gfe-relnote: Fix typo in QUIC method name. No behavior change
PiperOrigin-RevId: 271220749
Change-Id: I02dfca91b64e07842eb6933db936414704e79dbb
diff --git a/quic/core/quic_connection.h b/quic/core/quic_connection.h
index 3ccbaaa..399ba13 100644
--- a/quic/core/quic_connection.h
+++ b/quic/core/quic_connection.h
@@ -834,8 +834,8 @@
// This setting should never be set to false in public facing endpoints. It
// can only be set to false if there is some other mechanism of preventing
// amplification attacks, such as ICE (plus its a non-standard quic).
- void set_fully_pad_crypto_hadshake_packets(bool new_value) {
- packet_generator_.set_fully_pad_crypto_hadshake_packets(new_value);
+ void set_fully_pad_crypto_handshake_packets(bool new_value) {
+ packet_generator_.set_fully_pad_crypto_handshake_packets(new_value);
}
bool fully_pad_during_crypto_handshake() const {
diff --git a/quic/core/quic_crypto_client_handshaker.cc b/quic/core/quic_crypto_client_handshaker.cc
index a8a479e..d993049 100644
--- a/quic/core/quic_crypto_client_handshaker.cc
+++ b/quic/core/quic_crypto_client_handshaker.cc
@@ -279,7 +279,7 @@
}
next_state_ = STATE_RECV_REJ;
chlo_hash_ = CryptoUtils::HashHandshakeMessage(out, Perspective::IS_CLIENT);
- session()->connection()->set_fully_pad_crypto_hadshake_packets(
+ session()->connection()->set_fully_pad_crypto_handshake_packets(
crypto_config_->pad_inchoate_hello());
SendHandshakeMessage(out);
return;
@@ -305,7 +305,7 @@
*cached->proof_verify_details());
}
next_state_ = STATE_RECV_SHLO;
- session()->connection()->set_fully_pad_crypto_hadshake_packets(
+ session()->connection()->set_fully_pad_crypto_handshake_packets(
crypto_config_->pad_full_hello());
SendHandshakeMessage(out);
// Be prepared to decrypt with the new server write key.
diff --git a/quic/core/quic_crypto_server_handshaker.cc b/quic/core/quic_crypto_server_handshaker.cc
index 49e7209..964c8ac 100644
--- a/quic/core/quic_crypto_server_handshaker.cc
+++ b/quic/core/quic_crypto_server_handshaker.cc
@@ -169,7 +169,7 @@
}
if (reply->tag() != kSHLO) {
- session()->connection()->set_fully_pad_crypto_hadshake_packets(
+ session()->connection()->set_fully_pad_crypto_handshake_packets(
crypto_config_->pad_rej());
SendHandshakeMessage(*reply);
return;
@@ -215,7 +215,7 @@
}
session()->connection()->SetDiversificationNonce(*diversification_nonce);
- session()->connection()->set_fully_pad_crypto_hadshake_packets(
+ session()->connection()->set_fully_pad_crypto_handshake_packets(
crypto_config_->pad_shlo());
SendHandshakeMessage(*reply);
diff --git a/quic/core/quic_packet_creator.h b/quic/core/quic_packet_creator.h
index d9b0e19..a654423 100644
--- a/quic/core/quic_packet_creator.h
+++ b/quic/core/quic_packet_creator.h
@@ -381,7 +381,7 @@
// Indicates whether packet flusher is currently attached.
bool PacketFlusherAttached() const;
- void set_fully_pad_crypto_hadshake_packets(bool new_value) {
+ void set_fully_pad_crypto_handshake_packets(bool new_value) {
DCHECK(combine_generator_and_creator_);
fully_pad_crypto_handshake_packets_ = new_value;
}
diff --git a/quic/core/quic_packet_generator.cc b/quic/core/quic_packet_generator.cc
index 7312ebf..fbb7894 100644
--- a/quic/core/quic_packet_generator.cc
+++ b/quic/core/quic_packet_generator.cc
@@ -537,10 +537,10 @@
packet_creator_.SetClientConnectionId(client_connection_id);
}
-void QuicPacketGenerator::set_fully_pad_crypto_hadshake_packets(
+void QuicPacketGenerator::set_fully_pad_crypto_handshake_packets(
bool new_value) {
if (packet_creator_.combine_generator_and_creator()) {
- packet_creator_.set_fully_pad_crypto_hadshake_packets(new_value);
+ packet_creator_.set_fully_pad_crypto_handshake_packets(new_value);
return;
}
fully_pad_crypto_handshake_packets_ = new_value;
diff --git a/quic/core/quic_packet_generator.h b/quic/core/quic_packet_generator.h
index 992d119..7d8df7e 100644
--- a/quic/core/quic_packet_generator.h
+++ b/quic/core/quic_packet_generator.h
@@ -225,7 +225,7 @@
packet_creator_.set_debug_delegate(debug_delegate);
}
- void set_fully_pad_crypto_hadshake_packets(bool new_value);
+ void set_fully_pad_crypto_handshake_packets(bool new_value);
bool fully_pad_crypto_handshake_packets() const;
diff --git a/quic/core/quic_packet_generator_test.cc b/quic/core/quic_packet_generator_test.cc
index 35085c2..70fe615 100644
--- a/quic/core/quic_packet_generator_test.cc
+++ b/quic/core/quic_packet_generator_test.cc
@@ -516,7 +516,7 @@
// Test the behavior of ConsumeData when the data is for the crypto handshake
// stream, but padding is disabled.
TEST_F(QuicPacketGeneratorTest, ConsumeData_Handshake_PaddingDisabled) {
- generator_.set_fully_pad_crypto_hadshake_packets(false);
+ generator_.set_fully_pad_crypto_handshake_packets(false);
delegate_.SetCanWriteAnything();