get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/31036/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 31036,
    "url": "https://patches.dpdk.org/api/patches/31036/?format=api",
    "web_url": "https://patches.dpdk.org/project/dpdk/patch/20171030122747.19123-1-akhil.goyal@nxp.com/",
    "project": {
        "id": 1,
        "url": "https://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20171030122747.19123-1-akhil.goyal@nxp.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20171030122747.19123-1-akhil.goyal@nxp.com",
    "date": "2017-10-30T12:27:47",
    "name": "[dpdk-dev] doc: update release notes for rte_security",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": true,
    "hash": "d3d71588be1b6203b0ccb7242b8881b1468cc114",
    "submitter": {
        "id": 517,
        "url": "https://patches.dpdk.org/api/people/517/?format=api",
        "name": "Akhil Goyal",
        "email": "akhil.goyal@nxp.com"
    },
    "delegate": null,
    "mbox": "https://patches.dpdk.org/project/dpdk/patch/20171030122747.19123-1-akhil.goyal@nxp.com/mbox/",
    "series": [],
    "comments": "https://patches.dpdk.org/api/patches/31036/comments/",
    "check": "success",
    "checks": "https://patches.dpdk.org/api/patches/31036/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@dpdk.org",
        "Delivered-To": "patchwork@dpdk.org",
        "Received": [
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id 598CE1B2B5;\n\tMon, 30 Oct 2017 13:31:10 +0100 (CET)",
            "from NAM02-SN1-obe.outbound.protection.outlook.com\n\t(mail-sn1nam02on0047.outbound.protection.outlook.com [104.47.36.47])\n\tby dpdk.org (Postfix) with ESMTP id 75D0A1B208\n\tfor <dev@dpdk.org>; Mon, 30 Oct 2017 13:31:08 +0100 (CET)",
            "from BN6PR03CA0012.namprd03.prod.outlook.com (10.168.230.150) by\n\tDM5SPR00MB2551.namprd03.prod.outlook.com (10.175.112.22) with\n\tMicrosoft SMTP Server (version=TLS1_2,\n\tcipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id\n\t15.20.197.4; Mon, 30 Oct 2017 12:31:07 +0000",
            "from BY2FFO11FD003.protection.gbl (2a01:111:f400:7c0c::133) by\n\tBN6PR03CA0012.outlook.office365.com (2603:10b6:404:23::22) with\n\tMicrosoft SMTP Server (version=TLS1_2,\n\tcipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id\n\t15.20.178.6 via Frontend Transport; Mon, 30 Oct 2017 12:31:06 +0000",
            "from tx30smr01.am.freescale.net (192.88.168.50) by\n\tBY2FFO11FD003.mail.protection.outlook.com (10.1.14.125) with\n\tMicrosoft SMTP Server (version=TLS1_0,\n\tcipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.20.178.5\n\tvia Frontend Transport; Mon, 30 Oct 2017 12:31:06 +0000",
            "from netperf2.ap.freescale.net ([10.232.133.164])\n\tby tx30smr01.am.freescale.net (8.14.3/8.14.0) with ESMTP id\n\tv9UCV09K032398; Mon, 30 Oct 2017 05:31:01 -0700"
        ],
        "Authentication-Results": "spf=fail (sender IP is 192.88.168.50)\n\tsmtp.mailfrom=nxp.com; NXP1.onmicrosoft.com;\n\tdkim=none (message not signed)\n\theader.d=none;NXP1.onmicrosoft.com; dmarc=fail action=none\n\theader.from=nxp.com;",
        "Received-SPF": "Fail (protection.outlook.com: domain of nxp.com does not\n\tdesignate 192.88.168.50 as permitted sender)\n\treceiver=protection.outlook.com; \n\tclient-ip=192.88.168.50; helo=tx30smr01.am.freescale.net;",
        "From": "Akhil Goyal <akhil.goyal@nxp.com>",
        "To": "<dev@dpdk.org>",
        "CC": "<declan.doherty@intel.com>, <pablo.de.lara.guarch@intel.com>,\n\t<hemant.agrawal@nxp.com>, <radu.nicolau@intel.com>,\n\t<borisp@mellanox.com>, <aviadye@mellanox.com>, <thomas@monjalon.net>,\n\t<jerin.jacob@caviumnetworks.com>, <john.mcnamara@intel.com>,\n\t<konstantin.ananyev@intel.com>, Akhil Goyal <akhil.goyal@nxp.com>",
        "Date": "Mon, 30 Oct 2017 17:57:47 +0530",
        "Message-ID": "<20171030122747.19123-1-akhil.goyal@nxp.com>",
        "X-Mailer": "git-send-email 2.9.3",
        "X-EOPAttributedMessage": "0",
        "X-Matching-Connectors": "131538402667016722;\n\t(91ab9b29-cfa4-454e-5278-08d120cd25b8); ()",
        "X-Forefront-Antispam-Report": "CIP:192.88.168.50; IPV:NLI; CTRY:US; EFV:NLI;\n\tSFV:NSPM;\n\tSFS:(10009020)(6009001)(336005)(39860400002)(346002)(376002)(39380400002)(2980300002)(1110001)(1109001)(339900001)(189002)(199003)(48376002)(81156014)(8936002)(81166006)(33646002)(5003940100001)(4326008)(8656006)(5660300001)(6916009)(50466002)(6666003)(7416002)(1076002)(50226002)(85426001)(498600001)(8676002)(356003)(575784001)(305945005)(15650500001)(189998001)(36756003)(50986999)(86362001)(47776003)(53936002)(2906002)(16586007)(54906003)(105606002)(316002)(77096006)(106466001)(68736007)(2351001)(104016004)(97736004);\n\tDIR:OUT; SFP:1101; SCL:1; SRVR:DM5SPR00MB2551;\n\tH:tx30smr01.am.freescale.net; \n\tFPR:; SPF:Fail; PTR:InfoDomainNonexistent; MX:1; A:1; LANG:en; ",
        "X-Microsoft-Exchange-Diagnostics": [
            "1; BY2FFO11FD003;\n\t1:WwCWH/skqX6S+5aaCMjuB/4w9v6vKfZ0qbWoT6/mBOGanW3ebXms+Vhp9rUJ5Q5Z1HY98Z3NHgkgnqsea1dW9baZ1ea1yexpgOWFE3vA7ChUYhjUeyDGOA1Vr4WsHYuV",
            "1; DM5SPR00MB2551;\n\t3:NoQKCAeN1VJZCP2wiuZk8Ww4w/9JVAai6hVMMOWeFkFudQBXk8LFSZtiiuzHl3+Rknm1HGfWESqLaZ3YHBOW94a/2591FKaFOHweJFG3wUQu465l0yoxOeNcTDVW1cUH55KU7MjiUEJsp9Y9CrqTLwJsKqG+0ix4LxBlmsBBSWGlvtE32g03Pdm9bYFDhSVMIxXJXEnMmN7Kgd+QH561lFJTmXgHDF+oxA9Ztq2qeXXCxppOYki0GgL/HTtAZkkFOe2qgQEjJu32T0TIbw9gQjY1/7hqz0kHtRkptE3Tcm+ck+sO5smTGWe+kJ2hjPSq5sZLFlht9gu+kZtv4cifh1pTCYHnYzozhjQPQQ+8V5s=;\n\t25:zgfnYP4lDr9KLqftNpwj70xzJ6SWwvPvFi24XGEcHtMI/z9CyDx7KeGwde6EAt/MhmERQPs0a0yEs6ahVLyPrTqGdZ8Ii59tPS6+Kd5szGO8VRc1do6gN9r8Yl2hHI7S9gUaon3fSRKDkmR9gOHw0FZOvf4ZaKr3gIyrK4mz2idIH2U/TNfuYQeRrfwrLAwLBzVoec/j9BZn4wO6zMG3/i4jamC6HGpI/0wJaVFSlsLOEO0mWKvyrf2VW4GARxvjbXqmsdDhDUT/5WeCZcphKSxypTucX2yXCqB90UTo7v0QZ/ysR2u4osELxDrSAAZwqhwfC1I5SqrIFdZ6JKP99A==",
            "1; DM5SPR00MB2551;\n\t31:YaBf1jWWxlfD/qBMxMnaCeqHWBAd6Z/iSA3OJQKa6vjZTVy2bkpltmnbHmgCSv/UligJbYEe+HCmMXUkAz2htLpwG5mFvKkzQmPxxE7JrmfRlL4EUaHFuYa6vEdfz8rtyD02tONqd/HZx85TrbiblI0wJo31TL26Z7yFqldlalRoY/gtN9dlS3C/zdZfS681S3AvQnlms+65b7BtLLtWr9MWEj+7piSUwOZtRua/eYg=;\n\t4:lQGP3J32CrPGo4sYhpg0paajSgEoA8VyDQE7N6UXlQlcuflqHGHRFfkiIL7qspLLG/Mu09lT7mro/RDDMQWh/ZEaq2Y+hDpKXSxZ5ZxNtAwpRPwCHc8RJ7Im8xWfGWzwEJYXoEuvzKpXH/bGNbY6wFWssD1DLRYqxFH31eELgYUGDDjxLNZbSBI1JhEOFnHDsRe56LxaUqtjTItPGOe8/s4cxzRmuiRSzUxpMfLkWGQLpbbvuDVxx8o13CRqxVRXudQCWs1+ScjklsptHlWNUcUyzU+6+u0RMJ8HOeRggpVWcL/dttZPscnxZi4qPsxyQu6O8wAOzSKCZ3ndQwRWNEpUgC+Q4SQBZQI9+n8ztngoCTe4eSd1kbkHCsSd++na",
            "=?us-ascii?Q?1; DM5SPR00MB2551;\n\t23:/PGEr916Myt7DwlfMZ59VbGtZACDBC+rG+b+3iWu?=\n\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",
            "1; DM5SPR00MB2551;\n\t6:hHx+5Xv079LpdEwdVy2Um3L2oYauToa7X1y6Sq4wbb9OrgPzDUPjlHEi5RCltTrc869fTJhE9v0Sbz/2Tqz4c4YwZl6ToFk8czSV1ayzuI88Ni65+ahSWZs6JPf6+Bx3aBx6Rhc/FSPYQg3lcqBwycXUSGvl+Wol1oo1s0dBo6qAHEDD0v8KMa6bR8Svr2iYwGrZ1qPMHuCsOxW5E8nVOtWdRStc7FhokMNA1IN8qLseu9ayBYSckxpVwKEBX/aQPAHLVXUMLhcIL+L2bdYhaPdlqvotSlHGkU3WSbTwL1MrmM/JBP35s/3Vk0BGVVmZRnZDWlMFeI2cKhxU+V0HJ/Kqio7ln0lFhOR0XZSR2+k=;\n\t5:DAAMU3j/E0nw3i7sWi0EHwFjHvB22Zrt8eqDJNqDmDeB6Jh337l/Mo8Oq6h5VEE3uGDC5drDkUAau18Moq3rdAkC58gsB0qjK6wDdC1Uk0qbDmJKpgkBLlfvMx3gFIWqJ/hvyuCeLAo3H7jgXiiehisPoe2WMeFkVoYh/2Exw9I=;\n\t24:KN7koaLabiEGFgRVEIwoyGRXrLSbKJs9WNWO8KYcegu2l5KvIDbvB8T2QJL6HpHj8wV9CwCsbp2fTNN6rjCuAfnKChiv+VZ4TE7GLMZtIs8=;\n\t7:msT/YwWoQlIgWA4aunn6vZhSkWZlLE44gDioCMWvBGhcjyla5Fb+tkQu7WolpN+nk1bbEwk8bni7+nJ0Pz87DVqUbzgI9vi5PFe45QTsGg14iY4A861bewbb6R42f2bpsT3dyWVy304Y8ObqqrwxncK7lbdzoXgkRX01aJvQVywEM/dqiCVyWVtTl3sKNKwTwsjtsSouKP9ltPmwkcSBC5zQsl/r+qwdDeACxIH4/flnLPpPVcrNQku7AkLFqEb8"
        ],
        "MIME-Version": "1.0",
        "Content-Type": "text/plain",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-Office365-Filtering-Correlation-Id": "c8a4c3dd-d8a9-4caf-272a-08d51f9217ae",
        "X-Microsoft-Antispam": "UriScan:; BCL:0; PCL:0;\n\tRULEID:(22001)(4534020)(4628075)(201703131517081)(2017052603199);\n\tSRVR:DM5SPR00MB2551; ",
        "X-MS-TrafficTypeDiagnostic": "DM5SPR00MB2551:",
        "X-Exchange-Antispam-Report-Test": "UriScan:(278428928389397)(192374486261705)(185117386973197); ",
        "X-Microsoft-Antispam-PRVS": "<DM5SPR00MB25510B52EDFFE33AF4AE0A0FE6590@DM5SPR00MB2551.namprd03.prod.outlook.com>",
        "X-Exchange-Antispam-Report-CFA-Test": "BCL:0; PCL:0;\n\tRULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6095135)(2401047)(8121501046)(5005006)(10201501046)(3002001)(3231020)(100000703101)(100105400095)(93006095)(93001095)(6055026)(6096035)(20161123556025)(20161123559100)(20161123565025)(20161123561025)(20161123563025)(201703131430075)(201703131448075)(201703131433075)(201703161259150)(201703151042153)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095);\n\tSRVR:DM5SPR00MB2551; BCL:0; PCL:0;\n\tRULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(400006)(100000804101)(100110200095)(100000805101)(100110500095);\n\tSRVR:DM5SPR00MB2551; ",
        "X-Forefront-PRVS": "0476D4AB88",
        "SpamDiagnosticOutput": "1:99",
        "SpamDiagnosticMetadata": "NSPM",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "30 Oct 2017 12:31:06.3740\n\t(UTC)",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "c8a4c3dd-d8a9-4caf-272a-08d51f9217ae",
        "X-MS-Exchange-CrossTenant-Id": "5afe0b00-7697-4969-b663-5eab37d5f47e",
        "X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp": "TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e;\n\tIp=[192.88.168.50]; \n\tHelo=[tx30smr01.am.freescale.net]",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "HybridOnPrem",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "DM5SPR00MB2551",
        "Subject": "[dpdk-dev] [PATCH] doc: update release notes for rte_security",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<http://dpdk.org/ml/options/dev>,\n\t<mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://dpdk.org/ml/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<http://dpdk.org/ml/listinfo/dev>,\n\t<mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "Removed the deprication notice for ABI breakage and updated\nrelease notes for rte_security.\n\nSigned-off-by: Akhil Goyal <akhil.goyal@nxp.com>\n---\n doc/guides/prog_guide/rte_security.rst |  2 ++\n doc/guides/rel_notes/deprecation.rst   | 10 ----------\n doc/guides/rel_notes/release_17_11.rst | 33 +++++++++++++++++++++++++++++++++\n 3 files changed, 35 insertions(+), 10 deletions(-)",
    "diff": "diff --git a/doc/guides/prog_guide/rte_security.rst b/doc/guides/prog_guide/rte_security.rst\nindex 71be036..ef6ed0f 100644\n--- a/doc/guides/prog_guide/rte_security.rst\n+++ b/doc/guides/prog_guide/rte_security.rst\n@@ -28,6 +28,8 @@\n     OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n \n \n+.. _security_library:\n+\n Security Library\n ================\n \ndiff --git a/doc/guides/rel_notes/deprecation.rst b/doc/guides/rel_notes/deprecation.rst\nindex a93c3e1..b8dff0e 100644\n--- a/doc/guides/rel_notes/deprecation.rst\n+++ b/doc/guides/rel_notes/deprecation.rst\n@@ -50,16 +50,6 @@ Deprecation Notices\n   Target release for removal of the legacy API will be defined once most\n   PMDs have switched to rte_flow.\n \n-* ethdev: new parameters - ``rte_security_capabilities`` and\n-  ``rte_security_ops`` will be added to ``rte_eth_dev_info`` and\n-  ``rte_eth_dev`` respectively  to support security operations like\n-  ipsec inline.\n-\n-* cryptodev: new parameters - ``rte_security_capabilities`` and\n-  ``rte_security_ops`` will be added to ``rte_cryptodev_info`` and\n-  ``rte_cryptodev`` respectively to support security protocol offloaded\n-  operations.\n-\n * cryptodev: the following function is deprecated starting from 17.08 and will\n   be removed in 17.11:\n \ndiff --git a/doc/guides/rel_notes/release_17_11.rst b/doc/guides/rel_notes/release_17_11.rst\nindex b96b236..132a916 100644\n--- a/doc/guides/rel_notes/release_17_11.rst\n+++ b/doc/guides/rel_notes/release_17_11.rst\n@@ -208,6 +208,29 @@ New Features\n   applications to classify an input packet by matching it against a set of flow\n   rules. It uses the librte_table API to manage the flow rules.\n \n+* **Added the Security Offload Library.**\n+\n+  Added an experimental library - rte_security. It provide security APIs for\n+  protocols like IPSec using inline ipsec offload to ethernet device or full\n+  protocol offload with lookaside crypto device.\n+\n+  See the :ref:`Security Library <Security_Library>` documentation in\n+  the Programmers Guide document, for more information.\n+\n+* **Updated DPAA2_SEC crypto driver.**\n+\n+  Updated dpaa2_sec crypto PMD to support rte_security lookaside protocol\n+  offload for IPSec.\n+\n+* **Updated IXGBE ethernet driver.**\n+\n+  Updated ixgbe ethernet PMD to support rte_security inline IPSec offload.\n+\n+* **Updated ipsec-secgw application**\n+\n+  Updated ipsec-secgw sample application to support rte_security actions for\n+  ipsec inline and full protocol offload using lookaside crypto offload.\n+\n \n Resolved Issues\n ---------------\n@@ -422,6 +445,16 @@ ABI Changes\n   The size of the field ``port_id`` in the ``rte_eth_dev_data`` structure\n   changed, as described in the `New Features` section.\n \n+* **New parameter added to rte_eth_dev.**\n+\n+  New parameter ``security_ctx``  added to ``rte_eth_dev`` to support security\n+  operations like IPSec inline.\n+\n+* **New parameter added to rte_cryptodev.**\n+\n+  New parameter ``security_ctx``  added to ``rte_cryptodev`` to support security\n+  operations like lookaside crypto.\n+\n \n Removed Items\n -------------\n",
    "prefixes": [
        "dpdk-dev"
    ]
}