aboutsummaryrefslogtreecommitdiffstats
path: root/epan/dissectors/packet-windows-common.c
diff options
context:
space:
mode:
Diffstat (limited to 'epan/dissectors/packet-windows-common.c')
-rw-r--r--epan/dissectors/packet-windows-common.c72
1 files changed, 36 insertions, 36 deletions
diff --git a/epan/dissectors/packet-windows-common.c b/epan/dissectors/packet-windows-common.c
index e0a67d2538..ab200ac2cf 100644
--- a/epan/dissectors/packet-windows-common.c
+++ b/epan/dissectors/packet-windows-common.c
@@ -2543,7 +2543,7 @@ proto_do_register_windows_common(int proto_smb)
/* SIDs */
{ &hf_nt_sid,
- { "SID", "nt.sid", FT_STRING, BASE_DEC,
+ { "SID", "nt.sid", FT_STRING, BASE_NONE,
NULL, 0, "SID: Security Identifier", HFILL }},
{ &hf_nt_sid_revision,
@@ -2617,171 +2617,171 @@ proto_do_register_windows_common(int proto_smb)
{ &hf_access_generic_read,
{ "Generic read", "nt.access_mask.generic_read",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- GENERIC_READ_ACCESS, "Generic read", HFILL }},
+ GENERIC_READ_ACCESS, NULL, HFILL }},
{ &hf_access_generic_write,
{ "Generic write", "nt.access_mask.generic_write",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- GENERIC_WRITE_ACCESS, "Generic write", HFILL }},
+ GENERIC_WRITE_ACCESS, NULL, HFILL }},
{ &hf_access_generic_execute,
{ "Generic execute", "nt.access_mask.generic_execute",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- GENERIC_EXECUTE_ACCESS, "Generic execute", HFILL }},
+ GENERIC_EXECUTE_ACCESS, NULL, HFILL }},
{ &hf_access_generic_all,
{ "Generic all", "nt.access_mask.generic_all",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- GENERIC_ALL_ACCESS, "Generic all", HFILL }},
+ GENERIC_ALL_ACCESS, NULL, HFILL }},
{ &hf_access_maximum_allowed,
{ "Maximum allowed", "nt.access_mask.maximum_allowed",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- MAXIMUM_ALLOWED_ACCESS, "Maximum allowed", HFILL }},
+ MAXIMUM_ALLOWED_ACCESS, NULL, HFILL }},
{ &hf_access_sacl,
{ "Access SACL", "nt.access_mask.access_sacl",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- ACCESS_SACL_ACCESS, "Access SACL", HFILL }},
+ ACCESS_SACL_ACCESS, NULL, HFILL }},
{ &hf_access_standard_read_control,
{ "Read control", "nt.access_mask.read_control",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- READ_CONTROL_ACCESS, "Read control", HFILL }},
+ READ_CONTROL_ACCESS, NULL, HFILL }},
{ &hf_access_standard_delete,
{ "Delete", "nt.access_mask.delete",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- DELETE_ACCESS, "Delete", HFILL }},
+ DELETE_ACCESS, NULL, HFILL }},
{ &hf_access_standard_synchronise,
{ "Synchronise", "nt.access_mask.synchronise",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- SYNCHRONIZE_ACCESS, "Synchronise", HFILL }},
+ SYNCHRONIZE_ACCESS, NULL, HFILL }},
{ &hf_access_standard_write_dac,
{ "Write DAC", "nt.access_mask.write_dac",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- WRITE_DAC_ACCESS, "Write DAC", HFILL }},
+ WRITE_DAC_ACCESS, NULL, HFILL }},
{ &hf_access_standard_write_owner,
{ "Write owner", "nt.access_mask.write_owner",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- WRITE_OWNER_ACCESS, "Write owner", HFILL }},
+ WRITE_OWNER_ACCESS, NULL, HFILL }},
{ &hf_access_specific_15,
{ "Specific access, bit 15", "nt.access_mask.specific_15",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- 0x8000, "Specific access, bit 15", HFILL }},
+ 0x8000, NULL, HFILL }},
{ &hf_access_specific_14,
{ "Specific access, bit 14", "nt.access_mask.specific_14",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- 0x4000, "Specific access, bit 14", HFILL }},
+ 0x4000, NULL, HFILL }},
{ &hf_access_specific_13,
{ "Specific access, bit 13", "nt.access_mask.specific_13",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- 0x2000, "Specific access, bit 13", HFILL }},
+ 0x2000, NULL, HFILL }},
{ &hf_access_specific_12,
{ "Specific access, bit 12", "nt.access_mask.specific_12",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- 0x1000, "Specific access, bit 12", HFILL }},
+ 0x1000, NULL, HFILL }},
{ &hf_access_specific_11,
{ "Specific access, bit 11", "nt.access_mask.specific_11",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- 0x0800, "Specific access, bit 11", HFILL }},
+ 0x0800, NULL, HFILL }},
{ &hf_access_specific_10,
{ "Specific access, bit 10", "nt.access_mask.specific_10",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- 0x0400, "Specific access, bit 10", HFILL }},
+ 0x0400, NULL, HFILL }},
{ &hf_access_specific_9,
{ "Specific access, bit 9", "nt.access_mask.specific_9",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- 0x0200, "Specific access, bit 9", HFILL }},
+ 0x0200, NULL, HFILL }},
{ &hf_access_specific_8,
{ "Specific access, bit 8", "nt.access_mask.specific_8",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- 0x0100, "Specific access, bit 8", HFILL }},
+ 0x0100, NULL, HFILL }},
{ &hf_access_specific_7,
{ "Specific access, bit 7", "nt.access_mask.specific_7",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- 0x0080, "Specific access, bit 7", HFILL }},
+ 0x0080, NULL, HFILL }},
{ &hf_access_specific_6,
{ "Specific access, bit 6", "nt.access_mask.specific_6",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- 0x0040, "Specific access, bit 6", HFILL }},
+ 0x0040, NULL, HFILL }},
{ &hf_access_specific_5,
{ "Specific access, bit 5", "nt.access_mask.specific_5",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- 0x0020, "Specific access, bit 5", HFILL }},
+ 0x0020, NULL, HFILL }},
{ &hf_access_specific_4,
{ "Specific access, bit 4", "nt.access_mask.specific_4",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- 0x0010, "Specific access, bit 4", HFILL }},
+ 0x0010, NULL, HFILL }},
{ &hf_access_specific_3,
{ "Specific access, bit 3", "nt.access_mask.specific_3",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- 0x0008, "Specific access, bit 3", HFILL }},
+ 0x0008, NULL, HFILL }},
{ &hf_access_specific_2,
{ "Specific access, bit 2", "nt.access_mask.specific_2",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- 0x0004, "Specific access, bit 2", HFILL }},
+ 0x0004, NULL, HFILL }},
{ &hf_access_specific_1,
{ "Specific access, bit 1", "nt.access_mask.specific_1",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- 0x0002, "Specific access, bit 1", HFILL }},
+ 0x0002, NULL, HFILL }},
{ &hf_access_specific_0,
{ "Specific access, bit 0", "nt.access_mask.specific_0",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- 0x0001, "Specific access, bit 0", HFILL }},
+ 0x0001, NULL, HFILL }},
{ &hf_nt_ace_flags_object_type_present,
{ "Object Type Present", "nt.ace.object.flags.object_type_present",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- 0x00000001, "", HFILL }},
+ 0x00000001, NULL, HFILL }},
{ &hf_nt_ace_flags_inherited_object_type_present,
{ "Inherited Object Type Present", "nt.ace.object.flags.inherited_object_type_present",
FT_BOOLEAN, 32, TFS(&flags_set_truth),
- 0x00000002, "", HFILL }},
+ 0x00000002, NULL, HFILL }},
{ &hf_nt_ace_guid,
{ "GUID", "nt.ace.object.guid", FT_GUID, BASE_NONE,
- NULL, 0, "", HFILL }},
+ NULL, 0, NULL, HFILL }},
{ &hf_nt_ace_inherited_guid,
{ "Inherited GUID", "nt.ace.object.inherited_guid", FT_GUID, BASE_NONE,
- NULL, 0, "", HFILL }},
+ NULL, 0, NULL, HFILL }},
{ &hf_nt_security_information_sacl,
{ "SACL", "nt.sec_info.sacl", FT_BOOLEAN, 32,
- TFS(&flags_sec_info_sacl), 0x00000008, "", HFILL }},
+ TFS(&flags_sec_info_sacl), 0x00000008, NULL, HFILL }},
{ &hf_nt_security_information_dacl,
{ "DACL", "nt.sec_info.dacl", FT_BOOLEAN, 32,
- TFS(&flags_sec_info_dacl), 0x00000004, "", HFILL }},
+ TFS(&flags_sec_info_dacl), 0x00000004, NULL, HFILL }},
{ &hf_nt_security_information_group,
{ "Group", "nt.sec_info.group", FT_BOOLEAN, 32,
- TFS(&flags_sec_info_group), 0x00000002, "", HFILL }},
+ TFS(&flags_sec_info_group), 0x00000002, NULL, HFILL }},
{ &hf_nt_security_information_owner,
{ "Owner", "nt.sec_info.owner", FT_BOOLEAN, 32,
- TFS(&flags_sec_info_owner), 0x00000001, "", HFILL }},
+ TFS(&flags_sec_info_owner), 0x00000001, NULL, HFILL }},
};