Remove redundant calls to QuicSession::NeuterUnencryptedData(). Upon finishing handshakes, the TLS handshaker always calls QuicSession::OnCryptoHandshakeEvent(HANDSHAKE_CONFIRMED), which does the job of neutering unencrypted data. gfe-relnote: protected by disabled v99 flag. PiperOrigin-RevId: 275516067 Change-Id: Ic949e6694a8d32fd24960eeac9e0bb2cd8555bf9
diff --git a/quic/core/tls_client_handshaker.cc b/quic/core/tls_client_handshaker.cc index 674cf2c..77f8e7c 100644 --- a/quic/core/tls_client_handshaker.cc +++ b/quic/core/tls_client_handshaker.cc
@@ -323,7 +323,6 @@ << "'"; session()->connection()->SetDefaultEncryptionLevel(ENCRYPTION_FORWARD_SECURE); - session()->NeuterUnencryptedData(); encryption_established_ = true; handshake_confirmed_ = true; session()->OnCryptoHandshakeEvent(QuicSession::ENCRYPTION_ESTABLISHED);
diff --git a/quic/core/tls_server_handshaker.cc b/quic/core/tls_server_handshaker.cc index f08f781..be3fa5f 100644 --- a/quic/core/tls_server_handshaker.cc +++ b/quic/core/tls_server_handshaker.cc
@@ -258,7 +258,6 @@ state_ = STATE_HANDSHAKE_COMPLETE; session()->connection()->SetDefaultEncryptionLevel(ENCRYPTION_FORWARD_SECURE); - session()->NeuterUnencryptedData(); encryption_established_ = true; handshake_confirmed_ = true; session()->OnCryptoHandshakeEvent(QuicSession::HANDSHAKE_CONFIRMED);