diff --git a/matrix_sdk/src/client.rs b/matrix_sdk/src/client.rs index a9102e6c..2545d75c 100644 --- a/matrix_sdk/src/client.rs +++ b/matrix_sdk/src/client.rs @@ -843,7 +843,7 @@ impl Client { /// # use matrix_sdk::Client; /// # use url::Url; /// # block_on(async { - /// # let homeserver = Url::parse("http://locahost:8080").unwrap(); + /// # let homeserver = Url::parse("http://localhost:8080").unwrap(); /// # let client = Client::new(homeserver).unwrap(); /// let path = Path::new("/home/example/selfie.jpg"); /// let mut image = File::open(&path).unwrap(); diff --git a/matrix_sdk_common/src/deserialized_responses.rs b/matrix_sdk_common/src/deserialized_responses.rs index 6ea98046..1a8c28af 100644 --- a/matrix_sdk_common/src/deserialized_responses.rs +++ b/matrix_sdk_common/src/deserialized_responses.rs @@ -59,7 +59,7 @@ pub enum AlgorithmInfo { /// key originally. curve25519_key: String, /// The signing keys that have created the megolm key that was used to - /// decrypt this session. This map will usually contain a signle ed25519 + /// decrypt this session. This map will usually contain a single ed25519 /// key. sender_claimed_keys: BTreeMap, /// Chain of curve25519 keys through which this session was forwarded, diff --git a/matrix_sdk_crypto/src/file_encryption/attachments.rs b/matrix_sdk_crypto/src/file_encryption/attachments.rs index 14d7b75c..d163c780 100644 --- a/matrix_sdk_crypto/src/file_encryption/attachments.rs +++ b/matrix_sdk_crypto/src/file_encryption/attachments.rs @@ -55,7 +55,7 @@ impl<'a, R: Read> Read for AttachmentDecryptor<'a, R> { if hash.as_slice() == self.expected_hash.as_slice() { Ok(0) } else { - Err(IoError::new(ErrorKind::Other, "Hash missmatch while decrypting")) + Err(IoError::new(ErrorKind::Other, "Hash mismatch while decrypting")) } } else { self.sha.update(&buf[0..read_bytes]); diff --git a/matrix_sdk_crypto/src/olm/group_sessions/outbound.rs b/matrix_sdk_crypto/src/olm/group_sessions/outbound.rs index 513e81da..fc24d369 100644 --- a/matrix_sdk_crypto/src/olm/group_sessions/outbound.rs +++ b/matrix_sdk_crypto/src/olm/group_sessions/outbound.rs @@ -75,7 +75,7 @@ pub struct EncryptionSettings { pub rotation_period: Duration, /// How many messages should be sent before changing the session. pub rotation_period_msgs: u64, - /// The history visibilty of the room when the session was created. + /// The history visibility of the room when the session was created. pub history_visibility: HistoryVisibility, } diff --git a/matrix_sdk_crypto/src/olm/signing/mod.rs b/matrix_sdk_crypto/src/olm/signing/mod.rs index 8b1de7f2..7f4581cd 100644 --- a/matrix_sdk_crypto/src/olm/signing/mod.rs +++ b/matrix_sdk_crypto/src/olm/signing/mod.rs @@ -42,7 +42,7 @@ use crate::{ /// This object holds the private and public ed25519 key triplet that is used /// for cross signing. /// -/// The object might be comletely empty or have only some of the key pairs +/// The object might be completely empty or have only some of the key pairs /// available. /// /// It can be used to sign devices or other identities. diff --git a/matrix_sdk_crypto/src/verification/mod.rs b/matrix_sdk_crypto/src/verification/mod.rs index 736b9656..3335ec72 100644 --- a/matrix_sdk_crypto/src/verification/mod.rs +++ b/matrix_sdk_crypto/src/verification/mod.rs @@ -73,7 +73,7 @@ impl From for Verification { /// The verification state indicating that the verification finished /// successfully. /// -/// We can now mark the device in our verified devices lits as verified and sign +/// We can now mark the device in our verified devices list as verified and sign /// the master keys in the verified devices list. #[derive(Clone, Debug)] pub struct Done { diff --git a/matrix_sdk_crypto/src/verification/sas/sas_state.rs b/matrix_sdk_crypto/src/verification/sas/sas_state.rs index 96373f38..f3d82488 100644 --- a/matrix_sdk_crypto/src/verification/sas/sas_state.rs +++ b/matrix_sdk_crypto/src/verification/sas/sas_state.rs @@ -177,7 +177,7 @@ impl Default for AcceptedProtocols { /// A type level state machine modeling the Sas flow. /// -/// This is the generic struc holding common data between the different states +/// This is the generic struct holding common data between the different states /// and the specific state. #[derive(Clone)] pub struct SasState {