Access mask constant 0x00800000 is not used by NT, SMB or Windows systems for anything. It does not gain access to SACLs. --- epan/dissectors/packet-windows-common.c | 7 ------- epan/dissectors/packet-windows-common.h | 1 - 2 files changed, 8 deletions(-)
diff --git a/epan/dissectors/packet-windows-common.c b/epan/dissectors/packet-windows-common.c index d198a98467d2..5709c6e7c31b 100644 --- a/epan/dissectors/packet-windows-common.c +++ b/epan/dissectors/packet-windows-common.c @@ -2198,7 +2198,6 @@ static int ett_nt_access_mask_generic; static int ett_nt_access_mask_standard; static int ett_nt_access_mask_specific; -static int hf_access_sacl; static int hf_access_maximum_allowed; static int hf_access_generic_read; static int hf_access_generic_write; @@ -2286,7 +2285,6 @@ dissect_nt_access_mask(tvbuff_t *tvb, int offset, packet_info *pinfo, &hf_access_generic_execute, &hf_access_generic_all, &hf_access_maximum_allowed, - &hf_access_sacl, NULL }; @@ -3363,11 +3361,6 @@ proto_do_register_windows_common(int proto_smb) FT_BOOLEAN, 32, TFS(&tfs_set_notset), MAXIMUM_ALLOWED_ACCESS, NULL, HFILL }}, - { &hf_access_sacl, - { "Access SACL", "nt.access_mask.access_sacl", - FT_BOOLEAN, 32, TFS(&tfs_set_notset), - ACCESS_SACL_ACCESS, NULL, HFILL }}, - { &hf_access_standard_read_control, { "Read control", "nt.access_mask.read_control", FT_BOOLEAN, 32, TFS(&tfs_set_notset), diff --git a/epan/dissectors/packet-windows-common.h b/epan/dissectors/packet-windows-common.h index 85da6b842519..aeac78fe161e 100644 --- a/epan/dissectors/packet-windows-common.h +++ b/epan/dissectors/packet-windows-common.h @@ -5748,7 +5748,6 @@ int dissect_nt_sid_ret_item(tvbuff_t *tvb, int offset, proto_tree *parent_tree, /* Misc/reserved */ -#define ACCESS_SACL_ACCESS 0x00800000 #define SYSTEM_SECURITY_ACCESS 0x01000000 #define MAXIMUM_ALLOWED_ACCESS 0x02000000 -- 2.20.1 _______________________________________________ Wireshark-dev mailing list -- wireshark-dev@wireshark.org To unsubscribe send an email to wireshark-dev-le...@wireshark.org