Server Security affects only DACL, so add DACL prefix like for all other
DACL control bits of Security Descriptor.
---
 epan/dissectors/packet-windows-common.c | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/epan/dissectors/packet-windows-common.c 
b/epan/dissectors/packet-windows-common.c
index 056579b027a4..d8cbd91cf4c7 100644
--- a/epan/dissectors/packet-windows-common.c
+++ b/epan/dissectors/packet-windows-common.c
@@ -2883,8 +2883,8 @@ static const true_false_string 
tfs_sec_desc_type_dacl_trusted = {
        "Dacl trusted is FALSE"
 };
 static const true_false_string tfs_sec_desc_type_server_security = {
-       "SERVER SECURITY is TRUE",
-       "Server security is FALSE"
+       "DACL SERVER SECURITY is TRUE",
+       "DACL server security is FALSE"
 };
 static const true_false_string tfs_sec_desc_type_dacl_auto_inherit_req = {
        "DACL has AUTO INHERIT REQUIRED",
@@ -3205,8 +3205,8 @@ proto_do_register_windows_common(int proto_smb)
                    TFS(&tfs_sec_desc_type_dacl_trusted), 0x0040, "Does this 
SecDesc have DACL TRUSTED set?", HFILL }},
 
                { &hf_nt_sec_desc_type_server_security,
-                 { "Server Security", "nt.sec_desc.type.server_security", 
FT_BOOLEAN, 16,
-                   TFS(&tfs_sec_desc_type_server_security), 0x0080, "Does this 
SecDesc have SERVER SECURITY set?", HFILL }},
+                 { "DACL Server Security", "nt.sec_desc.type.server_security", 
FT_BOOLEAN, 16,
+                   TFS(&tfs_sec_desc_type_server_security), 0x0080, "Does this 
SecDesc have DACL SERVER SECURITY set?", HFILL }},
 
                { &hf_nt_sec_desc_type_sacl_auto_inherit_req,
                  { "SACL Auto Inherit Required", 
"nt.sec_desc.type.sacl_auto_inherit_req", FT_BOOLEAN, 16,
-- 
2.20.1

_______________________________________________
Wireshark-dev mailing list -- wireshark-dev@wireshark.org
To unsubscribe send an email to wireshark-dev-le...@wireshark.org

Reply via email to