-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 André,
On 4/21/2010 3:24 PM, André Warnier wrote: > Mark Thomas wrote: > ... > >> >> I'd just use JAD and decompile it. >> > Thanks. But although my intentions are not obnoxious nor illegal nor > anything of the kind, I would not want to even come under suspicion of > reverse-engineering. So is there something that just lists the standard > calls/methods used in it ? Jad can get your the (roughly) original Java source code for the whole class. You have to figure out what the variable names really should be (because they are lost during the compilation process and are replaced by things like String s1, s2, s3, etc.) but you can get a general idea of what the servlet is doing. If you just want to see a list of method calls from a particular method, you can use the standard Java tool "javap" with the "-c" switch which will disassemble the class (per method, which is nice) and you can just read the methods that get called. Presumably, you already know the stack trace of where the error is thrown, though. - -chris -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAkvPU8cACgkQ9CaO5/Lv0PD+TgCgtSUqrj/Y04hnHFqaskN15M99 xh8An0LwFdNG3IT60no4lGpV+B0OKyXw =ojNv -----END PGP SIGNATURE----- --------------------------------------------------------------------- To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org For additional commands, e-mail: users-h...@tomcat.apache.org