Commit Graph

2 Commits

Author SHA1 Message Date
Cong Lin
691f43cbef Factory BCC extraction tool to consume verified device info
BCC extraction tool calls OEMCrypto_GetDeviceInformation() to read
verified device info from TEE. If the verified device info is not
available, (e.g. not implemented), it falls back to using OS properties.

This CL is mostly identical to ag/20799640, which has the same change
for our internal extraction tool. For historical reason, we keep two
copies of the extraction tool which are slightly different from each
other, one for factory use, one for debug use. Long term they will be
merged.

Test: Ran the tool on Pixel 7 w/wo verified device info being present
Bug: 263312447
Change-Id: Ib9c77dee45e9ff996fc2dc2da14f16f60eaff77c
2022-12-20 20:07:10 -08:00
Lu Chen
7684054d78 Widvine remote provisioning HAL implementation
This HAL implementation should be included in the factory image only.

BUG: 213415013
Test: manual
Change-Id: Icc0cc7f767a647238ce319623e0408ec22531f58
2022-06-01 17:14:48 +00:00