summaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorRob Pike <r@golang.org>2014-10-29 13:07:34 -0700
committerRob Pike <r@golang.org>2014-10-29 13:07:34 -0700
commit1cba7318285036b440adcb10e1a8a478bf4da498 (patch)
tree8be7c614772ae12bcfddf308f6654154f3b16238 /doc
parent166ba836a61c401a93d2064899743ce46c8440aa (diff)
downloadgo-1cba7318285036b440adcb10e1a8a478bf4da498.tar.gz
doc/go1.4.html: gccgo status
LGTM=iant, cmang R=cmang, iant, rsc CC=golang-codereviews https://codereview.appspot.com/169760043
Diffstat (limited to 'doc')
-rw-r--r--doc/go1.4.html17
1 files changed, 8 insertions, 9 deletions
diff --git a/doc/go1.4.html b/doc/go1.4.html
index 9fa86c31a..e2458f2ef 100644
--- a/doc/go1.4.html
+++ b/doc/go1.4.html
@@ -18,8 +18,7 @@ Stacks are now contiguous, reallocated when necessary rather than linking on new
"segments";
this release therefore eliminates the notorious "hot stack split" problem.
There are some new tools available including support in the <code>go</code> command
-for build-time source code generation
-and TODO.
+for build-time source code generation.
The release also adds support for ARM processors on Android and Native Client (NaCl)
and AMD64 on Plan 9.
As always, Go 1.4 keeps the <a href="/doc/go1compat.html">promise
@@ -281,7 +280,9 @@ More information about these changes is in the <a href="/doc/asm">assembly docum
<h3 id="gccgo">Status of gccgo</h3>
<p>
-TODO gccgo news
+The release schedules for the GCC and Go projects do not coincide.
+GCC release 4.9 contains the Go 1.2 version of gccgo.
+The next release, GCC 5, will likely have the Go 1.4 version of gccgo.
</p>
<h3 id="internalpackages">Internal packages</h3>
@@ -593,13 +594,11 @@ of the <a href="/pkg/crypo/tls/#Config"><code>Config</code></a> struct.
</li>
<li>
-Also in the <a href="/pkg/crypto/tls/"><code>crypto/tls</code></a> package,
-the server now supports
+Also in the crypto/tls package, the server now supports
<a href="https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00">TLS_FALLBACK_SCSV</a>
-to help clients detect fallback attacks like
-<a href="http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html">POODLE</a>.
-(The crypto/tls package's client has never supported SSLv3, so it is not
-vulnerable to the POODLE attack.)
+to help clients detect fallback attacks.
+(The Go client does not support fallback at all, so it is not vulnerable to
+those attacks.)
</li>
<li>