2.56/1.70 WORST_CASE(?, O(n^1)) 2.56/1.71 proof of /export/starexec/sandbox/output/output_files/bench.koat 2.56/1.71 # AProVE Commit ID: 48fb2092695e11cc9f56e44b17a92a5f88ffb256 marcel 20180622 unpublished dirty 2.56/1.71 2.56/1.71 2.56/1.71 The runtime complexity of the given CpxIntTrs could be proven to be BOUNDS(1, n^1). 2.56/1.71 2.56/1.71 (0) CpxIntTrs 2.56/1.71 (1) Koat Proof [FINISHED, 487 ms] 2.56/1.71 (2) BOUNDS(1, n^1) 2.56/1.71 2.56/1.71 2.56/1.71 ---------------------------------------- 2.56/1.71 2.56/1.71 (0) 2.56/1.71 Obligation: 2.56/1.71 Complexity Int TRS consisting of the following rules: 2.56/1.71 eval_cryptRandWriteFile_start(v_.0, v_.0., v_bytes, v_i.0) -> Com_1(eval_cryptRandWriteFile_bb0_in(v_.0, v_.0., v_bytes, v_i.0)) :|: TRUE 2.56/1.71 eval_cryptRandWriteFile_bb0_in(v_.0, v_.0., v_bytes, v_i.0) -> Com_1(eval_cryptRandWriteFile_bb1_in(v_bytes, v_.0., v_bytes, v_i.0)) :|: TRUE 2.56/1.71 eval_cryptRandWriteFile_bb1_in(v_.0, v_.0., v_bytes, v_i.0) -> Com_1(eval_cryptRandWriteFile_bb2_in(v_.0, v_.0., v_bytes, v_i.0)) :|: v_.0 > 0 2.56/1.71 eval_cryptRandWriteFile_bb1_in(v_.0, v_.0., v_bytes, v_i.0) -> Com_1(eval_cryptRandWriteFile_bb6_in(v_.0, v_.0., v_bytes, v_i.0)) :|: v_.0 <= 0 2.56/1.71 eval_cryptRandWriteFile_bb2_in(v_.0, v_.0., v_bytes, v_i.0) -> Com_1(eval_cryptRandWriteFile_bb3_in(v_.0, v_.0, v_bytes, 0)) :|: v_.0 < 256 2.56/1.71 eval_cryptRandWriteFile_bb2_in(v_.0, v_.0., v_bytes, v_i.0) -> Com_1(eval_cryptRandWriteFile_bb3_in(v_.0, 256, v_bytes, 0)) :|: v_.0 >= 256 2.56/1.71 eval_cryptRandWriteFile_bb3_in(v_.0, v_.0., v_bytes, v_i.0) -> Com_1(eval_cryptRandWriteFile_bb4_in(v_.0, v_.0., v_bytes, v_i.0)) :|: v_i.0 < v_.0. 2.56/1.71 eval_cryptRandWriteFile_bb3_in(v_.0, v_.0., v_bytes, v_i.0) -> Com_1(eval_cryptRandWriteFile_bb5_in(v_.0, v_.0., v_bytes, v_i.0)) :|: v_i.0 >= v_.0. 2.56/1.71 eval_cryptRandWriteFile_bb4_in(v_.0, v_.0., v_bytes, v_i.0) -> Com_1(eval_cryptRandWriteFile_bb3_in(v_.0, v_.0., v_bytes, v_i.0 + 1)) :|: TRUE 2.56/1.71 eval_cryptRandWriteFile_bb5_in(v_.0, v_.0., v_bytes, v_i.0) -> Com_1(eval_cryptRandWriteFile_bb1_in(v_.0 - v_.0., v_.0., v_bytes, v_i.0)) :|: TRUE 2.56/1.71 eval_cryptRandWriteFile_bb6_in(v_.0, v_.0., v_bytes, v_i.0) -> Com_1(eval_cryptRandWriteFile_stop(v_.0, v_.0., v_bytes, v_i.0)) :|: TRUE 2.56/1.71 2.56/1.71 The start-symbols are:[eval_cryptRandWriteFile_start_4] 2.56/1.71 2.56/1.71 2.56/1.71 ---------------------------------------- 2.56/1.71 2.56/1.71 (1) Koat Proof (FINISHED) 2.56/1.71 YES(?, 8212*ar_1 + 6) 2.56/1.71 2.56/1.71 2.56/1.71 2.56/1.71 Initial complexity problem: 2.56/1.71 2.56/1.71 1: T: 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilestart(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb0in(ar_0, ar_1, ar_2, ar_3)) 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb0in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb1in(ar_1, ar_1, ar_2, ar_3)) 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb1in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3)) [ ar_0 >= 1 ] 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb1in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb6in(ar_0, ar_1, ar_2, ar_3)) [ 0 >= ar_0 ] 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_0, 0)) [ 255 >= ar_0 ] 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, 256, 0)) [ ar_0 >= 256 ] 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb4in(ar_0, ar_1, ar_2, ar_3)) [ ar_2 >= ar_3 + 1 ] 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb5in(ar_0, ar_1, ar_2, ar_3)) [ ar_3 >= ar_2 ] 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb4in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3 + 1)) 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb5in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb1in(ar_0 - ar_2, ar_1, ar_2, ar_3)) 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb6in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilestop(ar_0, ar_1, ar_2, ar_3)) 2.56/1.71 2.56/1.71 (Comp: 1, Cost: 0) koat_start(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilestart(ar_0, ar_1, ar_2, ar_3)) [ 0 <= 0 ] 2.56/1.71 2.56/1.71 start location: koat_start 2.56/1.71 2.56/1.71 leaf cost: 0 2.56/1.71 2.56/1.71 2.56/1.71 2.56/1.71 Repeatedly propagating knowledge in problem 1 produces the following problem: 2.56/1.71 2.56/1.71 2: T: 2.56/1.71 2.56/1.71 (Comp: 1, Cost: 1) evalcryptRandWriteFilestart(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb0in(ar_0, ar_1, ar_2, ar_3)) 2.56/1.71 2.56/1.71 (Comp: 1, Cost: 1) evalcryptRandWriteFilebb0in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb1in(ar_1, ar_1, ar_2, ar_3)) 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb1in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3)) [ ar_0 >= 1 ] 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb1in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb6in(ar_0, ar_1, ar_2, ar_3)) [ 0 >= ar_0 ] 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_0, 0)) [ 255 >= ar_0 ] 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, 256, 0)) [ ar_0 >= 256 ] 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb4in(ar_0, ar_1, ar_2, ar_3)) [ ar_2 >= ar_3 + 1 ] 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb5in(ar_0, ar_1, ar_2, ar_3)) [ ar_3 >= ar_2 ] 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb4in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3 + 1)) 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb5in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb1in(ar_0 - ar_2, ar_1, ar_2, ar_3)) 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb6in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilestop(ar_0, ar_1, ar_2, ar_3)) 2.56/1.71 2.56/1.71 (Comp: 1, Cost: 0) koat_start(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilestart(ar_0, ar_1, ar_2, ar_3)) [ 0 <= 0 ] 2.56/1.71 2.56/1.71 start location: koat_start 2.56/1.71 2.56/1.71 leaf cost: 0 2.56/1.71 2.56/1.71 2.56/1.71 2.56/1.71 A polynomial rank function with 2.56/1.71 2.56/1.71 Pol(evalcryptRandWriteFilestart) = 2 2.56/1.71 2.56/1.71 Pol(evalcryptRandWriteFilebb0in) = 2 2.56/1.71 2.56/1.71 Pol(evalcryptRandWriteFilebb1in) = 2 2.56/1.71 2.56/1.71 Pol(evalcryptRandWriteFilebb2in) = 2 2.56/1.71 2.56/1.71 Pol(evalcryptRandWriteFilebb6in) = 1 2.56/1.71 2.56/1.71 Pol(evalcryptRandWriteFilebb3in) = 2 2.56/1.71 2.56/1.71 Pol(evalcryptRandWriteFilebb4in) = 2 2.56/1.71 2.56/1.71 Pol(evalcryptRandWriteFilebb5in) = 2 2.56/1.71 2.56/1.71 Pol(evalcryptRandWriteFilestop) = 0 2.56/1.71 2.56/1.71 Pol(koat_start) = 2 2.56/1.71 2.56/1.71 orients all transitions weakly and the transitions 2.56/1.71 2.56/1.71 evalcryptRandWriteFilebb6in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilestop(ar_0, ar_1, ar_2, ar_3)) 2.56/1.71 2.56/1.71 evalcryptRandWriteFilebb1in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb6in(ar_0, ar_1, ar_2, ar_3)) [ 0 >= ar_0 ] 2.56/1.71 2.56/1.71 strictly and produces the following problem: 2.56/1.71 2.56/1.71 3: T: 2.56/1.71 2.56/1.71 (Comp: 1, Cost: 1) evalcryptRandWriteFilestart(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb0in(ar_0, ar_1, ar_2, ar_3)) 2.56/1.71 2.56/1.71 (Comp: 1, Cost: 1) evalcryptRandWriteFilebb0in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb1in(ar_1, ar_1, ar_2, ar_3)) 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb1in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3)) [ ar_0 >= 1 ] 2.56/1.71 2.56/1.71 (Comp: 2, Cost: 1) evalcryptRandWriteFilebb1in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb6in(ar_0, ar_1, ar_2, ar_3)) [ 0 >= ar_0 ] 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_0, 0)) [ 255 >= ar_0 ] 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, 256, 0)) [ ar_0 >= 256 ] 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb4in(ar_0, ar_1, ar_2, ar_3)) [ ar_2 >= ar_3 + 1 ] 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb5in(ar_0, ar_1, ar_2, ar_3)) [ ar_3 >= ar_2 ] 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb4in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3 + 1)) 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb5in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb1in(ar_0 - ar_2, ar_1, ar_2, ar_3)) 2.56/1.71 2.56/1.71 (Comp: 2, Cost: 1) evalcryptRandWriteFilebb6in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilestop(ar_0, ar_1, ar_2, ar_3)) 2.56/1.71 2.56/1.71 (Comp: 1, Cost: 0) koat_start(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilestart(ar_0, ar_1, ar_2, ar_3)) [ 0 <= 0 ] 2.56/1.71 2.56/1.71 start location: koat_start 2.56/1.71 2.56/1.71 leaf cost: 0 2.56/1.71 2.56/1.71 2.56/1.71 2.56/1.71 Applied AI with 'oct' on problem 3 to obtain the following invariants: 2.56/1.71 2.56/1.71 For symbol evalcryptRandWriteFilebb1in: -X_1 + X_2 >= 0 2.56/1.71 2.56/1.71 For symbol evalcryptRandWriteFilebb2in: X_2 - 1 >= 0 /\ X_1 + X_2 - 2 >= 0 /\ -X_1 + X_2 >= 0 /\ X_1 - 1 >= 0 2.56/1.71 2.56/1.71 For symbol evalcryptRandWriteFilebb3in: X_4 >= 0 /\ X_3 + X_4 - 1 >= 0 /\ -X_3 + X_4 + 256 >= 0 /\ X_2 + X_4 - 1 >= 0 /\ X_1 + X_4 - 1 >= 0 /\ -X_3 + 256 >= 0 /\ X_2 - X_3 >= 0 /\ X_1 - X_3 >= 0 /\ X_3 - 1 >= 0 /\ X_2 + X_3 - 2 >= 0 /\ X_1 + X_3 - 2 >= 0 /\ X_2 - 1 >= 0 /\ X_1 + X_2 - 2 >= 0 /\ -X_1 + X_2 >= 0 /\ X_1 - 1 >= 0 2.56/1.71 2.56/1.71 For symbol evalcryptRandWriteFilebb4in: -X_4 + 255 >= 0 /\ X_3 - X_4 - 1 >= 0 /\ -X_3 - X_4 + 511 >= 0 /\ X_2 - X_4 - 1 >= 0 /\ X_1 - X_4 - 1 >= 0 /\ X_4 >= 0 /\ X_3 + X_4 - 1 >= 0 /\ -X_3 + X_4 + 256 >= 0 /\ X_2 + X_4 - 1 >= 0 /\ X_1 + X_4 - 1 >= 0 /\ -X_3 + 256 >= 0 /\ X_2 - X_3 >= 0 /\ X_1 - X_3 >= 0 /\ X_3 - 1 >= 0 /\ X_2 + X_3 - 2 >= 0 /\ X_1 + X_3 - 2 >= 0 /\ X_2 - 1 >= 0 /\ X_1 + X_2 - 2 >= 0 /\ -X_1 + X_2 >= 0 /\ X_1 - 1 >= 0 2.56/1.71 2.56/1.71 For symbol evalcryptRandWriteFilebb5in: X_4 - 1 >= 0 /\ X_3 + X_4 - 2 >= 0 /\ -X_3 + X_4 >= 0 /\ X_2 + X_4 - 2 >= 0 /\ X_1 + X_4 - 2 >= 0 /\ -X_3 + 256 >= 0 /\ X_2 - X_3 >= 0 /\ X_1 - X_3 >= 0 /\ X_3 - 1 >= 0 /\ X_2 + X_3 - 2 >= 0 /\ X_1 + X_3 - 2 >= 0 /\ X_2 - 1 >= 0 /\ X_1 + X_2 - 2 >= 0 /\ -X_1 + X_2 >= 0 /\ X_1 - 1 >= 0 2.56/1.71 2.56/1.71 For symbol evalcryptRandWriteFilebb6in: -X_1 + X_2 >= 0 /\ -X_1 >= 0 2.56/1.71 2.56/1.71 2.56/1.71 2.56/1.71 2.56/1.71 2.56/1.71 This yielded the following problem: 2.56/1.71 2.56/1.71 4: T: 2.56/1.71 2.56/1.71 (Comp: 1, Cost: 0) koat_start(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilestart(ar_0, ar_1, ar_2, ar_3)) [ 0 <= 0 ] 2.56/1.71 2.56/1.71 (Comp: 2, Cost: 1) evalcryptRandWriteFilebb6in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilestop(ar_0, ar_1, ar_2, ar_3)) [ -ar_0 + ar_1 >= 0 /\ -ar_0 >= 0 ] 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb5in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb1in(ar_0 - ar_2, ar_1, ar_2, ar_3)) [ ar_3 - 1 >= 0 /\ ar_2 + ar_3 - 2 >= 0 /\ -ar_2 + ar_3 >= 0 /\ ar_1 + ar_3 - 2 >= 0 /\ ar_0 + ar_3 - 2 >= 0 /\ -ar_2 + 256 >= 0 /\ ar_1 - ar_2 >= 0 /\ ar_0 - ar_2 >= 0 /\ ar_2 - 1 >= 0 /\ ar_1 + ar_2 - 2 >= 0 /\ ar_0 + ar_2 - 2 >= 0 /\ ar_1 - 1 >= 0 /\ ar_0 + ar_1 - 2 >= 0 /\ -ar_0 + ar_1 >= 0 /\ ar_0 - 1 >= 0 ] 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb4in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3 + 1)) [ -ar_3 + 255 >= 0 /\ ar_2 - ar_3 - 1 >= 0 /\ -ar_2 - ar_3 + 511 >= 0 /\ ar_1 - ar_3 - 1 >= 0 /\ ar_0 - ar_3 - 1 >= 0 /\ ar_3 >= 0 /\ ar_2 + ar_3 - 1 >= 0 /\ -ar_2 + ar_3 + 256 >= 0 /\ ar_1 + ar_3 - 1 >= 0 /\ ar_0 + ar_3 - 1 >= 0 /\ -ar_2 + 256 >= 0 /\ ar_1 - ar_2 >= 0 /\ ar_0 - ar_2 >= 0 /\ ar_2 - 1 >= 0 /\ ar_1 + ar_2 - 2 >= 0 /\ ar_0 + ar_2 - 2 >= 0 /\ ar_1 - 1 >= 0 /\ ar_0 + ar_1 - 2 >= 0 /\ -ar_0 + ar_1 >= 0 /\ ar_0 - 1 >= 0 ] 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb5in(ar_0, ar_1, ar_2, ar_3)) [ ar_3 >= 0 /\ ar_2 + ar_3 - 1 >= 0 /\ -ar_2 + ar_3 + 256 >= 0 /\ ar_1 + ar_3 - 1 >= 0 /\ ar_0 + ar_3 - 1 >= 0 /\ -ar_2 + 256 >= 0 /\ ar_1 - ar_2 >= 0 /\ ar_0 - ar_2 >= 0 /\ ar_2 - 1 >= 0 /\ ar_1 + ar_2 - 2 >= 0 /\ ar_0 + ar_2 - 2 >= 0 /\ ar_1 - 1 >= 0 /\ ar_0 + ar_1 - 2 >= 0 /\ -ar_0 + ar_1 >= 0 /\ ar_0 - 1 >= 0 /\ ar_3 >= ar_2 ] 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb4in(ar_0, ar_1, ar_2, ar_3)) [ ar_3 >= 0 /\ ar_2 + ar_3 - 1 >= 0 /\ -ar_2 + ar_3 + 256 >= 0 /\ ar_1 + ar_3 - 1 >= 0 /\ ar_0 + ar_3 - 1 >= 0 /\ -ar_2 + 256 >= 0 /\ ar_1 - ar_2 >= 0 /\ ar_0 - ar_2 >= 0 /\ ar_2 - 1 >= 0 /\ ar_1 + ar_2 - 2 >= 0 /\ ar_0 + ar_2 - 2 >= 0 /\ ar_1 - 1 >= 0 /\ ar_0 + ar_1 - 2 >= 0 /\ -ar_0 + ar_1 >= 0 /\ ar_0 - 1 >= 0 /\ ar_2 >= ar_3 + 1 ] 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, 256, 0)) [ ar_1 - 1 >= 0 /\ ar_0 + ar_1 - 2 >= 0 /\ -ar_0 + ar_1 >= 0 /\ ar_0 - 1 >= 0 /\ ar_0 >= 256 ] 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_0, 0)) [ ar_1 - 1 >= 0 /\ ar_0 + ar_1 - 2 >= 0 /\ -ar_0 + ar_1 >= 0 /\ ar_0 - 1 >= 0 /\ 255 >= ar_0 ] 2.56/1.71 2.56/1.71 (Comp: 2, Cost: 1) evalcryptRandWriteFilebb1in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb6in(ar_0, ar_1, ar_2, ar_3)) [ -ar_0 + ar_1 >= 0 /\ 0 >= ar_0 ] 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb1in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3)) [ -ar_0 + ar_1 >= 0 /\ ar_0 >= 1 ] 2.56/1.71 2.56/1.71 (Comp: 1, Cost: 1) evalcryptRandWriteFilebb0in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb1in(ar_1, ar_1, ar_2, ar_3)) 2.56/1.71 2.56/1.71 (Comp: 1, Cost: 1) evalcryptRandWriteFilestart(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb0in(ar_0, ar_1, ar_2, ar_3)) 2.56/1.71 2.56/1.71 start location: koat_start 2.56/1.71 2.56/1.71 leaf cost: 0 2.56/1.71 2.56/1.71 2.56/1.71 2.56/1.71 A polynomial rank function with 2.56/1.71 2.56/1.71 Pol(koat_start) = 4*V_2 2.56/1.71 2.56/1.71 Pol(evalcryptRandWriteFilestart) = 4*V_2 2.56/1.71 2.56/1.71 Pol(evalcryptRandWriteFilebb6in) = 4*V_1 2.56/1.71 2.56/1.71 Pol(evalcryptRandWriteFilestop) = 4*V_1 2.56/1.71 2.56/1.71 Pol(evalcryptRandWriteFilebb5in) = 4*V_1 - 3 2.56/1.71 2.56/1.71 Pol(evalcryptRandWriteFilebb1in) = 4*V_1 2.56/1.71 2.56/1.71 Pol(evalcryptRandWriteFilebb4in) = 4*V_1 - 2 2.56/1.71 2.56/1.71 Pol(evalcryptRandWriteFilebb3in) = 4*V_1 - 2 2.56/1.71 2.56/1.71 Pol(evalcryptRandWriteFilebb2in) = 4*V_1 - 1 2.56/1.71 2.56/1.71 Pol(evalcryptRandWriteFilebb0in) = 4*V_2 2.56/1.71 2.56/1.71 orients all transitions weakly and the transitions 2.56/1.71 2.56/1.71 evalcryptRandWriteFilebb5in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb1in(ar_0 - ar_2, ar_1, ar_2, ar_3)) [ ar_3 - 1 >= 0 /\ ar_2 + ar_3 - 2 >= 0 /\ -ar_2 + ar_3 >= 0 /\ ar_1 + ar_3 - 2 >= 0 /\ ar_0 + ar_3 - 2 >= 0 /\ -ar_2 + 256 >= 0 /\ ar_1 - ar_2 >= 0 /\ ar_0 - ar_2 >= 0 /\ ar_2 - 1 >= 0 /\ ar_1 + ar_2 - 2 >= 0 /\ ar_0 + ar_2 - 2 >= 0 /\ ar_1 - 1 >= 0 /\ ar_0 + ar_1 - 2 >= 0 /\ -ar_0 + ar_1 >= 0 /\ ar_0 - 1 >= 0 ] 2.56/1.71 2.56/1.71 evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb5in(ar_0, ar_1, ar_2, ar_3)) [ ar_3 >= 0 /\ ar_2 + ar_3 - 1 >= 0 /\ -ar_2 + ar_3 + 256 >= 0 /\ ar_1 + ar_3 - 1 >= 0 /\ ar_0 + ar_3 - 1 >= 0 /\ -ar_2 + 256 >= 0 /\ ar_1 - ar_2 >= 0 /\ ar_0 - ar_2 >= 0 /\ ar_2 - 1 >= 0 /\ ar_1 + ar_2 - 2 >= 0 /\ ar_0 + ar_2 - 2 >= 0 /\ ar_1 - 1 >= 0 /\ ar_0 + ar_1 - 2 >= 0 /\ -ar_0 + ar_1 >= 0 /\ ar_0 - 1 >= 0 /\ ar_3 >= ar_2 ] 2.56/1.71 2.56/1.71 evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, 256, 0)) [ ar_1 - 1 >= 0 /\ ar_0 + ar_1 - 2 >= 0 /\ -ar_0 + ar_1 >= 0 /\ ar_0 - 1 >= 0 /\ ar_0 >= 256 ] 2.56/1.71 2.56/1.71 evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_0, 0)) [ ar_1 - 1 >= 0 /\ ar_0 + ar_1 - 2 >= 0 /\ -ar_0 + ar_1 >= 0 /\ ar_0 - 1 >= 0 /\ 255 >= ar_0 ] 2.56/1.71 2.56/1.71 evalcryptRandWriteFilebb1in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3)) [ -ar_0 + ar_1 >= 0 /\ ar_0 >= 1 ] 2.56/1.71 2.56/1.71 strictly and produces the following problem: 2.56/1.71 2.56/1.71 5: T: 2.56/1.71 2.56/1.71 (Comp: 1, Cost: 0) koat_start(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilestart(ar_0, ar_1, ar_2, ar_3)) [ 0 <= 0 ] 2.56/1.71 2.56/1.71 (Comp: 2, Cost: 1) evalcryptRandWriteFilebb6in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilestop(ar_0, ar_1, ar_2, ar_3)) [ -ar_0 + ar_1 >= 0 /\ -ar_0 >= 0 ] 2.56/1.71 2.56/1.71 (Comp: 4*ar_1, Cost: 1) evalcryptRandWriteFilebb5in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb1in(ar_0 - ar_2, ar_1, ar_2, ar_3)) [ ar_3 - 1 >= 0 /\ ar_2 + ar_3 - 2 >= 0 /\ -ar_2 + ar_3 >= 0 /\ ar_1 + ar_3 - 2 >= 0 /\ ar_0 + ar_3 - 2 >= 0 /\ -ar_2 + 256 >= 0 /\ ar_1 - ar_2 >= 0 /\ ar_0 - ar_2 >= 0 /\ ar_2 - 1 >= 0 /\ ar_1 + ar_2 - 2 >= 0 /\ ar_0 + ar_2 - 2 >= 0 /\ ar_1 - 1 >= 0 /\ ar_0 + ar_1 - 2 >= 0 /\ -ar_0 + ar_1 >= 0 /\ ar_0 - 1 >= 0 ] 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb4in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3 + 1)) [ -ar_3 + 255 >= 0 /\ ar_2 - ar_3 - 1 >= 0 /\ -ar_2 - ar_3 + 511 >= 0 /\ ar_1 - ar_3 - 1 >= 0 /\ ar_0 - ar_3 - 1 >= 0 /\ ar_3 >= 0 /\ ar_2 + ar_3 - 1 >= 0 /\ -ar_2 + ar_3 + 256 >= 0 /\ ar_1 + ar_3 - 1 >= 0 /\ ar_0 + ar_3 - 1 >= 0 /\ -ar_2 + 256 >= 0 /\ ar_1 - ar_2 >= 0 /\ ar_0 - ar_2 >= 0 /\ ar_2 - 1 >= 0 /\ ar_1 + ar_2 - 2 >= 0 /\ ar_0 + ar_2 - 2 >= 0 /\ ar_1 - 1 >= 0 /\ ar_0 + ar_1 - 2 >= 0 /\ -ar_0 + ar_1 >= 0 /\ ar_0 - 1 >= 0 ] 2.56/1.71 2.56/1.71 (Comp: 4*ar_1, Cost: 1) evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb5in(ar_0, ar_1, ar_2, ar_3)) [ ar_3 >= 0 /\ ar_2 + ar_3 - 1 >= 0 /\ -ar_2 + ar_3 + 256 >= 0 /\ ar_1 + ar_3 - 1 >= 0 /\ ar_0 + ar_3 - 1 >= 0 /\ -ar_2 + 256 >= 0 /\ ar_1 - ar_2 >= 0 /\ ar_0 - ar_2 >= 0 /\ ar_2 - 1 >= 0 /\ ar_1 + ar_2 - 2 >= 0 /\ ar_0 + ar_2 - 2 >= 0 /\ ar_1 - 1 >= 0 /\ ar_0 + ar_1 - 2 >= 0 /\ -ar_0 + ar_1 >= 0 /\ ar_0 - 1 >= 0 /\ ar_3 >= ar_2 ] 2.56/1.71 2.56/1.71 (Comp: ?, Cost: 1) evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb4in(ar_0, ar_1, ar_2, ar_3)) [ ar_3 >= 0 /\ ar_2 + ar_3 - 1 >= 0 /\ -ar_2 + ar_3 + 256 >= 0 /\ ar_1 + ar_3 - 1 >= 0 /\ ar_0 + ar_3 - 1 >= 0 /\ -ar_2 + 256 >= 0 /\ ar_1 - ar_2 >= 0 /\ ar_0 - ar_2 >= 0 /\ ar_2 - 1 >= 0 /\ ar_1 + ar_2 - 2 >= 0 /\ ar_0 + ar_2 - 2 >= 0 /\ ar_1 - 1 >= 0 /\ ar_0 + ar_1 - 2 >= 0 /\ -ar_0 + ar_1 >= 0 /\ ar_0 - 1 >= 0 /\ ar_2 >= ar_3 + 1 ] 2.56/1.71 2.56/1.71 (Comp: 4*ar_1, Cost: 1) evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, 256, 0)) [ ar_1 - 1 >= 0 /\ ar_0 + ar_1 - 2 >= 0 /\ -ar_0 + ar_1 >= 0 /\ ar_0 - 1 >= 0 /\ ar_0 >= 256 ] 2.56/1.71 2.56/1.71 (Comp: 4*ar_1, Cost: 1) evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_0, 0)) [ ar_1 - 1 >= 0 /\ ar_0 + ar_1 - 2 >= 0 /\ -ar_0 + ar_1 >= 0 /\ ar_0 - 1 >= 0 /\ 255 >= ar_0 ] 2.56/1.71 2.56/1.71 (Comp: 2, Cost: 1) evalcryptRandWriteFilebb1in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb6in(ar_0, ar_1, ar_2, ar_3)) [ -ar_0 + ar_1 >= 0 /\ 0 >= ar_0 ] 2.56/1.71 2.56/1.71 (Comp: 4*ar_1, Cost: 1) evalcryptRandWriteFilebb1in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3)) [ -ar_0 + ar_1 >= 0 /\ ar_0 >= 1 ] 2.56/1.71 2.56/1.71 (Comp: 1, Cost: 1) evalcryptRandWriteFilebb0in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb1in(ar_1, ar_1, ar_2, ar_3)) 2.56/1.71 2.56/1.71 (Comp: 1, Cost: 1) evalcryptRandWriteFilestart(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb0in(ar_0, ar_1, ar_2, ar_3)) 2.56/1.71 2.56/1.71 start location: koat_start 2.56/1.71 2.56/1.71 leaf cost: 0 2.56/1.71 2.56/1.71 2.56/1.71 2.56/1.71 A polynomial rank function with 2.56/1.71 2.56/1.71 Pol(evalcryptRandWriteFilebb4in) = -2*V_4 + 511 2.56/1.71 2.56/1.71 Pol(evalcryptRandWriteFilebb3in) = -2*V_4 + 512 2.56/1.71 2.56/1.71 and size complexities 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilestart(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb0in(ar_0, ar_1, ar_2, ar_3))", 0-0) = ar_0 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilestart(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb0in(ar_0, ar_1, ar_2, ar_3))", 0-1) = ar_1 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilestart(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb0in(ar_0, ar_1, ar_2, ar_3))", 0-2) = ar_2 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilestart(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb0in(ar_0, ar_1, ar_2, ar_3))", 0-3) = ar_3 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb0in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb1in(ar_1, ar_1, ar_2, ar_3))", 0-0) = ar_1 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb0in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb1in(ar_1, ar_1, ar_2, ar_3))", 0-1) = ar_1 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb0in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb1in(ar_1, ar_1, ar_2, ar_3))", 0-2) = ar_2 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb0in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb1in(ar_1, ar_1, ar_2, ar_3))", 0-3) = ar_3 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb1in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3)) [ -ar_0 + ar_1 >= 0 /\\ ar_0 >= 1 ]", 0-0) = ar_1 + 255 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb1in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3)) [ -ar_0 + ar_1 >= 0 /\\ ar_0 >= 1 ]", 0-1) = ar_1 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb1in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3)) [ -ar_0 + ar_1 >= 0 /\\ ar_0 >= 1 ]", 0-2) = ar_2 + 256 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb1in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3)) [ -ar_0 + ar_1 >= 0 /\\ ar_0 >= 1 ]", 0-3) = ar_3 + 256 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb1in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb6in(ar_0, ar_1, ar_2, ar_3)) [ -ar_0 + ar_1 >= 0 /\\ 0 >= ar_0 ]", 0-0) = ar_1 + 255 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb1in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb6in(ar_0, ar_1, ar_2, ar_3)) [ -ar_0 + ar_1 >= 0 /\\ 0 >= ar_0 ]", 0-1) = ar_1 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb1in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb6in(ar_0, ar_1, ar_2, ar_3)) [ -ar_0 + ar_1 >= 0 /\\ 0 >= ar_0 ]", 0-2) = ar_2 + 256 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb1in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb6in(ar_0, ar_1, ar_2, ar_3)) [ -ar_0 + ar_1 >= 0 /\\ 0 >= ar_0 ]", 0-3) = ar_3 + 256 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_0, 0)) [ ar_1 - 1 >= 0 /\\ ar_0 + ar_1 - 2 >= 0 /\\ -ar_0 + ar_1 >= 0 /\\ ar_0 - 1 >= 0 /\\ 255 >= ar_0 ]", 0-0) = 255 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_0, 0)) [ ar_1 - 1 >= 0 /\\ ar_0 + ar_1 - 2 >= 0 /\\ -ar_0 + ar_1 >= 0 /\\ ar_0 - 1 >= 0 /\\ 255 >= ar_0 ]", 0-1) = ar_1 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_0, 0)) [ ar_1 - 1 >= 0 /\\ ar_0 + ar_1 - 2 >= 0 /\\ -ar_0 + ar_1 >= 0 /\\ ar_0 - 1 >= 0 /\\ 255 >= ar_0 ]", 0-2) = 255 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_0, 0)) [ ar_1 - 1 >= 0 /\\ ar_0 + ar_1 - 2 >= 0 /\\ -ar_0 + ar_1 >= 0 /\\ ar_0 - 1 >= 0 /\\ 255 >= ar_0 ]", 0-3) = 0 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, 256, 0)) [ ar_1 - 1 >= 0 /\\ ar_0 + ar_1 - 2 >= 0 /\\ -ar_0 + ar_1 >= 0 /\\ ar_0 - 1 >= 0 /\\ ar_0 >= 256 ]", 0-0) = ar_1 + 255 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, 256, 0)) [ ar_1 - 1 >= 0 /\\ ar_0 + ar_1 - 2 >= 0 /\\ -ar_0 + ar_1 >= 0 /\\ ar_0 - 1 >= 0 /\\ ar_0 >= 256 ]", 0-1) = ar_1 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, 256, 0)) [ ar_1 - 1 >= 0 /\\ ar_0 + ar_1 - 2 >= 0 /\\ -ar_0 + ar_1 >= 0 /\\ ar_0 - 1 >= 0 /\\ ar_0 >= 256 ]", 0-2) = 256 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, 256, 0)) [ ar_1 - 1 >= 0 /\\ ar_0 + ar_1 - 2 >= 0 /\\ -ar_0 + ar_1 >= 0 /\\ ar_0 - 1 >= 0 /\\ ar_0 >= 256 ]", 0-3) = 0 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb4in(ar_0, ar_1, ar_2, ar_3)) [ ar_3 >= 0 /\\ ar_2 + ar_3 - 1 >= 0 /\\ -ar_2 + ar_3 + 256 >= 0 /\\ ar_1 + ar_3 - 1 >= 0 /\\ ar_0 + ar_3 - 1 >= 0 /\\ -ar_2 + 256 >= 0 /\\ ar_1 - ar_2 >= 0 /\\ ar_0 - ar_2 >= 0 /\\ ar_2 - 1 >= 0 /\\ ar_1 + ar_2 - 2 >= 0 /\\ ar_0 + ar_2 - 2 >= 0 /\\ ar_1 - 1 >= 0 /\\ ar_0 + ar_1 - 2 >= 0 /\\ -ar_0 + ar_1 >= 0 /\\ ar_0 - 1 >= 0 /\\ ar_2 >= ar_3 + 1 ]", 0-0) = ar_1 + 255 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb4in(ar_0, ar_1, ar_2, ar_3)) [ ar_3 >= 0 /\\ ar_2 + ar_3 - 1 >= 0 /\\ -ar_2 + ar_3 + 256 >= 0 /\\ ar_1 + ar_3 - 1 >= 0 /\\ ar_0 + ar_3 - 1 >= 0 /\\ -ar_2 + 256 >= 0 /\\ ar_1 - ar_2 >= 0 /\\ ar_0 - ar_2 >= 0 /\\ ar_2 - 1 >= 0 /\\ ar_1 + ar_2 - 2 >= 0 /\\ ar_0 + ar_2 - 2 >= 0 /\\ ar_1 - 1 >= 0 /\\ ar_0 + ar_1 - 2 >= 0 /\\ -ar_0 + ar_1 >= 0 /\\ ar_0 - 1 >= 0 /\\ ar_2 >= ar_3 + 1 ]", 0-1) = ar_1 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb4in(ar_0, ar_1, ar_2, ar_3)) [ ar_3 >= 0 /\\ ar_2 + ar_3 - 1 >= 0 /\\ -ar_2 + ar_3 + 256 >= 0 /\\ ar_1 + ar_3 - 1 >= 0 /\\ ar_0 + ar_3 - 1 >= 0 /\\ -ar_2 + 256 >= 0 /\\ ar_1 - ar_2 >= 0 /\\ ar_0 - ar_2 >= 0 /\\ ar_2 - 1 >= 0 /\\ ar_1 + ar_2 - 2 >= 0 /\\ ar_0 + ar_2 - 2 >= 0 /\\ ar_1 - 1 >= 0 /\\ ar_0 + ar_1 - 2 >= 0 /\\ -ar_0 + ar_1 >= 0 /\\ ar_0 - 1 >= 0 /\\ ar_2 >= ar_3 + 1 ]", 0-2) = 256 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb4in(ar_0, ar_1, ar_2, ar_3)) [ ar_3 >= 0 /\\ ar_2 + ar_3 - 1 >= 0 /\\ -ar_2 + ar_3 + 256 >= 0 /\\ ar_1 + ar_3 - 1 >= 0 /\\ ar_0 + ar_3 - 1 >= 0 /\\ -ar_2 + 256 >= 0 /\\ ar_1 - ar_2 >= 0 /\\ ar_0 - ar_2 >= 0 /\\ ar_2 - 1 >= 0 /\\ ar_1 + ar_2 - 2 >= 0 /\\ ar_0 + ar_2 - 2 >= 0 /\\ ar_1 - 1 >= 0 /\\ ar_0 + ar_1 - 2 >= 0 /\\ -ar_0 + ar_1 >= 0 /\\ ar_0 - 1 >= 0 /\\ ar_2 >= ar_3 + 1 ]", 0-3) = 255 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb5in(ar_0, ar_1, ar_2, ar_3)) [ ar_3 >= 0 /\\ ar_2 + ar_3 - 1 >= 0 /\\ -ar_2 + ar_3 + 256 >= 0 /\\ ar_1 + ar_3 - 1 >= 0 /\\ ar_0 + ar_3 - 1 >= 0 /\\ -ar_2 + 256 >= 0 /\\ ar_1 - ar_2 >= 0 /\\ ar_0 - ar_2 >= 0 /\\ ar_2 - 1 >= 0 /\\ ar_1 + ar_2 - 2 >= 0 /\\ ar_0 + ar_2 - 2 >= 0 /\\ ar_1 - 1 >= 0 /\\ ar_0 + ar_1 - 2 >= 0 /\\ -ar_0 + ar_1 >= 0 /\\ ar_0 - 1 >= 0 /\\ ar_3 >= ar_2 ]", 0-0) = ar_1 + 255 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb5in(ar_0, ar_1, ar_2, ar_3)) [ ar_3 >= 0 /\\ ar_2 + ar_3 - 1 >= 0 /\\ -ar_2 + ar_3 + 256 >= 0 /\\ ar_1 + ar_3 - 1 >= 0 /\\ ar_0 + ar_3 - 1 >= 0 /\\ -ar_2 + 256 >= 0 /\\ ar_1 - ar_2 >= 0 /\\ ar_0 - ar_2 >= 0 /\\ ar_2 - 1 >= 0 /\\ ar_1 + ar_2 - 2 >= 0 /\\ ar_0 + ar_2 - 2 >= 0 /\\ ar_1 - 1 >= 0 /\\ ar_0 + ar_1 - 2 >= 0 /\\ -ar_0 + ar_1 >= 0 /\\ ar_0 - 1 >= 0 /\\ ar_3 >= ar_2 ]", 0-1) = ar_1 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb5in(ar_0, ar_1, ar_2, ar_3)) [ ar_3 >= 0 /\\ ar_2 + ar_3 - 1 >= 0 /\\ -ar_2 + ar_3 + 256 >= 0 /\\ ar_1 + ar_3 - 1 >= 0 /\\ ar_0 + ar_3 - 1 >= 0 /\\ -ar_2 + 256 >= 0 /\\ ar_1 - ar_2 >= 0 /\\ ar_0 - ar_2 >= 0 /\\ ar_2 - 1 >= 0 /\\ ar_1 + ar_2 - 2 >= 0 /\\ ar_0 + ar_2 - 2 >= 0 /\\ ar_1 - 1 >= 0 /\\ ar_0 + ar_1 - 2 >= 0 /\\ -ar_0 + ar_1 >= 0 /\\ ar_0 - 1 >= 0 /\\ ar_3 >= ar_2 ]", 0-2) = 256 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb5in(ar_0, ar_1, ar_2, ar_3)) [ ar_3 >= 0 /\\ ar_2 + ar_3 - 1 >= 0 /\\ -ar_2 + ar_3 + 256 >= 0 /\\ ar_1 + ar_3 - 1 >= 0 /\\ ar_0 + ar_3 - 1 >= 0 /\\ -ar_2 + 256 >= 0 /\\ ar_1 - ar_2 >= 0 /\\ ar_0 - ar_2 >= 0 /\\ ar_2 - 1 >= 0 /\\ ar_1 + ar_2 - 2 >= 0 /\\ ar_0 + ar_2 - 2 >= 0 /\\ ar_1 - 1 >= 0 /\\ ar_0 + ar_1 - 2 >= 0 /\\ -ar_0 + ar_1 >= 0 /\\ ar_0 - 1 >= 0 /\\ ar_3 >= ar_2 ]", 0-3) = 256 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb4in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3 + 1)) [ -ar_3 + 255 >= 0 /\\ ar_2 - ar_3 - 1 >= 0 /\\ -ar_2 - ar_3 + 511 >= 0 /\\ ar_1 - ar_3 - 1 >= 0 /\\ ar_0 - ar_3 - 1 >= 0 /\\ ar_3 >= 0 /\\ ar_2 + ar_3 - 1 >= 0 /\\ -ar_2 + ar_3 + 256 >= 0 /\\ ar_1 + ar_3 - 1 >= 0 /\\ ar_0 + ar_3 - 1 >= 0 /\\ -ar_2 + 256 >= 0 /\\ ar_1 - ar_2 >= 0 /\\ ar_0 - ar_2 >= 0 /\\ ar_2 - 1 >= 0 /\\ ar_1 + ar_2 - 2 >= 0 /\\ ar_0 + ar_2 - 2 >= 0 /\\ ar_1 - 1 >= 0 /\\ ar_0 + ar_1 - 2 >= 0 /\\ -ar_0 + ar_1 >= 0 /\\ ar_0 - 1 >= 0 ]", 0-0) = ar_1 + 255 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb4in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3 + 1)) [ -ar_3 + 255 >= 0 /\\ ar_2 - ar_3 - 1 >= 0 /\\ -ar_2 - ar_3 + 511 >= 0 /\\ ar_1 - ar_3 - 1 >= 0 /\\ ar_0 - ar_3 - 1 >= 0 /\\ ar_3 >= 0 /\\ ar_2 + ar_3 - 1 >= 0 /\\ -ar_2 + ar_3 + 256 >= 0 /\\ ar_1 + ar_3 - 1 >= 0 /\\ ar_0 + ar_3 - 1 >= 0 /\\ -ar_2 + 256 >= 0 /\\ ar_1 - ar_2 >= 0 /\\ ar_0 - ar_2 >= 0 /\\ ar_2 - 1 >= 0 /\\ ar_1 + ar_2 - 2 >= 0 /\\ ar_0 + ar_2 - 2 >= 0 /\\ ar_1 - 1 >= 0 /\\ ar_0 + ar_1 - 2 >= 0 /\\ -ar_0 + ar_1 >= 0 /\\ ar_0 - 1 >= 0 ]", 0-1) = ar_1 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb4in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3 + 1)) [ -ar_3 + 255 >= 0 /\\ ar_2 - ar_3 - 1 >= 0 /\\ -ar_2 - ar_3 + 511 >= 0 /\\ ar_1 - ar_3 - 1 >= 0 /\\ ar_0 - ar_3 - 1 >= 0 /\\ ar_3 >= 0 /\\ ar_2 + ar_3 - 1 >= 0 /\\ -ar_2 + ar_3 + 256 >= 0 /\\ ar_1 + ar_3 - 1 >= 0 /\\ ar_0 + ar_3 - 1 >= 0 /\\ -ar_2 + 256 >= 0 /\\ ar_1 - ar_2 >= 0 /\\ ar_0 - ar_2 >= 0 /\\ ar_2 - 1 >= 0 /\\ ar_1 + ar_2 - 2 >= 0 /\\ ar_0 + ar_2 - 2 >= 0 /\\ ar_1 - 1 >= 0 /\\ ar_0 + ar_1 - 2 >= 0 /\\ -ar_0 + ar_1 >= 0 /\\ ar_0 - 1 >= 0 ]", 0-2) = 256 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb4in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3 + 1)) [ -ar_3 + 255 >= 0 /\\ ar_2 - ar_3 - 1 >= 0 /\\ -ar_2 - ar_3 + 511 >= 0 /\\ ar_1 - ar_3 - 1 >= 0 /\\ ar_0 - ar_3 - 1 >= 0 /\\ ar_3 >= 0 /\\ ar_2 + ar_3 - 1 >= 0 /\\ -ar_2 + ar_3 + 256 >= 0 /\\ ar_1 + ar_3 - 1 >= 0 /\\ ar_0 + ar_3 - 1 >= 0 /\\ -ar_2 + 256 >= 0 /\\ ar_1 - ar_2 >= 0 /\\ ar_0 - ar_2 >= 0 /\\ ar_2 - 1 >= 0 /\\ ar_1 + ar_2 - 2 >= 0 /\\ ar_0 + ar_2 - 2 >= 0 /\\ ar_1 - 1 >= 0 /\\ ar_0 + ar_1 - 2 >= 0 /\\ -ar_0 + ar_1 >= 0 /\\ ar_0 - 1 >= 0 ]", 0-3) = 256 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb5in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb1in(ar_0 - ar_2, ar_1, ar_2, ar_3)) [ ar_3 - 1 >= 0 /\\ ar_2 + ar_3 - 2 >= 0 /\\ -ar_2 + ar_3 >= 0 /\\ ar_1 + ar_3 - 2 >= 0 /\\ ar_0 + ar_3 - 2 >= 0 /\\ -ar_2 + 256 >= 0 /\\ ar_1 - ar_2 >= 0 /\\ ar_0 - ar_2 >= 0 /\\ ar_2 - 1 >= 0 /\\ ar_1 + ar_2 - 2 >= 0 /\\ ar_0 + ar_2 - 2 >= 0 /\\ ar_1 - 1 >= 0 /\\ ar_0 + ar_1 - 2 >= 0 /\\ -ar_0 + ar_1 >= 0 /\\ ar_0 - 1 >= 0 ]", 0-0) = ar_1 + 255 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb5in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb1in(ar_0 - ar_2, ar_1, ar_2, ar_3)) [ ar_3 - 1 >= 0 /\\ ar_2 + ar_3 - 2 >= 0 /\\ -ar_2 + ar_3 >= 0 /\\ ar_1 + ar_3 - 2 >= 0 /\\ ar_0 + ar_3 - 2 >= 0 /\\ -ar_2 + 256 >= 0 /\\ ar_1 - ar_2 >= 0 /\\ ar_0 - ar_2 >= 0 /\\ ar_2 - 1 >= 0 /\\ ar_1 + ar_2 - 2 >= 0 /\\ ar_0 + ar_2 - 2 >= 0 /\\ ar_1 - 1 >= 0 /\\ ar_0 + ar_1 - 2 >= 0 /\\ -ar_0 + ar_1 >= 0 /\\ ar_0 - 1 >= 0 ]", 0-1) = ar_1 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb5in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb1in(ar_0 - ar_2, ar_1, ar_2, ar_3)) [ ar_3 - 1 >= 0 /\\ ar_2 + ar_3 - 2 >= 0 /\\ -ar_2 + ar_3 >= 0 /\\ ar_1 + ar_3 - 2 >= 0 /\\ ar_0 + ar_3 - 2 >= 0 /\\ -ar_2 + 256 >= 0 /\\ ar_1 - ar_2 >= 0 /\\ ar_0 - ar_2 >= 0 /\\ ar_2 - 1 >= 0 /\\ ar_1 + ar_2 - 2 >= 0 /\\ ar_0 + ar_2 - 2 >= 0 /\\ ar_1 - 1 >= 0 /\\ ar_0 + ar_1 - 2 >= 0 /\\ -ar_0 + ar_1 >= 0 /\\ ar_0 - 1 >= 0 ]", 0-2) = 256 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb5in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb1in(ar_0 - ar_2, ar_1, ar_2, ar_3)) [ ar_3 - 1 >= 0 /\\ ar_2 + ar_3 - 2 >= 0 /\\ -ar_2 + ar_3 >= 0 /\\ ar_1 + ar_3 - 2 >= 0 /\\ ar_0 + ar_3 - 2 >= 0 /\\ -ar_2 + 256 >= 0 /\\ ar_1 - ar_2 >= 0 /\\ ar_0 - ar_2 >= 0 /\\ ar_2 - 1 >= 0 /\\ ar_1 + ar_2 - 2 >= 0 /\\ ar_0 + ar_2 - 2 >= 0 /\\ ar_1 - 1 >= 0 /\\ ar_0 + ar_1 - 2 >= 0 /\\ -ar_0 + ar_1 >= 0 /\\ ar_0 - 1 >= 0 ]", 0-3) = 256 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb6in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilestop(ar_0, ar_1, ar_2, ar_3)) [ -ar_0 + ar_1 >= 0 /\\ -ar_0 >= 0 ]", 0-0) = ar_1 + 255 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb6in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilestop(ar_0, ar_1, ar_2, ar_3)) [ -ar_0 + ar_1 >= 0 /\\ -ar_0 >= 0 ]", 0-1) = ar_1 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb6in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilestop(ar_0, ar_1, ar_2, ar_3)) [ -ar_0 + ar_1 >= 0 /\\ -ar_0 >= 0 ]", 0-2) = ar_2 + 256 2.56/1.71 2.56/1.71 S("evalcryptRandWriteFilebb6in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilestop(ar_0, ar_1, ar_2, ar_3)) [ -ar_0 + ar_1 >= 0 /\\ -ar_0 >= 0 ]", 0-3) = ar_3 + 256 2.56/1.71 2.56/1.71 S("koat_start(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilestart(ar_0, ar_1, ar_2, ar_3)) [ 0 <= 0 ]", 0-0) = ar_0 2.56/1.71 2.56/1.71 S("koat_start(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilestart(ar_0, ar_1, ar_2, ar_3)) [ 0 <= 0 ]", 0-1) = ar_1 2.56/1.71 2.56/1.71 S("koat_start(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilestart(ar_0, ar_1, ar_2, ar_3)) [ 0 <= 0 ]", 0-2) = ar_2 2.56/1.71 2.56/1.71 S("koat_start(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilestart(ar_0, ar_1, ar_2, ar_3)) [ 0 <= 0 ]", 0-3) = ar_3 2.56/1.71 2.56/1.71 orients the transitions 2.56/1.71 2.56/1.71 evalcryptRandWriteFilebb4in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3 + 1)) [ -ar_3 + 255 >= 0 /\ ar_2 - ar_3 - 1 >= 0 /\ -ar_2 - ar_3 + 511 >= 0 /\ ar_1 - ar_3 - 1 >= 0 /\ ar_0 - ar_3 - 1 >= 0 /\ ar_3 >= 0 /\ ar_2 + ar_3 - 1 >= 0 /\ -ar_2 + ar_3 + 256 >= 0 /\ ar_1 + ar_3 - 1 >= 0 /\ ar_0 + ar_3 - 1 >= 0 /\ -ar_2 + 256 >= 0 /\ ar_1 - ar_2 >= 0 /\ ar_0 - ar_2 >= 0 /\ ar_2 - 1 >= 0 /\ ar_1 + ar_2 - 2 >= 0 /\ ar_0 + ar_2 - 2 >= 0 /\ ar_1 - 1 >= 0 /\ ar_0 + ar_1 - 2 >= 0 /\ -ar_0 + ar_1 >= 0 /\ ar_0 - 1 >= 0 ] 2.56/1.71 2.56/1.71 evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb4in(ar_0, ar_1, ar_2, ar_3)) [ ar_3 >= 0 /\ ar_2 + ar_3 - 1 >= 0 /\ -ar_2 + ar_3 + 256 >= 0 /\ ar_1 + ar_3 - 1 >= 0 /\ ar_0 + ar_3 - 1 >= 0 /\ -ar_2 + 256 >= 0 /\ ar_1 - ar_2 >= 0 /\ ar_0 - ar_2 >= 0 /\ ar_2 - 1 >= 0 /\ ar_1 + ar_2 - 2 >= 0 /\ ar_0 + ar_2 - 2 >= 0 /\ ar_1 - 1 >= 0 /\ ar_0 + ar_1 - 2 >= 0 /\ -ar_0 + ar_1 >= 0 /\ ar_0 - 1 >= 0 /\ ar_2 >= ar_3 + 1 ] 2.56/1.71 2.56/1.71 weakly and the transitions 2.56/1.71 2.56/1.71 evalcryptRandWriteFilebb4in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3 + 1)) [ -ar_3 + 255 >= 0 /\ ar_2 - ar_3 - 1 >= 0 /\ -ar_2 - ar_3 + 511 >= 0 /\ ar_1 - ar_3 - 1 >= 0 /\ ar_0 - ar_3 - 1 >= 0 /\ ar_3 >= 0 /\ ar_2 + ar_3 - 1 >= 0 /\ -ar_2 + ar_3 + 256 >= 0 /\ ar_1 + ar_3 - 1 >= 0 /\ ar_0 + ar_3 - 1 >= 0 /\ -ar_2 + 256 >= 0 /\ ar_1 - ar_2 >= 0 /\ ar_0 - ar_2 >= 0 /\ ar_2 - 1 >= 0 /\ ar_1 + ar_2 - 2 >= 0 /\ ar_0 + ar_2 - 2 >= 0 /\ ar_1 - 1 >= 0 /\ ar_0 + ar_1 - 2 >= 0 /\ -ar_0 + ar_1 >= 0 /\ ar_0 - 1 >= 0 ] 2.56/1.71 2.56/1.71 evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb4in(ar_0, ar_1, ar_2, ar_3)) [ ar_3 >= 0 /\ ar_2 + ar_3 - 1 >= 0 /\ -ar_2 + ar_3 + 256 >= 0 /\ ar_1 + ar_3 - 1 >= 0 /\ ar_0 + ar_3 - 1 >= 0 /\ -ar_2 + 256 >= 0 /\ ar_1 - ar_2 >= 0 /\ ar_0 - ar_2 >= 0 /\ ar_2 - 1 >= 0 /\ ar_1 + ar_2 - 2 >= 0 /\ ar_0 + ar_2 - 2 >= 0 /\ ar_1 - 1 >= 0 /\ ar_0 + ar_1 - 2 >= 0 /\ -ar_0 + ar_1 >= 0 /\ ar_0 - 1 >= 0 /\ ar_2 >= ar_3 + 1 ] 2.56/1.71 2.56/1.71 strictly and produces the following problem: 2.56/1.71 2.56/1.71 6: T: 2.56/1.71 2.56/1.71 (Comp: 1, Cost: 0) koat_start(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilestart(ar_0, ar_1, ar_2, ar_3)) [ 0 <= 0 ] 2.56/1.71 2.56/1.71 (Comp: 2, Cost: 1) evalcryptRandWriteFilebb6in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilestop(ar_0, ar_1, ar_2, ar_3)) [ -ar_0 + ar_1 >= 0 /\ -ar_0 >= 0 ] 2.56/1.71 2.56/1.71 (Comp: 4*ar_1, Cost: 1) evalcryptRandWriteFilebb5in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb1in(ar_0 - ar_2, ar_1, ar_2, ar_3)) [ ar_3 - 1 >= 0 /\ ar_2 + ar_3 - 2 >= 0 /\ -ar_2 + ar_3 >= 0 /\ ar_1 + ar_3 - 2 >= 0 /\ ar_0 + ar_3 - 2 >= 0 /\ -ar_2 + 256 >= 0 /\ ar_1 - ar_2 >= 0 /\ ar_0 - ar_2 >= 0 /\ ar_2 - 1 >= 0 /\ ar_1 + ar_2 - 2 >= 0 /\ ar_0 + ar_2 - 2 >= 0 /\ ar_1 - 1 >= 0 /\ ar_0 + ar_1 - 2 >= 0 /\ -ar_0 + ar_1 >= 0 /\ ar_0 - 1 >= 0 ] 2.56/1.71 2.56/1.71 (Comp: 4096*ar_1, Cost: 1) evalcryptRandWriteFilebb4in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3 + 1)) [ -ar_3 + 255 >= 0 /\ ar_2 - ar_3 - 1 >= 0 /\ -ar_2 - ar_3 + 511 >= 0 /\ ar_1 - ar_3 - 1 >= 0 /\ ar_0 - ar_3 - 1 >= 0 /\ ar_3 >= 0 /\ ar_2 + ar_3 - 1 >= 0 /\ -ar_2 + ar_3 + 256 >= 0 /\ ar_1 + ar_3 - 1 >= 0 /\ ar_0 + ar_3 - 1 >= 0 /\ -ar_2 + 256 >= 0 /\ ar_1 - ar_2 >= 0 /\ ar_0 - ar_2 >= 0 /\ ar_2 - 1 >= 0 /\ ar_1 + ar_2 - 2 >= 0 /\ ar_0 + ar_2 - 2 >= 0 /\ ar_1 - 1 >= 0 /\ ar_0 + ar_1 - 2 >= 0 /\ -ar_0 + ar_1 >= 0 /\ ar_0 - 1 >= 0 ] 2.56/1.71 2.56/1.71 (Comp: 4*ar_1, Cost: 1) evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb5in(ar_0, ar_1, ar_2, ar_3)) [ ar_3 >= 0 /\ ar_2 + ar_3 - 1 >= 0 /\ -ar_2 + ar_3 + 256 >= 0 /\ ar_1 + ar_3 - 1 >= 0 /\ ar_0 + ar_3 - 1 >= 0 /\ -ar_2 + 256 >= 0 /\ ar_1 - ar_2 >= 0 /\ ar_0 - ar_2 >= 0 /\ ar_2 - 1 >= 0 /\ ar_1 + ar_2 - 2 >= 0 /\ ar_0 + ar_2 - 2 >= 0 /\ ar_1 - 1 >= 0 /\ ar_0 + ar_1 - 2 >= 0 /\ -ar_0 + ar_1 >= 0 /\ ar_0 - 1 >= 0 /\ ar_3 >= ar_2 ] 2.56/1.71 2.56/1.71 (Comp: 4096*ar_1, Cost: 1) evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb4in(ar_0, ar_1, ar_2, ar_3)) [ ar_3 >= 0 /\ ar_2 + ar_3 - 1 >= 0 /\ -ar_2 + ar_3 + 256 >= 0 /\ ar_1 + ar_3 - 1 >= 0 /\ ar_0 + ar_3 - 1 >= 0 /\ -ar_2 + 256 >= 0 /\ ar_1 - ar_2 >= 0 /\ ar_0 - ar_2 >= 0 /\ ar_2 - 1 >= 0 /\ ar_1 + ar_2 - 2 >= 0 /\ ar_0 + ar_2 - 2 >= 0 /\ ar_1 - 1 >= 0 /\ ar_0 + ar_1 - 2 >= 0 /\ -ar_0 + ar_1 >= 0 /\ ar_0 - 1 >= 0 /\ ar_2 >= ar_3 + 1 ] 2.56/1.71 2.56/1.71 (Comp: 4*ar_1, Cost: 1) evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, 256, 0)) [ ar_1 - 1 >= 0 /\ ar_0 + ar_1 - 2 >= 0 /\ -ar_0 + ar_1 >= 0 /\ ar_0 - 1 >= 0 /\ ar_0 >= 256 ] 2.56/1.71 2.56/1.71 (Comp: 4*ar_1, Cost: 1) evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb3in(ar_0, ar_1, ar_0, 0)) [ ar_1 - 1 >= 0 /\ ar_0 + ar_1 - 2 >= 0 /\ -ar_0 + ar_1 >= 0 /\ ar_0 - 1 >= 0 /\ 255 >= ar_0 ] 2.56/1.71 2.56/1.71 (Comp: 2, Cost: 1) evalcryptRandWriteFilebb1in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb6in(ar_0, ar_1, ar_2, ar_3)) [ -ar_0 + ar_1 >= 0 /\ 0 >= ar_0 ] 2.56/1.71 2.56/1.71 (Comp: 4*ar_1, Cost: 1) evalcryptRandWriteFilebb1in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb2in(ar_0, ar_1, ar_2, ar_3)) [ -ar_0 + ar_1 >= 0 /\ ar_0 >= 1 ] 2.56/1.71 2.56/1.71 (Comp: 1, Cost: 1) evalcryptRandWriteFilebb0in(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb1in(ar_1, ar_1, ar_2, ar_3)) 2.56/1.71 2.56/1.71 (Comp: 1, Cost: 1) evalcryptRandWriteFilestart(ar_0, ar_1, ar_2, ar_3) -> Com_1(evalcryptRandWriteFilebb0in(ar_0, ar_1, ar_2, ar_3)) 2.56/1.71 2.56/1.71 start location: koat_start 2.56/1.71 2.56/1.71 leaf cost: 0 2.56/1.71 2.56/1.71 2.56/1.71 2.56/1.71 Complexity upper bound 8212*ar_1 + 6 2.56/1.71 2.56/1.71 2.56/1.71 2.56/1.71 Time: 0.476 sec (SMT: 0.389 sec) 2.56/1.71 2.56/1.71 2.56/1.71 ---------------------------------------- 2.56/1.71 2.56/1.71 (2) 2.56/1.71 BOUNDS(1, n^1) 2.62/1.75 EOF