get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/49342/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 49342,
    "url": "http://patches.dpdk.org/api/patches/49342/?format=api",
    "web_url": "http://patches.dpdk.org/project/dpdk/patch/1546011238-22318-1-git-send-email-konstantin.ananyev@intel.com/",
    "project": {
        "id": 1,
        "url": "http://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<1546011238-22318-1-git-send-email-konstantin.ananyev@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/1546011238-22318-1-git-send-email-konstantin.ananyev@intel.com",
    "date": "2018-12-28T15:33:48",
    "name": "[v5,00/10] examples/ipsec-secgw: make app to use ipsec library",
    "commit_ref": null,
    "pull_url": null,
    "state": null,
    "archived": false,
    "hash": null,
    "submitter": {
        "id": 33,
        "url": "http://patches.dpdk.org/api/people/33/?format=api",
        "name": "Ananyev, Konstantin",
        "email": "konstantin.ananyev@intel.com"
    },
    "delegate": null,
    "mbox": "http://patches.dpdk.org/project/dpdk/patch/1546011238-22318-1-git-send-email-konstantin.ananyev@intel.com/mbox/",
    "series": [],
    "comments": "http://patches.dpdk.org/api/patches/49342/comments/",
    "check": "pending",
    "checks": "http://patches.dpdk.org/api/patches/49342/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@dpdk.org",
        "Delivered-To": "patchwork@dpdk.org",
        "Received": [
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id 7D4D41B130;\n\tFri, 28 Dec 2018 16:34:11 +0100 (CET)",
            "from mga14.intel.com (mga14.intel.com [192.55.52.115])\n\tby dpdk.org (Postfix) with ESMTP id 88F671B101\n\tfor <dev@dpdk.org>; Fri, 28 Dec 2018 16:34:09 +0100 (CET)",
            "from fmsmga008.fm.intel.com ([10.253.24.58])\n\tby fmsmga103.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384;\n\t28 Dec 2018 07:34:08 -0800",
            "from sivswdev08.ir.intel.com (HELO localhost.localdomain)\n\t([10.237.217.47])\n\tby fmsmga008.fm.intel.com with ESMTP; 28 Dec 2018 07:34:07 -0800"
        ],
        "X-Amp-Result": "SKIPPED(no attachment in message)",
        "X-Amp-File-Uploaded": "False",
        "X-ExtLoop1": "1",
        "X-IronPort-AV": "E=Sophos;i=\"5.56,410,1539673200\"; d=\"scan'208\";a=\"112646578\"",
        "From": "Konstantin Ananyev <konstantin.ananyev@intel.com>",
        "To": [
            "dev@dpdk.org",
            "dev@dpdk.org"
        ],
        "Cc": "akhil.goyal@nxp.com,\n\tKonstantin Ananyev <konstantin.ananyev@intel.com>",
        "Date": "Fri, 28 Dec 2018 15:33:48 +0000",
        "Message-Id": "<1546011238-22318-1-git-send-email-konstantin.ananyev@intel.com>",
        "X-Mailer": "git-send-email 1.7.0.7",
        "In-Reply-To": "<1544805623-18150-2-git-send-email-konstantin.ananyev@intel.com>",
        "References": "<1544805623-18150-2-git-send-email-konstantin.ananyev@intel.com>",
        "Subject": "[dpdk-dev] [PATCH v5 00/10] examples/ipsec-secgw: make app to use\n\tipsec library",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n\t<mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n\t<mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "This patch series depends on the patch series:\n\nipsec: new library for IPsec data-path processing\nhttp://patches.dpdk.org/patch/49332/\nhttp://patches.dpdk.org/patch/49333/\nhttp://patches.dpdk.org/patch/49334/\nhttp://patches.dpdk.org/patch/49335/\nhttp://patches.dpdk.org/patch/49336/\nhttp://patches.dpdk.org/patch/49337/\nhttp://patches.dpdk.org/patch/49338/\nhttp://patches.dpdk.org/patch/49339/\nhttp://patches.dpdk.org/patch/49340/\nhttp://patches.dpdk.org/patch/49341/\n\nto be applied first.\n\nv4 -> v5\n- Address Akhil comments:\n     documentation update\n     spell checks spacing etc.\n     introduce rxoffload/txoffload parameters\n     single SA for ipv6\n     update Makefile\n\nv3 -> v4\n - fix few issues with the test scripts\n - update docs\n\nv2 -> v3\n - add IPv6 cases into test scripts\n - fixes for IPv6 support\n - fixes for inline-crypto support\n - some code restructuring\n\nv1 -> v2\n - Several bug fixes\n\nThat series contians few bug-fixes and changes to make ipsec-secgw\nto utilize librte_ipsec library:\n     - changes in the related data structures.\n     - changes in the initialization code.\n     - changes in the data-path code.\n     - new command-line parameters to enable librte_ipsec codepath\n       and related features.\n     - test scripts to help automate ipsec-secgw functional testing.\n\nNote that right now by default current (non-librte_ipsec) code-path\nwill be used. User has to run application with new command-line option\n('-l')\nto enable new codepath.\nThe main reason for that:\n  - current librte_ipsec doesn't support all ipsec algorithms\n    and features that the app does.\n  - allow users to run both versions in parallel for some time\n    to figure out any functional or performance degradation with the\n    new code.\n\nTest scripts were run with the following crypto devices:\n - aesni_mb\n - aesni_gcm\n - qat\n\nKonstantin Ananyev (10):\n  examples/ipsec-secgw: allow user to disable some RX/TX offloads\n  examples/ipsec-secgw: allow to specify neighbour mac address\n  examples/ipsec-secgw: fix crypto-op might never get dequeued\n  examples/ipsec-secgw: fix outbound codepath for single SA\n  examples/ipsec-secgw: make local variables static\n  examples/ipsec-secgw: fix inbound SA checking\n  examples/ipsec-secgw: make app to use ipsec library\n  examples/ipsec-secgw: make data-path to use ipsec library\n  examples/ipsec-secgw: add scripts for functional test\n  doc: update ipsec-secgw guide and relelase notes\n\n doc/guides/rel_notes/release_19_02.rst        |  14 +\n doc/guides/sample_app_ug/ipsec_secgw.rst      | 159 +++++-\n examples/ipsec-secgw/Makefile                 |   5 +-\n examples/ipsec-secgw/ipsec-secgw.c            | 480 ++++++++++++++----\n examples/ipsec-secgw/ipsec.c                  |  62 ++-\n examples/ipsec-secgw/ipsec.h                  |  67 +++\n examples/ipsec-secgw/ipsec_process.c          | 341 +++++++++++++\n examples/ipsec-secgw/meson.build              |   6 +-\n examples/ipsec-secgw/parser.c                 |  91 ++++\n examples/ipsec-secgw/parser.h                 |   8 +-\n examples/ipsec-secgw/sa.c                     | 263 +++++++++-\n examples/ipsec-secgw/sp4.c                    |  35 +-\n examples/ipsec-secgw/sp6.c                    |  35 +-\n examples/ipsec-secgw/test/common_defs.sh      | 153 ++++++\n examples/ipsec-secgw/test/data_rxtx.sh        |  62 +++\n examples/ipsec-secgw/test/linux_test4.sh      |  63 +++\n examples/ipsec-secgw/test/linux_test6.sh      |  64 +++\n examples/ipsec-secgw/test/run_test.sh         |  80 +++\n .../test/trs_aescbc_sha1_common_defs.sh       |  69 +++\n .../ipsec-secgw/test/trs_aescbc_sha1_defs.sh  |  67 +++\n .../test/trs_aescbc_sha1_esn_atom_defs.sh     |   5 +\n .../test/trs_aescbc_sha1_esn_defs.sh          |  66 +++\n .../test/trs_aescbc_sha1_old_defs.sh          |   5 +\n .../test/trs_aesgcm_common_defs.sh            |  60 +++\n examples/ipsec-secgw/test/trs_aesgcm_defs.sh  |  66 +++\n .../test/trs_aesgcm_esn_atom_defs.sh          |   5 +\n .../ipsec-secgw/test/trs_aesgcm_esn_defs.sh   |  66 +++\n .../ipsec-secgw/test/trs_aesgcm_old_defs.sh   |   5 +\n .../test/tun_aescbc_sha1_common_defs.sh       |  68 +++\n .../ipsec-secgw/test/tun_aescbc_sha1_defs.sh  |  70 +++\n .../test/tun_aescbc_sha1_esn_atom_defs.sh     |   5 +\n .../test/tun_aescbc_sha1_esn_defs.sh          |  70 +++\n .../test/tun_aescbc_sha1_old_defs.sh          |   5 +\n .../test/tun_aesgcm_common_defs.sh            |  60 +++\n examples/ipsec-secgw/test/tun_aesgcm_defs.sh  |  70 +++\n .../test/tun_aesgcm_esn_atom_defs.sh          |   5 +\n .../ipsec-secgw/test/tun_aesgcm_esn_defs.sh   |  70 +++\n .../ipsec-secgw/test/tun_aesgcm_old_defs.sh   |   5 +\n 38 files changed, 2685 insertions(+), 145 deletions(-)\n create mode 100644 examples/ipsec-secgw/ipsec_process.c\n create mode 100644 examples/ipsec-secgw/test/common_defs.sh\n create mode 100644 examples/ipsec-secgw/test/data_rxtx.sh\n create mode 100644 examples/ipsec-secgw/test/linux_test4.sh\n create mode 100644 examples/ipsec-secgw/test/linux_test6.sh\n create mode 100644 examples/ipsec-secgw/test/run_test.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aescbc_sha1_common_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aescbc_sha1_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aescbc_sha1_esn_atom_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aescbc_sha1_esn_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aescbc_sha1_old_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aesgcm_common_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aesgcm_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aesgcm_esn_atom_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aesgcm_esn_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aesgcm_old_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aescbc_sha1_common_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aescbc_sha1_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aescbc_sha1_esn_atom_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aescbc_sha1_esn_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aescbc_sha1_old_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aesgcm_common_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aesgcm_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aesgcm_esn_atom_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aesgcm_esn_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aesgcm_old_defs.sh",
    "diff": null,
    "prefixes": [
        "v5",
        "00/10"
    ]
}