This section describes the message flow.  There are four different
   types of flows depending on the state of the connection: start-up,
   query, function call, and termination.  There are also special
   provisions for notification responses and command cancellation,
   which can occur at any time after the start-up phase.
  
    Initially, the frontend sends a StartupPacket.  The server uses
    this info and the contents of the pg_hba.conf
    file to determine what authentication method the frontend must
    use.  The server then responds with one of the following messages:
    
- ErrorResponse
-         The server then immediately closes the connection.
        
- AuthenticationOk
-         The authentication exchange is completed.
        
- AuthenticationKerberosV4
-         The frontend must then take part in a Kerberos V4
        authentication dialog (not described here, part of the
        Kerberos specification) with the server.  If this is
        successful, the server responds with an AuthenticationOk,
        otherwise it responds with an ErrorResponse.
        
- AuthenticationKerberosV5
-         The frontend must then take part in a Kerberos V5
        authentication dialog (not described here, part of the
        Kerberos specification) with the server.  If this is
        successful, the server responds with an AuthenticationOk,
        otherwise it responds with an ErrorResponse.
        
- AuthenticationCleartextPassword
-         The frontend must then send a PasswordPacket containing the
	password in clear-text form.  If
        this is the correct password, the server responds with an
        AuthenticationOk, otherwise it responds with an ErrorResponse.
        
- AuthenticationCryptPassword
-         The frontend must then send a PasswordPacket containing the
	password encrypted via crypt(3), using the 2-character salt
	specified in the AuthenticationCryptPassword packet.  If
        this is the correct password, the server responds with an
        AuthenticationOk, otherwise it responds with an ErrorResponse.
        
- AuthenticationMD5Password
-         The frontend must then send a PasswordPacket containing the
	password encrypted via MD5, using the 4-character salt
	specified in the AuthenticationMD5Password packet.  If
        this is the correct password, the server responds with an
        AuthenticationOk, otherwise it responds with an ErrorResponse.
        
- AuthenticationSCMCredential
-         This method is only possible for local Unix-domain connections
	on platforms that support SCM credential messages.  The frontend
	must issue an SCM credential message and then send a single data
	byte.  (The contents of the data byte are uninteresting; it's
	only used to ensure that the server waits long enough to receive
	the credential message.)  If the credential is acceptable,
	the server responds with an
        AuthenticationOk, otherwise it responds with an ErrorResponse.
        
   
    If the frontend does not support the authentication method
    requested by the server, then it should immediately close the
    connection.
   
    After having received AuthenticationOk, the frontend should wait
    for further messages from the server.  The possible messages from
    the backend in this phase are:
    
- BackendKeyData
-         This message provides secret-key data that the frontend must
        save if it wants to be able to issue cancel requests later.
        The frontend should not respond to this message, but should
        continue listening for a ReadyForQuery message.
        
- ReadyForQuery
-         Start-up is completed.  The frontend may now issue query or
        function call messages.
        
- ErrorResponse
-         Start-up failed.  The connection is closed after sending this
        message.
        
- NoticeResponse
-         A warning message has been issued.  The frontend should
        display the message but continue listening for ReadyForQuery
        or ErrorResponse.
        
   
    The ReadyForQuery message is the same one that the backend will
    issue after each query cycle.  Depending on the coding needs of
    the frontend, it is reasonable to consider ReadyForQuery as
    starting a query cycle (and then BackendKeyData indicates
    successful conclusion of the start-up phase), or to consider
    ReadyForQuery as ending the start-up phase and each subsequent
    query cycle.
   
    A Query cycle is initiated by the frontend sending a Query message
    to the backend.  The backend then sends one or more response
    messages depending on the contents of the query command string,
    and finally a ReadyForQuery response message.  ReadyForQuery
    informs the frontend that it may safely send a new query or
    function call.
   
    The possible response messages from the backend are:
    
- CompletedResponse
-         An SQL command completed normally.
        
- CopyInResponse
-         The backend is ready to copy data from the frontend to a
        table.  The frontend should then send a CopyDataRows message.
        The backend will then respond with a CompletedResponse message
        with a tag of COPY.
        
- CopyOutResponse
-         The backend is ready to copy data from a table to the
        frontend.  It then sends a CopyDataRows message, and then a
        CompletedResponse message with a tag of COPY.
        
- CursorResponse
-         Beginning of the response to a SELECT,
        FETCH, INSERT,
        UPDATE, or DELETE
        query.  In the FETCH case the name of the
	cursor being fetched from is included in the message.  Otherwise
	the message always mentions the "blank" cursor.
        
- RowDescription
-         Indicates that rows are about to be returned in response to
	a SELECT or FETCH query.
	The message contents describe the layout of the rows.  This
	will be followed by an AsciiRow or BinaryRow message (depending on
	whether a binary cursor was specified) for each row being returned
        to the frontend.
        
- EmptyQueryResponse
-         An empty query string was recognized.
        
- ErrorResponse
-         An error has occurred.
        
- ReadyForQuery
-         Processing of the query string is complete.  A separate
        message is sent to indicate this because the query string may
        contain multiple SQL commands.  (CompletedResponse marks the
        end of processing one SQL command, not the whole string.)
        ReadyForQuery will always be sent, whether processing
        terminates successfully or with an error.
        
- NoticeResponse
-         A warning message has been issued in relation to the query.
        Notices are in addition to other responses, i.e., the backend
        will continue processing the command.
        
   
    The response to a SELECT or FETCH query
    normally consists of CursorResponse, RowDescription, zero or more
    AsciiRow or BinaryRow messages, and finally CompletedResponse.
    INSERT, UPDATE, and
    DELETE queries produce CursorResponse followed by
    CompletedResponse.
    COPY to or from the frontend invokes special protocol
    as mentioned above.
    All other query types normally produce only
    a CompletedResponse message.
   
    Since a query string could contain several queries (separated by
    semicolons), there might be several such response sequences before the
    backend finishes processing the query string.  ReadyForQuery is issued
    when the entire string has been processed and the backend is ready to
    accept a new query string.
   
    If a completely empty (no contents other than whitespace) query string
    is received, the response is EmptyQueryResponse followed by ReadyForQuery.
    (The need to specially distinguish this case is historical.)
   
    In the event of an error, ErrorResponse is issued followed by
    ReadyForQuery.  All further processing of the query string is aborted by
    ErrorResponse (even if more queries remained in it).  Note that this
    may occur partway through the sequence of messages generated by an
    individual query.
   
    A frontend must be prepared to accept ErrorResponse and
    NoticeResponse messages whenever it is expecting any other type of
    message.
   
    Actually, it is possible for NoticeResponse to arrive even when
    the frontend is not expecting any kind of message, that is, the
    backend is nominally idle.  (In particular, the backend can be
    commanded to terminate by its parent process.  In that case it will
    send a NoticeResponse before closing the connection.)  It is
    recommended that the frontend check for such asynchronous notices
    just before issuing any new command.
   
    Also, if the frontend issues any LISTEN
    commands then it must be prepared to accept NotificationResponse
    messages at any time; see below.
   
    Recommended practice is to code frontends in a state-machine style
    that will accept any message type at any time that it could make sense,
    rather than wiring in assumptions about the exact sequence of messages.
   
    A Function Call cycle is initiated by the frontend sending a
    FunctionCall message to the backend.  The backend then sends one
    or more response messages depending on the results of the function
    call, and finally a ReadyForQuery response message.  ReadyForQuery
    informs the frontend that it may safely send a new query or
    function call.
   
    The possible response messages from the backend are:
    
- ErrorResponse
-         An error has occurred.
        
- FunctionResultResponse
-         The function call was executed and returned a result.
        
- FunctionVoidResponse
-         The function call was executed and returned no result.
        
- ReadyForQuery
-         Processing of the function call is complete.  ReadyForQuery
        will always be sent, whether processing terminates
        successfully or with an error.
        
- NoticeResponse
-         A warning message has been issued in relation to the function
        call.  Notices are in addition to other responses, i.e., the
        backend will continue processing the command.
        
   
    A frontend must be prepared to accept ErrorResponse and
    NoticeResponse messages whenever it is expecting any other type of
    message.  Also, if it issues any LISTEN
    commands then it must be prepared to accept NotificationResponse
    messages at any time; see below.
   
    If a frontend issues a LISTEN command, then the
    backend will send a NotificationResponse message (not to be
    confused with NoticeResponse!)  whenever a
    NOTIFY command is executed for the same
    notification name.
   
    Notification responses are permitted at any point in the protocol
    (after start-up), except within another backend message.  Thus,
    the frontend must be prepared to recognize a NotificationResponse
    message whenever it is expecting any message.  Indeed, it should
    be able to handle NotificationResponse messages even when it is
    not engaged in a query.
    
- NotificationResponse
-         A NOTIFY command has been executed for a
        name for which a previous LISTEN command
        was executed.  Notifications may be sent at any time.
        
   
    It may be worth pointing out that the names used in listen and
    notify commands need not have anything to do with names of
    relations (tables) in the SQL database.  Notification names are
    simply arbitrarily chosen condition names.
   
    During the processing of a query, the frontend may request
    cancellation of the query.  The cancel request is not sent
    directly on the open connection to the backend for reasons of
    implementation efficiency: we don't want to have the backend
    constantly checking for new input from the frontend during query
    processing.  Cancel requests should be relatively infrequent, so
    we make them slightly cumbersome in order to avoid a penalty in
    the normal case.
   
    To issue a cancel request, the frontend opens a new connection to
    the server and sends a CancelRequest message, rather than the
    StartupPacket message that would ordinarily be sent across a new
    connection.  The server will process this request and then close
    the connection.  For security reasons, no direct reply is made to
    the cancel request message.
   
    A CancelRequest message will be ignored unless it contains the
    same key data (PID and secret key) passed to the frontend during
    connection start-up.  If the request matches the PID and secret
    key for a currently executing backend, the processing of the
    current query is aborted.  (In the existing implementation, this is
    done by sending a special signal to the backend process that is
    processing the query.)
   
    The cancellation signal may or may not have any effect --- for
    example, if it arrives after the backend has finished processing
    the query, then it will have no effect.  If the cancellation is
    effective, it results in the current command being terminated
    early with an error message.
   
    The upshot of all this is that for reasons of both security and
    efficiency, the frontend has no direct way to tell whether a
    cancel request has succeeded.  It must continue to wait for the
    backend to respond to the query.  Issuing a cancel simply improves
    the odds that the current query will finish soon, and improves the
    odds that it will fail with an error message instead of
    succeeding.
   
    Since the cancel request is sent across a new connection to the
    server and not across the regular frontend/backend communication
    link, it is possible for the cancel request to be issued by any
    process, not just the frontend whose query is to be canceled.
    This may have some benefits of flexibility in building
    multiple-process applications.  It also introduces a security
    risk, in that unauthorized persons might try to cancel queries.
    The security risk is addressed by requiring a dynamically
    generated secret key to be supplied in cancel requests.
   
    The normal, graceful termination procedure is that the frontend
    sends a Terminate message and immediately closes the connection.
    On receipt of the message, the backend immediately closes the
    connection and terminates.
   
    An ungraceful termination may occur due to software failure (i.e.,
    core dump) at either end.  If either frontend or backend sees an
    unexpected closure of the connection, it should clean up and
    terminate.  The frontend has the option of launching a new backend
    by recontacting the server if it doesn't want to terminate
    itself.
   
    For either normal or abnormal termination, any open transaction is
    rolled back, not committed.  One should note however that if a
    frontend disconnects while a query is being processed, the backend
    will probably finish the query before noticing the disconnection.
    If the query is outside any transaction block (BEGIN
    ... COMMIT sequence) then its results may be committed
    before the disconnection is recognized.
   
    Recent releases of PostgreSQL allow frontend/backend
    communication to be encrypted using SSL.  This provides communication
    security in environments where attackers might be able to capture the
    session traffic.
   
    To initiate an SSL-encrypted connection, the frontend initially sends
    an SSLRequest message rather than a StartupPacket.  The server then
    responds with a single byte containing Y or N,
    indicating that it is willing or unwilling to perform SSL, respectively.
    The frontend may close the connection at this point if it is dissatisfied
    with the response.  To continue after Y, perform an SSL
    startup handshake (not described here, part of the SSL specification)
    with the server.  If this is successful, continue with
    sending the usual StartupPacket.  In this case the StartupPacket and
    all subsequent data will be SSL-encrypted.  To continue after
    N, send the usual StartupPacket and proceed without
    encryption.
   
    The frontend should also be prepared to handle an ErrorMessage response
    to SSLRequest from the server.  This would only occur if the server
    predates the addition of SSL support to PostgreSQL.
    In this case the connection must be closed, but the frontend may choose
    to open a fresh connection and proceed without requesting SSL.
   
    An initial SSLRequest may also be used in a connection that is being
    opened to send a CancelRequest message.
   
    While the protocol itself does not provide a way for the server to
    force SSL encryption, the administrator may configure the server to
    reject unencrypted sessions as a byproduct of authentication checking.