-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

André,

On 4/21/2010 3:24 PM, André Warnier wrote:
> Mark Thomas wrote:
> ...
> 
>>
>> I'd just use JAD and decompile it.
>>
> Thanks.  But although my intentions are not obnoxious nor illegal nor
> anything of the kind, I would not want to even come under suspicion of
> reverse-engineering.  So is there something that just lists the standard
> calls/methods used in it ?

Jad can get your the (roughly) original Java source code for the whole
class. You have to figure out what the variable names really should be
(because they are lost during the compilation process and are replaced
by things like String s1, s2, s3, etc.) but you can get a general idea
of what the servlet is doing.

If you just want to see a list of method calls from a particular method,
you can use the standard Java tool "javap" with the "-c" switch which
will disassemble the class (per method, which is nice) and you can just
read the methods that get called.

Presumably, you already know the stack trace of where the error is
thrown, though.

- -chris
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAkvPU8cACgkQ9CaO5/Lv0PD+TgCgtSUqrj/Y04hnHFqaskN15M99
xh8An0LwFdNG3IT60no4lGpV+B0OKyXw
=ojNv
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to