dw_fluffos_v2/
dw_fluffos_v2/fluffos-2.9-ds2.05/
dw_fluffos_v2/fluffos-2.9-ds2.05/ChangeLog.old/
dw_fluffos_v2/fluffos-2.9-ds2.05/Win32/
dw_fluffos_v2/fluffos-2.9-ds2.05/compat/
dw_fluffos_v2/fluffos-2.9-ds2.05/compat/simuls/
dw_fluffos_v2/fluffos-2.9-ds2.05/include/
dw_fluffos_v2/fluffos-2.9-ds2.05/testsuite/
dw_fluffos_v2/fluffos-2.9-ds2.05/testsuite/clone/
dw_fluffos_v2/fluffos-2.9-ds2.05/testsuite/command/
dw_fluffos_v2/fluffos-2.9-ds2.05/testsuite/data/
dw_fluffos_v2/fluffos-2.9-ds2.05/testsuite/etc/
dw_fluffos_v2/fluffos-2.9-ds2.05/testsuite/include/
dw_fluffos_v2/fluffos-2.9-ds2.05/testsuite/inherit/
dw_fluffos_v2/fluffos-2.9-ds2.05/testsuite/inherit/master/
dw_fluffos_v2/fluffos-2.9-ds2.05/testsuite/log/
dw_fluffos_v2/fluffos-2.9-ds2.05/testsuite/single/
dw_fluffos_v2/fluffos-2.9-ds2.05/testsuite/single/tests/compiler/
dw_fluffos_v2/fluffos-2.9-ds2.05/testsuite/single/tests/efuns/
dw_fluffos_v2/fluffos-2.9-ds2.05/testsuite/single/tests/operators/
dw_fluffos_v2/fluffos-2.9-ds2.05/testsuite/u/
dw_fluffos_v2/fluffos-2.9-ds2.05/tmp/
dw_fluffos_v2/fluffos-2.9-ds2.05/windows/
dw_fluffos_v2/lib/
dw_fluffos_v2/lib/binaries/cmds/
dw_fluffos_v2/lib/binaries/cmds/creator/
dw_fluffos_v2/lib/binaries/cmds/living/
dw_fluffos_v2/lib/binaries/cmds/player/
dw_fluffos_v2/lib/binaries/d/admin/obj/
dw_fluffos_v2/lib/binaries/d/liaison/
dw_fluffos_v2/lib/binaries/global/virtual/
dw_fluffos_v2/lib/binaries/global/virtual/setup_compiler/
dw_fluffos_v2/lib/binaries/obj/handlers/autodoc/
dw_fluffos_v2/lib/binaries/obj/handlers/terrain_things/
dw_fluffos_v2/lib/binaries/obj/misc/
dw_fluffos_v2/lib/binaries/obj/misc/buckets/
dw_fluffos_v2/lib/binaries/obj/monster/
dw_fluffos_v2/lib/binaries/obj/reactions/
dw_fluffos_v2/lib/binaries/obj/reagents/
dw_fluffos_v2/lib/binaries/secure/cmds/creator/
dw_fluffos_v2/lib/binaries/secure/master/
dw_fluffos_v2/lib/binaries/std/
dw_fluffos_v2/lib/binaries/std/dom/
dw_fluffos_v2/lib/binaries/std/effects/object/
dw_fluffos_v2/lib/binaries/std/guilds/
dw_fluffos_v2/lib/binaries/std/languages/
dw_fluffos_v2/lib/binaries/std/races/
dw_fluffos_v2/lib/binaries/std/room/
dw_fluffos_v2/lib/binaries/std/room/basic/
dw_fluffos_v2/lib/binaries/std/shops/
dw_fluffos_v2/lib/binaries/std/shops/inherit/
dw_fluffos_v2/lib/binaries/www/
dw_fluffos_v2/lib/cmds/guild-race/
dw_fluffos_v2/lib/cmds/guild-race/crafts/
dw_fluffos_v2/lib/cmds/guild-race/other/
dw_fluffos_v2/lib/cmds/playtester/
dw_fluffos_v2/lib/cmds/playtester/senior/
dw_fluffos_v2/lib/d/admin/
dw_fluffos_v2/lib/d/admin/log/
dw_fluffos_v2/lib/d/admin/mapper/31-10-01/mapmaker/event/
dw_fluffos_v2/lib/d/admin/meetings/
dw_fluffos_v2/lib/d/admin/obj/
dw_fluffos_v2/lib/d/admin/room/we_care/
dw_fluffos_v2/lib/d/admin/save/
dw_fluffos_v2/lib/d/dist/
dw_fluffos_v2/lib/d/dist/mtf/
dw_fluffos_v2/lib/d/dist/pumpkin/
dw_fluffos_v2/lib/d/dist/pumpkin/chars/
dw_fluffos_v2/lib/d/dist/pumpkin/desert/
dw_fluffos_v2/lib/d/dist/pumpkin/gumboot/
dw_fluffos_v2/lib/d/dist/pumpkin/hospital/
dw_fluffos_v2/lib/d/dist/pumpkin/inherit/
dw_fluffos_v2/lib/d/dist/pumpkin/map/
dw_fluffos_v2/lib/d/dist/pumpkin/plain/
dw_fluffos_v2/lib/d/dist/pumpkin/pumpkin/
dw_fluffos_v2/lib/d/dist/pumpkin/save/
dw_fluffos_v2/lib/d/dist/pumpkin/squash/
dw_fluffos_v2/lib/d/dist/pumpkin/terrain/
dw_fluffos_v2/lib/d/dist/pumpkin/woods/
dw_fluffos_v2/lib/d/dist/start/
dw_fluffos_v2/lib/d/learning/TinyTown/buildings/
dw_fluffos_v2/lib/d/learning/TinyTown/map/
dw_fluffos_v2/lib/d/learning/TinyTown/roads/
dw_fluffos_v2/lib/d/learning/add_command/
dw_fluffos_v2/lib/d/learning/arms_and_weps/
dw_fluffos_v2/lib/d/learning/chars/
dw_fluffos_v2/lib/d/learning/cutnpaste/
dw_fluffos_v2/lib/d/learning/examples/npcs/
dw_fluffos_v2/lib/d/learning/examples/player_houses/npcs/
dw_fluffos_v2/lib/d/learning/examples/terrain_map/basic/
dw_fluffos_v2/lib/d/learning/functions/
dw_fluffos_v2/lib/d/learning/handlers/
dw_fluffos_v2/lib/d/learning/help_topics/npcs/
dw_fluffos_v2/lib/d/learning/help_topics/objects/
dw_fluffos_v2/lib/d/learning/help_topics/rcs_demo/
dw_fluffos_v2/lib/d/learning/help_topics/rooms/
dw_fluffos_v2/lib/d/learning/help_topics/rooms/crowd/
dw_fluffos_v2/lib/d/learning/help_topics/rooms/situations/
dw_fluffos_v2/lib/d/learning/items/
dw_fluffos_v2/lib/d/learning/save/
dw_fluffos_v2/lib/d/liaison/
dw_fluffos_v2/lib/d/liaison/NEWBIE/doc/
dw_fluffos_v2/lib/d/liaison/NEWBIE/save/oldlog/
dw_fluffos_v2/lib/db/
dw_fluffos_v2/lib/doc/
dw_fluffos_v2/lib/doc/creator/
dw_fluffos_v2/lib/doc/creator/autodoc/include/reaction/
dw_fluffos_v2/lib/doc/creator/autodoc/include/ritual_system/
dw_fluffos_v2/lib/doc/creator/autodoc/include/talker/
dw_fluffos_v2/lib/doc/creator/autodoc/include/terrain_map/
dw_fluffos_v2/lib/doc/creator/autodoc/obj/baggage/
dw_fluffos_v2/lib/doc/creator/autodoc/obj/clock/
dw_fluffos_v2/lib/doc/creator/autodoc/obj/clothing/
dw_fluffos_v2/lib/doc/creator/autodoc/obj/cont_save/
dw_fluffos_v2/lib/doc/creator/autodoc/obj/corpse/
dw_fluffos_v2/lib/doc/creator/autodoc/obj/money/
dw_fluffos_v2/lib/doc/creator/autodoc/obj/monster/
dw_fluffos_v2/lib/doc/creator/autodoc/obj/scabbard/
dw_fluffos_v2/lib/doc/creator/autodoc/obj/service_provider/
dw_fluffos_v2/lib/doc/creator/autodoc/obj/state_changer/
dw_fluffos_v2/lib/doc/creator/autodoc/obj/wand/
dw_fluffos_v2/lib/doc/creator/autodoc/std/book_dir/
dw_fluffos_v2/lib/doc/creator/autodoc/std/key/
dw_fluffos_v2/lib/doc/creator/autodoc/std/learning/
dw_fluffos_v2/lib/doc/creator/autodoc/std/map/
dw_fluffos_v2/lib/doc/creator/autodoc/std/race/
dw_fluffos_v2/lib/doc/creator/autodoc/std/weapon_logic/
dw_fluffos_v2/lib/doc/creator/files/
dw_fluffos_v2/lib/doc/creator/policy/
dw_fluffos_v2/lib/doc/creator/room/
dw_fluffos_v2/lib/doc/effects/
dw_fluffos_v2/lib/doc/ideas/
dw_fluffos_v2/lib/doc/known_command/
dw_fluffos_v2/lib/doc/lpc/basic_manual/
dw_fluffos_v2/lib/doc/lpc/intermediate/
dw_fluffos_v2/lib/doc/new/add_command/
dw_fluffos_v2/lib/doc/new/handlers/
dw_fluffos_v2/lib/doc/new/living/
dw_fluffos_v2/lib/doc/new/living/race/
dw_fluffos_v2/lib/doc/new/living/spells/
dw_fluffos_v2/lib/doc/new/player/
dw_fluffos_v2/lib/doc/new/room/guild/
dw_fluffos_v2/lib/doc/new/room/outside/
dw_fluffos_v2/lib/doc/new/room/storeroom/
dw_fluffos_v2/lib/doc/object/
dw_fluffos_v2/lib/doc/playtesters/
dw_fluffos_v2/lib/doc/policy/
dw_fluffos_v2/lib/doc/weapons/
dw_fluffos_v2/lib/global/handlers/
dw_fluffos_v2/lib/global/virtual/setup_compiler/
dw_fluffos_v2/lib/include/
dw_fluffos_v2/lib/include/cmds/
dw_fluffos_v2/lib/include/effects/
dw_fluffos_v2/lib/include/npc/
dw_fluffos_v2/lib/include/shops/
dw_fluffos_v2/lib/net/daemon/chars/
dw_fluffos_v2/lib/net/inherit/
dw_fluffos_v2/lib/net/intermud3/
dw_fluffos_v2/lib/net/intermud3/services/
dw_fluffos_v2/lib/net/obj/
dw_fluffos_v2/lib/net/save/
dw_fluffos_v2/lib/net/smnmp/
dw_fluffos_v2/lib/net/snmp/
dw_fluffos_v2/lib/obj/amulets/
dw_fluffos_v2/lib/obj/b_day/
dw_fluffos_v2/lib/obj/examples/
dw_fluffos_v2/lib/obj/food/alcohol/
dw_fluffos_v2/lib/obj/food/chocolates/
dw_fluffos_v2/lib/obj/food/fruits/
dw_fluffos_v2/lib/obj/food/meat/
dw_fluffos_v2/lib/obj/food/nuts/
dw_fluffos_v2/lib/obj/food/seafood/
dw_fluffos_v2/lib/obj/food/vegetables/
dw_fluffos_v2/lib/obj/fungi/
dw_fluffos_v2/lib/obj/furnitures/artwork/
dw_fluffos_v2/lib/obj/furnitures/bathroom/
dw_fluffos_v2/lib/obj/furnitures/beds/
dw_fluffos_v2/lib/obj/furnitures/cabinets/
dw_fluffos_v2/lib/obj/furnitures/chairs/
dw_fluffos_v2/lib/obj/furnitures/chests/
dw_fluffos_v2/lib/obj/furnitures/clocks/
dw_fluffos_v2/lib/obj/furnitures/crockery/
dw_fluffos_v2/lib/obj/furnitures/cupboards/
dw_fluffos_v2/lib/obj/furnitures/cushions/
dw_fluffos_v2/lib/obj/furnitures/fake_plants/
dw_fluffos_v2/lib/obj/furnitures/lamps/
dw_fluffos_v2/lib/obj/furnitures/mirrors/
dw_fluffos_v2/lib/obj/furnitures/outdoor/
dw_fluffos_v2/lib/obj/furnitures/safes/
dw_fluffos_v2/lib/obj/furnitures/shelves/
dw_fluffos_v2/lib/obj/furnitures/sideboards/
dw_fluffos_v2/lib/obj/furnitures/sofas/
dw_fluffos_v2/lib/obj/furnitures/stoves/
dw_fluffos_v2/lib/obj/furnitures/tables/
dw_fluffos_v2/lib/obj/furnitures/wardrobes/
dw_fluffos_v2/lib/obj/handlers/
dw_fluffos_v2/lib/obj/handlers/autodoc/
dw_fluffos_v2/lib/obj/jewellery/anklets/
dw_fluffos_v2/lib/obj/jewellery/bracelets/
dw_fluffos_v2/lib/obj/jewellery/earrings/
dw_fluffos_v2/lib/obj/jewellery/misc/
dw_fluffos_v2/lib/obj/jewellery/necklaces/
dw_fluffos_v2/lib/obj/jewellery/rings/
dw_fluffos_v2/lib/obj/media/
dw_fluffos_v2/lib/obj/misc/buckets/
dw_fluffos_v2/lib/obj/misc/jars/
dw_fluffos_v2/lib/obj/misc/papers/
dw_fluffos_v2/lib/obj/misc/player_shop/
dw_fluffos_v2/lib/obj/misc/shops/
dw_fluffos_v2/lib/obj/misc/traps/
dw_fluffos_v2/lib/obj/monster/
dw_fluffos_v2/lib/obj/monster/godmother/
dw_fluffos_v2/lib/obj/monster/transport/
dw_fluffos_v2/lib/obj/plants/inherit/
dw_fluffos_v2/lib/obj/potions/
dw_fluffos_v2/lib/open/boards/
dw_fluffos_v2/lib/save/autodoc/
dw_fluffos_v2/lib/save/bank_accounts/
dw_fluffos_v2/lib/save/boards/frog/
dw_fluffos_v2/lib/save/books/bed_catalog/
dw_fluffos_v2/lib/save/creators/
dw_fluffos_v2/lib/save/mail/
dw_fluffos_v2/lib/save/mail/p/
dw_fluffos_v2/lib/save/soul/data/
dw_fluffos_v2/lib/save/tasks/
dw_fluffos_v2/lib/save/vaults/
dw_fluffos_v2/lib/secure/cmds/lord/
dw_fluffos_v2/lib/secure/config/
dw_fluffos_v2/lib/secure/items/
dw_fluffos_v2/lib/secure/player/
dw_fluffos_v2/lib/soul/
dw_fluffos_v2/lib/soul/i/
dw_fluffos_v2/lib/soul/j/
dw_fluffos_v2/lib/soul/k/
dw_fluffos_v2/lib/soul/o/
dw_fluffos_v2/lib/soul/q/
dw_fluffos_v2/lib/soul/to_approve/
dw_fluffos_v2/lib/soul/u/
dw_fluffos_v2/lib/soul/v/
dw_fluffos_v2/lib/soul/wish_list/
dw_fluffos_v2/lib/soul/y/
dw_fluffos_v2/lib/soul/z/
dw_fluffos_v2/lib/std/creator/
dw_fluffos_v2/lib/std/effects/
dw_fluffos_v2/lib/std/effects/attached/
dw_fluffos_v2/lib/std/effects/external/
dw_fluffos_v2/lib/std/effects/fighting/
dw_fluffos_v2/lib/std/effects/other/
dw_fluffos_v2/lib/std/environ/
dw_fluffos_v2/lib/std/guilds/
dw_fluffos_v2/lib/std/hospital/
dw_fluffos_v2/lib/std/house/
dw_fluffos_v2/lib/std/house/onebedhouse/
dw_fluffos_v2/lib/std/house/onebedhut/
dw_fluffos_v2/lib/std/house/tworoomflat/
dw_fluffos_v2/lib/std/languages/
dw_fluffos_v2/lib/std/liquids/
dw_fluffos_v2/lib/std/nationality/
dw_fluffos_v2/lib/std/nationality/accents/
dw_fluffos_v2/lib/std/nationality/accents/national/
dw_fluffos_v2/lib/std/nationality/accents/regional/
dw_fluffos_v2/lib/std/npc/goals/
dw_fluffos_v2/lib/std/npc/goals/basic/
dw_fluffos_v2/lib/std/npc/goals/misc/
dw_fluffos_v2/lib/std/npc/inherit/
dw_fluffos_v2/lib/std/npc/plans/
dw_fluffos_v2/lib/std/npc/plans/basic/
dw_fluffos_v2/lib/std/outsides/
dw_fluffos_v2/lib/std/races/shadows/
dw_fluffos_v2/lib/std/room/basic/topography/
dw_fluffos_v2/lib/std/room/controller/
dw_fluffos_v2/lib/std/room/controller/topography/
dw_fluffos_v2/lib/std/room/furniture/games/
dw_fluffos_v2/lib/std/room/furniture/inherit/
dw_fluffos_v2/lib/std/room/inherit/carriage/
dw_fluffos_v2/lib/std/room/inherit/topography/
dw_fluffos_v2/lib/std/room/punishments/
dw_fluffos_v2/lib/std/room/topography/area/
dw_fluffos_v2/lib/std/room/topography/iroom/
dw_fluffos_v2/lib/std/room/topography/milestone/
dw_fluffos_v2/lib/std/shadows/
dw_fluffos_v2/lib/std/shadows/attached/
dw_fluffos_v2/lib/std/shadows/curses/
dw_fluffos_v2/lib/std/shadows/disease/
dw_fluffos_v2/lib/std/shadows/fighting/
dw_fluffos_v2/lib/std/shadows/room/
dw_fluffos_v2/lib/std/shops/controllers/
dw_fluffos_v2/lib/std/shops/objs/
dw_fluffos_v2/lib/std/shops/player_shop/
dw_fluffos_v2/lib/std/shops/player_shop/office_code/
dw_fluffos_v2/lib/std/socket/
dw_fluffos_v2/lib/www/
dw_fluffos_v2/lib/www/external/autodoc/
dw_fluffos_v2/lib/www/external/java/telnet/Documentation/
dw_fluffos_v2/lib/www/external/java/telnet/Documentation/images/
dw_fluffos_v2/lib/www/external/java/telnet/examples/
dw_fluffos_v2/lib/www/external/java/telnet/tools/
dw_fluffos_v2/lib/www/pics/
dw_fluffos_v2/lib/www/secure/creator/
dw_fluffos_v2/lib/www/secure/editors/
dw_fluffos_v2/lib/www/secure/survey_results/
dw_fluffos_v2/win32/
/*  -*- LPC -*-  */
/*
 * $Id: permission.c,v 1.12 2003/03/21 02:25:20 ceres Exp $
 */

int add_senior( string word ) {
   if ( !sizeof( filter( previous_object( -1 ), (: interactive( $1 ) :) ) ) ) {
      user_event( "inform", this_player()->query_name() +
            " illegally attempted to call add_senior( "+ word +
            " )", "cheat" );
      unguarded((: write_file, "/log/CHEAT", ctime( time() ) +
            ": illegal attempt to call add_senior( "+ word +
            " ).\n"+ back_trace() :));
      return 0;
   }
   if ( PLAYER_HANDLER->test_user( word ) &&
        query_leader( previous_object(-1) ) ) {
      write_file( "/log/PROMOTIONS", ctime( time() ) +": "+ word +
            " was promoted to Senior by "+ geteuid( this_interactive() ) +
            "\n" );
      if ( ( positions[ word ] != TRUSTEE ) &&
            ( positions[ word ] != DIRECTOR ) )
         positions[ word ] = SENIOR;
      save_object( "/secure/master" );
      return 1;
   }
   return 0;
} /* add_senior() */

int remove_senior(string str) {
  if (!sizeof(filter(previous_object(-1), (: interactive($1) :)))) {
    user_event( "inform", this_player()->query_cap_name()+
                " illegally attempted to call remove_senior("+str+")",
                "cheat");
    unguarded((: write_file, "/log/CHEAT", ctime(time())+": Illegal attempt "
                 "to call remove_senior("+str+").\nBacktrace: "+
                 back_trace() :));
    return 0;
  }
  if (query_leader(previous_object(-1)) &&
      positions[str] == SENIOR) {
    write_file("/log/DEMOTIONS", ctime(time())+": "+str+
               " was demoted from Senior by "+geteuid(this_interactive())+
               "\n");
    map_delete(positions, str);
    save_object("/secure/master");
    return 1;
  }
  return 0;
} /* remove_senior() */

int add_director(string str) {
  if (!sizeof(filter(previous_object(-1), (: interactive($1) :)))) {
    user_event( "inform", this_player()->query_cap_name()+
                " illegally attempted to call add_director("+str+")",
                "cheat");
    unguarded((: write_file, "/log/CHEAT", ctime(time())+
               ": Illegal attempt to call add_director("+str+
               ").\nBacktrace: "+ back_trace() :));
    return 0;
  }
  if (PLAYER_HANDLER->test_user(str) &&
      query_trustee(previous_object(-1))) {
    write_file("/log/PROMOTIONS", ctime(time())+": "+str+
               " was promoted to Leader by "+ geteuid(this_interactive())+
               "\n");
    if (positions[str] != TRUSTEE)
      positions[str] = DIRECTOR;
    save_object("/secure/master");
    return 1;
  }
  return 0;
}

int remove_director(string str) {
  if (!sizeof(filter(previous_object(-1), (: interactive($1) :)))) {
    user_event( "inform", this_player()->query_cap_name()+
                " illegally attempted to call remove_director("+str+")",
                "cheat");
    unguarded((: write_file, "/log/CHEAT", ctime(time())+
               ": Illegal attempt to call remove_director("+str+
               ").\nBacktrace: "+ back_trace() :));
    return 0;
  }
  if (query_trustee(previous_object(-1)) &&
      positions[str] == DIRECTOR) {
    write_file("/log/DEMOTIONS", ctime(time())+": "+str+
               " was demoted from Leader by "+geteuid(this_interactive())+
               "\n");
    map_delete(positions, str);
    save_object("/secure/master");
    return 1;
  }
  return 0;
}

int add_trustee(string str) {
  if (!sizeof(filter(previous_object(-1), (: interactive($1) :)))) {
    user_event( "inform", this_player()->query_cap_name()+
                " illegally attempted to call add_tristee("+str+")",
                "cheat");
    unguarded((: write_file, "/log/CHEAT", ctime(time())+": Illegal attempt "
                 "to call add_trustee("+str+").\nBacktrace: "+
                 back_trace() :));
    return 0;
  }
  if (PLAYER_HANDLER->test_user(str) &&
      query_trustee(previous_object(-1))) {
    write_file("/log/PROMOTIONS", ctime(time())+": "+str+
               " was promoted to Administrator by "+
               geteuid(this_interactive())+"\n");
    positions[str] = TRUSTEE;
    save_object("/secure/master");
    return 1;
  }
  return 0;
}

int remove_trustee(string str) {
  if (!sizeof(filter(previous_object(-1), (: interactive($1) :)))) {
    user_event( "inform", this_player()->query_cap_name()+
                " illegally attempted to call remove_trustee("+str+")",
                "cheat");
    unguarded((: write_file, "/log/CHEAT", ctime(time())+": Illegal attempt "
                 "to call remove_trustee("+str+").\nBacktrace: "+
                 back_trace() :));
    return 0;
  }
  if (query_trustee(previous_object(-1)) &&
      positions[str] == TRUSTEE) {
    write_file("/log/DEMOTIONS", ctime(time())+": "+str+
               " was demoted from Administrator by "+
               geteuid(this_interactive())+"\n");
    map_delete(positions, str);
    save_object("/secure/master");
    return 1;
  }
  return 0;
}

varargs mixed creator_file(string path, int author);

nomask protected int check_domain(mixed ob, string func, string path, int mask) {
  object master_ob;
  string master, domain, *bits = explode(path, "/") - ({ "", "." });
  int ret;

  if (sizeof(bits) < 2)
    return (mask & READ_MASK);
  
  domain = bits[1];
  if (objectp(ob))
    ob = geteuid(ob);

  /* Is it the domain itself? */
  if (ob == creator_file(path))
    return 1;

  /* Check the domain master object, if any. */
  master = "/d/" + domain + "/master";
  if (!(master_ob = find_object(master)) && checked_master[master]) {
    return (mask & READ_MASK);
  }
  if (!master_ob && !checked_master[master] &&
      catch(master_ob = load_object(master))) {
    checked_master[master] = 1;
  }
  if (master_ob) {
    ret = master_ob->check_permission(ob, bits, mask);
    if (ret == -1) {
      /* This means the path was locked. We deny access. */
      return 0;
    }
    /* Senior Creators have access to the domains, except when explicitly
       locked. */
    if ((sizeof(bits) > 2) && (bits[2] != "master.c") &&
        (bits[2] != "master.o") && (bits[2] != "master") && query_senior(ob)) {
      return 1;
    }
    
    return (ret || (mask & READ_MASK?master_ob->valid_read(bits, ob, func):
            master_ob->valid_write(bits, ob, func)));
  }
  return (mask & READ_MASK);
}

nomask protected int check_creator(mixed ob, string func, string path, int mask) {
  string master, creator, *bits = explode(path, "/") - ({ "", "." });
  object master_ob;

  if (sizeof(bits) < 2)
    return (mask & READ_MASK);
  
  creator = bits[1];
  if (objectp(ob))
    ob = geteuid(ob);

  /* Creators are not allowed to give out write perms to their dirs using
     the granting system, they should write their own master object if
     they want to do this. */
  /* Err, why this?  Why not use the standard system?
   * - pf
   */
  if (mask & GRANT_MASK) {
    if (ob == creator) {
      return 1;
    } else {
      return 0;
    }
  }

  /* The mbox file is private. Only the owner can read it. */
  if ((mask & READ_MASK) && sizeof(bits) >= 3 && bits[2] == "mbox" &&
      file_size(sprintf("/w/%s/mbox", bits[1])) != -2)
    return ob == bits[1];

  /* Reading is allowed in creator dirs, and writing is allowed if it's
     the owner doing it. */
  if ((mask & READ_MASK) || (ob == creator_file(path)))
    return 1;

  /* Check the master object, if any. */
  master = "/w/" + creator + "/master";
  if (!(master_ob = find_object(master)) && checked_master[master])
    return 0;
  if (!master_ob && !checked_master[master] &&
      catch(master_ob = load_object(master)))
    checked_master[master] = 1;
  if (master_ob)
    return (master_ob->check_permission(ob, bits, mask) ||
            master_ob->valid_write(bits, ob, func));
  return 0;
}

/* Permision handling stuff. Originally coded by who knows who.
   This now uses a system based on the previous_object() stack.
   Coded by Turrican, based on code in the Nightmare mudlib.
   - First working version on 7-10-96
   - Hacked some more on 4-4-97 */
private int check_permission(mixed ob, string func, string path,
                             mapping perms, int mask) {
  string tmp, euid;
  int i;
  mixed *stack;
  
  if (perms && sizeof(perms) && !undefinedp(perms["all"]) &&
      (perms["all"] & mask))
    return 1;

  if(path[0..21] == "/save/boards/lordboard" &&
     base_name(ob) != "/obj/handlers/board_handler") {
    catch(log_file("/d/admin/log/LORDBOARD",
                   "%s: ob %s player %s prev %s\n",
                   ctime(time())[4..18], base_name(ob),
                   this_player()->query_name(),
                   base_name(previous_object()))); 
  }
  
  if (unguarded_ob == ob) {
    if ((tmp = base_name(ob)) == "/global/player" ||
        tmp == "/global/playtester" ||
        tmp == "/global/creator" ||
        tmp == "/global/lord") {
      if((path == "/save/players/"+ob->query_name()[0..0]+"/"+ob->query_name())
         ||
         (path == "/save/players/"+ob->query_name()[0..0]+"/"+ob->query_name()+
          ".o") ||
         (path == "/save/players/"+ob->query_name()[0..0]+"/"+ob->query_name()+
          ".o.gz") ||
         (path == "/save/ramdisk/players/"+ob->query_name()[0..0]+"/"+ob->query_name()) ||
         (path == "/save/ramdisk/players/"+ob->query_name()[0..0]+"/"+ob->query_name()+
          ".o") ||
         (path == "/save/ramdisk/players/"+ob->query_name()[0..0]+"/"+ob->query_name()+
          ".o.gz"))
        return 1;
      else i = sizeof(stack = ({ ob }) + previous_object(-1));
    } else if (tmp == path)
      return 1;
    else
      i = sizeof(stack = ({ ob }));
  } else if (unguarded_ob && base_name(ob) == "/secure/simul_efun") {
    if (unguarded_ob == previous_object(1))
      i = sizeof(stack = ({ previous_object(1) }));
    else
      i = sizeof(stack = ({ ob }) + previous_object(-1));
  } else if (unguarded_ob) {
    /* Okay, unguarded object is not the calling object. We only check
       the call stack as far back as the position of the unguarded
       object. */
    stack = previous_object(-1);
    for (i = 0; i < sizeof(stack) && stack[i] != unguarded_ob; i++)
      ;
    i = sizeof(stack = ({ ob }) + stack[0..i]);
  } else
    i = sizeof(stack = ({ ob}) + previous_object(-1));
//  tell_object(find_player("turrican"),
//              sprintf("stack = %O, perms = %O, unguarded_ob = %O, func = %s\n",
//                      stack, perms, unguarded_ob, func));
  while (i--) {
    if (!stack[i])
      return 0;
    if (stack[i] == this_object())
      continue;
    if (objectp(stack[i])) {
      if (file_name(stack[i]) == "/secure/simul_efun")
        continue;
      if (!(euid = geteuid(stack[i])))
        return 0;
    } else
      euid = stack[i];
    if (euid == get_root_uid())
      continue;
    if (query_director(euid) && (mask & READ_MASK))
      continue;
    if (query_trustee(euid))
      continue;
    if (perms) {
      if (!undefinedp(perms[euid]) && (perms[euid] & mask))
        continue;

      /* If the path is explicitly locked, and the lock isn't overridden
         by other pemissions, we deny access. */
      if (!undefinedp(perms["all"]) && (perms["all"] & LOCK_MASK))
        return 0;
    }

    /* Is this a creator directory? */
    if (path[0..2] == "/w/") {
      if (check_creator(stack[i], func, path, mask))
        continue;
    } else if(path[0..2] == "/d/") {
      /* It's a domain directory. */
      if (check_domain(stack[i], func, path, mask))
        continue;
    } else {
      /* The rest of the mudlib defaults to reading allowed, unless
         paths are explitcitly locked, which is handled above. */
      return (mask & READ_MASK);
    }
    return 0;
  }
  return 1;
} /* check_permission() */

mixed permission_match_path(mapping m, string path) {
  string p, *bits;
  int i, size;
  mapping found = ([]);

  if (!sizeof(m)) {
    return 0;
  }
  bits = explode(path, "/") - ({ "", "." });
  p = "";

  if (!undefinedp(m["/"])) {
    found += m["/"];
  }

  size = sizeof(bits);
  for (i = 0; i <= size; i++) {
    if (!undefinedp(m[p])) {
      mapping old = copy(found);

      if (sizeof((found += m[p])) != (sizeof(old) + sizeof(m[p]))) {
        string euid;
        int mask;
        
        found = old;
        foreach (euid, mask in m[p]) {
          if (!undefinedp(found[euid]))
            found[euid] |= mask;
          else
            found[euid] = mask;
        }
      }
    }
    if (i < size)
      p = p + "/" + bits[i];
  }
  if (sizeof(found)) {
    return found;
  } else {
    return 0;
  }
} /* permission_match_path() */

int valid_grant(object euid, string path, int mask) {
  string domain, master, director;
  int result;
  object master_ob;

  if (path[0] != '/')
    path = "/" + path;
  result = check_permission(euid, 0, path,
                            permission_match_path(permissions, path),
                            GRANT_MASK);
  if (!result || (mask & (READ_MASK|WRITE_MASK)))
    return result;
  if (sscanf(path, "/d/%s/%*s", domain) != 2 &&
      sscanf(path, "/d/%s", domain) != 1)
    return 0;
  master = "/d/" + domain + "/master";
  if (!(master_ob = find_object(master)) && checked_master[master])
    return 0;
  if (!master_ob && !checked_master[master] &&
      catch(master_ob = load_object(master))) {
    checked_master[master] = 1;
    return 0;
  }
  director = master->query_director();
  if(!director)
    director = master->query_lord();
  return (query_director(previous_object(-1) + ({ euid })) &&
          (member_array(director, map(previous_object(-1),
                                  (: geteuid($1) :))) != -1));
}

mapping query_permissions() {
  string *doms, master;
  int i;
  mapping blue, tmp;
  object master_ob;

  doms = get_dir("/d/");
  doms -= ({ "lost+found" });
  blue = ([ ]);
  for (i=0;i<sizeof(doms);i++) {
    master = "/d/"+doms[i]+"/master";
    if (!(master_ob = find_object(master)) && checked_master[master])
      continue;
    if (!master_ob && !checked_master[master] &&
        catch(master_ob = load_object(master))) {
      checked_master[master] = 1;
      continue;
    }
    tmp = (mapping)master_ob->query_access();
    if (mapp(tmp))
      blue += tmp;
  }
  return permissions + blue;
} /* query_permissions() */

protected int add_permission(string euid, string path, int mask) {
  string *bits, master;
  object master_ob;

  if (path[0..2] == "/d/") {
    /* A domain...  */
    bits = explode(path, "/");
    if (sizeof(bits) >= 2) {
      master = "/d/"+bits[1]+"/master";
      if (!(master_ob = find_object(master)) && checked_master[master])
        return 0;
      if (!master_ob && !checked_master[master] &&
          catch(master_ob = load_object(master))) {
        checked_master[master] = 1;
        return notify_fail("Failed to load master file.\n");
      }
      if ((mask & LOCK_MASK) &&
          !sizeof(filter(previous_object(-1),
                      (: $(master_ob)->query_lord() == geteuid($1) :))))
        return notify_fail("You are not the leader of $C$" + bits[1] +
                           ".\n");
      return (int)master_ob->add_permission(euid, path, mask);
    }
  }
  if (!permissions[path]) {
    permissions[path] = ([ euid : mask ]);
  } else {
    permissions[path][euid] |= mask;
  }
  unguarded((: save_object, "/secure/master" :));
  return 1;
} /* add_permission() */

int add_read_permission(string euid, string path) {
  if ( base_name(previous_object()) != "/d/admin/room/access_control" &&
       base_name(previous_object()) != "/cmds/creator/perm_it") {
    user_event( "inform", this_interactive()->query_cap_name()+
                " illegally attempted to call add_read_permission("+euid+", "+
                path+")", "cheat");
    unguarded((: write_file, "/log/CHEAT", ctime(time())+": Illegal attempt "
               "to call add_read_permission("+euid+", "+path+").\nBacktrace: "+
               back_trace() :));
    return 0;
  }
  if (add_permission(euid, path, READ_MASK)) {
    write("Added read permision for "+euid+" to "+path+".\n");
    return 1;
  }
  return 0;
} /* add_read_permission() */

int add_write_permission(string euid, string path) {
  if ( base_name(previous_object()) != "/d/admin/room/access_control" &&
       base_name(previous_object()) != "/cmds/creator/perm_it") {
    user_event( "inform", this_player(1)->query_cap_name()+
                " illegally attempted to call add_write_permission("+euid+", "+
                path+")", "cheat");
    unguarded((: write_file, "/log/CHEAT", ctime(time())+": Illegal attempt "
                 "to call add_write_permission("+euid+", "+path+").\n"
                 "Backtrace: "+ back_trace() :));
    return 0;
  }
  if (add_permission(euid, path, WRITE_MASK)) {
    write("Added write permision for "+euid+" to "+path+".\n");
    return 1;
  }
  return 0;
} /* add_write_permission() */

int add_grant_permission(string euid, string path) {
  if ( base_name(previous_object()) != "/d/admin/room/access_control" &&
       base_name(previous_object()) != "/cmds/creator/perm_it") {
    user_event( "inform", this_player(1)->query_cap_name()+
                " illegally attempted to call add_grant_permission("+euid+", "+
                path+")", "cheat");
    unguarded((: write_file, "/log/CHEAT", ctime(time())+": Illegal attempt "
                 "to call add_grant_permission("+euid+", "+path+").\n"
                 "Backtrace: "+ back_trace() :));
    return 0;
  }
  if (add_permission(euid, path, GRANT_MASK)) {
    write("Added grant permision for "+euid+" to "+path+".\n");
    return 1;
  }
  return 0;
} /* add_grant_permission() */

int lock_path(string path) {
  if ( base_name(previous_object()) != "/d/admin/room/access_control" &&
       base_name(previous_object()) != "/cmds/creator/perm_it") {
    user_event("inform", this_player(1)->query_cap_name()+
               " illegally attempted to call lock_path("+path+")", "cheat");
    unguarded((: write_file, "/log/CHEAT", ctime(time())+": Illegal attempt "
               "to call lock_path("+path+").\nBacktrace: "+ back_trace() :));
    return 0;
  }
  if (add_permission("all", path, LOCK_MASK)) {
    write("Restricted access for all to "+path+".\n");
    return 1;
  }
  return 0;
} /* lock_path() */

protected int remove_permission(string euid, string path, int mask) {
  string *bits, master;
  object master_ob;

  if (path[0..2] == "/d/") {
    /* A domain...  */
    bits = explode(path, "/");
    if (sizeof(bits) >= 2) {
      master = "/d/"+bits[1]+"/master";
      if (!(master_ob = find_object(master)) && checked_master[master])
        return 0;
      if (!master_ob && !checked_master[master] &&
          catch(master_ob = load_object(master))) {
        checked_master[master] = 1;
        return notify_fail("Failed to load master file.\n");
      }
      if ((mask & LOCK_MASK) &&
          !sizeof(filter(previous_object(-1),
                         (: $(master_ob)->query_lord() == geteuid($1) :))))
        return notify_fail("You are not the lord of $C$" + bits[1] + ".\n");
      return (int)master_ob->remove_permission(euid, path, mask);
    }
  }
  if (!permissions[path] || !permissions[path][euid]) {
    notify_fail("The euid \""+euid+"\" does not have any permissions to "
                "remove in "+path+".\n");
    return 0;
  }
  permissions[path][euid] &= ~mask;
  if (!permissions[path][euid]) {
    if (m_sizeof(permissions[path]) == 1) {
      map_delete(permissions, path);
    } else {
      map_delete(permissions[path], euid);
    }
  }
  unguarded((: save_object, "/secure/master" :));
  return 1;
} /* remove_permission() */

int remove_read_permission(string euid, string path) {
  if ( base_name(previous_object()) != "/d/admin/room/access_control" &&
      base_name(previous_object()) != "/cmds/creator/perm_it") {
    user_event( "inform", this_player(1)->query_cap_name()+
                " illegally attempted to call remove_read_permission("+euid+
                ", "+path+")", "cheat");
    unguarded((: write_file, "/log/CHEAT", ctime(time())+": Illegal attempt "
               "to call remove_read_permission("+euid+", "+path+").\n"
               "Backtrace: "+ back_trace() :));
    return 0;
  }
  if (remove_permission(euid, path, READ_MASK)) {
    write("Removed read permision for "+euid+" to "+path+".\n");
    return 1;
  }
  return 0;
} /* remove_read_permission() */

int remove_write_permission(string euid, string path) {
  if ( base_name(previous_object()) != "/d/admin/room/access_control" &&
       base_name(previous_object()) != "/cmds/creator/perm_it") {
    user_event( "inform", this_player(1)->query_cap_name()+
                " illegally attempted to call remove_write_permission("+euid+
                ", "+path+")", "cheat");
    unguarded((: write_file, "/log/CHEAT", ctime(time())+": Illegal attempt "
               "to call remove_write_permission("+euid+", "+path+").\n"
               "Backtrace: "+ back_trace() :));
    return 0;
  }
  if (remove_permission(euid, path, WRITE_MASK)) {
    write("Removed write permision for "+euid+" to "+path+".\n");
    return 1;
  }
  return 0;
} /* remove_write_permission() */

int remove_grant_permission(string euid, string path) {
  if ( base_name(previous_object()) != "/d/admin/room/access_control" &&
       base_name(previous_object()) != "/cmds/creator/perm_it") {
    user_event( "inform", this_player(1)->query_cap_name()+
                " illegally attempted to call remove_grant_permission("+euid+
                ", "+path+")", "cheat");
    unguarded((: write_file, "/log/CHEAT", ctime(time())+": Illegal attempt "
               "to call remove_grant_permission("+euid+", "+path+").\n"
               "Backtrace: "+ back_trace() :));
    return 0;
  }
  if (remove_permission(euid, path, GRANT_MASK)) {
    write("Removed grant permision for "+euid+" to "+path+".\n");
    return 1;
  }
  return 0;
} /* remove_grant_permission() */

int unlock_path(string path) {
  if ( base_name(previous_object()) != "/d/admin/room/access_control" &&
       base_name(previous_object()) != "/cmds/creator/perm_it") {
    user_event("inform", this_player(1)->query_cap_name()+
               " illegally attempted to call unlock_path("+path+")", "cheat");
    unguarded((: write_file, "/log/CHEAT", ctime(time())+": Illegal attempt "
               "to call unlock_path("+path+").\nBacktrace: "+ back_trace() :));
    return 0;
  }
  if (remove_permission("all", path, LOCK_MASK)) {
    write("Removed access restrictions for all to "+path+".\n");
    return 1;
  }
  return 0;
} /* unlock_path() */