char *regexp = NULL;
krb5_keyblock *act_mkey;
krb5_keylist_node *master_keylist = krb5_db_mkey_list_alias(util_context);
+ krb5_flags iterflags;
while ((optchar = getopt(argc, argv, "fnv")) != -1) {
switch (optchar) {
if (!data.dry_run) {
/* Grab a write lock so we don't have to upgrade to a write lock and
* reopen the DB while iterating. */
- retval = krb5_db_lock(util_context, KRB5_DB_LOCKMODE_EXCLUSIVE);
- if (retval != 0 && retval != KRB5_PLUGIN_OP_NOTSUPP) {
- com_err(progname, retval, _("trying to lock database"));
- exit_status++;
- }
+ iterflags = KRB5_DB_ITER_WRITE;
}
retval = krb5_db_iterate(util_context, name_pattern,
- update_princ_encryption_1, &data, 0);
+ update_princ_encryption_1, &data, iterflags);
/* If exit_status is set, then update_princ_encryption_1 already
printed a message. */
if (retval != 0 && exit_status == 0) {
com_err(progname, retval, _("trying to process principal database"));
exit_status++;
}
- if (!data.dry_run)
- (void)krb5_db_unlock(util_context);
(void) krb5_db_fini(util_context);
if (data.dry_run) {
printf(_("%u principals processed: %u would be updated, %u already "