# HG changeset patch # User wenzelm # Date 918059667 -3600 # Node ID 05d99c0bbfa0aa3f49349e611522e283928d7ccc # Parent 6165747678baaf18808a268c0424ff09541487e5 add_path / reset_path; diff -r 6165747678ba -r 05d99c0bbfa0 src/HOL/Lambda/ROOT.ML --- a/src/HOL/Lambda/ROOT.ML Wed Feb 03 17:33:41 1999 +0100 +++ b/src/HOL/Lambda/ROOT.ML Wed Feb 03 17:34:27 1999 +0100 @@ -9,5 +9,5 @@ writeln"Root file for HOL/Lambda"; time_use_thy "Eta"; -loadpath := [".","../Induct"]; +add_path "../Induct"; time_use_thy "InductTermi"; diff -r 6165747678ba -r 05d99c0bbfa0 src/HOL/UNITY/NSP_Bad.thy --- a/src/HOL/UNITY/NSP_Bad.thy Wed Feb 03 17:33:41 1999 +0100 +++ b/src/HOL/UNITY/NSP_Bad.thy Wed Feb 03 17:34:27 1999 +0100 @@ -3,7 +3,7 @@ Author: Lawrence C Paulson, Cambridge University Computer Laboratory Copyright 1996 University of Cambridge -loadpath := "../Auth" :: !loadpath; use_thy"NSP_Bad"; +add_path "../Auth"; use_thy"NSP_Bad"; Security protocols in UNITY: Needham-Schroeder, public keys (flawed version). diff -r 6165747678ba -r 05d99c0bbfa0 src/HOL/UNITY/ROOT.ML --- a/src/HOL/UNITY/ROOT.ML Wed Feb 03 17:33:41 1999 +0100 +++ b/src/HOL/UNITY/ROOT.ML Wed Feb 03 17:34:27 1999 +0100 @@ -11,9 +11,8 @@ writeln"Root file for HOL/UNITY"; set proof_timing; - +add_path "../Lex"; (*to find Prefix.thy*) -loadpath := "../Lex" :: !loadpath; (*to find Prefix.thy*) time_use_thy"UNITY"; time_use_thy "Deadlock"; @@ -33,5 +32,7 @@ time_use_thy "PPX"; **) -loadpath := "../Auth" :: !loadpath; (*to find Public.thy*) +add_path "../Auth"; (*to find Public.thy*) use_thy"NSP_Bad"; + +reset_path ();