root_hash 106 drivers/md/dm-verity-verify-sig.c int verity_verify_root_hash(const void *root_hash, size_t root_hash_len, root_hash 111 drivers/md/dm-verity-verify-sig.c if (!root_hash || root_hash_len == 0) root_hash 121 drivers/md/dm-verity-verify-sig.c ret = verify_pkcs7_signature(root_hash, root_hash_len, sig_data, root_hash 115 fs/verity/enable.c u8 *root_hash) root_hash 125 fs/verity/enable.c memset(root_hash, 0, params->digest_size); root_hash 149 fs/verity/enable.c memcpy(root_hash, pending_hashes, params->digest_size); root_hash 229 fs/verity/enable.c BUILD_BUG_ON(sizeof(desc->root_hash) < FS_VERITY_MAX_DIGEST_SIZE); root_hash 230 fs/verity/enable.c err = build_merkle_tree(inode, ¶ms, desc->root_hash); root_hash 236 fs/verity/enable.c params.hash_alg->name, params.digest_size, desc->root_hash); root_hash 72 fs/verity/fsverity_private.h u8 root_hash[FS_VERITY_MAX_DIGEST_SIZE]; root_hash 88 fs/verity/fsverity_private.h __u8 root_hash[64]; /* Merkle tree root hash */ root_hash 199 fs/verity/open.c memcpy(vi->root_hash, desc->root_hash, vi->tree_params.digest_size); root_hash 144 fs/verity/verify.c want_hash = vi->root_hash;