get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/49655/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 49655,
    "url": "https://patches.dpdk.org/api/patches/49655/?format=api",
    "web_url": "https://patches.dpdk.org/project/dpdk/patch/1547154553-15814-1-git-send-email-konstantin.ananyev@intel.com/",
    "project": {
        "id": 1,
        "url": "https://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<1547154553-15814-1-git-send-email-konstantin.ananyev@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/1547154553-15814-1-git-send-email-konstantin.ananyev@intel.com",
    "date": "2019-01-10T21:09:03",
    "name": "[v8,00/10] examples/ipsec-secgw: make app to use ipsec library",
    "commit_ref": null,
    "pull_url": null,
    "state": null,
    "archived": false,
    "hash": null,
    "submitter": {
        "id": 33,
        "url": "https://patches.dpdk.org/api/people/33/?format=api",
        "name": "Ananyev, Konstantin",
        "email": "konstantin.ananyev@intel.com"
    },
    "delegate": null,
    "mbox": "https://patches.dpdk.org/project/dpdk/patch/1547154553-15814-1-git-send-email-konstantin.ananyev@intel.com/mbox/",
    "series": [],
    "comments": "https://patches.dpdk.org/api/patches/49655/comments/",
    "check": "pending",
    "checks": "https://patches.dpdk.org/api/patches/49655/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@dpdk.org",
        "Delivered-To": "patchwork@dpdk.org",
        "Received": [
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id E59F31B930;\n\tThu, 10 Jan 2019 22:09:20 +0100 (CET)",
            "from mga04.intel.com (mga04.intel.com [192.55.52.120])\n\tby dpdk.org (Postfix) with ESMTP id 4F6F51B92D\n\tfor <dev@dpdk.org>; Thu, 10 Jan 2019 22:09:19 +0100 (CET)",
            "from fmsmga004.fm.intel.com ([10.253.24.48])\n\tby fmsmga104.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384;\n\t10 Jan 2019 13:09:18 -0800",
            "from sivswdev08.ir.intel.com (HELO localhost.localdomain)\n\t([10.237.217.47])\n\tby fmsmga004.fm.intel.com with ESMTP; 10 Jan 2019 13:09:16 -0800"
        ],
        "X-Amp-Result": "SKIPPED(no attachment in message)",
        "X-Amp-File-Uploaded": "False",
        "X-ExtLoop1": "1",
        "X-IronPort-AV": "E=Sophos;i=\"5.56,462,1539673200\"; d=\"scan'208\";a=\"134836301\"",
        "From": "Konstantin Ananyev <konstantin.ananyev@intel.com>",
        "To": "dev@dpdk.org",
        "Cc": "akhil.goyal@nxp.com, pablo.de.lara.guarch@intel.com, thomas@monjalon.net,\n\tKonstantin Ananyev <konstantin.ananyev@intel.com>",
        "Date": "Thu, 10 Jan 2019 21:09:03 +0000",
        "Message-Id": "<1547154553-15814-1-git-send-email-konstantin.ananyev@intel.com>",
        "X-Mailer": "git-send-email 1.7.0.7",
        "In-Reply-To": "<1547034250-21252-2-git-send-email-konstantin.ananyev@intel.com>",
        "References": "<1547034250-21252-2-git-send-email-konstantin.ananyev@intel.com>",
        "Subject": "[dpdk-dev] [PATCH v8 00/10] examples/ipsec-secgw: make app to use\n\tipsec library",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n\t<mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n\t<mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "This patch series depends on the patch series:\nipsec: new library for IPsec data-path processing\nto be applied first.\n\nv7 -> v8\n  rebase on top of crypto-next\n  check-git-log nit-picks \n\nv6 -> v7\n  Call drain_crypto_queue() for each processed port\n  (reported/suggested by Akhil)\n  Add ixgbe inline-ipsec test-case into functiona test scripts\n  (for now ipv4 tunnel mode only)\n\nv5 -> v6\n  Address issues reported by Akhil:\n     segfault when using lookaside-proto device\n     HW IPv4 cksum offload not enabled by default\n     crypto-dev dequeue() is called to often\n\nv4 -> v5\n- Address Akhil comments:\n     documentation update\n     spell checks spacing etc.\n     introduce rxoffload/txoffload parameters\n     single SA for ipv6\n     update Makefile\n\nv3 -> v4\n - fix few issues with the test scripts\n - update docs\n\nv2 -> v3\n - add IPv6 cases into test scripts\n - fixes for IPv6 support\n - fixes for inline-crypto support\n - some code restructuring\n\nv1 -> v2\n - Several bug fixes\n\nThat series contians few bug-fixes and changes to make ipsec-secgw\nto utilize librte_ipsec library:\n     - changes in the related data structures.\n     - changes in the initialization code.\n     - changes in the data-path code.\n     - new command-line parameters to enable librte_ipsec codepath\n       and related features.\n     - test scripts to help automate ipsec-secgw functional testing.\n\nNote that right now by default current (non-librte_ipsec) code-path\nwill be used. User has to run application with new command-line option\n('-l')\nto enable new codepath.\nThe main reason for that:\n  - current librte_ipsec doesn't support all ipsec algorithms\n    and features that the app does.\n  - allow users to run both versions in parallel for some time\n    to figure out any functional or performance degradation with the\n    new code.\n\nTest scripts were run with the following crypto devices:\n - aesni_mb\n - aesni_gcm\n - qat\n - ixgbe inline-ipsec (ipv4 tunnel mode)\n\nKonstantin Ananyev (10):\n  examples/ipsec-secgw: allow user to disable some Rx/Tx offloads\n  examples/ipsec-secgw: allow to specify neighbour MAC address\n  examples/ipsec-secgw: fix crypto-op might never get dequeued\n  examples/ipsec-secgw: fix outbound codepath for single SA\n  examples/ipsec-secgw: make local variables static\n  examples/ipsec-secgw: fix inbound SA checking\n  examples/ipsec-secgw: make app to use ipsec library\n  examples/ipsec-secgw: make data-path to use ipsec library\n  examples/ipsec-secgw: add scripts for functional test\n  doc: update ipsec-secgw guide and relelase notes\n\n doc/guides/rel_notes/release_19_02.rst        |  14 +\n doc/guides/sample_app_ug/ipsec_secgw.rst      | 159 +++++-\n examples/ipsec-secgw/Makefile                 |   5 +-\n examples/ipsec-secgw/ipsec-secgw.c            | 488 ++++++++++++++----\n examples/ipsec-secgw/ipsec.c                  | 101 ++--\n examples/ipsec-secgw/ipsec.h                  |  67 +++\n examples/ipsec-secgw/ipsec_process.c          | 357 +++++++++++++\n examples/ipsec-secgw/meson.build              |   6 +-\n examples/ipsec-secgw/parser.c                 |  91 ++++\n examples/ipsec-secgw/parser.h                 |   8 +-\n examples/ipsec-secgw/sa.c                     | 263 +++++++++-\n examples/ipsec-secgw/sp4.c                    |  35 +-\n examples/ipsec-secgw/sp6.c                    |  35 +-\n examples/ipsec-secgw/test/common_defs.sh      | 162 ++++++\n examples/ipsec-secgw/test/data_rxtx.sh        |  62 +++\n examples/ipsec-secgw/test/linux_test4.sh      |  63 +++\n examples/ipsec-secgw/test/linux_test6.sh      |  64 +++\n examples/ipsec-secgw/test/run_test.sh         |  80 +++\n .../test/trs_aescbc_sha1_common_defs.sh       |  69 +++\n .../ipsec-secgw/test/trs_aescbc_sha1_defs.sh  |  67 +++\n .../test/trs_aescbc_sha1_esn_atom_defs.sh     |   5 +\n .../test/trs_aescbc_sha1_esn_defs.sh          |  66 +++\n .../test/trs_aescbc_sha1_old_defs.sh          |   5 +\n .../test/trs_aesgcm_common_defs.sh            |  60 +++\n examples/ipsec-secgw/test/trs_aesgcm_defs.sh  |  76 +++\n .../test/trs_aesgcm_esn_atom_defs.sh          |   5 +\n .../ipsec-secgw/test/trs_aesgcm_esn_defs.sh   |  66 +++\n .../test/trs_aesgcm_inline_crypto_defs.sh     |   6 +\n .../test/trs_aesgcm_inline_crypto_old_defs.sh |   5 +\n .../ipsec-secgw/test/trs_aesgcm_old_defs.sh   |   5 +\n .../test/tun_aescbc_sha1_common_defs.sh       |  68 +++\n .../ipsec-secgw/test/tun_aescbc_sha1_defs.sh  |  70 +++\n .../test/tun_aescbc_sha1_esn_atom_defs.sh     |   5 +\n .../test/tun_aescbc_sha1_esn_defs.sh          |  70 +++\n .../test/tun_aescbc_sha1_old_defs.sh          |   5 +\n .../test/tun_aesgcm_common_defs.sh            |  60 +++\n examples/ipsec-secgw/test/tun_aesgcm_defs.sh  |  80 +++\n .../test/tun_aesgcm_esn_atom_defs.sh          |   5 +\n .../ipsec-secgw/test/tun_aesgcm_esn_defs.sh   |  70 +++\n .../test/tun_aesgcm_inline_crypto_defs.sh     |   6 +\n .../test/tun_aesgcm_inline_crypto_old_defs.sh |   5 +\n .../ipsec-secgw/test/tun_aesgcm_old_defs.sh   |   5 +\n 42 files changed, 2785 insertions(+), 159 deletions(-)\n create mode 100644 examples/ipsec-secgw/ipsec_process.c\n create mode 100644 examples/ipsec-secgw/test/common_defs.sh\n create mode 100644 examples/ipsec-secgw/test/data_rxtx.sh\n create mode 100644 examples/ipsec-secgw/test/linux_test4.sh\n create mode 100644 examples/ipsec-secgw/test/linux_test6.sh\n create mode 100644 examples/ipsec-secgw/test/run_test.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aescbc_sha1_common_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aescbc_sha1_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aescbc_sha1_esn_atom_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aescbc_sha1_esn_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aescbc_sha1_old_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aesgcm_common_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aesgcm_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aesgcm_esn_atom_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aesgcm_esn_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aesgcm_inline_crypto_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aesgcm_inline_crypto_old_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aesgcm_old_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aescbc_sha1_common_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aescbc_sha1_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aescbc_sha1_esn_atom_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aescbc_sha1_esn_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aescbc_sha1_old_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aesgcm_common_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aesgcm_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aesgcm_esn_atom_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aesgcm_esn_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aesgcm_inline_crypto_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aesgcm_inline_crypto_old_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aesgcm_old_defs.sh",
    "diff": null,
    "prefixes": [
        "v8",
        "00/10"
    ]
}