gfe-relnote: Rename quic::ProofSource::SessionTicketCrypter to GetTicketCrypter. No behavior change.
PiperOrigin-RevId: 308668421
Change-Id: I8f7e6a426e4d1131097c5ee6b0f6e2959ab81974
diff --git a/quic/core/crypto/proof_source.h b/quic/core/crypto/proof_source.h
index 60829a9..9757099 100644
--- a/quic/core/crypto/proof_source.h
+++ b/quic/core/crypto/proof_source.h
@@ -191,7 +191,7 @@
// TicketCrypter returned (if not nullptr) must be valid for the lifetime of
// the ProofSource, and the caller does not take ownership of said
// TicketCrypter.
- virtual TicketCrypter* SessionTicketCrypter() = 0;
+ virtual TicketCrypter* GetTicketCrypter() = 0;
};
} // namespace quic
diff --git a/quic/core/crypto/proof_source_x509.cc b/quic/core/crypto/proof_source_x509.cc
index 6caf384..89c4c43 100644
--- a/quic/core/crypto/proof_source_x509.cc
+++ b/quic/core/crypto/proof_source_x509.cc
@@ -77,7 +77,7 @@
callback->Run(/*ok=*/!signature.empty(), signature, nullptr);
}
-ProofSource::TicketCrypter* ProofSourceX509::SessionTicketCrypter() {
+ProofSource::TicketCrypter* ProofSourceX509::GetTicketCrypter() {
return nullptr;
}
diff --git a/quic/core/crypto/proof_source_x509.h b/quic/core/crypto/proof_source_x509.h
index 1fdb81b..f9a6796 100644
--- a/quic/core/crypto/proof_source_x509.h
+++ b/quic/core/crypto/proof_source_x509.h
@@ -42,7 +42,7 @@
uint16_t signature_algorithm,
quiche::QuicheStringPiece in,
std::unique_ptr<SignatureCallback> callback) override;
- TicketCrypter* SessionTicketCrypter() override;
+ TicketCrypter* GetTicketCrypter() override;
// Adds a certificate chain to the verifier. Returns false if the chain is
// not valid. Newer certificates will override older certificates with the
diff --git a/quic/core/crypto/tls_server_connection.cc b/quic/core/crypto/tls_server_connection.cc
index b647ecc..7e5b366 100644
--- a/quic/core/crypto/tls_server_connection.cc
+++ b/quic/core/crypto/tls_server_connection.cc
@@ -21,10 +21,10 @@
SSL_CTX_set_tlsext_servername_callback(ssl_ctx.get(),
&SelectCertificateCallback);
SSL_CTX_set_alpn_select_cb(ssl_ctx.get(), &SelectAlpnCallback, nullptr);
- // We don't actually need the SessionTicketCrypter here, but we need to know
+ // We don't actually need the TicketCrypter here, but we need to know
// whether it's set.
if (GetQuicReloadableFlag(quic_enable_tls_resumption) &&
- proof_source->SessionTicketCrypter()) {
+ proof_source->GetTicketCrypter()) {
SSL_CTX_set_ticket_aead_method(ssl_ctx.get(),
&TlsServerConnection::kSessionTicketMethod);
} else {
diff --git a/quic/core/quic_crypto_client_handshaker_test.cc b/quic/core/quic_crypto_client_handshaker_test.cc
index 1e49f5f..a74d7e7 100644
--- a/quic/core/quic_crypto_client_handshaker_test.cc
+++ b/quic/core/quic_crypto_client_handshaker_test.cc
@@ -100,7 +100,7 @@
callback->Run(true, "Dummy signature", /*details=*/nullptr);
}
- TicketCrypter* SessionTicketCrypter() override { return nullptr; }
+ TicketCrypter* GetTicketCrypter() override { return nullptr; }
};
class Handshaker : public QuicCryptoClientHandshaker {
diff --git a/quic/core/tls_server_handshaker.cc b/quic/core/tls_server_handshaker.cc
index 108bc5a..cef5efe 100644
--- a/quic/core/tls_server_handshaker.cc
+++ b/quic/core/tls_server_handshaker.cc
@@ -417,20 +417,19 @@
}
size_t TlsServerHandshaker::SessionTicketMaxOverhead() {
- DCHECK(proof_source_->SessionTicketCrypter());
- return proof_source_->SessionTicketCrypter()->MaxOverhead();
+ DCHECK(proof_source_->GetTicketCrypter());
+ return proof_source_->GetTicketCrypter()->MaxOverhead();
}
int TlsServerHandshaker::SessionTicketSeal(uint8_t* out,
size_t* out_len,
size_t max_out_len,
quiche::QuicheStringPiece in) {
- DCHECK(proof_source_->SessionTicketCrypter());
- std::vector<uint8_t> ticket =
- proof_source_->SessionTicketCrypter()->Encrypt(in);
+ DCHECK(proof_source_->GetTicketCrypter());
+ std::vector<uint8_t> ticket = proof_source_->GetTicketCrypter()->Encrypt(in);
if (max_out_len < ticket.size()) {
QUIC_BUG
- << "SessionTicketCrypter returned " << ticket.size()
+ << "TicketCrypter returned " << ticket.size()
<< " bytes of ciphertext, which is larger than its max overhead of "
<< max_out_len;
return 0; // failure
@@ -445,11 +444,11 @@
size_t* out_len,
size_t max_out_len,
quiche::QuicheStringPiece in) {
- DCHECK(proof_source_->SessionTicketCrypter());
+ DCHECK(proof_source_->GetTicketCrypter());
if (!ticket_decryption_callback_) {
ticket_decryption_callback_ = new DecryptCallback(this);
- proof_source_->SessionTicketCrypter()->Decrypt(
+ proof_source_->GetTicketCrypter()->Decrypt(
in, std::unique_ptr<DecryptCallback>(ticket_decryption_callback_));
// Decrypt can run the callback synchronously. In that case, the callback
// will clear the ticket_decryption_callback_ pointer, and instead of