Add GFE_CODE_COUNT for ALPS use old codepoint
To better evaluate the percentage of how many clients are still using the old codepoint, we need to keep tracking the GFE count and stop supporting the
old codepoint once the usage is low enough.
PiperOrigin-RevId: 609819677
diff --git a/quiche/quic/core/tls_server_handshaker.cc b/quiche/quic/core/tls_server_handshaker.cc
index 9ab0c83..7d099a9 100644
--- a/quiche/quic/core/tls_server_handshaker.cc
+++ b/quiche/quic/core/tls_server_handshaker.cc
@@ -925,6 +925,8 @@
client_hello, TLSEXT_TYPE_early_data, &unused_extension_bytes,
&unused_extension_len);
+ int use_alps_new_codepoint = 0;
+
#if BORINGSSL_API_VERSION >= 27
if (GetQuicReloadableFlag(quic_gfe_allow_alps_new_codepoint)) {
QUIC_RELOADABLE_FLAG_COUNT(quic_gfe_allow_alps_new_codepoint);
@@ -933,7 +935,6 @@
client_hello, TLSEXT_TYPE_application_settings,
&unused_extension_bytes, &unused_extension_len);
// Make sure we use the right ALPS codepoint.
- int use_alps_new_codepoint = 0;
if (alps_new_codepoint_received_) {
QUIC_CODE_COUNT(quic_gfe_alps_use_new_codepoint);
use_alps_new_codepoint = 1;
@@ -942,6 +943,10 @@
SSL_set_alps_use_new_codepoint(ssl(), use_alps_new_codepoint);
}
#endif // BORINGSSL_API_VERSION
+
+ if (use_alps_new_codepoint == 0) {
+ QUIC_CODE_COUNT(quic_gfe_alps_use_old_codepoint);
+ }
}
// This callback is called very early by Boring SSL, most of the SSL_get_foo