Index: net/quic/core/quic_framer.cc |
diff --git a/net/quic/core/quic_framer.cc b/net/quic/core/quic_framer.cc |
index b11a52f6ff07ac8712f6c0e95318369a1db5a3ea..4bfe7254e831626bbdec22d80fd75b89024e87bb 100644 |
--- a/net/quic/core/quic_framer.cc |
+++ b/net/quic/core/quic_framer.cc |
@@ -643,7 +643,6 @@ bool QuicFramer::ProcessDataPacket(QuicDataReader* encrypted_reader, |
return RaiseError(QUIC_PACKET_TOO_LARGE); |
} |
- DCHECK(!header.fec_flag); |
// Handle the payload. |
if (!ProcessFrameData(&reader, header)) { |
DCHECK_NE(QUIC_NO_ERROR, error_); // ProcessFrameData sets the error. |
@@ -1102,28 +1101,12 @@ bool QuicFramer::ProcessAuthenticatedHeader(QuicDataReader* reader, |
return RaiseError(QUIC_INVALID_PACKET_HEADER); |
} |
- if (private_flags > PACKET_PRIVATE_FLAGS_MAX_VERSION_32) { |
+ if (private_flags > PACKET_PRIVATE_FLAGS_MAX) { |
set_detailed_error("Illegal private flags value."); |
return RaiseError(QUIC_INVALID_PACKET_HEADER); |
} |
header->entropy_flag = (private_flags & PACKET_PRIVATE_FLAGS_ENTROPY) != 0; |
- header->fec_flag = (private_flags & PACKET_PRIVATE_FLAGS_FEC) != 0; |
- |
- if ((private_flags & PACKET_PRIVATE_FLAGS_FEC_GROUP) != 0) { |
- uint8_t first_fec_protected_packet_offset; |
- if (!reader->ReadBytes(&first_fec_protected_packet_offset, 1)) { |
- set_detailed_error("Unable to read first fec protected packet offset."); |
- return RaiseError(QUIC_INVALID_PACKET_HEADER); |
- } |
- if (first_fec_protected_packet_offset >= header->packet_number) { |
- set_detailed_error( |
- "First fec protected packet offset must be less " |
- "than the packet number."); |
- return RaiseError(QUIC_INVALID_PACKET_HEADER); |
- } |
- } |
- |
header->entropy_hash = GetPacketEntropyHash(*header); |
return true; |
} |