Distinguish between SACL and DACL in ACL description and explain System Security.
---
epan/dissectors/packet-smb.c | 16 ++++++++--------
1 file changed, 8 insertions(+), 8 deletions(-)
diff --git a/epan/dissectors/packet-smb.c b/epan/dissectors/packet-smb.c
index a8da6c24ab9e..f552942b0d64 100644
--- a/epan/dissectors/packet-smb.c
+++ b/epan/dissectors/packet-smb.c
@@ -8571,24 +8571,24 @@ static const true_false_string tfs_nt_access_mask_maximum_allowed = {
"Maximum allowed is NOT set"
};
static const true_false_string tfs_nt_access_mask_system_security = {
- "SYSTEM SECURITY is set",
- "System security is NOT set"
+ "READ/WRITE SACL access",
+ "No read/write SACL access"
};
static const true_false_string tfs_nt_access_mask_synchronize = {
"Can wait on handle to SYNCHRONIZE on completion of I/O",
"Can NOT wait on handle to synchronize on completion of I/O"
};
static const true_false_string tfs_nt_access_mask_write_owner = {
- "Can WRITE OWNER (take ownership)",
- "Can NOT write owner (take ownership)"
+ "WRITE OWNER access (can take ownership)",
+ "No write OWNER access (can not take ownership)"
};
static const true_false_string tfs_nt_access_mask_write_dac = {
- "OWNER may WRITE the DAC",
- "Owner may NOT write to the DAC"
+ "WRITE DACL access",
+ "No write DACL access"
};
static const true_false_string tfs_nt_access_mask_read_control = {
- "READ ACCESS to owner, group and ACL of the SID",
- "Read access is NOT granted to owner, group and ACL of the SID"
+ "READ OWNER, GROUP and DACL access",
+ "No read OWNER, GROUP and DACL access"
};
static const true_false_string tfs_nt_access_mask_delete = {
"DELETE access",
--
2.20.1