stun

simple point to point tunnel
git clone git://git.2f30.org/stun
Log | Files | Refs | README

commit 9422f660b059aed3f68ceb1729c79a1c07e69e34
parent c55de559732ffd1750c5a90c4923664497caee6c
Author: sin <sin@2f30.org>
Date:   Tue, 29 Mar 2016 10:34:00 +0100

some more clarification

Diffstat:
Mstun.c | 11++++++-----
1 file changed, 6 insertions(+), 5 deletions(-)

diff --git a/stun.c b/stun.c @@ -27,12 +27,13 @@ * All tunneled traffic is encapsulated inside the TCP payload. * The packet format is shown below: * - * [PAYLOAD LEN][PAYLOAD] + * [PAYLOAD LENGTH][PAYLOAD] * - * The payload is encrypted and padded to 16 bytes. The payload length is - * the length of the unpadded payload. When the receiver processes a packet - * it needs to pad the payload len in order to decrypt the packet. The unpadded - * length is then used to determine the size of the actual decrypted payload. + * The payload is encrypted and padded to 16 bytes. The payload length is a + * two-octet field that describes the length of the unpadded payload. + * When the receiver processes a packet it needs to pad the payload length in order + * to decrypt the packet. The unpadded length is then used to determine the size + * of the actual decrypted payload. * * The maximum payload length allowed is 4095 bytes. The maximum padded payload * length is therefore 4096 bytes. Values at 0x8000 or above are reserved for internal