Files
android/libwvdrmengine/tools/factory_upload_tool/aosp
conglin f6330825a3 Move json util code to common
So that it can be shared by CE CDM extraction tool later.

Test: m wv_factory_extraction_tool
Bug: 414642286
Change-Id: I6dba70227ce2789dd3686ebbf6ed3a0dbf68dc00
2025-06-17 06:23:19 +00:00
..
2025-06-17 06:23:19 +00:00

Widevine Factory Extraction Tool for AOSP partners

This tool extracts the BCC and generates the Certificate Signing Request (CSR) needed to be uploaded to Wideivine Provisioning server for Prov4 device registration.

CSR extraction instructions:

  1. Make wv_factory_extraction_tool:

    • m wv_factory_extraction_tool
  2. Locate build output and adb push it to the target device, e.g.:

    • adb push out/target/product/{product name}/vendor/bin/hw/wv_factory_extraction_tool /vendor/bin/hw/wv_factory_extraction_tool
  3. Restart Widevine service on the device to ensure a clean state before running the tool:

    • adb shell pkill -f -9 widevine
  4. Run the wv_factory_extractor tool on the target device. By default, the tool prints the CSR in JSON format directly to the console.

    • adb shell /vendor/bin/hw/wv_factory_extraction_tool json_csr or just
    • adb shell /vendor/bin/hw/wv_factory_extraction_tool For additional options, run the tool with the help argument:
    • adb shell /vendor/bin/hw/wv_factory_extraction_tool help

Uploading instructions:

  1. Save the extracted CSR to csr.json.

  2. Upload the csr.json file using common/wv_upload_tool.py: python3 wv_upload_tool.py --credentials=cred.json --org-name={your organization name} --json-csr=csr.json

    • Replace cred.json with the path to your OAuth 2.0 client credentials file. You can obtain this file through the Google Cloud Platform.
    • Replace {your organization name} with the name of your organization.