Clean up count_reverse_path_validation_stats.
PiperOrigin-RevId: 528453511
diff --git a/quiche/quic/core/quic_connection.cc b/quiche/quic/core/quic_connection.cc
index dd35b76..42a4cf9 100644
--- a/quiche/quic/core/quic_connection.cc
+++ b/quiche/quic/core/quic_connection.cc
@@ -7293,17 +7293,11 @@
connection_->alternative_path_.peer_address),
active_effective_peer_migration_type_(
connection_->active_effective_peer_migration_type_) {
- if (connection_->count_reverse_path_validation_stats()) {
- QUIC_CODE_COUNT_N(quic_reverse_path_validation, 1, 4);
- }
}
void QuicConnection::ReversePathValidationResultDelegate::
OnPathValidationSuccess(std::unique_ptr<QuicPathValidationContext> context,
QuicTime start_time) {
- if (connection_->count_reverse_path_validation_stats()) {
- QUIC_CODE_COUNT_N(quic_reverse_path_validation, 2, 4);
- }
QUIC_DLOG(INFO) << "Successfully validated new path " << *context
<< ", validation started at " << start_time;
if (connection_->IsDefaultPath(context->self_address(),
@@ -7347,9 +7341,6 @@
void QuicConnection::ReversePathValidationResultDelegate::
OnPathValidationFailure(
std::unique_ptr<QuicPathValidationContext> context) {
- if (connection_->count_reverse_path_validation_stats()) {
- QUIC_CODE_COUNT_N(quic_reverse_path_validation, 3, 4);
- }
if (!connection_->connected()) {
return;
}
diff --git a/quiche/quic/core/quic_connection.h b/quiche/quic/core/quic_connection.h
index ad73e98..de10b88 100644
--- a/quiche/quic/core/quic_connection.h
+++ b/quiche/quic/core/quic_connection.h
@@ -1397,13 +1397,6 @@
return connection_id_generator_;
}
- bool count_reverse_path_validation_stats() const {
- return count_reverse_path_validation_stats_;
- }
- void set_count_reverse_path_validation_stats(bool value) {
- count_reverse_path_validation_stats_ = value;
- }
-
private:
friend class test::QuicConnectionPeer;
@@ -2380,9 +2373,6 @@
// confirmed.
bool accelerated_server_preferred_address_ = false;
- // TODO(b/223634460) Remove this.
- bool count_reverse_path_validation_stats_ = false;
-
// If true, throttle sending if next created packet will exceed amplification
// limit.
const bool enforce_strict_amplification_factor_ =