postgresql/src/backend/libpq
Tom Lane 4f44aa04b5 Major overhaul of large-object implementation, by Denis Perchine with
kibitzing from Tom Lane.  Large objects are now all stored in a single
system relation "pg_largeobject" --- no more xinv or xinx files, no more
relkind 'l'.  This should offer substantial performance improvement for
large numbers of LOs, since there won't be directory bloat anymore.
It'll also fix problems like running out of locktable space when you
access thousands of LOs in one transaction.
Also clean up cruft in read/write routines.  LOs with "holes" in them
(never-written byte ranges) now work just like Unix files with holes do:
a hole reads as zeroes but doesn't occupy storage space.
INITDB forced!
2000-10-24 01:38:44 +00:00
..
auth.c Make the location of the Kerberos server key file run time configurable 2000-08-25 10:00:35 +00:00
be-fsstubs.c Major overhaul of large-object implementation, by Denis Perchine with 2000-10-24 01:38:44 +00:00
crypt.c Clean up callers of AllocateFile and BasicOpenFile to ensure that 2000-08-27 21:50:18 +00:00
hba.c Clean up callers of AllocateFile and BasicOpenFile to ensure that 2000-08-27 21:50:18 +00:00
Makefile Make the location of the Kerberos server key file run time configurable 2000-08-25 10:00:35 +00:00
password.c Clean up callers of AllocateFile and BasicOpenFile to ensure that 2000-08-27 21:50:18 +00:00
pg_hba.conf.sample Update pg_hba.conf with more examples 2000-05-30 17:39:56 +00:00
pg_ident.conf.sample
pqcomm.c Back out xti.h portion of the patch. 2000-10-23 14:50:44 +00:00
pqformat.c Remove a bunch of unused configure tests, in particular cases where 2000-07-12 22:59:15 +00:00
pqpacket.c New diff that now covers the entire tree. Applying this gets postgresql 2000-10-03 03:11:26 +00:00
pqsignal.c Add SIGFPE to list of signals never to block. #ifdef all signals in 2000-06-29 02:17:42 +00:00
README.SSL Add README.SSL 1999-09-27 03:16:09 +00:00
util.c Remove long-dead support for invoking queries from dynamically loaded 2000-07-08 03:04:41 +00:00

>From the servers perspective:


  Receives StartupPacket
           |
           |
 (Is SSL_NEGOTIATE_CODE?) -----------  Normal startup
           |                  No
           |
           | Yes
           |
           |
 (Server compiled with USE_SSL?) ------- Send 'N'
           |                       No        |
           |                                 |
           | Yes                         Normal startup
           |
           |
        Send 'S'
           |
           |
      Establish SSL
           |
           |
      Normal startup
     




>From the clients perspective (v6.6 client _with_ SSL):


      Connect
         |
         |
  Send packet with SSL_NEGOTIATE_CODE
         |
         |
  Receive single char  ------- 'S' -------- Establish SSL
         |                                       |
         | '<else>'                              |
         |                                  Normal startup
         |
         |
   Is it 'E' for error  ------------------- Retry connection
         |                  Yes             without SSL
         | No
         |
   Is it 'N' for normal ------------------- Normal startup
         |                  Yes
         |
   Fail with unknown