Change QuicPathChallengeFrame and QuicPathResponseFrame to be inlined quic frame.

PiperOrigin-RevId: 440370636
diff --git a/quiche/quic/core/quic_connection_test.cc b/quiche/quic/core/quic_connection_test.cc
index 1311afe..d7b722c 100644
--- a/quiche/quic/core/quic_connection_test.cc
+++ b/quiche/quic/core/quic_connection_test.cc
@@ -1852,7 +1852,7 @@
 
   // Receiving PATH_RESPONSE should lift the anti-amplification limit.
   QuicFrames frames3;
-  frames3.push_back(QuicFrame(new QuicPathResponseFrame(99, payload)));
+  frames3.push_back(QuicFrame(QuicPathResponseFrame(99, payload)));
   EXPECT_CALL(visitor_, MaybeSendAddressToken());
   EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _))
       .Times(testing::AtLeast(1u));
@@ -2166,11 +2166,10 @@
           QuicFrame(new QuicNewTokenFrame(1, "new_token")));
       return true;
     }));
-    ProcessFramesPacketWithAddresses({QuicFrame(new QuicPathResponseFrame(
-                                          0, reverse_path_challenge_payload)),
-                                      QuicFrame(&ack_frame)},
-                                     kSelfAddress, kPeerAddress3,
-                                     ENCRYPTION_FORWARD_SECURE);
+    ProcessFramesPacketWithAddresses(
+        {QuicFrame(QuicPathResponseFrame(0, reverse_path_challenge_payload)),
+         QuicFrame(&ack_frame)},
+        kSelfAddress, kPeerAddress3, ENCRYPTION_FORWARD_SECURE);
   }
 }
 
@@ -2540,7 +2539,7 @@
     EXPECT_EQ((connection_.validate_client_address() ? 2 : 3) * bytes_sent,
               QuicConnectionPeer::BytesSentOnAlternativePath(&connection_));
     QuicFrames frames;
-    frames.push_back(QuicFrame(new QuicPathResponseFrame(99, payload)));
+    frames.push_back(QuicFrame(QuicPathResponseFrame(99, payload)));
     ProcessFramesPacketWithAddresses(frames, connection_.self_address(),
                                      kNewPeerAddress,
                                      ENCRYPTION_FORWARD_SECURE);
@@ -11949,7 +11948,7 @@
   EXPECT_EQ(0u, writer_->packets_write_attempts());
 
   QuicFrames frames;
-  frames.push_back(QuicFrame(new QuicPathResponseFrame(
+  frames.push_back(QuicFrame(QuicPathResponseFrame(
       99, new_writer.path_challenge_frames().front().data_buffer)));
   ProcessFramesPacketWithAddresses(frames, kNewSelfAddress, kPeerAddress,
                                    ENCRYPTION_FORWARD_SECURE);
@@ -12174,7 +12173,7 @@
     // address validation.
     QuicFrames frames;
     frames.push_back(
-        QuicFrame(new QuicPathChallengeFrame(0, path_challenge_payload)));
+        QuicFrame(QuicPathChallengeFrame(0, path_challenge_payload)));
     ProcessFramesPacketWithAddresses(frames, kSelfAddress, kNewPeerAddress,
                                      ENCRYPTION_FORWARD_SECURE);
   } else {
@@ -12352,10 +12351,8 @@
   QuicPathFrameBuffer path_frame_buffer1{0, 1, 2, 3, 4, 5, 6, 7};
   QuicPathFrameBuffer path_frame_buffer2{8, 9, 10, 11, 12, 13, 14, 15};
   QuicFrames frames;
-  frames.push_back(
-      QuicFrame(new QuicPathChallengeFrame(0, path_frame_buffer1)));
-  frames.push_back(
-      QuicFrame(new QuicPathChallengeFrame(0, path_frame_buffer2)));
+  frames.push_back(QuicFrame(QuicPathChallengeFrame(0, path_frame_buffer1)));
+  frames.push_back(QuicFrame(QuicPathChallengeFrame(0, path_frame_buffer2)));
   const QuicSocketAddress kNewPeerAddress(QuicIpAddress::Loopback6(),
                                           /*port=*/23456);
 
@@ -12395,7 +12392,7 @@
   QuicFrames frames;
   frames.push_back(QuicFrame(frame1_));
   QuicPathFrameBuffer path_frame_buffer{0, 1, 2, 3, 4, 5, 6, 7};
-  frames.push_back(QuicFrame(new QuicPathChallengeFrame(0, path_frame_buffer)));
+  frames.push_back(QuicFrame(QuicPathChallengeFrame(0, path_frame_buffer)));
   const QuicSocketAddress kNewPeerAddress(QuicIpAddress::Loopback4(),
                                           /*port=*/23456);
 
@@ -12444,7 +12441,7 @@
 
   QuicFrames frames;
   QuicPathFrameBuffer path_frame_buffer{0, 1, 2, 3, 4, 5, 6, 7};
-  frames.push_back(QuicFrame(new QuicPathChallengeFrame(0, path_frame_buffer)));
+  frames.push_back(QuicFrame(QuicPathChallengeFrame(0, path_frame_buffer)));
   // PATH_RESPONSE should be flushed out before the rest packet is parsed.
   frames.push_back(QuicFrame(frame1_));
   const QuicSocketAddress kNewPeerAddress(QuicIpAddress::Loopback4(),
@@ -12506,7 +12503,7 @@
   QuicFrames frames;
   frames.push_back(QuicFrame(frame1_));
   QuicPathFrameBuffer path_frame_buffer{0, 1, 2, 3, 4, 5, 6, 7};
-  frames.push_back(QuicFrame(new QuicPathChallengeFrame(0, path_frame_buffer)));
+  frames.push_back(QuicFrame(QuicPathChallengeFrame(0, path_frame_buffer)));
   frames.push_back(QuicFrame(frame2_));
   const QuicSocketAddress kNewPeerAddress(QuicIpAddress::Loopback6(),
                                           /*port=*/23456);
@@ -12568,7 +12565,7 @@
 
   QuicFrames frames;
   QuicPathFrameBuffer path_frame_buffer{0, 1, 2, 3, 4, 5, 6, 7};
-  frames.push_back(QuicFrame(new QuicPathChallengeFrame(0, path_frame_buffer)));
+  frames.push_back(QuicFrame(QuicPathChallengeFrame(0, path_frame_buffer)));
   const QuicSocketAddress kNewPeerAddress(QuicIpAddress::Loopback6(),
                                           /*port=*/23456);
 
@@ -13824,7 +13821,7 @@
   QuicPathFrameBuffer path_challenge_payload{0, 1, 2, 3, 4, 5, 6, 7};
   QuicFrames frames1;
   frames1.push_back(
-      QuicFrame(new QuicPathChallengeFrame(0, path_challenge_payload)));
+      QuicFrame(QuicPathChallengeFrame(0, path_challenge_payload)));
   QuicPathFrameBuffer payload;
   EXPECT_CALL(*send_algorithm_,
               OnPacketSent(_, _, _, _, NO_RETRANSMITTABLE_DATA))
@@ -13911,7 +13908,7 @@
 
   // Receiving PATH_RESPONSE should lift the anti-amplification limit.
   QuicFrames frames3;
-  frames3.push_back(QuicFrame(new QuicPathResponseFrame(99, payload)));
+  frames3.push_back(QuicFrame(QuicPathResponseFrame(99, payload)));
   EXPECT_CALL(visitor_, MaybeSendAddressToken());
   EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _))
       .Times(testing::AtLeast(1u));
@@ -13979,7 +13976,7 @@
   QuicPathFrameBuffer path_challenge_payload{0, 1, 2, 3, 4, 5, 6, 7};
   QuicFrames frames1;
   frames1.push_back(
-      QuicFrame(new QuicPathChallengeFrame(0, path_challenge_payload)));
+      QuicFrame(QuicPathChallengeFrame(0, path_challenge_payload)));
   ProcessFramesPacketWithAddresses(frames1, kSelfAddress, kNewPeerAddress,
                                    ENCRYPTION_FORWARD_SECURE);
   EXPECT_TRUE(connection_.HasPendingPathValidation());
@@ -13992,7 +13989,7 @@
 
   // Receive PATH_RESPONSE should mark the new peer address validated.
   QuicFrames frames3;
-  frames3.push_back(QuicFrame(new QuicPathResponseFrame(99, payload)));
+  frames3.push_back(QuicFrame(QuicPathResponseFrame(99, payload)));
   ProcessFramesPacketWithAddresses(frames3, kSelfAddress, kNewPeerAddress,
                                    ENCRYPTION_FORWARD_SECURE);
 
@@ -14107,7 +14104,7 @@
   QuicPathFrameBuffer path_challenge_payload{0, 1, 2, 3, 4, 5, 6, 7};
   QuicFrames frames1;
   frames1.push_back(
-      QuicFrame(new QuicPathChallengeFrame(0, path_challenge_payload)));
+      QuicFrame(QuicPathChallengeFrame(0, path_challenge_payload)));
   ProcessFramesPacketWithAddresses(frames1, kSelfAddress, kNewerPeerAddress,
                                    ENCRYPTION_FORWARD_SECURE);
   EXPECT_EQ(kNewPeerAddress, connection_.effective_peer_address());
@@ -15180,7 +15177,7 @@
         frame = QuicFrame(window_update_frame);
         break;
       case PATH_CHALLENGE_FRAME:
-        frame = QuicFrame(&path_challenge_frame);
+        frame = QuicFrame(path_challenge_frame);
         break;
       case STOP_SENDING_FRAME:
         frame = QuicFrame(stop_sending_frame);
@@ -15192,7 +15189,7 @@
         frame = QuicFrame(&retire_connection_id_frame);
         break;
       case PATH_RESPONSE_FRAME:
-        frame = QuicFrame(&path_response_frame);
+        frame = QuicFrame(path_response_frame);
         break;
       case MESSAGE_FRAME:
         frame = QuicFrame(&message_frame);