<!--$Id: db_verify.so,v 10.11 2006/10/05 01:06:08 bostic Exp $-->
<!--Copyright (c) 1997,2008 Oracle. All rights reserved.-->
<!--See the file LICENSE for redistribution information.-->
<html>
<head>
<title>Berkeley DB: db_verify</title>
<meta name="description" content="Berkeley DB: An embedded database programmatic toolkit.">
<meta name="keywords" content="embedded,database,programmatic,toolkit,btree,hash,hashing,transaction,transactions,locking,logging,access method,access methods,Java,C,C++">
</head>
<body bgcolor=white>
<table width="100%"><tr valign=top>
<td>
<b>db_verify</b>
</td>
</tr></table>
<hr size=1 noshade>
<tt>
<b><pre>db_verify [<b>-NoqV</b>] [<b>-h home</b>] [<b>-P password</b>] file ...</pre></b>
<b>Description</b>
<a name="2"><!--meow--></a><a name="3"><!--meow--></a>
<p>The db_verify utility verifies the structure of one or more
files and the databases they contain.</p>
<p>The options are as follows:</p>
<br>
<b>-h</b><ul compact><li>Specify a home directory for the database environment; by
default, the current working directory is used.</ul>
<b>-o</b><ul compact><li>Skip the database checks for btree and duplicate sort order and for
hashing.
<p>If the file being verified contains databases with non-default
comparison or hashing configurations, calling the db_verify
utility without the <b>-o</b> flag will usually return failure. The
<b>-o</b> flag causes db_verify to ignore database sort or
hash ordering and allows db_verify to be used on these files.
To fully verify these files, verify them explicitly using the
<a href="../../db4-devel-4.7.25/api_c/db_verify.html">DB->verify</a> method, after configuring the correct comparison or hashing
functions.</p></ul>
<b>-N</b><ul compact><li>Do not acquire shared region mutexes while running. Other problems,
such as potentially fatal errors in Berkeley DB, will be ignored as well.
This option is intended only for debugging errors, and should not be
used under any other circumstances.</ul>
<b>-P</b><ul compact><li>Specify an environment password. Although Berkeley DB utilities overwrite
password strings as soon as possible, be aware there may be a window of
vulnerability on systems where unprivileged users can see command-line
arguments or where utilities are not able to overwrite the memory
containing the command-line arguments.</ul>
<b>-q</b><ul compact><li>Suppress the printing of any error descriptions, simply exit success or
failure.</ul>
<b>-V</b><ul compact><li>Write the library version number to the standard output, and exit.</ul>
<br>
<p><b>The db_verify utility does not perform any locking, even in
Berkeley DB environments that are configured with a locking subsystem. As
such, it should only be used on files that are not being modified by
another thread of control.</b></p>
<p>The db_verify utility may be used with a Berkeley DB environment (as described for the
<b>-h</b> option, the environment variable <b>DB_HOME</b>, or
because the utility was run in a directory containing a Berkeley DB
environment). In order to avoid environment corruption when using a
Berkeley DB environment, db_verify should always be given the chance to
detach from the environment and exit gracefully. To cause db_verify
to release all environment resources and exit cleanly, send it an
interrupt signal (SIGINT).</p>
<p>The db_verify utility exits 0 on success, and >0 if an error occurs.</p>
<br><b>Environment Variables</b>
<br>
<b>DB_HOME</b><ul compact><li>If the <b>-h</b> option is not specified and the environment variable
DB_HOME is set, it is used as the path of the database home, as described
in <a href="../../db4-devel-4.7.25/api_c/env_open.html">DB_ENV->open</a>.</ul>
<br>
</tt>
<p><font size=1>Copyright (c) 1996,2008 Oracle. All rights reserved.</font>
</body>
</html>
Copyright 2K16 - 2K18 Indonesian Hacker Rulez