Skip to content

Commit d2408a1

Browse files
bradfitzgopherbot
authored andcommitted
_content/doc/go1.23: fix a typo and some formatting
Updates golang/go#65614 Change-Id: I46b53e25a3f81aaecbdef74f02bcafd341530b23 Reviewed-on: https://go-review.googlesource.com/c/website/+/601995 Auto-Submit: Brad Fitzpatrick <[email protected]> Reviewed-by: Dmitri Shuralyov <[email protected]> Reviewed-by: Michael Knyszek <[email protected]> Reviewed-by: Dmitri Shuralyov <[email protected]> LUCI-TryBot-Result: Go LUCI <[email protected]>
1 parent aabfe33 commit d2408a1

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

_content/doc/go1.23.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -292,12 +292,12 @@ The new `x509keypairleaf` [GODEBUG setting](/doc/godebug) is added for this beha
292292

293293
#### [`crypto/x509`](/pkg/crypto/x509/)
294294

295-
[`CreateCertificateRequest`](/pkg/crypto/x509#CreateCertificateRequest) now correct supports RSA-PSS signature algorithms.
295+
[`CreateCertificateRequest`](/pkg/crypto/x509#CreateCertificateRequest) now correctly supports RSA-PSS signature algorithms.
296296

297297
[`CreateCertificateRequest`](/pkg/crypto/x509#CreateCertificateRequest) and [`CreateRevocationList`](/pkg/crypto/x509#CreateRevocationList) now verify the generated signature using the signer’s public key. If the signature is invalid, an error is returned. This has been the behavior of [`CreateCertificate`](/pkg/crypto/x509#CreateCertificate) since Go 1.16.
298298

299299
The [`x509sha1` GODEBUG setting](/pkg/crypto/x509#InsecureAlgorithmError) will
300-
be removed in the next Go major release (Go 1.24). This will mean that crypto/x509
300+
be removed in the next Go major release (Go 1.24). This will mean that `crypto/x509`
301301
will no longer support verifying signatures on certificates that use SHA-1 based
302302
signature algorithms.
303303

@@ -424,7 +424,7 @@ In Go 1.22 and earlier, using
424424
[`reflect.DeepEqual`](/pkg/reflect#DeepEqual) to compare an
425425
[`Addr`](/pkg/net/netip#Addr) holding an IPv4 address to one holding
426426
the IPv4-mapped IPv6 form of that address incorrectly returned true,
427-
although the `Addr` values were different when comparing with `==` or
427+
even though the `Addr` values were different when comparing with `==` or
428428
[`Addr.Compare`](/pkg/net/netip#Addr.Compare).
429429
This bug is now fixed and all three approaches now report the same
430430
result.
@@ -470,7 +470,7 @@ Previous versions default to `winreadlinkvolume=0`.
470470

471471
#### [`reflect`](/pkg/reflect/)
472472

473-
The new methods synonymous with the method of the same name
473+
The new methods synonymous with the methods of the same name
474474
in [`Value`](/pkg/reflect#Value) are added to [`Type`](/pkg/reflect#Type):
475475
1. [`Type.OverflowComplex`](/pkg/reflect#Type.OverflowComplex)
476476
2. [`Type.OverflowFloat`](/pkg/reflect#Type.OverflowFloat)
@@ -498,7 +498,7 @@ unexpected crashes, not just those in goroutines that explicitly use
498498

499499
#### [`runtime/pprof`](/pkg/runtime/pprof/)
500500

501-
The maximum stack depth for alloc, mutex, block, threadcreate and goroutine
501+
The maximum stack depth for `alloc`, `mutex`, `block`, `threadcreate` and `goroutine`
502502
profiles has been raised from 32 to 128 frames.
503503

504504
#### [`runtime/trace`](/pkg/runtime/trace/)

0 commit comments

Comments
 (0)