<dec f='src/src/sys/netipsec/ipsec.h' l='253' type='struct secpolicy * ipsec_getpolicy(const struct tdb_ident * , u_int )'/>
<def f='src/src/sys/netipsec/ipsec.c' l='486' ll='500' type='struct secpolicy * ipsec_getpolicy(const struct tdb_ident * tdbi, u_int dir)'/>
<use f='src/src/sys/netipsec/ipsec.c' l='851' u='c' c='ipsec4_input'/>
<use f='src/src/sys/netipsec/ipsec.c' l='2449' u='c' c='ipsec6_input'/>
<doc f='src/src/sys/netipsec/ipsec.c' l='474'>/*
 * For OUTBOUND packet having a socket. Searching SPD for packet,
 * and return a pointer to SP.
 * OUT:	NULL:	no apropreate SP found, the following value is set to error.
 *		0	: bypass
 *		EACCES	: discard packet.
 *		ENOENT	: ipsec_acquire() in progress, maybe.
 *		others	: error occurred.
 *	others:	a pointer to SP
 *
 * NOTE: IPv6 mapped address concern is implemented here.
 */</doc>
