How does page assembly work for the lservlet calls of Oracle Forms when analyzed with the HTTP (SSL Decrypted) decode?
https://***.***.com/forms/lservlet contains 12 or x calls to /lservlet. Why/How?
I am assuming we are using a piece of information from headers, like the referrer?
Also, do we have documentation on how we build OF operations from all the HTTP calls we see (with OF decode)? Is it only based on the lservlet calls?
All lservlet calls are oracle forms
thick java applet calls that are communicating with Oracle proprietary binary
protocol that is tunneled over HTTP.
HTTP decode is not able to decode this
binary protocol, but as you mentioned there is Oracle Forms decode that is
designed to analyze it - you can see the capabilities and screenshots here: Oracle Applications Monitoring. Oracle Forms decode is not simply decoding & reporting OF lservlet calls, but is rather following the sequence of this calls (interactions with windows and applet controls) and reporting them.