• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /macosx-10.5.8/xnu-1228.15.4/bsd/net/

Lines Matching refs:NULL

152 bdg_hash_table *bdg_table = NULL ;
158 SYSINIT(interfaces, SI_SUB_PROTO_IF, SI_ORDER_FIRST, bdginit, NULL)
161 struct bdg_softc *ifp2sc = NULL ;
242 if (bdg_table == NULL)
288 if (ifp == NULL)
367 NULL, 0, &sysctl_refresh, "I", "iface refresh");
399 if (bdg_table == NULL)
403 bdg_table[i].name= NULL; /* clear table */
428 bdg_table[age_index].name = NULL ;
458 if (bdg_table == NULL)
549 bdg_table[index].name = NULL ;
576 if (bdg_table[index].name == NULL) {
619 * If src == NULL, the pkt comes from ether_output, and dst is the real
638 struct ifnet *src = m0->m_pkthdr.rcvif; /* could be NULL in output */
639 struct ifnet *ifp, *last = NULL ;
645 struct ip_fw_chain *rule = NULL ; /* did we match a firewall rule ? */
666 if (src == NULL) /* packet from ether_output */
671 return NULL;
693 * from ether_output() (src==NULL, or we would filter it twice).
697 if (ip_fw_chk_ptr && bdg_ipfw != 0 && src != NULL) {
701 if (rule != NULL) /* dummynet packet, already partially processed */
714 if (m0 == NULL) {
716 return NULL ;
730 * Since we apply checks only on input pkts we use NULL.
732 * is NULL.
734 i = (*ip_fw_chk_ptr)(&ip, 0, NULL, NULL /* cookie */, &m0, &rule, NULL);
735 if ( (i & IP_FW_PORT_DENY_FLAG) || m0 == NULL) /* drop */
758 if (m == NULL) {
764 m0 = NULL ; /* and nothing back to the caller */
774 if (m == NULL) /* nope... */
778 dummynet_io((i & 0xffff),DN_TO_BDG_FWD,m,real_dst,NULL,0,rule,0);
800 if (m0 == NULL) {
802 return NULL ;
806 if (src != NULL) /* pkt comes from ether_input */
813 m0 = NULL ; /* original is gone */
816 if (m == NULL) {
834 if (m == NULL)
859 last = NULL ;
863 if (ifp == NULL)
875 if (ifp == NULL)