From 184532194741e95b95ecfb2ef393a7d3d1a4b475 Mon Sep 17 00:00:00 2001 From: duck <duck@mail.i2p> Date: Sun, 8 Aug 2010 19:52:09 +0000 Subject: [PATCH] Fix typos, XHTML errors and warnings --- www.i2p2/pages/common_structures_spec.html | 4 +--- www.i2p2/pages/how.html | 10 +++++----- www.i2p2/pages/how_garlicrouting.html | 6 +++--- www.i2p2/pages/how_intro.html | 4 ++-- www.i2p2/pages/i2np_spec.html | 7 +++---- www.i2p2/pages/roadmap.html | 8 ++++---- 6 files changed, 18 insertions(+), 21 deletions(-) diff --git a/www.i2p2/pages/common_structures_spec.html b/www.i2p2/pages/common_structures_spec.html index 755506e10..04d79677a 100644 --- a/www.i2p2/pages/common_structures_spec.html +++ b/www.i2p2/pages/common_structures_spec.html @@ -286,12 +286,11 @@ certificate :: Certificate length -> >= 3 bytes {% endfilter %} +</pre> <h4>Notes</h4> The certificate for a RouterIdentity is currently unused and is always NULL. -</pre> - <h4><a href="http://docs.i2p2.de/core/net/i2p/data/RouterIdentity.html">Javadoc</a></h4> <h2 id="struct_Destination">Destination</h2> @@ -388,7 +387,6 @@ end_date :: Date <a href="#struct_Destination">Destination</a>, followed by a <a href="#type_PublicKey">PublicKey</a> for encryption, then a <a href="#type_SigningPublicKey">SigningPublicKey</a> which can be used to revoke this version of the <a href="#struct_LeaseSet">LeaseSet</a>, then a 1 byte <a href="#type_Integer">Integer</a> specifying how many <a href="#struct_Lease">Lease</a> structures are in the set, followed by the actual <a href="#struct_Lease">Lease</a> structures and finally a <a href="#type_Signature">Signature</a> of the previous bytes signed by the <a href="#struct_Destination">Destination's</a> <a href="#type_SigningPrivateKey">SigningPrivateKey</a> -<p/> <pre> {% filter escape %} +----+----+----+----+----+----+----+----+ diff --git a/www.i2p2/pages/how.html b/www.i2p2/pages/how.html index 64c3470ce..4e8ed8c5c 100644 --- a/www.i2p2/pages/how.html +++ b/www.i2p2/pages/how.html @@ -48,7 +48,7 @@ HTTP Proxy </li><li> IRC Proxy </li><li> -<td align="center"><a href="sam.html">SAM</a> API +<a href="sam.html">SAM</a> API </li><li> <a href="samv2.html">SAMv2</a> API </li><li> @@ -62,7 +62,7 @@ BOB Javadoc </li></ul> <h3>End-to-End Transport API and Protocols</h3> -The end-to-end protocols used by clients for reliable and unreliable commuication. +The end-to-end protocols used by clients for reliable and unreliable communication. <ul><li> <a href="streaming.html">Streaming Library</a> </li><li> @@ -125,7 +125,7 @@ Selecting peers, requesting tunnels through those peers, and encrypting and rout <li><a href="how_garlicrouting.html">Garlic routing</a></li> <li><a href="tunnel-alt.html">Tunnel building and encryption</a></li> <li><a href="how_elgamalaes.html">ElGamal/AES+SessionTag</a> for build request encryption</li> -<li><a href="how_cryptography.html">ElGamal and AES cryptography details</li> +<li><a href="how_cryptography.html">ElGamal and AES cryptography details</a></li> <li><a href="tunnel-alt-creation.html">Tunnel building specification</a></li> <li><a href="tunnel_message_spec.html">Low-level tunnel message specification</a></li> </ul> @@ -141,9 +141,9 @@ The protocols for direct (point-to-point) router to router communication. </li><li> <a href="udp_spec.html">SSU specification</a> </li><li> -<li><a href="how_cryptography.html#tcp">NTCP transport encryption</li> +<a href="how_cryptography.html#tcp">NTCP transport encryption</a> </li><li> -<li><a href="how_cryptography.html#udp">SSU transport encryption</li> +<a href="how_cryptography.html#udp">SSU transport encryption</a> </li><li> <a href="http://docs.i2p2.i2p/router/net/i2p/router/transport/package-summary.html">Transport Javadoc</a> </li><li> diff --git a/www.i2p2/pages/how_garlicrouting.html b/www.i2p2/pages/how_garlicrouting.html index cacbb15a4..a1929350f 100644 --- a/www.i2p2/pages/how_garlicrouting.html +++ b/www.i2p2/pages/how_garlicrouting.html @@ -17,7 +17,7 @@ contained, instead of just a single message. In addition to the cloves, each unwrapped garlic message contains a sender specified amount of padding data, allowing the sender to take active countermeasures against traffic analysis. -<p> + <H2>Uses within I2P</H2> <p> @@ -33,14 +33,14 @@ I2P uses garlic routing in three places: <p> There are also significant ways that this technique can be used to improve the performance of the network, exploiting transport latency/throughput tradeoffs, and branching data through redundant paths to increase reliability. -<p> + <H2>Encryption</H2> <p> The encryption of each layer in the garlic message uses the <a href="how_elgamalaes">ElGamal/AES+SessionTag</a> algorithm, which avoids the cost of a full 2048bit ElGamal encryption for subsequent messages (using instead a random previously specified SessionTag plus 256bit AES encryption). -<p> + <H2>References</H2> <p> diff --git a/www.i2p2/pages/how_intro.html b/www.i2p2/pages/how_intro.html index 25ae49eaa..923e564fe 100644 --- a/www.i2p2/pages/how_intro.html +++ b/www.i2p2/pages/how_intro.html @@ -62,7 +62,7 @@ allocation ("lease") of some tunnels that will be used for sending and receiving network. I2P has its own internal <a href="how_networkdatabase">network database</a> (using a modification of the Kademlia algorithm) for scalable distributing routing and contact information securely.</p> -<p><center><div class="box"><img src="_static/images/net.png" alt="Network topology example" title="Network topology example" /></div></center></p><br> +<center><div class="box"><img src="_static/images/net.png" alt="Network topology example" title="Network topology example" /></div></center><br/> <p>In the above, Alice, Bob, Charlie, and Dave are all running routers with a single Destination on their @@ -101,7 +101,7 @@ Notice the different use of terms! All data from a to h is end-to-end encrypted, between the I2P router and the applications is not end-to-end encrypted! A and h are the routers of Alice and Bob, while Alice and Bob in following chart are the applications running atop of I2P.</p> -<center><div class="box"><img src="_static/images/endToEndEncryption.png" alt="End to end layered encryption" title="End to end layered encryption." /></div></center><br> +<center><div class="box"><img src="_static/images/endToEndEncryption.png" alt="End to end layered encryption" title="End to end layered encryption." /></div></center><br/> <p>The specific use of these algorithms are outlined <a href="how_cryptography">elsewhere</a>.</p> diff --git a/www.i2p2/pages/i2np_spec.html b/www.i2p2/pages/i2np_spec.html index 7188fcabd..9c104272a 100644 --- a/www.i2p2/pages/i2np_spec.html +++ b/www.i2p2/pages/i2np_spec.html @@ -292,7 +292,7 @@ Certificate :: Always NULL in the current implementation (3 bytes total, all zer <li> See also the <a href="how_garlicrouting.html">garlic routing specification</a>. <li> - See also <a href="tunnel_message_spec.html#delivery">Delvery Instructions definition</a> + See also <a href="tunnel_message_spec.html#delivery">Delivery Instructions definition</a> <li> In the future, the certificate could possibly be used for a HashCash to "pay" for the routing. </ul> @@ -586,7 +586,7 @@ from: <h3 id="msg_DeliveryStatus">DeliveryStatus</h3> <h4>Description</h4> <p> - A simple message acknowledgement. Generally created by the message originator, and wrapped + A simple message acknowledgment. Generally created by the message originator, and wrapped in a Garlic Message with the message itself, to be returned by the destination. </p> <h4>Contents</h4> @@ -668,7 +668,7 @@ length: data: $length bytes - elgamal encrypted data + ElGamal encrypted data Unencrypted data: @@ -700,7 +700,6 @@ Expiration :: Date (8 bytes) <li> In the future, the certificate could possibly be used for a HashCash to "pay" for the routing. </ul> -</p> <h3 id="msg_TunnelData">TunnelData</h3> diff --git a/www.i2p2/pages/roadmap.html b/www.i2p2/pages/roadmap.html index c8edec92a..958d903e1 100644 --- a/www.i2p2/pages/roadmap.html +++ b/www.i2p2/pages/roadmap.html @@ -2,7 +2,7 @@ {% block title %}Roadmap{% endblock %} {% block content %} -<h2 id="0.9">0.9</h2> +<h2 id="v0.9">0.9</h2> <ul> <li>Include some seed data in the distribution so a central reseed location isn't required? <li>Reachability Mapping / handle peers partially reachable / enhanced <a href="todo.html#fullRestrictedRoutes">restricted routes</a></li> @@ -12,19 +12,19 @@ <li>Iterative floodfill lookups</li> </ul> -<h2 id="1.0">1.0</h2> +<h2 id="v1.0">1.0</h2> <ul> <li>Full review of anonymity issues and other vulnerabilities</li> <li>Reduce memory usage, remove debugging overhead, make it run better on slow and embedded machines</li> <li>Docs</li> </ul> -<h2 id="2.0">2.0</h2> +<h2 id="v2.0">2.0</h2> <ul> <li>Full restricted routes</li> </ul> -<h2 id="3.0">3.0</h2> +<h2 id="v3.0">3.0</h2> <ul> <li>Tunnel mixing and padding</li> <li>User defined message delays</li> -- GitLab