<dec f='src/src/sys/netipsec/ipsec.h' l='257' type='struct secpolicy * ipsec_getpolicybyaddr(struct mbuf * , u_int , int , int * )'/>
<def f='src/src/sys/netipsec/ipsec.c' l='654' ll='686' type='struct secpolicy * ipsec_getpolicybyaddr(struct mbuf * m, u_int dir, int flag, int * error)'/>
<use f='src/src/sys/netipsec/ipsec.c' l='699' u='c' c='ipsec4_checkpolicy'/>
<use f='src/src/sys/netipsec/ipsec.c' l='853' u='c' c='ipsec4_input'/>
<use f='src/src/sys/netipsec/ipsec.c' l='909' macro='1' u='c'/>
<use f='src/src/sys/netipsec/ipsec.c' l='949' u='c' c='ipsec6_checkpolicy'/>
<use f='src/src/sys/netipsec/ipsec.c' l='1921' u='c' c='ipsec4_in_reject'/>
<use f='src/src/sys/netipsec/ipsec.c' l='1961' u='c' c='ipsec6_in_reject'/>
<use f='src/src/sys/netipsec/ipsec.c' l='2060' u='c' c='ipsec4_hdrsiz'/>
<use f='src/src/sys/netipsec/ipsec.c' l='2095' u='c' c='ipsec6_hdrsiz'/>
<use f='src/src/sys/netipsec/ipsec.c' l='2452' u='c' c='ipsec6_input'/>
<doc f='src/src/sys/netipsec/ipsec.c' l='644'>/*
 * For FORWADING packet or OUTBOUND without a socket. Searching SPD for packet,
 * and return a pointer to SP.
 * OUT:	positive: a pointer to the entry for security policy leaf matched.
 *	NULL:	no apropreate SP found, the following value is set to error.
 *		0	: bypass
 *		EACCES	: discard packet.
 *		ENOENT	: ipsec_acquire() in progress, maybe.
 *		others	: error occurred.
 */</doc>
