<dec f='src/src/sys/netipsec/ipsec.h' l='294' type='int ipsec_in_reject(const struct secpolicy * , const struct mbuf * )'/>
<use f='src/src/sys/netipsec/ipsec.c' l='864' u='c' c='ipsec4_input'/>
<def f='src/src/sys/netipsec/ipsec.c' l='1834' ll='1900' type='int ipsec_in_reject(const struct secpolicy * sp, const struct mbuf * m)'/>
<use f='src/src/sys/netipsec/ipsec.c' l='1927' u='c' c='ipsec4_in_reject'/>
<use f='src/src/sys/netipsec/ipsec.c' l='1968' u='c' c='ipsec6_in_reject'/>
<use f='src/src/sys/netipsec/ipsec.c' l='2461' u='c' c='ipsec6_input'/>
<doc f='src/src/sys/netipsec/ipsec.c' l='1824'>/*
 * Check security policy requirements against the actual
 * packet contents.  Return one if the packet should be
 * reject as &quot;invalid&quot;; otherwiser return zero to have the
 * packet treated as &quot;valid&quot;.
 *
 * OUT:
 *	0: valid
 *	1: invalid
 */</doc>
