get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/48575/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 48575,
    "url": "http://patchwork.dpdk.org/api/patches/48575/?format=api",
    "web_url": "http://patchwork.dpdk.org/project/dpdk/patch/1544111691-7481-1-git-send-email-konstantin.ananyev@intel.com/",
    "project": {
        "id": 1,
        "url": "http://patchwork.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<1544111691-7481-1-git-send-email-konstantin.ananyev@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/1544111691-7481-1-git-send-email-konstantin.ananyev@intel.com",
    "date": "2018-12-06T15:54:43",
    "name": "[v3,0/8] examples/ipsec-secgw: make app to use ipsec library",
    "commit_ref": null,
    "pull_url": null,
    "state": null,
    "archived": false,
    "hash": null,
    "submitter": {
        "id": 33,
        "url": "http://patchwork.dpdk.org/api/people/33/?format=api",
        "name": "Ananyev, Konstantin",
        "email": "konstantin.ananyev@intel.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.dpdk.org/project/dpdk/patch/1544111691-7481-1-git-send-email-konstantin.ananyev@intel.com/mbox/",
    "series": [],
    "comments": "http://patchwork.dpdk.org/api/patches/48575/comments/",
    "check": "pending",
    "checks": "http://patchwork.dpdk.org/api/patches/48575/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@dpdk.org",
        "Delivered-To": "patchwork@dpdk.org",
        "Received": [
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id 6B38A5F51;\n\tThu,  6 Dec 2018 16:54:59 +0100 (CET)",
            "from mga06.intel.com (mga06.intel.com [134.134.136.31])\n\tby dpdk.org (Postfix) with ESMTP id 7A59B137C\n\tfor <dev@dpdk.org>; Thu,  6 Dec 2018 16:54:57 +0100 (CET)",
            "from fmsmga004.fm.intel.com ([10.253.24.48])\n\tby orsmga104.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384;\n\t06 Dec 2018 07:54:56 -0800",
            "from sivswdev08.ir.intel.com (HELO localhost.localdomain)\n\t([10.237.217.47])\n\tby fmsmga004.fm.intel.com with ESMTP; 06 Dec 2018 07:54:54 -0800"
        ],
        "X-Amp-Result": "SKIPPED(no attachment in message)",
        "X-Amp-File-Uploaded": "False",
        "X-ExtLoop1": "1",
        "X-IronPort-AV": "E=Sophos;i=\"5.56,322,1539673200\"; d=\"scan'208\";a=\"125655397\"",
        "From": "Konstantin Ananyev <konstantin.ananyev@intel.com>",
        "To": "dev@dpdk.org",
        "Cc": "akhil.goyal@nxp.com, radu.nicolau@intel.com,\n\tKonstantin Ananyev <konstantin.ananyev@intel.com>",
        "Date": "Thu,  6 Dec 2018 15:54:43 +0000",
        "Message-Id": "<1544111691-7481-1-git-send-email-konstantin.ananyev@intel.com>",
        "X-Mailer": "git-send-email 1.7.0.7",
        "In-Reply-To": "<1543597460-6962-2-git-send-email-konstantin.ananyev@intel.com>",
        "References": "<1543597460-6962-2-git-send-email-konstantin.ananyev@intel.com>",
        "Subject": "[dpdk-dev] [PATCH v3 0/8] examples/ipsec-secgw: make app to use\n\tipsec library",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n\t<mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n\t<mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "This patch series depends on the patch series:\n\nAdd 'try' semantics for RD and WR locking\nhttp://patches.dpdk.org/patch/48044/\nhttp://patches.dpdk.org/patch/48045/\n\nipsec: new library for IPsec data-path processing\nhttp://patches.dpdk.org/patch/48566/\nhttp://patches.dpdk.org/patch/48567/\nhttp://patches.dpdk.org/patch/48568/\nhttp://patches.dpdk.org/patch/48569/\nhttp://patches.dpdk.org/patch/48570/\nhttp://patches.dpdk.org/patch/48571/\nhttp://patches.dpdk.org/patch/48572/\nhttp://patches.dpdk.org/patch/48573/\nhttp://patches.dpdk.org/patch/48574/\n\nto be applied first.\n\nv2 -> v3\n - add IPv6 cases into test scripts\n - fixes for IPv6 support\n - fixes for inline-crypto support\n - some code restructuring\n\nv1 -> v2\n - Several bug fixes\n\nThat series contians few bug-fixes and changes to make ipsec-secgw\nto utilize librte_ipsec library:\n     - changes in the related data structures.\n     - changes in the initialization code.\n     - changes in the data-path code.\n     - new command-line parameters to enable librte_ipsec codepath\n       and related features.\n     - test scripts to help automate ipsec-secgw functional testing.\n\nNote that right now by default current (non-librte_ipsec) code-path\nwill be used. User has to run application with new command-line option\n('-l')\nto enable new codepath.\nThe main reason for that:\n  - current librte_ipsec doesn't support all ipsec algorithms\n    and features that the app does.\n  - allow users to run both versions in parallel for some time\n    to figure out any functional or performance degradation with the\n    new code.\n\nTest scripts were run with the following crypto devices:\n - aesni_mb\n - aesni_gcm\n - qat\n\nKonstantin Ananyev (8):\n  examples/ipsec-secgw: avoid to request unused TX offloads\n  examples/ipsec-secgw: allow to specify neighbor mac address\n  examples/ipsec-secgw: fix crypto-op might never get dequeued\n  examples/ipsec-secgw: fix outbound codepath for single SA\n  examples/ipsec-secgw: make local variables static\n  examples/ipsec-secgw: make app to use ipsec library\n  examples/ipsec-secgw: make data-path to use ipsec library\n  examples/ipsec-secgw: add scripts for functional test\n\n examples/ipsec-secgw/Makefile                 |   1 +\n examples/ipsec-secgw/ipsec-secgw.c            | 397 +++++++++++++-----\n examples/ipsec-secgw/ipsec.c                  |  62 ++-\n examples/ipsec-secgw/ipsec.h                  |  67 +++\n examples/ipsec-secgw/ipsec_process.c          | 341 +++++++++++++++\n examples/ipsec-secgw/meson.build              |   6 +-\n examples/ipsec-secgw/parser.c                 |  75 ++++\n examples/ipsec-secgw/parser.h                 |   8 +-\n examples/ipsec-secgw/sa.c                     | 284 ++++++++++++-\n examples/ipsec-secgw/sp4.c                    |  35 +-\n examples/ipsec-secgw/sp6.c                    |  35 +-\n examples/ipsec-secgw/test/common_defs.sh      | 149 +++++++\n examples/ipsec-secgw/test/data_rxtx.sh        | 118 ++++++\n examples/ipsec-secgw/test/linux_test4.sh      |  63 +++\n examples/ipsec-secgw/test/linux_test6.sh      |  63 +++\n examples/ipsec-secgw/test/run_test.sh         |  80 ++++\n .../test/trs_aescbc_sha1_common_defs.sh       |  69 +++\n .../ipsec-secgw/test/trs_aescbc_sha1_defs.sh  |  67 +++\n .../test/trs_aescbc_sha1_esn_atom_defs.sh     |   5 +\n .../test/trs_aescbc_sha1_esn_defs.sh          |  66 +++\n .../test/trs_aescbc_sha1_old_defs.sh          |   5 +\n .../test/trs_aesgcm_common_defs.sh            |  60 +++\n examples/ipsec-secgw/test/trs_aesgcm_defs.sh  |  66 +++\n .../test/trs_aesgcm_esn_atom_defs.sh          |   5 +\n .../ipsec-secgw/test/trs_aesgcm_esn_defs.sh   |  66 +++\n .../ipsec-secgw/test/trs_aesgcm_old_defs.sh   |   5 +\n .../test/tun_aescbc_sha1_common_defs.sh       |  68 +++\n .../ipsec-secgw/test/tun_aescbc_sha1_defs.sh  |  70 +++\n .../test/tun_aescbc_sha1_esn_atom_defs.sh     |   5 +\n .../test/tun_aescbc_sha1_esn_defs.sh          |  70 +++\n .../test/tun_aescbc_sha1_old_defs.sh          |   5 +\n .../test/tun_aesgcm_common_defs.sh            |  60 +++\n examples/ipsec-secgw/test/tun_aesgcm_defs.sh  |  70 +++\n .../test/tun_aesgcm_esn_atom_defs.sh          |   5 +\n .../ipsec-secgw/test/tun_aesgcm_esn_defs.sh   |  70 +++\n .../ipsec-secgw/test/tun_aesgcm_old_defs.sh   |   5 +\n 36 files changed, 2488 insertions(+), 138 deletions(-)\n create mode 100644 examples/ipsec-secgw/ipsec_process.c\n create mode 100644 examples/ipsec-secgw/test/common_defs.sh\n create mode 100644 examples/ipsec-secgw/test/data_rxtx.sh\n create mode 100644 examples/ipsec-secgw/test/linux_test4.sh\n create mode 100644 examples/ipsec-secgw/test/linux_test6.sh\n create mode 100644 examples/ipsec-secgw/test/run_test.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aescbc_sha1_common_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aescbc_sha1_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aescbc_sha1_esn_atom_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aescbc_sha1_esn_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aescbc_sha1_old_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aesgcm_common_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aesgcm_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aesgcm_esn_atom_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aesgcm_esn_defs.sh\n create mode 100644 examples/ipsec-secgw/test/trs_aesgcm_old_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aescbc_sha1_common_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aescbc_sha1_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aescbc_sha1_esn_atom_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aescbc_sha1_esn_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aescbc_sha1_old_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aesgcm_common_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aesgcm_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aesgcm_esn_atom_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aesgcm_esn_defs.sh\n create mode 100644 examples/ipsec-secgw/test/tun_aesgcm_old_defs.sh",
    "diff": null,
    "prefixes": [
        "v3",
        "0/8"
    ]
}