ndbm man page on Xenix

Man page or keyword search:  
man Server   1130 pages
apropos Keyword Search (all sections)
Output format
Xenix logo
[printable version]

NDBM(3)								       NDBM(3)

NAME
       dbm_open,  dbm_close,  dbm_fetch,  dbm_store, dbm_delete, dbm_firstkey,
       dbm_nextkey, dbm_error, dbm_clearerr - data base subroutines

SYNOPSIS
       #include <ndbm.h>

       typedef struct {
	   char *dptr;
	   int dsize;
       } datum;

       DBM *dbm_open(file, flags, mode)
	   char *file;
	   int flags, mode;

       void dbm_close(db)
	   DBM *db;

       datum dbm_fetch(db, key)
	   DBM *db;
	   datum key;

       int dbm_store(db, key, content, flags)
	   DBM *db;
	   datum key, content;
	   int flags;

       int dbm_delete(db, key)
	   DBM *db;
	   datum key;

       datum dbm_firstkey(db)
	   DBM *db;

       datum dbm_nextkey(db)
	   DBM *db;

       int dbm_error(db)
	   DBM *db;

       int dbm_clearerr(db)
	   DBM *db;

DESCRIPTION
       These functions maintain key/content pairs in a data base.   The	 func‐
       tions  will  handle  very  large	 (a billion blocks) databases and will
       access a keyed item in one or two file system accesses.	 This  package
       replaces the earlier dbm(3x) library, which managed only a single data‐
       base.

       Keys and contents are described by the datum typedef.  A	 datum	speci‐
       fies  a	string	of  dsize  bytes pointed to by dptr.  Arbitrary binary
       data, as well as normal ASCII strings, are allowed.  The data  base  is
       stored  in two files.  One file is a directory containing a bit map and
       has `.dir' as its suffix.  The second file contains all	data  and  has
       `.pag' as its suffix.

       Before a database can be accessed, it must be opened by dbm_open.  This
       will open and/or create the files file.dir and  file.pag	 depending  on
       the flags parameter (see open(2)).

       Once  open,  the	 data  stored under a key is accessed by dbm_fetch and
       data is placed under a key by dbm_store.	 The flags field can be either
       DBM_INSERT  or  DBM_REPLACE.   DBM_INSERT  will only insert new entries
       into the database and will not change an existing entry with  the  same
       key.   DBM_REPLACE  will	 replace  an existing entry if it has the same
       key.  A key (and its associated contents) is deleted by dbm_delete.   A
       linear  pass  through all keys in a database may be made, in an (appar‐
       ently)  random  order,  by  use	of   dbm_firstkey   and	  dbm_nextkey.
       Dbm_firstkey  will  return  the first key in the database.  Dbm_nextkey
       will return the next key in the database.  This code will traverse  the
       data base:

	      for  (key	 =  dbm_firstkey(db); key.dptr != NULL; key = dbm_nex‐
	      tkey(db))

       Dbm_error returns non-zero when an error has occurred reading or	 writ‐
       ing the database.  Dbm_clearerr resets the error condition on the named
       database.

DIAGNOSTICS
       All functions that return an int indicate errors with negative  values.
       A  zero	return	indicates  ok.	 Routines that return a datum indicate
       errors with a null (0) dptr.  If dbm_store called with a flags value of
       DBM_INSERT finds an existing entry with the same key it returns 1.

BUGS
       The  `.pag'  file will contain holes so that its apparent size is about
       four times its actual content.  Older UNIX systems may create real file
       blocks  for  these holes when touched.  These files cannot be copied by
       normal means (cp, cat, tp, tar, ar) without filling in the holes.

       Dptr pointers returned by these subroutines point into  static  storage
       that  is	 changed by subsequent calls.  This storage is not necessarily
       aligned; stored ``longs'', for example, should be copied to a  properly
       aligned block of memory before being accessed.

       The sum of the sizes of a key/content pair must not exceed the internal
       block size (currently 1024 bytes).  Moreover all key/content pairs that
       hash  together  must  fit  on a single block.  Dbm_store will return an
       error in the event that a disk block fills with inseparable data.

       Dbm_delete does not physically reclaim file  space,  although  it  does
       make it available for reuse.

       The  order of keys presented by dbm_firstkey and dbm_nextkey depends on
       a hashing function, not on anything interesting.

SEE ALSO
       dbm(3X)

4.3 Berkeley Distribution	January 2, 1990			       NDBM(3)
[top]
                             _         _         _ 
                            | |       | |       | |     
                            | |       | |       | |     
                         __ | | __ __ | | __ __ | | __  
                         \ \| |/ / \ \| |/ / \ \| |/ /  
                          \ \ / /   \ \ / /   \ \ / /   
                           \   /     \   /     \   /    
                            \_/       \_/       \_/ 
More information is available in HTML format for server Xenix

List of man pages available for Xenix

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net