client_A_in_6(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_4(X3))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas))) )
| ~ spl0_1 ),
inference(subsumption_resolution,[],[f496,f420]) ).
fof(f496,plain,
( ! [X2,X3,X0,X1,X4] :
( ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas))))
| ~ pred_attacker(tuple_client_A_in_8(X4))
| ~ pred_attacker(tuple_client_A_in_6(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_4(X3))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas))) )
| ~ spl0_1 ),
inference(avatar_component_clause,[],[f495]) ).
fof(f753,plain,
( spl0_3
| spl0_3
| ~ spl0_2
| ~ spl0_6
| ~ spl0_13 ),
inference(avatar_split_clause,[],[f752,f713,f606,f498,f597,f597]) ).
fof(f498,plain,
( spl0_2
<=> pred_attacker(tuple_client_A_out_9(name_objective1)) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_2])]) ).
fof(f606,plain,
( spl0_6
<=> ! [X0] :
( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))))
| ~ pred_attacker(tuple_client_A_in_6(X0)) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_6])]) ).
fof(f713,plain,
( spl0_13
<=> ! [X2,X0] :
( ~ pred_attacker(X0)
| ~ pred_attacker(X2)
| pred_attacker(constr_cbc_enc_2(X2,X0,name_Kas)) ) ),
introduced(avatar_definition,[new_symbols(naming,[spl0_13])]) ).
fof(f752,plain,
( ! [X0,X1] :
( ~ pred_attacker(X0)
| ~ pred_attacker(X1) )
| ~ spl0_2
| ~ spl0_6
| ~ spl0_13 ),
inference(duplicate_literal_removal,[],[f749]) ).
fof(f749,plain,
( ! [X0,X1] :
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) )
| ~ spl0_2
| ~ spl0_6
| ~ spl0_13 ),
inference(resolution,[],[f714,f722]) ).
fof(f722,plain,
( ! [X0,X1] :
( ~ pred_attacker(constr_cbc_enc_2(X0,X1,name_Kas))
| ~ pred_attacker(X0) )
| ~ spl0_2
| ~ spl0_6 ),
inference(forward_demodulation,[],[f721,f396]) ).
fof(f396,plain,
! [X0,X1] : constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1)) = X0,
inference(cnf_transformation,[],[f197]) ).
fof(f197,plain,
! [X0,X1] : constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1)) = X0,
inference(rectify,[],[f92]) ).
fof(f92,axiom,
! [X50,X51] : constr_tuple_2_get_0x30_bitstring(tuple_2(X50,X51)) = X50,
file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax91) ).
fof(f721,plain,
( ! [X0,X1] :
( ~ pred_attacker(constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1)))
| ~ pred_attacker(constr_cbc_enc_2(X0,X1,name_Kas)) )
| ~ spl0_2
| ~ spl0_6 ),
inference(superposition,[],[f689,f397]) ).
fof(f397,plain,
! [X2,X0,X1] : constr_cbc_dec_2(constr_cbc_enc_2(X1,X2,X0),X0) = tuple_2(X1,X2),
inference(cnf_transformation,[],[f198]) ).
fof(f198,plain,
! [X0,X1,X2] : constr_cbc_dec_2(constr_cbc_enc_2(X1,X2,X0),X0) = tuple_2(X1,X2),
inference(rectify,[],[f81]) ).
fof(f81,axiom,
! [X9,X10,X11] : constr_cbc_dec_2(constr_cbc_enc_2(X10,X11,X9),X9) = tuple_2(X10,X11),
file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax80) ).
fof(f689,plain,
( ! [X0] :
( ~ pred_attacker(constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))
| ~ pred_attacker(X0) )
| ~ spl0_2
| ~ spl0_6 ),
inference(subsumption_resolution,[],[f687,f524]) ).
fof(f524,plain,
( ~ pred_attacker(name_objective2)
| ~ spl0_2 ),
inference(subsumption_resolution,[],[f521,f510]) ).
fof(f510,plain,
( pred_attacker(name_objective1)
| ~ spl0_2 ),
inference(resolution,[],[f451,f500]) ).
fof(f500,plain,
( pred_attacker(tuple_client_A_out_9(name_objective1))
| ~ spl0_2 ),
inference(avatar_component_clause,[],[f498]) ).
fof(f451,plain,
! [X0] :
( ~ pred_attacker(tuple_client_A_out_9(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f335]) ).
fof(f335,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_A_out_9(X0)) ),
inference(ennf_transformation,[],[f243]) ).
fof(f243,plain,
! [X0] :
( pred_attacker(tuple_client_A_out_9(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f122]) ).
fof(f122,axiom,
! [X97] :
( pred_attacker(tuple_client_A_out_9(X97))
=> pred_attacker(X97) ),
file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax121) ).
fof(f521,plain,
( ~ pred_attacker(name_objective2)
| ~ pred_attacker(name_objective1) ),
inference(resolution,[],[f394,f382]) ).
fof(f382,plain,
~ pred_attacker(tuple_2(name_objective1,name_objective2)),
inference(cnf_transformation,[],[f192]) ).
fof(f192,plain,
~ pred_attacker(tuple_2(name_objective1,name_objective2)),
inference(flattening,[],[f191]) ).
fof(f191,negated_conjecture,
~ pred_attacker(tuple_2(name_objective1,name_objective2)),
inference(negated_conjecture,[],[f190]) ).
fof(f190,conjecture,
pred_attacker(tuple_2(name_objective1,name_objective2)),
file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',co0) ).
fof(f394,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f289]) ).
fof(f289,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f288]) ).
fof(f288,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f195]) ).
fof(f195,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(tuple_2(X0,X1)) ),
inference(rectify,[],[f171]) ).
fof(f171,axiom,
! [X186,X187] :
( ( pred_attacker(X187)
& pred_attacker(X186) )
=> pred_attacker(tuple_2(X186,X187)) ),
file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax170) ).
fof(f687,plain,
( ! [X0] :
( ~ pred_attacker(X0)
| ~ pred_attacker(constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))
| pred_attacker(name_objective2) )
| ~ spl0_6 ),
inference(resolution,[],[f683,f530]) ).
fof(f530,plain,
! [X0,X1] :
( ~ pred_attacker(constr_enc(X0,X1))
| ~ pred_attacker(X1)
| pred_attacker(X0) ),
inference(superposition,[],[f483,f433]) ).
fof(f433,plain,
! [X0,X1] : constr_dec(constr_enc(X1,X0),X0) = X1,
inference(cnf_transformation,[],[f225]) ).
fof(f225,plain,
! [X0,X1] : constr_dec(constr_enc(X1,X0),X0) = X1,
inference(rectify,[],[f89]) ).
fof(f89,axiom,
! [X40,X41] : constr_dec(constr_enc(X41,X40),X40) = X41,
file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax88) ).
fof(f483,plain,
! [X0,X1] :
( pred_attacker(constr_dec(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f368]) ).
fof(f368,plain,
! [X0,X1] :
( pred_attacker(constr_dec(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f367]) ).
fof(f367,plain,
! [X0,X1] :
( pred_attacker(constr_dec(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f275]) ).
fof(f275,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(constr_dec(X0,X1)) ),
inference(rectify,[],[f114]) ).
fof(f114,axiom,
! [X88,X89] :
( ( pred_attacker(X89)
& pred_attacker(X88) )
=> pred_attacker(constr_dec(X88,X89)) ),
file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax113) ).
fof(f683,plain,
( ! [X0] :
( pred_attacker(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas))))
| ~ pred_attacker(X0) )
| ~ spl0_6 ),
inference(resolution,[],[f668,f440]) ).
fof(f440,plain,
! [X0] :
( ~ pred_attacker(tuple_client_A_out_10(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f325]) ).
fof(f325,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_A_out_10(X0)) ),
inference(ennf_transformation,[],[f232]) ).
fof(f232,plain,
! [X0] :
( pred_attacker(tuple_client_A_out_10(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f130]) ).
fof(f130,axiom,
! [X105] :
( pred_attacker(tuple_client_A_out_10(X105))
=> pred_attacker(X105) ),
file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax129) ).
fof(f668,plain,
( ! [X0] :
( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))))
| ~ pred_attacker(X0) )
| ~ spl0_6 ),
inference(resolution,[],[f607,f445]) ).
fof(f607,plain,
( ! [X0] :
( ~ pred_attacker(tuple_client_A_in_6(X0))
| pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas))))) )
| ~ spl0_6 ),
inference(avatar_component_clause,[],[f606]) ).
fof(f714,plain,
( ! [X2,X0] :
( pred_attacker(constr_cbc_enc_2(X2,X0,name_Kas))
| ~ pred_attacker(X2)
| ~ pred_attacker(X0) )
| ~ spl0_13 ),
inference(avatar_component_clause,[],[f713]) ).
fof(f715,plain,
( spl0_3
| spl0_13 ),
inference(avatar_split_clause,[],[f694,f713,f597]) ).
fof(f694,plain,
! [X2,X0,X1] :
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| ~ pred_attacker(X2)
| pred_attacker(constr_cbc_enc_2(X2,X0,name_Kas)) ),
inference(resolution,[],[f679,f552]) ).
fof(f552,plain,
! [X2,X3,X0,X1,X4] :
( ~ pred_attacker(constr_cbc_enc_4(X0,X1,X2,X3,X4))
| pred_attacker(constr_cbc_enc_2(X0,X1,X4)) ),
inference(superposition,[],[f467,f416]) ).
fof(f416,plain,
! [X2,X3,X0,X1,X4] : constr_cbc_enc_2(X1,X2,X0) = constr_cbc_4_get_2_prefixes(constr_cbc_enc_4(X1,X2,X3,X4,X0)),
inference(cnf_transformation,[],[f209]) ).
fof(f209,plain,
! [X0,X1,X2,X3,X4] : constr_cbc_enc_2(X1,X2,X0) = constr_cbc_4_get_2_prefixes(constr_cbc_enc_4(X1,X2,X3,X4,X0)),
inference(rectify,[],[f84]) ).
fof(f84,axiom,
! [X19,X20,X21,X22,X23] : constr_cbc_4_get_2_prefixes(constr_cbc_enc_4(X20,X21,X22,X23,X19)) = constr_cbc_enc_2(X20,X21,X19),
file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax83) ).
fof(f467,plain,
! [X0] :
( pred_attacker(constr_cbc_4_get_2_prefixes(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f352]) ).
fof(f352,plain,
! [X0] :
( pred_attacker(constr_cbc_4_get_2_prefixes(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f259]) ).
fof(f259,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(constr_cbc_4_get_2_prefixes(X0)) ),
inference(rectify,[],[f152]) ).
fof(f152,axiom,
! [X149] :
( pred_attacker(X149)
=> pred_attacker(constr_cbc_4_get_2_prefixes(X149)) ),
file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax151) ).
fof(f679,plain,
! [X2,X3,X0,X1] :
( pred_attacker(constr_cbc_enc_4(X0,X1,name_Kab_66(X3),constr_cbc_enc_2(name_Kab_66(X3),X2,name_Kbs),name_Kas))
| ~ pred_attacker(X1)
| ~ pred_attacker(X2)
| ~ pred_attacker(X0) ),
inference(resolution,[],[f571,f457]) ).
fof(f457,plain,
! [X0] :
( ~ pred_attacker(tuple_server_S_out_2(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f341]) ).
fof(f341,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_server_S_out_2(X0)) ),
inference(ennf_transformation,[],[f249]) ).
fof(f249,plain,
! [X0] :
( pred_attacker(tuple_server_S_out_2(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f107]) ).
fof(f107,axiom,
! [X73] :
( pred_attacker(tuple_server_S_out_2(X73))
=> pred_attacker(X73) ),
file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax106) ).
fof(f571,plain,
! [X2,X3,X0,X1] :
( pred_attacker(tuple_server_S_out_2(constr_cbc_enc_4(X0,X1,name_Kab_66(X2),constr_cbc_enc_2(name_Kab_66(X2),X3,name_Kbs),name_Kas)))
| ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| ~ pred_attacker(X3) ),
inference(resolution,[],[f412,f462]) ).
fof(f462,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_server_S_in_1(X0,X1,X2))
| ~ pred_attacker(X2)
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f347]) ).
fof(f347,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_server_S_in_1(X0,X1,X2))
| ~ pred_attacker(X2)
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f346]) ).
fof(f346,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_server_S_in_1(X0,X1,X2))
| ~ pred_attacker(X2)
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f254]) ).
fof(f254,plain,
! [X0,X1,X2] :
( ( pred_attacker(X2)
& pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(tuple_server_S_in_1(X0,X1,X2)) ),
inference(rectify,[],[f108]) ).
fof(f108,axiom,
! [X74,X75,X76] :
( ( pred_attacker(X76)
& pred_attacker(X75)
& pred_attacker(X74) )
=> pred_attacker(tuple_server_S_in_1(X74,X75,X76)) ),
file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax107) ).
fof(f412,plain,
! [X2,X3,X0,X1] :
( ~ pred_attacker(tuple_server_S_in_1(X1,X2,X3))
| pred_attacker(tuple_server_S_out_2(constr_cbc_enc_4(X3,X2,name_Kab_66(X0),constr_cbc_enc_2(name_Kab_66(X0),X1,name_Kbs),name_Kas))) ),
inference(cnf_transformation,[],[f300]) ).
fof(f300,plain,
! [X0,X1,X2,X3] :
( pred_attacker(tuple_server_S_out_2(constr_cbc_enc_4(X3,X2,name_Kab_66(X0),constr_cbc_enc_2(name_Kab_66(X0),X1,name_Kbs),name_Kas)))
| ~ pred_attacker(tuple_server_S_in_1(X1,X2,X3)) ),
inference(ennf_transformation,[],[f205]) ).
fof(f205,plain,
! [X0,X1,X2,X3] :
( pred_attacker(tuple_server_S_in_1(X1,X2,X3))
=> pred_attacker(tuple_server_S_out_2(constr_cbc_enc_4(X3,X2,name_Kab_66(X0),constr_cbc_enc_2(name_Kab_66(X0),X1,name_Kbs),name_Kas))) ),
inference(rectify,[],[f189]) ).
fof(f189,axiom,
! [X220,X221,X222,X223] :
( pred_attacker(tuple_server_S_in_1(X221,X222,X223))
=> pred_attacker(tuple_server_S_out_2(constr_cbc_enc_4(X223,X222,name_Kab_66(X220),constr_cbc_enc_2(name_Kab_66(X220),X221,name_Kbs),name_Kas))) ),
file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax188) ).
fof(f667,plain,
( spl0_3
| ~ spl0_5 ),
inference(avatar_split_clause,[],[f666,f603,f597]) ).
fof(f666,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl0_5 ),
inference(resolution,[],[f604,f447]) ).
fof(f447,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f332]) ).
fof(f332,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f239]) ).
fof(f239,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_A_in_4(X0)) ),
inference(rectify,[],[f139]) ).
fof(f139,axiom,
! [X122] :
( pred_attacker(X122)
=> pred_attacker(tuple_client_A_in_4(X122)) ),
file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax138) ).
fof(f604,plain,
( ! [X3] : ~ pred_attacker(tuple_client_A_in_4(X3))
| ~ spl0_5 ),
inference(avatar_component_clause,[],[f603]) ).
fof(f665,plain,
( spl0_3
| ~ spl0_4 ),
inference(avatar_split_clause,[],[f664,f600,f597]) ).
fof(f664,plain,
( ! [X0] : ~ pred_attacker(X0)
| ~ spl0_4 ),
inference(resolution,[],[f601,f443]) ).
fof(f443,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_8(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f328]) ).
fof(f328,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_8(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f235]) ).
fof(f235,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_A_in_8(X0)) ),
inference(rectify,[],[f135]) ).
fof(f135,axiom,
! [X118] :
( pred_attacker(X118)
=> pred_attacker(tuple_client_A_in_8(X118)) ),
file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax134) ).
fof(f601,plain,
( ! [X4] : ~ pred_attacker(tuple_client_A_in_8(X4))
| ~ spl0_4 ),
inference(avatar_component_clause,[],[f600]) ).
fof(f663,plain,
~ spl0_3,
inference(avatar_contradiction_clause,[],[f609]) ).
fof(f609,plain,
( $false
| ~ spl0_3 ),
inference(resolution,[],[f598,f404]) ).
fof(f404,plain,
pred_attacker(name_A),
inference(cnf_transformation,[],[f179]) ).
fof(f179,axiom,
pred_attacker(name_A),
file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax178) ).
fof(f598,plain,
( ! [X2] : ~ pred_attacker(X2)
| ~ spl0_3 ),
inference(avatar_component_clause,[],[f597]) ).
fof(f608,plain,
( spl0_3
| spl0_4
| spl0_5
| spl0_6 ),
inference(avatar_split_clause,[],[f595,f606,f603,f600,f597]) ).
fof(f595,plain,
! [X2,X3,X0,X4] :
( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))))
| ~ pred_attacker(tuple_client_A_in_4(X3))
| ~ pred_attacker(tuple_client_A_in_6(X0))
| ~ pred_attacker(tuple_client_A_in_8(X4))
| ~ pred_attacker(X2) ),
inference(subsumption_resolution,[],[f594,f420]) ).
fof(f594,plain,
! [X2,X3,X0,X1,X4] :
( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))))
| ~ pred_attacker(tuple_client_A_in_4(X3))
| ~ pred_attacker(tuple_client_A_in_6(X0))
| ~ pred_attacker(tuple_client_A_in_8(X4))
| ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X1)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas))))
| ~ pred_attacker(X2) ),
inference(subsumption_resolution,[],[f593,f420]) ).
fof(f593,plain,
! [X2,X3,X0,X1,X4] :
( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))))
| ~ pred_attacker(tuple_client_A_in_4(X3))
| ~ pred_attacker(tuple_client_A_in_6(X0))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X0,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_8(X4))
| ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X1)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas))))
| ~ pred_attacker(X2) ),
inference(subsumption_resolution,[],[f592,f420]) ).
fof(f592,plain,
! [X2,X3,X0,X1,X4] :
( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_4(X3))
| ~ pred_attacker(tuple_client_A_in_6(X0))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X0,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_8(X4))
| ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X1)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas))))
| ~ pred_attacker(X2) ),
inference(subsumption_resolution,[],[f591,f420]) ).
fof(f591,plain,
! [X2,X3,X0,X1,X4] :
( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))))
| ~ pred_eq_bitstring_bitstring(name_Na(X1),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_4(X3))
| ~ pred_attacker(tuple_client_A_in_6(X0))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X0,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_8(X4))
| ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X1)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas))))
| ~ pred_attacker(X2) ),
inference(resolution,[],[f407,f449]) ).
fof(f407,plain,
! [X2,X3,X0,X1,X4] :
( ~ pred_attacker(tuple_client_A_in_2(X2))
| pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_4(X3))
| ~ pred_attacker(tuple_client_A_in_6(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_8(X4))
| ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
inference(cnf_transformation,[],[f293]) ).
fof(f293,plain,
! [X0,X1,X2,X3,X4] :
( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_4(X3))
| ~ pred_attacker(tuple_client_A_in_6(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_8(X4))
| ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
inference(flattening,[],[f292]) ).
fof(f292,plain,
! [X0,X1,X2,X3,X4] :
( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_4(X3))
| ~ pred_attacker(tuple_client_A_in_6(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_8(X4))
| ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
inference(ennf_transformation,[],[f200]) ).
fof(f200,plain,
! [X0,X1,X2,X3,X4] :
( ( pred_attacker(tuple_client_A_in_2(X2))
& pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
& pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
& pred_attacker(tuple_client_A_in_4(X3))
& pred_attacker(tuple_client_A_in_6(X1))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
& pred_attacker(tuple_client_A_in_8(X4))
& pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) )
=> pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas))))) ),
inference(rectify,[],[f187]) ).
fof(f187,axiom,
! [X213,X214,X215,X216,X217] :
( ( pred_attacker(tuple_client_A_in_2(X215))
& pred_eq_bitstring_bitstring(name_Na(X213),constr_tuple_4_get_0x30(constr_cbc_dec_4(X215,name_Kas)))
& pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X215,name_Kas)))
& pred_attacker(tuple_client_A_in_4(X216))
& pred_attacker(tuple_client_A_in_6(X214))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X214,name_Kas)))
& pred_attacker(tuple_client_A_in_8(X217))
& pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X216,X215,X213)),constr_cbc_dec_1(X217,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X214,name_Kas)))) )
=> pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X214,name_Kas))))) ),
file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax186) ).
fof(f501,plain,
( spl0_1
| spl0_2 ),
inference(avatar_split_clause,[],[f408,f498,f495]) ).
fof(f408,plain,
! [X2,X3,X0,X1,X4] :
( pred_attacker(tuple_client_A_out_9(name_objective1))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_4(X3))
| ~ pred_attacker(tuple_client_A_in_6(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_8(X4))
| ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
inference(cnf_transformation,[],[f295]) ).
fof(f295,plain,
! [X0,X1,X2,X3,X4] :
( pred_attacker(tuple_client_A_out_9(name_objective1))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_4(X3))
| ~ pred_attacker(tuple_client_A_in_6(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_8(X4))
| ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
inference(flattening,[],[f294]) ).
fof(f294,plain,
! [X0,X1,X2,X3,X4] :
( pred_attacker(tuple_client_A_out_9(name_objective1))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_4(X3))
| ~ pred_attacker(tuple_client_A_in_6(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_8(X4))
| ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
inference(ennf_transformation,[],[f201]) ).
fof(f201,plain,
! [X0,X1,X2,X3,X4] :
( ( pred_attacker(tuple_client_A_in_2(X2))
& pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
& pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
& pred_attacker(tuple_client_A_in_4(X3))
& pred_attacker(tuple_client_A_in_6(X1))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
& pred_attacker(tuple_client_A_in_8(X4))
& pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) )
=> pred_attacker(tuple_client_A_out_9(name_objective1)) ),
inference(rectify,[],[f186]) ).
fof(f186,axiom,
! [X208,X209,X210,X211,X212] :
( ( pred_attacker(tuple_client_A_in_2(X210))
& pred_eq_bitstring_bitstring(name_Na(X208),constr_tuple_4_get_0x30(constr_cbc_dec_4(X210,name_Kas)))
& pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X210,name_Kas)))
& pred_attacker(tuple_client_A_in_4(X211))
& pred_attacker(tuple_client_A_in_6(X209))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X209,name_Kas)))
& pred_attacker(tuple_client_A_in_8(X212))
& pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X211,X210,X208)),constr_cbc_dec_1(X212,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X209,name_Kas)))) )
=> pred_attacker(tuple_client_A_out_9(name_objective1)) ),
file('/export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628',ax185) ).
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.09/0.11 % Problem : SWW968+1 : TPTP v8.1.2. Released v7.4.0.
% 0.09/0.12 % Command : vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule file --schedule_file /export/starexec/sandbox2/solver/bin/quickGreedyProduceRating_steal_pow3.txt --cores 8 -m 12000 -t %d %s
% 0.11/0.32 % Computer : n004.cluster.edu
% 0.11/0.32 % Model : x86_64 x86_64
% 0.11/0.32 % CPU : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.11/0.32 % Memory : 8042.1875MB
% 0.11/0.32 % OS : Linux 3.10.0-693.el7.x86_64
% 0.11/0.33 % CPULimit : 300
% 0.11/0.33 % WCLimit : 300
% 0.11/0.33 % DateTime : Tue Apr 30 17:54:18 EDT 2024
% 0.11/0.33 % CPUTime :
% 0.11/0.33 This is a FOF_THM_RFO_SEQ problem
% 0.11/0.33 Running vampire --input_syntax tptp --proof tptp --output_axiom_names on --mode portfolio --schedule file --schedule_file /export/starexec/sandbox2/solver/bin/quickGreedyProduceRating_steal_pow3.txt --cores 8 -m 12000 -t 300 /export/starexec/sandbox2/tmp/tmp.qFyhQr2ojX/Vampire---4.8_11628
% 0.61/0.81 % (11746)ott+1011_1:1_sil=2000:urr=on:i=33:sd=1:kws=inv_frequency:ss=axioms:sup=off_0 on Vampire---4 for (2995ds/33Mi)
% 0.61/0.81 % (11744)lrs+1011_461:32768_sil=16000:irw=on:sp=frequency:lsd=20:fd=preordered:nwc=10.0:s2agt=32:alpa=false:cond=fast:s2a=on:i=51:s2at=3.0:awrs=decay:awrsf=691:bd=off:nm=20:fsr=off:amm=sco:uhcvi=on:rawr=on_0 on Vampire---4 for (2995ds/51Mi)
% 0.61/0.81 % (11745)lrs+1011_1:1_sil=8000:sp=occurrence:nwc=10.0:i=78:ss=axioms:sgt=8_0 on Vampire---4 for (2995ds/78Mi)
% 0.61/0.81 % (11747)lrs+2_1:1_sil=16000:fde=none:sos=all:nwc=5.0:i=34:ep=RS:s2pl=on:lma=on:afp=100000_0 on Vampire---4 for (2995ds/34Mi)
% 0.61/0.81 % (11743)dis-1011_2:1_sil=2000:lsd=20:nwc=5.0:flr=on:mep=off:st=3.0:i=34:sd=1:ep=RS:ss=axioms_0 on Vampire---4 for (2995ds/34Mi)
% 0.61/0.81 % (11748)lrs+1002_1:16_to=lpo:sil=32000:sp=unary_frequency:sos=on:i=45:bd=off:ss=axioms_0 on Vampire---4 for (2995ds/45Mi)
% 0.61/0.81 % (11749)lrs+21_1:5_sil=2000:sos=on:urr=on:newcnf=on:slsq=on:i=83:slsql=off:bd=off:nm=2:ss=axioms:st=1.5:sp=const_min:gsp=on:rawr=on_0 on Vampire---4 for (2995ds/83Mi)
% 0.61/0.81 % (11750)lrs-21_1:1_to=lpo:sil=2000:sp=frequency:sos=on:lma=on:i=56:sd=2:ss=axioms:ep=R_0 on Vampire---4 for (2995ds/56Mi)
% 0.61/0.81 % (11750)Refutation not found, incomplete strategy% (11750)------------------------------
% 0.61/0.81 % (11750)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.61/0.81 % (11748)Refutation not found, incomplete strategy% (11748)------------------------------
% 0.61/0.81 % (11748)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.61/0.81 % (11748)Termination reason: Refutation not found, incomplete strategy
% 0.61/0.81
% 0.61/0.81 % (11748)Memory used [KB]: 1153
% 0.61/0.81 % (11748)Time elapsed: 0.003 s
% 0.61/0.81 % (11748)Instructions burned: 3 (million)
% 0.61/0.81 % (11748)------------------------------
% 0.61/0.81 % (11748)------------------------------
% 0.61/0.81 % (11750)Termination reason: Refutation not found, incomplete strategy
% 0.61/0.81
% 0.61/0.81 % (11750)Memory used [KB]: 1155
% 0.61/0.81 % (11750)Time elapsed: 0.003 s
% 0.61/0.81 % (11750)Instructions burned: 3 (million)
% 0.61/0.81 % (11750)------------------------------
% 0.61/0.81 % (11750)------------------------------
% 0.61/0.81 % (11743)Refutation not found, incomplete strategy% (11743)------------------------------
% 0.61/0.81 % (11743)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.61/0.81 % (11743)Termination reason: Refutation not found, incomplete strategy
% 0.61/0.81
% 0.61/0.81 % (11743)Memory used [KB]: 1160
% 0.61/0.81 % (11743)Time elapsed: 0.004 s
% 0.61/0.81 % (11743)Instructions burned: 4 (million)
% 0.61/0.81 % (11743)------------------------------
% 0.61/0.81 % (11743)------------------------------
% 0.61/0.81 % (11747)Refutation not found, incomplete strategy% (11747)------------------------------
% 0.61/0.81 % (11747)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.61/0.81 % (11747)Termination reason: Refutation not found, incomplete strategy
% 0.61/0.81
% 0.61/0.81 % (11747)Memory used [KB]: 1268
% 0.61/0.81 % (11747)Time elapsed: 0.006 s
% 0.61/0.81 % (11747)Instructions burned: 8 (million)
% 0.61/0.81 % (11747)------------------------------
% 0.61/0.81 % (11747)------------------------------
% 0.61/0.81 % (11751)lrs+21_1:16_sil=2000:sp=occurrence:urr=on:flr=on:i=55:sd=1:nm=0:ins=3:ss=included:rawr=on:br=off_0 on Vampire---4 for (2995ds/55Mi)
% 0.61/0.81 % (11752)dis+3_25:4_sil=16000:sos=all:erd=off:i=50:s2at=4.0:bd=off:nm=60:sup=off:cond=on:av=off:ins=2:nwc=10.0:etr=on:to=lpo:s2agt=20:fd=off:bsr=unit_only:slsq=on:slsqr=28,19:awrs=converge:awrsf=500:tgt=ground:bs=unit_only_0 on Vampire---4 for (2995ds/50Mi)
% 0.61/0.81 % (11753)lrs+1010_1:2_sil=4000:tgt=ground:nwc=10.0:st=2.0:i=208:sd=1:bd=off:ss=axioms_0 on Vampire---4 for (2995ds/208Mi)
% 0.61/0.82 % (11754)lrs-1011_1:1_sil=4000:plsq=on:plsqr=32,1:sp=frequency:plsql=on:nwc=10.0:i=52:aac=none:afr=on:ss=axioms:er=filter:sgt=16:rawr=on:etr=on:lma=on_0 on Vampire---4 for (2995ds/52Mi)
% 0.61/0.82 % (11753)Refutation not found, incomplete strategy% (11753)------------------------------
% 0.61/0.82 % (11753)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.61/0.82 % (11753)Termination reason: Refutation not found, incomplete strategy
% 0.61/0.82
% 0.61/0.82 % (11753)Memory used [KB]: 1158
% 0.61/0.82 % (11753)Time elapsed: 0.003 s
% 0.61/0.82 % (11753)Instructions burned: 4 (million)
% 0.61/0.82 % (11753)------------------------------
% 0.61/0.82 % (11753)------------------------------
% 0.61/0.82 % (11755)lrs-1010_1:1_to=lpo:sil=2000:sp=reverse_arity:sos=on:urr=ec_only:i=518:sd=2:bd=off:ss=axioms:sgt=16_0 on Vampire---4 for (2995ds/518Mi)
% 0.61/0.82 % (11745)First to succeed.
% 0.61/0.82 % (11755)Refutation not found, incomplete strategy% (11755)------------------------------
% 0.61/0.82 % (11755)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.61/0.82 % (11745)Refutation found. Thanks to Tanya!
% 0.61/0.82 % SZS status Theorem for Vampire---4
% 0.61/0.82 % SZS output start Proof for Vampire---4
% See solution above
% 0.61/0.83 % (11745)------------------------------
% 0.61/0.83 % (11745)Version: Vampire 4.8 (commit 8e9376e55 on 2024-01-18 13:49:33 +0100)
% 0.61/0.83 % (11745)Termination reason: Refutation
% 0.61/0.83
% 0.61/0.83 % (11745)Memory used [KB]: 1334
% 0.61/0.83 % (11745)Time elapsed: 0.016 s
% 0.61/0.83 % (11745)Instructions burned: 26 (million)
% 0.61/0.83 % (11745)------------------------------
% 0.61/0.83 % (11745)------------------------------
% 0.61/0.83 % (11738)Success in time 0.489 s
% 0.61/0.83 % Vampire---4.8 exiting
%------------------------------------------------------------------------------