https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6426
Summary: Added execute parameters decoder to MySQL dissector
Product: Wireshark
Version: SVN
Platform: All
OS/Version: All
Status: NEW
Severity: Minor
Priority: Low
Component: Wireshark
AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
ReportedBy: vsza@xxxxxxx
Build Information:
wireshark 1.7.0 (SVN Rev 39242 from /trunk)
Copyright 1998-2011 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (32-bit) with GTK+ 2.24.4, with Cairo 1.10.2, with Pango 1.28.4, with
GLib 2.28.6, with libpcap 1.1.1, with libz 1.2.3.4, without POSIX capabilities,
with threads support, without SMI, without c-ares, without ADNS, without Lua,
with Python 2.6.7, with GnuTLS 2.12.10, with Gcrypt 1.5.0, with MIT Kerberos,
with GeoIP, without PortAudio, without AirPcap.
Running on Linux 2.6.39.3, with locale hu_HU.UTF-8, with libpcap version 1.1.1,
with libz 1.2.3.4, GnuTLS 2.12.10, Gcrypt 1.5.0.
Built using gcc 4.6.1.
--
The current MySQL dissector ignored the parameters as metadata is needed from
previous packets to decode the fields. I added the necessary code to store
these in conn_data and developed dissector for all fields I could reproduce on
the network.
As MySQL doesn't have a clear, thorough documentation about this part (for
example, which types are allowed in these packets) I created as many different
captures as I could, using Python (oursql), PHP (mysqli), Java (Connector/J)
and C (libmysql). These are all attached in a ZIP file, along with my proposed
patch.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.