mirror of
https://github.com/PurpleI2P/i2pd_docs_en
synced 2025-02-10 22:04:13 +00:00
fix upper/lower case
This commit is contained in:
parent
15a5e743c6
commit
6d1bc28434
@ -1,5 +1,5 @@
|
||||
|
||||
# Hacking on I2PD
|
||||
# Hacking on i2pd
|
||||
|
||||
This document contains notes compiled from hacking on i2pd
|
||||
|
||||
@ -8,7 +8,7 @@ This document contains notes compiled from hacking on i2pd
|
||||
This guide assumes:
|
||||
|
||||
* a decent understanding of c++
|
||||
* basic understanding of how i2p works at i2np level and up
|
||||
* basic understanding of how I2P works at i2np level and up
|
||||
|
||||
## general structure
|
||||
|
||||
@ -38,7 +38,7 @@ For Pending RouterInfo/LeaseSet lookup and store requests
|
||||
|
||||
#### ClientContext.h
|
||||
|
||||
`i2p::client::ClientContext` spawns all destinations used by the i2p router including the shared local destination.
|
||||
`i2p::client::ClientContext` spawns all destinations used by the I2P router including the shared local destination.
|
||||
|
||||
global singleton at `i2p::client::context` as of 2.10.1
|
||||
|
||||
@ -48,7 +48,7 @@ global singleton at `i2p::client::context` as of 2.10.1
|
||||
|
||||
File: Daemon.cpp
|
||||
|
||||
`i2p::util::Daemon_Singleton_Private` subclasses implement the daemon start-up and tear-down, creates Http Webui and i2p control server.
|
||||
`i2p::util::Daemon_Singleton_Private` subclasses implement the daemon start-up and tear-down, creates Http Webui and I2P control server.
|
||||
|
||||
|
||||
|
||||
|
@ -1,9 +1,9 @@
|
||||
Bootstrapping without Reseed Servers
|
||||
==============================================
|
||||
|
||||
In some cases i2p's default reseed servers (servers used to fill i2p router's netdb with initial peers) are blocked.
|
||||
In some cases I2P's default reseed servers (servers used to fill I2P router's netdb with initial peers) are blocked.
|
||||
|
||||
I2PD has a unique feature that allows it to bootstrap off of any i2p router that is participating in the DHT, they are called floodfill routers and have the router capacity `f` in their router info.
|
||||
i2pd has a unique feature that allows it to bootstrap off of any I2P router that is participating in the DHT, they are called floodfill routers and have the router capacity `f` in their router info.
|
||||
|
||||
## How To
|
||||
|
||||
|
@ -76,7 +76,7 @@ Use any open source browser - for example, Firefox or Chromium based. Create sep
|
||||
|
||||
Good idea is to configure [privoxy](https://wiki.archlinux.org/index.php/Privoxy) for I2P/onion/clearnet browsing at the same time.
|
||||
|
||||
i2pd socks proxy has an option to pass all non-i2p traffic to Tor socks proxy. Make sure you know what are you doing!
|
||||
i2pd socks proxy has an option to pass all non-I2P traffic to Tor socks proxy. Make sure you know what are you doing!
|
||||
|
||||
## What is a floodfill mode?
|
||||
|
||||
|
@ -113,7 +113,7 @@ socksproxy.inbound.length | Inbound tunnels length if keys is set.
|
||||
socksproxy.inbound.quantity | Inbound tunnels quantity if keys is set. 5 by default
|
||||
socksproxy.outbound.length | Outbound tunnels length if keys is set. 3 by default
|
||||
socksproxy.outbound.quantity | Outbound tunnels quantity if keys is set. 5 by default
|
||||
socksproxy.outproxy | Address of outproxy. requests outside i2p will go there
|
||||
socksproxy.outproxy | Address of outproxy. requests outside I2P will go there
|
||||
socksproxy.outproxyport | Outproxy remote port
|
||||
|
||||
### SAM interface
|
||||
|
Loading…
x
Reference in New Issue
Block a user