Change order of loading certificates from pk7 cert
------------- Add libcurl to media_cas_packager_sdk. libcurl will later be used by a key fetcher to retrieve entitlement key from License Server using a HTTP request. ------------- Add a function named parsehelper to parse DCSL from the key smith response. ------------- Move wv_cas_key_fetcher to media_cas_packager_sdk so partners can use it request entitlement keys from License Server. ------------- Add pkcs7 write method to x509_cert.cc ------------- Update boringssl_repo to latest in master-with-bazel ------------- Add a TsPacket class to media_cas_packager_sdk to allow the construction of a ECM TS packet in the SDK. ------------- Move InsertEcm() from our internal CAS directory to the media_cas_packager_sdk, to be used to build a ECM TS packet by the SDK. ------------- Add METADATA in common folder ------------- Refactoring of certificate verification into DrmRootCertificate. ------------- Extend the default duration of leaf certificates. ------------- Fix moe_test ------------- Add a new method to WvCasEcm to allow partner to create a TS packet carrying the generated ECM. ------------- Change from SHA1 to SHA256 for Cast certificates ------------- Update crypto mode enumeration to match WV ECM document ------------- Fix the way we set the validity dates ------------- Move exported_root/util/status to common/ to prepare for util::Status migration Also added constructor/operator to copy from/to util::Status. ------------- Add GenerateDCSLrequest function to certificate_util.h. ------------- Fix build break ------------- Allow 'table_id' (in the section header) be specified by caller of SDK method WvCasEcm::GenerateTsPacket(). ------------- Created by MOE: https://github.com/google/moe MOE_MIGRATED_REVID=224535399
This commit is contained in:
@@ -51,3 +51,14 @@ cc_binary(
|
||||
"//media_cas_packager_sdk/public:wv_cas_types",
|
||||
],
|
||||
)
|
||||
|
||||
cc_binary(
|
||||
name = "wv_cas_key_fetcher_example",
|
||||
srcs = ["wv_cas_key_fetcher_example.cc"],
|
||||
deps = [
|
||||
"//base",
|
||||
"//util:status",
|
||||
"//media_cas_packager_sdk/public:wv_cas_key_fetcher",
|
||||
"//protos/public:media_cas_encryption_proto",
|
||||
],
|
||||
)
|
||||
|
||||
70
example/wv_cas_key_fetcher_example.cc
Normal file
70
example/wv_cas_key_fetcher_example.cc
Normal file
@@ -0,0 +1,70 @@
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
// Copyright 2018 Google LLC.
|
||||
//
|
||||
// This software is licensed under the terms defined in the Widevine Master
|
||||
// License Agreement. For a copy of this agreement, please contact
|
||||
// widevine-licensing@google.com.
|
||||
////////////////////////////////////////////////////////////////////////////////
|
||||
|
||||
|
||||
#include <iostream>
|
||||
#include <string>
|
||||
|
||||
#include "gflags/gflags.h"
|
||||
#include "glog/logging.h"
|
||||
#include "util/status.h"
|
||||
#include "media_cas_packager_sdk/public/wv_cas_key_fetcher.h"
|
||||
#include "protos/public/media_cas_encryption.pb.h"
|
||||
|
||||
DEFINE_string(content_id, "21140844", "Content ID");
|
||||
DEFINE_bool(key_rotation, true, "Whether key rotation is enabled");
|
||||
DEFINE_string(track_type, "SD", "Provider name");
|
||||
|
||||
namespace util = widevine::util;
|
||||
|
||||
int main(int argc, char **argv) {
|
||||
gflags::ParseCommandLineFlags(&argc, &argv, true);
|
||||
CHECK(!FLAGS_content_id.empty() && !FLAGS_track_type.empty())
|
||||
<< "Flags 'content_id' and 'track_type' are required";
|
||||
// Required flags in key fetcher.
|
||||
CHECK(!FLAGS_license_server.empty() && !FLAGS_signing_provider.empty() &&
|
||||
!FLAGS_signing_key.empty() && !FLAGS_signing_iv.empty())
|
||||
<< "Flags 'license_server', 'signing_provider', 'signing_key' "
|
||||
"and 'signing_iv' are required";
|
||||
|
||||
std::string request_str;
|
||||
widevine::CasEncryptionRequest request;
|
||||
request.set_provider(FLAGS_signing_provider);
|
||||
request.set_content_id(FLAGS_content_id);
|
||||
request.set_key_rotation(FLAGS_key_rotation);
|
||||
// Only 1 track in this example.
|
||||
request.add_track_types(FLAGS_track_type);
|
||||
LOG(INFO) << "Request: " << request.ShortDebugString();
|
||||
if (!request.SerializeToString(&request_str)) {
|
||||
LOG(ERROR) << "Failed to serialize request";
|
||||
return -1;
|
||||
}
|
||||
|
||||
std::string signed_response_str;
|
||||
widevine::cas::WvCasKeyFetcher key_fetcher;
|
||||
util::Status status =
|
||||
key_fetcher.RequestEntitlementKey(request_str, &signed_response_str);
|
||||
if (!status.ok()) {
|
||||
LOG(ERROR) << "Failed to request entitlement key";
|
||||
return -1;
|
||||
}
|
||||
widevine::SignedCasEncryptionResponse signed_response;
|
||||
if (!signed_response.ParseFromString(signed_response_str)) {
|
||||
LOG(ERROR) << "Failed to deserialize signed response";
|
||||
return -1;
|
||||
}
|
||||
LOG(INFO) << "Signed response: " << signed_response.ShortDebugString();
|
||||
widevine::CasEncryptionResponse response;
|
||||
if (!response.ParseFromString(signed_response.response())) {
|
||||
LOG(ERROR) << "Failed to deserialize response";
|
||||
return -1;
|
||||
}
|
||||
LOG(INFO) << "Response: " << response.ShortDebugString();
|
||||
|
||||
return 0;
|
||||
}
|
||||
Reference in New Issue
Block a user