[asterisk-bugs] [Asterisk 0010676]: SQL 2005 Escape Character
noreply at bugs.digium.com
noreply at bugs.digium.com
Sun Sep 9 14:38:57 CDT 2007
The following issue has been REOPENED.
======================================================================
http://bugs.digium.com/view.php?id=10676
======================================================================
Reported By: slakware
Assigned To: Corydon76
======================================================================
Project: Asterisk
Issue ID: 10676
Category: Resources/res_odbc
Reproducibility: always
Severity: minor
Priority: normal
Status: feedback
Asterisk Version: 1.4.11
SVN Branch (only for SVN checkouts, not tarball releases): N/A
SVN Revision (number only!): 81832
Disclaimer on File?: N/A
Request Review:
======================================================================
Date Submitted: 09-08-2007 23:01 CDT
Last Modified: 09-09-2007 14:38 CDT
======================================================================
Summary: SQL 2005 Escape Character
Description:
Much like the bug posted here:
http://bugs.digium.com/view.php?id=10075
However this occurs when the sp_execute sp is executed as follows.
exec sp_execute 534,'\_%','outgoing','1'
The call is not placed.
I'm not sure exactly where the problem lies. If anyone can help shed some
light it would be greatly appreciated.
======================================================================
----------------------------------------------------------------------
slakware - 09-09-07 14:38
----------------------------------------------------------------------
What about passing parameters between the drivers? Perhaps the escape code
is sent to freetds and freetds constructs the execution of the sp with the
passed values.
Issue History
Date Modified Username Field Change
======================================================================
09-09-07 14:38 slakware Status closed => feedback
09-09-07 14:38 slakware Resolution no change required =>
reopened
09-09-07 14:38 slakware Note Added: 0070225
======================================================================
More information about the asterisk-bugs
mailing list