Lines Matching defs:vhost
44 struct lws_vhost *vhost)
46 struct lws_context *context = vhost->context;
47 lws_fakewsi_def_plwsa(&vhost->context->pt[0]);
49 lws_fakewsi_prep_plwsa_ctx(vhost->context);
53 vhost->tls.use_ssl = 0;
60 * it on this vhost. User code can leave the cert filepath NULL and
64 * provides the vhost SSL_CTX * in the user parameter.
67 vhost->options |= LWS_SERVER_OPTION_CREATE_VHOST_SSL_CTX;
71 vhost->tls.use_ssl = lws_check_opt(vhost->options,
74 if (vhost->tls.use_ssl && info->ssl_cipher_list)
79 vhost->name, vhost->tls.use_ssl ? "" : "non-");
83 * give him a fake wsi with context + vhost set, so he can use
86 plwsa->vhost = vhost; /* not a real bound wsi */
95 vhost->tls.allow_non_ssl_on_ssl_port = 1;
101 if (vhost->tls.use_ssl) {
102 if (lws_tls_server_vhost_backend_init(info, vhost, (struct lws *)plwsa))
105 lws_tls_server_client_cert_verify_config(vhost);
107 if (vhost->protocols[0].callback((struct lws *)plwsa,
109 vhost->tls.ssl_ctx, vhost, 0))
113 if (vhost->tls.use_ssl)
114 lws_context_init_alpn(vhost);
136 if (!LWS_SSL_ENABLED(wsi->a.vhost))
188 if (wsi->a.vhost->tls.allow_non_ssl_on_ssl_port && !wsi->skip_fallback) {
216 * were told in the vhost info struct
241 if (lws_check_opt(wsi->a.vhost->options,
249 if (lws_check_opt(wsi->a.vhost->options,
257 if (lws_check_opt(wsi->a.vhost->options,
267 "tls hello (default vhost %s)\n",
268 __func__, wsi->a.vhost->name);
336 /* adapt our vhost to match the SNI SSL_CTX that was chosen */