Blame libarchive/archive_acl.c

Packit Service 1d0348
/*-
Packit Service 1d0348
 * Copyright (c) 2003-2010 Tim Kientzle
Packit Service 1d0348
 * Copyright (c) 2016 Martin Matuska
Packit Service 1d0348
 * All rights reserved.
Packit Service 1d0348
 *
Packit Service 1d0348
 * Redistribution and use in source and binary forms, with or without
Packit Service 1d0348
 * modification, are permitted provided that the following conditions
Packit Service 1d0348
 * are met:
Packit Service 1d0348
 * 1. Redistributions of source code must retain the above copyright
Packit Service 1d0348
 *    notice, this list of conditions and the following disclaimer.
Packit Service 1d0348
 * 2. Redistributions in binary form must reproduce the above copyright
Packit Service 1d0348
 *    notice, this list of conditions and the following disclaimer in the
Packit Service 1d0348
 *    documentation and/or other materials provided with the distribution.
Packit Service 1d0348
 *
Packit Service 1d0348
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR(S) ``AS IS'' AND ANY EXPRESS OR
Packit Service 1d0348
 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
Packit Service 1d0348
 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
Packit Service 1d0348
 * IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT,
Packit Service 1d0348
 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
Packit Service 1d0348
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
Packit Service 1d0348
 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
Packit Service 1d0348
 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
Packit Service 1d0348
 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
Packit Service 1d0348
 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Packit Service 1d0348
 */
Packit Service 1d0348
Packit Service 1d0348
#include "archive_platform.h"
Packit Service 1d0348
__FBSDID("$FreeBSD$");
Packit Service 1d0348
Packit Service 1d0348
#ifdef HAVE_ERRNO_H
Packit Service 1d0348
#include <errno.h>
Packit Service 1d0348
#endif
Packit Service 1d0348
#ifdef HAVE_LIMITS_H
Packit Service 1d0348
#include <limits.h>
Packit Service 1d0348
#endif
Packit Service 1d0348
#ifdef HAVE_WCHAR_H
Packit Service 1d0348
#include <wchar.h>
Packit Service 1d0348
#endif
Packit Service 1d0348
Packit Service 1d0348
#include "archive_acl_private.h"
Packit Service 1d0348
#include "archive_entry.h"
Packit Service 1d0348
#include "archive_private.h"
Packit Service 1d0348
Packit Service 1d0348
#undef max
Packit Service 1d0348
#define	max(a, b)	((a)>(b)?(a):(b))
Packit Service 1d0348
Packit Service 1d0348
#ifndef HAVE_WMEMCMP
Packit Service 1d0348
/* Good enough for simple equality testing, but not for sorting. */
Packit Service 1d0348
#define wmemcmp(a,b,i)  memcmp((a), (b), (i) * sizeof(wchar_t))
Packit Service 1d0348
#endif
Packit Service 1d0348
Packit Service 1d0348
static int	acl_special(struct archive_acl *acl,
Packit Service 1d0348
		    int type, int permset, int tag);
Packit Service 1d0348
static struct archive_acl_entry *acl_new_entry(struct archive_acl *acl,
Packit Service 1d0348
		    int type, int permset, int tag, int id);
Packit Service 1d0348
static int	archive_acl_add_entry_len_l(struct archive_acl *acl,
Packit Service 1d0348
		    int type, int permset, int tag, int id, const char *name,
Packit Service 1d0348
		    size_t len, struct archive_string_conv *sc);
Packit Service 1d0348
static int	archive_acl_text_want_type(struct archive_acl *acl, int flags);
Packit Service 1d0348
static ssize_t	archive_acl_text_len(struct archive_acl *acl, int want_type,
Packit Service 1d0348
		    int flags, int wide, struct archive *a,
Packit Service 1d0348
		    struct archive_string_conv *sc);
Packit Service 1d0348
static int	isint_w(const wchar_t *start, const wchar_t *end, int *result);
Packit Service 1d0348
static int	ismode_w(const wchar_t *start, const wchar_t *end, int *result);
Packit Service 1d0348
static int	is_nfs4_flags_w(const wchar_t *start, const wchar_t *end,
Packit Service 1d0348
		    int *result);
Packit Service 1d0348
static int	is_nfs4_perms_w(const wchar_t *start, const wchar_t *end,
Packit Service 1d0348
		    int *result);
Packit Service 1d0348
static void	next_field_w(const wchar_t **wp, const wchar_t **start,
Packit Service 1d0348
		    const wchar_t **end, wchar_t *sep);
Packit Service 1d0348
static void	append_entry_w(wchar_t **wp, const wchar_t *prefix, int type,
Packit Service 1d0348
		    int tag, int flags, const wchar_t *wname, int perm, int id);
Packit Service 1d0348
static void	append_id_w(wchar_t **wp, int id);
Packit Service 1d0348
static int	isint(const char *start, const char *end, int *result);
Packit Service 1d0348
static int	ismode(const char *start, const char *end, int *result);
Packit Service 1d0348
static int	is_nfs4_flags(const char *start, const char *end,
Packit Service 1d0348
		    int *result);
Packit Service 1d0348
static int	is_nfs4_perms(const char *start, const char *end,
Packit Service 1d0348
		    int *result);
Packit Service 1d0348
static void	next_field(const char **p, const char **start,
Packit Service 1d0348
		    const char **end, char *sep);
Packit Service 1d0348
static void	append_entry(char **p, const char *prefix, int type,
Packit Service 1d0348
		    int tag, int flags, const char *name, int perm, int id);
Packit Service 1d0348
static void	append_id(char **p, int id);
Packit Service 1d0348
Packit Service 1d0348
static const struct {
Packit Service 1d0348
	const int perm;
Packit Service 1d0348
	const char c;
Packit Service 1d0348
	const wchar_t wc;
Packit Service 1d0348
} nfsv4_acl_perm_map[] = {
Packit Service 1d0348
	{ ARCHIVE_ENTRY_ACL_READ_DATA | ARCHIVE_ENTRY_ACL_LIST_DIRECTORY, 'r',
Packit Service 1d0348
	    L'r' },
Packit Service 1d0348
	{ ARCHIVE_ENTRY_ACL_WRITE_DATA | ARCHIVE_ENTRY_ACL_ADD_FILE, 'w',
Packit Service 1d0348
	    L'w' },
Packit Service 1d0348
	{ ARCHIVE_ENTRY_ACL_EXECUTE, 'x', L'x' },
Packit Service 1d0348
	{ ARCHIVE_ENTRY_ACL_APPEND_DATA | ARCHIVE_ENTRY_ACL_ADD_SUBDIRECTORY,
Packit Service 1d0348
	    'p', L'p' },
Packit Service 1d0348
	{ ARCHIVE_ENTRY_ACL_DELETE, 'd', L'd' },
Packit Service 1d0348
	{ ARCHIVE_ENTRY_ACL_DELETE_CHILD, 'D', L'D' },
Packit Service 1d0348
	{ ARCHIVE_ENTRY_ACL_READ_ATTRIBUTES, 'a', L'a' },
Packit Service 1d0348
	{ ARCHIVE_ENTRY_ACL_WRITE_ATTRIBUTES, 'A', L'A' },
Packit Service 1d0348
	{ ARCHIVE_ENTRY_ACL_READ_NAMED_ATTRS, 'R', L'R' },
Packit Service 1d0348
	{ ARCHIVE_ENTRY_ACL_WRITE_NAMED_ATTRS, 'W', L'W' },
Packit Service 1d0348
	{ ARCHIVE_ENTRY_ACL_READ_ACL, 'c', L'c' },
Packit Service 1d0348
	{ ARCHIVE_ENTRY_ACL_WRITE_ACL, 'C', L'C' },
Packit Service 1d0348
	{ ARCHIVE_ENTRY_ACL_WRITE_OWNER, 'o', L'o' },
Packit Service 1d0348
	{ ARCHIVE_ENTRY_ACL_SYNCHRONIZE, 's', L's' }
Packit Service 1d0348
};
Packit Service 1d0348
Packit Service 1d0348
static const int nfsv4_acl_perm_map_size = (int)(sizeof(nfsv4_acl_perm_map) /
Packit Service 1d0348
    sizeof(nfsv4_acl_perm_map[0]));
Packit Service 1d0348
Packit Service 1d0348
static const struct {
Packit Service 1d0348
	const int perm;
Packit Service 1d0348
	const char c;
Packit Service 1d0348
	const wchar_t wc;
Packit Service 1d0348
} nfsv4_acl_flag_map[] = {
Packit Service 1d0348
	{ ARCHIVE_ENTRY_ACL_ENTRY_FILE_INHERIT, 'f', L'f' },
Packit Service 1d0348
	{ ARCHIVE_ENTRY_ACL_ENTRY_DIRECTORY_INHERIT, 'd', L'd' },
Packit Service 1d0348
	{ ARCHIVE_ENTRY_ACL_ENTRY_INHERIT_ONLY, 'i', L'i' },
Packit Service 1d0348
	{ ARCHIVE_ENTRY_ACL_ENTRY_NO_PROPAGATE_INHERIT, 'n', L'n' },
Packit Service 1d0348
	{ ARCHIVE_ENTRY_ACL_ENTRY_SUCCESSFUL_ACCESS, 'S', L'S' },
Packit Service 1d0348
	{ ARCHIVE_ENTRY_ACL_ENTRY_FAILED_ACCESS, 'F', L'F' },
Packit Service 1d0348
	{ ARCHIVE_ENTRY_ACL_ENTRY_INHERITED, 'I', L'I' }
Packit Service 1d0348
};
Packit Service 1d0348
Packit Service 1d0348
static const int nfsv4_acl_flag_map_size = (int)(sizeof(nfsv4_acl_flag_map) /
Packit Service 1d0348
    sizeof(nfsv4_acl_flag_map[0]));
Packit Service 1d0348
Packit Service 1d0348
void
Packit Service 1d0348
archive_acl_clear(struct archive_acl *acl)
Packit Service 1d0348
{
Packit Service 1d0348
	struct archive_acl_entry *ap;
Packit Service 1d0348
Packit Service 1d0348
	while (acl->acl_head != NULL) {
Packit Service 1d0348
		ap = acl->acl_head->next;
Packit Service 1d0348
		archive_mstring_clean(&acl->acl_head->name);
Packit Service 1d0348
		free(acl->acl_head);
Packit Service 1d0348
		acl->acl_head = ap;
Packit Service 1d0348
	}
Packit Service 1d0348
	if (acl->acl_text_w != NULL) {
Packit Service 1d0348
		free(acl->acl_text_w);
Packit Service 1d0348
		acl->acl_text_w = NULL;
Packit Service 1d0348
	}
Packit Service 1d0348
	if (acl->acl_text != NULL) {
Packit Service 1d0348
		free(acl->acl_text);
Packit Service 1d0348
		acl->acl_text = NULL;
Packit Service 1d0348
	}
Packit Service 1d0348
	acl->acl_p = NULL;
Packit Service 1d0348
	acl->acl_types = 0;
Packit Service 1d0348
	acl->acl_state = 0; /* Not counting. */
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
void
Packit Service 1d0348
archive_acl_copy(struct archive_acl *dest, struct archive_acl *src)
Packit Service 1d0348
{
Packit Service 1d0348
	struct archive_acl_entry *ap, *ap2;
Packit Service 1d0348
Packit Service 1d0348
	archive_acl_clear(dest);
Packit Service 1d0348
Packit Service 1d0348
	dest->mode = src->mode;
Packit Service 1d0348
	ap = src->acl_head;
Packit Service 1d0348
	while (ap != NULL) {
Packit Service 1d0348
		ap2 = acl_new_entry(dest,
Packit Service 1d0348
		    ap->type, ap->permset, ap->tag, ap->id);
Packit Service 1d0348
		if (ap2 != NULL)
Packit Service 1d0348
			archive_mstring_copy(&ap2->name, &ap->name);
Packit Service 1d0348
		ap = ap->next;
Packit Service 1d0348
	}
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
int
Packit Service 1d0348
archive_acl_add_entry(struct archive_acl *acl,
Packit Service 1d0348
    int type, int permset, int tag, int id, const char *name)
Packit Service 1d0348
{
Packit Service 1d0348
	struct archive_acl_entry *ap;
Packit Service 1d0348
Packit Service 1d0348
	if (acl_special(acl, type, permset, tag) == 0)
Packit Service 1d0348
		return ARCHIVE_OK;
Packit Service 1d0348
	ap = acl_new_entry(acl, type, permset, tag, id);
Packit Service 1d0348
	if (ap == NULL) {
Packit Service 1d0348
		/* XXX Error XXX */
Packit Service 1d0348
		return ARCHIVE_FAILED;
Packit Service 1d0348
	}
Packit Service 1d0348
	if (name != NULL  &&  *name != '\0')
Packit Service 1d0348
		archive_mstring_copy_mbs(&ap->name, name);
Packit Service 1d0348
	else
Packit Service 1d0348
		archive_mstring_clean(&ap->name);
Packit Service 1d0348
	return ARCHIVE_OK;
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
int
Packit Service 1d0348
archive_acl_add_entry_w_len(struct archive_acl *acl,
Packit Service 1d0348
    int type, int permset, int tag, int id, const wchar_t *name, size_t len)
Packit Service 1d0348
{
Packit Service 1d0348
	struct archive_acl_entry *ap;
Packit Service 1d0348
Packit Service 1d0348
	if (acl_special(acl, type, permset, tag) == 0)
Packit Service 1d0348
		return ARCHIVE_OK;
Packit Service 1d0348
	ap = acl_new_entry(acl, type, permset, tag, id);
Packit Service 1d0348
	if (ap == NULL) {
Packit Service 1d0348
		/* XXX Error XXX */
Packit Service 1d0348
		return ARCHIVE_FAILED;
Packit Service 1d0348
	}
Packit Service 1d0348
	if (name != NULL  &&  *name != L'\0' && len > 0)
Packit Service 1d0348
		archive_mstring_copy_wcs_len(&ap->name, name, len);
Packit Service 1d0348
	else
Packit Service 1d0348
		archive_mstring_clean(&ap->name);
Packit Service 1d0348
	return ARCHIVE_OK;
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
static int
Packit Service 1d0348
archive_acl_add_entry_len_l(struct archive_acl *acl,
Packit Service 1d0348
    int type, int permset, int tag, int id, const char *name, size_t len,
Packit Service 1d0348
    struct archive_string_conv *sc)
Packit Service 1d0348
{
Packit Service 1d0348
	struct archive_acl_entry *ap;
Packit Service 1d0348
	int r;
Packit Service 1d0348
Packit Service 1d0348
	if (acl_special(acl, type, permset, tag) == 0)
Packit Service 1d0348
		return ARCHIVE_OK;
Packit Service 1d0348
	ap = acl_new_entry(acl, type, permset, tag, id);
Packit Service 1d0348
	if (ap == NULL) {
Packit Service 1d0348
		/* XXX Error XXX */
Packit Service 1d0348
		return ARCHIVE_FAILED;
Packit Service 1d0348
	}
Packit Service 1d0348
	if (name != NULL  &&  *name != '\0' && len > 0) {
Packit Service 1d0348
		r = archive_mstring_copy_mbs_len_l(&ap->name, name, len, sc);
Packit Service 1d0348
	} else {
Packit Service 1d0348
		r = 0;
Packit Service 1d0348
		archive_mstring_clean(&ap->name);
Packit Service 1d0348
	}
Packit Service 1d0348
	if (r == 0)
Packit Service 1d0348
		return (ARCHIVE_OK);
Packit Service 1d0348
	else if (errno == ENOMEM)
Packit Service 1d0348
		return (ARCHIVE_FATAL);
Packit Service 1d0348
	else
Packit Service 1d0348
		return (ARCHIVE_WARN);
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
/*
Packit Service 1d0348
 * If this ACL entry is part of the standard POSIX permissions set,
Packit Service 1d0348
 * store the permissions in the stat structure and return zero.
Packit Service 1d0348
 */
Packit Service 1d0348
static int
Packit Service 1d0348
acl_special(struct archive_acl *acl, int type, int permset, int tag)
Packit Service 1d0348
{
Packit Service 1d0348
	if (type == ARCHIVE_ENTRY_ACL_TYPE_ACCESS
Packit Service 1d0348
	    && ((permset & ~007) == 0)) {
Packit Service 1d0348
		switch (tag) {
Packit Service 1d0348
		case ARCHIVE_ENTRY_ACL_USER_OBJ:
Packit Service 1d0348
			acl->mode &= ~0700;
Packit Service 1d0348
			acl->mode |= (permset & 7) << 6;
Packit Service 1d0348
			return (0);
Packit Service 1d0348
		case ARCHIVE_ENTRY_ACL_GROUP_OBJ:
Packit Service 1d0348
			acl->mode &= ~0070;
Packit Service 1d0348
			acl->mode |= (permset & 7) << 3;
Packit Service 1d0348
			return (0);
Packit Service 1d0348
		case ARCHIVE_ENTRY_ACL_OTHER:
Packit Service 1d0348
			acl->mode &= ~0007;
Packit Service 1d0348
			acl->mode |= permset & 7;
Packit Service 1d0348
			return (0);
Packit Service 1d0348
		}
Packit Service 1d0348
	}
Packit Service 1d0348
	return (1);
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
/*
Packit Service 1d0348
 * Allocate and populate a new ACL entry with everything but the
Packit Service 1d0348
 * name.
Packit Service 1d0348
 */
Packit Service 1d0348
static struct archive_acl_entry *
Packit Service 1d0348
acl_new_entry(struct archive_acl *acl,
Packit Service 1d0348
    int type, int permset, int tag, int id)
Packit Service 1d0348
{
Packit Service 1d0348
	struct archive_acl_entry *ap, *aq;
Packit Service 1d0348
Packit Service 1d0348
	/* Type argument must be a valid NFS4 or POSIX.1e type.
Packit Service 1d0348
	 * The type must agree with anything already set and
Packit Service 1d0348
	 * the permset must be compatible. */
Packit Service 1d0348
	if (type & ARCHIVE_ENTRY_ACL_TYPE_NFS4) {
Packit Service 1d0348
		if (acl->acl_types & ~ARCHIVE_ENTRY_ACL_TYPE_NFS4) {
Packit Service 1d0348
			return (NULL);
Packit Service 1d0348
		}
Packit Service 1d0348
		if (permset &
Packit Service 1d0348
		    ~(ARCHIVE_ENTRY_ACL_PERMS_NFS4
Packit Service 1d0348
			| ARCHIVE_ENTRY_ACL_INHERITANCE_NFS4)) {
Packit Service 1d0348
			return (NULL);
Packit Service 1d0348
		}
Packit Service 1d0348
	} else	if (type & ARCHIVE_ENTRY_ACL_TYPE_POSIX1E) {
Packit Service 1d0348
		if (acl->acl_types & ~ARCHIVE_ENTRY_ACL_TYPE_POSIX1E) {
Packit Service 1d0348
			return (NULL);
Packit Service 1d0348
		}
Packit Service 1d0348
		if (permset & ~ARCHIVE_ENTRY_ACL_PERMS_POSIX1E) {
Packit Service 1d0348
			return (NULL);
Packit Service 1d0348
		}
Packit Service 1d0348
	} else {
Packit Service 1d0348
		return (NULL);
Packit Service 1d0348
	}
Packit Service 1d0348
Packit Service 1d0348
	/* Verify the tag is valid and compatible with NFS4 or POSIX.1e. */
Packit Service 1d0348
	switch (tag) {
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_USER:
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_USER_OBJ:
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_GROUP:
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_GROUP_OBJ:
Packit Service 1d0348
		/* Tags valid in both NFS4 and POSIX.1e */
Packit Service 1d0348
		break;
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_MASK:
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_OTHER:
Packit Service 1d0348
		/* Tags valid only in POSIX.1e. */
Packit Service 1d0348
		if (type & ~ARCHIVE_ENTRY_ACL_TYPE_POSIX1E) {
Packit Service 1d0348
			return (NULL);
Packit Service 1d0348
		}
Packit Service 1d0348
		break;
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_EVERYONE:
Packit Service 1d0348
		/* Tags valid only in NFS4. */
Packit Service 1d0348
		if (type & ~ARCHIVE_ENTRY_ACL_TYPE_NFS4) {
Packit Service 1d0348
			return (NULL);
Packit Service 1d0348
		}
Packit Service 1d0348
		break;
Packit Service 1d0348
	default:
Packit Service 1d0348
		/* No other values are valid. */
Packit Service 1d0348
		return (NULL);
Packit Service 1d0348
	}
Packit Service 1d0348
Packit Service 1d0348
	if (acl->acl_text_w != NULL) {
Packit Service 1d0348
		free(acl->acl_text_w);
Packit Service 1d0348
		acl->acl_text_w = NULL;
Packit Service 1d0348
	}
Packit Service 1d0348
	if (acl->acl_text != NULL) {
Packit Service 1d0348
		free(acl->acl_text);
Packit Service 1d0348
		acl->acl_text = NULL;
Packit Service 1d0348
	}
Packit Service 1d0348
Packit Service 1d0348
	/*
Packit Service 1d0348
	 * If there's a matching entry already in the list, overwrite it.
Packit Service 1d0348
	 * NFSv4 entries may be repeated and are not overwritten.
Packit Service 1d0348
	 *
Packit Service 1d0348
	 * TODO: compare names of no id is provided (needs more rework)
Packit Service 1d0348
	 */
Packit Service 1d0348
	ap = acl->acl_head;
Packit Service 1d0348
	aq = NULL;
Packit Service 1d0348
	while (ap != NULL) {
Packit Service 1d0348
		if (((type & ARCHIVE_ENTRY_ACL_TYPE_NFS4) == 0) &&
Packit Service 1d0348
		    ap->type == type && ap->tag == tag && ap->id == id) {
Packit Service 1d0348
			if (id != -1 || (tag != ARCHIVE_ENTRY_ACL_USER &&
Packit Service 1d0348
			    tag != ARCHIVE_ENTRY_ACL_GROUP)) {
Packit Service 1d0348
				ap->permset = permset;
Packit Service 1d0348
				return (ap);
Packit Service 1d0348
			}
Packit Service 1d0348
		}
Packit Service 1d0348
		aq = ap;
Packit Service 1d0348
		ap = ap->next;
Packit Service 1d0348
	}
Packit Service 1d0348
Packit Service 1d0348
	/* Add a new entry to the end of the list. */
Packit Service 1d0348
	ap = (struct archive_acl_entry *)calloc(1, sizeof(*ap));
Packit Service 1d0348
	if (ap == NULL)
Packit Service 1d0348
		return (NULL);
Packit Service 1d0348
	if (aq == NULL)
Packit Service 1d0348
		acl->acl_head = ap;
Packit Service 1d0348
	else
Packit Service 1d0348
		aq->next = ap;
Packit Service 1d0348
	ap->type = type;
Packit Service 1d0348
	ap->tag = tag;
Packit Service 1d0348
	ap->id = id;
Packit Service 1d0348
	ap->permset = permset;
Packit Service 1d0348
	acl->acl_types |= type;
Packit Service 1d0348
	return (ap);
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
/*
Packit Service 1d0348
 * Return a count of entries matching "want_type".
Packit Service 1d0348
 */
Packit Service 1d0348
int
Packit Service 1d0348
archive_acl_count(struct archive_acl *acl, int want_type)
Packit Service 1d0348
{
Packit Service 1d0348
	int count;
Packit Service 1d0348
	struct archive_acl_entry *ap;
Packit Service 1d0348
Packit Service 1d0348
	count = 0;
Packit Service 1d0348
	ap = acl->acl_head;
Packit Service 1d0348
	while (ap != NULL) {
Packit Service 1d0348
		if ((ap->type & want_type) != 0)
Packit Service 1d0348
			count++;
Packit Service 1d0348
		ap = ap->next;
Packit Service 1d0348
	}
Packit Service 1d0348
Packit Service 1d0348
	if (count > 0 && ((want_type & ARCHIVE_ENTRY_ACL_TYPE_ACCESS) != 0))
Packit Service 1d0348
		count += 3;
Packit Service 1d0348
	return (count);
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
/*
Packit Service 1d0348
 * Return a bitmask of stored ACL types in an ACL list
Packit Service 1d0348
 */
Packit Service 1d0348
int
Packit Service 1d0348
archive_acl_types(struct archive_acl *acl)
Packit Service 1d0348
{
Packit Service 1d0348
	return (acl->acl_types);
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
/*
Packit Service 1d0348
 * Prepare for reading entries from the ACL data.  Returns a count
Packit Service 1d0348
 * of entries matching "want_type", or zero if there are no
Packit Service 1d0348
 * non-extended ACL entries of that type.
Packit Service 1d0348
 */
Packit Service 1d0348
int
Packit Service 1d0348
archive_acl_reset(struct archive_acl *acl, int want_type)
Packit Service 1d0348
{
Packit Service 1d0348
	int count, cutoff;
Packit Service 1d0348
Packit Service 1d0348
	count = archive_acl_count(acl, want_type);
Packit Service 1d0348
Packit Service 1d0348
	/*
Packit Service 1d0348
	 * If the only entries are the three standard ones,
Packit Service 1d0348
	 * then don't return any ACL data.  (In this case,
Packit Service 1d0348
	 * client can just use chmod(2) to set permissions.)
Packit Service 1d0348
	 */
Packit Service 1d0348
	if ((want_type & ARCHIVE_ENTRY_ACL_TYPE_ACCESS) != 0)
Packit Service 1d0348
		cutoff = 3;
Packit Service 1d0348
	else
Packit Service 1d0348
		cutoff = 0;
Packit Service 1d0348
Packit Service 1d0348
	if (count > cutoff)
Packit Service 1d0348
		acl->acl_state = ARCHIVE_ENTRY_ACL_USER_OBJ;
Packit Service 1d0348
	else
Packit Service 1d0348
		acl->acl_state = 0;
Packit Service 1d0348
	acl->acl_p = acl->acl_head;
Packit Service 1d0348
	return (count);
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
Packit Service 1d0348
/*
Packit Service 1d0348
 * Return the next ACL entry in the list.  Fake entries for the
Packit Service 1d0348
 * standard permissions and include them in the returned list.
Packit Service 1d0348
 */
Packit Service 1d0348
int
Packit Service 1d0348
archive_acl_next(struct archive *a, struct archive_acl *acl, int want_type,
Packit Service 1d0348
    int *type, int *permset, int *tag, int *id, const char **name)
Packit Service 1d0348
{
Packit Service 1d0348
	*name = NULL;
Packit Service 1d0348
	*id = -1;
Packit Service 1d0348
Packit Service 1d0348
	/*
Packit Service 1d0348
	 * The acl_state is either zero (no entries available), -1
Packit Service 1d0348
	 * (reading from list), or an entry type (retrieve that type
Packit Service 1d0348
	 * from ae_stat.aest_mode).
Packit Service 1d0348
	 */
Packit Service 1d0348
	if (acl->acl_state == 0)
Packit Service 1d0348
		return (ARCHIVE_WARN);
Packit Service 1d0348
Packit Service 1d0348
	/* The first three access entries are special. */
Packit Service 1d0348
	if ((want_type & ARCHIVE_ENTRY_ACL_TYPE_ACCESS) != 0) {
Packit Service 1d0348
		switch (acl->acl_state) {
Packit Service 1d0348
		case ARCHIVE_ENTRY_ACL_USER_OBJ:
Packit Service 1d0348
			*permset = (acl->mode >> 6) & 7;
Packit Service 1d0348
			*type = ARCHIVE_ENTRY_ACL_TYPE_ACCESS;
Packit Service 1d0348
			*tag = ARCHIVE_ENTRY_ACL_USER_OBJ;
Packit Service 1d0348
			acl->acl_state = ARCHIVE_ENTRY_ACL_GROUP_OBJ;
Packit Service 1d0348
			return (ARCHIVE_OK);
Packit Service 1d0348
		case ARCHIVE_ENTRY_ACL_GROUP_OBJ:
Packit Service 1d0348
			*permset = (acl->mode >> 3) & 7;
Packit Service 1d0348
			*type = ARCHIVE_ENTRY_ACL_TYPE_ACCESS;
Packit Service 1d0348
			*tag = ARCHIVE_ENTRY_ACL_GROUP_OBJ;
Packit Service 1d0348
			acl->acl_state = ARCHIVE_ENTRY_ACL_OTHER;
Packit Service 1d0348
			return (ARCHIVE_OK);
Packit Service 1d0348
		case ARCHIVE_ENTRY_ACL_OTHER:
Packit Service 1d0348
			*permset = acl->mode & 7;
Packit Service 1d0348
			*type = ARCHIVE_ENTRY_ACL_TYPE_ACCESS;
Packit Service 1d0348
			*tag = ARCHIVE_ENTRY_ACL_OTHER;
Packit Service 1d0348
			acl->acl_state = -1;
Packit Service 1d0348
			acl->acl_p = acl->acl_head;
Packit Service 1d0348
			return (ARCHIVE_OK);
Packit Service 1d0348
		default:
Packit Service 1d0348
			break;
Packit Service 1d0348
		}
Packit Service 1d0348
	}
Packit Service 1d0348
Packit Service 1d0348
	while (acl->acl_p != NULL && (acl->acl_p->type & want_type) == 0)
Packit Service 1d0348
		acl->acl_p = acl->acl_p->next;
Packit Service 1d0348
	if (acl->acl_p == NULL) {
Packit Service 1d0348
		acl->acl_state = 0;
Packit Service 1d0348
		*type = 0;
Packit Service 1d0348
		*permset = 0;
Packit Service 1d0348
		*tag = 0;
Packit Service 1d0348
		*id = -1;
Packit Service 1d0348
		*name = NULL;
Packit Service 1d0348
		return (ARCHIVE_EOF); /* End of ACL entries. */
Packit Service 1d0348
	}
Packit Service 1d0348
	*type = acl->acl_p->type;
Packit Service 1d0348
	*permset = acl->acl_p->permset;
Packit Service 1d0348
	*tag = acl->acl_p->tag;
Packit Service 1d0348
	*id = acl->acl_p->id;
Packit Service 1d0348
	if (archive_mstring_get_mbs(a, &acl->acl_p->name, name) != 0) {
Packit Service 1d0348
		if (errno == ENOMEM)
Packit Service 1d0348
			return (ARCHIVE_FATAL);
Packit Service 1d0348
		*name = NULL;
Packit Service 1d0348
	}
Packit Service 1d0348
	acl->acl_p = acl->acl_p->next;
Packit Service 1d0348
	return (ARCHIVE_OK);
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
/*
Packit Service 1d0348
 * Determine what type of ACL do we want
Packit Service 1d0348
 */
Packit Service 1d0348
static int
Packit Service 1d0348
archive_acl_text_want_type(struct archive_acl *acl, int flags)
Packit Service 1d0348
{
Packit Service 1d0348
	int want_type;
Packit Service 1d0348
Packit Service 1d0348
	/* Check if ACL is NFSv4 */
Packit Service 1d0348
	if ((acl->acl_types & ARCHIVE_ENTRY_ACL_TYPE_NFS4) != 0) {
Packit Service 1d0348
		/* NFSv4 should never mix with POSIX.1e */
Packit Service 1d0348
		if ((acl->acl_types & ARCHIVE_ENTRY_ACL_TYPE_POSIX1E) != 0)
Packit Service 1d0348
			return (0);
Packit Service 1d0348
		else
Packit Service 1d0348
			return (ARCHIVE_ENTRY_ACL_TYPE_NFS4);
Packit Service 1d0348
	}
Packit Service 1d0348
Packit Service 1d0348
	/* Now deal with POSIX.1e ACLs */
Packit Service 1d0348
Packit Service 1d0348
	want_type = 0;
Packit Service 1d0348
	if ((flags & ARCHIVE_ENTRY_ACL_TYPE_ACCESS) != 0)
Packit Service 1d0348
		want_type |= ARCHIVE_ENTRY_ACL_TYPE_ACCESS;
Packit Service 1d0348
	if ((flags & ARCHIVE_ENTRY_ACL_TYPE_DEFAULT) != 0)
Packit Service 1d0348
		want_type |= ARCHIVE_ENTRY_ACL_TYPE_DEFAULT;
Packit Service 1d0348
Packit Service 1d0348
	/* By default we want both access and default ACLs */
Packit Service 1d0348
	if (want_type == 0)
Packit Service 1d0348
		return (ARCHIVE_ENTRY_ACL_TYPE_POSIX1E);
Packit Service 1d0348
Packit Service 1d0348
	return (want_type);
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
/*
Packit Service 1d0348
 * Calculate ACL text string length
Packit Service 1d0348
 */
Packit Service 1d0348
static ssize_t
Packit Service 1d0348
archive_acl_text_len(struct archive_acl *acl, int want_type, int flags,
Packit Service 1d0348
    int wide, struct archive *a, struct archive_string_conv *sc) {
Packit Service 1d0348
	struct archive_acl_entry *ap;
Packit Service 1d0348
	const char *name;
Packit Service 1d0348
	const wchar_t *wname;
Packit Service 1d0348
	int count, idlen, tmp, r;
Packit Service 1d0348
	ssize_t length;
Packit Service 1d0348
	size_t len;
Packit Service 1d0348
Packit Service 1d0348
	count = 0;
Packit Service 1d0348
	length = 0;
Packit Service 1d0348
	for (ap = acl->acl_head; ap != NULL; ap = ap->next) {
Packit Service 1d0348
		if ((ap->type & want_type) == 0)
Packit Service 1d0348
			continue;
Packit Service 1d0348
		/*
Packit Service 1d0348
		 * Filemode-mapping ACL entries are stored exclusively in
Packit Service 1d0348
		 * ap->mode so they should not be in the list
Packit Service 1d0348
		 */
Packit Service 1d0348
		if ((ap->type == ARCHIVE_ENTRY_ACL_TYPE_ACCESS)
Packit Service 1d0348
		    && (ap->tag == ARCHIVE_ENTRY_ACL_USER_OBJ
Packit Service 1d0348
		    || ap->tag == ARCHIVE_ENTRY_ACL_GROUP_OBJ
Packit Service 1d0348
		    || ap->tag == ARCHIVE_ENTRY_ACL_OTHER))
Packit Service 1d0348
			continue;
Packit Service 1d0348
		count++;
Packit Service 1d0348
		if ((want_type & ARCHIVE_ENTRY_ACL_TYPE_DEFAULT) != 0
Packit Service 1d0348
		    && (ap->type & ARCHIVE_ENTRY_ACL_TYPE_DEFAULT) != 0)
Packit Service 1d0348
			length += 8; /* "default:" */
Packit Service 1d0348
		switch (ap->tag) {
Packit Service 1d0348
		case ARCHIVE_ENTRY_ACL_USER_OBJ:
Packit Service 1d0348
			if (want_type == ARCHIVE_ENTRY_ACL_TYPE_NFS4) {
Packit Service 1d0348
				length += 6; /* "owner@" */
Packit Service 1d0348
				break;
Packit Service 1d0348
			}
Packit Service 1d0348
			/* FALLTHROUGH */
Packit Service 1d0348
		case ARCHIVE_ENTRY_ACL_USER:
Packit Service 1d0348
		case ARCHIVE_ENTRY_ACL_MASK:
Packit Service 1d0348
			length += 4; /* "user", "mask" */
Packit Service 1d0348
			break;
Packit Service 1d0348
		case ARCHIVE_ENTRY_ACL_GROUP_OBJ:
Packit Service 1d0348
			if (want_type == ARCHIVE_ENTRY_ACL_TYPE_NFS4) {
Packit Service 1d0348
				length += 6; /* "group@" */
Packit Service 1d0348
				break;
Packit Service 1d0348
			}
Packit Service 1d0348
			/* FALLTHROUGH */
Packit Service 1d0348
		case ARCHIVE_ENTRY_ACL_GROUP:
Packit Service 1d0348
		case ARCHIVE_ENTRY_ACL_OTHER:
Packit Service 1d0348
			length += 5; /* "group", "other" */
Packit Service 1d0348
			break;
Packit Service 1d0348
		case ARCHIVE_ENTRY_ACL_EVERYONE:
Packit Service 1d0348
			length += 9; /* "everyone@" */
Packit Service 1d0348
			break;
Packit Service 1d0348
		}
Packit Service 1d0348
		length += 1; /* colon after tag */
Packit Service 1d0348
		if (ap->tag == ARCHIVE_ENTRY_ACL_USER ||
Packit Service 1d0348
		    ap->tag == ARCHIVE_ENTRY_ACL_GROUP) {
Packit Service 1d0348
			if (wide) {
Packit Service 1d0348
				r = archive_mstring_get_wcs(a, &ap->name,
Packit Service 1d0348
				    &wname);
Packit Service 1d0348
				if (r == 0 && wname != NULL)
Packit Service 1d0348
					length += wcslen(wname);
Packit Service 1d0348
				else if (r < 0 && errno == ENOMEM)
Packit Service 1d0348
					return (0);
Packit Service 1d0348
				else
Packit Service 1d0348
					length += sizeof(uid_t) * 3 + 1;
Packit Service 1d0348
			} else {
Packit Service 1d0348
				r = archive_mstring_get_mbs_l(&ap->name, &name,
Packit Service 1d0348
				    &len, sc);
Packit Service 1d0348
				if (r != 0)
Packit Service 1d0348
					return (0);
Packit Service 1d0348
				if (len > 0 && name != NULL)
Packit Service 1d0348
					length += len;
Packit Service 1d0348
				else
Packit Service 1d0348
					length += sizeof(uid_t) * 3 + 1;
Packit Service 1d0348
			}
Packit Service 1d0348
			length += 1; /* colon after user or group name */
Packit Service 1d0348
		} else if (want_type != ARCHIVE_ENTRY_ACL_TYPE_NFS4)
Packit Service 1d0348
			length += 1; /* 2nd colon empty user,group or other */
Packit Service 1d0348
Packit Service 1d0348
		if (((flags & ARCHIVE_ENTRY_ACL_STYLE_SOLARIS) != 0)
Packit Service 1d0348
		    && ((want_type & ARCHIVE_ENTRY_ACL_TYPE_POSIX1E) != 0)
Packit Service 1d0348
		    && (ap->tag == ARCHIVE_ENTRY_ACL_OTHER
Packit Service 1d0348
		    || ap->tag == ARCHIVE_ENTRY_ACL_MASK)) {
Packit Service 1d0348
			/* Solaris has no colon after other: and mask: */
Packit Service 1d0348
			length = length - 1;
Packit Service 1d0348
		}
Packit Service 1d0348
Packit Service 1d0348
		if (want_type == ARCHIVE_ENTRY_ACL_TYPE_NFS4) {
Packit Service 1d0348
			/* rwxpdDaARWcCos:fdinSFI:deny */
Packit Service 1d0348
			length += 27;
Packit Service 1d0348
			if ((ap->type & ARCHIVE_ENTRY_ACL_TYPE_DENY) == 0)
Packit Service 1d0348
				length += 1; /* allow, alarm, audit */
Packit Service 1d0348
		} else
Packit Service 1d0348
			length += 3; /* rwx */
Packit Service 1d0348
Packit Service 1d0348
		if ((ap->tag == ARCHIVE_ENTRY_ACL_USER ||
Packit Service 1d0348
		    ap->tag == ARCHIVE_ENTRY_ACL_GROUP) &&
Packit Service 1d0348
		    (flags & ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID) != 0) {
Packit Service 1d0348
			length += 1; /* colon */
Packit Service 1d0348
			/* ID digit count */
Packit Service 1d0348
			idlen = 1;
Packit Service 1d0348
			tmp = ap->id;
Packit Service 1d0348
			while (tmp > 9) {
Packit Service 1d0348
				tmp = tmp / 10;
Packit Service 1d0348
				idlen++;
Packit Service 1d0348
			}
Packit Service 1d0348
			length += idlen;
Packit Service 1d0348
		}
Packit Service 1d0348
		length ++; /* entry separator */
Packit Service 1d0348
	}
Packit Service 1d0348
Packit Service 1d0348
	/* Add filemode-mapping access entries to the length */
Packit Service 1d0348
	if ((want_type & ARCHIVE_ENTRY_ACL_TYPE_ACCESS) != 0) {
Packit Service 1d0348
		if ((flags & ARCHIVE_ENTRY_ACL_STYLE_SOLARIS) != 0) {
Packit Service 1d0348
			/* "user::rwx\ngroup::rwx\nother:rwx\n" */
Packit Service 1d0348
			length += 31;
Packit Service 1d0348
		} else {
Packit Service 1d0348
			/* "user::rwx\ngroup::rwx\nother::rwx\n" */
Packit Service 1d0348
			length += 32;
Packit Service 1d0348
		}
Packit Service 1d0348
	} else if (count == 0)
Packit Service 1d0348
		return (0);
Packit Service 1d0348
Packit Service 1d0348
	/* The terminating character is included in count */
Packit Service 1d0348
	return (length);
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
/*
Packit Service 1d0348
 * Generate a wide text version of the ACL. The flags parameter controls
Packit Service 1d0348
 * the type and style of the generated ACL.
Packit Service 1d0348
 */
Packit Service 1d0348
wchar_t *
Packit Service 1d0348
archive_acl_to_text_w(struct archive_acl *acl, ssize_t *text_len, int flags,
Packit Service 1d0348
    struct archive *a)
Packit Service 1d0348
{
Packit Service 1d0348
	int count;
Packit Service 1d0348
	ssize_t length;
Packit Service 1d0348
	size_t len;
Packit Service 1d0348
	const wchar_t *wname;
Packit Service 1d0348
	const wchar_t *prefix;
Packit Service 1d0348
	wchar_t separator;
Packit Service 1d0348
	struct archive_acl_entry *ap;
Packit Service 1d0348
	int id, r, want_type;
Packit Service 1d0348
	wchar_t *wp, *ws;
Packit Service 1d0348
Packit Service 1d0348
	want_type = archive_acl_text_want_type(acl, flags);
Packit Service 1d0348
Packit Service 1d0348
	/* Both NFSv4 and POSIX.1 types found */
Packit Service 1d0348
	if (want_type == 0)
Packit Service 1d0348
		return (NULL);
Packit Service 1d0348
Packit Service 1d0348
	if (want_type == ARCHIVE_ENTRY_ACL_TYPE_POSIX1E)
Packit Service 1d0348
		flags |= ARCHIVE_ENTRY_ACL_STYLE_MARK_DEFAULT;
Packit Service 1d0348
Packit Service 1d0348
	length = archive_acl_text_len(acl, want_type, flags, 1, a, NULL);
Packit Service 1d0348
Packit Service 1d0348
	if (length == 0)
Packit Service 1d0348
		return (NULL);
Packit Service 1d0348
Packit Service 1d0348
	if (flags & ARCHIVE_ENTRY_ACL_STYLE_SEPARATOR_COMMA)
Packit Service 1d0348
		separator = L',';
Packit Service 1d0348
	else
Packit Service 1d0348
		separator = L'\n';
Packit Service 1d0348
Packit Service 1d0348
	/* Now, allocate the string and actually populate it. */
Packit Service 1d0348
	wp = ws = (wchar_t *)malloc(length * sizeof(wchar_t));
Packit Service 1d0348
	if (wp == NULL) {
Packit Service 1d0348
		if (errno == ENOMEM)
Packit Service 1d0348
			__archive_errx(1, "No memory");
Packit Service 1d0348
		return (NULL);
Packit Service 1d0348
	}
Packit Service 1d0348
	count = 0;
Packit Service 1d0348
Packit Service 1d0348
	if ((want_type & ARCHIVE_ENTRY_ACL_TYPE_ACCESS) != 0) {
Packit Service 1d0348
		append_entry_w(&wp, NULL, ARCHIVE_ENTRY_ACL_TYPE_ACCESS,
Packit Service 1d0348
		    ARCHIVE_ENTRY_ACL_USER_OBJ, flags, NULL,
Packit Service 1d0348
		    acl->mode & 0700, -1);
Packit Service 1d0348
		*wp++ = separator;
Packit Service 1d0348
		append_entry_w(&wp, NULL, ARCHIVE_ENTRY_ACL_TYPE_ACCESS,
Packit Service 1d0348
		    ARCHIVE_ENTRY_ACL_GROUP_OBJ, flags, NULL,
Packit Service 1d0348
		    acl->mode & 0070, -1);
Packit Service 1d0348
		*wp++ = separator;
Packit Service 1d0348
		append_entry_w(&wp, NULL, ARCHIVE_ENTRY_ACL_TYPE_ACCESS,
Packit Service 1d0348
		    ARCHIVE_ENTRY_ACL_OTHER, flags, NULL,
Packit Service 1d0348
		    acl->mode & 0007, -1);
Packit Service 1d0348
		count += 3;
Packit Service 1d0348
	}
Packit Service 1d0348
Packit Service 1d0348
	for (ap = acl->acl_head; ap != NULL; ap = ap->next) {
Packit Service 1d0348
		if ((ap->type & want_type) == 0)
Packit Service 1d0348
			continue;
Packit Service 1d0348
		/*
Packit Service 1d0348
		 * Filemode-mapping ACL entries are stored exclusively in
Packit Service 1d0348
		 * ap->mode so they should not be in the list
Packit Service 1d0348
		 */
Packit Service 1d0348
		if ((ap->type == ARCHIVE_ENTRY_ACL_TYPE_ACCESS)
Packit Service 1d0348
		    && (ap->tag == ARCHIVE_ENTRY_ACL_USER_OBJ
Packit Service 1d0348
		    || ap->tag == ARCHIVE_ENTRY_ACL_GROUP_OBJ
Packit Service 1d0348
		    || ap->tag == ARCHIVE_ENTRY_ACL_OTHER))
Packit Service 1d0348
			continue;
Packit Service 1d0348
		if (ap->type == ARCHIVE_ENTRY_ACL_TYPE_DEFAULT &&
Packit Service 1d0348
		    (flags & ARCHIVE_ENTRY_ACL_STYLE_MARK_DEFAULT) != 0)
Packit Service 1d0348
			prefix = L"default:";
Packit Service 1d0348
		else
Packit Service 1d0348
			prefix = NULL;
Packit Service 1d0348
		r = archive_mstring_get_wcs(a, &ap->name, &wname);
Packit Service 1d0348
		if (r == 0) {
Packit Service 1d0348
			if (count > 0)
Packit Service 1d0348
				*wp++ = separator;
Packit Service 1d0348
			if (flags & ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID)
Packit Service 1d0348
				id = ap->id;
Packit Service 1d0348
			else
Packit Service 1d0348
				id = -1;
Packit Service 1d0348
			append_entry_w(&wp, prefix, ap->type, ap->tag, flags,
Packit Service 1d0348
			    wname, ap->permset, id);
Packit Service 1d0348
			count++;
Packit Service 1d0348
		} else if (r < 0 && errno == ENOMEM)
Packit Service 1d0348
			return (NULL);
Packit Service 1d0348
	}
Packit Service 1d0348
Packit Service 1d0348
	/* Add terminating character */
Packit Service 1d0348
	*wp++ = L'\0';
Packit Service 1d0348
Packit Service 1d0348
	len = wcslen(ws);
Packit Service 1d0348
Packit Service 1d0348
	if ((ssize_t)len > (length - 1))
Packit Service 1d0348
		__archive_errx(1, "Buffer overrun");
Packit Service 1d0348
Packit Service 1d0348
	if (text_len != NULL)
Packit Service 1d0348
		*text_len = len;
Packit Service 1d0348
Packit Service 1d0348
	return (ws);
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
static void
Packit Service 1d0348
append_id_w(wchar_t **wp, int id)
Packit Service 1d0348
{
Packit Service 1d0348
	if (id < 0)
Packit Service 1d0348
		id = 0;
Packit Service 1d0348
	if (id > 9)
Packit Service 1d0348
		append_id_w(wp, id / 10);
Packit Service 1d0348
	*(*wp)++ = L"0123456789"[id % 10];
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
static void
Packit Service 1d0348
append_entry_w(wchar_t **wp, const wchar_t *prefix, int type,
Packit Service 1d0348
    int tag, int flags, const wchar_t *wname, int perm, int id)
Packit Service 1d0348
{
Packit Service 1d0348
	int i;
Packit Service 1d0348
Packit Service 1d0348
	if (prefix != NULL) {
Packit Service 1d0348
		wcscpy(*wp, prefix);
Packit Service 1d0348
		*wp += wcslen(*wp);
Packit Service 1d0348
	}
Packit Service 1d0348
	switch (tag) {
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_USER_OBJ:
Packit Service 1d0348
		wname = NULL;
Packit Service 1d0348
		id = -1;
Packit Service 1d0348
		if ((type & ARCHIVE_ENTRY_ACL_TYPE_NFS4) != 0) {
Packit Service 1d0348
			wcscpy(*wp, L"owner@");
Packit Service 1d0348
			break;
Packit Service 1d0348
		}
Packit Service 1d0348
		/* FALLTHROUGH */
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_USER:
Packit Service 1d0348
		wcscpy(*wp, L"user");
Packit Service 1d0348
		break;
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_GROUP_OBJ:
Packit Service 1d0348
		wname = NULL;
Packit Service 1d0348
		id = -1;
Packit Service 1d0348
		if ((type & ARCHIVE_ENTRY_ACL_TYPE_NFS4) != 0) {
Packit Service 1d0348
			wcscpy(*wp, L"group@");
Packit Service 1d0348
			break;
Packit Service 1d0348
		}
Packit Service 1d0348
		/* FALLTHROUGH */
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_GROUP:
Packit Service 1d0348
		wcscpy(*wp, L"group");
Packit Service 1d0348
		break;
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_MASK:
Packit Service 1d0348
		wcscpy(*wp, L"mask");
Packit Service 1d0348
		wname = NULL;
Packit Service 1d0348
		id = -1;
Packit Service 1d0348
		break;
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_OTHER:
Packit Service 1d0348
		wcscpy(*wp, L"other");
Packit Service 1d0348
		wname = NULL;
Packit Service 1d0348
		id = -1;
Packit Service 1d0348
		break;
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_EVERYONE:
Packit Service 1d0348
		wcscpy(*wp, L"everyone@");
Packit Service 1d0348
		wname = NULL;
Packit Service 1d0348
		id = -1;
Packit Service 1d0348
		break;
Packit Service 1d0348
	}
Packit Service 1d0348
	*wp += wcslen(*wp);
Packit Service 1d0348
	*(*wp)++ = L':';
Packit Service 1d0348
	if (((type & ARCHIVE_ENTRY_ACL_TYPE_POSIX1E) != 0) ||
Packit Service 1d0348
	    tag == ARCHIVE_ENTRY_ACL_USER ||
Packit Service 1d0348
	    tag == ARCHIVE_ENTRY_ACL_GROUP) {
Packit Service 1d0348
		if (wname != NULL) {
Packit Service 1d0348
			wcscpy(*wp, wname);
Packit Service 1d0348
			*wp += wcslen(*wp);
Packit Service 1d0348
		} else if (tag == ARCHIVE_ENTRY_ACL_USER
Packit Service 1d0348
		    || tag == ARCHIVE_ENTRY_ACL_GROUP) {
Packit Service 1d0348
			append_id_w(wp, id);
Packit Service 1d0348
			if ((type & ARCHIVE_ENTRY_ACL_TYPE_NFS4) == 0)
Packit Service 1d0348
				id = -1;
Packit Service 1d0348
		}
Packit Service 1d0348
		/* Solaris style has no second colon after other and mask */
Packit Service 1d0348
		if (((flags & ARCHIVE_ENTRY_ACL_STYLE_SOLARIS) == 0)
Packit Service 1d0348
		    || (tag != ARCHIVE_ENTRY_ACL_OTHER
Packit Service 1d0348
		    && tag != ARCHIVE_ENTRY_ACL_MASK))
Packit Service 1d0348
			*(*wp)++ = L':';
Packit Service 1d0348
	}
Packit Service 1d0348
	if ((type & ARCHIVE_ENTRY_ACL_TYPE_POSIX1E) != 0) {
Packit Service 1d0348
		/* POSIX.1e ACL perms */
Packit Service 1d0348
		*(*wp)++ = (perm & 0444) ? L'r' : L'-';
Packit Service 1d0348
		*(*wp)++ = (perm & 0222) ? L'w' : L'-';
Packit Service 1d0348
		*(*wp)++ = (perm & 0111) ? L'x' : L'-';
Packit Service 1d0348
	} else {
Packit Service 1d0348
		/* NFSv4 ACL perms */
Packit Service 1d0348
		for (i = 0; i < nfsv4_acl_perm_map_size; i++) {
Packit Service 1d0348
			if (perm & nfsv4_acl_perm_map[i].perm)
Packit Service 1d0348
				*(*wp)++ = nfsv4_acl_perm_map[i].wc;
Packit Service 1d0348
			else if ((flags & ARCHIVE_ENTRY_ACL_STYLE_COMPACT) == 0)
Packit Service 1d0348
				*(*wp)++ = L'-';
Packit Service 1d0348
		}
Packit Service 1d0348
		*(*wp)++ = L':';
Packit Service 1d0348
		for (i = 0; i < nfsv4_acl_flag_map_size; i++) {
Packit Service 1d0348
			if (perm & nfsv4_acl_flag_map[i].perm)
Packit Service 1d0348
				*(*wp)++ = nfsv4_acl_flag_map[i].wc;
Packit Service 1d0348
			else if ((flags & ARCHIVE_ENTRY_ACL_STYLE_COMPACT) == 0)
Packit Service 1d0348
				*(*wp)++ = L'-';
Packit Service 1d0348
		}
Packit Service 1d0348
		*(*wp)++ = L':';
Packit Service 1d0348
		switch (type) {
Packit Service 1d0348
		case ARCHIVE_ENTRY_ACL_TYPE_ALLOW:
Packit Service 1d0348
			wcscpy(*wp, L"allow");
Packit Service 1d0348
			break;
Packit Service 1d0348
		case ARCHIVE_ENTRY_ACL_TYPE_DENY:
Packit Service 1d0348
			wcscpy(*wp, L"deny");
Packit Service 1d0348
			break;
Packit Service 1d0348
		case ARCHIVE_ENTRY_ACL_TYPE_AUDIT:
Packit Service 1d0348
			wcscpy(*wp, L"audit");
Packit Service 1d0348
			break;
Packit Service 1d0348
		case ARCHIVE_ENTRY_ACL_TYPE_ALARM:
Packit Service 1d0348
			wcscpy(*wp, L"alarm");
Packit Service 1d0348
			break;
Packit Service 1d0348
		default:
Packit Service 1d0348
			break;
Packit Service 1d0348
		}
Packit Service 1d0348
		*wp += wcslen(*wp);
Packit Service 1d0348
	}
Packit Service 1d0348
	if (id != -1) {
Packit Service 1d0348
		*(*wp)++ = L':';
Packit Service 1d0348
		append_id_w(wp, id);
Packit Service 1d0348
	}
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
/*
Packit Service 1d0348
 * Generate a text version of the ACL. The flags parameter controls
Packit Service 1d0348
 * the type and style of the generated ACL.
Packit Service 1d0348
 */
Packit Service 1d0348
char *
Packit Service 1d0348
archive_acl_to_text_l(struct archive_acl *acl, ssize_t *text_len, int flags,
Packit Service 1d0348
    struct archive_string_conv *sc)
Packit Service 1d0348
{
Packit Service 1d0348
	int count;
Packit Service 1d0348
	ssize_t length;
Packit Service 1d0348
	size_t len;
Packit Service 1d0348
	const char *name;
Packit Service 1d0348
	const char *prefix;
Packit Service 1d0348
	char separator;
Packit Service 1d0348
	struct archive_acl_entry *ap;
Packit Service 1d0348
	int id, r, want_type;
Packit Service 1d0348
	char *p, *s;
Packit Service 1d0348
Packit Service 1d0348
	want_type = archive_acl_text_want_type(acl, flags);
Packit Service 1d0348
Packit Service 1d0348
	/* Both NFSv4 and POSIX.1 types found */
Packit Service 1d0348
	if (want_type == 0)
Packit Service 1d0348
		return (NULL);
Packit Service 1d0348
Packit Service 1d0348
	if (want_type == ARCHIVE_ENTRY_ACL_TYPE_POSIX1E)
Packit Service 1d0348
		flags |= ARCHIVE_ENTRY_ACL_STYLE_MARK_DEFAULT;
Packit Service 1d0348
Packit Service 1d0348
	length = archive_acl_text_len(acl, want_type, flags, 0, NULL, sc);
Packit Service 1d0348
Packit Service 1d0348
	if (length == 0)
Packit Service 1d0348
		return (NULL);
Packit Service 1d0348
Packit Service 1d0348
	if (flags & ARCHIVE_ENTRY_ACL_STYLE_SEPARATOR_COMMA)
Packit Service 1d0348
		separator = ',';
Packit Service 1d0348
	else
Packit Service 1d0348
		separator = '\n';
Packit Service 1d0348
Packit Service 1d0348
	/* Now, allocate the string and actually populate it. */
Packit Service 1d0348
	p = s = (char *)malloc(length * sizeof(char));
Packit Service 1d0348
	if (p == NULL) {
Packit Service 1d0348
		if (errno == ENOMEM)
Packit Service 1d0348
			__archive_errx(1, "No memory");
Packit Service 1d0348
		return (NULL);
Packit Service 1d0348
	}
Packit Service 1d0348
	count = 0;
Packit Service 1d0348
Packit Service 1d0348
	if ((want_type & ARCHIVE_ENTRY_ACL_TYPE_ACCESS) != 0) {
Packit Service 1d0348
		append_entry(&p, NULL, ARCHIVE_ENTRY_ACL_TYPE_ACCESS,
Packit Service 1d0348
		    ARCHIVE_ENTRY_ACL_USER_OBJ, flags, NULL,
Packit Service 1d0348
		    acl->mode & 0700, -1);
Packit Service 1d0348
		*p++ = separator;
Packit Service 1d0348
		append_entry(&p, NULL, ARCHIVE_ENTRY_ACL_TYPE_ACCESS,
Packit Service 1d0348
		    ARCHIVE_ENTRY_ACL_GROUP_OBJ, flags, NULL,
Packit Service 1d0348
		    acl->mode & 0070, -1);
Packit Service 1d0348
		*p++ = separator;
Packit Service 1d0348
		append_entry(&p, NULL, ARCHIVE_ENTRY_ACL_TYPE_ACCESS,
Packit Service 1d0348
		    ARCHIVE_ENTRY_ACL_OTHER, flags, NULL,
Packit Service 1d0348
		    acl->mode & 0007, -1);
Packit Service 1d0348
		count += 3;
Packit Service 1d0348
	}
Packit Service 1d0348
Packit Service 1d0348
	for (ap = acl->acl_head; ap != NULL; ap = ap->next) {
Packit Service 1d0348
		if ((ap->type & want_type) == 0)
Packit Service 1d0348
			continue;
Packit Service 1d0348
		/*
Packit Service 1d0348
		 * Filemode-mapping ACL entries are stored exclusively in
Packit Service 1d0348
		 * ap->mode so they should not be in the list
Packit Service 1d0348
		 */
Packit Service 1d0348
		if ((ap->type == ARCHIVE_ENTRY_ACL_TYPE_ACCESS)
Packit Service 1d0348
		    && (ap->tag == ARCHIVE_ENTRY_ACL_USER_OBJ
Packit Service 1d0348
		    || ap->tag == ARCHIVE_ENTRY_ACL_GROUP_OBJ
Packit Service 1d0348
		    || ap->tag == ARCHIVE_ENTRY_ACL_OTHER))
Packit Service 1d0348
			continue;
Packit Service 1d0348
		if (ap->type == ARCHIVE_ENTRY_ACL_TYPE_DEFAULT &&
Packit Service 1d0348
		    (flags & ARCHIVE_ENTRY_ACL_STYLE_MARK_DEFAULT) != 0)
Packit Service 1d0348
			prefix = "default:";
Packit Service 1d0348
		else
Packit Service 1d0348
			prefix = NULL;
Packit Service 1d0348
		r = archive_mstring_get_mbs_l(
Packit Service 1d0348
		    &ap->name, &name, &len, sc);
Packit Service 1d0348
		if (r != 0)
Packit Service 1d0348
			return (NULL);
Packit Service 1d0348
		if (count > 0)
Packit Service 1d0348
			*p++ = separator;
Packit Service 1d0348
		if (name == NULL ||
Packit Service 1d0348
		    (flags & ARCHIVE_ENTRY_ACL_STYLE_EXTRA_ID)) {
Packit Service 1d0348
			id = ap->id;
Packit Service 1d0348
		} else {
Packit Service 1d0348
			id = -1;
Packit Service 1d0348
		}
Packit Service 1d0348
		append_entry(&p, prefix, ap->type, ap->tag, flags, name,
Packit Service 1d0348
		    ap->permset, id);
Packit Service 1d0348
		count++;
Packit Service 1d0348
	}
Packit Service 1d0348
Packit Service 1d0348
	/* Add terminating character */
Packit Service 1d0348
	*p++ = '\0';
Packit Service 1d0348
Packit Service 1d0348
	len = strlen(s);
Packit Service 1d0348
Packit Service 1d0348
	if ((ssize_t)len > (length - 1))
Packit Service 1d0348
		__archive_errx(1, "Buffer overrun");
Packit Service 1d0348
Packit Service 1d0348
	if (text_len != NULL)
Packit Service 1d0348
		*text_len = len;
Packit Service 1d0348
Packit Service 1d0348
	return (s);
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
static void
Packit Service 1d0348
append_id(char **p, int id)
Packit Service 1d0348
{
Packit Service 1d0348
	if (id < 0)
Packit Service 1d0348
		id = 0;
Packit Service 1d0348
	if (id > 9)
Packit Service 1d0348
		append_id(p, id / 10);
Packit Service 1d0348
	*(*p)++ = "0123456789"[id % 10];
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
static void
Packit Service 1d0348
append_entry(char **p, const char *prefix, int type,
Packit Service 1d0348
    int tag, int flags, const char *name, int perm, int id)
Packit Service 1d0348
{
Packit Service 1d0348
	int i;
Packit Service 1d0348
Packit Service 1d0348
	if (prefix != NULL) {
Packit Service 1d0348
		strcpy(*p, prefix);
Packit Service 1d0348
		*p += strlen(*p);
Packit Service 1d0348
	}
Packit Service 1d0348
	switch (tag) {
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_USER_OBJ:
Packit Service 1d0348
		name = NULL;
Packit Service 1d0348
		id = -1;
Packit Service 1d0348
		if ((type & ARCHIVE_ENTRY_ACL_TYPE_NFS4) != 0) {
Packit Service 1d0348
			strcpy(*p, "owner@");
Packit Service 1d0348
			break;
Packit Service 1d0348
		}
Packit Service 1d0348
		/* FALLTHROUGH */
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_USER:
Packit Service 1d0348
		strcpy(*p, "user");
Packit Service 1d0348
		break;
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_GROUP_OBJ:
Packit Service 1d0348
		name = NULL;
Packit Service 1d0348
		id = -1;
Packit Service 1d0348
		if ((type & ARCHIVE_ENTRY_ACL_TYPE_NFS4) != 0) {
Packit Service 1d0348
			strcpy(*p, "group@");
Packit Service 1d0348
			break;
Packit Service 1d0348
		}
Packit Service 1d0348
		/* FALLTHROUGH */
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_GROUP:
Packit Service 1d0348
		strcpy(*p, "group");
Packit Service 1d0348
		break;
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_MASK:
Packit Service 1d0348
		strcpy(*p, "mask");
Packit Service 1d0348
		name = NULL;
Packit Service 1d0348
		id = -1;
Packit Service 1d0348
		break;
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_OTHER:
Packit Service 1d0348
		strcpy(*p, "other");
Packit Service 1d0348
		name = NULL;
Packit Service 1d0348
		id = -1;
Packit Service 1d0348
		break;
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_EVERYONE:
Packit Service 1d0348
		strcpy(*p, "everyone@");
Packit Service 1d0348
		name = NULL;
Packit Service 1d0348
		id = -1;
Packit Service 1d0348
		break;
Packit Service 1d0348
	}
Packit Service 1d0348
	*p += strlen(*p);
Packit Service 1d0348
	*(*p)++ = ':';
Packit Service 1d0348
	if (((type & ARCHIVE_ENTRY_ACL_TYPE_POSIX1E) != 0) ||
Packit Service 1d0348
	    tag == ARCHIVE_ENTRY_ACL_USER ||
Packit Service 1d0348
	    tag == ARCHIVE_ENTRY_ACL_GROUP) {
Packit Service 1d0348
		if (name != NULL) {
Packit Service 1d0348
			strcpy(*p, name);
Packit Service 1d0348
			*p += strlen(*p);
Packit Service 1d0348
		} else if (tag == ARCHIVE_ENTRY_ACL_USER
Packit Service 1d0348
		    || tag == ARCHIVE_ENTRY_ACL_GROUP) {
Packit Service 1d0348
			append_id(p, id);
Packit Service 1d0348
			if ((type & ARCHIVE_ENTRY_ACL_TYPE_NFS4) == 0)
Packit Service 1d0348
				id = -1;
Packit Service 1d0348
		}
Packit Service 1d0348
		/* Solaris style has no second colon after other and mask */
Packit Service 1d0348
		if (((flags & ARCHIVE_ENTRY_ACL_STYLE_SOLARIS) == 0)
Packit Service 1d0348
		    || (tag != ARCHIVE_ENTRY_ACL_OTHER
Packit Service 1d0348
		    && tag != ARCHIVE_ENTRY_ACL_MASK))
Packit Service 1d0348
			*(*p)++ = ':';
Packit Service 1d0348
	}
Packit Service 1d0348
	if ((type & ARCHIVE_ENTRY_ACL_TYPE_POSIX1E) != 0) {
Packit Service 1d0348
		/* POSIX.1e ACL perms */
Packit Service 1d0348
		*(*p)++ = (perm & 0444) ? 'r' : '-';
Packit Service 1d0348
		*(*p)++ = (perm & 0222) ? 'w' : '-';
Packit Service 1d0348
		*(*p)++ = (perm & 0111) ? 'x' : '-';
Packit Service 1d0348
	} else {
Packit Service 1d0348
		/* NFSv4 ACL perms */
Packit Service 1d0348
		for (i = 0; i < nfsv4_acl_perm_map_size; i++) {
Packit Service 1d0348
			if (perm & nfsv4_acl_perm_map[i].perm)
Packit Service 1d0348
				*(*p)++ = nfsv4_acl_perm_map[i].c;
Packit Service 1d0348
			else if ((flags & ARCHIVE_ENTRY_ACL_STYLE_COMPACT) == 0)
Packit Service 1d0348
				*(*p)++ = '-';
Packit Service 1d0348
		}
Packit Service 1d0348
		*(*p)++ = ':';
Packit Service 1d0348
		for (i = 0; i < nfsv4_acl_flag_map_size; i++) {
Packit Service 1d0348
			if (perm & nfsv4_acl_flag_map[i].perm)
Packit Service 1d0348
				*(*p)++ = nfsv4_acl_flag_map[i].c;
Packit Service 1d0348
			else if ((flags & ARCHIVE_ENTRY_ACL_STYLE_COMPACT) == 0)
Packit Service 1d0348
				*(*p)++ = '-';
Packit Service 1d0348
		}
Packit Service 1d0348
		*(*p)++ = ':';
Packit Service 1d0348
		switch (type) {
Packit Service 1d0348
		case ARCHIVE_ENTRY_ACL_TYPE_ALLOW:
Packit Service 1d0348
			strcpy(*p, "allow");
Packit Service 1d0348
			break;
Packit Service 1d0348
		case ARCHIVE_ENTRY_ACL_TYPE_DENY:
Packit Service 1d0348
			strcpy(*p, "deny");
Packit Service 1d0348
			break;
Packit Service 1d0348
		case ARCHIVE_ENTRY_ACL_TYPE_AUDIT:
Packit Service 1d0348
			strcpy(*p, "audit");
Packit Service 1d0348
			break;
Packit Service 1d0348
		case ARCHIVE_ENTRY_ACL_TYPE_ALARM:
Packit Service 1d0348
			strcpy(*p, "alarm");
Packit Service 1d0348
			break;
Packit Service 1d0348
		}
Packit Service 1d0348
		*p += strlen(*p);
Packit Service 1d0348
	}
Packit Service 1d0348
	if (id != -1) {
Packit Service 1d0348
		*(*p)++ = ':';
Packit Service 1d0348
		append_id(p, id);
Packit Service 1d0348
	}
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
/*
Packit Service 1d0348
 * Parse a wide ACL text string.
Packit Service 1d0348
 *
Packit Service 1d0348
 * The want_type argument may be one of the following:
Packit Service 1d0348
 * ARCHIVE_ENTRY_ACL_TYPE_ACCESS - text is a POSIX.1e ACL of type ACCESS
Packit Service 1d0348
 * ARCHIVE_ENTRY_ACL_TYPE_DEFAULT - text is a POSIX.1e ACL of type DEFAULT
Packit Service 1d0348
 * ARCHIVE_ENTRY_ACL_TYPE_NFS4 - text is as a NFSv4 ACL
Packit Service 1d0348
 *
Packit Service 1d0348
 * POSIX.1e ACL entries prefixed with "default:" are treated as
Packit Service 1d0348
 * ARCHIVE_ENTRY_ACL_TYPE_DEFAULT unless type is ARCHIVE_ENTRY_ACL_TYPE_NFS4
Packit Service 1d0348
 */
Packit Service 1d0348
int
Packit Service 1d0348
archive_acl_from_text_w(struct archive_acl *acl, const wchar_t *text,
Packit Service 1d0348
    int want_type)
Packit Service 1d0348
{
Packit Service 1d0348
	struct {
Packit Service 1d0348
		const wchar_t *start;
Packit Service 1d0348
		const wchar_t *end;
Packit Service 1d0348
	} field[6], name;
Packit Service 1d0348
Packit Service 1d0348
	const wchar_t *s, *st;
Packit Service 1d0348
Packit Service 1d0348
	int numfields, fields, n, r, sol, ret;
Packit Service 1d0348
	int type, types, tag, permset, id;
Packit Service 1d0348
	size_t len;
Packit Service 1d0348
	wchar_t sep;
Packit Service 1d0348
Packit Service 1d0348
	ret = ARCHIVE_OK;
Packit Service 1d0348
	types = 0;
Packit Service 1d0348
Packit Service 1d0348
	switch (want_type) {
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_TYPE_POSIX1E:
Packit Service 1d0348
		want_type = ARCHIVE_ENTRY_ACL_TYPE_ACCESS;
Packit Service 1d0348
		__LA_FALLTHROUGH;
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_TYPE_ACCESS:
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_TYPE_DEFAULT:
Packit Service 1d0348
		numfields = 5;
Packit Service 1d0348
		break;
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_TYPE_NFS4:
Packit Service 1d0348
		numfields = 6;
Packit Service 1d0348
		break;
Packit Service 1d0348
	default:
Packit Service 1d0348
		return (ARCHIVE_FATAL);
Packit Service 1d0348
	}
Packit Service 1d0348
Packit Service 1d0348
	while (text != NULL && *text != L'\0') {
Packit Service 1d0348
		/*
Packit Service 1d0348
		 * Parse the fields out of the next entry,
Packit Service 1d0348
		 * advance 'text' to start of next entry.
Packit Service 1d0348
		 */
Packit Service 1d0348
		fields = 0;
Packit Service 1d0348
		do {
Packit Service 1d0348
			const wchar_t *start, *end;
Packit Service 1d0348
			next_field_w(&text, &start, &end, &sep;;
Packit Service 1d0348
			if (fields < numfields) {
Packit Service 1d0348
				field[fields].start = start;
Packit Service 1d0348
				field[fields].end = end;
Packit Service 1d0348
			}
Packit Service 1d0348
			++fields;
Packit Service 1d0348
		} while (sep == L':');
Packit Service 1d0348
Packit Service 1d0348
		/* Set remaining fields to blank. */
Packit Service 1d0348
		for (n = fields; n < numfields; ++n)
Packit Service 1d0348
			field[n].start = field[n].end = NULL;
Packit Service 1d0348
Packit Service 1d0348
		if (field[0].start != NULL && *(field[0].start) == L'#') {
Packit Service 1d0348
			/* Comment, skip entry */
Packit Service 1d0348
			continue;
Packit Service 1d0348
		}
Packit Service 1d0348
Packit Service 1d0348
		n = 0;
Packit Service 1d0348
		sol = 0;
Packit Service 1d0348
		id = -1;
Packit Service 1d0348
		permset = 0;
Packit Service 1d0348
		name.start = name.end = NULL;
Packit Service 1d0348
Packit Service 1d0348
		if (want_type != ARCHIVE_ENTRY_ACL_TYPE_NFS4) {
Packit Service 1d0348
			/* POSIX.1e ACLs */
Packit Service 1d0348
			/*
Packit Service 1d0348
			 * Default keyword "default:user::rwx"
Packit Service 1d0348
			 * if found, we have one more field
Packit Service 1d0348
			 *
Packit Service 1d0348
			 * We also support old Solaris extension:
Packit Service 1d0348
			 * "defaultuser::rwx" is the default ACL corresponding
Packit Service 1d0348
			 * to "user::rwx", etc. valid only for first field
Packit Service 1d0348
			 */
Packit Service 1d0348
			s = field[0].start;
Packit Service 1d0348
			len = field[0].end - field[0].start;
Packit Service 1d0348
			if (*s == L'd' && (len == 1 || (len >= 7
Packit Service 1d0348
			    && wmemcmp((s + 1), L"efault", 6) == 0))) {
Packit Service 1d0348
				type = ARCHIVE_ENTRY_ACL_TYPE_DEFAULT;
Packit Service 1d0348
				if (len > 7)
Packit Service 1d0348
					field[0].start += 7;
Packit Service 1d0348
				else
Packit Service 1d0348
					n = 1;
Packit Service 1d0348
			} else
Packit Service 1d0348
				type = want_type;
Packit Service 1d0348
Packit Service 1d0348
			/* Check for a numeric ID in field n+1 or n+3. */
Packit Service 1d0348
			isint_w(field[n + 1].start, field[n + 1].end, &id;;
Packit Service 1d0348
			/* Field n+3 is optional. */
Packit Service 1d0348
			if (id == -1 && fields > n+3)
Packit Service 1d0348
				isint_w(field[n + 3].start, field[n + 3].end,
Packit Service 1d0348
				    &id;;
Packit Service 1d0348
Packit Service 1d0348
			tag = 0;
Packit Service 1d0348
			s = field[n].start;
Packit Service 1d0348
			st = field[n].start + 1;
Packit Service 1d0348
			len = field[n].end - field[n].start;
Packit Service 1d0348
Packit Service 1d0348
			switch (*s) {
Packit Service 1d0348
			case L'u':
Packit Service 1d0348
				if (len == 1 || (len == 4
Packit Service 1d0348
				    && wmemcmp(st, L"ser", 3) == 0))
Packit Service 1d0348
					tag = ARCHIVE_ENTRY_ACL_USER_OBJ;
Packit Service 1d0348
				break;
Packit Service 1d0348
			case L'g':
Packit Service 1d0348
				if (len == 1 || (len == 5
Packit Service 1d0348
				    && wmemcmp(st, L"roup", 4) == 0))
Packit Service 1d0348
					tag = ARCHIVE_ENTRY_ACL_GROUP_OBJ;
Packit Service 1d0348
				break;
Packit Service 1d0348
			case L'o':
Packit Service 1d0348
				if (len == 1 || (len == 5
Packit Service 1d0348
				    && wmemcmp(st, L"ther", 4) == 0))
Packit Service 1d0348
					tag = ARCHIVE_ENTRY_ACL_OTHER;
Packit Service 1d0348
				break;
Packit Service 1d0348
			case L'm':
Packit Service 1d0348
				if (len == 1 || (len == 4
Packit Service 1d0348
				    && wmemcmp(st, L"ask", 3) == 0))
Packit Service 1d0348
					tag = ARCHIVE_ENTRY_ACL_MASK;
Packit Service 1d0348
				break;
Packit Service 1d0348
			default:
Packit Service 1d0348
					break;
Packit Service 1d0348
			}
Packit Service 1d0348
Packit Service 1d0348
			switch (tag) {
Packit Service 1d0348
			case ARCHIVE_ENTRY_ACL_OTHER:
Packit Service 1d0348
			case ARCHIVE_ENTRY_ACL_MASK:
Packit Service 1d0348
				if (fields == (n + 2)
Packit Service 1d0348
				    && field[n + 1].start < field[n + 1].end
Packit Service 1d0348
				    && ismode_w(field[n + 1].start,
Packit Service 1d0348
				    field[n + 1].end, &permset)) {
Packit Service 1d0348
					/* This is Solaris-style "other:rwx" */
Packit Service 1d0348
					sol = 1;
Packit Service 1d0348
				} else if (fields == (n + 3) &&
Packit Service 1d0348
				    field[n + 1].start < field[n + 1].end) {
Packit Service 1d0348
					/* Invalid mask or other field */
Packit Service 1d0348
					ret = ARCHIVE_WARN;
Packit Service 1d0348
					continue;
Packit Service 1d0348
				}
Packit Service 1d0348
				break;
Packit Service 1d0348
			case ARCHIVE_ENTRY_ACL_USER_OBJ:
Packit Service 1d0348
			case ARCHIVE_ENTRY_ACL_GROUP_OBJ:
Packit Service 1d0348
				if (id != -1 ||
Packit Service 1d0348
				    field[n + 1].start < field[n + 1].end) {
Packit Service 1d0348
					name = field[n + 1];
Packit Service 1d0348
					if (tag == ARCHIVE_ENTRY_ACL_USER_OBJ)
Packit Service 1d0348
						tag = ARCHIVE_ENTRY_ACL_USER;
Packit Service 1d0348
					else
Packit Service 1d0348
						tag = ARCHIVE_ENTRY_ACL_GROUP;
Packit Service 1d0348
				}
Packit Service 1d0348
				break;
Packit Service 1d0348
			default:
Packit Service 1d0348
				/* Invalid tag, skip entry */
Packit Service 1d0348
				ret = ARCHIVE_WARN;
Packit Service 1d0348
				continue;
Packit Service 1d0348
			}
Packit Service 1d0348
Packit Service 1d0348
			/*
Packit Service 1d0348
			 * Without "default:" we expect mode in field 2
Packit Service 1d0348
			 * Exception: Solaris other and mask fields
Packit Service 1d0348
			 */
Packit Service 1d0348
			if (permset == 0 && !ismode_w(field[n + 2 - sol].start,
Packit Service 1d0348
			    field[n + 2 - sol].end, &permset)) {
Packit Service 1d0348
				/* Invalid mode, skip entry */
Packit Service 1d0348
				ret = ARCHIVE_WARN;
Packit Service 1d0348
				continue;
Packit Service 1d0348
			}
Packit Service 1d0348
		} else {
Packit Service 1d0348
			/* NFS4 ACLs */
Packit Service 1d0348
			s = field[0].start;
Packit Service 1d0348
			len = field[0].end - field[0].start;
Packit Service 1d0348
			tag = 0;
Packit Service 1d0348
Packit Service 1d0348
			switch (len) {
Packit Service 1d0348
			case 4:
Packit Service 1d0348
				if (wmemcmp(s, L"user", 4) == 0)
Packit Service 1d0348
					tag = ARCHIVE_ENTRY_ACL_USER;
Packit Service 1d0348
				break;
Packit Service 1d0348
			case 5:
Packit Service 1d0348
				if (wmemcmp(s, L"group", 5) == 0)
Packit Service 1d0348
					tag = ARCHIVE_ENTRY_ACL_GROUP;
Packit Service 1d0348
				break;
Packit Service 1d0348
			case 6:
Packit Service 1d0348
				if (wmemcmp(s, L"owner@", 6) == 0)
Packit Service 1d0348
					tag = ARCHIVE_ENTRY_ACL_USER_OBJ;
Packit Service 1d0348
				else if (wmemcmp(s, L"group@", len) == 0)
Packit Service 1d0348
					tag = ARCHIVE_ENTRY_ACL_GROUP_OBJ;
Packit Service 1d0348
				break;
Packit Service 1d0348
			case 9:
Packit Service 1d0348
				if (wmemcmp(s, L"everyone@", 9) == 0)
Packit Service 1d0348
					tag = ARCHIVE_ENTRY_ACL_EVERYONE;
Packit Service 1d0348
			default:
Packit Service 1d0348
				break;
Packit Service 1d0348
			}
Packit Service 1d0348
Packit Service 1d0348
			if (tag == 0) {
Packit Service 1d0348
				/* Invalid tag, skip entry */
Packit Service 1d0348
				ret = ARCHIVE_WARN;
Packit Service 1d0348
				continue;
Packit Service 1d0348
			} else if (tag == ARCHIVE_ENTRY_ACL_USER ||
Packit Service 1d0348
			    tag == ARCHIVE_ENTRY_ACL_GROUP) {
Packit Service 1d0348
				n = 1;
Packit Service 1d0348
				name = field[1];
Packit Service 1d0348
				isint_w(name.start, name.end, &id;;
Packit Service 1d0348
			} else
Packit Service 1d0348
				n = 0;
Packit Service 1d0348
Packit Service 1d0348
			if (!is_nfs4_perms_w(field[1 + n].start,
Packit Service 1d0348
			    field[1 + n].end, &permset)) {
Packit Service 1d0348
				/* Invalid NFSv4 perms, skip entry */
Packit Service 1d0348
				ret = ARCHIVE_WARN;
Packit Service 1d0348
				continue;
Packit Service 1d0348
			}
Packit Service 1d0348
			if (!is_nfs4_flags_w(field[2 + n].start,
Packit Service 1d0348
			    field[2 + n].end, &permset)) {
Packit Service 1d0348
				/* Invalid NFSv4 flags, skip entry */
Packit Service 1d0348
				ret = ARCHIVE_WARN;
Packit Service 1d0348
				continue;
Packit Service 1d0348
			}
Packit Service 1d0348
			s = field[3 + n].start;
Packit Service 1d0348
			len = field[3 + n].end - field[3 + n].start;
Packit Service 1d0348
			type = 0;
Packit Service 1d0348
			if (len == 4) {
Packit Service 1d0348
				if (wmemcmp(s, L"deny", 4) == 0)
Packit Service 1d0348
					type = ARCHIVE_ENTRY_ACL_TYPE_DENY;
Packit Service 1d0348
			} else if (len == 5) {
Packit Service 1d0348
				if (wmemcmp(s, L"allow", 5) == 0)
Packit Service 1d0348
					type = ARCHIVE_ENTRY_ACL_TYPE_ALLOW;
Packit Service 1d0348
				else if (wmemcmp(s, L"audit", 5) == 0)
Packit Service 1d0348
					type = ARCHIVE_ENTRY_ACL_TYPE_AUDIT;
Packit Service 1d0348
				else if (wmemcmp(s, L"alarm", 5) == 0)
Packit Service 1d0348
					type = ARCHIVE_ENTRY_ACL_TYPE_ALARM;
Packit Service 1d0348
			}
Packit Service 1d0348
			if (type == 0) {
Packit Service 1d0348
				/* Invalid entry type, skip entry */
Packit Service 1d0348
				ret = ARCHIVE_WARN;
Packit Service 1d0348
				continue;
Packit Service 1d0348
			}
Packit Service 1d0348
			isint_w(field[4 + n].start, field[4 + n].end, &id;;
Packit Service 1d0348
		}
Packit Service 1d0348
Packit Service 1d0348
		/* Add entry to the internal list. */
Packit Service 1d0348
		r = archive_acl_add_entry_w_len(acl, type, permset,
Packit Service 1d0348
		    tag, id, name.start, name.end - name.start);
Packit Service 1d0348
		if (r < ARCHIVE_WARN)
Packit Service 1d0348
			return (r);
Packit Service 1d0348
		if (r != ARCHIVE_OK)
Packit Service 1d0348
			ret = ARCHIVE_WARN;
Packit Service 1d0348
		types |= type;
Packit Service 1d0348
	}
Packit Service 1d0348
Packit Service 1d0348
	/* Reset ACL */
Packit Service 1d0348
	archive_acl_reset(acl, types);
Packit Service 1d0348
Packit Service 1d0348
	return (ret);
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
/*
Packit Service 1d0348
 * Parse a string to a positive decimal integer.  Returns true if
Packit Service 1d0348
 * the string is non-empty and consists only of decimal digits,
Packit Service 1d0348
 * false otherwise.
Packit Service 1d0348
 */
Packit Service 1d0348
static int
Packit Service 1d0348
isint_w(const wchar_t *start, const wchar_t *end, int *result)
Packit Service 1d0348
{
Packit Service 1d0348
	int n = 0;
Packit Service 1d0348
	if (start >= end)
Packit Service 1d0348
		return (0);
Packit Service 1d0348
	while (start < end) {
Packit Service 1d0348
		if (*start < '0' || *start > '9')
Packit Service 1d0348
			return (0);
Packit Service 1d0348
		if (n > (INT_MAX / 10) ||
Packit Service 1d0348
		    (n == INT_MAX / 10 && (*start - '0') > INT_MAX % 10)) {
Packit Service 1d0348
			n = INT_MAX;
Packit Service 1d0348
		} else {
Packit Service 1d0348
			n *= 10;
Packit Service 1d0348
			n += *start - '0';
Packit Service 1d0348
		}
Packit Service 1d0348
		start++;
Packit Service 1d0348
	}
Packit Service 1d0348
	*result = n;
Packit Service 1d0348
	return (1);
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
/*
Packit Service 1d0348
 * Parse a string as a mode field.  Returns true if
Packit Service 1d0348
 * the string is non-empty and consists only of mode characters,
Packit Service 1d0348
 * false otherwise.
Packit Service 1d0348
 */
Packit Service 1d0348
static int
Packit Service 1d0348
ismode_w(const wchar_t *start, const wchar_t *end, int *permset)
Packit Service 1d0348
{
Packit Service 1d0348
	const wchar_t *p;
Packit Service 1d0348
Packit Service 1d0348
	if (start >= end)
Packit Service 1d0348
		return (0);
Packit Service 1d0348
	p = start;
Packit Service 1d0348
	*permset = 0;
Packit Service 1d0348
	while (p < end) {
Packit Service 1d0348
		switch (*p++) {
Packit Service 1d0348
		case L'r': case L'R':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_READ;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case L'w': case L'W':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_WRITE;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case L'x': case L'X':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_EXECUTE;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case L'-':
Packit Service 1d0348
			break;
Packit Service 1d0348
		default:
Packit Service 1d0348
			return (0);
Packit Service 1d0348
		}
Packit Service 1d0348
	}
Packit Service 1d0348
	return (1);
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
/*
Packit Service 1d0348
 * Parse a string as a NFS4 ACL permission field.
Packit Service 1d0348
 * Returns true if the string is non-empty and consists only of NFS4 ACL
Packit Service 1d0348
 * permission characters, false otherwise
Packit Service 1d0348
 */
Packit Service 1d0348
static int
Packit Service 1d0348
is_nfs4_perms_w(const wchar_t *start, const wchar_t *end, int *permset)
Packit Service 1d0348
{
Packit Service 1d0348
	const wchar_t *p = start;
Packit Service 1d0348
Packit Service 1d0348
	while (p < end) {
Packit Service 1d0348
		switch (*p++) {
Packit Service 1d0348
		case L'r':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_READ_DATA;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case L'w':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_WRITE_DATA;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case L'x':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_EXECUTE;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case L'p':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_APPEND_DATA;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case L'D':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_DELETE_CHILD;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case L'd':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_DELETE;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case L'a':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_READ_ATTRIBUTES;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case L'A':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_WRITE_ATTRIBUTES;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case L'R':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_READ_NAMED_ATTRS;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case L'W':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_WRITE_NAMED_ATTRS;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case L'c':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_READ_ACL;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case L'C':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_WRITE_ACL;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case L'o':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_WRITE_OWNER;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case L's':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_SYNCHRONIZE;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case L'-':
Packit Service 1d0348
			break;
Packit Service 1d0348
		default:
Packit Service 1d0348
			return(0);
Packit Service 1d0348
		}
Packit Service 1d0348
	}
Packit Service 1d0348
	return (1);
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
/*
Packit Service 1d0348
 * Parse a string as a NFS4 ACL flags field.
Packit Service 1d0348
 * Returns true if the string is non-empty and consists only of NFS4 ACL
Packit Service 1d0348
 * flag characters, false otherwise
Packit Service 1d0348
 */
Packit Service 1d0348
static int
Packit Service 1d0348
is_nfs4_flags_w(const wchar_t *start, const wchar_t *end, int *permset)
Packit Service 1d0348
{
Packit Service 1d0348
	const wchar_t *p = start;
Packit Service 1d0348
Packit Service 1d0348
	while (p < end) {
Packit Service 1d0348
		switch(*p++) {
Packit Service 1d0348
		case L'f':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_ENTRY_FILE_INHERIT;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case L'd':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_ENTRY_DIRECTORY_INHERIT;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case L'i':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_ENTRY_INHERIT_ONLY;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case L'n':
Packit Service 1d0348
			*permset |=
Packit Service 1d0348
			    ARCHIVE_ENTRY_ACL_ENTRY_NO_PROPAGATE_INHERIT;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case L'S':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_ENTRY_SUCCESSFUL_ACCESS;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case L'F':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_ENTRY_FAILED_ACCESS;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case L'I':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_ENTRY_INHERITED;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case L'-':
Packit Service 1d0348
			break;
Packit Service 1d0348
		default:
Packit Service 1d0348
			return (0);
Packit Service 1d0348
		}
Packit Service 1d0348
	}
Packit Service 1d0348
	return (1);
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
/*
Packit Service 1d0348
 * Match "[:whitespace:]*(.*)[:whitespace:]*[:,\n]".  *wp is updated
Packit Service 1d0348
 * to point to just after the separator.  *start points to the first
Packit Service 1d0348
 * character of the matched text and *end just after the last
Packit Service 1d0348
 * character of the matched identifier.  In particular *end - *start
Packit Service 1d0348
 * is the length of the field body, not including leading or trailing
Packit Service 1d0348
 * whitespace.
Packit Service 1d0348
 */
Packit Service 1d0348
static void
Packit Service 1d0348
next_field_w(const wchar_t **wp, const wchar_t **start,
Packit Service 1d0348
    const wchar_t **end, wchar_t *sep)
Packit Service 1d0348
{
Packit Service 1d0348
	/* Skip leading whitespace to find start of field. */
Packit Service 1d0348
	while (**wp == L' ' || **wp == L'\t' || **wp == L'\n') {
Packit Service 1d0348
		(*wp)++;
Packit Service 1d0348
	}
Packit Service 1d0348
	*start = *wp;
Packit Service 1d0348
Packit Service 1d0348
	/* Scan for the separator. */
Packit Service 1d0348
	while (**wp != L'\0' && **wp != L',' && **wp != L':' &&
Packit Service 1d0348
	    **wp != L'\n') {
Packit Service 1d0348
		(*wp)++;
Packit Service 1d0348
	}
Packit Service 1d0348
	*sep = **wp;
Packit Service 1d0348
Packit Service 1d0348
	/* Trim trailing whitespace to locate end of field. */
Packit Service 1d0348
	*end = *wp - 1;
Packit Service 1d0348
	while (**end == L' ' || **end == L'\t' || **end == L'\n') {
Packit Service 1d0348
		(*end)--;
Packit Service 1d0348
	}
Packit Service 1d0348
	(*end)++;
Packit Service 1d0348
Packit Service 1d0348
	/* Adjust scanner location. */
Packit Service 1d0348
	if (**wp != L'\0')
Packit Service 1d0348
		(*wp)++;
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
/*
Packit Service 1d0348
 * Parse an ACL text string.
Packit Service 1d0348
 *
Packit Service 1d0348
 * The want_type argument may be one of the following:
Packit Service 1d0348
 * ARCHIVE_ENTRY_ACL_TYPE_ACCESS - text is a POSIX.1e ACL of type ACCESS
Packit Service 1d0348
 * ARCHIVE_ENTRY_ACL_TYPE_DEFAULT - text is a POSIX.1e ACL of type DEFAULT
Packit Service 1d0348
 * ARCHIVE_ENTRY_ACL_TYPE_NFS4 - text is as a NFSv4 ACL
Packit Service 1d0348
 *
Packit Service 1d0348
 * POSIX.1e ACL entries prefixed with "default:" are treated as
Packit Service 1d0348
 * ARCHIVE_ENTRY_ACL_TYPE_DEFAULT unless type is ARCHIVE_ENTRY_ACL_TYPE_NFS4
Packit Service 1d0348
 */
Packit Service 1d0348
int
Packit Service 1d0348
archive_acl_from_text_l(struct archive_acl *acl, const char *text,
Packit Service 1d0348
    int want_type, struct archive_string_conv *sc)
Packit Service 1d0348
{
Packit Service 1d0348
	struct {
Packit Service 1d0348
		const char *start;
Packit Service 1d0348
		const char *end;
Packit Service 1d0348
	} field[6], name;
Packit Service 1d0348
Packit Service 1d0348
	const char *s, *st;
Packit Service 1d0348
	int numfields, fields, n, r, sol, ret;
Packit Service 1d0348
	int type, types, tag, permset, id;
Packit Service 1d0348
	size_t len;
Packit Service 1d0348
	char sep;
Packit Service 1d0348
Packit Service 1d0348
	switch (want_type) {
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_TYPE_POSIX1E:
Packit Service 1d0348
		want_type = ARCHIVE_ENTRY_ACL_TYPE_ACCESS;
Packit Service 1d0348
		__LA_FALLTHROUGH;
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_TYPE_ACCESS:
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_TYPE_DEFAULT:
Packit Service 1d0348
		numfields = 5;
Packit Service 1d0348
		break;
Packit Service 1d0348
	case ARCHIVE_ENTRY_ACL_TYPE_NFS4:
Packit Service 1d0348
		numfields = 6;
Packit Service 1d0348
		break;
Packit Service 1d0348
	default:
Packit Service 1d0348
		return (ARCHIVE_FATAL);
Packit Service 1d0348
	}
Packit Service 1d0348
Packit Service 1d0348
	ret = ARCHIVE_OK;
Packit Service 1d0348
	types = 0;
Packit Service 1d0348
Packit Service 1d0348
	while (text != NULL  &&  *text != '\0') {
Packit Service 1d0348
		/*
Packit Service 1d0348
		 * Parse the fields out of the next entry,
Packit Service 1d0348
		 * advance 'text' to start of next entry.
Packit Service 1d0348
		 */
Packit Service 1d0348
		fields = 0;
Packit Service 1d0348
		do {
Packit Service 1d0348
			const char *start, *end;
Packit Service 1d0348
			next_field(&text, &start, &end, &sep;;
Packit Service 1d0348
			if (fields < numfields) {
Packit Service 1d0348
				field[fields].start = start;
Packit Service 1d0348
				field[fields].end = end;
Packit Service 1d0348
			}
Packit Service 1d0348
			++fields;
Packit Service 1d0348
		} while (sep == ':');
Packit Service 1d0348
Packit Service 1d0348
		/* Set remaining fields to blank. */
Packit Service 1d0348
		for (n = fields; n < numfields; ++n)
Packit Service 1d0348
			field[n].start = field[n].end = NULL;
Packit Service 1d0348
Packit Service 1d0348
		if (field[0].start != NULL && *(field[0].start) == '#') {
Packit Service 1d0348
			/* Comment, skip entry */
Packit Service 1d0348
			continue;
Packit Service 1d0348
		}
Packit Service 1d0348
Packit Service 1d0348
		n = 0;
Packit Service 1d0348
		sol = 0;
Packit Service 1d0348
		id = -1;
Packit Service 1d0348
		permset = 0;
Packit Service 1d0348
		name.start = name.end = NULL;
Packit Service 1d0348
Packit Service 1d0348
		if (want_type != ARCHIVE_ENTRY_ACL_TYPE_NFS4) {
Packit Service 1d0348
			/* POSIX.1e ACLs */
Packit Service 1d0348
			/*
Packit Service 1d0348
			 * Default keyword "default:user::rwx"
Packit Service 1d0348
			 * if found, we have one more field
Packit Service 1d0348
			 *
Packit Service 1d0348
			 * We also support old Solaris extension:
Packit Service 1d0348
			 * "defaultuser::rwx" is the default ACL corresponding
Packit Service 1d0348
			 * to "user::rwx", etc. valid only for first field
Packit Service 1d0348
			 */
Packit Service 1d0348
			s = field[0].start;
Packit Service 1d0348
			len = field[0].end - field[0].start;
Packit Service 1d0348
			if (*s == 'd' && (len == 1 || (len >= 7
Packit Service 1d0348
			    && memcmp((s + 1), "efault", 6) == 0))) {
Packit Service 1d0348
				type = ARCHIVE_ENTRY_ACL_TYPE_DEFAULT;
Packit Service 1d0348
				if (len > 7)
Packit Service 1d0348
					field[0].start += 7;
Packit Service 1d0348
				else
Packit Service 1d0348
					n = 1;
Packit Service 1d0348
			} else
Packit Service 1d0348
				type = want_type;
Packit Service 1d0348
Packit Service 1d0348
			/* Check for a numeric ID in field n+1 or n+3. */
Packit Service 1d0348
			isint(field[n + 1].start, field[n + 1].end, &id;;
Packit Service 1d0348
			/* Field n+3 is optional. */
Packit Service 1d0348
			if (id == -1 && fields > (n + 3))
Packit Service 1d0348
				isint(field[n + 3].start, field[n + 3].end,
Packit Service 1d0348
				    &id;;
Packit Service 1d0348
Packit Service 1d0348
			tag = 0;
Packit Service 1d0348
			s = field[n].start;
Packit Service 1d0348
			st = field[n].start + 1;
Packit Service 1d0348
			len = field[n].end - field[n].start;
Packit Service 1d0348
Packit Service 1d0348
			switch (*s) {
Packit Service 1d0348
			case 'u':
Packit Service 1d0348
				if (len == 1 || (len == 4
Packit Service 1d0348
				    && memcmp(st, "ser", 3) == 0))
Packit Service 1d0348
					tag = ARCHIVE_ENTRY_ACL_USER_OBJ;
Packit Service 1d0348
				break;
Packit Service 1d0348
			case 'g':
Packit Service 1d0348
				if (len == 1 || (len == 5
Packit Service 1d0348
				    && memcmp(st, "roup", 4) == 0))
Packit Service 1d0348
					tag = ARCHIVE_ENTRY_ACL_GROUP_OBJ;
Packit Service 1d0348
				break;
Packit Service 1d0348
			case 'o':
Packit Service 1d0348
				if (len == 1 || (len == 5
Packit Service 1d0348
				    && memcmp(st, "ther", 4) == 0))
Packit Service 1d0348
					tag = ARCHIVE_ENTRY_ACL_OTHER;
Packit Service 1d0348
				break;
Packit Service 1d0348
			case 'm':
Packit Service 1d0348
				if (len == 1 || (len == 4
Packit Service 1d0348
				    && memcmp(st, "ask", 3) == 0))
Packit Service 1d0348
					tag = ARCHIVE_ENTRY_ACL_MASK;
Packit Service 1d0348
				break;
Packit Service 1d0348
			default:
Packit Service 1d0348
					break;
Packit Service 1d0348
			}
Packit Service 1d0348
Packit Service 1d0348
			switch (tag) {
Packit Service 1d0348
			case ARCHIVE_ENTRY_ACL_OTHER:
Packit Service 1d0348
			case ARCHIVE_ENTRY_ACL_MASK:
Packit Service 1d0348
				if (fields == (n + 2)
Packit Service 1d0348
				    && field[n + 1].start < field[n + 1].end
Packit Service 1d0348
				    && ismode(field[n + 1].start,
Packit Service 1d0348
				    field[n + 1].end, &permset)) {
Packit Service 1d0348
					/* This is Solaris-style "other:rwx" */
Packit Service 1d0348
					sol = 1;
Packit Service 1d0348
				} else if (fields == (n + 3) &&
Packit Service 1d0348
				    field[n + 1].start < field[n + 1].end) {
Packit Service 1d0348
					/* Invalid mask or other field */
Packit Service 1d0348
					ret = ARCHIVE_WARN;
Packit Service 1d0348
					continue;
Packit Service 1d0348
				}
Packit Service 1d0348
				break;
Packit Service 1d0348
			case ARCHIVE_ENTRY_ACL_USER_OBJ:
Packit Service 1d0348
			case ARCHIVE_ENTRY_ACL_GROUP_OBJ:
Packit Service 1d0348
				if (id != -1 ||
Packit Service 1d0348
				    field[n + 1].start < field[n + 1].end) {
Packit Service 1d0348
					name = field[n + 1];
Packit Service 1d0348
					if (tag == ARCHIVE_ENTRY_ACL_USER_OBJ)
Packit Service 1d0348
						tag = ARCHIVE_ENTRY_ACL_USER;
Packit Service 1d0348
					else
Packit Service 1d0348
						tag = ARCHIVE_ENTRY_ACL_GROUP;
Packit Service 1d0348
				}
Packit Service 1d0348
				break;
Packit Service 1d0348
			default:
Packit Service 1d0348
				/* Invalid tag, skip entry */
Packit Service 1d0348
				ret = ARCHIVE_WARN;
Packit Service 1d0348
				continue;
Packit Service 1d0348
			}
Packit Service 1d0348
Packit Service 1d0348
			/*
Packit Service 1d0348
			 * Without "default:" we expect mode in field 3
Packit Service 1d0348
			 * Exception: Solaris other and mask fields
Packit Service 1d0348
			 */
Packit Service 1d0348
			if (permset == 0 && !ismode(field[n + 2 - sol].start,
Packit Service 1d0348
			    field[n + 2 - sol].end, &permset)) {
Packit Service 1d0348
				/* Invalid mode, skip entry */
Packit Service 1d0348
				ret = ARCHIVE_WARN;
Packit Service 1d0348
				continue;
Packit Service 1d0348
			}
Packit Service 1d0348
		} else {
Packit Service 1d0348
			/* NFS4 ACLs */
Packit Service 1d0348
			s = field[0].start;
Packit Service 1d0348
			len = field[0].end - field[0].start;
Packit Service 1d0348
			tag = 0;
Packit Service 1d0348
Packit Service 1d0348
			switch (len) {
Packit Service 1d0348
			case 4:
Packit Service 1d0348
				if (memcmp(s, "user", 4) == 0)
Packit Service 1d0348
					tag = ARCHIVE_ENTRY_ACL_USER;
Packit Service 1d0348
				break;
Packit Service 1d0348
			case 5:
Packit Service 1d0348
				if (memcmp(s, "group", 5) == 0)
Packit Service 1d0348
					tag = ARCHIVE_ENTRY_ACL_GROUP;
Packit Service 1d0348
				break;
Packit Service 1d0348
			case 6:
Packit Service 1d0348
				if (memcmp(s, "owner@", 6) == 0)
Packit Service 1d0348
					tag = ARCHIVE_ENTRY_ACL_USER_OBJ;
Packit Service 1d0348
				else if (memcmp(s, "group@", 6) == 0)
Packit Service 1d0348
					tag = ARCHIVE_ENTRY_ACL_GROUP_OBJ;
Packit Service 1d0348
				break;
Packit Service 1d0348
			case 9:
Packit Service 1d0348
				if (memcmp(s, "everyone@", 9) == 0)
Packit Service 1d0348
					tag = ARCHIVE_ENTRY_ACL_EVERYONE;
Packit Service 1d0348
				break;
Packit Service 1d0348
			default:
Packit Service 1d0348
				break;
Packit Service 1d0348
			}
Packit Service 1d0348
Packit Service 1d0348
			if (tag == 0) {
Packit Service 1d0348
				/* Invalid tag, skip entry */
Packit Service 1d0348
				ret = ARCHIVE_WARN;
Packit Service 1d0348
				continue;
Packit Service 1d0348
			} else if (tag == ARCHIVE_ENTRY_ACL_USER ||
Packit Service 1d0348
			    tag == ARCHIVE_ENTRY_ACL_GROUP) {
Packit Service 1d0348
				n = 1;
Packit Service 1d0348
				name = field[1];
Packit Service 1d0348
				isint(name.start, name.end, &id;;
Packit Service 1d0348
			} else
Packit Service 1d0348
				n = 0;
Packit Service 1d0348
Packit Service 1d0348
			if (!is_nfs4_perms(field[1 + n].start,
Packit Service 1d0348
			    field[1 + n].end, &permset)) {
Packit Service 1d0348
				/* Invalid NFSv4 perms, skip entry */
Packit Service 1d0348
				ret = ARCHIVE_WARN;
Packit Service 1d0348
				continue;
Packit Service 1d0348
			}
Packit Service 1d0348
			if (!is_nfs4_flags(field[2 + n].start,
Packit Service 1d0348
			    field[2 + n].end, &permset)) {
Packit Service 1d0348
				/* Invalid NFSv4 flags, skip entry */
Packit Service 1d0348
				ret = ARCHIVE_WARN;
Packit Service 1d0348
				continue;
Packit Service 1d0348
			}
Packit Service 1d0348
			s = field[3 + n].start;
Packit Service 1d0348
			len = field[3 + n].end - field[3 + n].start;
Packit Service 1d0348
			type = 0;
Packit Service 1d0348
			if (len == 4) {
Packit Service 1d0348
				if (memcmp(s, "deny", 4) == 0)
Packit Service 1d0348
					type = ARCHIVE_ENTRY_ACL_TYPE_DENY;
Packit Service 1d0348
			} else if (len == 5) {
Packit Service 1d0348
				if (memcmp(s, "allow", 5) == 0)
Packit Service 1d0348
					type = ARCHIVE_ENTRY_ACL_TYPE_ALLOW;
Packit Service 1d0348
				else if (memcmp(s, "audit", 5) == 0)
Packit Service 1d0348
					type = ARCHIVE_ENTRY_ACL_TYPE_AUDIT;
Packit Service 1d0348
				else if (memcmp(s, "alarm", 5) == 0)
Packit Service 1d0348
					type = ARCHIVE_ENTRY_ACL_TYPE_ALARM;
Packit Service 1d0348
			}
Packit Service 1d0348
			if (type == 0) {
Packit Service 1d0348
				/* Invalid entry type, skip entry */
Packit Service 1d0348
				ret = ARCHIVE_WARN;
Packit Service 1d0348
				continue;
Packit Service 1d0348
			}
Packit Service 1d0348
			isint(field[4 + n].start, field[4 + n].end,
Packit Service 1d0348
			    &id;;
Packit Service 1d0348
		}
Packit Service 1d0348
Packit Service 1d0348
		/* Add entry to the internal list. */
Packit Service 1d0348
		r = archive_acl_add_entry_len_l(acl, type, permset,
Packit Service 1d0348
		    tag, id, name.start, name.end - name.start, sc);
Packit Service 1d0348
		if (r < ARCHIVE_WARN)
Packit Service 1d0348
			return (r);
Packit Service 1d0348
		if (r != ARCHIVE_OK)
Packit Service 1d0348
			ret = ARCHIVE_WARN;
Packit Service 1d0348
		types |= type;
Packit Service 1d0348
	}
Packit Service 1d0348
Packit Service 1d0348
	/* Reset ACL */
Packit Service 1d0348
	archive_acl_reset(acl, types);
Packit Service 1d0348
Packit Service 1d0348
	return (ret);
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
/*
Packit Service 1d0348
 * Parse a string to a positive decimal integer.  Returns true if
Packit Service 1d0348
 * the string is non-empty and consists only of decimal digits,
Packit Service 1d0348
 * false otherwise.
Packit Service 1d0348
 */
Packit Service 1d0348
static int
Packit Service 1d0348
isint(const char *start, const char *end, int *result)
Packit Service 1d0348
{
Packit Service 1d0348
	int n = 0;
Packit Service 1d0348
	if (start >= end)
Packit Service 1d0348
		return (0);
Packit Service 1d0348
	while (start < end) {
Packit Service 1d0348
		if (*start < '0' || *start > '9')
Packit Service 1d0348
			return (0);
Packit Service 1d0348
		if (n > (INT_MAX / 10) ||
Packit Service 1d0348
		    (n == INT_MAX / 10 && (*start - '0') > INT_MAX % 10)) {
Packit Service 1d0348
			n = INT_MAX;
Packit Service 1d0348
		} else {
Packit Service 1d0348
			n *= 10;
Packit Service 1d0348
			n += *start - '0';
Packit Service 1d0348
		}
Packit Service 1d0348
		start++;
Packit Service 1d0348
	}
Packit Service 1d0348
	*result = n;
Packit Service 1d0348
	return (1);
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
/*
Packit Service 1d0348
 * Parse a string as a mode field.  Returns true if
Packit Service 1d0348
 * the string is non-empty and consists only of mode characters,
Packit Service 1d0348
 * false otherwise.
Packit Service 1d0348
 */
Packit Service 1d0348
static int
Packit Service 1d0348
ismode(const char *start, const char *end, int *permset)
Packit Service 1d0348
{
Packit Service 1d0348
	const char *p;
Packit Service 1d0348
Packit Service 1d0348
	if (start >= end)
Packit Service 1d0348
		return (0);
Packit Service 1d0348
	p = start;
Packit Service 1d0348
	*permset = 0;
Packit Service 1d0348
	while (p < end) {
Packit Service 1d0348
		switch (*p++) {
Packit Service 1d0348
		case 'r': case 'R':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_READ;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case 'w': case 'W':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_WRITE;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case 'x': case 'X':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_EXECUTE;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case '-':
Packit Service 1d0348
			break;
Packit Service 1d0348
		default:
Packit Service 1d0348
			return (0);
Packit Service 1d0348
		}
Packit Service 1d0348
	}
Packit Service 1d0348
	return (1);
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
/*
Packit Service 1d0348
 * Parse a string as a NFS4 ACL permission field.
Packit Service 1d0348
 * Returns true if the string is non-empty and consists only of NFS4 ACL
Packit Service 1d0348
 * permission characters, false otherwise
Packit Service 1d0348
 */
Packit Service 1d0348
static int
Packit Service 1d0348
is_nfs4_perms(const char *start, const char *end, int *permset)
Packit Service 1d0348
{
Packit Service 1d0348
	const char *p = start;
Packit Service 1d0348
Packit Service 1d0348
	while (p < end) {
Packit Service 1d0348
		switch (*p++) {
Packit Service 1d0348
		case 'r':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_READ_DATA;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case 'w':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_WRITE_DATA;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case 'x':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_EXECUTE;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case 'p':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_APPEND_DATA;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case 'D':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_DELETE_CHILD;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case 'd':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_DELETE;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case 'a':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_READ_ATTRIBUTES;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case 'A':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_WRITE_ATTRIBUTES;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case 'R':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_READ_NAMED_ATTRS;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case 'W':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_WRITE_NAMED_ATTRS;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case 'c':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_READ_ACL;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case 'C':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_WRITE_ACL;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case 'o':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_WRITE_OWNER;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case 's':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_SYNCHRONIZE;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case '-':
Packit Service 1d0348
			break;
Packit Service 1d0348
		default:
Packit Service 1d0348
			return(0);
Packit Service 1d0348
		}
Packit Service 1d0348
	}
Packit Service 1d0348
	return (1);
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
/*
Packit Service 1d0348
 * Parse a string as a NFS4 ACL flags field.
Packit Service 1d0348
 * Returns true if the string is non-empty and consists only of NFS4 ACL
Packit Service 1d0348
 * flag characters, false otherwise
Packit Service 1d0348
 */
Packit Service 1d0348
static int
Packit Service 1d0348
is_nfs4_flags(const char *start, const char *end, int *permset)
Packit Service 1d0348
{
Packit Service 1d0348
	const char *p = start;
Packit Service 1d0348
Packit Service 1d0348
	while (p < end) {
Packit Service 1d0348
		switch(*p++) {
Packit Service 1d0348
		case 'f':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_ENTRY_FILE_INHERIT;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case 'd':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_ENTRY_DIRECTORY_INHERIT;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case 'i':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_ENTRY_INHERIT_ONLY;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case 'n':
Packit Service 1d0348
			*permset |=
Packit Service 1d0348
			    ARCHIVE_ENTRY_ACL_ENTRY_NO_PROPAGATE_INHERIT;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case 'S':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_ENTRY_SUCCESSFUL_ACCESS;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case 'F':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_ENTRY_FAILED_ACCESS;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case 'I':
Packit Service 1d0348
			*permset |= ARCHIVE_ENTRY_ACL_ENTRY_INHERITED;
Packit Service 1d0348
			break;
Packit Service 1d0348
		case '-':
Packit Service 1d0348
			break;
Packit Service 1d0348
		default:
Packit Service 1d0348
			return (0);
Packit Service 1d0348
		}
Packit Service 1d0348
	}
Packit Service 1d0348
	return (1);
Packit Service 1d0348
}
Packit Service 1d0348
Packit Service 1d0348
/*
Packit Service 1d0348
 * Match "[:whitespace:]*(.*)[:whitespace:]*[:,\n]".  *wp is updated
Packit Service 1d0348
 * to point to just after the separator.  *start points to the first
Packit Service 1d0348
 * character of the matched text and *end just after the last
Packit Service 1d0348
 * character of the matched identifier.  In particular *end - *start
Packit Service 1d0348
 * is the length of the field body, not including leading or trailing
Packit Service 1d0348
 * whitespace.
Packit Service 1d0348
 */
Packit Service 1d0348
static void
Packit Service 1d0348
next_field(const char **p, const char **start,
Packit Service 1d0348
    const char **end, char *sep)
Packit Service 1d0348
{
Packit Service 1d0348
	/* Skip leading whitespace to find start of field. */
Packit Service 1d0348
	while (**p == ' ' || **p == '\t' || **p == '\n') {
Packit Service 1d0348
		(*p)++;
Packit Service 1d0348
	}
Packit Service 1d0348
	*start = *p;
Packit Service 1d0348
Packit Service 1d0348
	/* Scan for the separator. */
Packit Service 1d0348
	while (**p != '\0' && **p != ',' && **p != ':' && **p != '\n') {
Packit Service 1d0348
		(*p)++;
Packit Service 1d0348
	}
Packit Service 1d0348
	*sep = **p;
Packit Service 1d0348
Packit Service 1d0348
	/* Trim trailing whitespace to locate end of field. */
Packit Service 1d0348
	*end = *p - 1;
Packit Service 1d0348
	while (**end == ' ' || **end == '\t' || **end == '\n') {
Packit Service 1d0348
		(*end)--;
Packit Service 1d0348
	}
Packit Service 1d0348
	(*end)++;
Packit Service 1d0348
Packit Service 1d0348
	/* Adjust scanner location. */
Packit Service 1d0348
	if (**p != '\0')
Packit Service 1d0348
		(*p)++;
Packit Service 1d0348
}