gfe-relnote: In quic_framer.cc, replace PacketNumberIntervalLength(interval) by interval.Length(). Not protected. Also took the chance to clang-format this file. PiperOrigin-RevId: 278619379 Change-Id: I7ab2b3ff8469fd34bfb4d987539e97b8a23d4cb1
diff --git a/quic/core/quic_framer.cc b/quic/core/quic_framer.cc index 353d4e6..12d7f7c 100644 --- a/quic/core/quic_framer.cc +++ b/quic/core/quic_framer.cc
@@ -148,15 +148,6 @@ return (Delta(target, a) < Delta(target, b)) ? a : b; } -// TODO(wub): Remove this function & replace the callsites to interval.Length(). -uint64_t PacketNumberIntervalLength( - const QuicInterval<QuicPacketNumber>& interval) { - if (interval.Empty()) { - return 0u; - } - return interval.max() - interval.min(); -} - QuicPacketNumberLength ReadSequenceNumberLength(uint8_t flags) { switch (flags & PACKET_FLAGS_8BYTE_PACKET) { case PACKET_FLAGS_8BYTE_PACKET: @@ -1699,12 +1690,11 @@ return true; } if (hp_removal_failed) { - const EncryptionLevel decryption_level = GetEncryptionLevel(*header); - const bool has_decryption_key = - decrypter_[decryption_level] != nullptr; - visitor_->OnUndecryptablePacket( - QuicEncryptedPacket(encrypted_reader->FullPayload()), - decryption_level, has_decryption_key); + const EncryptionLevel decryption_level = GetEncryptionLevel(*header); + const bool has_decryption_key = decrypter_[decryption_level] != nullptr; + visitor_->OnUndecryptablePacket( + QuicEncryptedPacket(encrypted_reader->FullPayload()), + decryption_level, has_decryption_key); set_detailed_error("Unable to decrypt header protection."); return RaiseError(QUIC_DECRYPTION_FAILURE); } @@ -1763,12 +1753,12 @@ visitor_->OnAuthenticatedIetfStatelessResetPacket(packet); return true; } - const EncryptionLevel decryption_level = GetEncryptionLevel(*header); - const bool has_decryption_key = version_.KnowsWhichDecrypterToUse() && - decrypter_[decryption_level] != nullptr; - visitor_->OnUndecryptablePacket( - QuicEncryptedPacket(encrypted_reader->FullPayload()), - decryption_level, has_decryption_key); + const EncryptionLevel decryption_level = GetEncryptionLevel(*header); + const bool has_decryption_key = version_.KnowsWhichDecrypterToUse() && + decrypter_[decryption_level] != nullptr; + visitor_->OnUndecryptablePacket( + QuicEncryptedPacket(encrypted_reader->FullPayload()), decryption_level, + has_decryption_key); set_detailed_error("Unable to decrypt payload."); RecordDroppedPacketReason(DroppedPacketReason::DECRYPTION_FAILURE); return RaiseError(QUIC_DECRYPTION_FAILURE); @@ -1850,13 +1840,13 @@ EncryptionLevel decrypted_level; if (!DecryptPayload(encrypted, associated_data, *header, decrypted_buffer, buffer_length, &decrypted_length, &decrypted_level)) { - const EncryptionLevel decryption_level = decrypter_level_; - // This version uses trial decryption so we always report to our visitor - // that we are not certain we have the correct decryption key. - const bool has_decryption_key = false; - visitor_->OnUndecryptablePacket( - QuicEncryptedPacket(encrypted_reader->FullPayload()), - decryption_level, has_decryption_key); + const EncryptionLevel decryption_level = decrypter_level_; + // This version uses trial decryption so we always report to our visitor + // that we are not certain we have the correct decryption key. + const bool has_decryption_key = false; + visitor_->OnUndecryptablePacket( + QuicEncryptedPacket(encrypted_reader->FullPayload()), decryption_level, + has_decryption_key); RecordDroppedPacketReason(DroppedPacketReason::DECRYPTION_FAILURE); set_detailed_error("Unable to decrypt payload."); return RaiseError(QUIC_DECRYPTION_FAILURE); @@ -2346,7 +2336,7 @@ new_ack_info.first_block_length = frame.packets.LastIntervalLength(); auto itr = frame.packets.rbegin(); QuicPacketNumber previous_start = itr->min(); - new_ack_info.max_block_length = PacketNumberIntervalLength(*itr); + new_ack_info.max_block_length = itr->Length(); ++itr; // Don't do any more work after getting information for 256 ACK blocks; any @@ -2359,8 +2349,8 @@ new_ack_info.num_ack_blocks += (total_gap + std::numeric_limits<uint8_t>::max() - 1) / std::numeric_limits<uint8_t>::max(); - new_ack_info.max_block_length = std::max( - new_ack_info.max_block_length, PacketNumberIntervalLength(interval)); + new_ack_info.max_block_length = + std::max(new_ack_info.max_block_length, interval.Length()); } return new_ack_info; } @@ -5190,8 +5180,8 @@ total_gap - (num_encoded_gaps - 1) * std::numeric_limits<uint8_t>::max(); // Append the final ACK block with a non-empty size. - if (!AppendAckBlock(last_gap, ack_block_length, - PacketNumberIntervalLength(interval), writer)) { + if (!AppendAckBlock(last_gap, ack_block_length, interval.Length(), + writer)) { return false; } ++num_ack_blocks_written;