Lines Matching refs:DBM
45 * Because this code hacks into DBM underneath its API it can't use the N2L
47 * and has knowledge of shim internals. While copying the DBM files it does
74 datum mydbm_topkey(DBM *db, datum okey);
190 shim_dbm_close((DBM *)m.map);
199 shim_dbm_close((DBM *)m.map);
215 val = shim_dbm_fetch((DBM *)m.map, key);
221 shim_dbm_close((DBM *)m.map);
228 m.key = shim_dbm_firstkey((DBM *)m.map);
236 shim_dbm_close((DBM *)m.map);
365 m->key = shim_dbm_do_nextkey((DBM *)m->map, m->key)) {
378 m->key = shim_dbm_do_nextkey((DBM *)m->map, m->key);
389 mydbm_topkey(DBM *db, datum okey)