relnote: On server side, do not process the first initial QUIC packet received from a client if the UDP datagram is < 1200 bytes. Instead, send a connection close with PROTOCOL_VIOLATION if the version is supported. Protected by quic_reloadable_flag_quic_donot_process_small_initial_packets.

PiperOrigin-RevId: 270157435
Change-Id: Id0faa750300b2e75c7e87cc05dd8635c580f01ba
diff --git a/quic/core/quic_framer.cc b/quic/core/quic_framer.cc
index e33dc00..84dd00a 100644
--- a/quic/core/quic_framer.cc
+++ b/quic/core/quic_framer.cc
@@ -6303,6 +6303,7 @@
     const QuicEncryptedPacket& packet,
     uint8_t expected_destination_connection_id_length,
     PacketHeaderFormat* format,
+    QuicLongHeaderType* long_packet_type,
     bool* version_present,
     bool* has_length_prefix,
     QuicVersionLabel* version_label,
@@ -6321,12 +6322,11 @@
   const bool ietf_format = QuicUtils::IsIetfPacketHeader(first_byte);
   uint8_t unused_first_byte;
   QuicVariableLengthIntegerLength retry_token_length_length;
-  QuicLongHeaderType unused_log_packet_type;
-  const QuicErrorCode error_code = ParsePublicHeader(
+  QuicErrorCode error_code = ParsePublicHeader(
       &reader, expected_destination_connection_id_length, ietf_format,
       &unused_first_byte, format, version_present, has_length_prefix,
       version_label, parsed_version, destination_connection_id,
-      source_connection_id, &unused_log_packet_type, &retry_token_length_length,
+      source_connection_id, long_packet_type, &retry_token_length_length,
       retry_token, detailed_error);
   *retry_token_present =
       retry_token_length_length != VARIABLE_LENGTH_INTEGER_LENGTH_0;