src/HOL/Auth/Recur.thy
changeset 24122 fc7f857d33c8
parent 23894 1a4167d761ac
child 32404 da3ca3c6ec81
--- a/src/HOL/Auth/Recur.thy	Wed Aug 01 19:59:12 2007 +0200
+++ b/src/HOL/Auth/Recur.thy	Wed Aug 01 20:25:16 2007 +0200
@@ -95,7 +95,7 @@
    (*No "oops" message can easily be expressed.  Each session key is
      associated--in two separate messages--with two nonces.  This is
      one try, but it isn't that useful.  Re domino attack, note that
-     Recur.ML proves that each session key is secure provided the two
+     Recur.thy proves that each session key is secure provided the two
      peers are, even if there are compromised agents elsewhere in
      the chain.  Oops cases proved using parts_cut, Key_in_keysFor_parts,
      etc.