Move ASOP factory extraction tool to its own directory

Moved some source to common folder.
Added uploading script which is also shared by CE CDM partners.
Added README.

Test: m wv_factory_extraction_tool
Bug: 414642286
Change-Id: I565027b75528ab28f9f1eb8d9086c0213de992d0
This commit is contained in:
conglin
2025-06-10 18:20:43 +00:00
parent 1f77085571
commit 7496c1c84c
14 changed files with 555 additions and 7 deletions

View File

@@ -0,0 +1,34 @@
# Widevine Factory Extraction Tool for AOSP partners
This tool extracts the BCC and generates the Certificate Signing Request (CSR)
needed to be uploaded to Wideivine Provisioning server for Prov4 device registration.
## CSR extraction instructions:
1. Make `wv_factory_extraction_tool`:
- m wv_factory_extraction_tool
2. Locate build output and adb push it to the target device, e.g.:
- adb push out/target/product/{product name}/vendor/bin/hw/wv_factory_extraction_tool /vendor/bin/hw/wv_factory_extraction_tool
3. Restart Widevine service on the device to ensure a clean state
before running the tool:
- adb shell pkill -f -9 widevine
4. Run the wv_factory_extractor tool on the target device. By default,
the tool prints the CSR in JSON format directly to the console.
- adb shell /vendor/bin/hw/wv_factory_extraction_tool json_csr
or just
- adb shell /vendor/bin/hw/wv_factory_extraction_tool
For additional options, run the tool with the `help` argument:
- adb shell /vendor/bin/hw/wv_factory_extraction_tool help
## Uploading instructions:
1. Save the extracted CSR to `csr.json`.
2. Upload the `csr.json` file using `common/wv_upload_tool.py`:
python3 wv_upload_tool.py --credentials=cred.json --org-name={your organization name} --json-csr=csr.json
- Replace cred.json with the path to your OAuth 2.0 client credentials file.
You can obtain this file through the Google Cloud Platform.
- Replace {your organization name} with the name of your organization.