root_hash         106 drivers/md/dm-verity-verify-sig.c int verity_verify_root_hash(const void *root_hash, size_t root_hash_len,
root_hash         111 drivers/md/dm-verity-verify-sig.c 	if (!root_hash || root_hash_len == 0)
root_hash         121 drivers/md/dm-verity-verify-sig.c 	ret = verify_pkcs7_signature(root_hash, root_hash_len, sig_data,
root_hash         115 fs/verity/enable.c 			     u8 *root_hash)
root_hash         125 fs/verity/enable.c 		memset(root_hash, 0, params->digest_size);
root_hash         149 fs/verity/enable.c 	memcpy(root_hash, pending_hashes, params->digest_size);
root_hash         229 fs/verity/enable.c 	BUILD_BUG_ON(sizeof(desc->root_hash) < FS_VERITY_MAX_DIGEST_SIZE);
root_hash         230 fs/verity/enable.c 	err = build_merkle_tree(inode, &params, desc->root_hash);
root_hash         236 fs/verity/enable.c 		 params.hash_alg->name, params.digest_size, desc->root_hash);
root_hash          72 fs/verity/fsverity_private.h 	u8 root_hash[FS_VERITY_MAX_DIGEST_SIZE];
root_hash          88 fs/verity/fsverity_private.h 	__u8 root_hash[64];	/* Merkle tree root hash */
root_hash         199 fs/verity/open.c 	memcpy(vi->root_hash, desc->root_hash, vi->tree_params.digest_size);
root_hash         144 fs/verity/verify.c 	want_hash = vi->root_hash;