33:
323:. Following the latter interpretation, some implementations added a zero byte chunk in case the last chunk of a file was a complete one. This practice is discouraged however and the first interpretation is used as a standard nowadays to prevent some files from having different hashes depending on the algorithm implementation used to calculate their hash.
303:
of 9500 KiB (9728000 bytes) plus a remainder chunk, and a separate 128-bit MD4 checksum is computed for each. If the file is greater than 9500 KiB (which means that there is more than one chunk), the eD2k hash is computed by concatenating the chunks' MD4 checksums in order and hashing the result
310:
In the past, there has been some ambiguity for files whose size is a multiple of the chunk size (9500 KiB). Old versions of some eD2k hash tools computed file hashes with an additional 0-byte chunk at the end. This is because an ambiguity of the term
211:
for files within the network, so even if the linked-to file has a different name on two computers within the network, the file can be found on both of them, and file chunks can be obtained from both sources. This is done by using a
345:. The block hashes further feed into a Merkle tree, the root hash of which is the actual AICH root hash. The smaller block size allows eMule clients to more precisely identifify locations of corruption.
261:
and port of specific clients that are known to share the linked-to file. This is done by adding a list of sources after the main part of the link, like shown in the following example:
192:
file sharing, and had a vast effect on the development of the eDonkey network, as it allowed external link sites to provide verified content within the network. Nowadays, so-called
307:
This method of hashing allows the recipient to verify that a hash list corresponds to an original eD2k file hash, without the need to actually have the file present on disk.
223:, the eD2k protocol is optionally registered so that clicking on it in the browser automatically starts the download or asks whether the user wants to start downloading.
177:, which introduced the link type, as well as others using the eDonkey file sharing protocol, can be used to manage files stored in the filesharing network.
353:
A server link is a reference to an eDonkey2000 server; clicking on such a link typically adds it to the server list. Server links are indicated by the
668:
724:
698:
602:
524:
337:
The AICH (Advanced
Intelligent Corruption Handling) is an eMule extension. It subdivides the 9500 KiB chunk into 180-KiB blocks and builds a
196:
have replaced eD2k links in practice. They serve a similar role, but are not limited to the eD2k hash and can contain other hashes such as
755:
116:
204:
for example, which makes it possible to use these links to point to files in several networks (as well as in BitTorrent) at once.
50:
264:
ed2k://|file|The_Two_Towers-The_Purist_Edit-Trailer.avi|14997504|965c013e991ee246d63d45ea71954c4d|/|sources,202.89.123.6:4662|/
180:
eD2k links allow a file to be identified from a link in a web browser and to be downloaded thereafter by a client like eMule,
97:
825:
617:
220:
54:
69:
484:
451:
557:
76:
185:
43:
517:
83:
219:
Like other URI protocols, web browsers can be configured to automatically handle ed2k URIs. After installing an
304:
again using MD4. Otherwise, the MD4 hash of the only chunk of the file is used with no further modifications.
65:
642:
572:
231:
File links are preceded with the "file" token, which indicates that this is a file link, as opposed to a
945:
748:
637:
393:
950:
510:
254:
ed2k://|file|The_Two_Towers-The_Purist_Edit-Trailer.avi|14997504|965c013e991ee246d63d45ea71954c4d|/
874:
693:
612:
533:
916:
173:
251:
and the file size. An example (a link to the 15 MB Purist Edit trailer) is provided below:
216:
on the file to calculate its checksum, depending only from the file content, not from its name.
800:
703:
688:
678:
582:
383:
208:
193:
90:
741:
713:
547:
502:
472:
778:
764:
683:
597:
567:
562:
552:
142:
341:
out of the SHA1 hashes of the 53 blocks, so that the root hash of each block is called a
905:
627:
622:
577:
939:
293:
213:
490:
900:
189:
839:
788:
338:
271:
168:
148:
145:
32:
924:
849:
258:
184:
or any other compatible software. This linking feature was one of the first
647:
426:
286:
138:
879:
869:
793:
388:
248:
181:
164:
17:
296:. It gives a different result than a simple usage of the MD4 algorithm.
783:
367:
PORT – Port where the server is listening for incoming eD2k connections
864:
632:
607:
277:
to help recover the file in case of corruption during file transfer.
884:
859:
854:
844:
834:
733:
708:
592:
478:
357:
token at the beginning of the link and have the following format:
332:
197:
160:
207:
eD2k links include file hashes, as these hashes can be used as a
652:
587:
268:
737:
506:
290:
201:
26:
475:
How to remove the ed2k link protocol association in windows.
141:
used to denote files stored on computers connected to the
496:
914:
893:
821:
771:
661:
540:
247:link. The typical eD2k file link also includes the
57:. Unsourced material may be challenged and removed.
257:eD2k links can also include a reference to the
749:
518:
8:
487:Ed2k link formats supported by emule client.
756:
742:
734:
525:
511:
503:
267:On eMule, the link often contains also an
534:Uniform Resource Identifier (URI) schemes
117:Learn how and when to remove this message
810:
405:
7:
374:ed2k://|server|207.44.222.51|4242|/
364:IP – IP of the server to connect to.
275:|h=H52BRVWPBBTAED5NXQDH2RJDDAKRUWST|
55:adding citations to reliable sources
315:which can be interpreted as either
299:The file data is divided into full
25:
31:
42:needs additional citations for
1:
285:The eD2k hash function is a
493:Tool to create ED2K hashes.
333:eMule § Basic concepts
967:
414:CKnownFile::CreateFromFile
330:
722:
360:ed2k://|server|IP|PORT|/
321:non-full chunk at the end
431:mldonkey.sourceforge.net
159:Many programs, such as
491:ED2K tools - ED2K_Hash
427:"Ed2k-hash - MLDonkey"
479:aMule wiki: ed2k link
456:www.emule-project.net
452:"Corruption Handling"
412:emule source, method
394:Named data networking
188:to be introduced in
51:improve this article
499:eD2k Links Provider
281:eD2k hash algorithm
473:emule forum guides
933:
932:
801:Magnet URI scheme
731:
730:
694:irc / irc6 / ircs
384:Magnet URI scheme
209:unique identifier
167:and the original
127:
126:
119:
101:
66:"Ed2k URI scheme"
16:(Redirected from
958:
758:
751:
744:
735:
527:
520:
513:
504:
460:
459:
448:
442:
441:
439:
437:
423:
417:
415:
410:
356:
246:
242:
238:
234:
227:File link format
122:
115:
111:
108:
102:
100:
59:
35:
27:
21:
966:
965:
961:
960:
959:
957:
956:
955:
936:
935:
934:
929:
910:
889:
823:
817:
806:ed2k URI scheme
779:eDonkey network
767:
765:eDonkey network
762:
732:
727:
718:
657:
536:
531:
469:
464:
463:
450:
449:
445:
435:
433:
425:
424:
420:
413:
411:
407:
402:
380:
375:
361:
354:
351:
335:
329:
313:remainder chunk
283:
265:
255:
244:
240:
236:
232:
229:
157:
123:
112:
106:
103:
60:
58:
48:
36:
23:
22:
15:
12:
11:
5:
964:
962:
954:
953:
948:
938:
937:
931:
930:
928:
927:
921:
919:
912:
911:
909:
908:
906:ShareConnector
903:
897:
895:
894:Indexing sites
891:
890:
888:
887:
882:
877:
872:
867:
862:
857:
852:
847:
842:
837:
831:
829:
819:
818:
816:
815:
814:
813:
803:
798:
797:
796:
786:
781:
775:
773:
769:
768:
763:
761:
760:
753:
746:
738:
729:
728:
723:
720:
719:
717:
716:
711:
706:
701:
696:
691:
686:
681:
676:
671:
665:
663:
659:
658:
656:
655:
650:
645:
640:
635:
630:
625:
620:
615:
610:
605:
600:
595:
590:
585:
580:
575:
570:
565:
560:
555:
550:
544:
542:
538:
537:
532:
530:
529:
522:
515:
507:
501:
500:
494:
488:
482:
476:
468:
467:External links
465:
462:
461:
443:
418:
404:
403:
401:
398:
397:
396:
391:
386:
379:
376:
373:
369:
368:
365:
359:
350:
347:
331:Main article:
328:
325:
317:the last chunk
282:
279:
263:
253:
228:
225:
156:
153:
129:In computing,
125:
124:
39:
37:
30:
24:
14:
13:
10:
9:
6:
4:
3:
2:
963:
952:
949:
947:
944:
943:
941:
926:
923:
922:
920:
918:
913:
907:
904:
902:
899:
898:
896:
892:
886:
883:
881:
878:
876:
873:
871:
868:
866:
863:
861:
858:
856:
853:
851:
848:
846:
843:
841:
838:
836:
833:
832:
830:
827:
820:
812:
809:
808:
807:
804:
802:
799:
795:
792:
791:
790:
787:
785:
782:
780:
777:
776:
774:
770:
766:
759:
754:
752:
747:
745:
740:
739:
736:
726:
725:Protocol list
721:
715:
712:
710:
707:
705:
702:
700:
697:
695:
692:
690:
687:
685:
682:
680:
677:
675:
672:
670:
667:
666:
664:
660:
654:
651:
649:
646:
644:
641:
639:
636:
634:
631:
629:
626:
624:
621:
619:
616:
614:
611:
609:
606:
604:
601:
599:
596:
594:
591:
589:
586:
584:
581:
579:
576:
574:
571:
569:
566:
564:
561:
559:
556:
554:
551:
549:
546:
545:
543:
539:
535:
528:
523:
521:
516:
514:
509:
508:
505:
498:
495:
492:
489:
486:
485:emule project
483:
480:
477:
474:
471:
470:
466:
457:
453:
447:
444:
432:
428:
422:
419:
409:
406:
399:
395:
392:
390:
387:
385:
382:
381:
377:
372:
366:
363:
362:
358:
348:
346:
344:
340:
334:
326:
324:
322:
318:
314:
308:
305:
302:
297:
295:
292:
289:of a list of
288:
280:
278:
276:
273:
270:
262:
260:
252:
250:
226:
224:
222:
217:
215:
214:hash function
210:
205:
203:
199:
195:
191:
187:
183:
178:
176:
175:
170:
166:
162:
154:
152:
150:
147:
144:
140:
136:
132:
121:
118:
110:
99:
96:
92:
89:
85:
82:
78:
75:
71:
68: –
67:
63:
62:Find sources:
56:
52:
46:
45:
40:This article
38:
34:
29:
28:
19:
946:File sharing
901:ShareReactor
805:
673:
455:
446:
434:. Retrieved
430:
421:
408:
370:
352:
349:Server links
342:
336:
320:
316:
312:
309:
306:
300:
298:
284:
274:
266:
256:
230:
218:
206:
194:Magnet links
190:peer-to-peer
179:
172:
158:
134:
130:
128:
113:
104:
94:
87:
80:
73:
61:
49:Please help
44:verification
41:
951:URI schemes
840:eDonkey2000
789:Kad network
643:view-source
497:Phantom P2P
339:Merkle tree
221:eD2k client
174:MetaMachine
169:eDonkey2000
149:P2P network
146:filesharing
940:Categories
925:Razorback2
850:eMule Plus
826:comparison
772:Technology
662:Unofficial
623:sip / sips
400:References
343:block hash
259:IP address
237:serverlist
171:client by
139:hyperlinks
131:eD2k links
77:newspapers
811:eD2k Hash
371:Example:
287:root hash
107:June 2016
18:Ed2k link
880:Shareaza
875:Morpheus
870:MLDonkey
794:Kademlia
648:ws / wss
541:Official
436:23 April
389:Metalink
378:See also
272:top hash
249:filename
241:nodelist
182:Shareaza
165:MLDonkey
917:servers
915:Famous
822:Clients
784:Overnet
155:General
143:eDonkey
135:ed2k://
91:scholar
865:Lphant
704:magnet
689:finger
679:gemini
669:coffee
633:telnet
608:mailto
583:gopher
355:server
301:chunks
294:hashes
245:friend
233:server
137:) are
93:
86:
79:
72:
64:
885:xMule
860:lMule
855:JMule
845:eMule
835:aMule
714:ymsgr
709:rsync
699:ldaps
593:https
548:about
319:or a
198:SHA-1
161:eMule
98:JSTOR
84:books
684:feed
674:ed2k
653:xmpp
618:nntp
603:ldap
598:info
588:http
568:file
563:data
558:crid
553:acct
438:2018
327:AICH
269:AICH
186:URIs
70:news
638:urn
628:tag
613:nfs
578:geo
573:ftp
291:MD4
243:or
202:MD5
200:or
53:by
942::
454:.
429:.
239:,
235:,
163:,
151:.
828:)
824:(
757:e
750:t
743:v
526:e
519:t
512:v
481:.
458:.
440:.
416:.
133:(
120:)
114:(
109:)
105:(
95:·
88:·
81:·
74:·
47:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.