<dec f='src/src/sys/external/bsd/ipf/netinet/ip_ipsec_pxy.c' l='43' type='int ipf_p_ipsec_match(fr_info_t * , ap_session_t * , nat_t * )'/>
<def f='src/src/sys/external/bsd/ipf/netinet/ip_ipsec_pxy.c' l='349' ll='385' type='int ipf_p_ipsec_match(fr_info_t * fin, ap_session_t * aps, nat_t * nat)'/>
<use f='src/src/sys/external/bsd/ipf/netinet/ip_proxy.c' l='204'/>
<use f='src/src/sys/external/bsd/ipf/netinet/ip_proxy.c' l='204'/>
<use f='src/src/sys/external/bsd/ipf/netinet/ip_proxy.c' l='204'/>
<use f='src/src/sys/external/bsd/ipf/netinet/ip_proxy.c' l='204'/>
<doc f='src/src/sys/external/bsd/ipf/netinet/ip_ipsec_pxy.c' l='343'>/*
 * This extends the NAT matching to be based on the cookies associated with
 * a session and found at the front of IKE packets.  The cookies are always
 * in the same order (not reversed depending on packet flow direction as with
 * UDP/TCP port numbers).
 */</doc>
