Browse Source

fix upper/lower case

pull/12/head
Darknet Villain 7 years ago
parent
commit
6d1bc28434
  1. 8
      docs/devs/hacking.md
  2. 4
      docs/tutorials/floodfill-bootstrap.md
  3. 2
      docs/user-guide/FAQ.md
  4. 2
      docs/user-guide/configuration.md

8
docs/devs/hacking.md

@ -1,5 +1,5 @@ @@ -1,5 +1,5 @@
# Hacking on I2PD
# Hacking on i2pd
This document contains notes compiled from hacking on i2pd
@ -8,7 +8,7 @@ This document contains notes compiled from hacking on i2pd @@ -8,7 +8,7 @@ This document contains notes compiled from hacking on i2pd
This guide assumes:
* a decent understanding of c++
* basic understanding of how i2p works at i2np level and up
* basic understanding of how I2P works at i2np level and up
## general structure
@ -38,7 +38,7 @@ For Pending RouterInfo/LeaseSet lookup and store requests @@ -38,7 +38,7 @@ For Pending RouterInfo/LeaseSet lookup and store requests
#### ClientContext.h
`i2p::client::ClientContext` spawns all destinations used by the i2p router including the shared local destination.
`i2p::client::ClientContext` spawns all destinations used by the I2P router including the shared local destination.
global singleton at `i2p::client::context` as of 2.10.1
@ -48,7 +48,7 @@ global singleton at `i2p::client::context` as of 2.10.1 @@ -48,7 +48,7 @@ global singleton at `i2p::client::context` as of 2.10.1
File: Daemon.cpp
`i2p::util::Daemon_Singleton_Private` subclasses implement the daemon start-up and tear-down, creates Http Webui and i2p control server.
`i2p::util::Daemon_Singleton_Private` subclasses implement the daemon start-up and tear-down, creates Http Webui and I2P control server.

4
docs/tutorials/floodfill-bootstrap.md

@ -1,9 +1,9 @@ @@ -1,9 +1,9 @@
Bootstrapping without Reseed Servers
==============================================
In some cases i2p's default reseed servers (servers used to fill i2p router's netdb with initial peers) are blocked.
In some cases I2P's default reseed servers (servers used to fill I2P router's netdb with initial peers) are blocked.
I2PD has a unique feature that allows it to bootstrap off of any i2p router that is participating in the DHT, they are called floodfill routers and have the router capacity `f` in their router info.
i2pd has a unique feature that allows it to bootstrap off of any I2P router that is participating in the DHT, they are called floodfill routers and have the router capacity `f` in their router info.
## How To

2
docs/user-guide/FAQ.md

@ -76,7 +76,7 @@ Use any open source browser - for example, Firefox or Chromium based. Create sep @@ -76,7 +76,7 @@ Use any open source browser - for example, Firefox or Chromium based. Create sep
Good idea is to configure [privoxy](https://wiki.archlinux.org/index.php/Privoxy) for I2P/onion/clearnet browsing at the same time.
i2pd socks proxy has an option to pass all non-i2p traffic to Tor socks proxy. Make sure you know what are you doing!
i2pd socks proxy has an option to pass all non-I2P traffic to Tor socks proxy. Make sure you know what are you doing!
## What is a floodfill mode?

2
docs/user-guide/configuration.md

@ -113,7 +113,7 @@ socksproxy.inbound.length | Inbound tunnels length if keys is set. @@ -113,7 +113,7 @@ socksproxy.inbound.length | Inbound tunnels length if keys is set.
socksproxy.inbound.quantity | Inbound tunnels quantity if keys is set. 5 by default
socksproxy.outbound.length | Outbound tunnels length if keys is set. 3 by default
socksproxy.outbound.quantity | Outbound tunnels quantity if keys is set. 5 by default
socksproxy.outproxy | Address of outproxy. requests outside i2p will go there
socksproxy.outproxy | Address of outproxy. requests outside I2P will go there
socksproxy.outproxyport | Outproxy remote port
### SAM interface

Loading…
Cancel
Save