.\" Copyright (c) 1985 Regents of the University of California.
.\" All rights reserved. The Berkeley software License Agreement
.\" specifies the terms and conditions for redistribution.
.\" @(#)ndbm.3 6.5 (Berkeley) %G%
dbm_open, dbm_close, dbm_fetch, dbm_store, dbm_delete, dbm_firstkey, dbm_nextkey, dbm_error, dbm_clearerr \- data base subroutines
DBM *dbm_open(file, flags, mode)
int dbm_store(db, key, content, flags)
These functions maintain key/content pairs in a data base.
The functions will handle very large (a billion blocks)
databases and will access a keyed item in one or two file system accesses.
This package replaces the earlier
library, which managed only a single database.
Arbitrary binary data, as well as normal ASCII strings, are allowed.
The data base is stored in two files.
One file is a directory containing a bit map and has `.dir' as its suffix.
The second file contains all data and has `.pag' as its suffix.
Before a database can be accessed, it must be opened by
This will open and/or create the files
depending on the flags parameter (see
Once open, the data stored under a key is accessed by
and data is placed under a key by
will only insert new entries into the database and will not
change an existing entry with the same key.
will replace an existing entry if it has the same key.
A key (and its associated contents) is deleted by
A linear pass through all keys in a database may be made,
in an (apparently) random order, by use of
will return the first key in the database.
will return the next key in the database.
This code will traverse the data base:
(key = dbm_firstkey(db); key.dptr != NULL; key = dbm_nextkey(db))
returns non-zero when an error has occured reading or writing the database.
resets the error condition on the named database.
All functions that return an
indicate errors with negative values. A zero return indicates ok.
indicate errors with a null (0)
finds an existing entry with the same key
The `.pag' file will contain holes so that its apparent size is about
four times its actual content. Older UNIX systems may create real
file blocks for these holes when touched. These files cannot be copied
by normal means (cp, cat, tp, tar, ar) without filling in the holes.
pointers returned by these subroutines point into static storage
that is changed by subsequent calls.
The sum of the sizes of a key/content pair must not exceed
the internal block size (currently 4096 bytes).
Moreover all key/content pairs that hash together must fit on a single block.
will return an error in the event that a disk block fills with inseparable data.
does not physically reclaim file space,
although it does make it available for reuse.
The order of keys presented by
depends on a hashing function, not on anything interesting.