1#include <unistd.h>
2#include <sys/types.h>
3#include <stdio.h>
4#include <stdlib.h>
5#include <string.h>
6#include <errno.h>
7#include <selinux/selinux.h>
8
9int main(int argc, char **argv)
10{
11	struct av_decision avd;
12	security_class_t tclass;
13	int ret;
14
15	if (argc != 4) {
16		fprintf(stderr, "usage:  %s scontext tcontext tclass\n",
17			argv[0]);
18		exit(1);
19	}
20
21	if (security_check_context(argv[1])) {
22		fprintf(stderr, "%s:  invalid source context '%s'\n", argv[0], argv[1]);
23		exit(4);
24	}
25
26	if (security_check_context(argv[2])) {
27		fprintf(stderr, "%s:  invalid target context '%s'\n", argv[0], argv[2]);
28		exit(5);
29	}
30
31	tclass = string_to_security_class(argv[3]);
32	if (!tclass) {
33		fprintf(stderr, "%s:  invalid class '%s'\n", argv[0], argv[3]);
34		exit(2);
35	}
36
37	ret = security_compute_av(argv[1], argv[2], tclass, 1, &avd);
38	if (ret < 0) {
39		fprintf(stderr, "%s:  security_compute_av failed:  %s\n", argv[0], strerror(errno));
40		exit(3);
41	}
42
43	printf("allowed=");
44	print_access_vector(tclass, avd.allowed);
45	printf("\n");
46
47	if (avd.decided != ~0U) {
48		printf("decided=");
49		print_access_vector(tclass, avd.decided);
50		printf("\n");
51	}
52
53	if (avd.auditallow) {
54		printf("auditallow=");
55		print_access_vector(tclass, avd.auditallow);
56		printf("\n");
57	}
58
59	if (avd.auditdeny != ~0U) {
60		printf("auditdeny");
61		print_access_vector(tclass, avd.auditdeny);
62		printf("\n");
63	}
64
65	exit(EXIT_SUCCESS);
66}
67