Replace gfe2_reloadable_flag_quic_enable_zero_rtt_for_tls with gfe2_restart_flag_quic_enable_zero_rtt_for_tls_v2

PiperOrigin-RevId: 323869022
Change-Id: I94b28b05adfba5e554be44154064fd19da91e166
diff --git a/quic/core/crypto/quic_crypto_client_config.cc b/quic/core/crypto/quic_crypto_client_config.cc
index 4680785..1b1c595 100644
--- a/quic/core/crypto/quic_crypto_client_config.cc
+++ b/quic/core/crypto/quic_crypto_client_config.cc
@@ -68,7 +68,7 @@
     : proof_verifier_(std::move(proof_verifier)),
       session_cache_(std::move(session_cache)),
       ssl_ctx_(TlsClientConnection::CreateSslCtx(
-          GetQuicReloadableFlag(quic_enable_zero_rtt_for_tls))),
+          GetQuicRestartFlag(quic_enable_zero_rtt_for_tls_v2))),
       disable_chlo_padding_(GetQuicReloadableFlag(quic_dont_pad_chlo)) {
   DCHECK(proof_verifier_.get());
   SetDefaults();
diff --git a/quic/core/crypto/tls_server_connection.cc b/quic/core/crypto/tls_server_connection.cc
index f9661d4..69c5a82 100644
--- a/quic/core/crypto/tls_server_connection.cc
+++ b/quic/core/crypto/tls_server_connection.cc
@@ -29,7 +29,7 @@
     SSL_CTX_set_ticket_aead_method(ssl_ctx.get(),
                                    &TlsServerConnection::kSessionTicketMethod);
     QUIC_CODE_COUNT_N(quic_tls_resumption_ticket_method, 1, 2);
-    if (GetQuicReloadableFlag(quic_enable_zero_rtt_for_tls)) {
+    if (GetQuicRestartFlag(quic_enable_zero_rtt_for_tls_v2)) {
       SSL_CTX_set_early_data_enabled(ssl_ctx.get(), 1);
     }
   } else {
diff --git a/quic/core/http/end_to_end_test.cc b/quic/core/http/end_to_end_test.cc
index b6aefef..8125724 100644
--- a/quic/core/http/end_to_end_test.cc
+++ b/quic/core/http/end_to_end_test.cc
@@ -204,7 +204,7 @@
 
     SetQuicReloadableFlag(quic_support_handshake_done_in_t050, true);
     SetQuicRestartFlag(quic_enable_tls_resumption_v3, true);
-    SetQuicReloadableFlag(quic_enable_zero_rtt_for_tls, true);
+    SetQuicRestartFlag(quic_enable_zero_rtt_for_tls_v2, true);
   }
 
   ~EndToEndTest() override { QuicRecyclePort(server_address_.port()); }
diff --git a/quic/core/http/quic_server_session_base.cc b/quic/core/http/quic_server_session_base.cc
index ef367d9..805816e 100644
--- a/quic/core/http/quic_server_session_base.cc
+++ b/quic/core/http/quic_server_session_base.cc
@@ -39,7 +39,7 @@
   crypto_stream_ =
       CreateQuicCryptoServerStream(crypto_config_, compressed_certs_cache_);
   QuicSpdySession::Initialize();
-  if (GetQuicReloadableFlag(quic_enable_zero_rtt_for_tls)) {
+  if (GetQuicRestartFlag(quic_enable_zero_rtt_for_tls_v2)) {
     SendSettingsToCryptoStream();
   }
 }
diff --git a/quic/core/http/quic_spdy_client_session_test.cc b/quic/core/http/quic_spdy_client_session_test.cc
index 01e4e85..63e373b 100644
--- a/quic/core/http/quic_spdy_client_session_test.cc
+++ b/quic/core/http/quic_spdy_client_session_test.cc
@@ -97,7 +97,7 @@
     auto client_cache = std::make_unique<test::SimpleSessionCache>();
     client_session_cache_ = client_cache.get();
     SetQuicRestartFlag(quic_enable_tls_resumption_v3, true);
-    SetQuicReloadableFlag(quic_enable_zero_rtt_for_tls, true);
+    SetQuicRestartFlag(quic_enable_zero_rtt_for_tls_v2, true);
     SetQuicReloadableFlag(quic_fix_gquic_stream_type, true);
     client_crypto_config_ = std::make_unique<QuicCryptoClientConfig>(
         crypto_test_utils::ProofVerifierForTesting(), std::move(client_cache));
diff --git a/quic/core/http/quic_spdy_session.cc b/quic/core/http/quic_spdy_session.cc
index e3f6dcf..11ad810 100644
--- a/quic/core/http/quic_spdy_session.cc
+++ b/quic/core/http/quic_spdy_session.cc
@@ -950,7 +950,7 @@
         // Communicate |value| to encoder, because it is used for encoding
         // Required Insert Count.
         bool success = qpack_encoder_->SetMaximumDynamicTableCapacity(value);
-        if (GetQuicReloadableFlag(quic_enable_zero_rtt_for_tls) && !success) {
+        if (GetQuicRestartFlag(quic_enable_zero_rtt_for_tls_v2) && !success) {
           CloseConnectionWithDetails(
               was_zero_rtt_rejected()
                   ? QUIC_HTTP_ZERO_RTT_REJECTION_SETTINGS_MISMATCH
@@ -974,7 +974,7 @@
         QUIC_DVLOG(1) << ENDPOINT
                       << "SETTINGS_MAX_HEADER_LIST_SIZE received with value "
                       << value;
-        if (GetQuicReloadableFlag(quic_enable_zero_rtt_for_tls) &&
+        if (GetQuicRestartFlag(quic_enable_zero_rtt_for_tls_v2) &&
             max_outbound_header_list_size_ !=
                 std::numeric_limits<size_t>::max() &&
             max_outbound_header_list_size_ > value) {
@@ -998,7 +998,7 @@
                       << "SETTINGS_QPACK_BLOCKED_STREAMS received with value "
                       << value;
         bool success = qpack_encoder_->SetMaximumBlockedStreams(value);
-        if (GetQuicReloadableFlag(quic_enable_zero_rtt_for_tls) && !success) {
+        if (GetQuicRestartFlag(quic_enable_zero_rtt_for_tls_v2) && !success) {
           CloseConnectionWithDetails(
               was_zero_rtt_rejected()
                   ? QUIC_HTTP_ZERO_RTT_REJECTION_SETTINGS_MISMATCH
diff --git a/quic/core/quic_session.cc b/quic/core/quic_session.cc
index 694d76e..16d030c 100644
--- a/quic/core/quic_session.cc
+++ b/quic/core/quic_session.cc
@@ -1029,7 +1029,7 @@
 void QuicSession::OnConfigNegotiated() {
   // In versions with TLS, the configs will be set twice if 0-RTT is available.
   // In the second config setting, 1-RTT keys are guaranteed to be available.
-  if (GetQuicReloadableFlag(quic_enable_zero_rtt_for_tls) &&
+  if (GetQuicRestartFlag(quic_enable_zero_rtt_for_tls_v2) &&
       version().UsesTls() && is_configured_ &&
       connection_->encryption_level() != ENCRYPTION_FORWARD_SECURE) {
     QUIC_BUG
@@ -1248,7 +1248,7 @@
   // Or if this session is configured on TLS enabled QUIC versions,
   // attempt to retransmit 0-RTT data if there's any.
   if (connection_->version().AllowsLowFlowControlLimits() ||
-      (GetQuicReloadableFlag(quic_enable_zero_rtt_for_tls) &&
+      (GetQuicRestartFlag(quic_enable_zero_rtt_for_tls_v2) &&
        version().UsesTls())) {
     OnCanWrite();
   }
diff --git a/quic/core/quic_versions.cc b/quic/core/quic_versions.cc
index 57b64ae..7e7cc7f 100644
--- a/quic/core/quic_versions.cc
+++ b/quic/core/quic_versions.cc
@@ -705,7 +705,7 @@
 void QuicVersionInitializeSupportForIetfDraft() {
   // Enable necessary flags.
   SetQuicRestartFlag(quic_enable_tls_resumption_v3, true);
-  SetQuicReloadableFlag(quic_enable_zero_rtt_for_tls, true);
+  SetQuicRestartFlag(quic_enable_zero_rtt_for_tls_v2, true);
 }
 
 void QuicEnableVersion(const ParsedQuicVersion& version) {
diff --git a/quic/core/tls_client_handshaker_test.cc b/quic/core/tls_client_handshaker_test.cc
index 6fa5aa3..87afeb8 100644
--- a/quic/core/tls_client_handshaker_test.cc
+++ b/quic/core/tls_client_handshaker_test.cc
@@ -175,7 +175,7 @@
         server_compressed_certs_cache_(
             QuicCompressedCertsCache::kQuicCompressedCertsCacheSize) {
     SetQuicRestartFlag(quic_enable_tls_resumption_v3, true);
-    SetQuicReloadableFlag(quic_enable_zero_rtt_for_tls, true);
+    SetQuicRestartFlag(quic_enable_zero_rtt_for_tls_v2, true);
     crypto_config_ = std::make_unique<QuicCryptoClientConfig>(
         std::make_unique<TestProofVerifier>(),
         std::make_unique<test::SimpleSessionCache>());
diff --git a/quic/core/tls_server_handshaker.cc b/quic/core/tls_server_handshaker.cc
index f4c4a8a..518632d 100644
--- a/quic/core/tls_server_handshaker.cc
+++ b/quic/core/tls_server_handshaker.cc
@@ -381,7 +381,7 @@
     // FinishHandshake, we don't have any confirmation that the client is live,
     // so all end of handshake processing is deferred until the handshake is
     // actually complete.
-    QUIC_RELOADABLE_FLAG_COUNT(quic_enable_zero_rtt_for_tls);
+    QUIC_RESTART_FLAG_COUNT(quic_enable_zero_rtt_for_tls_v2);
     return;
   }
   if (!valid_alpn_received_) {
diff --git a/quic/core/tls_server_handshaker_test.cc b/quic/core/tls_server_handshaker_test.cc
index 752719e..c1e5a89 100644
--- a/quic/core/tls_server_handshaker_test.cc
+++ b/quic/core/tls_server_handshaker_test.cc
@@ -49,7 +49,7 @@
             QuicCompressedCertsCache::kQuicCompressedCertsCacheSize),
         server_id_(kServerHostname, kServerPort, false) {
     SetQuicRestartFlag(quic_enable_tls_resumption_v3, true);
-    SetQuicReloadableFlag(quic_enable_zero_rtt_for_tls, true);
+    SetQuicRestartFlag(quic_enable_zero_rtt_for_tls_v2, true);
     client_crypto_config_ = std::make_unique<QuicCryptoClientConfig>(
         crypto_test_utils::ProofVerifierForTesting(),
         std::make_unique<test::SimpleSessionCache>());