Moved some source to common folder. Added uploading script which is also shared by CE CDM partners. Added README. Test: m wv_factory_extraction_tool Bug: 414642286 Change-Id: I565027b75528ab28f9f1eb8d9086c0213de992d0
Widevine Factory Extraction Tool for AOSP partners
This tool extracts the BCC and generates the Certificate Signing Request (CSR) needed to be uploaded to Wideivine Provisioning server for Prov4 device registration.
CSR extraction instructions:
-
Make
wv_factory_extraction_tool:- m wv_factory_extraction_tool
-
Locate build output and adb push it to the target device, e.g.:
- adb push out/target/product/{product name}/vendor/bin/hw/wv_factory_extraction_tool /vendor/bin/hw/wv_factory_extraction_tool
-
Restart Widevine service on the device to ensure a clean state before running the tool:
- adb shell pkill -f -9 widevine
-
Run the wv_factory_extractor tool on the target device. By default, the tool prints the CSR in JSON format directly to the console.
- adb shell /vendor/bin/hw/wv_factory_extraction_tool json_csr or just
- adb shell /vendor/bin/hw/wv_factory_extraction_tool
For additional options, run the tool with the
helpargument: - adb shell /vendor/bin/hw/wv_factory_extraction_tool help
Uploading instructions:
-
Save the extracted CSR to
csr.json. -
Upload the
csr.jsonfile usingcommon/wv_upload_tool.py: python3 wv_upload_tool.py --credentials=cred.json --org-name={your organization name} --json-csr=csr.json- Replace cred.json with the path to your OAuth 2.0 client credentials file. You can obtain this file through the Google Cloud Platform.
- Replace {your organization name} with the name of your organization.