[ This is 2 year old news, but I’m just learning about it… 😦 ]
Wireshark is a tool used to sniff network packets and dissect the protocols and help debug them. Since version 3.0.0 or so, you can use Wireshark to sniff TPM v2. Not the hardware TPM chip, but a TPM2 simulator, which is simulated over the network, so Wireshark can capture it, and there’s a Wireshark Dissector (parser) for TPM2 protocol.
https://www.wireshark.org/lists/wireshark-commits/201804/msg00451.html
Documentation:
https://www.wireshark.org/docs/dfref/t/tpm.html
Sample PCAP:
https://wiki.wireshark.org/SampleCaptures?action=AttachFile&do=get&target=policy-authorizeNV.pcap
Created by the TPM2 community:
https://github.com/tpm2-software
There is a brief mention of this Wireshark TPM2 dissector in this FOSDEM presentation:
PS: Mostly only related by the “Shark” suffix string, but if you are debugging Linux, KernelShark is a nice tool. I haven’t tried it with a TPM, but you might be able to see Linux kernel TPM trace log traffic through KernelShark…
https://kernelshark.org/