Remove redundant calls to QuicSession::NeuterUnencryptedData().

Upon finishing handshakes, the TLS handshaker always calls QuicSession::OnCryptoHandshakeEvent(HANDSHAKE_CONFIRMED), which does the job of neutering unencrypted data.

gfe-relnote: protected by disabled v99 flag.
PiperOrigin-RevId: 275516067
Change-Id: Ic949e6694a8d32fd24960eeac9e0bb2cd8555bf9
diff --git a/quic/core/tls_client_handshaker.cc b/quic/core/tls_client_handshaker.cc
index 674cf2c..77f8e7c 100644
--- a/quic/core/tls_client_handshaker.cc
+++ b/quic/core/tls_client_handshaker.cc
@@ -323,7 +323,6 @@
                   << "'";
 
   session()->connection()->SetDefaultEncryptionLevel(ENCRYPTION_FORWARD_SECURE);
-  session()->NeuterUnencryptedData();
   encryption_established_ = true;
   handshake_confirmed_ = true;
   session()->OnCryptoHandshakeEvent(QuicSession::ENCRYPTION_ESTABLISHED);
diff --git a/quic/core/tls_server_handshaker.cc b/quic/core/tls_server_handshaker.cc
index f08f781..be3fa5f 100644
--- a/quic/core/tls_server_handshaker.cc
+++ b/quic/core/tls_server_handshaker.cc
@@ -258,7 +258,6 @@
   state_ = STATE_HANDSHAKE_COMPLETE;
 
   session()->connection()->SetDefaultEncryptionLevel(ENCRYPTION_FORWARD_SECURE);
-  session()->NeuterUnencryptedData();
   encryption_established_ = true;
   handshake_confirmed_ = true;
   session()->OnCryptoHandshakeEvent(QuicSession::HANDSHAKE_CONFIRMED);