src/HOL/Auth/WooLam.thy
changeset 3683 aafe719dff14
parent 3659 eddedfe2f3f8
child 5434 9b4bed3f394c
     1.1 --- a/src/HOL/Auth/WooLam.thy	Wed Sep 17 16:40:52 1997 +0200
     1.2 +++ b/src/HOL/Auth/WooLam.thy	Thu Sep 18 13:24:04 1997 +0200
     1.3 @@ -26,7 +26,7 @@
     1.4             invent new nonces here, but he can also use NS1.  Common to
     1.5             all similar protocols.*)
     1.6      Fake "[| evs: woolam;  B ~= Spy;  
     1.7 -             X: synth (analz (sees Spy evs)) |]
     1.8 +             X: synth (analz (spies evs)) |]
     1.9            ==> Says Spy B X  # evs : woolam"
    1.10  
    1.11           (*Alice initiates a protocol run*)
    1.12 @@ -49,7 +49,7 @@
    1.13           (*Bob forwards Alice's response to the Server.  NOTE: usually
    1.14             the messages are shown in chronological order, for clarity.
    1.15             But here, exchanging the two events would cause the lemma
    1.16 -           WL4_analz_sees_Spy to pick up the wrong assumption!*)
    1.17 +           WL4_analz_spies to pick up the wrong assumption!*)
    1.18      WL4  "[| evs4: woolam;  B ~= Server;  
    1.19               Says A'  B X         : set evs4;
    1.20               Says A'' B (Agent A) : set evs4 |]