@@ -308,7 +308,7 @@ func (s) TestEnd2End(t *testing.T) {
308308 // The mutual authentication works at the beginning, since ClientCert1
309309 // trusted by ServerTrust1, ServerCert1 by ClientTrust1, and also the
310310 // custom verification check on server side allows all connections.
311- // At stage 1, server disallows the the connections by setting custom
311+ // At stage 1, server disallows the connections by setting custom
312312 // verification check. The following calls should fail. Previous
313313 // connections should not be affected.
314314 // At stage 2, server allows all the connections again and the
@@ -555,7 +555,7 @@ func createProviders(tmpFiles *tmpCredsFiles) (certprovider.Provider, certprovid
555555// Next, we change the identity certs that IdentityProvider is watching. Since
556556// the identity key is not changed, the IdentityProvider should ignore the
557557// update, and the connection should still be good.
558- // Then the the identity key is changed. This time IdentityProvider should pick
558+ // Then the identity key is changed. This time IdentityProvider should pick
559559// up the update, and the connection should fail, due to the trust certs on the
560560// other side is not changed.
561561// Finally, the trust certs that other-side's RootProvider is watching get
0 commit comments