> On Mar 12, 2021, at 3:01 AM, Kommoju, Sekhar via live-devel 
> <live-de...@us.live555.com> wrote:
> 
> Background: As per your comment, I’ve modified the testRTSPClient to call the 
> function “useTLS()” on “RTSPClient” before sending the first RTSP command, 
> but unfortunately I was getting a “Bad Request” error response from IP camera 
> for the OPTIONS command (as shown in the below screenshot). 
>  
> Just for your reference, the sample code used in the testRTSPClient program:
>  
>        RTSPClient* rtspClient = ourRTSPClient::createNew(env, rtspURL, 
> RTSP_CLIENT_VERBOSITY_LEVEL, progName, 443);

Your problem was including the “443” parameter.  This tells the client to 
attempt RTSP-over-HTTP tunneling on port 443.  This is probably not what you 
wanted, and it will not work (RTSP-over-HTTP tunneling does not work with TLS).

Instead, leave out that parameter, and just call:
        RTSPClient* rtspClient = ourRTSPClient::createNew(env, rtspURL, 
RTSP_CLIENT_VERBOSITY_LEVEL, progName);


>        rtspClient->useTLS();

Note that you don’t need to add this line if your RTSP URL begins with 
“rtsps://“ (instead of “rtsp://“), or if the RTSP URL specifies a port number 
of 322 (the port number reserved for RTSP over TLS).


>       • Do you have any test client to check/test RTSP over TLS to connect to 
> an IP camera using Live555 libraries?

Our existing RTSP client applications - “testRTSPClient” and “openRTSP” will 
work, provided that you give it a RTSP URL that begins with “rtsps://“, or 
specifies a port number of 322 - as noted above.  In this case, you should not 
need to modify any existing code.


Ross Finlayson
Live Networks, Inc.
http://www.live555.com/


_______________________________________________
live-devel mailing list
live-devel@lists.live555.com
http://lists.live555.com/mailman/listinfo/live-devel

Reply via email to