--- a/src/HOL/Lambda/ROOT.ML Wed Feb 03 17:33:41 1999 +0100
+++ b/src/HOL/Lambda/ROOT.ML Wed Feb 03 17:34:27 1999 +0100
@@ -9,5 +9,5 @@
writeln"Root file for HOL/Lambda";
time_use_thy "Eta";
-loadpath := [".","../Induct"];
+add_path "../Induct";
time_use_thy "InductTermi";
--- a/src/HOL/UNITY/NSP_Bad.thy Wed Feb 03 17:33:41 1999 +0100
+++ b/src/HOL/UNITY/NSP_Bad.thy Wed Feb 03 17:34:27 1999 +0100
@@ -3,7 +3,7 @@
Author: Lawrence C Paulson, Cambridge University Computer Laboratory
Copyright 1996 University of Cambridge
-loadpath := "../Auth" :: !loadpath; use_thy"NSP_Bad";
+add_path "../Auth"; use_thy"NSP_Bad";
Security protocols in UNITY: Needham-Schroeder, public keys (flawed version).
--- a/src/HOL/UNITY/ROOT.ML Wed Feb 03 17:33:41 1999 +0100
+++ b/src/HOL/UNITY/ROOT.ML Wed Feb 03 17:34:27 1999 +0100
@@ -11,9 +11,8 @@
writeln"Root file for HOL/UNITY";
set proof_timing;
-
+add_path "../Lex"; (*to find Prefix.thy*)
-loadpath := "../Lex" :: !loadpath; (*to find Prefix.thy*)
time_use_thy"UNITY";
time_use_thy "Deadlock";
@@ -33,5 +32,7 @@
time_use_thy "PPX";
**)
-loadpath := "../Auth" :: !loadpath; (*to find Public.thy*)
+add_path "../Auth"; (*to find Public.thy*)
use_thy"NSP_Bad";
+
+reset_path ();