<dec f='src/src/sys/netipsec/key.h' l='91' type='int key_checkrequest(struct ipsecrequest * isr, const struct secasindex * )'/>
<use f='src/src/sys/netipsec/ipsec_output.c' l='401' u='c' c='ipsec_nextisr'/>
<def f='src/src/sys/netipsec/key.c' l='787' ll='873' type='int key_checkrequest(struct ipsecrequest * isr, const struct secasindex * saidx)'/>
<doc f='src/src/sys/netipsec/key.c' l='781'>/*
 * allocating an SA entry for an *OUTBOUND* packet.
 * checking each request entries in SP, and acquire an SA if need.
 * OUT:	0: there are valid requests.
 *	ENOENT: policy may be valid, but SA with REQUIRE is on acquiring.
 */</doc>
