After "mptcp: consolidate initial ack seq generation" we don't need
anymore to do the crypto hash in the fastopen code, the caller already
did it for us.
Just drop the duplicated code.
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
---
net/mptcp/fastopen.c | 8 --------
1 file changed, 8 deletions(-)
diff --git a/net/mptcp/fastopen.c b/net/mptcp/fastopen.c
index ee6cfbba6c05..19c332af0834 100644
--- a/net/mptcp/fastopen.c
+++ b/net/mptcp/fastopen.c
@@ -11,16 +11,8 @@ void mptcp_fastopen_gen_msk_ackseq(struct mptcp_sock *msk, struct mptcp_subflow_
{
struct sock *sk = (struct sock *)msk;
struct sk_buff *skb;
- u64 ack_seq;
-
- mptcp_crypto_key_sha(mp_opt->sndr_key, NULL, &ack_seq);
- ack_seq++;
mptcp_data_lock(sk);
- WRITE_ONCE(msk->can_ack, true);
- WRITE_ONCE(msk->ack_seq, ack_seq);
- atomic64_set(&msk->rcv_wnd_sent, ack_seq);
- msk->remote_key = mp_opt->sndr_key;
skb = skb_peek_tail(&sk->sk_receive_queue);
if (skb) {
WARN_ON_ONCE(MPTCP_SKB_CB(skb)->end_seq);
--
2.38.1