gfe-relnote: Fix typo in QUIC method name. No behavior change

PiperOrigin-RevId: 271220749
Change-Id: I02dfca91b64e07842eb6933db936414704e79dbb
diff --git a/quic/core/quic_connection.h b/quic/core/quic_connection.h
index 3ccbaaa..399ba13 100644
--- a/quic/core/quic_connection.h
+++ b/quic/core/quic_connection.h
@@ -834,8 +834,8 @@
   // This setting should never be set to false in public facing endpoints. It
   // can only be set to false if there is some other mechanism of preventing
   // amplification attacks, such as ICE (plus its a non-standard quic).
-  void set_fully_pad_crypto_hadshake_packets(bool new_value) {
-    packet_generator_.set_fully_pad_crypto_hadshake_packets(new_value);
+  void set_fully_pad_crypto_handshake_packets(bool new_value) {
+    packet_generator_.set_fully_pad_crypto_handshake_packets(new_value);
   }
 
   bool fully_pad_during_crypto_handshake() const {
diff --git a/quic/core/quic_crypto_client_handshaker.cc b/quic/core/quic_crypto_client_handshaker.cc
index a8a479e..d993049 100644
--- a/quic/core/quic_crypto_client_handshaker.cc
+++ b/quic/core/quic_crypto_client_handshaker.cc
@@ -279,7 +279,7 @@
     }
     next_state_ = STATE_RECV_REJ;
     chlo_hash_ = CryptoUtils::HashHandshakeMessage(out, Perspective::IS_CLIENT);
-    session()->connection()->set_fully_pad_crypto_hadshake_packets(
+    session()->connection()->set_fully_pad_crypto_handshake_packets(
         crypto_config_->pad_inchoate_hello());
     SendHandshakeMessage(out);
     return;
@@ -305,7 +305,7 @@
         *cached->proof_verify_details());
   }
   next_state_ = STATE_RECV_SHLO;
-  session()->connection()->set_fully_pad_crypto_hadshake_packets(
+  session()->connection()->set_fully_pad_crypto_handshake_packets(
       crypto_config_->pad_full_hello());
   SendHandshakeMessage(out);
   // Be prepared to decrypt with the new server write key.
diff --git a/quic/core/quic_crypto_server_handshaker.cc b/quic/core/quic_crypto_server_handshaker.cc
index 49e7209..964c8ac 100644
--- a/quic/core/quic_crypto_server_handshaker.cc
+++ b/quic/core/quic_crypto_server_handshaker.cc
@@ -169,7 +169,7 @@
   }
 
   if (reply->tag() != kSHLO) {
-    session()->connection()->set_fully_pad_crypto_hadshake_packets(
+    session()->connection()->set_fully_pad_crypto_handshake_packets(
         crypto_config_->pad_rej());
     SendHandshakeMessage(*reply);
     return;
@@ -215,7 +215,7 @@
   }
   session()->connection()->SetDiversificationNonce(*diversification_nonce);
 
-  session()->connection()->set_fully_pad_crypto_hadshake_packets(
+  session()->connection()->set_fully_pad_crypto_handshake_packets(
       crypto_config_->pad_shlo());
   SendHandshakeMessage(*reply);
 
diff --git a/quic/core/quic_packet_creator.h b/quic/core/quic_packet_creator.h
index d9b0e19..a654423 100644
--- a/quic/core/quic_packet_creator.h
+++ b/quic/core/quic_packet_creator.h
@@ -381,7 +381,7 @@
   // Indicates whether packet flusher is currently attached.
   bool PacketFlusherAttached() const;
 
-  void set_fully_pad_crypto_hadshake_packets(bool new_value) {
+  void set_fully_pad_crypto_handshake_packets(bool new_value) {
     DCHECK(combine_generator_and_creator_);
     fully_pad_crypto_handshake_packets_ = new_value;
   }
diff --git a/quic/core/quic_packet_generator.cc b/quic/core/quic_packet_generator.cc
index 7312ebf..fbb7894 100644
--- a/quic/core/quic_packet_generator.cc
+++ b/quic/core/quic_packet_generator.cc
@@ -537,10 +537,10 @@
   packet_creator_.SetClientConnectionId(client_connection_id);
 }
 
-void QuicPacketGenerator::set_fully_pad_crypto_hadshake_packets(
+void QuicPacketGenerator::set_fully_pad_crypto_handshake_packets(
     bool new_value) {
   if (packet_creator_.combine_generator_and_creator()) {
-    packet_creator_.set_fully_pad_crypto_hadshake_packets(new_value);
+    packet_creator_.set_fully_pad_crypto_handshake_packets(new_value);
     return;
   }
   fully_pad_crypto_handshake_packets_ = new_value;
diff --git a/quic/core/quic_packet_generator.h b/quic/core/quic_packet_generator.h
index 992d119..7d8df7e 100644
--- a/quic/core/quic_packet_generator.h
+++ b/quic/core/quic_packet_generator.h
@@ -225,7 +225,7 @@
     packet_creator_.set_debug_delegate(debug_delegate);
   }
 
-  void set_fully_pad_crypto_hadshake_packets(bool new_value);
+  void set_fully_pad_crypto_handshake_packets(bool new_value);
 
   bool fully_pad_crypto_handshake_packets() const;
 
diff --git a/quic/core/quic_packet_generator_test.cc b/quic/core/quic_packet_generator_test.cc
index 35085c2..70fe615 100644
--- a/quic/core/quic_packet_generator_test.cc
+++ b/quic/core/quic_packet_generator_test.cc
@@ -516,7 +516,7 @@
 // Test the behavior of ConsumeData when the data is for the crypto handshake
 // stream, but padding is disabled.
 TEST_F(QuicPacketGeneratorTest, ConsumeData_Handshake_PaddingDisabled) {
-  generator_.set_fully_pad_crypto_hadshake_packets(false);
+  generator_.set_fully_pad_crypto_handshake_packets(false);
 
   delegate_.SetCanWriteAnything();