16cd6a6acSopenharmony_ci#include <errno.h>
26cd6a6acSopenharmony_ci#include <stdio.h>
36cd6a6acSopenharmony_ci#include <stdlib.h>
46cd6a6acSopenharmony_ci#include <string.h>
56cd6a6acSopenharmony_ci
66cd6a6acSopenharmony_ci#include <sepol/policydb/services.h>
76cd6a6acSopenharmony_ci#include <sepol/sepol.h>
86cd6a6acSopenharmony_ci
96cd6a6acSopenharmony_ci
106cd6a6acSopenharmony_ciint main(int argc, char *argv[])
116cd6a6acSopenharmony_ci{
126cd6a6acSopenharmony_ci	FILE *fp;
136cd6a6acSopenharmony_ci	sepol_security_id_t ssid, tsid, out_sid;
146cd6a6acSopenharmony_ci	sepol_security_class_t tclass;
156cd6a6acSopenharmony_ci	char *context;
166cd6a6acSopenharmony_ci	size_t context_len;
176cd6a6acSopenharmony_ci
186cd6a6acSopenharmony_ci	if (argc != 5) {
196cd6a6acSopenharmony_ci		printf("usage:  %s policy scontext tcontext tclass\n", argv[0]);
206cd6a6acSopenharmony_ci		return 1;
216cd6a6acSopenharmony_ci	}
226cd6a6acSopenharmony_ci
236cd6a6acSopenharmony_ci	fp = fopen(argv[1], "r");
246cd6a6acSopenharmony_ci	if (!fp) {
256cd6a6acSopenharmony_ci		fprintf(stderr, "Can't open policy %s:  %s\n", argv[1], strerror(errno));
266cd6a6acSopenharmony_ci		return 1;
276cd6a6acSopenharmony_ci	}
286cd6a6acSopenharmony_ci	if (sepol_set_policydb_from_file(fp) < 0) {
296cd6a6acSopenharmony_ci		fprintf(stderr, "Error while processing policy %s:  %s\n", argv[1], strerror(errno));
306cd6a6acSopenharmony_ci		fclose(fp);
316cd6a6acSopenharmony_ci		return 1;
326cd6a6acSopenharmony_ci	}
336cd6a6acSopenharmony_ci	fclose(fp);
346cd6a6acSopenharmony_ci
356cd6a6acSopenharmony_ci	if (sepol_context_to_sid(argv[2], strlen(argv[2]), &ssid) < 0) {
366cd6a6acSopenharmony_ci		fprintf(stderr, "Invalid source context %s\n", argv[2]);
376cd6a6acSopenharmony_ci		return 1;
386cd6a6acSopenharmony_ci	}
396cd6a6acSopenharmony_ci
406cd6a6acSopenharmony_ci	if (sepol_context_to_sid(argv[3], strlen(argv[3]), &tsid) < 0) {
416cd6a6acSopenharmony_ci		fprintf(stderr, "Invalid target context %s\n", argv[3]);
426cd6a6acSopenharmony_ci		return 1;
436cd6a6acSopenharmony_ci	}
446cd6a6acSopenharmony_ci
456cd6a6acSopenharmony_ci	if (sepol_string_to_security_class(argv[4], &tclass) < 0) {
466cd6a6acSopenharmony_ci		fprintf(stderr, "Invalid security class %s\n", argv[4]);
476cd6a6acSopenharmony_ci		return 1;
486cd6a6acSopenharmony_ci	}
496cd6a6acSopenharmony_ci
506cd6a6acSopenharmony_ci	if (sepol_member_sid(ssid, tsid, tclass, &out_sid) < 0) {
516cd6a6acSopenharmony_ci		fprintf(stderr, "Failed to compute member sid:  %s\n", strerror(errno));
526cd6a6acSopenharmony_ci		return 1;
536cd6a6acSopenharmony_ci	}
546cd6a6acSopenharmony_ci
556cd6a6acSopenharmony_ci	if (sepol_sid_to_context(out_sid, &context, &context_len) < 0) {
566cd6a6acSopenharmony_ci		fprintf(stderr, "Failed to convert sid %u:  %s\n", out_sid, strerror(errno));
576cd6a6acSopenharmony_ci		return 1;
586cd6a6acSopenharmony_ci	}
596cd6a6acSopenharmony_ci
606cd6a6acSopenharmony_ci	printf("%s\n", context);
616cd6a6acSopenharmony_ci	free(context);
626cd6a6acSopenharmony_ci
636cd6a6acSopenharmony_ci	return 0;
646cd6a6acSopenharmony_ci}
65