diff --git a/protocols/autonat/src/v2.rs b/protocols/autonat/src/v2.rs index cdc807ea303..48e9f25f890 100644 --- a/protocols/autonat/src/v2.rs +++ b/protocols/autonat/src/v2.rs @@ -10,7 +10,7 @@ //! server then the dial back puts on the client, thus making the protocol unatractive for an //! attacker. //! -//! The protocol is seperated into two parts: +//! The protocol is separated into two parts: //! - The client part, which is implemented in the `client` module. (The client is the party that //! wants to check if it is reachable from the outside.) //! - The server part, which is implemented in the `server` module. (The server is the party diff --git a/protocols/identify/src/behaviour.rs b/protocols/identify/src/behaviour.rs index 1f82cd154e3..b69f2014d81 100644 --- a/protocols/identify/src/behaviour.rs +++ b/protocols/identify/src/behaviour.rs @@ -360,7 +360,7 @@ impl Behaviour { } // outgoing connection dialed with port reuse - // incomming connection + // incoming connection self.events .push_back(ToSwarm::NewExternalAddrCandidate(observed.clone())); }