TSTP Solution File: SWW968+1 by iProver---3.8
View Problem
- Process Solution
%------------------------------------------------------------------------------
% File : iProver---3.8
% Problem : SWW968+1 : TPTP v8.1.2. Released v7.4.0.
% Transfm : none
% Format : tptp:raw
% Command : run_iprover %s %d THM
% Computer : n022.cluster.edu
% Model : x86_64 x86_64
% CPU : Intel(R) Xeon(R) CPU E5-2620 v4 2.10GHz
% Memory : 8042.1875MB
% OS : Linux 3.10.0-693.el7.x86_64
% CPULimit : 300s
% WCLimit : 300s
% DateTime : Fri Sep 1 00:41:36 EDT 2023
% Result : Theorem 3.81s 1.15s
% Output : CNFRefutation 3.81s
% Verified :
% SZS Type : Refutation
% Derivation depth : 25
% Number of leaves : 23
% Syntax : Number of formulae : 155 ( 40 unt; 0 def)
% Number of atoms : 425 ( 16 equ)
% Maximal formula atoms : 9 ( 2 avg)
% Number of connectives : 489 ( 219 ~; 204 |; 36 &)
% ( 0 <=>; 30 =>; 0 <=; 0 <~>)
% Maximal formula depth : 15 ( 4 avg)
% Maximal term depth : 5 ( 2 avg)
% Number of predicates : 8 ( 6 usr; 5 prp; 0-2 aty)
% Number of functors : 34 ( 34 usr; 8 con; 0-5 aty)
% Number of variables : 301 ( 42 sgn; 179 !; 0 ?)
% Comments :
%------------------------------------------------------------------------------
fof(f81,axiom,
! [X9,X10,X11] : constr_cbc_dec_2(constr_cbc_enc_2(X10,X11,X9),X9) = tuple_2(X10,X11),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax80) ).
fof(f84,axiom,
! [X19,X20,X21,X22,X23] : constr_cbc_4_get_2_prefixes(constr_cbc_enc_4(X20,X21,X22,X23,X19)) = constr_cbc_enc_2(X20,X21,X19),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax83) ).
fof(f89,axiom,
! [X40,X41] : constr_dec(constr_enc(X41,X40),X40) = X41,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax88) ).
fof(f92,axiom,
! [X50,X51] : constr_tuple_2_get_0x30_bitstring(tuple_2(X50,X51)) = X50,
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax91) ).
fof(f96,axiom,
! [X62,X63] : pred_eq_bitstring_bitstring(X62,X63),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax95) ).
fof(f103,axiom,
pred_attacker(tuple_true),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax102) ).
fof(f107,axiom,
! [X73] :
( pred_attacker(tuple_server_S_out_2(X73))
=> pred_attacker(X73) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax106) ).
fof(f108,axiom,
! [X74,X75,X76] :
( ( pred_attacker(X76)
& pred_attacker(X75)
& pred_attacker(X74) )
=> pred_attacker(tuple_server_S_in_1(X74,X75,X76)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax107) ).
fof(f114,axiom,
! [X88,X89] :
( ( pred_attacker(X89)
& pred_attacker(X88) )
=> pred_attacker(constr_dec(X88,X89)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax113) ).
fof(f119,axiom,
! [X94] :
( pred_attacker(X94)
=> pred_attacker(tuple_client_B_in_1(X94)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax118) ).
fof(f122,axiom,
! [X97] :
( pred_attacker(tuple_client_A_out_9(X97))
=> pred_attacker(X97) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax121) ).
fof(f130,axiom,
! [X105] :
( pred_attacker(tuple_client_A_out_10(X105))
=> pred_attacker(X105) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax129) ).
fof(f135,axiom,
! [X118] :
( pred_attacker(X118)
=> pred_attacker(tuple_client_A_in_8(X118)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax134) ).
fof(f137,axiom,
! [X120] :
( pred_attacker(X120)
=> pred_attacker(tuple_client_A_in_6(X120)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax136) ).
fof(f139,axiom,
! [X122] :
( pred_attacker(X122)
=> pred_attacker(tuple_client_A_in_4(X122)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax138) ).
fof(f141,axiom,
! [X124] :
( pred_attacker(X124)
=> pred_attacker(tuple_client_A_in_2(X124)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax140) ).
fof(f152,axiom,
! [X149] :
( pred_attacker(X149)
=> pred_attacker(constr_cbc_4_get_2_prefixes(X149)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax151) ).
fof(f157,axiom,
pred_attacker(constr_CONST_4),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax156) ).
fof(f171,axiom,
! [X186,X187] :
( ( pred_attacker(X187)
& pred_attacker(X186) )
=> pred_attacker(tuple_2(X186,X187)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax170) ).
fof(f186,axiom,
! [X208,X209,X210,X211,X212] :
( ( pred_attacker(tuple_client_A_in_2(X210))
& pred_eq_bitstring_bitstring(name_Na(X208),constr_tuple_4_get_0x30(constr_cbc_dec_4(X210,name_Kas)))
& pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X210,name_Kas)))
& pred_attacker(tuple_client_A_in_4(X211))
& pred_attacker(tuple_client_A_in_6(X209))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X209,name_Kas)))
& pred_attacker(tuple_client_A_in_8(X212))
& pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X211,X210,X208)),constr_cbc_dec_1(X212,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X209,name_Kas)))) )
=> pred_attacker(tuple_client_A_out_9(name_objective1)) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax185) ).
fof(f187,axiom,
! [X213,X214,X215,X216,X217] :
( ( pred_attacker(tuple_client_A_in_2(X215))
& pred_eq_bitstring_bitstring(name_Na(X213),constr_tuple_4_get_0x30(constr_cbc_dec_4(X215,name_Kas)))
& pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X215,name_Kas)))
& pred_attacker(tuple_client_A_in_4(X216))
& pred_attacker(tuple_client_A_in_6(X214))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X214,name_Kas)))
& pred_attacker(tuple_client_A_in_8(X217))
& pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X216,X215,X213)),constr_cbc_dec_1(X217,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X214,name_Kas)))) )
=> pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X214,name_Kas))))) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax186) ).
fof(f189,axiom,
! [X220,X221,X222,X223] :
( pred_attacker(tuple_server_S_in_1(X221,X222,X223))
=> pred_attacker(tuple_server_S_out_2(constr_cbc_enc_4(X223,X222,name_Kab_66(X220),constr_cbc_enc_2(name_Kab_66(X220),X221,name_Kbs),name_Kas))) ),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',ax188) ).
fof(f190,conjecture,
pred_attacker(tuple_2(name_objective1,name_objective2)),
file('/export/starexec/sandbox2/benchmark/theBenchmark.p',co0) ).
fof(f191,negated_conjecture,
~ pred_attacker(tuple_2(name_objective1,name_objective2)),
inference(negated_conjecture,[],[f190]) ).
fof(f193,plain,
! [X0,X1,X2] : constr_cbc_dec_2(constr_cbc_enc_2(X1,X2,X0),X0) = tuple_2(X1,X2),
inference(rectify,[],[f81]) ).
fof(f196,plain,
! [X0,X1,X2,X3,X4] : constr_cbc_enc_2(X1,X2,X0) = constr_cbc_4_get_2_prefixes(constr_cbc_enc_4(X1,X2,X3,X4,X0)),
inference(rectify,[],[f84]) ).
fof(f201,plain,
! [X0,X1] : constr_dec(constr_enc(X1,X0),X0) = X1,
inference(rectify,[],[f89]) ).
fof(f204,plain,
! [X0,X1] : constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1)) = X0,
inference(rectify,[],[f92]) ).
fof(f208,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
inference(rectify,[],[f96]) ).
fof(f218,plain,
! [X0] :
( pred_attacker(tuple_server_S_out_2(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f107]) ).
fof(f219,plain,
! [X0,X1,X2] :
( ( pred_attacker(X2)
& pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(tuple_server_S_in_1(X0,X1,X2)) ),
inference(rectify,[],[f108]) ).
fof(f224,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(constr_dec(X0,X1)) ),
inference(rectify,[],[f114]) ).
fof(f229,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_B_in_1(X0)) ),
inference(rectify,[],[f119]) ).
fof(f232,plain,
! [X0] :
( pred_attacker(tuple_client_A_out_9(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f122]) ).
fof(f240,plain,
! [X0] :
( pred_attacker(tuple_client_A_out_10(X0))
=> pred_attacker(X0) ),
inference(rectify,[],[f130]) ).
fof(f245,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_A_in_8(X0)) ),
inference(rectify,[],[f135]) ).
fof(f247,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_A_in_6(X0)) ),
inference(rectify,[],[f137]) ).
fof(f249,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_A_in_4(X0)) ),
inference(rectify,[],[f139]) ).
fof(f251,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(tuple_client_A_in_2(X0)) ),
inference(rectify,[],[f141]) ).
fof(f262,plain,
! [X0] :
( pred_attacker(X0)
=> pred_attacker(constr_cbc_4_get_2_prefixes(X0)) ),
inference(rectify,[],[f152]) ).
fof(f276,plain,
! [X0,X1] :
( ( pred_attacker(X1)
& pred_attacker(X0) )
=> pred_attacker(tuple_2(X0,X1)) ),
inference(rectify,[],[f171]) ).
fof(f287,plain,
! [X0,X1,X2,X3,X4] :
( ( pred_attacker(tuple_client_A_in_2(X2))
& pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
& pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
& pred_attacker(tuple_client_A_in_4(X3))
& pred_attacker(tuple_client_A_in_6(X1))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
& pred_attacker(tuple_client_A_in_8(X4))
& pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) )
=> pred_attacker(tuple_client_A_out_9(name_objective1)) ),
inference(rectify,[],[f186]) ).
fof(f288,plain,
! [X0,X1,X2,X3,X4] :
( ( pred_attacker(tuple_client_A_in_2(X2))
& pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
& pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
& pred_attacker(tuple_client_A_in_4(X3))
& pred_attacker(tuple_client_A_in_6(X1))
& pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
& pred_attacker(tuple_client_A_in_8(X4))
& pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) )
=> pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas))))) ),
inference(rectify,[],[f187]) ).
fof(f290,plain,
! [X0,X1,X2,X3] :
( pred_attacker(tuple_server_S_in_1(X1,X2,X3))
=> pred_attacker(tuple_server_S_out_2(constr_cbc_enc_4(X3,X2,name_Kab_66(X0),constr_cbc_enc_2(name_Kab_66(X0),X1,name_Kbs),name_Kas))) ),
inference(rectify,[],[f189]) ).
fof(f291,plain,
~ pred_attacker(tuple_2(name_objective1,name_objective2)),
inference(flattening,[],[f191]) ).
fof(f302,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_server_S_out_2(X0)) ),
inference(ennf_transformation,[],[f218]) ).
fof(f303,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_server_S_in_1(X0,X1,X2))
| ~ pred_attacker(X2)
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f219]) ).
fof(f304,plain,
! [X0,X1,X2] :
( pred_attacker(tuple_server_S_in_1(X0,X1,X2))
| ~ pred_attacker(X2)
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f303]) ).
fof(f310,plain,
! [X0,X1] :
( pred_attacker(constr_dec(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f224]) ).
fof(f311,plain,
! [X0,X1] :
( pred_attacker(constr_dec(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f310]) ).
fof(f316,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_1(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f229]) ).
fof(f319,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_A_out_9(X0)) ),
inference(ennf_transformation,[],[f232]) ).
fof(f327,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_A_out_10(X0)) ),
inference(ennf_transformation,[],[f240]) ).
fof(f333,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_8(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f245]) ).
fof(f335,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_6(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f247]) ).
fof(f337,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f249]) ).
fof(f339,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_2(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f251]) ).
fof(f358,plain,
! [X0] :
( pred_attacker(constr_cbc_4_get_2_prefixes(X0))
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f262]) ).
fof(f374,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(ennf_transformation,[],[f276]) ).
fof(f375,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(flattening,[],[f374]) ).
fof(f388,plain,
! [X0,X1,X2,X3,X4] :
( pred_attacker(tuple_client_A_out_9(name_objective1))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_4(X3))
| ~ pred_attacker(tuple_client_A_in_6(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_8(X4))
| ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
inference(ennf_transformation,[],[f287]) ).
fof(f389,plain,
! [X0,X1,X2,X3,X4] :
( pred_attacker(tuple_client_A_out_9(name_objective1))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_4(X3))
| ~ pred_attacker(tuple_client_A_in_6(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_8(X4))
| ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
inference(flattening,[],[f388]) ).
fof(f390,plain,
! [X0,X1,X2,X3,X4] :
( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_4(X3))
| ~ pred_attacker(tuple_client_A_in_6(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_8(X4))
| ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
inference(ennf_transformation,[],[f288]) ).
fof(f391,plain,
! [X0,X1,X2,X3,X4] :
( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_4(X3))
| ~ pred_attacker(tuple_client_A_in_6(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_8(X4))
| ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
inference(flattening,[],[f390]) ).
fof(f394,plain,
! [X0,X1,X2,X3] :
( pred_attacker(tuple_server_S_out_2(constr_cbc_enc_4(X3,X2,name_Kab_66(X0),constr_cbc_enc_2(name_Kab_66(X0),X1,name_Kbs),name_Kas)))
| ~ pred_attacker(tuple_server_S_in_1(X1,X2,X3)) ),
inference(ennf_transformation,[],[f290]) ).
fof(f475,plain,
! [X2,X0,X1] : constr_cbc_dec_2(constr_cbc_enc_2(X1,X2,X0),X0) = tuple_2(X1,X2),
inference(cnf_transformation,[],[f193]) ).
fof(f478,plain,
! [X2,X3,X0,X1,X4] : constr_cbc_enc_2(X1,X2,X0) = constr_cbc_4_get_2_prefixes(constr_cbc_enc_4(X1,X2,X3,X4,X0)),
inference(cnf_transformation,[],[f196]) ).
fof(f483,plain,
! [X0,X1] : constr_dec(constr_enc(X1,X0),X0) = X1,
inference(cnf_transformation,[],[f201]) ).
fof(f486,plain,
! [X0,X1] : constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1)) = X0,
inference(cnf_transformation,[],[f204]) ).
fof(f490,plain,
! [X0,X1] : pred_eq_bitstring_bitstring(X0,X1),
inference(cnf_transformation,[],[f208]) ).
fof(f497,plain,
pred_attacker(tuple_true),
inference(cnf_transformation,[],[f103]) ).
fof(f501,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_server_S_out_2(X0)) ),
inference(cnf_transformation,[],[f302]) ).
fof(f502,plain,
! [X2,X0,X1] :
( pred_attacker(tuple_server_S_in_1(X0,X1,X2))
| ~ pred_attacker(X2)
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f304]) ).
fof(f508,plain,
! [X0,X1] :
( pred_attacker(constr_dec(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f311]) ).
fof(f513,plain,
! [X0] :
( pred_attacker(tuple_client_B_in_1(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f316]) ).
fof(f516,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_A_out_9(X0)) ),
inference(cnf_transformation,[],[f319]) ).
fof(f524,plain,
! [X0] :
( pred_attacker(X0)
| ~ pred_attacker(tuple_client_A_out_10(X0)) ),
inference(cnf_transformation,[],[f327]) ).
fof(f529,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_8(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f333]) ).
fof(f531,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_6(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f335]) ).
fof(f533,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f337]) ).
fof(f535,plain,
! [X0] :
( pred_attacker(tuple_client_A_in_2(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f339]) ).
fof(f546,plain,
! [X0] :
( pred_attacker(constr_cbc_4_get_2_prefixes(X0))
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f358]) ).
fof(f551,plain,
pred_attacker(constr_CONST_4),
inference(cnf_transformation,[],[f157]) ).
fof(f565,plain,
! [X0,X1] :
( pred_attacker(tuple_2(X0,X1))
| ~ pred_attacker(X1)
| ~ pred_attacker(X0) ),
inference(cnf_transformation,[],[f375]) ).
fof(f579,plain,
! [X2,X3,X0,X1,X4] :
( pred_attacker(tuple_client_A_out_9(name_objective1))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_4(X3))
| ~ pred_attacker(tuple_client_A_in_6(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_8(X4))
| ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
inference(cnf_transformation,[],[f389]) ).
fof(f580,plain,
! [X2,X3,X0,X1,X4] :
( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X2,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_4(X3))
| ~ pred_attacker(tuple_client_A_in_6(X1))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X1,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_8(X4))
| ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X3,X2,X0)),constr_cbc_dec_1(X4,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas)))) ),
inference(cnf_transformation,[],[f391]) ).
fof(f582,plain,
! [X2,X3,X0,X1] :
( pred_attacker(tuple_server_S_out_2(constr_cbc_enc_4(X3,X2,name_Kab_66(X0),constr_cbc_enc_2(name_Kab_66(X0),X1,name_Kbs),name_Kas)))
| ~ pred_attacker(tuple_server_S_in_1(X1,X2,X3)) ),
inference(cnf_transformation,[],[f394]) ).
fof(f583,plain,
~ pred_attacker(tuple_2(name_objective1,name_objective2)),
inference(cnf_transformation,[],[f291]) ).
cnf(c_129,plain,
constr_cbc_dec_2(constr_cbc_enc_2(X0,X1,X2),X2) = tuple_2(X0,X1),
inference(cnf_transformation,[],[f475]) ).
cnf(c_132,plain,
constr_cbc_4_get_2_prefixes(constr_cbc_enc_4(X0,X1,X2,X3,X4)) = constr_cbc_enc_2(X0,X1,X4),
inference(cnf_transformation,[],[f478]) ).
cnf(c_137,plain,
constr_dec(constr_enc(X0,X1),X1) = X0,
inference(cnf_transformation,[],[f483]) ).
cnf(c_140,plain,
constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1)) = X0,
inference(cnf_transformation,[],[f486]) ).
cnf(c_144,plain,
pred_eq_bitstring_bitstring(X0,X1),
inference(cnf_transformation,[],[f490]) ).
cnf(c_151,plain,
pred_attacker(tuple_true),
inference(cnf_transformation,[],[f497]) ).
cnf(c_155,plain,
( ~ pred_attacker(tuple_server_S_out_2(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f501]) ).
cnf(c_156,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| ~ pred_attacker(X2)
| pred_attacker(tuple_server_S_in_1(X2,X0,X1)) ),
inference(cnf_transformation,[],[f502]) ).
cnf(c_162,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(constr_dec(X1,X0)) ),
inference(cnf_transformation,[],[f508]) ).
cnf(c_167,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_B_in_1(X0)) ),
inference(cnf_transformation,[],[f513]) ).
cnf(c_170,plain,
( ~ pred_attacker(tuple_client_A_out_9(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f516]) ).
cnf(c_178,plain,
( ~ pred_attacker(tuple_client_A_out_10(X0))
| pred_attacker(X0) ),
inference(cnf_transformation,[],[f524]) ).
cnf(c_183,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_A_in_8(X0)) ),
inference(cnf_transformation,[],[f529]) ).
cnf(c_185,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_A_in_6(X0)) ),
inference(cnf_transformation,[],[f531]) ).
cnf(c_187,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_A_in_4(X0)) ),
inference(cnf_transformation,[],[f533]) ).
cnf(c_189,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_A_in_2(X0)) ),
inference(cnf_transformation,[],[f535]) ).
cnf(c_200,plain,
( ~ pred_attacker(X0)
| pred_attacker(constr_cbc_4_get_2_prefixes(X0)) ),
inference(cnf_transformation,[],[f546]) ).
cnf(c_205,plain,
pred_attacker(constr_CONST_4),
inference(cnf_transformation,[],[f551]) ).
cnf(c_219,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| pred_attacker(tuple_2(X1,X0)) ),
inference(cnf_transformation,[],[f565]) ).
cnf(c_233,plain,
( ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X0,X1,X2)),constr_cbc_dec_1(X3,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas))))
| ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_4_get_0x30(constr_cbc_dec_4(X1,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X4,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X1,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_8(X3))
| ~ pred_attacker(tuple_client_A_in_6(X4))
| ~ pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_attacker(tuple_client_A_in_2(X1))
| pred_attacker(tuple_client_A_out_9(name_objective1)) ),
inference(cnf_transformation,[],[f579]) ).
cnf(c_234,plain,
( ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X0,X1,X2)),constr_cbc_dec_1(X3,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas))))
| ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_4_get_0x30(constr_cbc_dec_4(X1,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X4,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X1,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_8(X3))
| ~ pred_attacker(tuple_client_A_in_6(X4))
| ~ pred_attacker(tuple_client_A_in_4(X0))
| ~ pred_attacker(tuple_client_A_in_2(X1))
| pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas))))) ),
inference(cnf_transformation,[],[f580]) ).
cnf(c_236,plain,
( ~ pred_attacker(tuple_server_S_in_1(X0,X1,X2))
| pred_attacker(tuple_server_S_out_2(constr_cbc_enc_4(X2,X1,name_Kab_66(X3),constr_cbc_enc_2(name_Kab_66(X3),X0,name_Kbs),name_Kas))) ),
inference(cnf_transformation,[],[f582]) ).
cnf(c_237,negated_conjecture,
~ pred_attacker(tuple_2(name_objective1,name_objective2)),
inference(cnf_transformation,[],[f583]) ).
cnf(c_376,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_A_in_4(X0)) ),
inference(prop_impl_just,[status(thm)],[c_187]) ).
cnf(c_723,plain,
( ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X0,X1,X2)),constr_cbc_dec_1(X3,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas))))
| ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_4_get_0x30(constr_cbc_dec_4(X1,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X4,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X1,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_8(X3))
| ~ pred_attacker(tuple_client_A_in_6(X4))
| ~ pred_attacker(tuple_client_A_in_2(X1))
| ~ pred_attacker(X0)
| pred_attacker(tuple_client_A_out_9(name_objective1)) ),
inference(bin_hyper_res,[status(thm)],[c_233,c_376]) ).
cnf(c_724,plain,
( ~ pred_eq_bitstring_bitstring(tuple_succ(name_Na0x27(X0,X1,X2)),constr_cbc_dec_1(X3,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas))))
| ~ pred_eq_bitstring_bitstring(name_Na(X2),constr_tuple_4_get_0x30(constr_cbc_dec_4(X1,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X4,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X1,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_8(X3))
| ~ pred_attacker(tuple_client_A_in_6(X4))
| ~ pred_attacker(tuple_client_A_in_2(X1))
| ~ pred_attacker(X0)
| pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X4,name_Kas))))) ),
inference(bin_hyper_res,[status(thm)],[c_234,c_376]) ).
cnf(c_755,plain,
( ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X1,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X2,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X1,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_8(X3))
| ~ pred_attacker(tuple_client_A_in_6(X2))
| ~ pred_attacker(tuple_client_A_in_2(X1))
| ~ pred_attacker(X4)
| pred_attacker(tuple_client_A_out_9(name_objective1)) ),
inference(backward_subsumption_resolution,[status(thm)],[c_723,c_144]) ).
cnf(c_756,plain,
( ~ pred_eq_bitstring_bitstring(name_Na(X0),constr_tuple_4_get_0x30(constr_cbc_dec_4(X1,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_A,constr_tuple_2_get_1(constr_cbc_dec_2(X2,name_Kas)))
| ~ pred_eq_bitstring_bitstring(name_B,constr_tuple_4_get_1(constr_cbc_dec_4(X1,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_8(X3))
| ~ pred_attacker(tuple_client_A_in_6(X2))
| ~ pred_attacker(tuple_client_A_in_2(X1))
| ~ pred_attacker(X4)
| pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X2,name_Kas))))) ),
inference(backward_subsumption_resolution,[status(thm)],[c_724,c_144]) ).
cnf(c_1367,plain,
( ~ pred_attacker(tuple_client_A_in_8(X0))
| ~ pred_attacker(tuple_client_A_in_6(X1))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_attacker(X3)
| pred_attacker(tuple_client_A_out_9(name_objective1)) ),
inference(forward_subsumption_resolution,[status(thm)],[c_755,c_144,c_144,c_144]) ).
cnf(c_1392,plain,
( ~ pred_attacker(tuple_client_A_in_8(X0))
| ~ pred_attacker(tuple_client_A_in_6(X1))
| ~ pred_attacker(tuple_client_A_in_2(X2))
| ~ pred_attacker(X3)
| pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X1,name_Kas))))) ),
inference(forward_subsumption_resolution,[status(thm)],[c_756,c_144,c_144,c_144]) ).
cnf(c_1876,plain,
( ~ pred_attacker(X0)
| pred_attacker(tuple_client_A_in_8(X0)) ),
inference(prop_impl_just,[status(thm)],[c_183]) ).
cnf(c_2229,plain,
( ~ pred_attacker(tuple_client_A_in_6(X0))
| ~ pred_attacker(tuple_client_A_in_2(X1))
| ~ pred_attacker(X2)
| ~ pred_attacker(X3)
| pred_attacker(tuple_client_A_out_9(name_objective1)) ),
inference(bin_hyper_res,[status(thm)],[c_1367,c_1876]) ).
cnf(c_2230,plain,
( ~ pred_attacker(tuple_client_A_in_6(X0))
| ~ pred_attacker(tuple_client_A_in_2(X1))
| ~ pred_attacker(X2)
| ~ pred_attacker(X3)
| pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas))))) ),
inference(bin_hyper_res,[status(thm)],[c_1392,c_1876]) ).
cnf(c_3243,plain,
( ~ pred_attacker(X0)
| ~ sP0_iProver_split ),
inference(splitting,[splitting(split),new_symbols(definition,[sP0_iProver_split])],[c_2230]) ).
cnf(c_3244,plain,
( ~ pred_attacker(tuple_client_A_in_2(X0))
| ~ sP1_iProver_split ),
inference(splitting,[splitting(split),new_symbols(definition,[sP1_iProver_split])],[c_2230]) ).
cnf(c_3245,plain,
( ~ pred_attacker(tuple_client_A_in_6(X0))
| pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))))
| ~ sP2_iProver_split ),
inference(splitting,[splitting(split),new_symbols(definition,[sP2_iProver_split])],[c_2230]) ).
cnf(c_3246,plain,
( sP0_iProver_split
| sP1_iProver_split
| sP2_iProver_split ),
inference(splitting,[splitting(split),new_symbols(definition,[])],[c_2230]) ).
cnf(c_3247,plain,
( ~ pred_attacker(tuple_client_A_in_6(X0))
| ~ sP3_iProver_split ),
inference(splitting,[splitting(split),new_symbols(definition,[sP3_iProver_split])],[c_2229]) ).
cnf(c_3248,plain,
( pred_attacker(tuple_client_A_out_9(name_objective1))
| sP0_iProver_split
| sP1_iProver_split
| sP3_iProver_split ),
inference(splitting,[splitting(split),new_symbols(definition,[])],[c_2229]) ).
cnf(c_5976,plain,
~ sP0_iProver_split,
inference(superposition,[status(thm)],[c_151,c_3243]) ).
cnf(c_5992,plain,
( sP1_iProver_split
| sP2_iProver_split ),
inference(backward_subsumption_resolution,[status(thm)],[c_3246,c_5976]) ).
cnf(c_6204,plain,
( ~ pred_attacker(X0)
| ~ sP1_iProver_split ),
inference(superposition,[status(thm)],[c_189,c_3244]) ).
cnf(c_6241,plain,
~ sP1_iProver_split,
inference(superposition,[status(thm)],[c_205,c_6204]) ).
cnf(c_6256,plain,
sP2_iProver_split,
inference(backward_subsumption_resolution,[status(thm)],[c_5992,c_6241]) ).
cnf(c_6279,plain,
( ~ pred_attacker(X0)
| ~ sP3_iProver_split ),
inference(superposition,[status(thm)],[c_185,c_3247]) ).
cnf(c_6316,plain,
~ sP3_iProver_split,
inference(superposition,[status(thm)],[c_205,c_6279]) ).
cnf(c_6331,plain,
pred_attacker(tuple_client_A_out_9(name_objective1)),
inference(global_subsumption_just,[status(thm)],[c_3248,c_3248,c_5976,c_6241,c_6316]) ).
cnf(c_6333,plain,
pred_attacker(name_objective1),
inference(superposition,[status(thm)],[c_6331,c_170]) ).
cnf(c_6443,plain,
( ~ pred_attacker(constr_enc(X0,X1))
| ~ pred_attacker(X1)
| pred_attacker(X0) ),
inference(superposition,[status(thm)],[c_137,c_162]) ).
cnf(c_6493,plain,
( ~ pred_attacker(name_objective1)
| ~ pred_attacker(name_objective2) ),
inference(superposition,[status(thm)],[c_219,c_237]) ).
cnf(c_6494,plain,
~ pred_attacker(name_objective2),
inference(forward_subsumption_resolution,[status(thm)],[c_6493,c_6333]) ).
cnf(c_6555,plain,
( ~ pred_attacker(constr_cbc_enc_4(X0,X1,X2,X3,X4))
| pred_attacker(constr_cbc_enc_2(X0,X1,X4)) ),
inference(superposition,[status(thm)],[c_132,c_200]) ).
cnf(c_6833,plain,
( pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))))
| ~ pred_attacker(tuple_client_A_in_6(X0)) ),
inference(global_subsumption_just,[status(thm)],[c_3245,c_3245,c_6256]) ).
cnf(c_6834,plain,
( ~ pred_attacker(tuple_client_A_in_6(X0))
| pred_attacker(tuple_client_A_out_10(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas))))) ),
inference(renaming,[status(thm)],[c_6833]) ).
cnf(c_6840,plain,
( ~ pred_attacker(tuple_client_A_in_6(X0))
| pred_attacker(constr_enc(name_objective2,constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))) ),
inference(superposition,[status(thm)],[c_6834,c_178]) ).
cnf(c_6853,plain,
( ~ pred_attacker(constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_6(X0))
| pred_attacker(name_objective2) ),
inference(superposition,[status(thm)],[c_6840,c_6443]) ).
cnf(c_6854,plain,
( ~ pred_attacker(constr_tuple_2_get_0x30_bitstring(constr_cbc_dec_2(X0,name_Kas)))
| ~ pred_attacker(tuple_client_A_in_6(X0)) ),
inference(forward_subsumption_resolution,[status(thm)],[c_6853,c_6494]) ).
cnf(c_6867,plain,
( ~ pred_attacker(tuple_client_A_in_6(constr_cbc_enc_2(X0,X1,name_Kas)))
| ~ pred_attacker(constr_tuple_2_get_0x30_bitstring(tuple_2(X0,X1))) ),
inference(superposition,[status(thm)],[c_129,c_6854]) ).
cnf(c_6870,plain,
( ~ pred_attacker(tuple_client_A_in_6(constr_cbc_enc_2(X0,X1,name_Kas)))
| ~ pred_attacker(X0) ),
inference(light_normalisation,[status(thm)],[c_6867,c_140]) ).
cnf(c_6892,plain,
( ~ pred_attacker(constr_cbc_enc_2(X0,X1,name_Kas))
| ~ pred_attacker(X0) ),
inference(superposition,[status(thm)],[c_185,c_6870]) ).
cnf(c_6918,plain,
( ~ pred_attacker(tuple_server_S_in_1(X0,X1,X2))
| pred_attacker(constr_cbc_enc_4(X2,X1,name_Kab_66(X3),constr_cbc_enc_2(name_Kab_66(X3),X0,name_Kbs),name_Kas)) ),
inference(superposition,[status(thm)],[c_236,c_155]) ).
cnf(c_7221,plain,
( ~ pred_attacker(tuple_server_S_in_1(X0,X1,X2))
| pred_attacker(constr_cbc_enc_2(X2,X1,name_Kas)) ),
inference(superposition,[status(thm)],[c_6918,c_6555]) ).
cnf(c_7263,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| ~ pred_attacker(X2)
| pred_attacker(constr_cbc_enc_2(X1,X0,name_Kas)) ),
inference(superposition,[status(thm)],[c_156,c_7221]) ).
cnf(c_7472,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1)
| ~ pred_attacker(X2) ),
inference(forward_subsumption_resolution,[status(thm)],[c_7263,c_6892]) ).
cnf(c_7478,plain,
( ~ pred_attacker(X0)
| ~ pred_attacker(X1) ),
inference(backward_subsumption_resolution,[status(thm)],[c_219,c_7472]) ).
cnf(c_7590,plain,
~ pred_attacker(X0),
inference(backward_subsumption_resolution,[status(thm)],[c_167,c_7478]) ).
cnf(c_7671,plain,
$false,
inference(backward_subsumption_resolution,[status(thm)],[c_151,c_7590]) ).
%------------------------------------------------------------------------------
%----ORIGINAL SYSTEM OUTPUT
% 0.00/0.12 % Problem : SWW968+1 : TPTP v8.1.2. Released v7.4.0.
% 0.00/0.13 % Command : run_iprover %s %d THM
% 0.13/0.34 % Computer : n022.cluster.edu
% 0.13/0.34 % Model : x86_64 x86_64
% 0.13/0.34 % CPU : Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz
% 0.13/0.34 % Memory : 8042.1875MB
% 0.13/0.34 % OS : Linux 3.10.0-693.el7.x86_64
% 0.13/0.34 % CPULimit : 300
% 0.13/0.34 % WCLimit : 300
% 0.13/0.34 % DateTime : Sun Aug 27 22:57:24 EDT 2023
% 0.13/0.34 % CPUTime :
% 0.19/0.46 Running first-order theorem proving
% 0.19/0.46 Running: /export/starexec/sandbox2/solver/bin/run_problem --schedule fof_schedule --no_cores 8 /export/starexec/sandbox2/benchmark/theBenchmark.p 300
% 3.81/1.15 % SZS status Started for theBenchmark.p
% 3.81/1.15 % SZS status Theorem for theBenchmark.p
% 3.81/1.15
% 3.81/1.15 %---------------- iProver v3.8 (pre SMT-COMP 2023/CASC 2023) ----------------%
% 3.81/1.15
% 3.81/1.15 ------ iProver source info
% 3.81/1.15
% 3.81/1.15 git: date: 2023-05-31 18:12:56 +0000
% 3.81/1.15 git: sha1: 8abddc1f627fd3ce0bcb8b4cbf113b3cc443d7b6
% 3.81/1.15 git: non_committed_changes: false
% 3.81/1.15 git: last_make_outside_of_git: false
% 3.81/1.15
% 3.81/1.15 ------ Parsing...
% 3.81/1.15 ------ Clausification by vclausify_rel & Parsing by iProver...
% 3.81/1.15
% 3.81/1.15 ------ Preprocessing... sup_sim: 0 sf_s rm: 2 0s sf_e pe_s pe:1:0s pe_e sup_sim: 0 sf_s rm: 1 0s sf_e pe_s pe_e
% 3.81/1.15
% 3.81/1.15 ------ Preprocessing... gs_s sp: 8 0s gs_e snvd_s sp: 0 0s snvd_e
% 3.81/1.15
% 3.81/1.15 ------ Preprocessing... sf_s rm: 2 0s sf_e sf_s rm: 0 0s sf_e
% 3.81/1.15 ------ Proving...
% 3.81/1.15 ------ Problem Properties
% 3.81/1.15
% 3.81/1.15
% 3.81/1.15 clauses 190
% 3.81/1.15 conjectures 1
% 3.81/1.15 EPR 91
% 3.81/1.15 Horn 188
% 3.81/1.15 unary 109
% 3.81/1.15 binary 61
% 3.81/1.15 lits 304
% 3.81/1.15 lits eq 95
% 3.81/1.15 fd_pure 0
% 3.81/1.15 fd_pseudo 0
% 3.81/1.15 fd_cond 0
% 3.81/1.15 fd_pseudo_cond 0
% 3.81/1.15 AC symbols 0
% 3.81/1.15
% 3.81/1.15 ------ Schedule dynamic 5 is on
% 3.81/1.15
% 3.81/1.15 ------ Input Options "--resolution_flag false --inst_lit_sel_side none" Time Limit: 10.
% 3.81/1.15
% 3.81/1.15
% 3.81/1.15 ------
% 3.81/1.15 Current options:
% 3.81/1.15 ------
% 3.81/1.15
% 3.81/1.15
% 3.81/1.15
% 3.81/1.15
% 3.81/1.15 ------ Proving...
% 3.81/1.15
% 3.81/1.15
% 3.81/1.15 % SZS status Theorem for theBenchmark.p
% 3.81/1.15
% 3.81/1.15 % SZS output start CNFRefutation for theBenchmark.p
% See solution above
% 3.81/1.15
% 3.81/1.15
%------------------------------------------------------------------------------