Merge branch 'vendor/TCPDUMP' (early part)
[dragonfly.git] / contrib / bind-9.3 / bin / nsupdate / nsupdate.c
1 /*
2  * Copyright (C) 2004-2006  Internet Systems Consortium, Inc. ("ISC")
3  * Copyright (C) 2000-2003  Internet Software Consortium.
4  *
5  * Permission to use, copy, modify, and distribute this software for any
6  * purpose with or without fee is hereby granted, provided that the above
7  * copyright notice and this permission notice appear in all copies.
8  *
9  * THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
10  * REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
11  * AND FITNESS.  IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
12  * INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
13  * LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
14  * OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
15  * PERFORMANCE OF THIS SOFTWARE.
16  */
17
18 /* $Id: nsupdate.c,v 1.103.2.15.2.23 2006/06/09 07:29:24 marka Exp $ */
19
20 #include <config.h>
21
22 #include <ctype.h>
23 #include <errno.h>
24 #include <limits.h>
25 #include <stdlib.h>
26 #include <unistd.h>
27
28 #include <isc/app.h>
29 #include <isc/base64.h>
30 #include <isc/buffer.h>
31 #include <isc/commandline.h>
32 #include <isc/entropy.h>
33 #include <isc/event.h>
34 #include <isc/hash.h>
35 #include <isc/lex.h>
36 #include <isc/mem.h>
37 #include <isc/parseint.h>
38 #include <isc/region.h>
39 #include <isc/sockaddr.h>
40 #include <isc/socket.h>
41 #include <isc/stdio.h>
42 #include <isc/string.h>
43 #include <isc/task.h>
44 #include <isc/timer.h>
45 #include <isc/types.h>
46 #include <isc/util.h>
47
48 #include <dns/callbacks.h>
49 #include <dns/dispatch.h>
50 #include <dns/dnssec.h>
51 #include <dns/events.h>
52 #include <dns/fixedname.h>
53 #include <dns/masterdump.h>
54 #include <dns/message.h>
55 #include <dns/name.h>
56 #include <dns/rcode.h>
57 #include <dns/rdata.h>
58 #include <dns/rdataclass.h>
59 #include <dns/rdatalist.h>
60 #include <dns/rdataset.h>
61 #include <dns/rdatastruct.h>
62 #include <dns/rdatatype.h>
63 #include <dns/request.h>
64 #include <dns/result.h>
65 #include <dns/tsig.h>
66
67 #include <dst/dst.h>
68
69 #include <lwres/lwres.h>
70 #include <lwres/net.h>
71
72 #include <bind9/getaddresses.h>
73
74 #ifdef HAVE_ADDRINFO
75 #ifdef HAVE_GETADDRINFO
76 #ifdef HAVE_GAISTRERROR
77 #define USE_GETADDRINFO
78 #endif
79 #endif
80 #endif
81
82 #ifndef USE_GETADDRINFO
83 #ifndef ISC_PLATFORM_NONSTDHERRNO
84 extern int h_errno;
85 #endif
86 #endif
87
88 #define MAXCMD (4 * 1024)
89 #define MAXWIRE (64 * 1024)
90 #define PACKETSIZE ((64 * 1024) - 1)
91 #define INITTEXT (2 * 1024)
92 #define MAXTEXT (128 * 1024)
93 #define FIND_TIMEOUT 5
94 #define TTL_MAX 2147483647U     /* Maximum signed 32 bit integer. */
95
96 #define DNSDEFAULTPORT 53
97
98 #ifndef RESOLV_CONF
99 #define RESOLV_CONF "/etc/resolv.conf"
100 #endif
101
102 static isc_boolean_t debugging = ISC_FALSE, ddebugging = ISC_FALSE;
103 static isc_boolean_t memdebugging = ISC_FALSE;
104 static isc_boolean_t have_ipv4 = ISC_FALSE;
105 static isc_boolean_t have_ipv6 = ISC_FALSE;
106 static isc_boolean_t is_dst_up = ISC_FALSE;
107 static isc_boolean_t usevc = ISC_FALSE;
108 static isc_taskmgr_t *taskmgr = NULL;
109 static isc_task_t *global_task = NULL;
110 static isc_event_t *global_event = NULL;
111 static isc_mem_t *mctx = NULL;
112 static dns_dispatchmgr_t *dispatchmgr = NULL;
113 static dns_requestmgr_t *requestmgr = NULL;
114 static isc_socketmgr_t *socketmgr = NULL;
115 static isc_timermgr_t *timermgr = NULL;
116 static dns_dispatch_t *dispatchv4 = NULL;
117 static dns_dispatch_t *dispatchv6 = NULL;
118 static dns_message_t *updatemsg = NULL;
119 static dns_fixedname_t fuserzone;
120 static dns_name_t *userzone = NULL;
121 static dns_tsigkey_t *tsigkey = NULL;
122 static dst_key_t *sig0key;
123 static lwres_context_t *lwctx = NULL;
124 static lwres_conf_t *lwconf;
125 static isc_sockaddr_t *servers;
126 static int ns_inuse = 0;
127 static int ns_total = 0;
128 static isc_sockaddr_t *userserver = NULL;
129 static isc_sockaddr_t *localaddr = NULL;
130 static char *keystr = NULL, *keyfile = NULL;
131 static isc_entropy_t *entp = NULL;
132 static isc_boolean_t shuttingdown = ISC_FALSE;
133 static FILE *input;
134 static isc_boolean_t interactive = ISC_TRUE;
135 static isc_boolean_t seenerror = ISC_FALSE;
136 static const dns_master_style_t *style;
137 static int requests = 0;
138 static unsigned int timeout = 300;
139 static unsigned int udp_timeout = 3;
140 static unsigned int udp_retries = 3;
141 static dns_rdataclass_t defaultclass = dns_rdataclass_in;
142 static dns_rdataclass_t zoneclass = dns_rdataclass_none;
143 static dns_message_t *answer = NULL;
144
145 typedef struct nsu_requestinfo {
146         dns_message_t *msg;
147         isc_sockaddr_t *addr;
148 } nsu_requestinfo_t;
149
150 static void
151 sendrequest(isc_sockaddr_t *srcaddr, isc_sockaddr_t *destaddr,
152             dns_message_t *msg, dns_request_t **request);
153 static void
154 fatal(const char *format, ...) ISC_FORMAT_PRINTF(1, 2);
155
156 static void
157 debug(const char *format, ...) ISC_FORMAT_PRINTF(1, 2);
158
159 static void
160 ddebug(const char *format, ...) ISC_FORMAT_PRINTF(1, 2);
161
162 #define STATUS_MORE     (isc_uint16_t)0
163 #define STATUS_SEND     (isc_uint16_t)1
164 #define STATUS_QUIT     (isc_uint16_t)2
165 #define STATUS_SYNTAX   (isc_uint16_t)3
166
167 static dns_rdataclass_t
168 getzoneclass(void) {
169         if (zoneclass == dns_rdataclass_none)
170                 zoneclass = defaultclass;
171         return (zoneclass);
172 }
173
174 static isc_boolean_t
175 setzoneclass(dns_rdataclass_t rdclass) {
176         if (zoneclass == dns_rdataclass_none ||
177             rdclass == dns_rdataclass_none)
178                 zoneclass = rdclass;
179         if (zoneclass != rdclass)
180                 return (ISC_FALSE);
181         return (ISC_TRUE);
182 }
183
184 static void
185 fatal(const char *format, ...) {
186         va_list args;
187
188         va_start(args, format);
189         vfprintf(stderr, format, args);
190         va_end(args);
191         fprintf(stderr, "\n");
192         exit(1);
193 }
194
195 static void
196 debug(const char *format, ...) {
197         va_list args;
198
199         if (debugging) {
200                 va_start(args, format);
201                 vfprintf(stderr, format, args);
202                 va_end(args);
203                 fprintf(stderr, "\n");
204         }
205 }
206
207 static void
208 ddebug(const char *format, ...) {
209         va_list args;
210
211         if (ddebugging) {
212                 va_start(args, format);
213                 vfprintf(stderr, format, args);
214                 va_end(args);
215                 fprintf(stderr, "\n");
216         }
217 }
218
219 static inline void
220 check_result(isc_result_t result, const char *msg) {
221         if (result != ISC_R_SUCCESS)
222                 fatal("%s: %s", msg, isc_result_totext(result));
223 }
224
225 static void *
226 mem_alloc(void *arg, size_t size) {
227         return (isc_mem_get(arg, size));
228 }
229
230 static void
231 mem_free(void *arg, void *mem, size_t size) {
232         isc_mem_put(arg, mem, size);
233 }
234
235 static char *
236 nsu_strsep(char **stringp, const char *delim) {
237         char *string = *stringp;
238         char *s;
239         const char *d;
240         char sc, dc;
241
242         if (string == NULL)
243                 return (NULL);
244
245         for (; *string != '\0'; string++) {
246                 sc = *string;
247                 for (d = delim; (dc = *d) != '\0'; d++) {
248                         if (sc == dc)
249                                 break;
250                 }
251                 if (dc == 0)
252                         break;
253         }
254
255         for (s = string; *s != '\0'; s++) {
256                 sc = *s;
257                 for (d = delim; (dc = *d) != '\0'; d++) {
258                         if (sc == dc) {
259                                 *s++ = '\0';
260                                 *stringp = s;
261                                 return (string);
262                         }
263                 }
264         }
265         *stringp = NULL;
266         return (string);
267 }
268
269 static void
270 reset_system(void) {
271         isc_result_t result;
272
273         ddebug("reset_system()");
274         /* If the update message is still around, destroy it */
275         if (updatemsg != NULL)
276                 dns_message_reset(updatemsg, DNS_MESSAGE_INTENTRENDER);
277         else {
278                 result = dns_message_create(mctx, DNS_MESSAGE_INTENTRENDER,
279                                             &updatemsg);
280                 check_result(result, "dns_message_create");
281         }
282         updatemsg->opcode = dns_opcode_update;
283 }
284
285 static void
286 setup_keystr(void) {
287         unsigned char *secret = NULL;
288         int secretlen;
289         isc_buffer_t secretbuf;
290         isc_result_t result;
291         isc_buffer_t keynamesrc;
292         char *secretstr;
293         char *s;
294         dns_fixedname_t fkeyname;
295         dns_name_t *keyname;
296
297         dns_fixedname_init(&fkeyname);
298         keyname = dns_fixedname_name(&fkeyname);
299
300         debug("Creating key...");
301
302         s = strchr(keystr, ':');
303         if (s == NULL || s == keystr || *s == 0)
304                 fatal("key option must specify keyname:secret");
305         secretstr = s + 1;
306
307         isc_buffer_init(&keynamesrc, keystr, s - keystr);
308         isc_buffer_add(&keynamesrc, s - keystr);
309
310         debug("namefromtext");
311         result = dns_name_fromtext(keyname, &keynamesrc, dns_rootname,
312                                    ISC_FALSE, NULL);
313         check_result(result, "dns_name_fromtext");
314
315         secretlen = strlen(secretstr) * 3 / 4;
316         secret = isc_mem_allocate(mctx, secretlen);
317         if (secret == NULL)
318                 fatal("out of memory");
319
320         isc_buffer_init(&secretbuf, secret, secretlen);
321         result = isc_base64_decodestring(secretstr, &secretbuf);
322         if (result != ISC_R_SUCCESS) {
323                 fprintf(stderr, "could not create key from %s: %s\n",
324                         keystr, isc_result_totext(result));
325                 goto failure;
326         }
327
328         secretlen = isc_buffer_usedlength(&secretbuf);
329
330         debug("keycreate");
331         result = dns_tsigkey_create(keyname, dns_tsig_hmacmd5_name,
332                                     secret, secretlen, ISC_TRUE, NULL,
333                                     0, 0, mctx, NULL, &tsigkey);
334         if (result != ISC_R_SUCCESS)
335                 fprintf(stderr, "could not create key from %s: %s\n",
336                         keystr, dns_result_totext(result));
337  failure:
338         if (secret != NULL)
339                 isc_mem_free(mctx, secret);
340 }
341
342 static void
343 setup_keyfile(void) {
344         dst_key_t *dstkey = NULL;
345         isc_result_t result;
346
347         debug("Creating key...");
348
349         result = dst_key_fromnamedfile(keyfile,
350                                        DST_TYPE_PRIVATE | DST_TYPE_KEY, mctx,
351                                        &dstkey);
352         if (result != ISC_R_SUCCESS) {
353                 fprintf(stderr, "could not read key from %s: %s\n",
354                         keyfile, isc_result_totext(result));
355                 return;
356         }
357         if (dst_key_alg(dstkey) == DST_ALG_HMACMD5) {
358                 result = dns_tsigkey_createfromkey(dst_key_name(dstkey),
359                                                    dns_tsig_hmacmd5_name,
360                                                    dstkey, ISC_FALSE, NULL,
361                                                    0, 0, mctx, NULL, &tsigkey);
362                 if (result != ISC_R_SUCCESS) {
363                         fprintf(stderr, "could not create key from %s: %s\n",
364                                 keyfile, isc_result_totext(result));
365                         dst_key_free(&dstkey);
366                         return;
367                 }
368         } else
369                 sig0key = dstkey;
370 }
371
372 static void
373 doshutdown(void) {
374         isc_task_detach(&global_task);
375
376         if (userserver != NULL)
377                 isc_mem_put(mctx, userserver, sizeof(isc_sockaddr_t));
378
379         if (localaddr != NULL)
380                 isc_mem_put(mctx, localaddr, sizeof(isc_sockaddr_t));
381
382         if (tsigkey != NULL) {
383                 ddebug("Freeing TSIG key");
384                 dns_tsigkey_detach(&tsigkey);
385         }
386
387         if (sig0key != NULL) {
388                 ddebug("Freeing SIG(0) key");
389                 dst_key_free(&sig0key);
390         }
391
392         if (updatemsg != NULL)
393                 dns_message_destroy(&updatemsg);
394
395         if (is_dst_up) {
396                 ddebug("Destroy DST lib");
397                 dst_lib_destroy();
398                 is_dst_up = ISC_FALSE;
399         }
400
401         if (entp != NULL) {
402                 ddebug("Detach from entropy");
403                 isc_entropy_detach(&entp);
404         }
405
406         lwres_conf_clear(lwctx);
407         lwres_context_destroy(&lwctx);
408
409         isc_mem_put(mctx, servers, ns_total * sizeof(isc_sockaddr_t));
410
411         ddebug("Destroying request manager");
412         dns_requestmgr_detach(&requestmgr);
413
414         ddebug("Freeing the dispatchers");
415         if (have_ipv4)
416                 dns_dispatch_detach(&dispatchv4);
417         if (have_ipv6)
418                 dns_dispatch_detach(&dispatchv6);
419
420         ddebug("Shutting down dispatch manager");
421         dns_dispatchmgr_destroy(&dispatchmgr);
422
423 }
424
425 static void
426 maybeshutdown(void) {
427         ddebug("Shutting down request manager");
428         dns_requestmgr_shutdown(requestmgr);
429
430         if (requests != 0)
431                 return;
432
433         doshutdown();
434 }
435
436 static void
437 shutdown_program(isc_task_t *task, isc_event_t *event) {
438         REQUIRE(task == global_task);
439         UNUSED(task);
440
441         ddebug("shutdown_program()");
442         isc_event_free(&event);
443
444         shuttingdown = ISC_TRUE;
445         maybeshutdown();
446 }
447
448 static void
449 setup_system(void) {
450         isc_result_t result;
451         isc_sockaddr_t bind_any, bind_any6;
452         lwres_result_t lwresult;
453         unsigned int attrs, attrmask;
454         int i;
455
456         ddebug("setup_system()");
457
458         dns_result_register();
459
460         result = isc_net_probeipv4();
461         if (result == ISC_R_SUCCESS)
462                 have_ipv4 = ISC_TRUE;
463
464         result = isc_net_probeipv6();
465         if (result == ISC_R_SUCCESS)
466                 have_ipv6 = ISC_TRUE;
467
468         if (!have_ipv4 && !have_ipv6)
469                 fatal("could not find either IPv4 or IPv6");
470
471         result = isc_mem_create(0, 0, &mctx);
472         check_result(result, "isc_mem_create");
473
474         lwresult = lwres_context_create(&lwctx, mctx, mem_alloc, mem_free, 1);
475         if (lwresult != LWRES_R_SUCCESS)
476                 fatal("lwres_context_create failed");
477
478         (void)lwres_conf_parse(lwctx, RESOLV_CONF);
479         lwconf = lwres_conf_get(lwctx);
480
481         ns_total = lwconf->nsnext;
482         if (ns_total <= 0) {
483                 /* No name servers in resolv.conf; default to loopback. */
484                 struct in_addr localhost;
485                 ns_total = 1;
486                 servers = isc_mem_get(mctx, ns_total * sizeof(isc_sockaddr_t));
487                 if (servers == NULL)
488                         fatal("out of memory");
489                 localhost.s_addr = htonl(INADDR_LOOPBACK);
490                 isc_sockaddr_fromin(&servers[0], &localhost, DNSDEFAULTPORT);
491         } else {
492                 servers = isc_mem_get(mctx, ns_total * sizeof(isc_sockaddr_t));
493                 if (servers == NULL)
494                         fatal("out of memory");
495                 for (i = 0; i < ns_total; i++) {
496                         if (lwconf->nameservers[i].family == LWRES_ADDRTYPE_V4) {
497                                 struct in_addr in4;
498                                 memcpy(&in4, lwconf->nameservers[i].address, 4);
499                                 isc_sockaddr_fromin(&servers[i], &in4, DNSDEFAULTPORT);
500                         } else {
501                                 struct in6_addr in6;
502                                 memcpy(&in6, lwconf->nameservers[i].address, 16);
503                                 isc_sockaddr_fromin6(&servers[i], &in6,
504                                                      DNSDEFAULTPORT);
505                         }
506                 }
507         }
508
509         result = isc_entropy_create(mctx, &entp);
510         check_result(result, "isc_entropy_create");
511
512         result = isc_hash_create(mctx, entp, DNS_NAME_MAXWIRE);
513         check_result(result, "isc_hash_create");
514         isc_hash_init();
515
516         result = dns_dispatchmgr_create(mctx, entp, &dispatchmgr);
517         check_result(result, "dns_dispatchmgr_create");
518
519         result = isc_socketmgr_create(mctx, &socketmgr);
520         check_result(result, "dns_socketmgr_create");
521
522         result = isc_timermgr_create(mctx, &timermgr);
523         check_result(result, "dns_timermgr_create");
524
525         result = isc_taskmgr_create(mctx, 1, 0, &taskmgr);
526         check_result(result, "isc_taskmgr_create");
527
528         result = isc_task_create(taskmgr, 0, &global_task);
529         check_result(result, "isc_task_create");
530
531         result = isc_task_onshutdown(global_task, shutdown_program, NULL);
532         check_result(result, "isc_task_onshutdown");
533
534         result = dst_lib_init(mctx, entp, 0);
535         check_result(result, "dst_lib_init");
536         is_dst_up = ISC_TRUE;
537
538         attrmask = DNS_DISPATCHATTR_UDP | DNS_DISPATCHATTR_TCP;
539         attrmask |= DNS_DISPATCHATTR_IPV4 | DNS_DISPATCHATTR_IPV6;
540
541         if (have_ipv6) {
542                 attrs = DNS_DISPATCHATTR_UDP;
543                 attrs |= DNS_DISPATCHATTR_MAKEQUERY;
544                 attrs |= DNS_DISPATCHATTR_IPV6;
545                 isc_sockaddr_any6(&bind_any6);
546                 result = dns_dispatch_getudp(dispatchmgr, socketmgr, taskmgr,
547                                              &bind_any6, PACKETSIZE,
548                                              4, 2, 3, 5,
549                                              attrs, attrmask, &dispatchv6);
550                 check_result(result, "dns_dispatch_getudp (v6)");
551         }
552
553         if (have_ipv4) {
554                 attrs = DNS_DISPATCHATTR_UDP;
555                 attrs |= DNS_DISPATCHATTR_MAKEQUERY;
556                 attrs |= DNS_DISPATCHATTR_IPV4;
557                 isc_sockaddr_any(&bind_any);
558                 result = dns_dispatch_getudp(dispatchmgr, socketmgr, taskmgr,
559                                              &bind_any, PACKETSIZE,
560                                              4, 2, 3, 5,
561                                              attrs, attrmask, &dispatchv4);
562                 check_result(result, "dns_dispatch_getudp (v4)");
563         }
564
565         result = dns_requestmgr_create(mctx, timermgr,
566                                        socketmgr, taskmgr, dispatchmgr,
567                                        dispatchv4, dispatchv6, &requestmgr);
568         check_result(result, "dns_requestmgr_create");
569
570         if (keystr != NULL)
571                 setup_keystr();
572         else if (keyfile != NULL)
573                 setup_keyfile();
574 }
575
576 static void
577 get_address(char *host, in_port_t port, isc_sockaddr_t *sockaddr) {
578         int count;
579         isc_result_t result;
580
581         isc_app_block();
582         result = bind9_getaddresses(host, port, sockaddr, 1, &count);
583         isc_app_unblock();
584         if (result != ISC_R_SUCCESS)
585                 fatal("couldn't get address for '%s': %s",
586                       host, isc_result_totext(result));
587         INSIST(count == 1);
588 }
589
590 static void
591 parse_args(int argc, char **argv) {
592         int ch;
593         isc_result_t result;
594
595         debug("parse_args");
596         while ((ch = isc_commandline_parse(argc, argv, "dDMy:vk:r:t:u:")) != -1)
597         {
598                 switch (ch) {
599                 case 'd':
600                         debugging = ISC_TRUE;
601                         break;
602                 case 'D': /* was -dd */
603                         debugging = ISC_TRUE;
604                         ddebugging = ISC_TRUE;
605                         break;
606                 case 'M': /* was -dm */
607                         debugging = ISC_TRUE;
608                         ddebugging = ISC_TRUE;
609                         memdebugging = ISC_TRUE;
610                         isc_mem_debugging = ISC_MEM_DEBUGTRACE |
611                                             ISC_MEM_DEBUGRECORD;
612                         break;
613                 case 'y':
614                         keystr = isc_commandline_argument;
615                         break;
616                 case 'v':
617                         usevc = ISC_TRUE;
618                         break;
619                 case 'k':
620                         keyfile = isc_commandline_argument;
621                         break;
622                 case 't':
623                         result = isc_parse_uint32(&timeout,
624                                                   isc_commandline_argument, 10);
625                         if (result != ISC_R_SUCCESS) {
626                                 fprintf(stderr, "bad timeout '%s'\n",                                           isc_commandline_argument);
627                                 exit(1);
628                         }
629                         if (timeout == 0)
630                                 timeout = UINT_MAX;
631                         break;
632                 case 'u':
633                         result = isc_parse_uint32(&udp_timeout,
634                                                   isc_commandline_argument, 10);
635                         if (result != ISC_R_SUCCESS) {
636                                 fprintf(stderr, "bad udp timeout '%s'\n",                                               isc_commandline_argument);
637                                 exit(1);
638                         }
639                         if (udp_timeout == 0)
640                                 udp_timeout = UINT_MAX;
641                         break;
642                 case 'r':
643                         result = isc_parse_uint32(&udp_retries,
644                                                   isc_commandline_argument, 10);
645                         if (result != ISC_R_SUCCESS) {
646                                 fprintf(stderr, "bad udp retries '%s'\n",                                               isc_commandline_argument);
647                                 exit(1);
648                         }
649                         break;
650                 default:
651                         fprintf(stderr, "%s: invalid argument -%c\n",
652                                 argv[0], ch);
653                         fprintf(stderr, "usage: nsupdate [-d] "
654                                 "[-y keyname:secret | -k keyfile] [-v] "
655                                 "[filename]\n");
656                         exit(1);
657                 }
658         }
659         if (keyfile != NULL && keystr != NULL) {
660                 fprintf(stderr, "%s: cannot specify both -k and -y\n",
661                         argv[0]);
662                 exit(1);
663         }
664
665         if (argv[isc_commandline_index] != NULL) {
666                 if (strcmp(argv[isc_commandline_index], "-") == 0) {
667                         input = stdin;
668                 } else {
669                         result = isc_stdio_open(argv[isc_commandline_index],
670                                                 "r", &input);
671                         if (result != ISC_R_SUCCESS) {
672                                 fprintf(stderr, "could not open '%s': %s\n",
673                                         argv[isc_commandline_index],
674                                         isc_result_totext(result));
675                                 exit(1);
676                         }
677                 }
678                 interactive = ISC_FALSE;
679         }
680 }
681
682 static isc_uint16_t
683 parse_name(char **cmdlinep, dns_message_t *msg, dns_name_t **namep) {
684         isc_result_t result;
685         char *word;
686         isc_buffer_t *namebuf = NULL;
687         isc_buffer_t source;
688
689         word = nsu_strsep(cmdlinep, " \t\r\n");
690         if (*word == 0) {
691                 fprintf(stderr, "could not read owner name\n");
692                 return (STATUS_SYNTAX);
693         }
694
695         result = dns_message_gettempname(msg, namep);
696         check_result(result, "dns_message_gettempname");
697         result = isc_buffer_allocate(mctx, &namebuf, DNS_NAME_MAXWIRE);
698         check_result(result, "isc_buffer_allocate");
699         dns_name_init(*namep, NULL);
700         dns_name_setbuffer(*namep, namebuf);
701         dns_message_takebuffer(msg, &namebuf);
702         isc_buffer_init(&source, word, strlen(word));
703         isc_buffer_add(&source, strlen(word));
704         result = dns_name_fromtext(*namep, &source, dns_rootname,
705                                    ISC_FALSE, NULL);
706         check_result(result, "dns_name_fromtext");
707         isc_buffer_invalidate(&source);
708         return (STATUS_MORE);
709 }
710
711 static isc_uint16_t
712 parse_rdata(char **cmdlinep, dns_rdataclass_t rdataclass,
713             dns_rdatatype_t rdatatype, dns_message_t *msg,
714             dns_rdata_t *rdata)
715 {
716         char *cmdline = *cmdlinep;
717         isc_buffer_t source, *buf = NULL, *newbuf = NULL;
718         isc_region_t r;
719         isc_lex_t *lex = NULL;
720         dns_rdatacallbacks_t callbacks;
721         isc_result_t result;
722
723         while (*cmdline != 0 && isspace((unsigned char)*cmdline))
724                 cmdline++;
725
726         if (*cmdline != 0) {
727                 dns_rdatacallbacks_init(&callbacks);
728                 result = isc_lex_create(mctx, strlen(cmdline), &lex);
729                 check_result(result, "isc_lex_create");
730                 isc_buffer_init(&source, cmdline, strlen(cmdline));
731                 isc_buffer_add(&source, strlen(cmdline));
732                 result = isc_lex_openbuffer(lex, &source);
733                 check_result(result, "isc_lex_openbuffer");
734                 result = isc_buffer_allocate(mctx, &buf, MAXWIRE);
735                 check_result(result, "isc_buffer_allocate");
736                 result = dns_rdata_fromtext(rdata, rdataclass, rdatatype, lex,
737                                             dns_rootname, 0, mctx, buf,
738                                             &callbacks);
739                 isc_lex_destroy(&lex);
740                 if (result == ISC_R_SUCCESS) {
741                         isc_buffer_usedregion(buf, &r);
742                         result = isc_buffer_allocate(mctx, &newbuf, r.length);
743                         check_result(result, "isc_buffer_allocate");
744                         isc_buffer_putmem(newbuf, r.base, r.length);
745                         isc_buffer_usedregion(newbuf, &r);
746                         dns_rdata_fromregion(rdata, rdataclass, rdatatype, &r);
747                         isc_buffer_free(&buf);
748                         dns_message_takebuffer(msg, &newbuf);
749                 } else {
750                         fprintf(stderr, "invalid rdata format: %s\n",
751                                 isc_result_totext(result));
752                         isc_buffer_free(&buf);
753                         return (STATUS_SYNTAX);
754                 }
755         } else {
756                 rdata->flags = DNS_RDATA_UPDATE;
757         }
758         *cmdlinep = cmdline;
759         return (STATUS_MORE);
760 }
761
762 static isc_uint16_t
763 make_prereq(char *cmdline, isc_boolean_t ispositive, isc_boolean_t isrrset) {
764         isc_result_t result;
765         char *word;
766         dns_name_t *name = NULL;
767         isc_textregion_t region;
768         dns_rdataset_t *rdataset = NULL;
769         dns_rdatalist_t *rdatalist = NULL;
770         dns_rdataclass_t rdataclass;
771         dns_rdatatype_t rdatatype;
772         dns_rdata_t *rdata = NULL;
773         isc_uint16_t retval;
774
775         ddebug("make_prereq()");
776
777         /*
778          * Read the owner name
779          */
780         retval = parse_name(&cmdline, updatemsg, &name);
781         if (retval != STATUS_MORE)
782                 return (retval);
783
784         /*
785          * If this is an rrset prereq, read the class or type.
786          */
787         if (isrrset) {
788                 word = nsu_strsep(&cmdline, " \t\r\n");
789                 if (*word == 0) {
790                         fprintf(stderr, "could not read class or type\n");
791                         goto failure;
792                 }
793                 region.base = word;
794                 region.length = strlen(word);
795                 result = dns_rdataclass_fromtext(&rdataclass, &region);
796                 if (result == ISC_R_SUCCESS) {
797                         if (!setzoneclass(rdataclass)) {
798                                 fprintf(stderr, "class mismatch: %s\n", word);
799                                 goto failure;
800                         }
801                         /*
802                          * Now read the type.
803                          */
804                         word = nsu_strsep(&cmdline, " \t\r\n");
805                         if (*word == 0) {
806                                 fprintf(stderr, "could not read type\n");
807                                 goto failure;
808                         }
809                         region.base = word;
810                         region.length = strlen(word);
811                         result = dns_rdatatype_fromtext(&rdatatype, &region);
812                         if (result != ISC_R_SUCCESS) {
813                                 fprintf(stderr, "invalid type: %s\n", word);
814                                 goto failure;
815                         }
816                 } else {
817                         rdataclass = getzoneclass();
818                         result = dns_rdatatype_fromtext(&rdatatype, &region);
819                         if (result != ISC_R_SUCCESS) {
820                                 fprintf(stderr, "invalid type: %s\n", word);
821                                 goto failure;
822                         }
823                 }
824         } else
825                 rdatatype = dns_rdatatype_any;
826
827         result = dns_message_gettemprdata(updatemsg, &rdata);
828         check_result(result, "dns_message_gettemprdata");
829
830         rdata->data = NULL;
831         rdata->length = 0;
832
833         if (isrrset && ispositive) {
834                 retval = parse_rdata(&cmdline, rdataclass, rdatatype,
835                                      updatemsg, rdata);
836                 if (retval != STATUS_MORE)
837                         goto failure;
838         } else
839                 rdata->flags = DNS_RDATA_UPDATE;
840
841         result = dns_message_gettemprdatalist(updatemsg, &rdatalist);
842         check_result(result, "dns_message_gettemprdatalist");
843         result = dns_message_gettemprdataset(updatemsg, &rdataset);
844         check_result(result, "dns_message_gettemprdataset");
845         dns_rdatalist_init(rdatalist);
846         rdatalist->type = rdatatype;
847         if (ispositive) {
848                 if (isrrset && rdata->data != NULL)
849                         rdatalist->rdclass = rdataclass;
850                 else
851                         rdatalist->rdclass = dns_rdataclass_any;
852         } else
853                 rdatalist->rdclass = dns_rdataclass_none;
854         rdatalist->covers = 0;
855         rdatalist->ttl = 0;
856         rdata->rdclass = rdatalist->rdclass;
857         rdata->type = rdatatype;
858         ISC_LIST_INIT(rdatalist->rdata);
859         ISC_LIST_APPEND(rdatalist->rdata, rdata, link);
860         dns_rdataset_init(rdataset);
861         dns_rdatalist_tordataset(rdatalist, rdataset);
862         ISC_LIST_INIT(name->list);
863         ISC_LIST_APPEND(name->list, rdataset, link);
864         dns_message_addname(updatemsg, name, DNS_SECTION_PREREQUISITE);
865         return (STATUS_MORE);
866
867  failure:
868         if (name != NULL)
869                 dns_message_puttempname(updatemsg, &name);
870         return (STATUS_SYNTAX);
871 }
872
873 static isc_uint16_t
874 evaluate_prereq(char *cmdline) {
875         char *word;
876         isc_boolean_t ispositive, isrrset;
877
878         ddebug("evaluate_prereq()");
879         word = nsu_strsep(&cmdline, " \t\r\n");
880         if (*word == 0) {
881                 fprintf(stderr, "could not read operation code\n");
882                 return (STATUS_SYNTAX);
883         }
884         if (strcasecmp(word, "nxdomain") == 0) {
885                 ispositive = ISC_FALSE;
886                 isrrset = ISC_FALSE;
887         } else if (strcasecmp(word, "yxdomain") == 0) {
888                 ispositive = ISC_TRUE;
889                 isrrset = ISC_FALSE;
890         } else if (strcasecmp(word, "nxrrset") == 0) {
891                 ispositive = ISC_FALSE;
892                 isrrset = ISC_TRUE;
893         } else if (strcasecmp(word, "yxrrset") == 0) {
894                 ispositive = ISC_TRUE;
895                 isrrset = ISC_TRUE;
896         } else {
897                 fprintf(stderr, "incorrect operation code: %s\n", word);
898                 return (STATUS_SYNTAX);
899         }
900         return (make_prereq(cmdline, ispositive, isrrset));
901 }
902
903 static isc_uint16_t
904 evaluate_server(char *cmdline) {
905         char *word, *server;
906         long port;
907
908         word = nsu_strsep(&cmdline, " \t\r\n");
909         if (*word == 0) {
910                 fprintf(stderr, "could not read server name\n");
911                 return (STATUS_SYNTAX);
912         }
913         server = word;
914
915         word = nsu_strsep(&cmdline, " \t\r\n");
916         if (*word == 0)
917                 port = DNSDEFAULTPORT;
918         else {
919                 char *endp;
920                 port = strtol(word, &endp, 10);
921                 if (*endp != 0) {
922                         fprintf(stderr, "port '%s' is not numeric\n", word);
923                         return (STATUS_SYNTAX);
924                 } else if (port < 1 || port > 65535) {
925                         fprintf(stderr, "port '%s' is out of range "
926                                 "(1 to 65535)\n", word);
927                         return (STATUS_SYNTAX);
928                 }
929         }
930
931         if (userserver == NULL) {
932                 userserver = isc_mem_get(mctx, sizeof(isc_sockaddr_t));
933                 if (userserver == NULL)
934                         fatal("out of memory");
935         }
936
937         get_address(server, (in_port_t)port, userserver);
938
939         return (STATUS_MORE);
940 }
941
942 static isc_uint16_t
943 evaluate_local(char *cmdline) {
944         char *word, *local;
945         long port;
946         struct in_addr in4;
947         struct in6_addr in6;
948
949         word = nsu_strsep(&cmdline, " \t\r\n");
950         if (*word == 0) {
951                 fprintf(stderr, "could not read server name\n");
952                 return (STATUS_SYNTAX);
953         }
954         local = word;
955
956         word = nsu_strsep(&cmdline, " \t\r\n");
957         if (*word == 0)
958                 port = 0;
959         else {
960                 char *endp;
961                 port = strtol(word, &endp, 10);
962                 if (*endp != 0) {
963                         fprintf(stderr, "port '%s' is not numeric\n", word);
964                         return (STATUS_SYNTAX);
965                 } else if (port < 1 || port > 65535) {
966                         fprintf(stderr, "port '%s' is out of range "
967                                 "(1 to 65535)\n", word);
968                         return (STATUS_SYNTAX);
969                 }
970         }
971
972         if (localaddr == NULL) {
973                 localaddr = isc_mem_get(mctx, sizeof(isc_sockaddr_t));
974                 if (localaddr == NULL)
975                         fatal("out of memory");
976         }
977
978         if (have_ipv6 && inet_pton(AF_INET6, local, &in6) == 1)
979                 isc_sockaddr_fromin6(localaddr, &in6, (in_port_t)port);
980         else if (have_ipv4 && inet_pton(AF_INET, local, &in4) == 1)
981                 isc_sockaddr_fromin(localaddr, &in4, (in_port_t)port);
982         else {
983                 fprintf(stderr, "invalid address %s", local);
984                 return (STATUS_SYNTAX);
985         }
986
987         return (STATUS_MORE);
988 }
989
990 static isc_uint16_t
991 evaluate_key(char *cmdline) {
992         char *namestr;
993         char *secretstr;
994         isc_buffer_t b;
995         isc_result_t result;
996         dns_fixedname_t fkeyname;
997         dns_name_t *keyname;
998         int secretlen;
999         unsigned char *secret = NULL;
1000         isc_buffer_t secretbuf;
1001
1002         namestr = nsu_strsep(&cmdline, " \t\r\n");
1003         if (*namestr == 0) {
1004                 fprintf(stderr, "could not read key name\n");
1005                 return (STATUS_SYNTAX);
1006         }
1007
1008         dns_fixedname_init(&fkeyname);
1009         keyname = dns_fixedname_name(&fkeyname);
1010
1011         isc_buffer_init(&b, namestr, strlen(namestr));
1012         isc_buffer_add(&b, strlen(namestr));
1013         result = dns_name_fromtext(keyname, &b, dns_rootname, ISC_FALSE, NULL);
1014         if (result != ISC_R_SUCCESS) {
1015                 fprintf(stderr, "could not parse key name\n");
1016                 return (STATUS_SYNTAX);
1017         }
1018
1019         secretstr = nsu_strsep(&cmdline, "\r\n");
1020         if (*secretstr == 0) {
1021                 fprintf(stderr, "could not read key secret\n");
1022                 return (STATUS_SYNTAX);
1023         }
1024         secretlen = strlen(secretstr) * 3 / 4;
1025         secret = isc_mem_allocate(mctx, secretlen);
1026         if (secret == NULL)
1027                 fatal("out of memory");
1028         
1029         isc_buffer_init(&secretbuf, secret, secretlen);
1030         result = isc_base64_decodestring(secretstr, &secretbuf);
1031         if (result != ISC_R_SUCCESS) {
1032                 fprintf(stderr, "could not create key from %s: %s\n",
1033                         secretstr, isc_result_totext(result));
1034                 isc_mem_free(mctx, secret);
1035                 return (STATUS_SYNTAX);
1036         }
1037         secretlen = isc_buffer_usedlength(&secretbuf);
1038
1039         if (tsigkey != NULL)
1040                 dns_tsigkey_detach(&tsigkey);
1041         result = dns_tsigkey_create(keyname, dns_tsig_hmacmd5_name,
1042                                     secret, secretlen, ISC_TRUE, NULL, 0, 0,
1043                                     mctx, NULL, &tsigkey);
1044         isc_mem_free(mctx, secret);
1045         if (result != ISC_R_SUCCESS) {
1046                 fprintf(stderr, "could not create key from %s %s: %s\n",
1047                         namestr, secretstr, dns_result_totext(result));
1048                 return (STATUS_SYNTAX);
1049         }
1050         return (STATUS_MORE);
1051 }
1052
1053 static isc_uint16_t
1054 evaluate_zone(char *cmdline) {
1055         char *word;
1056         isc_buffer_t b;
1057         isc_result_t result;
1058
1059         word = nsu_strsep(&cmdline, " \t\r\n");
1060         if (*word == 0) {
1061                 fprintf(stderr, "could not read zone name\n");
1062                 return (STATUS_SYNTAX);
1063         }
1064
1065         dns_fixedname_init(&fuserzone);
1066         userzone = dns_fixedname_name(&fuserzone);
1067         isc_buffer_init(&b, word, strlen(word));
1068         isc_buffer_add(&b, strlen(word));
1069         result = dns_name_fromtext(userzone, &b, dns_rootname, ISC_FALSE,
1070                                    NULL);
1071         if (result != ISC_R_SUCCESS) {
1072                 userzone = NULL; /* Lest it point to an invalid name */
1073                 fprintf(stderr, "could not parse zone name\n");
1074                 return (STATUS_SYNTAX);
1075         }
1076
1077         return (STATUS_MORE);
1078 }
1079
1080 static isc_uint16_t
1081 evaluate_class(char *cmdline) {
1082         char *word;
1083         isc_textregion_t r;
1084         isc_result_t result;
1085         dns_rdataclass_t rdclass;
1086
1087         word = nsu_strsep(&cmdline, " \t\r\n");
1088         if (*word == 0) {
1089                 fprintf(stderr, "could not read class name\n");
1090                 return (STATUS_SYNTAX);
1091         }
1092
1093         r.base = word;
1094         r.length = strlen(word);
1095         result = dns_rdataclass_fromtext(&rdclass, &r);
1096         if (result != ISC_R_SUCCESS) {
1097                 fprintf(stderr, "could not parse class name: %s\n", word);
1098                 return (STATUS_SYNTAX);
1099         }
1100         switch (rdclass) {
1101         case dns_rdataclass_none:
1102         case dns_rdataclass_any:
1103         case dns_rdataclass_reserved0:
1104                 fprintf(stderr, "bad default class: %s\n", word);
1105                 return (STATUS_SYNTAX);
1106         default:
1107                 defaultclass = rdclass;
1108         }
1109
1110         return (STATUS_MORE);
1111 }
1112
1113 static isc_uint16_t
1114 update_addordelete(char *cmdline, isc_boolean_t isdelete) {
1115         isc_result_t result;
1116         dns_name_t *name = NULL;
1117         isc_uint32_t ttl;
1118         char *word;
1119         dns_rdataclass_t rdataclass;
1120         dns_rdatatype_t rdatatype;
1121         dns_rdata_t *rdata = NULL;
1122         dns_rdatalist_t *rdatalist = NULL;
1123         dns_rdataset_t *rdataset = NULL;
1124         isc_textregion_t region;
1125         isc_uint16_t retval;
1126
1127         ddebug("update_addordelete()");
1128
1129         /*
1130          * Read the owner name.
1131          */
1132         retval = parse_name(&cmdline, updatemsg, &name);
1133         if (retval != STATUS_MORE)
1134                 return (retval);
1135
1136         result = dns_message_gettemprdata(updatemsg, &rdata);
1137         check_result(result, "dns_message_gettemprdata");
1138
1139         rdata->rdclass = 0;
1140         rdata->type = 0;
1141         rdata->data = NULL;
1142         rdata->length = 0;
1143
1144         /*
1145          * If this is an add, read the TTL and verify that it's in range.
1146          * If it's a delete, ignore a TTL if present (for compatibility).
1147          */
1148         word = nsu_strsep(&cmdline, " \t\r\n");
1149         if (*word == 0) {
1150                 if (!isdelete) {
1151                         fprintf(stderr, "could not read owner ttl\n");
1152                         goto failure;
1153                 }
1154                 else {
1155                         ttl = 0;
1156                         rdataclass = dns_rdataclass_any;
1157                         rdatatype = dns_rdatatype_any;
1158                         rdata->flags = DNS_RDATA_UPDATE;
1159                         goto doneparsing;
1160                 }
1161         }
1162         result = isc_parse_uint32(&ttl, word, 10);
1163         if (result != ISC_R_SUCCESS) {
1164                 if (isdelete) {
1165                         ttl = 0;
1166                         goto parseclass;
1167                 } else {
1168                         fprintf(stderr, "ttl '%s': %s\n", word,
1169                                 isc_result_totext(result));
1170                         goto failure;
1171                 }
1172         }
1173
1174         if (isdelete)
1175                 ttl = 0;
1176         else if (ttl > TTL_MAX) {
1177                 fprintf(stderr, "ttl '%s' is out of range (0 to %u)\n",
1178                         word, TTL_MAX);
1179                 goto failure;
1180         }
1181
1182         /*
1183          * Read the class or type.
1184          */
1185         word = nsu_strsep(&cmdline, " \t\r\n");
1186  parseclass:
1187         if (*word == 0) {
1188                 if (isdelete) {
1189                         rdataclass = dns_rdataclass_any;
1190                         rdatatype = dns_rdatatype_any;
1191                         rdata->flags = DNS_RDATA_UPDATE;
1192                         goto doneparsing;
1193                 } else {
1194                         fprintf(stderr, "could not read class or type\n");
1195                         goto failure;
1196                 }
1197         }
1198         region.base = word;
1199         region.length = strlen(word);
1200         result = dns_rdataclass_fromtext(&rdataclass, &region);
1201         if (result == ISC_R_SUCCESS) {
1202                 if (!setzoneclass(rdataclass)) {
1203                         fprintf(stderr, "class mismatch: %s\n", word);
1204                         goto failure;
1205                 }
1206                 /*
1207                  * Now read the type.
1208                  */
1209                 word = nsu_strsep(&cmdline, " \t\r\n");
1210                 if (*word == 0) {
1211                         if (isdelete) {
1212                                 rdataclass = dns_rdataclass_any;
1213                                 rdatatype = dns_rdatatype_any;
1214                                 rdata->flags = DNS_RDATA_UPDATE;
1215                                 goto doneparsing;
1216                         } else {
1217                                 fprintf(stderr, "could not read type\n");
1218                                 goto failure;
1219                         }
1220                 }
1221                 region.base = word;
1222                 region.length = strlen(word);
1223                 result = dns_rdatatype_fromtext(&rdatatype, &region);
1224                 if (result != ISC_R_SUCCESS) {
1225                         fprintf(stderr, "'%s' is not a valid type: %s\n",
1226                                 word, isc_result_totext(result));
1227                         goto failure;
1228                 }
1229         } else {
1230                 rdataclass = getzoneclass();
1231                 result = dns_rdatatype_fromtext(&rdatatype, &region);
1232                 if (result != ISC_R_SUCCESS) {
1233                         fprintf(stderr, "'%s' is not a valid class or type: "
1234                                 "%s\n", word, isc_result_totext(result));
1235                         goto failure;
1236                 }
1237         }
1238
1239         retval = parse_rdata(&cmdline, rdataclass, rdatatype, updatemsg,
1240                              rdata);
1241         if (retval != STATUS_MORE)
1242                 goto failure;
1243
1244         if (isdelete) {
1245                 if ((rdata->flags & DNS_RDATA_UPDATE) != 0)
1246                         rdataclass = dns_rdataclass_any;
1247                 else
1248                         rdataclass = dns_rdataclass_none;
1249         } else {
1250                 if ((rdata->flags & DNS_RDATA_UPDATE) != 0) {
1251                         fprintf(stderr, "could not read rdata\n");
1252                         goto failure;
1253                 }
1254         }
1255
1256  doneparsing:
1257
1258         result = dns_message_gettemprdatalist(updatemsg, &rdatalist);
1259         check_result(result, "dns_message_gettemprdatalist");
1260         result = dns_message_gettemprdataset(updatemsg, &rdataset);
1261         check_result(result, "dns_message_gettemprdataset");
1262         dns_rdatalist_init(rdatalist);
1263         rdatalist->type = rdatatype;
1264         rdatalist->rdclass = rdataclass;
1265         rdatalist->covers = rdatatype;
1266         rdatalist->ttl = (dns_ttl_t)ttl;
1267         ISC_LIST_INIT(rdatalist->rdata);
1268         ISC_LIST_APPEND(rdatalist->rdata, rdata, link);
1269         dns_rdataset_init(rdataset);
1270         dns_rdatalist_tordataset(rdatalist, rdataset);
1271         ISC_LIST_INIT(name->list);
1272         ISC_LIST_APPEND(name->list, rdataset, link);
1273         dns_message_addname(updatemsg, name, DNS_SECTION_UPDATE);
1274         return (STATUS_MORE);
1275
1276  failure:
1277         if (name != NULL)
1278                 dns_message_puttempname(updatemsg, &name);
1279         if (rdata != NULL)
1280                 dns_message_puttemprdata(updatemsg, &rdata);
1281         return (STATUS_SYNTAX);
1282 }
1283
1284 static isc_uint16_t
1285 evaluate_update(char *cmdline) {
1286         char *word;
1287         isc_boolean_t isdelete;
1288
1289         ddebug("evaluate_update()");
1290         word = nsu_strsep(&cmdline, " \t\r\n");
1291         if (*word == 0) {
1292                 fprintf(stderr, "could not read operation code\n");
1293                 return (STATUS_SYNTAX);
1294         }
1295         if (strcasecmp(word, "delete") == 0)
1296                 isdelete = ISC_TRUE;
1297         else if (strcasecmp(word, "add") == 0)
1298                 isdelete = ISC_FALSE;
1299         else {
1300                 fprintf(stderr, "incorrect operation code: %s\n", word);
1301                 return (STATUS_SYNTAX);
1302         }
1303         return (update_addordelete(cmdline, isdelete));
1304 }
1305
1306 static void
1307 show_message(dns_message_t *msg) {
1308         isc_result_t result;
1309         isc_buffer_t *buf = NULL;
1310         int bufsz;
1311
1312         ddebug("show_message()");
1313         bufsz = INITTEXT;
1314         do { 
1315                 if (bufsz > MAXTEXT) {
1316                         fprintf(stderr, "could not allocate large enough "
1317                                 "buffer to display message\n");
1318                         exit(1);
1319                 }
1320                 if (buf != NULL)
1321                         isc_buffer_free(&buf);
1322                 result = isc_buffer_allocate(mctx, &buf, bufsz);
1323                 check_result(result, "isc_buffer_allocate");
1324                 result = dns_message_totext(msg, style, 0, buf);
1325                 bufsz *= 2;
1326         } while (result == ISC_R_NOSPACE);
1327         if (result != ISC_R_SUCCESS) {
1328                 fprintf(stderr, "could not convert message to text format.\n");
1329                 isc_buffer_free(&buf);
1330                 return;
1331         }
1332         printf("Outgoing update query:\n%.*s",
1333                (int)isc_buffer_usedlength(buf),
1334                (char*)isc_buffer_base(buf));
1335         isc_buffer_free(&buf);
1336 }
1337
1338
1339 static isc_uint16_t
1340 get_next_command(void) {
1341         char cmdlinebuf[MAXCMD];
1342         char *cmdline;
1343         char *word;
1344
1345         ddebug("get_next_command()");
1346         if (interactive) {
1347                 fprintf(stdout, "> ");
1348                 fflush(stdout);
1349         }
1350         isc_app_block();
1351         cmdline = fgets(cmdlinebuf, MAXCMD, input);
1352         isc_app_unblock();
1353         if (cmdline == NULL)
1354                 return (STATUS_QUIT);
1355         word = nsu_strsep(&cmdline, " \t\r\n");
1356
1357         if (feof(input))
1358                 return (STATUS_QUIT);
1359         if (*word == 0)
1360                 return (STATUS_SEND);
1361         if (word[0] == ';')
1362                 return (STATUS_MORE);
1363         if (strcasecmp(word, "quit") == 0)
1364                 return (STATUS_QUIT);
1365         if (strcasecmp(word, "prereq") == 0)
1366                 return (evaluate_prereq(cmdline));
1367         if (strcasecmp(word, "update") == 0)
1368                 return (evaluate_update(cmdline));
1369         if (strcasecmp(word, "server") == 0)
1370                 return (evaluate_server(cmdline));
1371         if (strcasecmp(word, "local") == 0)
1372                 return (evaluate_local(cmdline));
1373         if (strcasecmp(word, "zone") == 0)
1374                 return (evaluate_zone(cmdline));
1375         if (strcasecmp(word, "class") == 0)
1376                 return (evaluate_class(cmdline));
1377         if (strcasecmp(word, "send") == 0)
1378                 return (STATUS_SEND);
1379         if (strcasecmp(word, "show") == 0) {
1380                 show_message(updatemsg);
1381                 return (STATUS_MORE);
1382         }
1383         if (strcasecmp(word, "answer") == 0) {
1384                 if (answer != NULL)
1385                         show_message(answer);
1386                 return (STATUS_MORE);
1387         }
1388         if (strcasecmp(word, "key") == 0)
1389                 return (evaluate_key(cmdline));
1390         fprintf(stderr, "incorrect section name: %s\n", word);
1391         return (STATUS_SYNTAX);
1392 }
1393
1394 static isc_boolean_t
1395 user_interaction(void) {
1396         isc_uint16_t result = STATUS_MORE;
1397
1398         ddebug("user_interaction()");
1399         while ((result == STATUS_MORE) || (result == STATUS_SYNTAX))
1400                 result = get_next_command();
1401         if (result == STATUS_SEND)
1402                 return (ISC_TRUE);
1403         return (ISC_FALSE);
1404
1405 }
1406
1407 static void
1408 done_update(void) {
1409         isc_event_t *event = global_event;
1410         ddebug("done_update()");
1411         isc_task_send(global_task, &event);
1412 }
1413
1414 static void
1415 check_tsig_error(dns_rdataset_t *rdataset, isc_buffer_t *b) {
1416         isc_result_t result;
1417         dns_rdata_t rdata = DNS_RDATA_INIT;
1418         dns_rdata_any_tsig_t tsig;
1419
1420         result = dns_rdataset_first(rdataset);
1421         check_result(result, "dns_rdataset_first");
1422         dns_rdataset_current(rdataset, &rdata);
1423         result = dns_rdata_tostruct(&rdata, &tsig, NULL);
1424         check_result(result, "dns_rdata_tostruct");
1425         if (tsig.error != 0) {
1426                 if (isc_buffer_remaininglength(b) < 1)
1427                       check_result(ISC_R_NOSPACE, "isc_buffer_remaininglength");
1428                 isc__buffer_putstr(b, "(" /*)*/);
1429                 result = dns_tsigrcode_totext(tsig.error, b);
1430                 check_result(result, "dns_tsigrcode_totext");
1431                 if (isc_buffer_remaininglength(b) < 1)
1432                       check_result(ISC_R_NOSPACE, "isc_buffer_remaininglength");
1433                 isc__buffer_putstr(b,  /*(*/ ")");
1434         }
1435 }
1436
1437 static void
1438 update_completed(isc_task_t *task, isc_event_t *event) {
1439         dns_requestevent_t *reqev = NULL;
1440         isc_result_t result;
1441         dns_request_t *request;
1442
1443         UNUSED(task);
1444
1445         ddebug("update_completed()");
1446
1447         requests--;
1448
1449         REQUIRE(event->ev_type == DNS_EVENT_REQUESTDONE);
1450         reqev = (dns_requestevent_t *)event;
1451         request = reqev->request;
1452
1453         if (shuttingdown) {
1454                 dns_request_destroy(&request);
1455                 isc_event_free(&event);
1456                 maybeshutdown();
1457                 return;
1458         }
1459
1460         if (reqev->result != ISC_R_SUCCESS) {
1461                 fprintf(stderr, "; Communication with server failed: %s\n",
1462                         isc_result_totext(reqev->result));
1463                 seenerror = ISC_TRUE;
1464                 goto done;
1465         }
1466
1467         result = dns_message_create(mctx, DNS_MESSAGE_INTENTPARSE, &answer);
1468         check_result(result, "dns_message_create");
1469         result = dns_request_getresponse(request, answer,
1470                                          DNS_MESSAGEPARSE_PRESERVEORDER);
1471         switch (result) {
1472         case ISC_R_SUCCESS:
1473                 break;
1474         case DNS_R_CLOCKSKEW:
1475         case DNS_R_EXPECTEDTSIG:
1476         case DNS_R_TSIGERRORSET:
1477         case DNS_R_TSIGVERIFYFAILURE:
1478         case DNS_R_UNEXPECTEDTSIG:
1479                 fprintf(stderr, "; TSIG error with server: %s\n",
1480                         isc_result_totext(result));
1481                 seenerror = ISC_TRUE;
1482                 break;
1483         default:
1484                 check_result(result, "dns_request_getresponse");
1485         }
1486
1487         if (answer->rcode != dns_rcode_noerror) {
1488                 seenerror = ISC_TRUE;
1489                 if (!debugging) {
1490                         char buf[64];
1491                         isc_buffer_t b;
1492                         dns_rdataset_t *rds;
1493                         
1494                         isc_buffer_init(&b, buf, sizeof(buf) - 1);
1495                         result = dns_rcode_totext(answer->rcode, &b);
1496                         check_result(result, "dns_rcode_totext");
1497                         rds = dns_message_gettsig(answer, NULL);
1498                         if (rds != NULL)
1499                                 check_tsig_error(rds, &b);
1500                         fprintf(stderr, "update failed: %.*s\n",
1501                                 (int)isc_buffer_usedlength(&b), buf);
1502                 }
1503         }
1504         if (debugging) {
1505                 isc_buffer_t *buf = NULL;
1506                 int bufsz;
1507
1508                 bufsz = INITTEXT;
1509                 do { 
1510                         if (bufsz > MAXTEXT) {
1511                                 fprintf(stderr, "could not allocate large "
1512                                         "enough buffer to display message\n");
1513                                 exit(1);
1514                         }
1515                         if (buf != NULL)
1516                                 isc_buffer_free(&buf);
1517                         result = isc_buffer_allocate(mctx, &buf, bufsz);
1518                         check_result(result, "isc_buffer_allocate");
1519                         result = dns_message_totext(answer, style, 0, buf);
1520                         bufsz *= 2;
1521                 } while (result == ISC_R_NOSPACE);
1522                 check_result(result, "dns_message_totext");
1523                 fprintf(stderr, "\nReply from update query:\n%.*s\n",
1524                         (int)isc_buffer_usedlength(buf),
1525                         (char*)isc_buffer_base(buf));
1526                 isc_buffer_free(&buf);
1527         }
1528  done:
1529         dns_request_destroy(&request);
1530         isc_event_free(&event);
1531         done_update();
1532 }
1533
1534 static void
1535 send_update(dns_name_t *zonename, isc_sockaddr_t *master,
1536             isc_sockaddr_t *srcaddr)
1537 {
1538         isc_result_t result;
1539         dns_request_t *request = NULL;
1540         dns_name_t *name = NULL;
1541         dns_rdataset_t *rdataset = NULL;
1542         unsigned int options = 0;
1543
1544         ddebug("send_update()");
1545
1546         result = dns_message_gettempname(updatemsg, &name);
1547         check_result(result, "dns_message_gettempname");
1548         dns_name_init(name, NULL);
1549         dns_name_clone(zonename, name);
1550         result = dns_message_gettemprdataset(updatemsg, &rdataset);
1551         check_result(result, "dns_message_gettemprdataset");
1552         dns_rdataset_makequestion(rdataset, getzoneclass(), dns_rdatatype_soa);
1553         ISC_LIST_INIT(name->list);
1554         ISC_LIST_APPEND(name->list, rdataset, link);
1555         dns_message_addname(updatemsg, name, DNS_SECTION_ZONE);
1556
1557         if (usevc)
1558                 options |= DNS_REQUESTOPT_TCP;
1559         if (tsigkey == NULL && sig0key != NULL) {
1560                 result = dns_message_setsig0key(updatemsg, sig0key);
1561                 check_result(result, "dns_message_setsig0key");
1562         }
1563         if (debugging) {
1564                 char addrbuf[ISC_SOCKADDR_FORMATSIZE];
1565
1566                 isc_sockaddr_format(master, addrbuf, sizeof(addrbuf));
1567                 fprintf(stderr, "Sending update to %s\n", addrbuf);
1568         }
1569         result = dns_request_createvia3(requestmgr, updatemsg, srcaddr,
1570                                         master, options, tsigkey, timeout,
1571                                         udp_timeout, udp_retries, global_task,
1572                                         update_completed, NULL, &request);
1573         check_result(result, "dns_request_createvia3");
1574
1575         if (debugging)
1576                 show_message(updatemsg);
1577
1578         requests++;
1579 }
1580
1581 static void
1582 recvsoa(isc_task_t *task, isc_event_t *event) {
1583         dns_requestevent_t *reqev = NULL;
1584         dns_request_t *request = NULL;
1585         isc_result_t result, eresult;
1586         dns_message_t *rcvmsg = NULL;
1587         dns_section_t section;
1588         dns_name_t *name = NULL;
1589         dns_rdataset_t *soaset = NULL;
1590         dns_rdata_soa_t soa;
1591         dns_rdata_t soarr = DNS_RDATA_INIT;
1592         int pass = 0;
1593         dns_name_t master;
1594         isc_sockaddr_t *serveraddr, tempaddr;
1595         dns_name_t *zonename;
1596         nsu_requestinfo_t *reqinfo;
1597         dns_message_t *soaquery = NULL;
1598         isc_sockaddr_t *addr;
1599         isc_boolean_t seencname = ISC_FALSE;
1600         dns_name_t tname;
1601         unsigned int nlabels;
1602
1603         UNUSED(task);
1604
1605         ddebug("recvsoa()");
1606
1607         requests--;
1608         
1609         REQUIRE(event->ev_type == DNS_EVENT_REQUESTDONE);
1610         reqev = (dns_requestevent_t *)event;
1611         request = reqev->request;
1612         eresult = reqev->result;
1613         reqinfo = reqev->ev_arg;
1614         soaquery = reqinfo->msg;
1615         addr = reqinfo->addr;
1616
1617         if (shuttingdown) {
1618                 dns_request_destroy(&request);
1619                 dns_message_destroy(&soaquery);
1620                 isc_mem_put(mctx, reqinfo, sizeof(nsu_requestinfo_t));
1621                 isc_event_free(&event);
1622                 maybeshutdown();
1623                 return;
1624         }
1625
1626         if (eresult != ISC_R_SUCCESS) {
1627                 char addrbuf[ISC_SOCKADDR_FORMATSIZE];
1628
1629                 isc_sockaddr_format(addr, addrbuf, sizeof(addrbuf));
1630                 fprintf(stderr, "; Communication with %s failed: %s\n",
1631                        addrbuf, isc_result_totext(eresult));
1632                 if (userserver != NULL)
1633                         fatal("could not talk to specified name server");
1634                 else if (++ns_inuse >= lwconf->nsnext)
1635                         fatal("could not talk to any default name server");
1636                 ddebug("Destroying request [%p]", request);
1637                 dns_request_destroy(&request);
1638                 dns_message_renderreset(soaquery);
1639                 dns_message_settsigkey(soaquery, NULL);
1640                 sendrequest(localaddr, &servers[ns_inuse], soaquery, &request);
1641                 isc_mem_put(mctx, reqinfo, sizeof(nsu_requestinfo_t));
1642                 isc_event_free(&event);
1643                 setzoneclass(dns_rdataclass_none);
1644                 return;
1645         }
1646         isc_mem_put(mctx, reqinfo, sizeof(nsu_requestinfo_t));
1647
1648         isc_event_free(&event);
1649         reqev = NULL;
1650
1651         ddebug("About to create rcvmsg");
1652         result = dns_message_create(mctx, DNS_MESSAGE_INTENTPARSE, &rcvmsg);
1653         check_result(result, "dns_message_create");
1654         result = dns_request_getresponse(request, rcvmsg,
1655                                          DNS_MESSAGEPARSE_PRESERVEORDER);
1656         if (result == DNS_R_TSIGERRORSET && userserver != NULL) {
1657                 dns_message_destroy(&rcvmsg);
1658                 ddebug("Destroying request [%p]", request);
1659                 dns_request_destroy(&request);
1660                 reqinfo = isc_mem_get(mctx, sizeof(nsu_requestinfo_t));
1661                 if (reqinfo == NULL)
1662                         fatal("out of memory");
1663                 reqinfo->msg = soaquery;
1664                 reqinfo->addr = addr;
1665                 dns_message_renderreset(soaquery);
1666                 ddebug("retrying soa request without TSIG");
1667                 result = dns_request_createvia3(requestmgr, soaquery,
1668                                                 localaddr, addr, 0, NULL,
1669                                                 FIND_TIMEOUT * 20,
1670                                                 FIND_TIMEOUT, 3,
1671                                                 global_task, recvsoa, reqinfo,
1672                                                 &request);
1673                 check_result(result, "dns_request_createvia");
1674                 requests++;
1675                 return;
1676         }
1677         check_result(result, "dns_request_getresponse");
1678         section = DNS_SECTION_ANSWER;
1679         if (debugging) {
1680                 isc_buffer_t *buf = NULL;
1681                 int bufsz;
1682                 bufsz = INITTEXT;
1683                 do {
1684                         if (buf != NULL)
1685                                 isc_buffer_free(&buf);
1686                         if (bufsz > MAXTEXT) {
1687                                 fprintf(stderr, "could not allocate enough "
1688                                          "space for debugging message\n");
1689                                 exit(1);
1690                         }
1691                         result = isc_buffer_allocate(mctx, &buf, bufsz);
1692                         check_result(result, "isc_buffer_allocate");
1693                         result = dns_message_totext(rcvmsg, style, 0, buf);
1694                 } while (result == ISC_R_NOSPACE);
1695                 check_result(result, "dns_message_totext");
1696                 fprintf(stderr, "Reply from SOA query:\n%.*s\n",
1697                         (int)isc_buffer_usedlength(buf),
1698                         (char*)isc_buffer_base(buf));
1699                 isc_buffer_free(&buf);
1700         }
1701
1702         if (rcvmsg->rcode != dns_rcode_noerror &&
1703             rcvmsg->rcode != dns_rcode_nxdomain)
1704                 fatal("response to SOA query was unsuccessful");
1705
1706  lookforsoa:
1707         if (pass == 0)
1708                 section = DNS_SECTION_ANSWER;
1709         else if (pass == 1)
1710                 section = DNS_SECTION_AUTHORITY;
1711         else 
1712                 goto droplabel;
1713
1714         result = dns_message_firstname(rcvmsg, section);
1715         if (result != ISC_R_SUCCESS) {
1716                 pass++;
1717                 goto lookforsoa;
1718         }
1719         while (result == ISC_R_SUCCESS) {
1720                 name = NULL;
1721                 dns_message_currentname(rcvmsg, section, &name);
1722                 soaset = NULL;
1723                 result = dns_message_findtype(name, dns_rdatatype_soa, 0,
1724                                               &soaset);
1725                 if (result == ISC_R_SUCCESS)
1726                         break;
1727                 if (section == DNS_SECTION_ANSWER) {
1728                         dns_rdataset_t *tset = NULL;
1729                         if (dns_message_findtype(name, dns_rdatatype_cname, 0,
1730                                                  &tset) == ISC_R_SUCCESS
1731                             ||
1732                             dns_message_findtype(name, dns_rdatatype_dname, 0,
1733                                                  &tset) == ISC_R_SUCCESS
1734                             )
1735                         {
1736                                 seencname = ISC_TRUE;
1737                                 break;
1738                         }
1739                 }
1740                                 
1741                 result = dns_message_nextname(rcvmsg, section);
1742         }
1743
1744         if (soaset == NULL && !seencname) {
1745                 pass++;
1746                 goto lookforsoa;
1747         }
1748
1749         if (seencname)
1750                 goto droplabel;
1751
1752         if (debugging) {
1753                 char namestr[DNS_NAME_FORMATSIZE];
1754                 dns_name_format(name, namestr, sizeof(namestr));
1755                 fprintf(stderr, "Found zone name: %s\n", namestr);
1756         }
1757
1758         result = dns_rdataset_first(soaset);
1759         check_result(result, "dns_rdataset_first");
1760
1761         dns_rdata_init(&soarr);
1762         dns_rdataset_current(soaset, &soarr);
1763         result = dns_rdata_tostruct(&soarr, &soa, NULL);
1764         check_result(result, "dns_rdata_tostruct");
1765
1766         dns_name_init(&master, NULL);
1767         dns_name_clone(&soa.origin, &master);
1768
1769         if (userzone != NULL)
1770                 zonename = userzone;
1771         else
1772                 zonename = name;
1773
1774         if (debugging) {
1775                 char namestr[DNS_NAME_FORMATSIZE];
1776                 dns_name_format(&master, namestr, sizeof(namestr));
1777                 fprintf(stderr, "The master is: %s\n", namestr);
1778         }
1779
1780         if (userserver != NULL)
1781                 serveraddr = userserver;
1782         else {
1783                 char serverstr[DNS_NAME_MAXTEXT+1];
1784                 isc_buffer_t buf;
1785
1786                 isc_buffer_init(&buf, serverstr, sizeof(serverstr));
1787                 result = dns_name_totext(&master, ISC_TRUE, &buf);
1788                 check_result(result, "dns_name_totext");
1789                 serverstr[isc_buffer_usedlength(&buf)] = 0;
1790                 get_address(serverstr, DNSDEFAULTPORT, &tempaddr);
1791                 serveraddr = &tempaddr;
1792         }
1793         dns_rdata_freestruct(&soa);
1794
1795         send_update(zonename, serveraddr, localaddr);
1796         setzoneclass(dns_rdataclass_none);
1797
1798         dns_message_destroy(&soaquery);
1799         dns_request_destroy(&request);
1800
1801  out:
1802         dns_message_destroy(&rcvmsg);
1803         ddebug("Out of recvsoa");
1804         return;
1805  
1806  droplabel:
1807         result = dns_message_firstname(soaquery, DNS_SECTION_QUESTION);
1808         INSIST(result == ISC_R_SUCCESS);
1809         name = NULL;
1810         dns_message_currentname(soaquery, DNS_SECTION_QUESTION, &name);
1811         nlabels = dns_name_countlabels(name);
1812         if (nlabels == 1)
1813                 fatal("could not find enclosing zone");
1814         dns_name_init(&tname, NULL);
1815         dns_name_getlabelsequence(name, 1, nlabels - 1, &tname);
1816         dns_name_clone(&tname, name);
1817         dns_request_destroy(&request);
1818         dns_message_renderreset(soaquery);
1819         dns_message_settsigkey(soaquery, NULL);
1820         if (userserver != NULL)
1821                 sendrequest(localaddr, userserver, soaquery, &request);
1822         else
1823                 sendrequest(localaddr, &servers[ns_inuse], soaquery,
1824                             &request);
1825         goto out;
1826 }
1827
1828 static void
1829 sendrequest(isc_sockaddr_t *srcaddr, isc_sockaddr_t *destaddr,
1830             dns_message_t *msg, dns_request_t **request)
1831 {
1832         isc_result_t result;
1833         nsu_requestinfo_t *reqinfo;
1834
1835         reqinfo = isc_mem_get(mctx, sizeof(nsu_requestinfo_t));
1836         if (reqinfo == NULL)
1837                 fatal("out of memory");
1838         reqinfo->msg = msg;
1839         reqinfo->addr = destaddr;
1840         result = dns_request_createvia3(requestmgr, msg, srcaddr, destaddr, 0,
1841                                         (userserver != NULL) ? tsigkey : NULL,
1842                                         FIND_TIMEOUT * 20, FIND_TIMEOUT, 3,
1843                                         global_task, recvsoa, reqinfo, request);
1844         check_result(result, "dns_request_createvia");
1845         requests++;
1846 }
1847
1848 static void
1849 start_update(void) {
1850         isc_result_t result;
1851         dns_rdataset_t *rdataset = NULL;
1852         dns_name_t *name = NULL;
1853         dns_request_t *request = NULL;
1854         dns_message_t *soaquery = NULL;
1855         dns_name_t *firstname;
1856         dns_section_t section = DNS_SECTION_UPDATE;
1857
1858         ddebug("start_update()");
1859
1860         if (answer != NULL)
1861                 dns_message_destroy(&answer);
1862         result = dns_message_firstname(updatemsg, section);
1863         if (result == ISC_R_NOMORE) {
1864                 section = DNS_SECTION_PREREQUISITE;
1865                 result = dns_message_firstname(updatemsg, section);
1866         }
1867         if (result != ISC_R_SUCCESS) {
1868                 done_update();
1869                 return;
1870         }
1871
1872         if (userzone != NULL && userserver != NULL) {
1873                 send_update(userzone, userserver, localaddr);
1874                 setzoneclass(dns_rdataclass_none);
1875                 return;
1876         }
1877
1878         result = dns_message_create(mctx, DNS_MESSAGE_INTENTRENDER,
1879                                     &soaquery);
1880         check_result(result, "dns_message_create");
1881
1882         soaquery->flags |= DNS_MESSAGEFLAG_RD;
1883
1884         result = dns_message_gettempname(soaquery, &name);
1885         check_result(result, "dns_message_gettempname");
1886
1887         result = dns_message_gettemprdataset(soaquery, &rdataset);
1888         check_result(result, "dns_message_gettemprdataset");
1889
1890         dns_rdataset_makequestion(rdataset, getzoneclass(), dns_rdatatype_soa);
1891
1892         firstname = NULL;
1893         dns_message_currentname(updatemsg, section, &firstname);
1894         dns_name_init(name, NULL);
1895         dns_name_clone(firstname, name);
1896
1897         ISC_LIST_INIT(name->list);
1898         ISC_LIST_APPEND(name->list, rdataset, link);
1899         dns_message_addname(soaquery, name, DNS_SECTION_QUESTION);
1900
1901         if (userserver != NULL)
1902                 sendrequest(localaddr, userserver, soaquery, &request);
1903         else {
1904                 ns_inuse = 0;
1905                 sendrequest(localaddr, &servers[ns_inuse], soaquery, &request);
1906         }
1907 }
1908
1909 static void
1910 cleanup(void) {
1911         ddebug("cleanup()");
1912
1913         if (answer != NULL)
1914                 dns_message_destroy(&answer);
1915         ddebug("Shutting down task manager");
1916         isc_taskmgr_destroy(&taskmgr);
1917
1918         ddebug("Destroying event");
1919         isc_event_free(&global_event);
1920
1921         ddebug("Shutting down socket manager");
1922         isc_socketmgr_destroy(&socketmgr);
1923
1924         ddebug("Shutting down timer manager");
1925         isc_timermgr_destroy(&timermgr);
1926
1927         ddebug("Destroying hash context");
1928         isc_hash_destroy();
1929
1930         ddebug("Destroying memory context");
1931         if (memdebugging)
1932                 isc_mem_stats(mctx, stderr);
1933         isc_mem_destroy(&mctx);
1934 }
1935
1936 static void
1937 getinput(isc_task_t *task, isc_event_t *event) {
1938         isc_boolean_t more;
1939
1940         UNUSED(task);
1941
1942         if (shuttingdown) {
1943                 maybeshutdown();
1944                 return;
1945         }
1946
1947         if (global_event == NULL)
1948                 global_event = event;
1949
1950         reset_system();
1951         more = user_interaction();
1952         if (!more) {
1953                 isc_app_shutdown();
1954                 return;
1955         }
1956         start_update();
1957         return;
1958 }
1959
1960 int
1961 main(int argc, char **argv) {
1962         isc_result_t result;
1963         style = &dns_master_style_debug;
1964
1965         input = stdin;
1966
1967         interactive = ISC_TF(isatty(0));
1968
1969         isc_app_start();
1970
1971         parse_args(argc, argv);
1972
1973         setup_system();
1974
1975         result = isc_app_onrun(mctx, global_task, getinput, NULL);
1976         check_result(result, "isc_app_onrun");
1977
1978         (void)isc_app_run();
1979
1980         cleanup();
1981
1982         isc_app_finish();
1983
1984         if (seenerror)
1985                 return (2);
1986         else
1987                 return (0);
1988 }