diff options
author | Rob Pike <r@golang.org> | 2014-10-29 13:07:34 -0700 |
---|---|---|
committer | Rob Pike <r@golang.org> | 2014-10-29 13:07:34 -0700 |
commit | 1cba7318285036b440adcb10e1a8a478bf4da498 (patch) | |
tree | 8be7c614772ae12bcfddf308f6654154f3b16238 /doc | |
parent | 166ba836a61c401a93d2064899743ce46c8440aa (diff) | |
download | go-1cba7318285036b440adcb10e1a8a478bf4da498.tar.gz |
doc/go1.4.html: gccgo status
LGTM=iant, cmang
R=cmang, iant, rsc
CC=golang-codereviews
https://codereview.appspot.com/169760043
Diffstat (limited to 'doc')
-rw-r--r-- | doc/go1.4.html | 17 |
1 files changed, 8 insertions, 9 deletions
diff --git a/doc/go1.4.html b/doc/go1.4.html index 9fa86c31a..e2458f2ef 100644 --- a/doc/go1.4.html +++ b/doc/go1.4.html @@ -18,8 +18,7 @@ Stacks are now contiguous, reallocated when necessary rather than linking on new "segments"; this release therefore eliminates the notorious "hot stack split" problem. There are some new tools available including support in the <code>go</code> command -for build-time source code generation -and TODO. +for build-time source code generation. The release also adds support for ARM processors on Android and Native Client (NaCl) and AMD64 on Plan 9. As always, Go 1.4 keeps the <a href="/doc/go1compat.html">promise @@ -281,7 +280,9 @@ More information about these changes is in the <a href="/doc/asm">assembly docum <h3 id="gccgo">Status of gccgo</h3> <p> -TODO gccgo news +The release schedules for the GCC and Go projects do not coincide. +GCC release 4.9 contains the Go 1.2 version of gccgo. +The next release, GCC 5, will likely have the Go 1.4 version of gccgo. </p> <h3 id="internalpackages">Internal packages</h3> @@ -593,13 +594,11 @@ of the <a href="/pkg/crypo/tls/#Config"><code>Config</code></a> struct. </li> <li> -Also in the <a href="/pkg/crypto/tls/"><code>crypto/tls</code></a> package, -the server now supports +Also in the crypto/tls package, the server now supports <a href="https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00">TLS_FALLBACK_SCSV</a> -to help clients detect fallback attacks like -<a href="http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html">POODLE</a>. -(The crypto/tls package's client has never supported SSLv3, so it is not -vulnerable to the POODLE attack.) +to help clients detect fallback attacks. +(The Go client does not support fallback at all, so it is not vulnerable to +those attacks.) </li> <li> |