Since manufacturers are not yet supplying these credentials, certain TPM protocols can't yet be tested. For testing purposes, this web page will create substitute Endorsement Credentials (and, in the future, other kinds of credentials) for people who have TPM chips and want to do research and testing of the technology.
Some of the information may be available from the manufacturer of your TPM or of your computer. Others can be found only by querying the TPM itself. The software standard for accessing the TPM is the TPM Software Stack (TSS). Most TPM systems will ship with some TSS software for use under Windows, but a good alternative is the Linux package called TrouSerS. TrouSerS supplies a TSS implementation for use under Linux, as well as additional test programs and tools for accessing and querying the TSS. Even if you are not using TrouSerS but are using another TSS implementation, the associated tools will be useful in getting information from the TPM. One of the packages is called tpm-tools and is particularly helpful for getting the information needed to construct the Endorsement Credential.
The most important piece of information needed is the Endorsement Key value. This is a 2048 bit RSA public key. Only the RSA modulus is needed, a 256 byte hexadecimal value. It can be found by using the tpm-tools program, tpm_getpubek. This will print out the Endorsement Key modulus, preceded by other information. Copy and paste the digits of the modulus (displayed as "Public Key" in the output from tpm_getpubek) into the form below.
You also need the manufacturer code, TPM internal version number, and model number. The manufacturer and TPM version are displayed by the tpm-tools program, tpm_version. The version is displayed as an 8 digit value, and the right four digits are the internal version number needed below. The manufacturer code is also displayed as 8 hexadecimal digits, which is the format needed in the form.
The model number is not available from the TPM itself, and in fact the documentation is a little unclear about what exactly should be input there. Probably it should be the chip identifier. That might be available in your computer's documentation, or you could try looking at the manufacturer's web site or other sites which list information about TPM models.
Another set of information needed describes the version of the TPM spec which is implemented by the chip. The spec is periodically being revised and improved, so the version number changes. The spec version is defined by three values: the "family", such as "1.1" or "1.2", the level number, and the revision number. It's not clear exactly what they mean, but in practice "1.1" TPM chips should have family "1.1", level 2, revision 1. And "1.2" TPM chips should have family "1.2", level 1, and the revision should be what was current when the chip was manufactured. A recent revision number is 85 for the 1.2 spec (which is not complete at the time of writing).
The last pieces of information needed refer to the capabilities of the chip and the manner in which the Endorsement Key was loaded onboard. These are optional and you can answer "don't know" in the entries below. The first question is whether the chip is field-upgradeable or not. The second question is how the Endorsement Key was created. Was it generated on-chip, or was it loaded in from the outside? And was this done in "revocable" mode (a 1.2 feature), allowing the Endorsement Key (which normally is constant for the lifetime of the TPM) to be replaced? And the third question is, who loaded the key onto the chip? The TPM manufacturer, the motherboard manufacturer (who bonds the chip to the board), or perhaps some third party, who is also the one issuing the Endorsement Credential?
I don't know how you can get answers to these questions, but you can just guess if you want. Today, most TPMs are probably not field-upgradeable, and most keys are generated on-chip in non-revocable mode. I don't really have any idea whether the keys are put in by the TPM or motherboard manufacturers. I'd like to hear if anyone is able to get authoritative answers to any of these questions.