Clean up count_reverse_path_validation_stats. PiperOrigin-RevId: 528453511
diff --git a/quiche/quic/core/quic_connection.cc b/quiche/quic/core/quic_connection.cc index dd35b76..42a4cf9 100644 --- a/quiche/quic/core/quic_connection.cc +++ b/quiche/quic/core/quic_connection.cc
@@ -7293,17 +7293,11 @@ connection_->alternative_path_.peer_address), active_effective_peer_migration_type_( connection_->active_effective_peer_migration_type_) { - if (connection_->count_reverse_path_validation_stats()) { - QUIC_CODE_COUNT_N(quic_reverse_path_validation, 1, 4); - } } void QuicConnection::ReversePathValidationResultDelegate:: OnPathValidationSuccess(std::unique_ptr<QuicPathValidationContext> context, QuicTime start_time) { - if (connection_->count_reverse_path_validation_stats()) { - QUIC_CODE_COUNT_N(quic_reverse_path_validation, 2, 4); - } QUIC_DLOG(INFO) << "Successfully validated new path " << *context << ", validation started at " << start_time; if (connection_->IsDefaultPath(context->self_address(), @@ -7347,9 +7341,6 @@ void QuicConnection::ReversePathValidationResultDelegate:: OnPathValidationFailure( std::unique_ptr<QuicPathValidationContext> context) { - if (connection_->count_reverse_path_validation_stats()) { - QUIC_CODE_COUNT_N(quic_reverse_path_validation, 3, 4); - } if (!connection_->connected()) { return; }
diff --git a/quiche/quic/core/quic_connection.h b/quiche/quic/core/quic_connection.h index ad73e98..de10b88 100644 --- a/quiche/quic/core/quic_connection.h +++ b/quiche/quic/core/quic_connection.h
@@ -1397,13 +1397,6 @@ return connection_id_generator_; } - bool count_reverse_path_validation_stats() const { - return count_reverse_path_validation_stats_; - } - void set_count_reverse_path_validation_stats(bool value) { - count_reverse_path_validation_stats_ = value; - } - private: friend class test::QuicConnectionPeer; @@ -2380,9 +2373,6 @@ // confirmed. bool accelerated_server_preferred_address_ = false; - // TODO(b/223634460) Remove this. - bool count_reverse_path_validation_stats_ = false; - // If true, throttle sending if next created packet will exceed amplification // limit. const bool enforce_strict_amplification_factor_ =