| 1944 |      1 | (*  Title:      HOL/Auth/ROOT
 | 
|  |      2 |     ID:         $Id$
 | 
|  |      3 |     Author:     Lawrence C Paulson, Cambridge University Computer Laboratory
 | 
|  |      4 |     Copyright   1996  University of Cambridge
 | 
|  |      5 | 
 | 
| 1971 |      6 | Root file for protocol proofs.
 | 
| 1944 |      7 | *)
 | 
|  |      8 | 
 | 
| 2123 |      9 | goals_limit := 1;
 | 
| 13550 |     10 | set timing;
 | 
| 1944 |     11 | 
 | 
| 2325 |     12 | (*Shared-key protocols*)
 | 
| 2530 |     13 | time_use_thy "NS_Shared";
 | 
| 5053 |     14 | time_use_thy "Kerberos_BAN";
 | 
| 6452 |     15 | time_use_thy "KerberosIV";
 | 
| 2530 |     16 | time_use_thy "OtwayRees";
 | 
|  |     17 | time_use_thy "OtwayRees_AN";
 | 
|  |     18 | time_use_thy "OtwayRees_Bad";
 | 
|  |     19 | time_use_thy "WooLam";
 | 
|  |     20 | time_use_thy "Recur";
 | 
|  |     21 | time_use_thy "Yahalom";
 | 
|  |     22 | time_use_thy "Yahalom2";
 | 
| 6400 |     23 | time_use_thy "Yahalom_Bad";
 | 
| 1944 |     24 | 
 | 
| 2325 |     25 | (*Public-key protocols*)
 | 
| 2530 |     26 | time_use_thy "NS_Public_Bad";
 | 
|  |     27 | time_use_thy "NS_Public";
 | 
| 3475 |     28 | time_use_thy "TLS";
 | 
| 13508 |     29 | 
 | 
|  |     30 | (*Blanqui's "guard" concept: protocol-independent secrecy*)
 | 
|  |     31 | time_use_thy "Guard/P1";
 | 
|  |     32 | time_use_thy "Guard/P2";
 | 
|  |     33 | time_use_thy "Guard/NS_Public";
 | 
|  |     34 | time_use_thy "Guard/OtwayRees";
 | 
|  |     35 | time_use_thy "Guard/Yahalom";
 | 
|  |     36 | time_use_thy "Guard/Proto";
 |