+ // SecurityManager hacks to avoid java.security?
+ // URL and all descendents? Probably impossible.
+ // ObjectInput/ObjectOutput? Serialization?
+
+ // often called from native subclasses....
+ bcp.loadAllMethods("org.ibex.Surface");
+ bcp.loadAllMethods("org.ibex.Template$TemplateHelper$1");
+ bcp.loadAllMethods("org.ibex.Surface$DoubleBufferedSurface");
+ bcp.loadAllMethods("org.ibex.Surface$3");
+ bcp.loadAllMethods("org.ibex.Surface$2");
+ bcp.loadAllMethods("org.ibex.Picture");
+ bcp.loadAllMethods("org.ibex.PixelBuffer");
+ bcp.loadAllMethods("org.ibex.Platform");
+ bcp.loadAllMethods("org.ibex.Scheduler");
+ bcp.loadAllMethods("org.ibex.plat.X11");
+ bcp.loadAllMethods("org.ibex.plat.X11$X11Picture");
+ bcp.loadAllMethods("org.ibex.plat.X11$X11PixelBuffer");
+ bcp.loadAllMethods("org.ibex.plat.X11$X11Surface");
+ bcp.loadAllMethods("org.ibex.XMLRPC");
+
+ bcp.loadAllMethods("java.util.Date");
+ bcp.loadAllMethods("java.text.DateFormat");
+ bcp.loadAllMethods("java.text.NumberFormat");
+
+
+ Method[] meths = getMethods(repo.loadClass("org.ibex.plat.Linux"));
+ for(int i=0; i<meths.length; i++) {
+ if (meths[i].getName().equals("main"))
+ bcp.visitJavaMethod(repo.loadClass("org.ibex.plat.Linux"), meths[i]);
+ }
+ System.out.println();
+
+ System.out.println("Dumping...");
+
+ StringTokenizer st = new StringTokenizer(s[0], ":");