Remove redundant calls to QuicSession::NeuterUnencryptedData().
Upon finishing handshakes, the TLS handshaker always calls QuicSession::OnCryptoHandshakeEvent(HANDSHAKE_CONFIRMED), which does the job of neutering unencrypted data.
gfe-relnote: protected by disabled v99 flag.
PiperOrigin-RevId: 275516067
Change-Id: Ic949e6694a8d32fd24960eeac9e0bb2cd8555bf9
diff --git a/quic/core/tls_client_handshaker.cc b/quic/core/tls_client_handshaker.cc
index 674cf2c..77f8e7c 100644
--- a/quic/core/tls_client_handshaker.cc
+++ b/quic/core/tls_client_handshaker.cc
@@ -323,7 +323,6 @@
<< "'";
session()->connection()->SetDefaultEncryptionLevel(ENCRYPTION_FORWARD_SECURE);
- session()->NeuterUnencryptedData();
encryption_established_ = true;
handshake_confirmed_ = true;
session()->OnCryptoHandshakeEvent(QuicSession::ENCRYPTION_ESTABLISHED);
diff --git a/quic/core/tls_server_handshaker.cc b/quic/core/tls_server_handshaker.cc
index f08f781..be3fa5f 100644
--- a/quic/core/tls_server_handshaker.cc
+++ b/quic/core/tls_server_handshaker.cc
@@ -258,7 +258,6 @@
state_ = STATE_HANDSHAKE_COMPLETE;
session()->connection()->SetDefaultEncryptionLevel(ENCRYPTION_FORWARD_SECURE);
- session()->NeuterUnencryptedData();
encryption_established_ = true;
handshake_confirmed_ = true;
session()->OnCryptoHandshakeEvent(QuicSession::HANDSHAKE_CONFIRMED);