Distinguish between SACL and DACL in ACL description and explain System Security. --- epan/dissectors/packet-smb.c | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-)
diff --git a/epan/dissectors/packet-smb.c b/epan/dissectors/packet-smb.c index a8da6c24ab9e..f552942b0d64 100644 --- a/epan/dissectors/packet-smb.c +++ b/epan/dissectors/packet-smb.c @@ -8571,24 +8571,24 @@ static const true_false_string tfs_nt_access_mask_maximum_allowed = { "Maximum allowed is NOT set" }; static const true_false_string tfs_nt_access_mask_system_security = { - "SYSTEM SECURITY is set", - "System security is NOT set" + "READ/WRITE SACL access", + "No read/write SACL access" }; static const true_false_string tfs_nt_access_mask_synchronize = { "Can wait on handle to SYNCHRONIZE on completion of I/O", "Can NOT wait on handle to synchronize on completion of I/O" }; static const true_false_string tfs_nt_access_mask_write_owner = { - "Can WRITE OWNER (take ownership)", - "Can NOT write owner (take ownership)" + "WRITE OWNER access (can take ownership)", + "No write OWNER access (can not take ownership)" }; static const true_false_string tfs_nt_access_mask_write_dac = { - "OWNER may WRITE the DAC", - "Owner may NOT write to the DAC" + "WRITE DACL access", + "No write DACL access" }; static const true_false_string tfs_nt_access_mask_read_control = { - "READ ACCESS to owner, group and ACL of the SID", - "Read access is NOT granted to owner, group and ACL of the SID" + "READ OWNER, GROUP and DACL access", + "No read OWNER, GROUP and DACL access" }; static const true_false_string tfs_nt_access_mask_delete = { "DELETE access", -- 2.20.1 _______________________________________________ Wireshark-dev mailing list -- wireshark-dev@wireshark.org To unsubscribe send an email to wireshark-dev-le...@wireshark.org