diff options
Diffstat (limited to 'epan/dissectors/packet-windows-common.c')
-rw-r--r-- | epan/dissectors/packet-windows-common.c | 72 |
1 files changed, 36 insertions, 36 deletions
diff --git a/epan/dissectors/packet-windows-common.c b/epan/dissectors/packet-windows-common.c index e0a67d2538..ab200ac2cf 100644 --- a/epan/dissectors/packet-windows-common.c +++ b/epan/dissectors/packet-windows-common.c @@ -2543,7 +2543,7 @@ proto_do_register_windows_common(int proto_smb) /* SIDs */ { &hf_nt_sid, - { "SID", "nt.sid", FT_STRING, BASE_DEC, + { "SID", "nt.sid", FT_STRING, BASE_NONE, NULL, 0, "SID: Security Identifier", HFILL }}, { &hf_nt_sid_revision, @@ -2617,171 +2617,171 @@ proto_do_register_windows_common(int proto_smb) { &hf_access_generic_read, { "Generic read", "nt.access_mask.generic_read", FT_BOOLEAN, 32, TFS(&flags_set_truth), - GENERIC_READ_ACCESS, "Generic read", HFILL }}, + GENERIC_READ_ACCESS, NULL, HFILL }}, { &hf_access_generic_write, { "Generic write", "nt.access_mask.generic_write", FT_BOOLEAN, 32, TFS(&flags_set_truth), - GENERIC_WRITE_ACCESS, "Generic write", HFILL }}, + GENERIC_WRITE_ACCESS, NULL, HFILL }}, { &hf_access_generic_execute, { "Generic execute", "nt.access_mask.generic_execute", FT_BOOLEAN, 32, TFS(&flags_set_truth), - GENERIC_EXECUTE_ACCESS, "Generic execute", HFILL }}, + GENERIC_EXECUTE_ACCESS, NULL, HFILL }}, { &hf_access_generic_all, { "Generic all", "nt.access_mask.generic_all", FT_BOOLEAN, 32, TFS(&flags_set_truth), - GENERIC_ALL_ACCESS, "Generic all", HFILL }}, + GENERIC_ALL_ACCESS, NULL, HFILL }}, { &hf_access_maximum_allowed, { "Maximum allowed", "nt.access_mask.maximum_allowed", FT_BOOLEAN, 32, TFS(&flags_set_truth), - MAXIMUM_ALLOWED_ACCESS, "Maximum allowed", HFILL }}, + MAXIMUM_ALLOWED_ACCESS, NULL, HFILL }}, { &hf_access_sacl, { "Access SACL", "nt.access_mask.access_sacl", FT_BOOLEAN, 32, TFS(&flags_set_truth), - ACCESS_SACL_ACCESS, "Access SACL", HFILL }}, + ACCESS_SACL_ACCESS, NULL, HFILL }}, { &hf_access_standard_read_control, { "Read control", "nt.access_mask.read_control", FT_BOOLEAN, 32, TFS(&flags_set_truth), - READ_CONTROL_ACCESS, "Read control", HFILL }}, + READ_CONTROL_ACCESS, NULL, HFILL }}, { &hf_access_standard_delete, { "Delete", "nt.access_mask.delete", FT_BOOLEAN, 32, TFS(&flags_set_truth), - DELETE_ACCESS, "Delete", HFILL }}, + DELETE_ACCESS, NULL, HFILL }}, { &hf_access_standard_synchronise, { "Synchronise", "nt.access_mask.synchronise", FT_BOOLEAN, 32, TFS(&flags_set_truth), - SYNCHRONIZE_ACCESS, "Synchronise", HFILL }}, + SYNCHRONIZE_ACCESS, NULL, HFILL }}, { &hf_access_standard_write_dac, { "Write DAC", "nt.access_mask.write_dac", FT_BOOLEAN, 32, TFS(&flags_set_truth), - WRITE_DAC_ACCESS, "Write DAC", HFILL }}, + WRITE_DAC_ACCESS, NULL, HFILL }}, { &hf_access_standard_write_owner, { "Write owner", "nt.access_mask.write_owner", FT_BOOLEAN, 32, TFS(&flags_set_truth), - WRITE_OWNER_ACCESS, "Write owner", HFILL }}, + WRITE_OWNER_ACCESS, NULL, HFILL }}, { &hf_access_specific_15, { "Specific access, bit 15", "nt.access_mask.specific_15", FT_BOOLEAN, 32, TFS(&flags_set_truth), - 0x8000, "Specific access, bit 15", HFILL }}, + 0x8000, NULL, HFILL }}, { &hf_access_specific_14, { "Specific access, bit 14", "nt.access_mask.specific_14", FT_BOOLEAN, 32, TFS(&flags_set_truth), - 0x4000, "Specific access, bit 14", HFILL }}, + 0x4000, NULL, HFILL }}, { &hf_access_specific_13, { "Specific access, bit 13", "nt.access_mask.specific_13", FT_BOOLEAN, 32, TFS(&flags_set_truth), - 0x2000, "Specific access, bit 13", HFILL }}, + 0x2000, NULL, HFILL }}, { &hf_access_specific_12, { "Specific access, bit 12", "nt.access_mask.specific_12", FT_BOOLEAN, 32, TFS(&flags_set_truth), - 0x1000, "Specific access, bit 12", HFILL }}, + 0x1000, NULL, HFILL }}, { &hf_access_specific_11, { "Specific access, bit 11", "nt.access_mask.specific_11", FT_BOOLEAN, 32, TFS(&flags_set_truth), - 0x0800, "Specific access, bit 11", HFILL }}, + 0x0800, NULL, HFILL }}, { &hf_access_specific_10, { "Specific access, bit 10", "nt.access_mask.specific_10", FT_BOOLEAN, 32, TFS(&flags_set_truth), - 0x0400, "Specific access, bit 10", HFILL }}, + 0x0400, NULL, HFILL }}, { &hf_access_specific_9, { "Specific access, bit 9", "nt.access_mask.specific_9", FT_BOOLEAN, 32, TFS(&flags_set_truth), - 0x0200, "Specific access, bit 9", HFILL }}, + 0x0200, NULL, HFILL }}, { &hf_access_specific_8, { "Specific access, bit 8", "nt.access_mask.specific_8", FT_BOOLEAN, 32, TFS(&flags_set_truth), - 0x0100, "Specific access, bit 8", HFILL }}, + 0x0100, NULL, HFILL }}, { &hf_access_specific_7, { "Specific access, bit 7", "nt.access_mask.specific_7", FT_BOOLEAN, 32, TFS(&flags_set_truth), - 0x0080, "Specific access, bit 7", HFILL }}, + 0x0080, NULL, HFILL }}, { &hf_access_specific_6, { "Specific access, bit 6", "nt.access_mask.specific_6", FT_BOOLEAN, 32, TFS(&flags_set_truth), - 0x0040, "Specific access, bit 6", HFILL }}, + 0x0040, NULL, HFILL }}, { &hf_access_specific_5, { "Specific access, bit 5", "nt.access_mask.specific_5", FT_BOOLEAN, 32, TFS(&flags_set_truth), - 0x0020, "Specific access, bit 5", HFILL }}, + 0x0020, NULL, HFILL }}, { &hf_access_specific_4, { "Specific access, bit 4", "nt.access_mask.specific_4", FT_BOOLEAN, 32, TFS(&flags_set_truth), - 0x0010, "Specific access, bit 4", HFILL }}, + 0x0010, NULL, HFILL }}, { &hf_access_specific_3, { "Specific access, bit 3", "nt.access_mask.specific_3", FT_BOOLEAN, 32, TFS(&flags_set_truth), - 0x0008, "Specific access, bit 3", HFILL }}, + 0x0008, NULL, HFILL }}, { &hf_access_specific_2, { "Specific access, bit 2", "nt.access_mask.specific_2", FT_BOOLEAN, 32, TFS(&flags_set_truth), - 0x0004, "Specific access, bit 2", HFILL }}, + 0x0004, NULL, HFILL }}, { &hf_access_specific_1, { "Specific access, bit 1", "nt.access_mask.specific_1", FT_BOOLEAN, 32, TFS(&flags_set_truth), - 0x0002, "Specific access, bit 1", HFILL }}, + 0x0002, NULL, HFILL }}, { &hf_access_specific_0, { "Specific access, bit 0", "nt.access_mask.specific_0", FT_BOOLEAN, 32, TFS(&flags_set_truth), - 0x0001, "Specific access, bit 0", HFILL }}, + 0x0001, NULL, HFILL }}, { &hf_nt_ace_flags_object_type_present, { "Object Type Present", "nt.ace.object.flags.object_type_present", FT_BOOLEAN, 32, TFS(&flags_set_truth), - 0x00000001, "", HFILL }}, + 0x00000001, NULL, HFILL }}, { &hf_nt_ace_flags_inherited_object_type_present, { "Inherited Object Type Present", "nt.ace.object.flags.inherited_object_type_present", FT_BOOLEAN, 32, TFS(&flags_set_truth), - 0x00000002, "", HFILL }}, + 0x00000002, NULL, HFILL }}, { &hf_nt_ace_guid, { "GUID", "nt.ace.object.guid", FT_GUID, BASE_NONE, - NULL, 0, "", HFILL }}, + NULL, 0, NULL, HFILL }}, { &hf_nt_ace_inherited_guid, { "Inherited GUID", "nt.ace.object.inherited_guid", FT_GUID, BASE_NONE, - NULL, 0, "", HFILL }}, + NULL, 0, NULL, HFILL }}, { &hf_nt_security_information_sacl, { "SACL", "nt.sec_info.sacl", FT_BOOLEAN, 32, - TFS(&flags_sec_info_sacl), 0x00000008, "", HFILL }}, + TFS(&flags_sec_info_sacl), 0x00000008, NULL, HFILL }}, { &hf_nt_security_information_dacl, { "DACL", "nt.sec_info.dacl", FT_BOOLEAN, 32, - TFS(&flags_sec_info_dacl), 0x00000004, "", HFILL }}, + TFS(&flags_sec_info_dacl), 0x00000004, NULL, HFILL }}, { &hf_nt_security_information_group, { "Group", "nt.sec_info.group", FT_BOOLEAN, 32, - TFS(&flags_sec_info_group), 0x00000002, "", HFILL }}, + TFS(&flags_sec_info_group), 0x00000002, NULL, HFILL }}, { &hf_nt_security_information_owner, { "Owner", "nt.sec_info.owner", FT_BOOLEAN, 32, - TFS(&flags_sec_info_owner), 0x00000001, "", HFILL }}, + TFS(&flags_sec_info_owner), 0x00000001, NULL, HFILL }}, }; |