skylib_fluffos_v3/
skylib_fluffos_v3/bin/
skylib_fluffos_v3/bin/db/
skylib_fluffos_v3/fluffos-2.9-ds2.04/
skylib_fluffos_v3/fluffos-2.9-ds2.04/ChangeLog.old/
skylib_fluffos_v3/fluffos-2.9-ds2.04/Win32/
skylib_fluffos_v3/fluffos-2.9-ds2.04/compat/
skylib_fluffos_v3/fluffos-2.9-ds2.04/compat/simuls/
skylib_fluffos_v3/fluffos-2.9-ds2.04/include/
skylib_fluffos_v3/fluffos-2.9-ds2.04/testsuite/
skylib_fluffos_v3/fluffos-2.9-ds2.04/testsuite/clone/
skylib_fluffos_v3/fluffos-2.9-ds2.04/testsuite/command/
skylib_fluffos_v3/fluffos-2.9-ds2.04/testsuite/data/
skylib_fluffos_v3/fluffos-2.9-ds2.04/testsuite/etc/
skylib_fluffos_v3/fluffos-2.9-ds2.04/testsuite/include/
skylib_fluffos_v3/fluffos-2.9-ds2.04/testsuite/inherit/
skylib_fluffos_v3/fluffos-2.9-ds2.04/testsuite/inherit/master/
skylib_fluffos_v3/fluffos-2.9-ds2.04/testsuite/log/
skylib_fluffos_v3/fluffos-2.9-ds2.04/testsuite/single/
skylib_fluffos_v3/fluffos-2.9-ds2.04/testsuite/single/tests/compiler/
skylib_fluffos_v3/fluffos-2.9-ds2.04/testsuite/single/tests/efuns/
skylib_fluffos_v3/fluffos-2.9-ds2.04/testsuite/single/tests/operators/
skylib_fluffos_v3/fluffos-2.9-ds2.04/testsuite/u/
skylib_fluffos_v3/fluffos-2.9-ds2.04/tmp/
skylib_fluffos_v3/fluffos-2.9-ds2.04/windows/
skylib_fluffos_v3/mudlib/
skylib_fluffos_v3/mudlib/cmds/
skylib_fluffos_v3/mudlib/cmds/admin/
skylib_fluffos_v3/mudlib/cmds/guild-race/
skylib_fluffos_v3/mudlib/cmds/living/broken/
skylib_fluffos_v3/mudlib/cmds/player/group_cmds/
skylib_fluffos_v3/mudlib/cmds/playtester/
skylib_fluffos_v3/mudlib/d/admin/
skylib_fluffos_v3/mudlib/d/admin/room/
skylib_fluffos_v3/mudlib/d/admin/room/we_care/
skylib_fluffos_v3/mudlib/d/admin/save/
skylib_fluffos_v3/mudlib/d/admin/text/
skylib_fluffos_v3/mudlib/d/learning/TinyTown/buildings/
skylib_fluffos_v3/mudlib/d/learning/TinyTown/map/
skylib_fluffos_v3/mudlib/d/learning/TinyTown/roads/
skylib_fluffos_v3/mudlib/d/learning/chars/
skylib_fluffos_v3/mudlib/d/learning/functions/
skylib_fluffos_v3/mudlib/d/learning/handlers/
skylib_fluffos_v3/mudlib/d/learning/help_topics/
skylib_fluffos_v3/mudlib/d/learning/help_topics/npcs/
skylib_fluffos_v3/mudlib/d/learning/help_topics/objects/
skylib_fluffos_v3/mudlib/d/learning/help_topics/rcs_demo/
skylib_fluffos_v3/mudlib/d/learning/help_topics/rcs_demo/RCS/
skylib_fluffos_v3/mudlib/d/learning/help_topics/rooms/
skylib_fluffos_v3/mudlib/d/learning/help_topics/rooms/crowd/
skylib_fluffos_v3/mudlib/d/learning/help_topics/rooms/situations/
skylib_fluffos_v3/mudlib/d/learning/save/
skylib_fluffos_v3/mudlib/d/learning/school/
skylib_fluffos_v3/mudlib/d/learning/school/add_sc/
skylib_fluffos_v3/mudlib/d/learning/school/characters/
skylib_fluffos_v3/mudlib/d/learning/school/general/
skylib_fluffos_v3/mudlib/d/learning/school/getting-started/
skylib_fluffos_v3/mudlib/d/learning/school/getting-started/basic_commands/
skylib_fluffos_v3/mudlib/d/learning/school/getting-started/edtutor/
skylib_fluffos_v3/mudlib/d/learning/school/getting-started/unix_tutor/
skylib_fluffos_v3/mudlib/d/learning/school/items/
skylib_fluffos_v3/mudlib/d/learning/school/npc_school/
skylib_fluffos_v3/mudlib/d/learning/school/room_school/
skylib_fluffos_v3/mudlib/d/learning/school/room_school/room_basic/
skylib_fluffos_v3/mudlib/d/learning/school/room_school/situations/
skylib_fluffos_v3/mudlib/d/learning/school/room_school/terrain_tutor/
skylib_fluffos_v3/mudlib/d/learning/text/
skylib_fluffos_v3/mudlib/d/liaison/
skylib_fluffos_v3/mudlib/d/mudlib/
skylib_fluffos_v3/mudlib/d/mudlib/changes/
skylib_fluffos_v3/mudlib/d/playtesters/
skylib_fluffos_v3/mudlib/d/playtesters/effects/
skylib_fluffos_v3/mudlib/d/playtesters/handlers/
skylib_fluffos_v3/mudlib/d/playtesters/items/
skylib_fluffos_v3/mudlib/d/sage/
skylib_fluffos_v3/mudlib/doc/
skylib_fluffos_v3/mudlib/doc/creator/
skylib_fluffos_v3/mudlib/doc/driver/
skylib_fluffos_v3/mudlib/doc/driver/efuns/arrays/
skylib_fluffos_v3/mudlib/doc/driver/efuns/buffers/
skylib_fluffos_v3/mudlib/doc/driver/efuns/calls/
skylib_fluffos_v3/mudlib/doc/driver/efuns/compile/
skylib_fluffos_v3/mudlib/doc/driver/efuns/filesystem/
skylib_fluffos_v3/mudlib/doc/driver/efuns/floats/
skylib_fluffos_v3/mudlib/doc/driver/efuns/functions/
skylib_fluffos_v3/mudlib/doc/driver/efuns/general/
skylib_fluffos_v3/mudlib/doc/driver/efuns/mappings/
skylib_fluffos_v3/mudlib/doc/driver/efuns/mixed/
skylib_fluffos_v3/mudlib/doc/driver/efuns/mudlib/
skylib_fluffos_v3/mudlib/doc/driver/efuns/numbers/
skylib_fluffos_v3/mudlib/doc/driver/efuns/parsing/
skylib_fluffos_v3/mudlib/doc/login/
skylib_fluffos_v3/mudlib/doc/lpc/basic_manual/
skylib_fluffos_v3/mudlib/doc/lpc/intermediate/
skylib_fluffos_v3/mudlib/doc/new/add_command/
skylib_fluffos_v3/mudlib/doc/new/events/
skylib_fluffos_v3/mudlib/doc/new/handlers/
skylib_fluffos_v3/mudlib/doc/new/living/race/
skylib_fluffos_v3/mudlib/doc/new/living/spells/
skylib_fluffos_v3/mudlib/doc/new/object/
skylib_fluffos_v3/mudlib/doc/new/player/
skylib_fluffos_v3/mudlib/doc/new/room/guild/
skylib_fluffos_v3/mudlib/doc/new/room/outside/
skylib_fluffos_v3/mudlib/doc/new/room/storeroom/
skylib_fluffos_v3/mudlib/doc/object/
skylib_fluffos_v3/mudlib/doc/playtesters/
skylib_fluffos_v3/mudlib/doc/policy/
skylib_fluffos_v3/mudlib/doc/weapons/
skylib_fluffos_v3/mudlib/global/
skylib_fluffos_v3/mudlib/global/creator/
skylib_fluffos_v3/mudlib/handlers/
skylib_fluffos_v3/mudlib/include/casino/
skylib_fluffos_v3/mudlib/include/cmds/
skylib_fluffos_v3/mudlib/include/effects/
skylib_fluffos_v3/mudlib/include/npc/
skylib_fluffos_v3/mudlib/include/room/
skylib_fluffos_v3/mudlib/include/shops/
skylib_fluffos_v3/mudlib/net/daemon/
skylib_fluffos_v3/mudlib/net/daemon/chars/
skylib_fluffos_v3/mudlib/net/inherit/
skylib_fluffos_v3/mudlib/net/obj/
skylib_fluffos_v3/mudlib/net/obj/BACKUPS/
skylib_fluffos_v3/mudlib/obj/amulets/
skylib_fluffos_v3/mudlib/obj/armours/plate/
skylib_fluffos_v3/mudlib/obj/b_day/
skylib_fluffos_v3/mudlib/obj/clothes/transport/horse/
skylib_fluffos_v3/mudlib/obj/faith/symbols/
skylib_fluffos_v3/mudlib/obj/fungi/
skylib_fluffos_v3/mudlib/obj/gatherables/
skylib_fluffos_v3/mudlib/obj/instruments/
skylib_fluffos_v3/mudlib/obj/media/
skylib_fluffos_v3/mudlib/obj/misc/player_shop/
skylib_fluffos_v3/mudlib/obj/monster/godmother/
skylib_fluffos_v3/mudlib/obj/monster/transport/
skylib_fluffos_v3/mudlib/obj/rings/
skylib_fluffos_v3/mudlib/obj/scabbards/
skylib_fluffos_v3/mudlib/obj/spells/
skylib_fluffos_v3/mudlib/obj/stationery/
skylib_fluffos_v3/mudlib/obj/stationery/envelopes/
skylib_fluffos_v3/mudlib/obj/toys/
skylib_fluffos_v3/mudlib/obj/vessels/
skylib_fluffos_v3/mudlib/obj/weapons/axes/
skylib_fluffos_v3/mudlib/obj/weapons/chains/
skylib_fluffos_v3/mudlib/obj/weapons/maces/BACKUPS/
skylib_fluffos_v3/mudlib/save/autodoc/
skylib_fluffos_v3/mudlib/save/book_handler/
skylib_fluffos_v3/mudlib/save/books/history/calarien/
skylib_fluffos_v3/mudlib/save/mail/
skylib_fluffos_v3/mudlib/save/new_soul/data/
skylib_fluffos_v3/mudlib/save/parcels/
skylib_fluffos_v3/mudlib/save/playerinfo/
skylib_fluffos_v3/mudlib/save/players/d/
skylib_fluffos_v3/mudlib/save/players/s/
skylib_fluffos_v3/mudlib/save/random_names/
skylib_fluffos_v3/mudlib/save/random_names/data/
skylib_fluffos_v3/mudlib/save/terrains/
skylib_fluffos_v3/mudlib/save/terrains/tutorial_desert/
skylib_fluffos_v3/mudlib/save/terrains/tutorial_grassy_field/
skylib_fluffos_v3/mudlib/save/terrains/tutorial_mountain/
skylib_fluffos_v3/mudlib/save/todo_lists/
skylib_fluffos_v3/mudlib/secure/
skylib_fluffos_v3/mudlib/secure/cmds/admin/
skylib_fluffos_v3/mudlib/secure/cmds/lord/
skylib_fluffos_v3/mudlib/secure/config/
skylib_fluffos_v3/mudlib/secure/handlers/autodoc/
skylib_fluffos_v3/mudlib/secure/handlers/intermud/
skylib_fluffos_v3/mudlib/secure/include/global/
skylib_fluffos_v3/mudlib/secure/save/
skylib_fluffos_v3/mudlib/secure/save/handlers/
skylib_fluffos_v3/mudlib/secure/std/
skylib_fluffos_v3/mudlib/secure/std/classes/
skylib_fluffos_v3/mudlib/secure/std/modules/
skylib_fluffos_v3/mudlib/std/creator/
skylib_fluffos_v3/mudlib/std/dom/
skylib_fluffos_v3/mudlib/std/effects/
skylib_fluffos_v3/mudlib/std/effects/external/
skylib_fluffos_v3/mudlib/std/effects/fighting/
skylib_fluffos_v3/mudlib/std/effects/magic/
skylib_fluffos_v3/mudlib/std/effects/magic/BACKUPS/
skylib_fluffos_v3/mudlib/std/effects/other/BACKUPS/
skylib_fluffos_v3/mudlib/std/effects/priest/
skylib_fluffos_v3/mudlib/std/effects/room/
skylib_fluffos_v3/mudlib/std/environ/
skylib_fluffos_v3/mudlib/std/guilds/
skylib_fluffos_v3/mudlib/std/guilds/old/
skylib_fluffos_v3/mudlib/std/languages/
skylib_fluffos_v3/mudlib/std/liquids/
skylib_fluffos_v3/mudlib/std/npc/
skylib_fluffos_v3/mudlib/std/npc/goals/
skylib_fluffos_v3/mudlib/std/npc/goals/basic/
skylib_fluffos_v3/mudlib/std/npc/goals/misc/
skylib_fluffos_v3/mudlib/std/npc/plans/
skylib_fluffos_v3/mudlib/std/npc/plans/basic/
skylib_fluffos_v3/mudlib/std/npc/types/
skylib_fluffos_v3/mudlib/std/npc/types/helper/
skylib_fluffos_v3/mudlib/std/npcs/
skylib_fluffos_v3/mudlib/std/outsides/
skylib_fluffos_v3/mudlib/std/races/shadows/
skylib_fluffos_v3/mudlib/std/room/basic/BACKUPS/
skylib_fluffos_v3/mudlib/std/room/basic/topography/
skylib_fluffos_v3/mudlib/std/room/controller/
skylib_fluffos_v3/mudlib/std/room/inherit/topography/
skylib_fluffos_v3/mudlib/std/room/topography/area/
skylib_fluffos_v3/mudlib/std/room/topography/iroom/
skylib_fluffos_v3/mudlib/std/room/topography/milestone/
skylib_fluffos_v3/mudlib/std/shadows/curses/
skylib_fluffos_v3/mudlib/std/shadows/disease/
skylib_fluffos_v3/mudlib/std/shadows/fighting/
skylib_fluffos_v3/mudlib/std/shadows/healing/
skylib_fluffos_v3/mudlib/std/shadows/magic/
skylib_fluffos_v3/mudlib/std/shadows/poison/
skylib_fluffos_v3/mudlib/std/shadows/room/
skylib_fluffos_v3/mudlib/std/shops/controllers/
skylib_fluffos_v3/mudlib/std/shops/objs/
skylib_fluffos_v3/mudlib/std/shops/player_shop/
skylib_fluffos_v3/mudlib/std/socket/
skylib_fluffos_v3/mudlib/std/soul/d/
skylib_fluffos_v3/mudlib/std/soul/e/
skylib_fluffos_v3/mudlib/std/soul/i/
skylib_fluffos_v3/mudlib/std/soul/j/
skylib_fluffos_v3/mudlib/std/soul/k/
skylib_fluffos_v3/mudlib/std/soul/l/
skylib_fluffos_v3/mudlib/std/soul/n/
skylib_fluffos_v3/mudlib/std/soul/o/
skylib_fluffos_v3/mudlib/std/soul/q/
skylib_fluffos_v3/mudlib/std/soul/r/
skylib_fluffos_v3/mudlib/std/soul/u/
skylib_fluffos_v3/mudlib/std/soul/v/
skylib_fluffos_v3/mudlib/std/soul/y/
skylib_fluffos_v3/mudlib/std/soul/z/
skylib_fluffos_v3/mudlib/std/stationery/
skylib_fluffos_v3/mudlib/w/
skylib_fluffos_v3/mudlib/w/default/
skylib_fluffos_v3/mudlib/w/default/armour/
skylib_fluffos_v3/mudlib/w/default/clothes/
skylib_fluffos_v3/mudlib/w/default/item/
skylib_fluffos_v3/mudlib/w/default/npc/
skylib_fluffos_v3/mudlib/w/default/room/
skylib_fluffos_v3/mudlib/w/default/weapon/
skylib_fluffos_v3/mudlib/www/
skylib_fluffos_v3/mudlib/www/java/
skylib_fluffos_v3/mudlib/www/secure/
skylib_fluffos_v3/mudlib/www/secure/lpc/advanced/
skylib_fluffos_v3/mudlib/www/secure/lpc/intermediate/
skylib_fluffos_v3/win32/
varargs mixed creator_file(string path, int author);

nomask int check_domain( mixed ob, string func, string path, int mask ) {
    string domain, euid, *bits = explode(path, "/") - ({ "", "." });

    if( sscanf( path, "/d/%s/%*s", domain ) != 2 )
        return ( mask & READ_MASK );

    if( objectp(ob) )
        ob = geteuid(ob);

    euid = ob;

    // Is it the domain itself?
    if( ob == creator_file(path) )
        return 1;

    if( DOMAIN_H->query_leader( bits[1], euid ) )
        return 1;

    return ( mask & READ_MASK );

} /* check_domain() */

nomask int check_project( mixed ob, string func, string path, int mask ) {
    string project, euid, *bits = explode(path, "/") - ({ "", "." });

    if( sscanf( path, "/p/%s/%*s", project ) != 2 )
        return ( mask & READ_MASK );

    if( objectp(ob) )
        ob = geteuid(ob);

    euid = ob;

    // Is it the project itself?
    if( ob == creator_file(path) )
        return 1;

    if( PROJECT_H->query_leader( bits[1], euid ) )
        return 1;

    return ( mask & READ_MASK );

} /* check_project() */

nomask int check_creator( mixed ob, string func, string path, int mask ) {
    string owner, *bits = explode(path, "/") - ({ "", "." });

    if( sscanf( path, "/w/%s/%*s", owner ) != 2 )
        return ( mask & READ_MASK );

    if( objectp(ob) )
        ob = geteuid(ob);

    // Creators are not allowed to give out write perms to their dirs using
    // the granting system, they should write their own master object if
    // they want to do this.
    if( mask & GRANT_MASK )
        return 0;

    if( sizeof(bits) > 2 )
        if( bits[2] == "secure" && bits[1] != ob )
            return 0;

    // Reading is allowed in creator dirs,
    // and writing is allowed if it's the owner doing it.
    if( ( mask & READ_MASK ) || ( ob == creator_file(path) ) )
        return 1;

    return 0;

} /* check_creator() */


/**
 * Permision handling stuff. Originally coded by Who Knows.
 * This now uses a system based on the previous_object() stack.
 * Coded by Turrican, based on code in the Nightmare Mudlib.
 * - First working version on 7-10-96
 * - Hacked some more on 4-4-97
 */
private int check_permission( mixed ob, string func, string path,
                              mapping perms, int mask ) {
    string tmp, euid;
    int i;
    mixed *stack;

    if( perms && sizeof(perms) && !undefinedp(perms["all"] ) &&
        ( perms["all"] & mask ) )
        return 1;

    if( unguarded_ob == ob ) {
        tmp = base_name(ob);
        if( tmp == "/global/player" || tmp == "/global/creator") {
            if( path == "/save/players/"+ob->query_name()[0..0]+"/"+ob->query_name() ||
                path == "/save/players/"+ob->query_name()[0..0]+"/"+ob->query_name()+".o")
                return 1;
            else
                i = sizeof( stack = ({ ob }) + previous_object(-1) );
        } else if( tmp == path )
            return 1;
        else
            i = sizeof( stack = ({ ob }) );
    } else if( unguarded_ob && base_name(ob) == "/secure/simul_efun") {
        if( unguarded_ob == previous_object(1) )
            i = sizeof( stack = ({ previous_object(1) }) );
        else
            i = sizeof( stack = ({ ob }) + previous_object(-1) );
    } else if( unguarded_ob ) {
        // Okay, unguarded object is not the calling object.
        // We only check the call stack as far back as the position
        // of the unguarded object.
        stack = previous_object(-1);
        for( i = 0; i < sizeof(stack) && stack[i] != unguarded_ob; i++ );
        i = sizeof( stack = ({ ob }) + stack[0..i] );
    } else
        i = sizeof( stack = ({ ob }) + previous_object(-1) );

    while( i-- ) {
        if( !stack[i] )
            return 0;

        if( stack[i] == TO )
            continue;

        if( objectp(stack[i]) ) {
            if( file_name(stack[i]) == "/secure/simul_efun")
                continue;
            if( !( euid = geteuid(stack[i]) ) )
                return 0;
        } else
            euid = stack[i];

        if( euid == get_root_uid() )
            continue;

        if( lordp(euid) && ( mask & READ_MASK ) )
            continue;

        if( adminp(euid) )
            continue;

        if( perms ) {
            if( !undefinedp(perms[euid]) && ( perms[euid] & mask ) )
                continue;

            // If the path is explicitly locked, and the lock isn't overridden
            // by other pemissions, we deny access.
            if( !undefinedp(perms["all"]) && ( perms["all"] & LOCK_MASK ) )
                return 0;
        }

        // Is this a creator directory?
        if( path[0..2] == "/w/") {
            if( check_creator( stack[i], func, path, mask ) )
                continue;
        } else if( path[0..2] == "/d/") {
            // It's a domain directory.
            if( check_domain( stack[i], func, path, mask ) )
                continue;
        } else if( path[0..2] == "/p/") {
            // It's a project directory.
            if( check_project( stack[i], func, path, mask ) )
                continue;
        } else {
            // The rest of the mudlib defaults to reading allowed,
            // unless paths are explitcitly locked, which is handled
            // above.
            return ( mask & READ_MASK );
        }
        return 0;
    }

    return 1;

} /* check_permission() */

mapping query_permissions() { return copy(permissions); }

int valid_grant( object euid, string path, int mask ) {
    string domain, *lords;
    int result;

    if( path[0] != '/')
        path = "/" + path;

    result = check_permission( euid, 0, path,
        match_path( permissions, path ), GRANT_MASK );

    if( result || ( mask & (READ_MASK|WRITE_MASK) ) )
        return result;

    if( sscanf( path, "/d/%s/%*s", domain ) != 2 )
        return 0;

    lords = DOMAIN_H->query_leaders(domain);

    return ( lordp(previous_object(-1) + ({ euid }) ) &&
           ( member_array( lords, map(previous_object(-1),
           (: geteuid($1) :) ) ) != -1 ) );

} /* valid_grant() */

int permission_check() {
    if( file_name(PO) != "/secure/cmds/creator/accesstool" &&
        file_name(PO) != DOMAIN_H ) {
        write("Please use accesstool to add/remove access.\n");
        return 0;
    }

    return 1;

} /* permission_check() */

int add_permission( string euid, string path, int mask ) {
//  if( !valid_grant( euid, path, mask ) ) {
    if( !permission_check() )
        return 0;

    if( !permissions[path] )
        permissions[path] = ([ euid : mask ]);
    else
        permissions[path][euid] |= mask;

    save_object(SAVE_FILE);
    return 1;

} /* add_permission() */

int add_read_permission( string euid, string path ) {
    if( !permission_check() )
        return 0;

    if( add_permission( euid, path, READ_MASK ) ) {
        write("Added read permission for "+euid+" to "+path+".\n");
        return 1;
    }

    return 0;

} /* add_read_permission() */

int add_write_permission( string euid, string path ) {
    if( !permission_check() )
        return 0;

    if( add_permission( euid, path, WRITE_MASK ) ) {
        write("Added write permission for "+euid+" to "+path+".\n");
        return 1;
    }

    return 0;

} /* add_write_permission() */

int add_grant_permission( string euid, string path ) {
    if( !permission_check() )
        return 0;

    if( add_permission( euid, path, GRANT_MASK ) ) {
        write("Added write permission for "+euid+" to "+path+".\n");
        return 1;
    }

    return 0;

} /* add_grant_permission() */

int remove_permission( string euid, string path, int mask ) {
//  if( !valid_grant( euid, path, mask ) ) {
    if( !permission_check() )
        return 0;

    if( !permissions[path] || !permissions[path][euid] ) {
        write("The "+euid+" does not have any permissions to remove in "+
            path+".\n");
        return 0;
    }

    permissions[path][euid] &= ~mask;

    if( !permissions[path][euid] )
        if( sizeof(permissions[path] ) == 1 )
            map_delete( permissions, path );
        else
            map_delete( permissions[path], euid );

    save_object(SAVE_FILE);
    return 1;

} /* remove_permission() */

int remove_read_permission( string euid, string path ) {
    if( !permission_check() )
        return 0;

    if( remove_permission( euid, path, READ_MASK ) ) {
        write("Removed read permission for "+euid+" to "+path+".\n");
        return 1;
    }

    return 0;

} /* remove_read_permission() */

int remove_write_permission( string euid, string path ) {
    if( !permission_check() )
        return 0;

    if( remove_permission( euid, path, WRITE_MASK ) ) {
        write("Removed write permission for "+euid+" to "+path+".\n");
        return 1;
    }

    return 0;

} /* remove_write_permission() */

int remove_grant_permission( string euid, string path ) {
    if( !permission_check() )
        return 0;

    if( remove_permission( euid, path, GRANT_MASK ) ) {
        write("Removed write permission for "+euid+" to "+path+".\n");
        return 1;
    }

    return 0;

} /* remove_grant_permission() */

mixed permission_match_path( mapping m, string path ) {
    string p, *bits;
    int i, size;
    mapping found = ([ ]);

    if( !sizeof(m) )
        return 0;

    bits = explode(path, "/") - ({ "", "." });
    p = "";

    if( !undefinedp(m["/"]) )
        found += m["/"];

    size = sizeof(bits);
    for( i = 0; i <= size; i++ ) {
        if( !undefinedp(m[p]) ) {
            mapping old = copy(found);

            if( sizeof( ( found += m[p] ) ) != ( sizeof(old) + sizeof(m[p]) ) ) {
                string euid;
                int mask;

                found = old;
                foreach( euid, mask in m[p] ) {
                    if( !undefinedp(found[euid]) )
                        found[euid] |= mask;
                    else
                        found[euid] = mask;
                }
            }
        }
        if( i < size )
            p = p+"/"+bits[i];
    }

    if( sizeof(found) ) {
        return found;
    } else {
        return 0;
    }

} /* permission_match_path() */