Wireshark-bugs: [Wireshark-bugs] [Bug 6396] New: Added cursor type decoding to MySQL dissector

Date: Mon, 26 Sep 2011 12:14:06 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6396

           Summary: Added cursor type decoding to MySQL dissector
           Product: Wireshark
           Version: SVN
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: Minor
          Priority: Low
         Component: Wireshark
        AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
        ReportedBy: vsza@xxxxxxx


Build Information:
Compiled (32-bit) with GTK+ 2.24.4, with Cairo 1.10.2, with Pango 1.28.4, with
GLib 2.28.6, with libpcap 1.1.1, with libz 1.2.3.4, without POSIX capabilities,
with threads support, without SMI, without c-ares, without ADNS, without Lua,
with Python 2.6.7, with GnuTLS 2.12.10, with Gcrypt 1.5.0, with MIT Kerberos,
with GeoIP, without PortAudio, without AirPcap.

Running on Linux 2.6.39.3, with locale hu_HU.UTF-8, with libpcap version 1.1.1,
with libz 1.2.3.4, GnuTLS 2.12.10, Gcrypt 1.5.0.

Built using gcc 4.6.1.
--
The current MySQL dissector treats the exec_flags field as unused, however
since MySQL 5.0, this field is used to indicate the type of the cursor as it
can be read at
http://forge.mysql.com/wiki/MySQL_Internals_ClientServer_Protocol#Execute_Packet_.28Tentative_Description.29

I attached a capture containing a single "execute" packet, which has a non-zero
exec_flags field.

-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.