How To Corrupt An SQLite Database File
(howtocorrupt.html)
8.7. Boundary value error in the secondary journals used by nested transactions
... The fuzzer found a
failure in an assert() statement that is used
to help verify the internal state of the secondary journal. The bug was a
sufficiently obscure corner-case that it might have gone unnoticed for many
years, had ...
|
JSON Functions And Operators
(json1.html)
... In
that case, the array element selected is the N-th element
of the array, starting with zero on the left.
The arrayindex can also be of the form "#-N"
in which case the element selected is the N-th ...
|
The SQLite Amalgamation
(amalgamation.html)
... Though the various extensions are included in the
"sqlite3.c" amalgamation file, they are disabled using #ifdef statements.
Activate the extensions using compile-time options like:
-DSQLITE_ENABLE_FTS3
-DSQLITE_ENABLE_FTS5
-DSQLITE_ENABLE_RTREE
-DSQLITE_ENABLE_DBSTAT_VTAB
-DSQLITE_ENABLE_RBU
-DSQLITE_ENABLE_SESSION
The amalgamation contains everything you need to integrate ...
|
The SQLite OS Interface or "VFS"
(vfs.html)
... The byte code generated by the top three
layers is a prepared statement.
The Virtual Machine module is responsible for running the SQL statement
byte code. The B-Tree module organizes a database file into multiple
key/value stores with ...
|
SQLite's Built-in printf()
(printf.html)
2.1. Substitution Types
... Lower-case hexadecimal is used for %x and upper-case is used
for %X
o
The argument is an integer which is displayed in octal.
s, z
The argument is either a zero-terminated string that is displayed,
or a ...
|
Atomic Commit In SQLite
(atomiccommit.html)
3.2. Acquiring A Read Lock
... Even if it is just
appending new data, SQLite still has to read in the database
schema from the "sqlite_schema" table so that it can know
how to parse the INSERT statements and discover where in the
database file the ...
|
The Virtual Database Engine of SQLite
(vdbe.html)
... UPDATE And DELETE Statements
The UPDATE and DELETE statements are coded using a template
that is very similar to the SELECT statement template. The main
difference, of course, is that the end action is to modify the
database rather than ...
|
SQLite Changes From Version 3.4.2 To 3.5.0
(34to35.html)
... In that case, the application must
register at least one VFS prior to calling sqlite3_open().
This is the approach that embedded applications should use.
Rather than modifying the SQLite source to insert an alternative
OS layer as was done in ...
|
SQLite Version 3 Overview
(version3.html)
... Integer values such as the length of key and data are stored using
a variable-length encoding so that only one or two bytes are required to
store the most common cases but up to 64-bits of information can ...
|
SQLite Consortium Agreement
(consortium_agreement-20071201.html)
... for public release, make
the SQLite source code and documentation
publicly available as downloadable files
and make a public statement ceding all intellectual
property rights, including but not limited to copyright
and patent rights, in the SQLite source code and ...
|
Page generated by FTS5 in about 170.38 ms.