gfe-relnote: Rename quic::ProofSource::SessionTicketCrypter to GetTicketCrypter. No behavior change.
PiperOrigin-RevId: 308668421
Change-Id: I8f7e6a426e4d1131097c5ee6b0f6e2959ab81974
diff --git a/quic/core/crypto/proof_source.h b/quic/core/crypto/proof_source.h
index 60829a9..9757099 100644
--- a/quic/core/crypto/proof_source.h
+++ b/quic/core/crypto/proof_source.h
@@ -191,7 +191,7 @@
// TicketCrypter returned (if not nullptr) must be valid for the lifetime of
// the ProofSource, and the caller does not take ownership of said
// TicketCrypter.
- virtual TicketCrypter* SessionTicketCrypter() = 0;
+ virtual TicketCrypter* GetTicketCrypter() = 0;
};
} // namespace quic
diff --git a/quic/core/crypto/proof_source_x509.cc b/quic/core/crypto/proof_source_x509.cc
index 6caf384..89c4c43 100644
--- a/quic/core/crypto/proof_source_x509.cc
+++ b/quic/core/crypto/proof_source_x509.cc
@@ -77,7 +77,7 @@
callback->Run(/*ok=*/!signature.empty(), signature, nullptr);
}
-ProofSource::TicketCrypter* ProofSourceX509::SessionTicketCrypter() {
+ProofSource::TicketCrypter* ProofSourceX509::GetTicketCrypter() {
return nullptr;
}
diff --git a/quic/core/crypto/proof_source_x509.h b/quic/core/crypto/proof_source_x509.h
index 1fdb81b..f9a6796 100644
--- a/quic/core/crypto/proof_source_x509.h
+++ b/quic/core/crypto/proof_source_x509.h
@@ -42,7 +42,7 @@
uint16_t signature_algorithm,
quiche::QuicheStringPiece in,
std::unique_ptr<SignatureCallback> callback) override;
- TicketCrypter* SessionTicketCrypter() override;
+ TicketCrypter* GetTicketCrypter() override;
// Adds a certificate chain to the verifier. Returns false if the chain is
// not valid. Newer certificates will override older certificates with the
diff --git a/quic/core/crypto/tls_server_connection.cc b/quic/core/crypto/tls_server_connection.cc
index b647ecc..7e5b366 100644
--- a/quic/core/crypto/tls_server_connection.cc
+++ b/quic/core/crypto/tls_server_connection.cc
@@ -21,10 +21,10 @@
SSL_CTX_set_tlsext_servername_callback(ssl_ctx.get(),
&SelectCertificateCallback);
SSL_CTX_set_alpn_select_cb(ssl_ctx.get(), &SelectAlpnCallback, nullptr);
- // We don't actually need the SessionTicketCrypter here, but we need to know
+ // We don't actually need the TicketCrypter here, but we need to know
// whether it's set.
if (GetQuicReloadableFlag(quic_enable_tls_resumption) &&
- proof_source->SessionTicketCrypter()) {
+ proof_source->GetTicketCrypter()) {
SSL_CTX_set_ticket_aead_method(ssl_ctx.get(),
&TlsServerConnection::kSessionTicketMethod);
} else {
diff --git a/quic/core/quic_crypto_client_handshaker_test.cc b/quic/core/quic_crypto_client_handshaker_test.cc
index 1e49f5f..a74d7e7 100644
--- a/quic/core/quic_crypto_client_handshaker_test.cc
+++ b/quic/core/quic_crypto_client_handshaker_test.cc
@@ -100,7 +100,7 @@
callback->Run(true, "Dummy signature", /*details=*/nullptr);
}
- TicketCrypter* SessionTicketCrypter() override { return nullptr; }
+ TicketCrypter* GetTicketCrypter() override { return nullptr; }
};
class Handshaker : public QuicCryptoClientHandshaker {
diff --git a/quic/core/tls_server_handshaker.cc b/quic/core/tls_server_handshaker.cc
index 108bc5a..cef5efe 100644
--- a/quic/core/tls_server_handshaker.cc
+++ b/quic/core/tls_server_handshaker.cc
@@ -417,20 +417,19 @@
}
size_t TlsServerHandshaker::SessionTicketMaxOverhead() {
- DCHECK(proof_source_->SessionTicketCrypter());
- return proof_source_->SessionTicketCrypter()->MaxOverhead();
+ DCHECK(proof_source_->GetTicketCrypter());
+ return proof_source_->GetTicketCrypter()->MaxOverhead();
}
int TlsServerHandshaker::SessionTicketSeal(uint8_t* out,
size_t* out_len,
size_t max_out_len,
quiche::QuicheStringPiece in) {
- DCHECK(proof_source_->SessionTicketCrypter());
- std::vector<uint8_t> ticket =
- proof_source_->SessionTicketCrypter()->Encrypt(in);
+ DCHECK(proof_source_->GetTicketCrypter());
+ std::vector<uint8_t> ticket = proof_source_->GetTicketCrypter()->Encrypt(in);
if (max_out_len < ticket.size()) {
QUIC_BUG
- << "SessionTicketCrypter returned " << ticket.size()
+ << "TicketCrypter returned " << ticket.size()
<< " bytes of ciphertext, which is larger than its max overhead of "
<< max_out_len;
return 0; // failure
@@ -445,11 +444,11 @@
size_t* out_len,
size_t max_out_len,
quiche::QuicheStringPiece in) {
- DCHECK(proof_source_->SessionTicketCrypter());
+ DCHECK(proof_source_->GetTicketCrypter());
if (!ticket_decryption_callback_) {
ticket_decryption_callback_ = new DecryptCallback(this);
- proof_source_->SessionTicketCrypter()->Decrypt(
+ proof_source_->GetTicketCrypter()->Decrypt(
in, std::unique_ptr<DecryptCallback>(ticket_decryption_callback_));
// Decrypt can run the callback synchronously. In that case, the callback
// will clear the ticket_decryption_callback_ pointer, and instead of
diff --git a/quic/qbone/qbone_session_test.cc b/quic/qbone/qbone_session_test.cc
index 595a0ff..ae129bb 100644
--- a/quic/qbone/qbone_session_test.cc
+++ b/quic/qbone/qbone_session_test.cc
@@ -112,7 +112,7 @@
server_address, hostname, signature_algorithm, in, std::move(callback));
}
- TicketCrypter* SessionTicketCrypter() override { return nullptr; }
+ TicketCrypter* GetTicketCrypter() override { return nullptr; }
private:
std::unique_ptr<ProofSource> proof_source_;
diff --git a/quic/quartc/quartc_crypto_helpers.h b/quic/quartc/quartc_crypto_helpers.h
index 31b39a7..8d4ec87 100644
--- a/quic/quartc/quartc_crypto_helpers.h
+++ b/quic/quartc/quartc_crypto_helpers.h
@@ -61,7 +61,7 @@
quiche::QuicheStringPiece in,
std::unique_ptr<SignatureCallback> callback) override;
- TicketCrypter* SessionTicketCrypter() override { return nullptr; }
+ TicketCrypter* GetTicketCrypter() override { return nullptr; }
};
// Used by QuicCryptoClientConfig to ignore the peer's credentials
diff --git a/quic/test_tools/failing_proof_source.h b/quic/test_tools/failing_proof_source.h
index 69a3e7a..1ce7f72 100644
--- a/quic/test_tools/failing_proof_source.h
+++ b/quic/test_tools/failing_proof_source.h
@@ -31,7 +31,7 @@
quiche::QuicheStringPiece in,
std::unique_ptr<SignatureCallback> callback) override;
- TicketCrypter* SessionTicketCrypter() override { return nullptr; }
+ TicketCrypter* GetTicketCrypter() override { return nullptr; }
};
} // namespace test
diff --git a/quic/test_tools/fake_proof_source.cc b/quic/test_tools/fake_proof_source.cc
index 3763bcc..35c81d5 100644
--- a/quic/test_tools/fake_proof_source.cc
+++ b/quic/test_tools/fake_proof_source.cc
@@ -113,11 +113,11 @@
delegate_.get()));
}
-ProofSource::TicketCrypter* FakeProofSource::SessionTicketCrypter() {
+ProofSource::TicketCrypter* FakeProofSource::GetTicketCrypter() {
if (ticket_crypter_) {
return ticket_crypter_.get();
}
- return delegate_->SessionTicketCrypter();
+ return delegate_->GetTicketCrypter();
}
void FakeProofSource::SetTicketCrypter(
diff --git a/quic/test_tools/fake_proof_source.h b/quic/test_tools/fake_proof_source.h
index c179f59..35e5c5e 100644
--- a/quic/test_tools/fake_proof_source.h
+++ b/quic/test_tools/fake_proof_source.h
@@ -21,7 +21,7 @@
// asynchronously, and allow the caller to see that the call is pending and
// resume the operation at the caller's choosing. FakeProofSource also allows
// the caller to replace the TicketCrypter provided by
-// FakeProofSource::SessionTicketCrypter.
+// FakeProofSource::GetTicketCrypter.
class FakeProofSource : public ProofSource {
public:
FakeProofSource();
@@ -49,7 +49,7 @@
uint16_t signature_algorithm,
quiche::QuicheStringPiece in,
std::unique_ptr<ProofSource::SignatureCallback> callback) override;
- TicketCrypter* SessionTicketCrypter() override;
+ TicketCrypter* GetTicketCrypter() override;
// Sets the TicketCrypter to use. If nullptr, the TicketCrypter from
// ProofSourceForTesting will be returned instead.