https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6396
Summary: Added cursor type decoding to MySQL dissector
Product: Wireshark
Version: SVN
Platform: All
OS/Version: All
Status: NEW
Severity: Minor
Priority: Low
Component: Wireshark
AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
ReportedBy: vsza@xxxxxxx
Build Information:
Compiled (32-bit) with GTK+ 2.24.4, with Cairo 1.10.2, with Pango 1.28.4, with
GLib 2.28.6, with libpcap 1.1.1, with libz 1.2.3.4, without POSIX capabilities,
with threads support, without SMI, without c-ares, without ADNS, without Lua,
with Python 2.6.7, with GnuTLS 2.12.10, with Gcrypt 1.5.0, with MIT Kerberos,
with GeoIP, without PortAudio, without AirPcap.
Running on Linux 2.6.39.3, with locale hu_HU.UTF-8, with libpcap version 1.1.1,
with libz 1.2.3.4, GnuTLS 2.12.10, Gcrypt 1.5.0.
Built using gcc 4.6.1.
--
The current MySQL dissector treats the exec_flags field as unused, however
since MySQL 5.0, this field is used to indicate the type of the cursor as it
can be read at
http://forge.mysql.com/wiki/MySQL_Internals_ClientServer_Protocol#Execute_Packet_.28Tentative_Description.29
I attached a capture containing a single "execute" packet, which has a non-zero
exec_flags field.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.