> On Dec 15, 2021, at 12:35 PM, Laszlo Ast <a...@netavis.hu> wrote:
> 
> > When I recently added RTSP-over-TLS support to our RTSP server 
> > implementation, it wasn’t intended to also support RTSP-over-HTTPS.  But 
> > perhaps this is working by (happy) accident?
> No, that is RTSPS that you mention, which adds TLS to the RTSP part (which 
> can also incorporate RTP/RTCP in the same single TCP connection if 
> interleaved packets are used).
> But it does not use the specific HTTP tunneling mechanism, that always 
> requires 2 connections.

That’s what I thought.  I may add support for client-side RTSP-over-HTTPS 
sometime in the future, but (in order to test this properly) I won’t do so 
until I also implement this in our RTSP server.  This will have to wait until 
sometime in the new year (as I plan on adding support for server-side SRTP 
first).


> It seemed to me from the comments, and from the man page of connect(), that 
> on a nonblocking socket after calling connect() and select(), one is advised 
> to check SO_ERROR.
> In case of HTTP tunneling, the connection handler is entered twice: first for 
> the GET connection, and later for the POST connection.
> The second time it happens when select() indicates that fOutputSocketNum 
> became ready, and it is not about sent or received data, it is about the 
> connect() call.
> Without the patch, we call the connection handler after the POST connection 
> is opened on fOutputSocketNum, but we still check getsockopt() on 
> fInputSocketNum.

OK, thanks for the clarification.  I’ll look into this.


Ross Finlayson
Live Networks, Inc.
http://www.live555.com/


_______________________________________________
live-devel mailing list
live-devel@lists.live555.com
http://lists.live555.com/mailman/listinfo/live-devel

Reply via email to