-fix leaks
[oweals/gnunet.git] / src / namestore / gnunet-namestore.c
index a79ec5e78d59aa8fc113712e5a35043baafc72a1..36aae60568d9d819b9c2171394d1a914bdfd48d5 100644 (file)
@@ -1,6 +1,7 @@
+
 /*
      This file is part of GNUnet.
-     (C) 2012 Christian Grothoff (and other contributing authors)
+     (C) 2012, 2013 Christian Grothoff (and other contributing authors)
 
      GNUnet is free software; you can redistribute it and/or modify
      it under the terms of the GNU General Public License as published
  * @author Christian Grothoff
  *
  * TODO:
- * - allow users to set record options (not just 'RF_AUTHORITY')
  * - test
- * - add options to list/lookup individual records
  */
 #include "platform.h"
 #include <gnunet_util_lib.h>
 #include <gnunet_dnsparser_lib.h>
+#include <gnunet_identity_service.h>
+#include <gnunet_gnsrecord_lib.h>
 #include <gnunet_namestore_service.h>
 
 
-/**
- * Hostkey generation context
- */
-struct GNUNET_CRYPTO_RsaKeyGenerationContext * keygen;
-
 /**
  * Handle to the namestore.
  */
 static struct GNUNET_NAMESTORE_Handle *ns;
 
 /**
- * Hash of the public key of our zone.
+ * Private key for the our zone.
  */
-static struct GNUNET_CRYPTO_ShortHashCode zone;
+static struct GNUNET_CRYPTO_EcdsaPrivateKey zone_pkey;
 
 /**
- * Private key for the our zone.
+ * Handle to identity lookup.
  */
-static struct GNUNET_CRYPTO_RsaPrivateKey *zone_pkey;
+static struct GNUNET_IDENTITY_EgoLookup *el;
 
 /**
- * Keyfile to manipulate.
+ * Name of the ego controlling the zone.
  */
-static char *keyfile;  
+static char *ego_name;
 
 /**
  * Desired action is to add a record.
@@ -64,15 +60,25 @@ static char *keyfile;
 static int add;
 
 /**
- * Queue entry for the 'add' operation.
+ * Iterator for the 'add' operation.
  */
-static struct GNUNET_NAMESTORE_QueueEntry *add_qe;
+static struct GNUNET_NAMESTORE_ZoneIterator *add_zit;
 
 /**
  * Queue entry for the 'add-uri' operation.
  */
 static struct GNUNET_NAMESTORE_QueueEntry *add_qe_uri;
 
+/**
+ * Queue entry for the 'add' operation.
+ */
+static struct GNUNET_NAMESTORE_QueueEntry *add_qe;
+
+/**
+ * Queue entry for the 'reverse lookup' operation (in combination with a name).
+ */
+static struct GNUNET_NAMESTORE_QueueEntry *reverse_qe;
+
 /**
  * Desired action is to list records.
  */
@@ -89,14 +95,14 @@ static struct GNUNET_NAMESTORE_ZoneIterator *list_it;
 static int del;
 
 /**
- * Is record public
+ * Is record public (opposite of #GNUNET_GNSRECORD_RF_PRIVATE)
  */
 static int public;
 
 /**
- * Is record authority
+ * Is record a shadow record (#GNUNET_GNSRECORD_RF_SHADOW_RECORD)
  */
-static int nonauthority;
+static int shadow;
 
 /**
  * Queue entry for the 'del' operation.
@@ -118,6 +124,11 @@ static char *value;
  */
 static char *uri;
 
+/**
+ * Reverse lookup to perform.
+ */
+static char *reverse_pkey;
+
 /**
  * Type of the record to add/remove, NULL to remove all.
  */
@@ -133,6 +144,46 @@ static char *expirationstring;
  */
 static int ret;
 
+/**
+ * Type string converted to DNS type value.
+ */
+static uint32_t type;
+
+/**
+ * Value in binary format.
+ */
+static void *data;
+
+/**
+ * Number of bytes in 'data'.
+ */
+static size_t data_size;
+
+/**
+ * Expirationstring converted to relative time.
+ */
+static struct GNUNET_TIME_Relative etime_rel;
+
+/**
+ * Expirationstring converted to absolute time.
+ */
+static struct GNUNET_TIME_Absolute etime_abs;
+
+/**
+ * Is expiration time relative or absolute time?
+ */
+static int etime_is_rel = GNUNET_SYSERR;
+
+/**
+ * Monitor handle.
+ */
+static struct GNUNET_NAMESTORE_ZoneMonitor *zm;
+
+/**
+ * Enables monitor mode.
+ */
+static int monitor;
+
 
 /**
  * Task run on shutdown.  Cleans up everything.
@@ -144,17 +195,21 @@ static void
 do_shutdown (void *cls,
             const struct GNUNET_SCHEDULER_TaskContext *tc)
 {
-  if (NULL != keygen)
+  if (NULL != el)
   {
-    GNUNET_CRYPTO_rsa_key_create_stop (keygen);
-    keygen = NULL;
+    GNUNET_IDENTITY_ego_lookup_cancel (el);
+    el = NULL;
   }
-
   if (NULL != list_it)
   {
     GNUNET_NAMESTORE_zone_iteration_stop (list_it);
     list_it = NULL;
   }
+  if (NULL != add_zit)
+  {
+    GNUNET_NAMESTORE_zone_iteration_stop (add_zit);
+    add_zit = NULL;
+  }
   if (NULL != add_qe)
   {
     GNUNET_NAMESTORE_cancel (add_qe);
@@ -175,16 +230,37 @@ do_shutdown (void *cls,
     GNUNET_NAMESTORE_disconnect (ns);
     ns = NULL;
   }
-  if (NULL != zone_pkey)
-  {
-    GNUNET_CRYPTO_rsa_key_free (zone_pkey);
-    zone_pkey = NULL;
-  }
+  memset (&zone_pkey, 0, sizeof (zone_pkey));
   if (NULL != uri)
   {
     GNUNET_free (uri);
     uri = NULL;
   }
+  if (NULL != zm)
+  {
+    GNUNET_NAMESTORE_zone_monitor_stop (zm);
+    zm = NULL;
+  }
+  if (NULL != data)
+  {
+    GNUNET_free (data);
+    data = NULL;
+  }
+}
+
+
+/**
+ * Check if we are finished, and if so, perform shutdown.
+ */
+static void
+test_finished ()
+{
+  if ( (NULL == add_qe) &&
+       (NULL == add_qe_uri) &&
+       (NULL == del_qe) &&
+       (NULL == reverse_qe) &&
+       (NULL == list_it) )
+    GNUNET_SCHEDULER_shutdown ();
 }
 
 
@@ -193,9 +269,9 @@ do_shutdown (void *cls,
  * operation.
  *
  * @param cls closure, location of the QueueEntry pointer to NULL out
- * @param success GNUNET_SYSERR on failure (including timeout/queue drop/failure to validate)
- *                GNUNET_NO if content was already there
- *                GNUNET_YES (or other positive value) on success
+ * @param success #GNUNET_SYSERR on failure (including timeout/queue drop/failure to validate)
+ *                #GNUNET_NO if content was already there
+ *                #GNUNET_YES (or other positive value) on success
  * @param emsg NULL on success, otherwise an error message
  */
 static void
@@ -214,11 +290,7 @@ add_continuation (void *cls,
     if (GNUNET_NO != success)
       ret = 1;
   }
-  if ( (NULL == add_qe) &&
-       (NULL == add_qe_uri) &&
-       (NULL == del_qe) &&
-       (NULL == list_it) )
-    GNUNET_SCHEDULER_shutdown ();
+  test_finished ();
 }
 
 
@@ -227,9 +299,9 @@ add_continuation (void *cls,
  * operation.
  *
  * @param cls closure, unused
- * @param success GNUNET_SYSERR on failure (including timeout/queue drop/failure to validate)
- *                GNUNET_NO if content was already there
- *                GNUNET_YES (or other positive value) on success
+ * @param success #GNUNET_SYSERR on failure (including timeout/queue drop/failure to validate)
+ *                #GNUNET_NO if content was already there
+ *                #GNUNET_YES (or other positive value) on success
  * @param emsg NULL on success, otherwise an error message
  */
 static void
@@ -242,10 +314,7 @@ del_continuation (void *cls,
     fprintf (stderr,
             _("Deleting record failed: %s\n"),
             emsg);
-  if ( (NULL == add_qe) &&
-       (NULL == add_qe_uri) &&
-       (NULL == list_it) )
-    GNUNET_SCHEDULER_shutdown ();
+  test_finished ();
 }
 
 
@@ -253,50 +322,44 @@ del_continuation (void *cls,
  * Process a record that was stored in the namestore.
  *
  * @param cls closure
- * @param zone_key public key of the zone
- * @param expire when does the corresponding block in the DHT expire (until
- *               when should we never do a DHT lookup for the same name again)?; 
- *               GNUNET_TIME_UNIT_ZERO_ABS if there are no records of any type in the namestore,
- *               or the expiration time of the block in the namestore (even if there are zero
- *               records matching the desired record type)
- * @param name name that is being mapped (at most 255 characters long)
- * @param rd_len number of entries in 'rd' array
+ * @param zone_key private key of the zone
+ * @param rname name that is being mapped (at most 255 characters long)
+ * @param rd_len number of entries in @a rd array
  * @param rd array of records with data to store
- * @param signature signature of the record block, NULL if signature is unavailable (i.e. 
- *        because the user queried for a particular record type only)
  */
 static void
 display_record (void *cls,
-               const struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded *zone_key,
-               struct GNUNET_TIME_Absolute expire,                         
-               const char *name,
+               const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone_key,
+               const char *rname,
                unsigned int rd_len,
-               const struct GNUNET_NAMESTORE_RecordData *rd,
-               const struct GNUNET_CRYPTO_RsaSignature *signature)
+               const struct GNUNET_GNSRECORD_Data *rd)
 {
   const char *typestring;
   char *s;
   unsigned int i;
-  const char *etime;
-  struct GNUNET_TIME_Absolute aex;
-  struct GNUNET_TIME_Relative rex;
+  const char *ets;
+  struct GNUNET_TIME_Absolute at;
+  struct GNUNET_TIME_Relative rt;
 
-  if (NULL == name)
+  if (NULL == rname)
   {
     list_it = NULL;
-    if ( (NULL == del_qe) &&
-        (NULL == add_qe_uri) &&
-        (NULL == add_qe) )
-      GNUNET_SCHEDULER_shutdown ();
+    test_finished ();
+    return;
+  }
+  if ( (NULL != name) &&
+       (0 != strcmp (name, rname)) )
+  {
+    GNUNET_NAMESTORE_zone_iterator_next (list_it);
     return;
   }
   FPRINTF (stdout,
           "%s:\n",
-          name);
+          rname);
   for (i=0;i<rd_len;i++)
   {
-    typestring = GNUNET_NAMESTORE_number_to_typename (rd[i].record_type);
-    s = GNUNET_NAMESTORE_value_to_string (rd[i].record_type,
+    typestring = GNUNET_GNSRECORD_number_to_typename (rd[i].record_type);
+    s = GNUNET_GNSRECORD_value_to_string (rd[i].record_type,
                                          rd[i].data,
                                          rd[i].data_size);
     if (NULL == s)
@@ -305,68 +368,166 @@ display_record (void *cls,
               (unsigned int) rd[i].record_type);
       continue;
     }
-    if (0 != (rd[i].flags & GNUNET_NAMESTORE_RF_RELATIVE_EXPIRATION))
+    if (0 != (rd[i].flags & GNUNET_GNSRECORD_RF_RELATIVE_EXPIRATION))
     {
-      rex.rel_value = rd[i].expiration_time;
-      etime = GNUNET_STRINGS_relative_time_to_string (rex, GNUNET_YES);
+      rt.rel_value_us = rd[i].expiration_time;
+      ets = GNUNET_STRINGS_relative_time_to_string (rt, GNUNET_YES);
     }
     else
     {
-      aex.abs_value = rd[i].expiration_time;
-      etime = GNUNET_STRINGS_absolute_time_to_string (aex);
+      at.abs_value_us = rd[i].expiration_time;
+      ets = GNUNET_STRINGS_absolute_time_to_string (at);
     }
-    FPRINTF (stdout, "\t%s: %s (%s %s)\n", typestring, s, 
-            (0 != (rd[i].flags & GNUNET_NAMESTORE_RF_RELATIVE_EXPIRATION)) 
-            ? _(/* what follows is relative expiration */ "for at least")
-            : _(/* what follows is absolute expiration */ "until"),
-            etime);
-    GNUNET_free (s);    
+    FPRINTF (stdout,
+            "\t%s: %s (%s)\n",
+            typestring,
+            s,
+             ets);
+    GNUNET_free (s);
   }
   FPRINTF (stdout, "%s", "\n");
   GNUNET_NAMESTORE_zone_iterator_next (list_it);
 }
 
+
+/**
+ * Function called once we are in sync in monitor mode.
+ *
+ * @param cls NULL
+ */
 static void
-key_generation_cb (void *cls,
-                   struct GNUNET_CRYPTO_RsaPrivateKey *pk,
-                   const char *emsg)
+sync_cb (void *cls)
 {
-  struct GNUNET_CONFIGURATION_Handle *cfg = cls;
-  struct GNUNET_CRYPTO_RsaPublicKeyBinaryEncoded pub;
-  uint32_t type;
-  void *data = NULL;
-  size_t data_size = 0;
-  struct GNUNET_TIME_Relative etime_rel;
-  struct GNUNET_TIME_Absolute etime_abs;
-  int etime_is_rel = GNUNET_SYSERR;
-  struct GNUNET_NAMESTORE_RecordData rd;
-
-  keygen = NULL;
-  if (NULL == pk)
+  FPRINTF (stdout, "%s", "Monitor is now in sync.\n");
+}
+
+
+/**
+ * We're storing a record; this function is given the existing record
+ * so that we can merge the information.
+ *
+ * @param cls closure, unused
+ * @param zone_key private key of the zone
+ * @param rec_name name that is being mapped (at most 255 characters long)
+ * @param rd_count number of entries in @a rd array
+ * @param rd array of records with data to store
+ */
+static void
+get_existing_record (void *cls,
+                    const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone_key,
+                    const char *rec_name,
+                    unsigned int rd_count,
+                    const struct GNUNET_GNSRECORD_Data *rd)
+{
+  struct GNUNET_GNSRECORD_Data rdn[rd_count + 1];
+  struct GNUNET_GNSRECORD_Data *rde;
+
+  if ( (NULL != zone_key) &&
+       (0 != strcmp (rec_name, name)) )
   {
-    GNUNET_SCHEDULER_shutdown ();
+    GNUNET_NAMESTORE_zone_iterator_next (add_zit);
     return;
   }
-  zone_pkey = pk;
+  memset (rdn, 0, sizeof (struct GNUNET_GNSRECORD_Data));
+  memcpy (&rdn[1], rd, rd_count * sizeof (struct GNUNET_GNSRECORD_Data));
+  /* FIXME: should add some logic to overwrite records if there
+     can only be one record of a particular type, and to check
+     if the combination of records is valid to begin with... */
+  rde = &rdn[0];
+  rde->data = data;
+  rde->data_size = data_size;
+  rde->record_type = type;
+  if (1 != shadow)
+    rde->flags |= GNUNET_GNSRECORD_RF_SHADOW_RECORD;
+  if (1 != public)
+    rde->flags |= GNUNET_GNSRECORD_RF_PRIVATE;
+  if (GNUNET_YES == etime_is_rel)
+  {
+    rde->expiration_time = etime_rel.rel_value_us;
+    rde->flags |= GNUNET_GNSRECORD_RF_RELATIVE_EXPIRATION;
+  }
+  else if (GNUNET_NO == etime_is_rel)
+    rde->expiration_time = etime_abs.abs_value_us;
+  else
+    rde->expiration_time = GNUNET_TIME_UNIT_FOREVER_ABS.abs_value_us;
+  GNUNET_assert (NULL != name);
+  add_qe = GNUNET_NAMESTORE_records_store (ns,
+                                          &zone_pkey,
+                                          name,
+                                          rd_count + 1,
+                                          rde,
+                                          &add_continuation,
+                                          &add_qe);
+  /* only cancel if we were not told that this
+     was the end of the iteration already */
+  if (NULL != rec_name)
+    GNUNET_NAMESTORE_zone_iteration_stop (add_zit);
+  add_zit = NULL;
+}
+
+
+/**
+ * Function called with the result of our attempt to obtain a name for a given
+ * public key.
+ *
+ * @param cls NULL
+ * @param zone private key of the zone; NULL on disconnect
+ * @param label label of the records; NULL on disconnect
+ * @param rd_count number of entries in @a rd array, 0 if label was deleted
+ * @param rd array of records with data to store
+ */
+static void
+handle_reverse_lookup (void *cls,
+                       const struct GNUNET_CRYPTO_EcdsaPrivateKey *zone,
+                       const char *label,
+                       unsigned int rd_count,
+                       const struct GNUNET_GNSRECORD_Data *rd)
+{
+  reverse_qe = NULL;
+  if (NULL == label)
+    FPRINTF (stdout,
+             "%s.zkey\n",
+             reverse_pkey);
+  else
+    FPRINTF (stdout,
+             "%s.gnu\n",
+             label);
+  test_finished ();
+}
+
 
-  if (! (add|del|list|(NULL != uri)))
+/**
+ * Function called with the result from the check if the namestore
+ * service is actually running.  If it is, we start the actual
+ * operation.
+ *
+ * @param cls closure with our configuration
+ * @param result #GNUNET_YES if the namestore service is running
+ */
+static void
+testservice_task (void *cls,
+                  int result)
+{
+  const struct GNUNET_CONFIGURATION_Handle *cfg = cls;
+  struct GNUNET_CRYPTO_EcdsaPublicKey pub;
+  struct GNUNET_GNSRECORD_Data rd;
+
+  if (GNUNET_YES != result)
   {
-    /* nothing more to be done */  
-    fprintf (stderr,
-             _("No options given\n"));
-    GNUNET_CRYPTO_rsa_key_free (zone_pkey);
-    zone_pkey = NULL;
-    return; 
+    FPRINTF (stderr, _("Service `%s' is not running\n"),
+            "namestore");
+    return;
   }
-  if (NULL == zone_pkey)
+  if (! (add|del|list|(NULL != uri)|(NULL != reverse_pkey)) )
   {
-    GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
-                _("Failed to read or create private zone key\n"));
+    /* nothing more to be done */
+    fprintf (stderr,
+             _("No options given\n"));
+    GNUNET_SCHEDULER_shutdown ();
     return;
   }
-  GNUNET_CRYPTO_rsa_key_get_public (zone_pkey,
+  GNUNET_CRYPTO_ecdsa_key_get_public (&zone_pkey,
                                     &pub);
-  GNUNET_CRYPTO_short_hash (&pub, sizeof (pub), &zone);
 
   ns = GNUNET_NAMESTORE_connect (cfg);
   if (NULL == ns)
@@ -375,140 +536,95 @@ key_generation_cb (void *cls,
                 _("Failed to connect to namestore\n"));
     return;
   }
-  GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_UNIT_FOREVER_REL,
-                                &do_shutdown, NULL);
-  if (NULL == typestring)
-    type = 0;
-  else
-    type = GNUNET_NAMESTORE_typename_to_number (typestring);
-  if (UINT32_MAX == type)
-  {
-    fprintf (stderr, _("Unsupported type `%s'\n"), typestring);
-    GNUNET_SCHEDULER_shutdown ();
-    ret = 1;
-    return;
-  }
-  if ((NULL == typestring) && (add | del))
-  {
-    fprintf (stderr,
-             _("Missing option `%s' for operation `%s'\n"),
-             "-t", _("add/del"));
-    GNUNET_SCHEDULER_shutdown ();
-    ret = 1;
-    return;     
-  }
-  if (NULL != value)
-  {
-    if (GNUNET_OK !=
-        GNUNET_NAMESTORE_string_to_value (type,
-                                          value,
-                                          &data,
-                                          &data_size))
-      {
-        fprintf (stderr, _("Value `%s' invalid for record type `%s'\n"),
-                 value,
-                 typestring);
-        GNUNET_SCHEDULER_shutdown ();
-        ret = 1;
-        return;
-      }
-  } else if (add | del)
-  {
-    fprintf (stderr,
-             _("Missing option `%s' for operation `%s'\n"),
-             "-V", _("add/del"));
-    ret = 1;   
-    GNUNET_SCHEDULER_shutdown ();
-    return;     
-  }
-  if (NULL != expirationstring)
+  if (add)
   {
-    if (0 == strcmp (expirationstring, "never"))
+    if (NULL == name)
     {
-      etime_abs = GNUNET_TIME_UNIT_FOREVER_ABS;
-      etime_is_rel = GNUNET_NO;
+      fprintf (stderr,
+               _("Missing option `%s' for operation `%s'\n"),
+               "-n", _("add"));
+      GNUNET_SCHEDULER_shutdown ();
+      ret = 1;
+      return;
     }
-    else if (GNUNET_OK ==
-             GNUNET_STRINGS_fancy_time_to_relative (expirationstring,
-                                                    &etime_rel))
+    if (NULL == typestring)
     {
-      etime_is_rel = GNUNET_YES;
+      fprintf (stderr,
+              _("Missing option `%s' for operation `%s'\n"),
+              "-t", _("add"));
+      GNUNET_SCHEDULER_shutdown ();
+      ret = 1;
+      return;
     }
-    else if (GNUNET_OK == 
-             GNUNET_STRINGS_fancy_time_to_absolute (expirationstring,
-                                                    &etime_abs))
+    type = GNUNET_GNSRECORD_typename_to_number (typestring);
+    if (UINT32_MAX == type)
     {
-      etime_is_rel = GNUNET_NO;
+      fprintf (stderr, _("Unsupported type `%s'\n"), typestring);
+      GNUNET_SCHEDULER_shutdown ();
+      ret = 1;
+      return;
     }
-    else
+    if (NULL == value)
     {
       fprintf (stderr,
-               _("Invalid time format `%s'\n"),
-               expirationstring);
-      GNUNET_SCHEDULER_shutdown ();
+              _("Missing option `%s' for operation `%s'\n"),
+              "-V", _("add"));
       ret = 1;
-      return;     
+      GNUNET_SCHEDULER_shutdown ();
+      return;
     }
-    if (etime_is_rel && del)
+    if (GNUNET_OK !=
+       GNUNET_GNSRECORD_string_to_value (type,
+                                         value,
+                                         &data,
+                                         &data_size))
     {
-      fprintf (stderr,
-               _("Deletion requires either absolute time, or no time at all. Got relative time `%s' instead.\n"),
-               expirationstring);
+      fprintf (stderr, _("Value `%s' invalid for record type `%s'\n"),
+              value,
+              typestring);
       GNUNET_SCHEDULER_shutdown ();
       ret = 1;
       return;
     }
-  } 
-  else if (add)
-  {
-    fprintf (stderr,
-             _("Missing option `%s' for operation `%s'\n"),
-             "-e", _("add"));
-    GNUNET_SCHEDULER_shutdown ();
-    ret = 1;    
-    return;     
-  }
-  memset (&rd, 0, sizeof (rd));
-  if (add)
-  {
-    if (NULL == name)
+    if (NULL == expirationstring)
     {
       fprintf (stderr,
-               _("Missing option `%s' for operation `%s'\n"),
-               "-n", _("add"));
+              _("Missing option `%s' for operation `%s'\n"),
+              "-e", _("add"));
       GNUNET_SCHEDULER_shutdown ();
-      ret = 1;    
-      return;     
+      ret = 1;
+      return;
     }
-    rd.data = data;
-    rd.data_size = data_size;
-    rd.record_type = type;
-    if (GNUNET_YES == etime_is_rel)
+    if (0 == strcmp (expirationstring, "never"))
     {
-      rd.expiration_time = etime_rel.rel_value;
-      rd.flags |= GNUNET_NAMESTORE_RF_RELATIVE_EXPIRATION;
+      etime_abs = GNUNET_TIME_UNIT_FOREVER_ABS;
+      etime_is_rel = GNUNET_NO;
+    }
+    else if (GNUNET_OK ==
+             GNUNET_STRINGS_fancy_time_to_relative (expirationstring,
+                                                    &etime_rel))
+    {
+      etime_is_rel = GNUNET_YES;
+    }
+    else if (GNUNET_OK ==
+             GNUNET_STRINGS_fancy_time_to_absolute (expirationstring,
+                                                    &etime_abs))
+    {
+      etime_is_rel = GNUNET_NO;
     }
-    else if (GNUNET_NO == etime_is_rel)
-      rd.expiration_time = etime_abs.abs_value;
     else
     {
       fprintf (stderr,
-               _("No valid expiration time for operation `%s'\n"),
-               _("add"));
+               _("Invalid time format `%s'\n"),
+               expirationstring);
       GNUNET_SCHEDULER_shutdown ();
       ret = 1;
       return;
     }
-    if (1 != nonauthority)
-      rd.flags |= GNUNET_NAMESTORE_RF_AUTHORITY;
-    if (1 != public)
-      rd.flags |= GNUNET_NAMESTORE_RF_PRIVATE;
-    add_qe = GNUNET_NAMESTORE_record_create (ns,
-                                             zone_pkey,
-                                             name,
-                                             &rd,
-                                             &add_continuation,
-                                             &add_qe);
+    add_zit = GNUNET_NAMESTORE_zone_iteration_start (ns,
+                                                    &zone_pkey,
+                                                    &get_existing_record,
+                                                    NULL);
   }
   if (del)
   {
@@ -519,120 +635,125 @@ key_generation_cb (void *cls,
                "-n", _("del"));
       GNUNET_SCHEDULER_shutdown ();
       ret = 1;
-      return;     
+      return;
     }
-    rd.data = data;
-    rd.data_size = data_size;
-    rd.record_type = type;
-    rd.expiration_time = 0;
-    if (!etime_is_rel)
-      rd.expiration_time = etime_abs.abs_value;
-    rd.flags = GNUNET_NAMESTORE_RF_AUTHORITY;
-    del_qe = GNUNET_NAMESTORE_record_remove (ns,
-                                             zone_pkey,
-                                             name,
-                                             &rd,
-                                             &del_continuation,
-                                             NULL);
+    del_qe = GNUNET_NAMESTORE_records_store (ns,
+                                            &zone_pkey,
+                                            name,
+                                            0, NULL,
+                                            &del_continuation,
+                                            NULL);
   }
   if (list)
   {
-    uint32_t must_not_flags = 0;
-
-    if (1 == nonauthority) /* List non-authority records */
-      must_not_flags |= GNUNET_NAMESTORE_RF_AUTHORITY;
-
-    if (1 == public)
-      must_not_flags |= GNUNET_NAMESTORE_RF_PRIVATE;
-
     list_it = GNUNET_NAMESTORE_zone_iteration_start (ns,
-                                                     &zone,
-                                                     GNUNET_NAMESTORE_RF_RELATIVE_EXPIRATION,
-                                                     must_not_flags,
+                                                     &zone_pkey,
                                                      &display_record,
                                                      NULL);
   }
+  if (NULL != reverse_pkey)
+  {
+    struct GNUNET_CRYPTO_EcdsaPublicKey pubkey;
+
+    if (GNUNET_OK !=
+        GNUNET_CRYPTO_ecdsa_public_key_from_string (reverse_pkey,
+                                                       strlen (reverse_pkey),
+                                                       &pubkey))
+    {
+      fprintf (stderr,
+               _("Invalid public key for reverse lookup `%s'\n"),
+               reverse_pkey);
+      GNUNET_SCHEDULER_shutdown ();
+    }
+    reverse_qe = GNUNET_NAMESTORE_zone_to_name (ns,
+                                                &zone_pkey,
+                                                &pubkey,
+                                                &handle_reverse_lookup,
+                                                NULL);
+  }
   if (NULL != uri)
   {
-    char sh[53];
-    char name[64];
-    struct GNUNET_CRYPTO_ShortHashCode sc;
+    char sh[105];
+    char sname[64];
+    struct GNUNET_CRYPTO_EcdsaPublicKey pkey;
 
     if ( (2 != (sscanf (uri,
-                        "gnunet://gns/%52s/%63s",
+                        "gnunet://gns/%104s/%63s",
                         sh,
-                        name)) ) ||
+                        sname)) ) ||
          (GNUNET_OK !=
-          GNUNET_CRYPTO_short_hash_from_string (sh, &sc)) )
+          GNUNET_CRYPTO_ecdsa_public_key_from_string (sh, strlen (sh), &pkey)) )
     {
-      fprintf (stderr, 
+      fprintf (stderr,
                _("Invalid URI `%s'\n"),
                uri);
       GNUNET_SCHEDULER_shutdown ();
       ret = 1;
       return;
     }
-    rd.data = &sc;
-    rd.data_size = sizeof (struct GNUNET_CRYPTO_ShortHashCode);
-    rd.record_type = GNUNET_NAMESTORE_TYPE_PKEY;
+    memset (&rd, 0, sizeof (rd));
+    rd.data = &pkey;
+    rd.data_size = sizeof (struct GNUNET_CRYPTO_EcdsaPublicKey);
+    rd.record_type = GNUNET_GNSRECORD_TYPE_PKEY;
     if (GNUNET_YES == etime_is_rel)
     {
-      rd.expiration_time = etime_rel.rel_value;
-      rd.flags |= GNUNET_NAMESTORE_RF_RELATIVE_EXPIRATION;
+      rd.expiration_time = etime_rel.rel_value_us;
+      rd.flags |= GNUNET_GNSRECORD_RF_RELATIVE_EXPIRATION;
     }
     else if (GNUNET_NO == etime_is_rel)
-      rd.expiration_time = etime_abs.abs_value;
-    else    
-      rd.expiration_time = GNUNET_TIME_UNIT_FOREVER_ABS.abs_value;
-    if (1 != nonauthority)
-      rd.flags |= GNUNET_NAMESTORE_RF_AUTHORITY;
-
-    add_qe_uri = GNUNET_NAMESTORE_record_create (ns,
-                                                 zone_pkey,
-                                                 name,
-                                                 &rd,
-                                                 &add_continuation,
-                                                 &add_qe_uri);
+      rd.expiration_time = etime_abs.abs_value_us;
+    else
+      rd.expiration_time = GNUNET_TIME_UNIT_FOREVER_ABS.abs_value_us;
+    if (1 != shadow)
+      rd.flags |= GNUNET_GNSRECORD_RF_SHADOW_RECORD;
+    add_qe_uri = GNUNET_NAMESTORE_records_store (ns,
+                                                &zone_pkey,
+                                                sname,
+                                                1,
+                                                &rd,
+                                                &add_continuation,
+                                                &add_qe_uri);
+  }
+  if (monitor)
+  {
+    zm = GNUNET_NAMESTORE_zone_monitor_start (cfg,
+                                             &zone_pkey,
+                                             &display_record,
+                                             &sync_cb,
+                                             NULL);
   }
-  GNUNET_free_non_null (data);
-
 }
 
 
+/**
+ * Callback invoked from identity service with ego information.
+ * An @a ego of NULL means the ego was not found.
+ *
+ * @param cls closure with the configuration
+ * @param ego an ego known to identity service, or NULL
+ */
 static void
-testservice_task (void *cls,
-                  const struct GNUNET_SCHEDULER_TaskContext *tc)
+identity_cb (void *cls,
+            const struct GNUNET_IDENTITY_Ego *ego)
 {
-  struct GNUNET_CONFIGURATION_Handle *cfg = cls;
+  const struct GNUNET_CONFIGURATION_Handle *cfg = cls;
 
-  if (0 != (tc->reason & GNUNET_SCHEDULER_REASON_TIMEOUT))
+  el = NULL;
+  if (NULL == ego)
   {
-      FPRINTF (stderr, _("Service `%s' is not running\n"), "namestore");
-      return;
-  }
-
-
-  if (NULL == keyfile)
-  {
-    if (GNUNET_OK != GNUNET_CONFIGURATION_get_value_filename (cfg, "gns",
-                                                              "ZONEKEY", &keyfile))
-    {
-      GNUNET_log_config_missing (GNUNET_ERROR_TYPE_ERROR,
-                                "gns", "ZONEKEY");
-      return;
-    }
     fprintf (stderr,
-             _("Using default zone file `%s'\n"),
-             keyfile);
-  }
-  keygen = GNUNET_CRYPTO_rsa_key_create_start (keyfile, key_generation_cb, cfg);
-  GNUNET_free (keyfile);
-  keyfile = NULL;
-  if (NULL == keygen)
-  {
+            _("Ego `%s' not known to identity service\n"),
+            ego_name);
     GNUNET_SCHEDULER_shutdown ();
-    ret = 1;
+    return;
   }
+  zone_pkey = *GNUNET_IDENTITY_ego_get_private_key (ego);
+  GNUNET_free (ego_name);
+  ego_name = NULL;
+  GNUNET_CLIENT_service_test ("namestore", cfg,
+                             GNUNET_TIME_UNIT_SECONDS,
+                             &testservice_task,
+                             (void *) cfg);
 }
 
 
@@ -648,14 +769,20 @@ static void
 run (void *cls, char *const *args, const char *cfgfile,
      const struct GNUNET_CONFIGURATION_Handle *cfg)
 {
-
+  if (NULL == ego_name)
+  {
+    fprintf (stderr,
+            _("You must specify which zone should be accessed\n"));
+    return;
+  }
   if ( (NULL != args[0]) && (NULL == uri) )
     uri = GNUNET_strdup (args[0]);
-
-  GNUNET_CLIENT_service_test ("namestore", cfg,
-      GNUNET_TIME_UNIT_SECONDS,
-      &testservice_task,
-      (void *) cfg);
+  GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_UNIT_FOREVER_REL,
+                                &do_shutdown, NULL);
+  el = GNUNET_IDENTITY_ego_lookup (cfg,
+                                  ego_name,
+                                  &identity_cb,
+                                  (void *) cfg);
 }
 
 
@@ -669,7 +796,6 @@ run (void *cls, char *const *args, const char *cfgfile,
 int
 main (int argc, char *const *argv)
 {
-  nonauthority = -1;
   public = -1;
 
   static const struct GNUNET_GETOPT_CommandLineOption options[] = {
@@ -678,34 +804,40 @@ main (int argc, char *const *argv)
      &GNUNET_GETOPT_set_one, &add},
     {'d', "delete", NULL,
      gettext_noop ("delete record"), 0,
-     &GNUNET_GETOPT_set_one, &del},   
+     &GNUNET_GETOPT_set_one, &del},
     {'D', "display", NULL,
      gettext_noop ("display records"), 0,
-     &GNUNET_GETOPT_set_one, &list},   
+     &GNUNET_GETOPT_set_one, &list},
     {'e', "expiration", "TIME",
      gettext_noop ("expiration time for record to use (for adding only), \"never\" is possible"), 1,
-     &GNUNET_GETOPT_set_string, &expirationstring},   
+     &GNUNET_GETOPT_set_string, &expirationstring},
+    {'m', "monitor", NULL,
+     gettext_noop ("monitor changes in the namestore"), 0,
+     &GNUNET_GETOPT_set_one, &monitor},
     {'n', "name", "NAME",
      gettext_noop ("name of the record to add/delete/display"), 1,
-     &GNUNET_GETOPT_set_string, &name},   
+     &GNUNET_GETOPT_set_string, &name},
+    {'r', "reverse", "PKEY",
+     gettext_noop ("determine our name for the given PKEY"), 1,
+     &GNUNET_GETOPT_set_string, &reverse_pkey},
     {'t', "type", "TYPE",
      gettext_noop ("type of the record to add/delete/display"), 1,
-     &GNUNET_GETOPT_set_string, &typestring},   
+     &GNUNET_GETOPT_set_string, &typestring},
     {'u', "uri", "URI",
      gettext_noop ("URI to import into our zone"), 1,
-     &GNUNET_GETOPT_set_string, &uri},   
+     &GNUNET_GETOPT_set_string, &uri},
     {'V', "value", "VALUE",
      gettext_noop ("value of the record to add/delete"), 1,
-     &GNUNET_GETOPT_set_string, &value},   
+     &GNUNET_GETOPT_set_string, &value},
     {'p', "public", NULL,
      gettext_noop ("create or list public record"), 0,
      &GNUNET_GETOPT_set_one, &public},
-    {'N', "non-authority", NULL,
-     gettext_noop ("create or list non-authority record"), 0,
-     &GNUNET_GETOPT_set_one, &nonauthority},
-    {'z', "zonekey", "FILENAME",
-     gettext_noop ("filename with the zone key"), 1,
-     &GNUNET_GETOPT_set_string, &keyfile},   
+    {'s', "shadow", NULL,
+     gettext_noop ("create shadow record (only valid if all other records of the same type have expired"), 0,
+     &GNUNET_GETOPT_set_one, &shadow},
+    {'z', "zone", "EGO",
+     gettext_noop ("name of the ego controlling the zone"), 1,
+     &GNUNET_GETOPT_set_string, &ego_name},
     GNUNET_GETOPT_OPTION_END
   };
 
@@ -715,14 +847,16 @@ main (int argc, char *const *argv)
   GNUNET_log_setup ("gnunet-namestore", "WARNING", NULL);
   if (GNUNET_OK !=
       GNUNET_PROGRAM_run (argc, argv, "gnunet-namestore",
-                         _("GNUnet zone manipulation tool"), 
+                         _("GNUnet zone manipulation tool"),
                          options,
                          &run, NULL))
   {
     GNUNET_free ((void*) argv);
+    GNUNET_CRYPTO_ecdsa_key_clear (&zone_pkey);
     return 1;
   }
   GNUNET_free ((void*) argv);
+  GNUNET_CRYPTO_ecdsa_key_clear (&zone_pkey);
   return ret;
 }