add_path / reset_path;
authorwenzelm
Wed, 03 Feb 1999 17:34:27 +0100
changeset 6216 05d99c0bbfa0
parent 6215 6165747678ba
child 6217 9dac1ee185e3
add_path / reset_path;
src/HOL/Lambda/ROOT.ML
src/HOL/UNITY/NSP_Bad.thy
src/HOL/UNITY/ROOT.ML
--- a/src/HOL/Lambda/ROOT.ML	Wed Feb 03 17:33:41 1999 +0100
+++ b/src/HOL/Lambda/ROOT.ML	Wed Feb 03 17:34:27 1999 +0100
@@ -9,5 +9,5 @@
 writeln"Root file for HOL/Lambda";
 
 time_use_thy "Eta";
-loadpath := [".","../Induct"];
+add_path "../Induct";
 time_use_thy "InductTermi";
--- a/src/HOL/UNITY/NSP_Bad.thy	Wed Feb 03 17:33:41 1999 +0100
+++ b/src/HOL/UNITY/NSP_Bad.thy	Wed Feb 03 17:34:27 1999 +0100
@@ -3,7 +3,7 @@
     Author:     Lawrence C Paulson, Cambridge University Computer Laboratory
     Copyright   1996  University of Cambridge
 
-loadpath := "../Auth" :: !loadpath; use_thy"NSP_Bad";
+add_path "../Auth"; use_thy"NSP_Bad";
 
 Security protocols in UNITY: Needham-Schroeder, public keys (flawed version).
 
--- a/src/HOL/UNITY/ROOT.ML	Wed Feb 03 17:33:41 1999 +0100
+++ b/src/HOL/UNITY/ROOT.ML	Wed Feb 03 17:34:27 1999 +0100
@@ -11,9 +11,8 @@
 writeln"Root file for HOL/UNITY";
 set proof_timing;
 
-
+add_path "../Lex";	(*to find Prefix.thy*)
 
-loadpath := "../Lex" :: !loadpath;   (*to find Prefix.thy*)
 time_use_thy"UNITY";
 
 time_use_thy "Deadlock";
@@ -33,5 +32,7 @@
 time_use_thy "PPX";
 **)
 
-loadpath := "../Auth" :: !loadpath;  (*to find Public.thy*)
+add_path "../Auth";	(*to find Public.thy*)
 use_thy"NSP_Bad";
+
+reset_path ();