Content deleted Content added
Tag: Reverted |
m HTTP to HTTPS for SourceForge |
||
(8 intermediate revisions by 6 users not shown) | |||
Line 12:
Like other URI protocols, web browsers can be configured to automatically handle ed2k URIs. After installing an [[Comparison of eDonkey software|eD2k client]], the eD2k protocol is optionally registered so that clicking on it in the browser automatically starts the download or asks whether the user wants to start downloading.
== File link format ==
File links are preceded with the "file" token, which indicates that this is a file link, as opposed to a <code>server</code>, <code>serverlist</code>, <code>nodelist</code> or <code>friend</code> link. The typical eD2k file link also includes the [[filename]] and the file size. An example (a link to the 15 MB Purist Edit trailer) is provided below:
Line 27:
The eD2k hash function is a [[hash list|root hash]] of a list of [[MD4]] [[hash function|hashes]]. It gives a different result than a simple usage of the MD4 algorithm.
The file data is divided into full ''chunks'' of 9500 KiB (9728000 bytes) plus a remainder chunk, and a separate 128-bit MD4 checksum is computed for each. If the file is greater
This method of hashing allows the recipient to verify that a hash list corresponds to an original eD2k file hash, without the need to actually have the file present on disk.
In the past, there has been some ambiguity for files whose size is a multiple of the chunk size (9500 KiB). Old versions of some eD2k hash tools computed file hashes with an additional 0-byte chunk at the end. This is because an ambiguity of the term ''remainder chunk'' which can be interpreted as either ''the last chunk'' or a ''non-full chunk at the end''. Following the latter interpretation, some implementations added a zero byte chunk in case the last chunk of a file was a complete one. This practice is discouraged however and the first interpretation is used as a standard nowadays to prevent some files from having different hashes depending on the algorithm implementation used to calculate their hash.<ref>{{cite web|url=
=== AICH ===
{{main|eMule#Basic concepts}}
The AICH (Advanced Intelligent Corruption Handling) is an
== Server links ==
Line 62:
* [http://wiki.amule.org/wiki/Ed2k_link aMule wiki: ed2k link].
* [http://www.emule-project.net/home/perl/help.cgi?l=1&rm=show_topic&topic_id=422 emule project] Ed2k link formats supported by emule client.
* [
* [http://phantomp2p.com Phantom P2P] eD2k Links Provider
{{URI scheme|state = uncollapsed}}
|