Distinguish between SACL and DACL in ACL description and explain System 
Security.
---
 epan/dissectors/packet-smb.c | 16 ++++++++--------
 1 file changed, 8 insertions(+), 8 deletions(-)

diff --git a/epan/dissectors/packet-smb.c b/epan/dissectors/packet-smb.c
index a8da6c24ab9e..f552942b0d64 100644
--- a/epan/dissectors/packet-smb.c
+++ b/epan/dissectors/packet-smb.c
@@ -8571,24 +8571,24 @@ static const true_false_string 
tfs_nt_access_mask_maximum_allowed = {
        "Maximum allowed is NOT set"
 };
 static const true_false_string tfs_nt_access_mask_system_security = {
-       "SYSTEM SECURITY is set",
-       "System security is NOT set"
+       "READ/WRITE SACL access",
+       "No read/write SACL access"
 };
 static const true_false_string tfs_nt_access_mask_synchronize = {
        "Can wait on handle to SYNCHRONIZE on completion of I/O",
        "Can NOT wait on handle to synchronize on completion of I/O"
 };
 static const true_false_string tfs_nt_access_mask_write_owner = {
-       "Can WRITE OWNER (take ownership)",
-       "Can NOT write owner (take ownership)"
+       "WRITE OWNER access (can take ownership)",
+       "No write OWNER access (can not take ownership)"
 };
 static const true_false_string tfs_nt_access_mask_write_dac = {
-       "OWNER may WRITE the DAC",
-       "Owner may NOT write to the DAC"
+       "WRITE DACL access",
+       "No write DACL access"
 };
 static const true_false_string tfs_nt_access_mask_read_control = {
-       "READ ACCESS to owner, group and ACL of the SID",
-       "Read access is NOT granted to owner, group and ACL of the SID"
+       "READ OWNER, GROUP and DACL access",
+       "No read OWNER, GROUP and DACL access"
 };
 static const true_false_string tfs_nt_access_mask_delete = {
        "DELETE access",
-- 
2.20.1

_______________________________________________
Wireshark-dev mailing list -- wireshark-dev@wireshark.org
To unsubscribe send an email to wireshark-dev-le...@wireshark.org

Reply via email to