aboutsummaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-windows-common.c
diff options
context:
space:
mode:
authorAlexis La Goutte <alexis.lagoutte@gmail.com>2011-06-17 12:28:21 +0000
committerAlexis La Goutte <alexis.lagoutte@gmail.com>2011-06-17 12:28:21 +0000
commit5147a51e3ae16667f23ccedf1b59cb2b22fbd2e7 (patch)
treeecd1872e897ae4d434d34ebb5bc25d36a32591a7 /epan/dissectors/packet-windows-common.c
parent2e74f2f58277549872655d541ac98c0913a0f238 (diff)
From Gregor Beck via https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6004
dissect_nt_v2_ace: doesn't support ace type > 8 svn path=/trunk/; revision=37692
Diffstat (limited to 'epan/dissectors/packet-windows-common.c')
-rw-r--r--epan/dissectors/packet-windows-common.c31
1 files changed, 31 insertions, 0 deletions
diff --git a/epan/dissectors/packet-windows-common.c b/epan/dissectors/packet-windows-common.c
index 15905efa9a..3633bd6810 100644
--- a/epan/dissectors/packet-windows-common.c
+++ b/epan/dissectors/packet-windows-common.c
@@ -2060,6 +2060,15 @@ static const value_string acl_revision_vals[] = {
#define ACE_TYPE_ACCESS_DENIED_OBJECT 6
#define ACE_TYPE_SYSTEM_AUDIT_OBJECT 7
#define ACE_TYPE_SYSTEM_ALARM_OBJECT 8
+#define ACE_TYPE_ACCESS_ALLOWED_CALLBACK 9
+#define ACE_TYPE_ACCESS_DENIED_CALLBACK 10
+#define ACE_TYPE_ACCESS_ALLOWED_CALLBACK_OBJECT 11
+#define ACE_TYPE_ACCESS_DENIED_CALLBACK_OBJECT 12
+#define ACE_TYPE_SYSTEM_AUDIT_CALLBACK 13
+#define ACE_TYPE_SYSTEM_ALARM_CALLBACK 14
+#define ACE_TYPE_SYSTEM_AUDIT_CALLBACK_OBJECT 15
+#define ACE_TYPE_SYSTEM_ALARM_CALLBACK_OBJECT 16
+#define ACE_TYPE_SYSTEM_MANDATORY_LABEL 17
static const value_string ace_type_vals[] = {
{ ACE_TYPE_ACCESS_ALLOWED, "Access Allowed"},
{ ACE_TYPE_ACCESS_DENIED, "Access Denied"},
@@ -2070,6 +2079,15 @@ static const value_string ace_type_vals[] = {
{ ACE_TYPE_ACCESS_DENIED_OBJECT, "Denied Object"},
{ ACE_TYPE_SYSTEM_AUDIT_OBJECT, "Audit Object"},
{ ACE_TYPE_SYSTEM_ALARM_OBJECT, "Alarm Object"},
+ { ACE_TYPE_ACCESS_ALLOWED_CALLBACK, "Allowed Callback"},
+ { ACE_TYPE_ACCESS_DENIED_CALLBACK, "Denied Callback"},
+ { ACE_TYPE_ACCESS_ALLOWED_CALLBACK_OBJECT, "Allowed Callback Object"},
+ { ACE_TYPE_ACCESS_DENIED_CALLBACK_OBJECT, "Denied Callback Object"},
+ { ACE_TYPE_SYSTEM_AUDIT_CALLBACK, "Audit Callback"},
+ { ACE_TYPE_SYSTEM_ALARM_CALLBACK, "Alarm Callback"},
+ { ACE_TYPE_SYSTEM_AUDIT_CALLBACK_OBJECT, "Audit Callback Object"},
+ { ACE_TYPE_SYSTEM_ALARM_CALLBACK_OBJECT, "Alarm Callback Object"},
+ { ACE_TYPE_SYSTEM_MANDATORY_LABEL, "Mandatory label"},
{ 0, NULL}
};
static const true_false_string tfs_ace_flags_object_inherit = {
@@ -2287,6 +2305,15 @@ dissect_nt_v2_ace(tvbuff_t *tvb, int offset, packet_info *pinfo,
case ACE_TYPE_ACCESS_DENIED_OBJECT:
case ACE_TYPE_SYSTEM_AUDIT_OBJECT:
case ACE_TYPE_SYSTEM_ALARM_OBJECT:
+ case ACE_TYPE_ACCESS_ALLOWED_CALLBACK:
+ case ACE_TYPE_ACCESS_DENIED_CALLBACK:
+ case ACE_TYPE_ACCESS_ALLOWED_CALLBACK_OBJECT:
+ case ACE_TYPE_ACCESS_DENIED_CALLBACK_OBJECT:
+ case ACE_TYPE_SYSTEM_AUDIT_CALLBACK:
+ case ACE_TYPE_SYSTEM_ALARM_CALLBACK:
+ case ACE_TYPE_SYSTEM_AUDIT_CALLBACK_OBJECT:
+ case ACE_TYPE_SYSTEM_ALARM_CALLBACK_OBJECT:
+ case ACE_TYPE_SYSTEM_MANDATORY_LABEL:
/* access mask */
offset = dissect_nt_access_mask(
tvb, offset, pinfo, tree, drep,
@@ -2298,6 +2325,10 @@ dissect_nt_v2_ace(tvbuff_t *tvb, int offset, packet_info *pinfo,
case ACE_TYPE_ACCESS_DENIED_OBJECT:
case ACE_TYPE_SYSTEM_AUDIT_OBJECT:
case ACE_TYPE_SYSTEM_ALARM_OBJECT:
+ case ACE_TYPE_ACCESS_ALLOWED_CALLBACK_OBJECT:
+ case ACE_TYPE_ACCESS_DENIED_CALLBACK_OBJECT:
+ case ACE_TYPE_SYSTEM_AUDIT_CALLBACK_OBJECT:
+ case ACE_TYPE_SYSTEM_ALARM_CALLBACK_OBJECT:
offset=dissect_nt_ace_object(tvb, offset, tree);
}