src/HOL/Auth/Message.ML
changeset 2102 41a667d2c3fa
parent 2068 0d05468dc80c
child 2154 913b4fc7670a
--- a/src/HOL/Auth/Message.ML	Fri Oct 18 11:32:38 1996 +0200
+++ b/src/HOL/Auth/Message.ML	Fri Oct 18 11:33:02 1996 +0200
@@ -372,7 +372,8 @@
 by (etac analz.induct 1);
 by (Auto_tac());
 by (etac analz.induct 1);
-by (ALLGOALS (deepen_tac (!claset addIs [analz.Fst, analz.Snd, analz.Decrypt]) 0));
+by (ALLGOALS
+    (deepen_tac (!claset addIs [analz.Fst, analz.Snd, analz.Decrypt]) 0));
 qed "analz_insert_MPair";
 
 (*Can pull out enCrypted message if the Key is not known*)
@@ -412,12 +413,12 @@
 (*Case analysis: either the message is secure, or it is not!
   Effective, but can cause subgoals to blow up!
   Use with expand_if;  apparently split_tac does not cope with patterns
-  such as "analz (insert (Crypt X' K) H)" *)
-goal thy "analz (insert (Crypt X' K) H) = \
+  such as "analz (insert (Crypt X K) H)" *)
+goal thy "analz (insert (Crypt X K) H) = \
 \         (if (Key (invKey K)  : analz H) then    \
-\               insert (Crypt X' K) (analz (insert X' H)) \
-\          else insert (Crypt X' K) (analz H))";
-by (excluded_middle_tac "Key (invKey K)  : analz H " 1);
+\               insert (Crypt X K) (analz (insert X H)) \
+\          else insert (Crypt X K) (analz H))";
+by (case_tac "Key (invKey K)  : analz H " 1);
 by (ALLGOALS (asm_simp_tac (!simpset addsimps [analz_insert_Crypt, 
                                                analz_insert_Decrypt])));
 qed "analz_Crypt_if";