···363363 __be32 pcr_idx;364364} __packed;365365366366-struct tpm_pcrextend_in {367367- __be32 pcr_idx;368368- u8 hash[TPM_DIGEST_SIZE];369369-} __packed;370370-371366/* 128 bytes is an arbitrary cap. This could be as large as TPM_BUFSIZE - 18372367 * bytes, but 128 is still a relatively large number of random bytes and373368 * anything much bigger causes users of struct tpm_cmd_t to start getting···387392 u8 readpubek_out_buffer[sizeof(struct tpm_readpubek_params_out)];388393 struct tpm_pcrread_in pcrread_in;389394 struct tpm_pcrread_out pcrread_out;390390- struct tpm_pcrextend_in pcrextend_in;391395 struct tpm_getrandom_in getrandom_in;392396 struct tpm_getrandom_out getrandom_out;393397 struct tpm_startup_in startup_in;