Berkeley DB is an embeddable database system that supports keyed access to data. The software is distributed in source code form, and developers can compile and link the source code into a single library for inclusion directly in their applications. Developers may choose to store data in any of several different storage structures to satisfy the requirements of a particular application. In database terminology, these storage structures and the code that operates on them are called access methods. The library includes support for the following access methods: * B+tree: Stores keys in sorted order, using either a programmer-supplied ordering function or a default function that does lexicographical ordering of keys. Applications may perform equality or range searches. * Hashing: Stores records in a hash table for fast searches based on strict equality. Extended Linear Hashing modifies the hash function used by the table as new records are inserted, in order to keep buckets underfull in the steady state. * Fixed and Variable-Length Records: Stores fixed- or variable-length records in sequential order. Record numbers may be immutable or mutable, i.e., permitting new records to be inserted between existing records or requiring that new records be added only at the end of the database.
OS | Architecture | Version |
---|---|---|
NetBSD 10.0 | aarch64 | db5-5.3.28nb2.tgz |
NetBSD 10.0 | aarch64 | db5-5.3.28nb2.tgz |
NetBSD 10.0 | aarch64eb | db5-5.3.28nb2.tgz |
NetBSD 10.0 | aarch64eb | db5-5.3.28nb2.tgz |
NetBSD 10.0 | alpha | db5-5.3.28nb2.tgz |
NetBSD 10.0 | alpha | db5-5.3.28nb2.tgz |
NetBSD 10.0 | earmv4 | db5-5.3.28nb2.tgz |
NetBSD 10.0 | earmv4 | db5-5.3.28nb2.tgz |
NetBSD 10.0 | earmv6hf | db5-5.3.28nb2.tgz |
NetBSD 10.0 | earmv6hf | db5-5.3.28nb2.tgz |
NetBSD 10.0 | earmv6hf | db5-5.3.28nb2.tgz |
NetBSD 10.0 | earmv7hf | db5-5.3.28nb2.tgz |
NetBSD 10.0 | earmv7hf | db5-5.3.28nb2.tgz |
NetBSD 10.0 | earmv7hf | db5-5.3.28nb2.tgz |
NetBSD 10.0 | i386 | db5-5.3.28nb2.tgz |
NetBSD 10.0 | i386 | db5-5.3.28nb2.tgz |
NetBSD 10.0 | m68k | db5-5.3.28nb2.tgz |
NetBSD 10.0 | m68k | db5-5.3.28nb2.tgz |
NetBSD 10.0 | m68k | db5-5.3.28nb2.tgz |
NetBSD 10.0 | m68k | db5-5.3.28nb2.tgz |
NetBSD 10.0 | mips64eb | db5-5.3.28nb2.tgz |
NetBSD 10.0 | mips64eb | db5-5.3.28nb2.tgz |
NetBSD 10.0 | powerpc | db5-5.3.28nb2.tgz |
NetBSD 10.0 | powerpc | db5-5.3.28nb2.tgz |
NetBSD 10.0 | powerpc | db5-5.3.28nb2.tgz |
NetBSD 10.0 | sparc64 | db5-5.3.28nb2.tgz |
NetBSD 10.0 | sparc64 | db5-5.3.28nb2.tgz |
NetBSD 10.0 | x86_64 | db5-5.3.28nb2.tgz |
NetBSD 10.0 | x86_64 | db5-5.3.28nb2.tgz |
NetBSD 9.0 | aarch64 | db5-5.3.28nb2.tgz |
NetBSD 9.0 | aarch64 | db5-5.3.28nb2.tgz |
NetBSD 9.0 | alpha | db5-5.3.28nb2.tgz |
NetBSD 9.0 | alpha | db5-5.3.28nb2.tgz |
NetBSD 9.0 | earmv4 | db5-5.3.28nb2.tgz |
NetBSD 9.0 | earmv4 | db5-5.3.28nb2.tgz |
NetBSD 9.0 | earmv6hf | db5-5.3.28nb2.tgz |
NetBSD 9.0 | earmv6hf | db5-5.3.28nb2.tgz |
NetBSD 9.0 | earmv6hf | db5-5.3.28nb2.tgz |
NetBSD 9.0 | earmv7hf | db5-5.3.28nb2.tgz |
NetBSD 9.0 | earmv7hf | db5-5.3.28nb2.tgz |
NetBSD 9.0 | earmv7hf | db5-5.3.28nb2.tgz |
NetBSD 9.0 | i386 | db5-5.3.28nb2.tgz |
NetBSD 9.0 | i386 | db5-5.3.28nb2.tgz |
NetBSD 9.0 | m68k | db5-5.3.28nb2.tgz |
NetBSD 9.0 | m68k | db5-5.3.28nb2.tgz |
NetBSD 9.0 | m68k | db5-5.3.28nb2.tgz |
NetBSD 9.0 | powerpc | db5-5.3.28nb2.tgz |
NetBSD 9.0 | powerpc | db5-5.3.28nb2.tgz |
NetBSD 9.0 | powerpc | db5-5.3.28nb2.tgz |
NetBSD 9.0 | sparc64 | db5-5.3.28nb2.tgz |
NetBSD 9.0 | sparc64 | db5-5.3.28nb2.tgz |
NetBSD 9.0 | x86_64 | db5-5.3.28nb2.tgz |
NetBSD 9.0 | x86_64 | db5-5.3.28nb2.tgz |
NetBSD 9.3 | x86_64 | db5-5.3.28nb2.tgz |
Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.
The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.
Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.
Problem reports, updates or suggestions for this package should be reported with send-pr.