| Index: net/quic/quic_sent_packet_manager.cc
|
| diff --git a/net/quic/quic_sent_packet_manager.cc b/net/quic/quic_sent_packet_manager.cc
|
| index 88ee25f6f9e3cf474cdc4ecb8e22cd4df8d832fd..0085f901fad62fd24b6f2fd99cde9e832bfbf9f9 100644
|
| --- a/net/quic/quic_sent_packet_manager.cc
|
| +++ b/net/quic/quic_sent_packet_manager.cc
|
| @@ -251,19 +251,19 @@ void QuicSentPacketManager::RetransmitUnackedPackets(
|
| }
|
| }
|
|
|
| -void QuicSentPacketManager::NeuterUnencryptedPackets() {
|
| +void QuicSentPacketManager::DiscardUnencryptedPackets() {
|
| QuicUnackedPacketMap::const_iterator unacked_it = unacked_packets_.begin();
|
| while (unacked_it != unacked_packets_.end()) {
|
| const RetransmittableFrames* frames =
|
| unacked_it->second.retransmittable_frames;
|
| if (frames != NULL && frames->encryption_level() == ENCRYPTION_NONE) {
|
| - // Since once you're forward secure, no unencrypted packets will be sent,
|
| - // crypto or otherwise. Unencrypted packets are neutered and abandoned, to
|
| - // ensure they are not retransmitted or considered lost from a congestion
|
| - // control perspective.
|
| + // Once you're forward secure, no unencrypted packets will be sent.
|
| + // Additionally, it's likely the peer will be forward secure, and no acks
|
| + // for these packets will be received, so mark the packet as handled.
|
| pending_retransmissions_.erase(unacked_it->first);
|
| - unacked_packets_.NeuterPacket(unacked_it->first);
|
| - unacked_packets_.SetNotPending(unacked_it->first);
|
| + unacked_it = MarkPacketHandled(unacked_it->first,
|
| + QuicTime::Delta::Zero());
|
| + continue;
|
| }
|
| ++unacked_it;
|
| }
|
|
|