aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRob Pike <r@golang.org>2014-10-29 13:07:34 -0700
committerRob Pike <r@golang.org>2014-10-29 13:07:34 -0700
commit97b24a05dff7adef3a0fb463a575b705be985468 (patch)
treedf783884d5cc9cddd4ec159a83cd16c439ac6e9e
parenta22c11b9957cf3f0d66dd6d1d38172d5ac0ec54a (diff)
downloadgo-97b24a05dff7adef3a0fb463a575b705be985468.tar.gz
go-97b24a05dff7adef3a0fb463a575b705be985468.zip
doc/go1.4.html: gccgo status
LGTM=iant, cmang R=cmang, iant, rsc CC=golang-codereviews https://golang.org/cl/169760043
-rw-r--r--doc/go1.4.html17
1 files changed, 8 insertions, 9 deletions
diff --git a/doc/go1.4.html b/doc/go1.4.html
index 9fa86c31ae..e2458f2efe 100644
--- a/doc/go1.4.html
+++ b/doc/go1.4.html
@@ -18,8 +18,7 @@ Stacks are now contiguous, reallocated when necessary rather than linking on new
"segments";
this release therefore eliminates the notorious "hot stack split" problem.
There are some new tools available including support in the <code>go</code> command
-for build-time source code generation
-and TODO.
+for build-time source code generation.
The release also adds support for ARM processors on Android and Native Client (NaCl)
and AMD64 on Plan 9.
As always, Go 1.4 keeps the <a href="/doc/go1compat.html">promise
@@ -281,7 +280,9 @@ More information about these changes is in the <a href="/doc/asm">assembly docum
<h3 id="gccgo">Status of gccgo</h3>
<p>
-TODO gccgo news
+The release schedules for the GCC and Go projects do not coincide.
+GCC release 4.9 contains the Go 1.2 version of gccgo.
+The next release, GCC 5, will likely have the Go 1.4 version of gccgo.
</p>
<h3 id="internalpackages">Internal packages</h3>
@@ -593,13 +594,11 @@ of the <a href="/pkg/crypo/tls/#Config"><code>Config</code></a> struct.
</li>
<li>
-Also in the <a href="/pkg/crypto/tls/"><code>crypto/tls</code></a> package,
-the server now supports
+Also in the crypto/tls package, the server now supports
<a href="https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00">TLS_FALLBACK_SCSV</a>
-to help clients detect fallback attacks like
-<a href="http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html">POODLE</a>.
-(The crypto/tls package's client has never supported SSLv3, so it is not
-vulnerable to the POODLE attack.)
+to help clients detect fallback attacks.
+(The Go client does not support fallback at all, so it is not vulnerable to
+those attacks.)
</li>
<li>