diff --git a/DOWNLOAD.cmd b/DOWNLOAD.cmd
new file mode 100644
index 0000000..c444fec
--- /dev/null
+++ b/DOWNLOAD.cmd
@@ -0,0 +1,2 @@
+python bad37.py --url https://www.paramountplus.com/shows/mayor-of-kingstown/ -s 1 -e 3 --alang es-la en --slang es-la en --flang es-la
+pause
\ No newline at end of file
diff --git a/KEYS/PARAMOUNTPLUS.txt b/KEYS/PARAMOUNTPLUS.txt
new file mode 100644
index 0000000..4cb5550
--- /dev/null
+++ b/KEYS/PARAMOUNTPLUS.txt
@@ -0,0 +1 @@
+##### One KEY per line. #####
diff --git a/README.md b/README.md
index f6ec4d6..c31c6f8 100644
--- a/README.md
+++ b/README.md
@@ -1,2 +1,38 @@
-# Paramount Plus 4k Downloader
- Tool To Get Downloads up to 4k from Paramount+
+
+
Paramount 4K Downloader
+
+
+ Tool To Get Downloads up to 4k from Paramount+ :smile:
+
+
+
+
+
+
+ Hello Fellow < Developers/ >!
+
+
+
+
+
+ Hi! My name is WVDUMP. I am Leaking the scripts to punish few idiots :smile:
+
+
+ About Me
+
+
+
+- 🔠I’m currently working on Java scripts
+
+- 🌱 I’m currently learning Python
+
+- 👯 Sharing is caring
+
+
+- âš¡ CDM IS NOT INCLUDED BUY it from wvfuck@cyberfiends.net âš¡
+
+
+
+
+
+
diff --git a/bad37.py b/bad37.py
new file mode 100644
index 0000000..e188658
--- /dev/null
+++ b/bad37.py
@@ -0,0 +1,128 @@
+# -*- coding: utf-8 -*-
+# Module: BAD Project
+# Created on: 01-06-2021
+# Authors: JUNi
+# Version: 1.0
+
+import argparse
+import os
+import sys
+
+
+parser = argparse.ArgumentParser()
+#Common:
+parser.add_argument("content", nargs="?", help="Content URL or ID")
+parser.add_argument("--url", dest="url_season", help="If set, it will download all assets from the season provided.")
+parser.add_argument("--tqdm", dest="tqmd_mode", help="If set, will download with threading", action="store_true")
+parser.add_argument("--nv", "--no-video", dest="novideo", help="If set, don't download video", action="store_true")
+parser.add_argument("--na", "--no-audio", dest="noaudio", help="If set, don't download audio", action="store_true")
+parser.add_argument("--ns", "--no-subs", dest="nosubs", help="If set, don't download subs", action="store_true")
+parser.add_argument("--all-season", dest="all_season", help="If set, active download mode.", action="store_true")
+parser.add_argument("-e", "--episode", dest="episodeStart", help="If set, it will start downloading the season from that episode.")
+parser.add_argument("-s", dest="season", help="If set, it will download all assets from the season provided.")
+parser.add_argument("--tag", type=str, required=False, help="Release group tag to use for filenames")
+parser.add_argument("-q", "--quality", dest="customquality", type=lambda x: [x.rstrip('p')], help="For configure quality of video.", default=[])
+parser.add_argument("-o", "--output", dest="output", default="downloads", help="If set, it will download all assets to directory provided.")
+parser.add_argument("--keep", dest="keep", help="If set, it will list all formats available.", action="store_true")
+parser.add_argument("--info", help="If set, it will print manifest infos and exit.", action="store_true")
+parser.add_argument("--no-mux", dest="nomux", help="If set, dont mux.", action="store_true")
+#parser.add_argument("--force-mux", dest="force_mux", nargs=1, help="If set, force mux.", default=[])
+#parser.add_argument("--langtag", dest="langtag", nargs=1, help="For configure language tag of MKV.", default=[])
+parser.add_argument("--only-2ch-audio", dest="only_2ch_audio", help="If set, no clean tag subtitles.", action="store_true")
+parser.add_argument("--alang", "--audio-language", dest="audiolang", nargs="*", help="If set, download only selected audio languages", default=[])
+parser.add_argument("--slang", "--subtitle-language", dest="sublang", nargs="*", help="If set, download only selected subtitle languages", default=[])
+parser.add_argument("--flang", "--forced-language", dest="forcedlang", nargs="*", help="If set, download only selected forced subtitle languages", default=[])
+parser.add_argument("--no-cleansubs", dest="nocleansubs", help="If set, no clean tag subtitles.", action="store_true")
+parser.add_argument("--hevc", dest="hevc", help="If set, it will return HEVC manifest", action="store_true")
+parser.add_argument("--uhd", dest="uhd", help="If set, it will return UHD manifest", action="store_true")
+parser.add_argument("--license", dest="license", help="Only print keys, don't download", action="store_true")
+parser.add_argument("-licenses-as-json", help="Save the wv keys as json instead", action="store_true")
+parser.add_argument("--debug", action="store_true", help="Enable debug logging")
+parser.add_argument("--aformat-51ch", "--audio-format-51ch", dest="aformat_51ch", help="For configure format of audio.")
+parser.add_argument("--nc", "--no-chapters", dest="nochpaters", help="If set, don't download chapters", action="store_true")
+parser.add_argument("-c", "--codec", choices=["widevine", "playready"], help="Video type to download", default="playready")
+parser.add_argument("--ap", dest="audiocodec", default="atmos", choices=["aac", "ac3", "atmos"], help="audio codec profile")
+
+#HBOMAX
+parser.add_argument("--atmos", dest="atmos", help="If set, it will return Atmos MPDs", action="store_true")
+parser.add_argument("--ad", "--desc-audio", action="store_true", dest="desc_audio", help="Download descriptive audio instead of normal dialogue")
+parser.add_argument("--hdr", dest="hdr", help="If set, it will return HDR manifest", action="store_true")
+parser.add_argument("-r", "--region", choices=["la", "us"], help="HBO Max video region", default="us")
+parser.add_argument("--vp", dest="videocodec", default="h264", choices=["h264", "hevc", "hdr"], help="video codec profile")
+
+#Clarovideo:
+parser.add_argument("--m3u8", dest="m3u8mode", help="If set, it will return M3U8 manifest", action="store_true")
+parser.add_argument("--file", dest="txtpath", help="If set, it will download links of an txt file")
+
+#DisneyPlus:
+parser.add_argument("--tlang", "--title-language", dest="titlelang", nargs=1, help="If set, it will change title language", default="es-419")
+parser.add_argument("--scenario1", dest="scenarioDSNP", help="Video API from DisneyPlus", default="chromecast-drm-cbcs")
+parser.add_argument("--scenario2", dest="scenarioSTAR", help="Video API from DisneyPlus", default="restricted-drm-ctr-sw")
+
+#PROXY:
+parser.add_argument("--proxy", dest="proxy", help="Proxy URL to use for both fetching metadata and downloading")
+#proxy format: http://email@email:password@host:port
+args = parser.parse_args()
+
+
+if args.debug:
+ import logging
+ logging.basicConfig(level=logging.DEBUG)
+
+currentFile = '__main__'
+realPath = os.path.realpath(currentFile)
+dirPath = os.path.dirname(realPath)
+dirName = os.path.basename(dirPath)
+
+if __name__ == "__main__":
+ if args.content:
+ args.url_season = args.content
+
+ if not args.url_season:
+ print('Please specify the URL of the content to download.')
+ sys.exit(1)
+
+ if (args.url_season and 'hbomax' in args.url_season):
+ mode = 'hbomax'
+ import hbomax
+ hbomax.main(args)
+ elif (args.url_season and 'clarovideo' in args.url_season):
+ mode = 'clarovideo'
+ import clarovideo
+ clarovideo.main(args)
+ elif (args.url_season and 'blim' in args.url_season):
+ mode = 'blimtv'
+ import blimtv
+ blimtv.main(args)
+ elif (args.url_season and 'nowonline' in args.url_season):
+ mode = 'nowonline'
+ import nowonline
+ nowonline.main(args)
+ elif (args.url_season and 'globo' in args.url_season):
+ mode = 'globoplay'
+ import globoplay
+ globoplay.main(args)
+ elif (args.url_season and 'paramountplus.com' in args.url_season):
+ mode = 'paramountplus'
+ import paramountplus
+ paramountplus.main(args)
+ elif (args.url_season and 'disneyplus' in args.url_season):
+ mode = 'disneyplus'
+ import disneyplus
+ disneyplus.main(args)
+ elif (args.url_season and 'starplus.com' in args.url_season):
+ mode = 'starplus'
+ import starplus
+ starplus.main(args)
+ elif (args.url_season and 'tv.apple.com' in args.url_season):
+ mode = 'appletv'
+ import appletv
+ appletv.main(args)
+ elif (args.url_season and 'telecine' in args.url_season):
+ mode = 'telecine'
+ import telecineplay
+ telecineplay.main(args)
+
+ else:
+ print("Error! This url or mode is not recognized.")
+ sys.exit(0)
\ No newline at end of file
diff --git a/cookies/cookies_pmnp.txt b/cookies/cookies_pmnp.txt
new file mode 100644
index 0000000..e69de29
diff --git a/paramountplus.py b/paramountplus.py
new file mode 100644
index 0000000..bb8b430
--- /dev/null
+++ b/paramountplus.py
@@ -0,0 +1,910 @@
+# -*- coding: utf-8 -*-
+# Module: Paramount Plus Downloader
+# Created on: 19-02-2021
+# Authors: JUNi
+# Version: 2.0
+
+import urllib.parse
+import re, base64, requests, sys, os
+import subprocess, shutil
+import xmltodict, isodate
+import json, ffmpy, math
+import http, html, time, pathlib, glob
+
+from unidecode import unidecode
+from http.cookiejar import MozillaCookieJar
+from titlecase import titlecase
+from pymediainfo import MediaInfo
+from m3u8 import parse as m3u8parser
+
+import pywidevine.clients.paramountplus.config as pmnp_cfg
+from pywidevine.clients.proxy_config import ProxyConfig
+from pywidevine.muxer.muxer import Muxer
+
+from pywidevine.clients.paramountplus.downloader import WvDownloader
+from pywidevine.clients.paramountplus.config import WvDownloaderConfig
+
+
+currentFile = 'paramountplus'
+realPath = os.path.realpath(currentFile)
+dirPath = os.path.dirname(realPath)
+USER_AGENT = 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36'
+SESSION = requests.Session()
+
+def main(args):
+ global _id
+
+ proxies = {}
+ proxy_meta = args.proxy
+ if proxy_meta == 'none':
+ proxies['meta'] = {'http': None, 'https': None}
+ elif proxy_meta:
+ proxies['meta'] = {'http': proxy_meta, 'https': proxy_meta}
+ SESSION.proxies = proxies.get('meta')
+ proxy_cfg = ProxyConfig(proxies)
+
+ if not os.path.exists(dirPath + '/KEYS'):
+ os.makedirs(dirPath + '/KEYS')
+ else:
+ keys_file = dirPath + '/KEYS/PARAMOUNTPLUS.txt'
+ try:
+ keys_file_pmnp = open(keys_file, 'r')
+ keys_file_txt = keys_file_pmnp.readlines()
+ except Exception:
+ with open(keys_file, 'a', encoding='utf8') as (file):
+ file.write('##### One KEY per line. #####\n')
+ keys_file_pmnp = open(keys_file, 'r', encoding='utf8')
+ keys_file_txt = keys_file_pmnp.readlines()
+
+ def alphanumericSort(l):
+ def convert(text):
+ if text.isdigit():
+ return int(text)
+ else:
+ return text
+
+ def alphanum_key(key):
+ return [convert(c) for c in re.split('([0-9]+)', key)]
+
+ return sorted(l, key=alphanum_key)
+
+ def convert_size(size_bytes):
+ if size_bytes == 0:
+ return '0bps'
+ else:
+ s = round(size_bytes / 1000, 0)
+ return '%ikbps' % s
+
+ def get_size(size):
+ power = 1024
+ n = 0
+ Dic_powerN = {0:'', 1:'K', 2:'M', 3:'G', 4:'T'}
+ while size > power:
+ size /= power
+ n += 1
+ return str(round(size, 2)) + Dic_powerN[n] + 'B'
+
+ def getKeyId(name):
+ mp4dump = subprocess.Popen([pmnp_cfg.MP4DUMP, name], stdout=(subprocess.PIPE))
+ mp4dump = str(mp4dump.stdout.read())
+ A = find_str(mp4dump, 'default_KID')
+ KEY_ID_ORI = ''
+ KEY_ID_ORI = mp4dump[A:A + 63].replace('default_KID = ', '').replace('[', '').replace(']', '').replace(' ', '')
+ if KEY_ID_ORI == '' or KEY_ID_ORI == "'":
+ KEY_ID_ORI = 'nothing'
+ return KEY_ID_ORI
+
+ def find_str(s, char):
+ index = 0
+ if char in s:
+ c = char[0]
+ for ch in s:
+ if ch == c:
+ if s[index:index + len(char)] == char:
+ return index
+ index += 1
+
+ return -1
+
+ def mediainfo_(file):
+ mediainfo_output = subprocess.Popen([pmnp_cfg.MEDIAINFO, '--Output=JSON', '-f', file], stdout=(subprocess.PIPE))
+ mediainfo_json = json.load(mediainfo_output.stdout)
+ return mediainfo_json
+
+ def replace_words(x):
+ x = re.sub(r'[]¡!"#$%\'()*+,:;<=>¿?@\\^_`{|}~[-]', '', x)
+ x = x.replace('/', '-')
+ return unidecode(x)
+
+ def ReplaceSubs1(X):
+ pattern1 = re.compile('(?!|||<\\/i>|<\\/b>|<\\/u>)(<)(?:[A-Za-z0-9_ -=]*)(>)')
+ pattern2 = re.compile('(?!<\\/i>|<\\/b>|<\\/u>)(<\\/)(?:[A-Za-z0-9_ -=]*)(>)')
+ X = X.replace('', '').replace('{\\an1}', '').replace('{\\an2}', '').replace('{\\an3}', '').replace('{\\an4}', '').replace('{\\an5}', '').replace('{\\an6}', '').replace('{\\an7}', '').replace('{\\an8}', '').replace('{\\an9}', '').replace('', '')
+ X = pattern1.sub('', X)
+ X = pattern2.sub('', X)
+ return X
+
+ def replace_code_lang(X):
+ X = X.lower()
+ X = X.replace('es-mx', 'es-la').replace('pt-BR', 'pt-br').replace('dolby digital', 'en').replace('dd+', 'en')
+ return X
+
+ def get_cookies(file_path):
+ try:
+ cj = http.cookiejar.MozillaCookieJar(file_path)
+ cj.load()
+ except Exception:
+ print('\nCookies not found! Please dump the cookies with the Chrome extension https://chrome.google.com/webstore/detail/cookiestxt/njabckikapfpffapmjgojcnbfjonfjfg and place the generated file in ' + file_path)
+ print('\nWarning, do not click on "download all cookies", you have to click on "click here".\n')
+ sys.exit(0)
+
+ cookies = str()
+ for cookie in cj:
+ cookie.value = urllib.parse.unquote(html.unescape(cookie.value))
+ cookies = cookies + cookie.name + '=' + cookie.value + ';'
+
+ cookies = list(cookies)
+ del cookies[-1]
+ cookies = ''.join(cookies)
+ return cookies
+
+ cookies_file = 'cookies_pmnp.txt'
+ cookies = get_cookies(dirPath + '/cookies/' + cookies_file)
+ pmnp_headers = {
+ 'Accept':'application/json, text/plain, */*',
+ 'Access-Control-Allow-Origin':'*',
+ 'cookie':cookies,
+ 'User-Agent':USER_AGENT
+ }
+
+ def mpd_parsing(mpd_url):
+ base_url = mpd_url.split('stream.mpd')[0]
+ r = SESSION.get(url=mpd_url)
+ r.raise_for_status()
+ xml = xmltodict.parse(r.text)
+ mpdf = json.loads(json.dumps(xml))
+ length = isodate.parse_duration(mpdf['MPD']['@mediaPresentationDuration']).total_seconds()
+ tracks = mpdf['MPD']['Period']['AdaptationSet']
+
+ def get_pssh(track):
+ pssh = ''
+ for t in track["ContentProtection"]:
+ if t['@schemeIdUri'].lower() == 'urn:uuid:edef8ba9-79d6-4ace-a3c8-27dcd51d21ed':
+ pssh = t["cenc:pssh"]
+ return pssh
+
+ def force_instance(x):
+ if isinstance(x['Representation'], list):
+ X = x['Representation']
+ else:
+ X = [x['Representation']]
+ return X
+
+ baseUrl = ''
+ video_list = []
+ for video_tracks in tracks:
+ if video_tracks['@contentType'] == 'video':
+ pssh = get_pssh(video_tracks)
+ for x in force_instance(video_tracks):
+ try:
+ codecs = x['@codecs']
+ except (KeyError, TypeError):
+ codecs = video_tracks['@codecs']
+ try:
+ baseUrl = x["BaseURL"]
+ except (KeyError, TypeError):
+ pass
+ video_dict = {
+ 'Height':x['@height'],
+ 'Width':x['@width'],
+ 'Bandwidth':x['@bandwidth'],
+ 'ID':x['@id'],
+ 'TID':video_tracks['@id'],
+ 'URL':baseUrl,
+ 'Codec':codecs}
+ video_list.append(video_dict)
+
+ video_list = sorted(video_list, key=(lambda k: int(k['Bandwidth'])))
+
+ while args.customquality != [] and int(video_list[(-1)]['Height']) > int(args.customquality[0]):
+ video_list.pop(-1)
+
+ audio_list = []
+ for audio_tracks in tracks:
+ if audio_tracks['@contentType'] == 'audio':
+ for x in force_instance(audio_tracks):
+ try:
+ codecs = x['@codecs']
+ except (KeyError, TypeError):
+ codecs = audio_tracks['@codecs']
+ try:
+ baseUrl = x["BaseURL"]
+ except (KeyError, TypeError):
+ pass
+
+ audio_dict = {
+ 'Bandwidth':x['@bandwidth'],
+ 'ID':x['@id'],
+ 'TID':audio_tracks['@id'],
+ 'Language':replace_code_lang(audio_tracks['@lang']),
+ 'URL':baseUrl,
+ 'Codec':codecs}
+ audio_list.append(audio_dict)
+
+ audio_list = sorted(audio_list, key=(lambda k: (str(k['Language']))), reverse=True)
+
+ if args.only_2ch_audio:
+ c = 0
+ while c != len(audio_list):
+ if '-3' in audio_list[c]['Codec'].split('=')[0]:
+ audio_list.remove(audio_list[c])
+ else:
+ c += 1
+
+ BitrateList = []
+ AudioLanguageList = []
+ for x in audio_list:
+ BitrateList.append(x['Bandwidth'])
+ AudioLanguageList.append(x['Language'])
+
+ BitrateList = alphanumericSort(list(set(BitrateList)))
+ AudioLanguageList = alphanumericSort(list(set(AudioLanguageList)))
+ audioList_new = []
+ audio_Dict_new = {}
+ for y in AudioLanguageList:
+ counter = 0
+ for x in audio_list:
+ if x['Language'] == y and counter == 0:
+ audio_Dict_new = {
+ 'Language':x['Language'],
+ 'Bandwidth':x['Bandwidth'],
+ 'Codec': x['Codec'],
+ 'TID':x['TID'],
+ 'URL':x['URL'],
+ 'ID':x['ID']}
+ audioList_new.append(audio_Dict_new)
+ counter = counter + 1
+
+ audioList = audioList_new
+ audio_list = sorted(audioList, key=(lambda k: (int(k['Bandwidth']), str(k['Language']))))
+
+ audioList_new = []
+ if args.audiolang:
+ for x in audio_list:
+ langAbbrev = x['Language']
+ if langAbbrev in list(args.audiolang):
+ audioList_new.append(x)
+ audio_list = audioList_new
+
+ if 'precon' in mpd_url:
+ sub_url = mpd_url.replace('_cenc_precon_dash/stream.mpd', '_fp_precon_hls/master.m3u8')
+ else:
+ sub_url = mpd_url.replace('_cenc_dash/stream.mpd', '_fp_hls/master.m3u8')
+ print(sub_url)
+
+ return base_url, length, video_list, audio_list, get_subtitles(sub_url), pssh, mpdf
+
+ def download_subs(filename, sub_url):
+ urlm3u8_base_url = re.split('(/)(?i)', sub_url)
+ del urlm3u8_base_url[-1]
+ urlm3u8_base_url = ''.join(urlm3u8_base_url)
+ urlm3u8_request = requests.get(sub_url).text
+ m3u8_json = m3u8parser(urlm3u8_request)
+
+ urls = []
+ for segment in m3u8_json['segments']:
+ if 'https://' not in segment['uri']:
+ segment_url = urlm3u8_base_url + segment['uri']
+ urls.append(segment_url)
+
+ print('\n' + filename)
+ aria2c_infile = ""
+ num_segments = len(urls)
+ digits = math.floor(math.log10(num_segments)) + 1
+ for (i, url) in enumerate(urls):
+ aria2c_infile += f"{url}\n"
+ aria2c_infile += f"\tout={filename}.{i:0{digits}d}.vtt\n"
+ aria2c_infile += f"\tdir={filename}\n"
+ subprocess.run([pmnp_cfg.ARIA2C, "--allow-overwrite=true", "--file-allocation=none",
+ "--console-log-level=warn", "--download-result=hide", "--summary-interval=0",
+ "-x16", "-j16", "-s1", "-i-"],
+ input=aria2c_infile.encode("utf-8"))
+
+ source_files = pathlib.Path(filename).rglob(r'./*.vtt')
+ with open(filename + '.vtt', mode='wb') as (destination):
+ for vtt in source_files:
+ with open(vtt, mode='rb') as (source):
+ shutil.copyfileobj(source, destination)
+
+ if os.path.exists(filename):
+ shutil.rmtree(filename)
+
+ print('\nConverting subtitles...')
+ for f in glob.glob(f'{filename}*.vtt'):
+ with open(f, 'r+', encoding='utf-8-sig') as (x):
+ old = x.read().replace('STYLE\n::cue() {\nfont-family: Arial, Helvetica, sans-serif;\n}', '').replace('WEBVTT', '').replace('X-TIMESTAMP-MAP=LOCAL:00:00:00.000,MPEGTS:9000', '').replace('\n\n\n', '\n')
+ with open(f, 'w+', encoding='utf-8-sig') as (x):
+ x.write(ReplaceSubs1(old))
+ SubtitleEdit_process = subprocess.Popen([pmnp_cfg.SUBTITLE_EDIT, '/convert', filename + ".vtt", "srt", "/MergeSameTexts"], shell=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE).wait()
+ for f in glob.glob(f'{filename}*.vtt'):
+ os.remove(f)
+
+ '''
+ for f in glob.glob(f'{filename}*.srt'):
+ with open(f, 'r+', encoding='utf-8-sig') as (x):
+ old = x.read().replace('STYLE\n::cue() {\nfont-family: Arial, Helvetica, sans-serif;\n}', '').replace('WEBVTT', '').replace('\nX-TIMESTAMP-MAP=LOCAL:00:00:00.000,MPEGTS:9000\n', '').replace('\n\n\n', '\n')
+ with open(f, 'w+', encoding='utf-8-sig') as (x):
+ if not args.nocleansubs:
+ x.write(ReplaceSubs1(old))
+ else:
+ x.write(ReplaceSubs2(old))
+ for f in glob.glob(f'{filename}*.vtt'):
+ os.remove(f)
+ '''
+
+ print('Done!')
+
+ def get_episodes(ep_str, num_eps):
+ eps = ep_str.split(',')
+ eps_final = []
+
+ for ep in eps:
+ if '-' in ep:
+ (start, end) = ep.split('-')
+ start = int(start)
+ end = int(end or num_eps)
+ eps_final += list(range(start, end + 1))
+ else:
+ eps_final.append(int(ep))
+
+ return eps_final
+
+ _id = args.url_season.split('/')[-2]
+ if '/video/' in args.url_season:
+ content_regex = r'(\/shows\/)([\w-]+)(\/video\/)([\w-]+)'
+ url_match = re.search(content_regex, args.url_season)
+ _id = url_match[2]
+
+ def get_content_info():
+ if 'shows' in args.url_season:
+ pmnp_season_url = 'https://www.paramountplus.com/shows/{}/xhr/episodes/page/0/size/100/xs/0/season/{}/'.format(_id, '')
+ season_req = requests.get(url=pmnp_season_url, headers=pmnp_headers, proxies=proxy_cfg.get_proxy('meta'))
+
+ if not args.season:
+ args.season = 'all'
+
+ seasons = []
+ if args.season:
+ if args.season == 'all':
+ seasons = 'all'
+ elif ',' in args.season:
+ seasons = [int(x) for x in args.season.split(',')]
+ elif '-' in args.season:
+ (start, end) = args.season.split('-')
+ seasons = list(range(int(start), int(end) + 1))
+ else:
+ seasons = [int(args.season)]
+
+ if seasons == 'all':
+ seasons_list = [x['season_number'] for x in season_req.json()['result']['data']]
+ seasons = sorted(set(seasons_list))
+
+ for season_num in seasons:
+ pmnp_season_url = 'https://www.paramountplus.com/shows/{}/xhr/episodes/page/0/size/500/xs/0/season/{}/'.format(_id, season_num)
+ season_req = requests.get(url=pmnp_season_url, headers=pmnp_headers, proxies=proxy_cfg.get_proxy('meta'))
+ if season_req.json()['result']['total'] < 1:
+ print('This season doesnt exist!')
+ exit()
+
+ for num, ep in enumerate(season_req.json()['result']['data'], start=1):
+ episodeNumber = ep['episode_number']
+ seasonNumber = ep['season_number']
+
+ if ' - ' in ep['series_title']:
+ seriesTitle = ep['series_title'].split(' - ')[0]
+ else:
+ seriesTitle = ep['series_title']
+ episodeTitle = replace_words(ep['label'])
+ seriesName = f'{replace_words(seriesTitle)} S{seasonNumber:0>2}E{episodeNumber:0>2}'
+ folderName = f'{replace_words(seriesTitle)} S{seasonNumber:0>2}'
+ raw_url = urllib.parse.urljoin('https://www.paramountplus.com', ep['metaData']['contentUrl'])
+
+ episodes_list_new = []
+ episodes_dict = {
+ 'id': ep['content_id'],
+ 'raw_url': raw_url,
+ 'pid':ep['metaData']['pid'],
+ 'seriesName':seriesName,
+ 'folderName':folderName,
+ 'episodeNumber': num,
+ 'seasonNumber':seasonNumber,
+ 'pmnpType': 'show'}
+ episodes_list_new.append(episodes_dict)
+ episodes_list = []
+ for x in episodes_list_new:
+ episodes_list.append(x)
+ #episodes_list = sorted(episodes_list, key=lambda x: x['episodeNumber'])
+
+ if args.episodeStart:
+ eps = get_episodes(args.episodeStart, len(episodes_list))
+ episodes_list = [x for x in episodes_list if x['episodeNumber'] in eps]
+
+ if 'video' in args.url_season:
+ episodes_list = [x for x in episodes_list if x['id'] in url_match.group(4)]
+
+ for content_json in episodes_list:
+ start_process(content_json)
+
+ if 'movies' in args.url_season:
+ while 1:
+ resp = requests.get(url=args.url_season + '/', headers=pmnp_headers, proxies=proxy_cfg.get_proxy('meta'))
+ if resp.ok:
+ break
+
+ html_data = resp
+ html_data = html_data.text.replace('\r\n', '').replace('\n', '').replace('\r', '').replace('\t', '').replace(' ', '')
+ html_data_list = re.split('()(?i)', html_data)
+ json_web = []
+ for div in html_data_list:
+ if 'player.paramsVO.adCallParams' in div:
+ print()
+ rg = re.compile('(player.metaData = )(.*)(;player.tms_program_id)')
+ m = rg.search(div)
+ if m:
+ json_web = m.group(2)
+ json_web = json.loads(json_web)
+
+ content_dict = {}
+ episodes_list = []
+ year_regex = r'(\d{4})'
+ movieTitle = replace_words(json_web['seriesTitle'])
+ try:
+ r = re.search(year_regex, json_web['airdate'])
+ except KeyError:
+ r = re.search(year_regex, json_web['airdate_tv'])
+ seriesName = f'{movieTitle} ({r.group(0)})'
+
+ content_dict = {
+ 'id':json_web['contentId'],
+ 'raw_url': str(args.url_season),
+ 'pid': json_web['pid'],
+ 'seriesName':seriesName,
+ 'folderName':None,
+ 'episodeNumber':1,
+ 'seasonNumber':1,
+ 'pmnpType': 'movie'}
+ episodes_list.append(content_dict)
+
+ for content_json in episodes_list:
+ start_process(content_json)
+
+ def get_license(id_json):
+ while 1:
+ resp = requests.get(url=id_json['raw_url'], headers=pmnp_headers, proxies=proxy_cfg.get_proxy('meta'))
+ if resp.ok:
+ break
+
+ html_data = resp
+ html_data = html_data.text.replace('\r\n', '').replace('\n', '').replace('\r', '').replace('\t', '').replace(' ', '')
+ html_data_list = re.split('()(?i)', html_data)
+ json_web = []
+ for div in html_data_list:
+ if '(!window.CBS.Registry.drmPromise) {' in div:
+ rg = re.compile('(player.drm = )(.*)(;}player.enableCP)')
+ m = rg.search(div)
+ if m:
+ json_web = m.group(2)
+ json_web = json.loads(json_web)
+
+ lic_url = json_web['widevine']['url']
+ header_auth = json_web['widevine']['header']['Authorization']
+ if not lic_url:
+ print('Too many requests...')
+ return lic_url, header_auth
+
+ global folderdownloader
+ if args.output:
+ if not os.path.exists(args.output):
+ os.makedirs(args.output)
+ os.chdir(args.output)
+ if ":" in str(args.output):
+ folderdownloader = str(args.output).replace('/','\\').replace('.\\','\\')
+ else:
+ folderdownloader = dirPath + '\\' + str(args.output).replace('/','\\').replace('.\\','\\')
+ else:
+ folderdownloader = dirPath.replace('/','\\').replace('.\\','\\')
+
+ def get_subtitles(url):
+ master_base_url = re.split('(/)(?i)', url)
+ del master_base_url[-1]
+ master_base_url = ''.join(master_base_url)
+ urlm3u8_request = requests.get(url).text
+ m3u8_json = m3u8parser(urlm3u8_request)
+
+ subs_list = []
+ for media in m3u8_json['media']:
+ if media['type'] == 'SUBTITLES':
+ if 'https://' not in media['uri']:
+ full_url = master_base_url + media['uri']
+ Full_URL_Type = False
+ else:
+ full_url = media['uri']
+ Full_URL_Type = True
+ subs_dict = {
+ 'Type':'subtitles',
+ 'trackType':'NORMAL',
+ 'Language':media['name'],
+ 'LanguageID':replace_code_lang(media['language']),
+ 'Profile':media['group_id'],
+ 'URL':full_url}
+ subs_list.append(subs_dict)
+
+ subsList_new = []
+ if args.sublang:
+ for x in subs_list:
+ sub_lang = x['LanguageID']
+ if sub_lang in list(args.sublang):
+ subsList_new.append(x)
+
+ subs_list = subsList_new
+
+ return subs_list
+
+ def get_manifest(id_json):
+ api_manifest = 'https://link.theplatform.com/s/dJ5BDC/{}?format=SMIL&manifest=m3u&Tracking=true&mbr=true'.format(id_json['pid'])
+ r = requests.get(url=api_manifest, headers=pmnp_headers, proxies=proxy_cfg.get_proxy('meta'))
+ smil = json.loads(json.dumps(xmltodict.parse(r.text)))
+ videoSrc = []
+ try:
+ for x in smil['smil']['body']['seq']['switch']:
+ videoSrc = x['video']['@src']
+ except Exception:
+ videoSrc = smil['smil']['body']['seq']['switch']['video']['@src']
+ lic_url, header_auth = get_license(id_json)
+ return {'mpd_url': videoSrc, 'wvLicense': lic_url, 'wvHeader': header_auth}
+
+ def start_process(content_info):
+ drm_info = get_manifest(content_info)
+ base_url, length, video_list, audio_list, subs_list, pssh, xml = mpd_parsing(drm_info['mpd_url'])
+ video_bandwidth = dict(video_list[(-1)])['Bandwidth']
+ video_height = str(dict(video_list[(-1)])['Height'])
+ video_width = str(dict(video_list[(-1)])['Width'])
+ video_codec = str(dict(video_list[(-1)])['Codec'])
+ video_format_id = str(dict(video_list[(-1)])['ID'])
+ video_track_id = str(dict(video_list[(-1)])['TID'])
+ if not args.license:
+ if not args.novideo:
+ print('\nVIDEO - Bitrate: ' + convert_size(int(video_bandwidth)) + ' - Profile: ' + video_codec.split('=')[0] + ' - Size: ' + get_size(length * float(video_bandwidth) * 0.125) + ' - Dimensions: ' + video_width + 'x' + video_height)
+ print()
+
+ if not args.noaudio:
+ if audio_list != []:
+ for x in audio_list:
+ audio_bandwidth = x['Bandwidth']
+ audio_representation_id = str(x['Codec'])
+ audio_lang = x['Language']
+ print('AUDIO - Bitrate: ' + convert_size(int(audio_bandwidth)) + ' - Profile: ' + audio_representation_id.split('=')[0] + ' - Size: ' + get_size(length * float(audio_bandwidth) * 0.125) + ' - Language: ' + audio_lang)
+ print()
+
+ if not args.nosubs:
+ if subs_list != []:
+ for z in subs_list:
+ sub_lang = z['LanguageID']
+ print('SUBTITLE - Profile: NORMAL - Language: ' + sub_lang)
+ print()
+
+ print('Name: ' + content_info['seriesName'])
+
+ if content_info['pmnpType'] == 'show':
+ CurrentName = content_info['seriesName']
+ CurrentHeigh = str(video_height)
+ VideoOutputName = folderdownloader + '\\' + str(content_info['folderName']) + '\\' + str(CurrentName) + ' [' + str(CurrentHeigh) + 'p].mkv'
+ else:
+ CurrentName = content_info['seriesName']
+ CurrentHeigh = str(video_height)
+ VideoOutputName = folderdownloader + '\\' + str(CurrentName) + '\\' + ' [' + str(CurrentHeigh) + 'p].mkv'
+
+ if args.license:
+ keys_all = get_keys(drm_info, pssh)
+ with open(keys_file, 'a', encoding='utf8') as (file):
+ file.write(CurrentName + '\n')
+ print('\n' + CurrentName)
+ for key in keys_all:
+ with open(keys_file, 'a', encoding='utf8') as (file):
+ file.write(key + '\n')
+ print(key)
+
+ else:
+
+ if not args.novideo or (not args.noaudio):
+ print("\nGetting KEYS...")
+ try:
+ keys_all = get_keys(drm_info, pssh)
+ except KeyError:
+ print('License request failed, using keys from txt')
+ keys_all = keys_file_txt
+ print("Done!")
+
+ if not os.path.isfile(VideoOutputName):
+ aria2c_input = ''
+ if not args.novideo:
+ inputVideo = CurrentName + ' [' + str(CurrentHeigh) + 'p].mp4'
+ if os.path.isfile(inputVideo):
+ print('\n' + inputVideo + '\nFile has already been successfully downloaded previously.\n')
+ else:
+ try:
+ wvdl_cfg = WvDownloaderConfig(xml, base_url, inputVideo, video_track_id, video_format_id)
+ wvdownloader = WvDownloader(wvdl_cfg)
+ wvdownloader.run()
+ except KeyError:
+ url = urllib.parse.urljoin(base_url, video_list[(-1)]['URL'])
+ aria2c_input += f'{url}\n'
+ aria2c_input += f'\tdir={folderdownloader}\n'
+ aria2c_input += f'\tout={inputVideo}\n'
+
+ if not args.noaudio:
+ for x in audio_list:
+ langAbbrev = x['Language']
+ format_id = x['ID']
+ inputAudio = CurrentName + ' ' + '(' + langAbbrev + ').mp4'
+ inputAudio_demuxed = CurrentName + ' ' + '(' + langAbbrev + ')' + '.m4a'
+ if os.path.isfile(inputAudio) or os.path.isfile(inputAudio_demuxed):
+ print('\n' + inputAudio + '\nFile has already been successfully downloaded previously.\n')
+ else:
+ try:
+ wvdl_cfg = WvDownloaderConfig(xml, base_url, inputAudio, x['TID'], x['ID'])
+ wvdownloader = WvDownloader(wvdl_cfg)
+ wvdownloader.run()
+ except KeyError:
+ url = urllib.parse.urljoin(base_url, x['URL'])
+ aria2c_input += f'{url}\n'
+ aria2c_input += f'\tdir={folderdownloader}\n'
+ aria2c_input += f'\tout={inputAudio}\n'
+
+ aria2c_infile = os.path.join(folderdownloader, 'aria2c_infile.txt')
+ with open(aria2c_infile, 'w') as fd:
+ fd.write(aria2c_input)
+ aria2c_opts = [
+ pmnp_cfg.ARIA2C,
+ '--allow-overwrite=true',
+ '--download-result=hide',
+ '--console-log-level=warn',
+ '-x16', '-s16', '-j16',
+ '-i', aria2c_infile]
+ subprocess.run(aria2c_opts, check=True)
+
+ if not args.nosubs:
+ if subs_list != []:
+ for z in subs_list:
+ langAbbrev = z['LanguageID']
+ inputSubtitle = CurrentName + ' ' + '(' + langAbbrev + ')'
+ if os.path.isfile(inputSubtitle + '.vtt') or os.path.isfile(inputSubtitle + '.srt'):
+ print('\n' + inputSubtitle + '\nFile has already been successfully downloaded previously.\n')
+ else:
+ download_subs(inputSubtitle, z['URL'])
+
+ CorrectDecryptVideo = False
+ if not args.novideo:
+ inputVideo = CurrentName + ' [' + str(CurrentHeigh) + 'p].mp4'
+ if os.path.isfile(inputVideo):
+ CorrectDecryptVideo = DecryptVideo(inputVideo=inputVideo, keys_video=keys_all)
+ else:
+ CorrectDecryptVideo = True
+
+ CorrectDecryptAudio = False
+ if not args.noaudio:
+ for x in audio_list:
+ langAbbrev = x['Language']
+ inputAudio = CurrentName + ' ' + '(' + langAbbrev + ')' + '.mp4'
+ if os.path.isfile(inputAudio):
+ CorrectDecryptAudio = DecryptAudio(inputAudio=inputAudio, keys_audio=keys_all)
+ else:
+ CorrectDecryptAudio = True
+
+ if not args.nomux:
+ if not args.novideo:
+ if not args.noaudio:
+ if CorrectDecryptVideo == True:
+ if CorrectDecryptAudio == True:
+ print('\nMuxing...')
+
+ pmnpType = content_info['pmnpType']
+ folderName = content_info['folderName']
+
+ if pmnpType=="show":
+ MKV_Muxer=Muxer(CurrentName=CurrentName,
+ SeasonFolder=folderName,
+ CurrentHeigh=CurrentHeigh,
+ Type=pmnpType,
+ mkvmergeexe=pmnp_cfg.MKVMERGE)
+
+ else:
+ MKV_Muxer=Muxer(CurrentName=CurrentName,
+ SeasonFolder=None,
+ CurrentHeigh=CurrentHeigh,
+ Type=pmnpType,
+ mkvmergeexe=pmnp_cfg.MKVMERGE)
+
+ MKV_Muxer.mkvmerge_muxer(lang="English")
+
+ if args.tag:
+ inputName = CurrentName + ' [' + CurrentHeigh + 'p].mkv'
+ release_group(base_filename=inputName,
+ default_filename=CurrentName,
+ folder_name=folderName,
+ type=pmnpType,
+ video_height=CurrentHeigh)
+
+ if not args.keep:
+ for f in os.listdir():
+ if re.fullmatch(re.escape(CurrentName) + r'.*\.(mp4|m4a|h264|h265|eac3|ac3|srt|txt|avs|lwi|mpd)', f):
+ os.remove(f)
+ print("Done!")
+ else:
+ print("\nFile '" + str(VideoOutputName) + "' already exists.")
+
+ def release_group(base_filename, default_filename, folder_name, type, video_height):
+ if type=='show':
+ video_mkv = os.path.join(folder_name, base_filename)
+ else:
+ video_mkv = base_filename
+
+ mediainfo = mediainfo_(video_mkv)
+ for v in mediainfo['media']['track']: # mediainfo do video
+ if v['@type'] == 'Video':
+ video_format = v['Format']
+
+ video_codec = ''
+ if video_format == "AVC":
+ video_codec = 'H.264'
+ elif video_format == "HEVC":
+ video_codec = 'H.265'
+
+ for m in mediainfo['media']['track']: # mediainfo do audio
+ if m['@type'] == 'Audio':
+ codec_name = m['Format']
+ channels_number = m['Channels']
+
+ audio_codec = ''
+ audio_channels = ''
+ if codec_name == "AAC":
+ audio_codec = 'AAC'
+ elif codec_name == "AC-3":
+ audio_codec = "DD"
+ elif codec_name == "E-AC-3":
+ audio_codec = "DDP"
+ elif codec_name == "E-AC-3 JOC":
+ audio_codec = "ATMOS"
+
+ if channels_number == "2":
+ audio_channels = "2.0"
+ elif channels_number == "6":
+ audio_channels = "5.1"
+
+ audio_ = audio_codec + audio_channels
+
+ # renomear arquivo
+ default_filename = default_filename.replace('&', '.and.')
+ default_filename = re.sub(r'[]!"#$%\'()*+,:;<=>?@\\^_`{|}~[-]', '', default_filename)
+ default_filename = default_filename.replace(' ', '.')
+ default_filename = re.sub(r'\.{2,}', '.', default_filename)
+ default_filename = unidecode(default_filename)
+
+ output_name = '{}.{}p.PMNP.WEB-DL.{}.{}-{}'.format(default_filename, video_height, audio_, video_codec, args.tag)
+ if type=='show':
+ outputName = os.path.join(folder_name, output_name + '.mkv')
+ else:
+ outputName = output_name + '.mkv'
+
+ os.rename(video_mkv, outputName)
+ print("{} -> {}".format(base_filename, output_name))
+
+ from pywidevine.decrypt.wvdecryptcustom import WvDecrypt
+ from pywidevine.cdm import cdm, deviceconfig
+
+ def get_keys(licInfo, pssh):
+ device = deviceconfig.device_asus_x00dd
+ wvdecrypt = WvDecrypt(init_data_b64=bytes(pssh.encode()), cert_data_b64=None, device=device)
+ license_req = SESSION.post(url=licInfo['wvLicense'], headers={'authorization':licInfo['wvHeader']}, data=wvdecrypt.get_challenge(), proxies=proxy_cfg.get_proxy('meta')).content
+ license_b64 = base64.b64encode(license_req)
+
+ wvdecrypt.update_license(license_b64)
+ status, keys = wvdecrypt.start_process()
+ return keys
+
+ def DecryptAudio(inputAudio, keys_audio):
+ key_audio_id_original = getKeyId(inputAudio)
+ outputAudioTemp = inputAudio.replace(".mp4", "_dec.mp4")
+ if key_audio_id_original != "nothing":
+ for key in keys_audio:
+ key_id=key[0:32]
+ if key_id == key_audio_id_original:
+ print("\nDecrypting audio...")
+ print ("Using KEY: " + key)
+ wvdecrypt_process = subprocess.Popen([pmnp_cfg.MP4DECRYPT, "--show-progress", "--key", key, inputAudio, outputAudioTemp])
+ stdoutdata, stderrdata = wvdecrypt_process.communicate()
+ wvdecrypt_process.wait()
+ time.sleep (50.0/1000.0)
+ os.remove(inputAudio)
+ print("\nDemuxing audio...")
+ mediainfo = MediaInfo.parse(outputAudioTemp)
+ audio_info = next(x for x in mediainfo.tracks if x.track_type == "Audio")
+ codec_name = audio_info.format
+
+ ext = ''
+ if codec_name == "AAC":
+ ext = '.m4a'
+ elif codec_name == "E-AC-3":
+ ext = ".eac3"
+ elif codec_name == "AC-3":
+ ext = ".ac3"
+ outputAudio = outputAudioTemp.replace("_dec.mp4", ext)
+ print("{} -> {}".format(outputAudioTemp, outputAudio))
+ ff = ffmpy.FFmpeg(executable=pmnp_cfg.FFMPEG, inputs={outputAudioTemp: None}, outputs={outputAudio: '-c copy'}, global_options="-y -hide_banner -loglevel warning")
+ ff.run()
+ time.sleep (50.0/1000.0)
+ os.remove(outputAudioTemp)
+ print("Done!")
+ return True
+
+ elif key_audio_id_original == "nothing":
+ return True
+
+ def DecryptVideo(inputVideo, keys_video):
+ key_video_id_original = getKeyId(inputVideo)
+ inputVideo = inputVideo
+ outputVideoTemp = inputVideo.replace('.mp4', '_dec.mp4')
+ outputVideo = inputVideo
+ if key_video_id_original != 'nothing':
+ for key in keys_video:
+ key_id = key[0:32]
+ if key_id == key_video_id_original:
+ print('\nDecrypting video...')
+ print('Using KEY: ' + key)
+ wvdecrypt_process = subprocess.Popen([pmnp_cfg.MP4DECRYPT, '--show-progress', '--key', key, inputVideo, outputVideoTemp])
+ stdoutdata, stderrdata = wvdecrypt_process.communicate()
+ wvdecrypt_process.wait()
+ print('\nRemuxing video...')
+ ff = ffmpy.FFmpeg(executable=pmnp_cfg.FFMPEG, inputs={outputVideoTemp: None}, outputs={outputVideo: '-c copy'}, global_options='-y -hide_banner -loglevel warning')
+ ff.run()
+ time.sleep(0.05)
+ os.remove(outputVideoTemp)
+ print('Done!')
+ return True
+
+ elif key_video_id_original == 'nothing':
+ return True
+
+ def DemuxAudio(inputAudio):
+ if os.path.isfile(inputAudio):
+ print('\nDemuxing audio...')
+ mediainfo = mediainfo_(inputAudio)
+ for m in mediainfo['media']['track']:
+ if m['@type'] == 'Audio':
+ codec_name = m['Format']
+ try:
+ codec_tag_string = m['Format_Commercial_IfAny']
+ except Exception:
+ codec_tag_string = ''
+
+ ext = ''
+ if codec_name == 'AAC':
+ ext = '.m4a'
+ else:
+ if codec_name == 'E-AC-3':
+ ext = '.eac3'
+ else:
+ if codec_name == 'AC-3':
+ ext = '.ac3'
+ outputAudio = inputAudio.replace('.mp4', ext)
+ print('{} -> {}'.format(inputAudio, outputAudio))
+ ff = ffmpy.FFmpeg(executable=pmnp_cfg.FFMPEG,
+ inputs={inputAudio: None},
+ outputs={outputAudio: '-c copy'},
+ global_options='-y -hide_banner -loglevel warning')
+ ff.run()
+ time.sleep(0.05)
+ os.remove(inputAudio)
+ print('Done!')
+
+ get_content_info()
diff --git a/pywidevine/cdm/__init__.py b/pywidevine/cdm/__init__.py
new file mode 100644
index 0000000..e69de29
diff --git a/pywidevine/cdm/cdm.py b/pywidevine/cdm/cdm.py
new file mode 100644
index 0000000..6b92e6f
--- /dev/null
+++ b/pywidevine/cdm/cdm.py
@@ -0,0 +1,380 @@
+import base64
+
+import os
+import time
+import binascii
+
+from google.protobuf.message import DecodeError
+from google.protobuf import text_format
+
+from pywidevine.cdm.formats import wv_proto2_pb2 as wv_proto2
+from pywidevine.cdm.session import Session
+from pywidevine.cdm.key import Key
+from Crypto.Random import get_random_bytes
+from Crypto.Random import random
+from Crypto import Random
+from Crypto.Cipher import PKCS1_OAEP, AES
+from Crypto.Hash import CMAC, SHA256, HMAC, SHA1
+from Crypto.PublicKey import RSA
+from Crypto.Signature import pss
+from Crypto.Util import Padding
+from pywidevine.cdm import cdmapi
+import logging
+
+
+class Cdm:
+ def __init__(self):
+ self.logger = logging.getLogger(__name__)
+ self.sessions = {}
+
+ def open_session(self, init_data_b64, device, raw_init_data=None, offline=False):
+ self.logger.debug("open_session(init_data_b64={}, device={}".format(init_data_b64, device))
+ self.logger.info("opening new cdm session")
+ if device.session_id_type == 'android':
+ # format: 16 random hexdigits, 2 digit counter, 14 0s
+ rand_ascii = ''.join(random.choice('ABCDEF0123456789') for _ in range(16))
+ counter = '01' # this resets regularly so its fine to use 01
+ rest = '00000000000000'
+ session_id = rand_ascii + counter + rest
+ session_id = session_id.encode('ascii')
+ elif device.session_id_type == 'chrome':
+ rand_bytes = get_random_bytes(16)
+ session_id = rand_bytes
+ else:
+ # other formats NYI
+ self.logger.error("device type is unusable")
+ return 1
+ if raw_init_data and isinstance(raw_init_data, (bytes, bytearray)):
+ # used for NF key exchange, where they don't provide a valid PSSH
+ init_data = raw_init_data
+ self.raw_pssh = True
+ else:
+ init_data = self._parse_init_data(init_data_b64)
+ self.raw_pssh = False
+
+ if init_data:
+ new_session = Session(session_id, init_data, device, offline)
+ else:
+ self.logger.error("unable to parse init data")
+ return 1
+ self.sessions[session_id] = new_session
+ self.logger.info("session opened and init data parsed successfully")
+ return session_id
+
+ def _parse_init_data(self, init_data_b64):
+ parsed_init_data = wv_proto2.WidevineCencHeader()
+ try:
+ self.logger.debug("trying to parse init_data directly")
+ parsed_init_data.ParseFromString(base64.b64decode(init_data_b64)[32:])
+ except DecodeError:
+ self.logger.debug("unable to parse as-is, trying with removed pssh box header")
+ try:
+ id_bytes = parsed_init_data.ParseFromString(base64.b64decode(init_data_b64)[32:])
+ except DecodeError:
+ self.logger.error("unable to parse, unsupported init data format")
+ return None
+ self.logger.debug("init_data:")
+ for line in text_format.MessageToString(parsed_init_data).splitlines():
+ self.logger.debug(line)
+ return parsed_init_data
+
+ def close_session(self, session_id):
+ self.logger.debug("close_session(session_id={})".format(session_id))
+ self.logger.info("closing cdm session")
+ if session_id in self.sessions:
+ self.sessions.pop(session_id)
+ self.logger.info("cdm session closed")
+ return 0
+ else:
+ self.logger.info("session {} not found".format(session_id))
+ return 1
+
+ def set_service_certificate(self, session_id, cert_b64):
+ self.logger.debug("set_service_certificate(session_id={}, cert={})".format(session_id, cert_b64))
+ self.logger.info("setting service certificate")
+
+ if session_id not in self.sessions:
+ self.logger.error("session id doesn't exist")
+ return 1
+
+ session = self.sessions[session_id]
+
+ message = wv_proto2.SignedMessage()
+
+ try:
+ message.ParseFromString(base64.b64decode(cert_b64))
+ except DecodeError:
+ self.logger.error("failed to parse cert as SignedMessage")
+
+ service_certificate = wv_proto2.SignedDeviceCertificate()
+
+ if message.Type:
+ self.logger.debug("service cert provided as signedmessage")
+ try:
+ service_certificate.ParseFromString(message.Msg)
+ except DecodeError:
+ self.logger.error("failed to parse service certificate")
+ return 1
+ else:
+ self.logger.debug("service cert provided as signeddevicecertificate")
+ try:
+ service_certificate.ParseFromString(base64.b64decode(cert_b64))
+ except DecodeError:
+ self.logger.error("failed to parse service certificate")
+ return 1
+
+ self.logger.debug("service certificate:")
+ for line in text_format.MessageToString(service_certificate).splitlines():
+ self.logger.debug(line)
+
+ session.service_certificate = service_certificate
+ session.privacy_mode = True
+ return 0
+
+ def sign_license_request(self, data):
+ em = binascii.b2a_hex((pss._EMSA_PSS_ENCODE(data, 2047, Random.get_random_bytes, lambda x, y: pss.MGF1(x, y, data), 20)))
+ sig = cdmapi.encrypt(em.decode('utf-8'))
+ return (binascii.a2b_hex(sig))
+
+ def get_license_request(self, session_id):
+ self.logger.debug("get_license_request(session_id={})".format(session_id))
+ self.logger.info("getting license request")
+
+ if session_id not in self.sessions:
+ self.logger.error("session ID does not exist")
+ return 1
+
+ session = self.sessions[session_id]
+
+ # raw pssh will be treated as bytes and not parsed
+ if self.raw_pssh:
+ license_request = wv_proto2.SignedLicenseRequestRaw()
+ else:
+ license_request = wv_proto2.SignedLicenseRequest()
+ client_id = wv_proto2.ClientIdentification()
+
+ if not os.path.exists(session.device_config.device_client_id_blob_filename):
+ self.logger.error("no client ID blob available for this device")
+ return 1
+
+ with open(session.device_config.device_client_id_blob_filename, "rb") as f:
+ try:
+ cid_bytes = client_id.ParseFromString(f.read())
+ except DecodeError:
+ self.logger.error("client id failed to parse as protobuf")
+ return 1
+
+ self.logger.debug("building license request")
+ if not self.raw_pssh:
+ license_request.Type = wv_proto2.SignedLicenseRequest.MessageType.Value('LICENSE_REQUEST')
+ license_request.Msg.ContentId.CencId.Pssh.CopyFrom(session.init_data)
+ else:
+ license_request.Type = wv_proto2.SignedLicenseRequestRaw.MessageType.Value('LICENSE_REQUEST')
+ license_request.Msg.ContentId.CencId.Pssh = session.init_data # bytes
+
+ if session.offline:
+ license_type = wv_proto2.LicenseType.Value('OFFLINE')
+ else:
+ license_type = wv_proto2.LicenseType.Value('DEFAULT')
+ license_request.Msg.ContentId.CencId.LicenseType = license_type
+ license_request.Msg.ContentId.CencId.RequestId = session_id
+ license_request.Msg.Type = wv_proto2.LicenseRequest.RequestType.Value('NEW')
+ license_request.Msg.RequestTime = int(time.time())
+ license_request.Msg.ProtocolVersion = wv_proto2.ProtocolVersion.Value('CURRENT')
+ if session.device_config.send_key_control_nonce:
+ license_request.Msg.KeyControlNonce = random.randrange(1, 2**31)
+
+ if session.privacy_mode:
+
+ if session.device_config.vmp:
+ self.logger.debug("vmp required, adding to client_id")
+ self.logger.debug("reading vmp hashes")
+ vmp_hashes = wv_proto2.FileHashes()
+ with open(session.device_config.device_vmp_blob_filename, "rb") as f:
+ try:
+ vmp_bytes = vmp_hashes.ParseFromString(f.read())
+ except DecodeError:
+ self.logger.error("vmp hashes failed to parse as protobuf")
+ return 1
+ client_id._FileHashes.CopyFrom(vmp_hashes)
+ self.logger.debug("privacy mode & service certificate loaded, encrypting client id")
+ self.logger.debug("unencrypted client id:")
+ for line in text_format.MessageToString(client_id).splitlines():
+ self.logger.debug(line)
+ cid_aes_key = get_random_bytes(16)
+ cid_iv = get_random_bytes(16)
+
+ cid_cipher = AES.new(cid_aes_key, AES.MODE_CBC, cid_iv)
+
+ encrypted_client_id = cid_cipher.encrypt(Padding.pad(client_id.SerializeToString(), 16))
+
+ service_public_key = RSA.importKey(session.service_certificate._DeviceCertificate.PublicKey)
+
+ service_cipher = PKCS1_OAEP.new(service_public_key)
+
+ encrypted_cid_key = service_cipher.encrypt(cid_aes_key)
+
+ encrypted_client_id_proto = wv_proto2.EncryptedClientIdentification()
+
+ encrypted_client_id_proto.ServiceId = session.service_certificate._DeviceCertificate.ServiceId
+ encrypted_client_id_proto.ServiceCertificateSerialNumber = session.service_certificate._DeviceCertificate.SerialNumber
+ encrypted_client_id_proto.EncryptedClientId = encrypted_client_id
+ encrypted_client_id_proto.EncryptedClientIdIv = cid_iv
+ encrypted_client_id_proto.EncryptedPrivacyKey = encrypted_cid_key
+
+ license_request.Msg.EncryptedClientId.CopyFrom(encrypted_client_id_proto)
+ else:
+ license_request.Msg.ClientId.CopyFrom(client_id)
+
+ if session.device_config.private_key_available:
+ key = RSA.importKey(open(session.device_config.device_private_key_filename).read())
+ print(key)
+ session.device_key = key
+ else:
+ self.logger.info("need device private key, other methods unimplemented")
+ # return 1
+
+ self.logger.debug("signing license request")
+
+ hash = SHA1.new(license_request.Msg.SerializeToString())
+ if(session.device_key is not None):
+ signature = pss.new(key).sign(hash)
+ else:
+ signature = self.sign_license_request(hash)
+
+ license_request.Signature = signature
+
+ session.license_request = license_request
+
+ self.logger.debug("license request:")
+ for line in text_format.MessageToString(session.license_request).splitlines():
+ self.logger.debug(line)
+ self.logger.info("license request created")
+ self.logger.debug("license request b64: {}".format(base64.b64encode(license_request.SerializeToString())))
+ return license_request.SerializeToString()
+
+ def provide_license(self, session_id, license_b64):
+ self.logger.debug("provide_license(session_id={}, license_b64={})".format(session_id, license_b64))
+ self.logger.info("decrypting provided license")
+
+ if session_id not in self.sessions:
+ self.logger.error("session does not exist")
+ return 1
+
+ session = self.sessions[session_id]
+
+ if not session.license_request:
+ self.logger.error("generate a license request first!")
+ return 1
+
+ license = wv_proto2.SignedLicense()
+ try:
+
+ license.ParseFromString(base64.b64decode(license_b64))
+
+ except DecodeError:
+ self.logger.error("unable to parse license - check protobufs")
+ return 1
+
+ session.license = license
+
+ self.logger.debug("license:")
+ for line in text_format.MessageToString(license).splitlines():
+ self.logger.debug(line)
+
+ self.logger.debug("deriving keys from session key")
+
+ oaep_cipher = PKCS1_OAEP.new(session.device_key)
+
+ if(session.device_key is not None):
+ session.session_key = oaep_cipher.decrypt(license.SessionKey)
+ else:
+ session_key = cdmapi.decrypt(binascii.b2a_hex(license.SessionKey).decode('utf-8'))
+ session.session_key = binascii.a2b_hex(session_key)
+
+ lic_req_msg = session.license_request.Msg.SerializeToString()
+
+ enc_key_base = b"ENCRYPTION\000" + lic_req_msg + b"\0\0\0\x80"
+ auth_key_base = b"AUTHENTICATION\0" + lic_req_msg + b"\0\0\2\0"
+
+ enc_key = b"\x01" + enc_key_base
+ auth_key_1 = b"\x01" + auth_key_base
+ auth_key_2 = b"\x02" + auth_key_base
+ auth_key_3 = b"\x03" + auth_key_base
+ auth_key_4 = b"\x04" + auth_key_base
+
+ cmac_obj = CMAC.new(session.session_key, ciphermod=AES)
+ cmac_obj.update(enc_key)
+
+ enc_cmac_key = cmac_obj.digest()
+
+ cmac_obj = CMAC.new(session.session_key, ciphermod=AES)
+ cmac_obj.update(auth_key_1)
+ auth_cmac_key_1 = cmac_obj.digest()
+
+ cmac_obj = CMAC.new(session.session_key, ciphermod=AES)
+ cmac_obj.update(auth_key_2)
+ auth_cmac_key_2 = cmac_obj.digest()
+
+ cmac_obj = CMAC.new(session.session_key, ciphermod=AES)
+ cmac_obj.update(auth_key_3)
+ auth_cmac_key_3 = cmac_obj.digest()
+
+ cmac_obj = CMAC.new(session.session_key, ciphermod=AES)
+ cmac_obj.update(auth_key_4)
+ auth_cmac_key_4 = cmac_obj.digest()
+
+ auth_cmac_combined_1 = auth_cmac_key_1 + auth_cmac_key_2
+ auth_cmac_combined_2 = auth_cmac_key_3 + auth_cmac_key_4
+
+ session.derived_keys['enc'] = enc_cmac_key
+ session.derived_keys['auth_1'] = auth_cmac_combined_1
+ session.derived_keys['auth_2'] = auth_cmac_combined_2
+
+ self.logger.debug('verifying license signature')
+
+ lic_hmac = HMAC.new(session.derived_keys['auth_1'], digestmod=SHA256)
+ lic_hmac.update(license.Msg.SerializeToString())
+
+ self.logger.debug("calculated sig: {} actual sig: {}".format(lic_hmac.hexdigest(), binascii.hexlify(license.Signature)))
+
+ if lic_hmac.digest() != license.Signature:
+ self.logger.info("license signature doesn't match - writing bin so they can be debugged")
+ with open("original_lic.bin", "wb") as f:
+ f.write(base64.b64decode(license_b64))
+ with open("parsed_lic.bin", "wb") as f:
+ f.write(license.SerializeToString())
+ self.logger.info("continuing anyway")
+
+ self.logger.debug("key count: {}".format(len(license.Msg.Key)))
+ for key in license.Msg.Key:
+ if key.Id:
+ key_id = key.Id
+ else:
+ key_id = wv_proto2.License.KeyContainer.KeyType.Name(key.Type).encode('utf-8')
+ encrypted_key = key.Key
+ iv = key.Iv
+ type = wv_proto2.License.KeyContainer.KeyType.Name(key.Type)
+
+ cipher = AES.new(session.derived_keys['enc'], AES.MODE_CBC, iv=iv)
+ decrypted_key = cipher.decrypt(encrypted_key)
+ if type == "OPERATOR_SESSION":
+ permissions = []
+ perms = key._OperatorSessionKeyPermissions
+ for (descriptor, value) in perms.ListFields():
+ if value == 1:
+ permissions.append(descriptor.name)
+
+ else:
+ permissions = []
+ session.keys.append(Key(key_id, type, Padding.unpad(decrypted_key, 16), permissions))
+
+ self.logger.info("decrypted all keys")
+ return 0
+
+ def get_keys(self, session_id):
+ if session_id in self.sessions:
+ return self.sessions[session_id].keys
+ else:
+ self.logger.error("session not found")
+ return 1
diff --git a/pywidevine/cdm/cdm_debug.py b/pywidevine/cdm/cdm_debug.py
new file mode 100644
index 0000000..bc67ca0
--- /dev/null
+++ b/pywidevine/cdm/cdm_debug.py
@@ -0,0 +1,324 @@
+import base64
+
+import os
+import time
+import binascii
+
+from google.protobuf.message import DecodeError
+from google.protobuf import text_format
+
+from pywidevine.cdm.formats import wv_proto2_pb2 as wv_proto2
+from pywidevine.cdm.session import Session
+from pywidevine.cdm.key import Key
+from Cryptodome.Random import get_random_bytes
+from Cryptodome.Random import random
+from Cryptodome.Cipher import PKCS1_OAEP, AES
+from Cryptodome.Hash import CMAC, SHA256, HMAC, SHA1
+from Cryptodome.PublicKey import RSA
+from Cryptodome.Signature import pss
+from Cryptodome.Util import Padding
+import logging
+
+class Cdm:
+ def __init__(self):
+ self.logger = logging.getLogger(__name__)
+ self.sessions = {}
+
+ def open_session(self, init_data_b64, device):
+ print("open_session(init_data_b64={}, device={}".format(init_data_b64, device))
+ print("opening new cdm session")
+ if device.session_id_type == 'android':
+ # format: 16 random hexdigits, 2 digit counter, 14 0s
+ rand_ascii = ''.join(random.choice('ABCDEF0123456789') for _ in range(16))
+ counter = '01' # this resets regularly so its fine to use 01
+ rest = '00000000000000'
+ session_id = rand_ascii + counter + rest
+ session_id = session_id.encode('ascii')
+ elif device.session_id_type == 'chrome':
+ rand_bytes = get_random_bytes(16)
+ session_id = rand_bytes
+ else:
+ # other formats NYI
+ print("device type is unusable")
+ return 1
+ init_data = self._parse_init_data(init_data_b64)
+ if init_data:
+ new_session = Session(session_id, init_data, device)
+ else:
+ print("unable to parse init data")
+ return 1
+ self.sessions[session_id] = new_session
+ print("session opened and init data parsed successfully")
+ return session_id
+
+ def _parse_init_data(self, init_data_b64):
+ parsed_init_data = wv_proto2.WidevineCencHeader()
+ try:
+ print("trying to parse init_data directly")
+ parsed_init_data.ParseFromString(base64.b64decode(init_data_b64))
+ except DecodeError:
+ print("unable to parse as-is, trying with removed pssh box header")
+ try:
+ id_bytes = parsed_init_data.ParseFromString(base64.b64decode(init_data_b64)[32:])
+ except DecodeError:
+ print("unable to parse, unsupported init data format")
+ return None
+ print("init_data:")
+ for line in text_format.MessageToString(parsed_init_data).splitlines():
+ print(line)
+ return parsed_init_data
+
+ def close_session(self, session_id):
+ print("close_session(session_id={})".format(session_id))
+ print("closing cdm session")
+ if session_id in self.sessions:
+ self.sessions.pop(session_id)
+ print("cdm session closed")
+ return 0
+ else:
+ print("session {} not found".format(session_id))
+ return 1
+
+ def set_service_certificate(self, session_id, cert_b64):
+ print("set_service_certificate(session_id={}, cert={})".format(session_id, cert_b64))
+ print("setting service certificate")
+
+ if session_id not in self.sessions:
+ print("session id doesn't exist")
+ return 1
+
+ session = self.sessions[session_id]
+
+ message = wv_proto2.SignedMessage()
+
+ try:
+ message.ParseFromString(base64.b64decode(cert_b64))
+ except DecodeError:
+ print("failed to parse cert as SignedMessage")
+
+ service_certificate = wv_proto2.SignedDeviceCertificate()
+
+ if message.Type:
+ print("service cert provided as signedmessage")
+ try:
+ service_certificate.ParseFromString(message.Msg)
+ except DecodeError:
+ print("failed to parse service certificate")
+ return 1
+ else:
+ print("service cert provided as signeddevicecertificate")
+ try:
+ service_certificate.ParseFromString(base64.b64decode(cert_b64))
+ except DecodeError:
+ print("failed to parse service certificate")
+ return 1
+
+ print("service certificate:")
+ for line in text_format.MessageToString(service_certificate).splitlines():
+ print(line)
+
+ session.service_certificate = service_certificate
+ session.privacy_mode = True
+
+ return 0
+
+ def get_license_request(self, session_id):
+ print("get_license_request(session_id={})".format(session_id))
+ print("getting license request")
+
+ if session_id not in self.sessions:
+ print("session ID does not exist")
+ return 1
+
+ session = self.sessions[session_id]
+
+ license_request = wv_proto2.SignedLicenseRequest()
+ client_id = wv_proto2.ClientIdentification()
+
+ if not os.path.exists(session.device_config.device_client_id_blob_filename):
+ print("no client ID blob available for this device")
+ return 1
+
+ with open(session.device_config.device_client_id_blob_filename, "rb") as f:
+ try:
+ cid_bytes = client_id.ParseFromString(f.read())
+ except DecodeError:
+ print("client id failed to parse as protobuf")
+ return 1
+
+ print("building license request")
+
+ license_request.Type = wv_proto2.SignedLicenseRequest.MessageType.Value('LICENSE_REQUEST')
+ license_request.Msg.ContentId.CencId.Pssh.CopyFrom(session.init_data)
+ license_request.Msg.ContentId.CencId.LicenseType = wv_proto2.LicenseType.Value('DEFAULT')
+ license_request.Msg.ContentId.CencId.RequestId = session_id
+ license_request.Msg.Type = wv_proto2.LicenseRequest.RequestType.Value('NEW')
+ license_request.Msg.RequestTime = int(time.time())
+ license_request.Msg.ProtocolVersion = wv_proto2.ProtocolVersion.Value('CURRENT')
+ if session.device_config.send_key_control_nonce:
+ license_request.Msg.KeyControlNonce = random.randrange(1, 2**31)
+
+ if session.privacy_mode:
+ print("privacy mode & service certificate loaded, encrypting client id")
+ print("unencrypted client id:")
+ for line in text_format.MessageToString(client_id).splitlines():
+ print(line)
+ cid_aes_key = get_random_bytes(16)
+ cid_iv = get_random_bytes(16)
+
+ cid_cipher = AES.new(cid_aes_key, AES.MODE_CBC, cid_iv)
+
+ encrypted_client_id = cid_cipher.encrypt(Padding.pad(client_id.SerializeToString(), 16))
+
+ service_public_key = RSA.importKey(session.service_certificate._DeviceCertificate.PublicKey)
+
+ service_cipher = PKCS1_OAEP.new(service_public_key)
+
+ encrypted_cid_key = service_cipher.encrypt(cid_aes_key)
+
+ encrypted_client_id_proto = wv_proto2.EncryptedClientIdentification()
+
+ encrypted_client_id_proto.ServiceId = session.service_certificate._DeviceCertificate.ServiceId
+ encrypted_client_id_proto.ServiceCertificateSerialNumber = session.service_certificate._DeviceCertificate.SerialNumber
+ encrypted_client_id_proto.EncryptedClientId = encrypted_client_id
+ encrypted_client_id_proto.EncryptedClientIdIv = cid_iv
+ encrypted_client_id_proto.EncryptedPrivacyKey = encrypted_cid_key
+
+ license_request.Msg.EncryptedClientId.CopyFrom(encrypted_client_id_proto)
+ else:
+ license_request.Msg.ClientId.CopyFrom(client_id)
+
+ if session.device_config.private_key_available:
+ key = RSA.importKey(open(session.device_config.device_private_key_filename).read())
+ session.device_key = key
+ else:
+ print("need device private key, other methods unimplemented")
+ return 1
+
+ print("signing license request")
+
+ hash = SHA1.new(license_request.Msg.SerializeToString())
+ signature = pss.new(key).sign(hash)
+
+ license_request.Signature = signature
+
+ session.license_request = license_request
+
+ print("license request:")
+ for line in text_format.MessageToString(session.license_request).splitlines():
+ print(line)
+ print("license request created")
+ print("license request b64: {}".format(base64.b64encode(license_request.SerializeToString())))
+ return license_request.SerializeToString()
+
+ def provide_license(self, session_id, license_b64):
+ print("provide_license(session_id={}, license_b64={})".format(session_id, license_b64))
+ print("decrypting provided license")
+
+ if session_id not in self.sessions:
+ print("session does not exist")
+ return 1
+
+ session = self.sessions[session_id]
+
+ if not session.license_request:
+ print("generate a license request first!")
+ return 1
+
+ license = wv_proto2.SignedLicense()
+ try:
+ license.ParseFromString(base64.b64decode(license_b64))
+ except DecodeError:
+ print("unable to parse license - check protobufs")
+ return 1
+
+ session.license = license
+
+ print("license:")
+ for line in text_format.MessageToString(license).splitlines():
+ print(line)
+
+ print("deriving keys from session key")
+
+ oaep_cipher = PKCS1_OAEP.new(session.device_key)
+
+ session.session_key = oaep_cipher.decrypt(license.SessionKey)
+
+ lic_req_msg = session.license_request.Msg.SerializeToString()
+
+ enc_key_base = b"ENCRYPTION\000" + lic_req_msg + b"\0\0\0\x80"
+ auth_key_base = b"AUTHENTICATION\0" + lic_req_msg + b"\0\0\2\0"
+
+ enc_key = b"\x01" + enc_key_base
+ auth_key_1 = b"\x01" + auth_key_base
+ auth_key_2 = b"\x02" + auth_key_base
+ auth_key_3 = b"\x03" + auth_key_base
+ auth_key_4 = b"\x04" + auth_key_base
+
+ cmac_obj = CMAC.new(session.session_key, ciphermod=AES)
+ cmac_obj.update(enc_key)
+
+ enc_cmac_key = cmac_obj.digest()
+
+ cmac_obj = CMAC.new(session.session_key, ciphermod=AES)
+ cmac_obj.update(auth_key_1)
+ auth_cmac_key_1 = cmac_obj.digest()
+
+ cmac_obj = CMAC.new(session.session_key, ciphermod=AES)
+ cmac_obj.update(auth_key_2)
+ auth_cmac_key_2 = cmac_obj.digest()
+
+ cmac_obj = CMAC.new(session.session_key, ciphermod=AES)
+ cmac_obj.update(auth_key_3)
+ auth_cmac_key_3 = cmac_obj.digest()
+
+ cmac_obj = CMAC.new(session.session_key, ciphermod=AES)
+ cmac_obj.update(auth_key_4)
+ auth_cmac_key_4 = cmac_obj.digest()
+
+ auth_cmac_combined_1 = auth_cmac_key_1 + auth_cmac_key_2
+ auth_cmac_combined_2 = auth_cmac_key_3 + auth_cmac_key_4
+
+ session.derived_keys['enc'] = enc_cmac_key
+ session.derived_keys['auth_1'] = auth_cmac_combined_1
+ session.derived_keys['auth_2'] = auth_cmac_combined_2
+
+ print('verifying license signature')
+
+ lic_hmac = HMAC.new(session.derived_keys['auth_1'], digestmod=SHA256)
+ lic_hmac.update(license.Msg.SerializeToString())
+
+ print("calculated sig: {} actual sig: {}".format(lic_hmac.hexdigest(), binascii.hexlify(license.Signature)))
+
+ if lic_hmac.digest() != license.Signature:
+ print("license signature doesn't match - writing bin so they can be debugged")
+ with open("original_lic.bin", "wb") as f:
+ f.write(base64.b64decode(license_b64))
+ with open("parsed_lic.bin", "wb") as f:
+ f.write(license.SerializeToString())
+ print("continuing anyway")
+
+ print("key count: {}".format(len(license.Msg.Key)))
+ for key in license.Msg.Key:
+ if key.Id:
+ key_id = key.Id
+ else:
+ key_id = wv_proto2.License.KeyContainer.KeyType.Name(key.Type).encode('utf-8')
+ encrypted_key = key.Key
+ iv = key.Iv
+ type = wv_proto2.License.KeyContainer.KeyType.Name(key.Type)
+
+ cipher = AES.new(session.derived_keys['enc'], AES.MODE_CBC, iv=iv)
+ decrypted_key = cipher.decrypt(encrypted_key)
+
+ session.keys.append(Key(key_id, type, Padding.unpad(decrypted_key, 16)))
+
+ print("decrypted all keys")
+ return 0
+
+ def get_keys(self, session_id):
+ if session_id in self.sessions:
+ return self.sessions[session_id].keys
+ else:
+ print("session not found")
+ return 1
diff --git a/pywidevine/cdm/cdmapi.pyd b/pywidevine/cdm/cdmapi.pyd
new file mode 100644
index 0000000..1a6ce73
Binary files /dev/null and b/pywidevine/cdm/cdmapi.pyd differ
diff --git a/pywidevine/cdm/deviceconfig.py b/pywidevine/cdm/deviceconfig.py
new file mode 100644
index 0000000..066f293
--- /dev/null
+++ b/pywidevine/cdm/deviceconfig.py
@@ -0,0 +1,54 @@
+import os
+
+device_asus_x00dd = {
+ 'name': 'asus_x00dd',
+ 'description': 'asus cdm',
+ 'security_level': 1,
+ 'session_id_type': 'android',
+ 'private_key_available': True,
+ 'vmp': False,
+ 'send_key_control_nonce': True
+}
+
+devices_available = [device_asus_x00dd]
+
+FILES_FOLDER = 'devices'
+
+
+class DeviceConfig:
+ def __init__(self, device):
+ self.device_name = device['name']
+ self.description = device['description']
+ self.security_level = device['security_level']
+ self.session_id_type = device['session_id_type']
+ self.private_key_available = device['private_key_available']
+ self.vmp = device['vmp']
+ self.send_key_control_nonce = device['send_key_control_nonce']
+
+ if 'keybox_filename' in device:
+ self.keybox_filename = os.path.join(os.path.dirname(__file__), FILES_FOLDER, device['name'], device['keybox_filename'])
+ else:
+ self.keybox_filename = os.path.join(os.path.dirname(__file__), FILES_FOLDER, device['name'], 'keybox')
+
+ if 'device_cert_filename' in device:
+ self.device_cert_filename = os.path.join(os.path.dirname(__file__), FILES_FOLDER, device['name'], device['device_cert_filename'])
+ else:
+ self.device_cert_filename = os.path.join(os.path.dirname(__file__), FILES_FOLDER, device['name'], 'device_cert')
+
+ if 'device_private_key_filename' in device:
+ self.device_private_key_filename = os.path.join(os.path.dirname(__file__), FILES_FOLDER, device['name'], device['device_private_key_filename'])
+ else:
+ self.device_private_key_filename = os.path.join(os.path.dirname(__file__), FILES_FOLDER, device['name'], 'device_private_key')
+
+ if 'device_client_id_blob_filename' in device:
+ self.device_client_id_blob_filename = os.path.join(os.path.dirname(__file__), FILES_FOLDER, device['name'], device['device_client_id_blob_filename'])
+ else:
+ self.device_client_id_blob_filename = os.path.join(os.path.dirname(__file__), FILES_FOLDER, device['name'], 'device_client_id_blob')
+
+ if 'device_vmp_blob_filename' in device:
+ self.device_vmp_blob_filename = os.path.join(os.path.dirname(__file__), FILES_FOLDER, device['name'], device['device_vmp_blob_filename'])
+ else:
+ self.device_vmp_blob_filename = os.path.join(os.path.dirname(__file__), FILES_FOLDER, device['name'], 'device_vmp_blob')
+
+ def __repr__(self):
+ return "DeviceConfig(name={}, description={}, security_level={}, session_id_type={}, private_key_available={}, vmp={})".format(self.device_name, self.description, self.security_level, self.session_id_type, self.private_key_available, self.vmp)
diff --git a/pywidevine/cdm/deviceconfig.py.example b/pywidevine/cdm/deviceconfig.py.example
new file mode 100644
index 0000000..87c8053
--- /dev/null
+++ b/pywidevine/cdm/deviceconfig.py.example
@@ -0,0 +1,88 @@
+import os
+
+device_nexus6_lvl1 = {
+ 'name': 'nexus6_lvl1',
+ 'description': 'nexus 6 firmware 5.1.1 lvl1 security level',
+ 'security_level': 1,
+ 'session_id_type': 'android',
+ 'private_key_available': True,
+ 'vmp': False,
+ 'send_key_control_nonce': True
+}
+
+device_chromecdm_903 = {
+ 'name': 'chromecdm_903',
+ 'description': 'chrome cdm windows 903',
+ 'security_level': 3,
+ 'session_id_type': 'chrome',
+ 'private_key_available': True,
+ 'vmp': False,
+ 'send_key_control_nonce': False
+}
+
+device_chromecdm_984 = {
+ 'name': 'chromecdm_984',
+ 'description': 'chrome cdm windows 984',
+ 'security_level': 3,
+ 'session_id_type': 'chrome',
+ 'private_key_available': True,
+ 'vmp': True,
+ 'send_key_control_nonce': False
+}
+
+device_chromecdm_1022 = {
+ 'name': 'chromecdm_1022',
+ 'description': 'chrome cdm windows 1022',
+ 'security_level': 3,
+ 'session_id_type': 'chrome',
+ 'private_key_available': True,
+ 'vmp': True,
+ 'send_key_control_nonce': False
+}
+
+
+devices_available = [device_nexus6_lvl1, device_chromecdm_903, device_chromecdm_984, device_chromecdm_1022]
+
+from __main__ import dirPath
+#main_folder = os.path.dirname(__file__)
+main_folder = os.path.join(dirPath, 'pywidevine', 'cdm')
+
+FILES_FOLDER = 'devices'
+
+class DeviceConfig:
+ def __init__(self, device):
+ self.device_name = device['name']
+ self.description = device['description']
+ self.security_level = device['security_level']
+ self.session_id_type = device['session_id_type']
+ self.private_key_available = device['private_key_available']
+ self.vmp = device['vmp']
+ self.send_key_control_nonce = device['send_key_control_nonce']
+
+ if 'keybox_filename' in device:
+ self.keybox_filename = os.path.join(main_folder, FILES_FOLDER, device['name'], device['keybox_filename'])
+ else:
+ self.keybox_filename = os.path.join(main_folder, FILES_FOLDER, device['name'], 'keybox')
+
+ if 'device_cert_filename' in device:
+ self.device_cert_filename = os.path.join(main_folder, FILES_FOLDER, device['name'], device['device_cert_filename'])
+ else:
+ self.device_cert_filename = os.path.join(main_folder, FILES_FOLDER, device['name'], 'device_cert')
+
+ if 'device_private_key_filename' in device:
+ self.device_private_key_filename = os.path.join(main_folder, FILES_FOLDER, device['name'], device['device_private_key_filename'])
+ else:
+ self.device_private_key_filename = os.path.join(main_folder, FILES_FOLDER, device['name'], 'device_private_key')
+
+ if 'device_client_id_blob_filename' in device:
+ self.device_client_id_blob_filename = os.path.join(main_folder, FILES_FOLDER, device['name'], device['device_client_id_blob_filename'])
+ else:
+ self.device_client_id_blob_filename = os.path.join(main_folder, FILES_FOLDER, device['name'], 'device_client_id_blob')
+
+ if 'device_vmp_blob_filename' in device:
+ self.device_vmp_blob_filename = os.path.join(main_folder, FILES_FOLDER, device['name'], device['device_vmp_blob_filename'])
+ else:
+ self.device_vmp_blob_filename = os.path.join(main_folder, FILES_FOLDER, device['name'], 'device_vmp_blob')
+
+ def __repr__(self):
+ return "DeviceConfig(name={}, description={}, security_level={}, session_id_type={}, private_key_available={}, vmp={})".format(self.device_name, self.description, self.security_level, self.session_id_type, self.private_key_available, self.vmp)
diff --git a/pywidevine/cdm/devices/.gitkeep b/pywidevine/cdm/devices/.gitkeep
new file mode 100644
index 0000000..e69de29
diff --git a/pywidevine/cdm/devices/chromecdm_2209/device_client_id_blob b/pywidevine/cdm/devices/chromecdm_2209/device_client_id_blob
new file mode 100644
index 0000000..347cdd9
Binary files /dev/null and b/pywidevine/cdm/devices/chromecdm_2209/device_client_id_blob differ
diff --git a/pywidevine/cdm/devices/chromecdm_2209/device_vmp_blob b/pywidevine/cdm/devices/chromecdm_2209/device_vmp_blob
new file mode 100644
index 0000000..454592b
Binary files /dev/null and b/pywidevine/cdm/devices/chromecdm_2209/device_vmp_blob differ
diff --git a/pywidevine/cdm/formats/__init__.py b/pywidevine/cdm/formats/__init__.py
new file mode 100644
index 0000000..e69de29
diff --git a/pywidevine/cdm/formats/__pycache__/__init__.cpython-37.pyc b/pywidevine/cdm/formats/__pycache__/__init__.cpython-37.pyc
new file mode 100644
index 0000000..fd5bba1
Binary files /dev/null and b/pywidevine/cdm/formats/__pycache__/__init__.cpython-37.pyc differ
diff --git a/pywidevine/cdm/formats/__pycache__/__init__.cpython-39.pyc b/pywidevine/cdm/formats/__pycache__/__init__.cpython-39.pyc
new file mode 100644
index 0000000..69459f9
Binary files /dev/null and b/pywidevine/cdm/formats/__pycache__/__init__.cpython-39.pyc differ
diff --git a/pywidevine/cdm/formats/__pycache__/wv_proto2_pb2.cpython-37.pyc b/pywidevine/cdm/formats/__pycache__/wv_proto2_pb2.cpython-37.pyc
new file mode 100644
index 0000000..234e62a
Binary files /dev/null and b/pywidevine/cdm/formats/__pycache__/wv_proto2_pb2.cpython-37.pyc differ
diff --git a/pywidevine/cdm/formats/__pycache__/wv_proto2_pb2.cpython-39.pyc b/pywidevine/cdm/formats/__pycache__/wv_proto2_pb2.cpython-39.pyc
new file mode 100644
index 0000000..28f8969
Binary files /dev/null and b/pywidevine/cdm/formats/__pycache__/wv_proto2_pb2.cpython-39.pyc differ
diff --git a/pywidevine/cdm/formats/wv_proto2.proto b/pywidevine/cdm/formats/wv_proto2.proto
new file mode 100644
index 0000000..04c9809
--- /dev/null
+++ b/pywidevine/cdm/formats/wv_proto2.proto
@@ -0,0 +1,466 @@
+syntax = "proto2";
+
+// from x86 (partial), most of it from the ARM version:
+message ClientIdentification {
+ enum TokenType {
+ KEYBOX = 0;
+ DEVICE_CERTIFICATE = 1;
+ REMOTE_ATTESTATION_CERTIFICATE = 2;
+ }
+ message NameValue {
+ required string Name = 1;
+ required string Value = 2;
+ }
+ message ClientCapabilities {
+ enum HdcpVersion {
+ HDCP_NONE = 0;
+ HDCP_V1 = 1;
+ HDCP_V2 = 2;
+ HDCP_V2_1 = 3;
+ HDCP_V2_2 = 4;
+ }
+ optional uint32 ClientToken = 1;
+ optional uint32 SessionToken = 2;
+ optional uint32 VideoResolutionConstraints = 3;
+ optional HdcpVersion MaxHdcpVersion = 4;
+ optional uint32 OemCryptoApiVersion = 5;
+ }
+ required TokenType Type = 1;
+ //optional bytes Token = 2; // by default the client treats this as blob, but it's usually a DeviceCertificate, so for usefulness sake, I'm replacing it with this one:
+ optional SignedDeviceCertificate Token = 2; // use this when parsing, "bytes" when building a client id blob
+ repeated NameValue ClientInfo = 3;
+ optional bytes ProviderClientToken = 4;
+ optional uint32 LicenseCounter = 5;
+ optional ClientCapabilities _ClientCapabilities = 6; // how should we deal with duped names? will have to look at proto docs later
+ optional FileHashes _FileHashes = 7; // vmp blob goes here
+}
+
+message DeviceCertificate {
+ enum CertificateType {
+ ROOT = 0;
+ INTERMEDIATE = 1;
+ USER_DEVICE = 2;
+ SERVICE = 3;
+ }
+ required CertificateType Type = 1; // the compiled code reused this as ProvisionedDeviceInfo.WvSecurityLevel, however that is incorrect (compiler aliased it as they're both identical as a structure)
+ optional bytes SerialNumber = 2;
+ optional uint32 CreationTimeSeconds = 3;
+ optional bytes PublicKey = 4;
+ optional uint32 SystemId = 5;
+ optional uint32 TestDeviceDeprecated = 6; // is it bool or int?
+ optional bytes ServiceId = 7; // service URL for service certificates
+}
+
+// missing some references,
+message DeviceCertificateStatus {
+ enum CertificateStatus {
+ VALID = 0;
+ REVOKED = 1;
+ }
+ optional bytes SerialNumber = 1;
+ optional CertificateStatus Status = 2;
+ optional ProvisionedDeviceInfo DeviceInfo = 4; // where is 3? is it deprecated?
+}
+
+message DeviceCertificateStatusList {
+ optional uint32 CreationTimeSeconds = 1;
+ repeated DeviceCertificateStatus CertificateStatus = 2;
+}
+
+message EncryptedClientIdentification {
+ required string ServiceId = 1;
+ optional bytes ServiceCertificateSerialNumber = 2;
+ required bytes EncryptedClientId = 3;
+ required bytes EncryptedClientIdIv = 4;
+ required bytes EncryptedPrivacyKey = 5;
+}
+
+// todo: fill (for this top-level type, it might be impossible/difficult)
+enum LicenseType {
+ ZERO = 0;
+ DEFAULT = 1; // 1 is STREAMING/temporary license; on recent versions may go up to 3 (latest x86); it might be persist/don't persist type, unconfirmed
+ OFFLINE = 2;
+}
+
+// todo: fill (for this top-level type, it might be impossible/difficult)
+// this is just a guess because these globals got lost, but really, do we need more?
+enum ProtocolVersion {
+ CURRENT = 21; // don't have symbols for this
+}
+
+
+message LicenseIdentification {
+ optional bytes RequestId = 1;
+ optional bytes SessionId = 2;
+ optional bytes PurchaseId = 3;
+ optional LicenseType Type = 4;
+ optional uint32 Version = 5;
+ optional bytes ProviderSessionToken = 6;
+}
+
+
+message License {
+ message Policy {
+ optional bool CanPlay = 1; // changed from uint32 to bool
+ optional bool CanPersist = 2;
+ optional bool CanRenew = 3;
+ optional uint32 RentalDurationSeconds = 4;
+ optional uint32 PlaybackDurationSeconds = 5;
+ optional uint32 LicenseDurationSeconds = 6;
+ optional uint32 RenewalRecoveryDurationSeconds = 7;
+ optional string RenewalServerUrl = 8;
+ optional uint32 RenewalDelaySeconds = 9;
+ optional uint32 RenewalRetryIntervalSeconds = 10;
+ optional bool RenewWithUsage = 11; // was uint32
+ }
+ message KeyContainer {
+ enum KeyType {
+ SIGNING = 1;
+ CONTENT = 2;
+ KEY_CONTROL = 3;
+ OPERATOR_SESSION = 4;
+ }
+ enum SecurityLevel {
+ SW_SECURE_CRYPTO = 1;
+ SW_SECURE_DECODE = 2;
+ HW_SECURE_CRYPTO = 3;
+ HW_SECURE_DECODE = 4;
+ HW_SECURE_ALL = 5;
+ }
+ message OutputProtection {
+ enum CGMS {
+ COPY_FREE = 0;
+ COPY_ONCE = 2;
+ COPY_NEVER = 3;
+ CGMS_NONE = 0x2A; // PC default!
+ }
+ optional ClientIdentification.ClientCapabilities.HdcpVersion Hdcp = 1; // it's most likely a copy of Hdcp version available here, but compiler optimized it away
+ optional CGMS CgmsFlags = 2;
+ }
+ message KeyControl {
+ required bytes KeyControlBlock = 1; // what is this?
+ required bytes Iv = 2;
+ }
+ message OperatorSessionKeyPermissions {
+ optional uint32 AllowEncrypt = 1;
+ optional uint32 AllowDecrypt = 2;
+ optional uint32 AllowSign = 3;
+ optional uint32 AllowSignatureVerify = 4;
+ }
+ message VideoResolutionConstraint {
+ optional uint32 MinResolutionPixels = 1;
+ optional uint32 MaxResolutionPixels = 2;
+ optional OutputProtection RequiredProtection = 3;
+ }
+ optional bytes Id = 1;
+ optional bytes Iv = 2;
+ optional bytes Key = 3;
+ optional KeyType Type = 4;
+ optional SecurityLevel Level = 5;
+ optional OutputProtection RequiredProtection = 6;
+ optional OutputProtection RequestedProtection = 7;
+ optional KeyControl _KeyControl = 8; // duped names, etc
+ optional OperatorSessionKeyPermissions _OperatorSessionKeyPermissions = 9; // duped names, etc
+ repeated VideoResolutionConstraint VideoResolutionConstraints = 10;
+ }
+ optional LicenseIdentification Id = 1;
+ optional Policy _Policy = 2; // duped names, etc
+ repeated KeyContainer Key = 3;
+ optional uint32 LicenseStartTime = 4;
+ optional uint32 RemoteAttestationVerified = 5; // bool?
+ optional bytes ProviderClientToken = 6;
+ // there might be more, check with newer versions (I see field 7-8 in a lic)
+ // this appeared in latest x86:
+ optional uint32 ProtectionScheme = 7; // type unconfirmed fully, but it's likely as WidevineCencHeader describesit (fourcc)
+}
+
+message LicenseError {
+ enum Error {
+ INVALID_DEVICE_CERTIFICATE = 1;
+ REVOKED_DEVICE_CERTIFICATE = 2;
+ SERVICE_UNAVAILABLE = 3;
+ }
+ //LicenseRequest.RequestType ErrorCode; // clang mismatch
+ optional Error ErrorCode = 1;
+}
+
+message LicenseRequest {
+ message ContentIdentification {
+ message CENC {
+ //optional bytes Pssh = 1; // the client's definition is opaque, it doesn't care about the contents, but the PSSH has a clear definition that is understood and requested by the server, thus I'll replace it with:
+ optional WidevineCencHeader Pssh = 1;
+ optional LicenseType LicenseType = 2; // unfortunately the LicenseType symbols are not present, acceptable value seems to only be 1 (is this persist/don't persist? look into it!)
+ optional bytes RequestId = 3;
+ }
+ message WebM {
+ optional bytes Header = 1; // identical to CENC, aside from PSSH and the parent field number used
+ optional LicenseType LicenseType = 2;
+ optional bytes RequestId = 3;
+ }
+ message ExistingLicense {
+ optional LicenseIdentification LicenseId = 1;
+ optional uint32 SecondsSinceStarted = 2;
+ optional uint32 SecondsSinceLastPlayed = 3;
+ optional bytes SessionUsageTableEntry = 4; // interesting! try to figure out the connection between the usage table blob and KCB!
+ }
+ optional CENC CencId = 1;
+ optional WebM WebmId = 2;
+ optional ExistingLicense License = 3;
+ }
+ enum RequestType {
+ NEW = 1;
+ RENEWAL = 2;
+ RELEASE = 3;
+ }
+ optional ClientIdentification ClientId = 1;
+ optional ContentIdentification ContentId = 2;
+ optional RequestType Type = 3;
+ optional uint32 RequestTime = 4;
+ optional bytes KeyControlNonceDeprecated = 5;
+ optional ProtocolVersion ProtocolVersion = 6; // lacking symbols for this
+ optional uint32 KeyControlNonce = 7;
+ optional EncryptedClientIdentification EncryptedClientId = 8;
+}
+
+// raw pssh hack
+message LicenseRequestRaw {
+ message ContentIdentification {
+ message CENC {
+ optional bytes Pssh = 1; // the client's definition is opaque, it doesn't care about the contents, but the PSSH has a clear definition that is understood and requested by the server, thus I'll replace it with:
+ //optional WidevineCencHeader Pssh = 1;
+ optional LicenseType LicenseType = 2; // unfortunately the LicenseType symbols are not present, acceptable value seems to only be 1 (is this persist/don't persist? look into it!)
+ optional bytes RequestId = 3;
+ }
+ message WebM {
+ optional bytes Header = 1; // identical to CENC, aside from PSSH and the parent field number used
+ optional LicenseType LicenseType = 2;
+ optional bytes RequestId = 3;
+ }
+ message ExistingLicense {
+ optional LicenseIdentification LicenseId = 1;
+ optional uint32 SecondsSinceStarted = 2;
+ optional uint32 SecondsSinceLastPlayed = 3;
+ optional bytes SessionUsageTableEntry = 4; // interesting! try to figure out the connection between the usage table blob and KCB!
+ }
+ optional CENC CencId = 1;
+ optional WebM WebmId = 2;
+ optional ExistingLicense License = 3;
+ }
+ enum RequestType {
+ NEW = 1;
+ RENEWAL = 2;
+ RELEASE = 3;
+ }
+ optional ClientIdentification ClientId = 1;
+ optional ContentIdentification ContentId = 2;
+ optional RequestType Type = 3;
+ optional uint32 RequestTime = 4;
+ optional bytes KeyControlNonceDeprecated = 5;
+ optional ProtocolVersion ProtocolVersion = 6; // lacking symbols for this
+ optional uint32 KeyControlNonce = 7;
+ optional EncryptedClientIdentification EncryptedClientId = 8;
+}
+
+
+message ProvisionedDeviceInfo {
+ enum WvSecurityLevel {
+ LEVEL_UNSPECIFIED = 0;
+ LEVEL_1 = 1;
+ LEVEL_2 = 2;
+ LEVEL_3 = 3;
+ }
+ optional uint32 SystemId = 1;
+ optional string Soc = 2;
+ optional string Manufacturer = 3;
+ optional string Model = 4;
+ optional string DeviceType = 5;
+ optional uint32 ModelYear = 6;
+ optional WvSecurityLevel SecurityLevel = 7;
+ optional uint32 TestDevice = 8; // bool?
+}
+
+
+// todo: fill
+message ProvisioningOptions {
+}
+
+// todo: fill
+message ProvisioningRequest {
+}
+
+// todo: fill
+message ProvisioningResponse {
+}
+
+message RemoteAttestation {
+ optional EncryptedClientIdentification Certificate = 1;
+ optional string Salt = 2;
+ optional string Signature = 3;
+}
+
+// todo: fill
+message SessionInit {
+}
+
+// todo: fill
+message SessionState {
+}
+
+// todo: fill
+message SignedCertificateStatusList {
+}
+
+message SignedDeviceCertificate {
+
+ //optional bytes DeviceCertificate = 1; // again, they use a buffer where it's supposed to be a message, so we'll replace it with what it really is:
+ optional DeviceCertificate _DeviceCertificate = 1; // how should we deal with duped names? will have to look at proto docs later
+ optional bytes Signature = 2;
+ optional SignedDeviceCertificate Signer = 3;
+}
+
+
+// todo: fill
+message SignedProvisioningMessage {
+}
+
+// the root of all messages, from either server or client
+message SignedMessage {
+ enum MessageType {
+ LICENSE_REQUEST = 1;
+ LICENSE = 2;
+ ERROR_RESPONSE = 3;
+ SERVICE_CERTIFICATE_REQUEST = 4;
+ SERVICE_CERTIFICATE = 5;
+ }
+ optional MessageType Type = 1; // has in incorrect overlap with License_KeyContainer_SecurityLevel
+ optional bytes Msg = 2; // this has to be casted dynamically, to LicenseRequest, License or LicenseError (? unconfirmed), for Request, no other fields but Type need to be present
+ // for SERVICE_CERTIFICATE, only Type and Msg are present, and it's just a DeviceCertificate with CertificateType set to SERVICE
+ optional bytes Signature = 3; // might be different type of signatures (ex. RSA vs AES CMAC(??), unconfirmed for now)
+ optional bytes SessionKey = 4; // often RSA wrapped for licenses
+ optional RemoteAttestation RemoteAttestation = 5;
+}
+
+
+
+// This message is copied from google's docs, not reversed:
+message WidevineCencHeader {
+ enum Algorithm {
+ UNENCRYPTED = 0;
+ AESCTR = 1;
+ };
+ optional Algorithm algorithm = 1;
+ repeated bytes key_id = 2;
+
+ // Content provider name.
+ optional string provider = 3;
+
+ // A content identifier, specified by content provider.
+ optional bytes content_id = 4;
+
+ // Track type. Acceptable values are SD, HD and AUDIO. Used to
+ // differentiate content keys used by an asset.
+ optional string track_type_deprecated = 5;
+
+ // The name of a registered policy to be used for this asset.
+ optional string policy = 6;
+
+ // Crypto period index, for media using key rotation.
+ optional uint32 crypto_period_index = 7;
+
+ // Optional protected context for group content. The grouped_license is a
+ // serialized SignedMessage.
+ optional bytes grouped_license = 8;
+
+ // Protection scheme identifying the encryption algorithm.
+ // Represented as one of the following 4CC values:
+ // 'cenc' (AESCTR), 'cbc1' (AESCBC),
+ // 'cens' (AESCTR subsample), 'cbcs' (AESCBC subsample).
+ optional uint32 protection_scheme = 9;
+
+ // Optional. For media using key rotation, this represents the duration
+ // of each crypto period in seconds.
+ optional uint32 crypto_period_seconds = 10;
+}
+
+
+// remove these when using it outside of protoc:
+
+// from here on, it's just for testing, these messages don't exist in the binaries, I'm adding them to avoid detecting type programmatically
+message SignedLicenseRequest {
+ enum MessageType {
+ LICENSE_REQUEST = 1;
+ LICENSE = 2;
+ ERROR_RESPONSE = 3;
+ SERVICE_CERTIFICATE_REQUEST = 4;
+ SERVICE_CERTIFICATE = 5;
+ }
+ optional MessageType Type = 1; // has in incorrect overlap with License_KeyContainer_SecurityLevel
+ optional LicenseRequest Msg = 2; // this has to be casted dynamically, to LicenseRequest, License or LicenseError (? unconfirmed), for Request, no other fields but Type need to be present
+ // for SERVICE_CERTIFICATE, only Type and Msg are present, and it's just a DeviceCertificate with CertificateType set to SERVICE
+ optional bytes Signature = 3; // might be different type of signatures (ex. RSA vs AES CMAC(??), unconfirmed for now)
+ optional bytes SessionKey = 4; // often RSA wrapped for licenses
+ optional RemoteAttestation RemoteAttestation = 5;
+}
+
+// hack
+message SignedLicenseRequestRaw {
+ enum MessageType {
+ LICENSE_REQUEST = 1;
+ LICENSE = 2;
+ ERROR_RESPONSE = 3;
+ SERVICE_CERTIFICATE_REQUEST = 4;
+ SERVICE_CERTIFICATE = 5;
+ }
+ optional MessageType Type = 1; // has in incorrect overlap with License_KeyContainer_SecurityLevel
+ optional LicenseRequestRaw Msg = 2; // this has to be casted dynamically, to LicenseRequest, License or LicenseError (? unconfirmed), for Request, no other fields but Type need to be present
+ // for SERVICE_CERTIFICATE, only Type and Msg are present, and it's just a DeviceCertificate with CertificateType set to SERVICE
+ optional bytes Signature = 3; // might be different type of signatures (ex. RSA vs AES CMAC(??), unconfirmed for now)
+ optional bytes SessionKey = 4; // often RSA wrapped for licenses
+ optional RemoteAttestation RemoteAttestation = 5;
+}
+
+
+message SignedLicense {
+ enum MessageType {
+ LICENSE_REQUEST = 1;
+ LICENSE = 2;
+ ERROR_RESPONSE = 3;
+ SERVICE_CERTIFICATE_REQUEST = 4;
+ SERVICE_CERTIFICATE = 5;
+ }
+ optional MessageType Type = 1; // has in incorrect overlap with License_KeyContainer_SecurityLevel
+ optional License Msg = 2; // this has to be casted dynamically, to LicenseRequest, License or LicenseError (? unconfirmed), for Request, no other fields but Type need to be present
+ // for SERVICE_CERTIFICATE, only Type and Msg are present, and it's just a DeviceCertificate with CertificateType set to SERVICE
+ optional bytes Signature = 3; // might be different type of signatures (ex. RSA vs AES CMAC(??), unconfirmed for now)
+ optional bytes SessionKey = 4; // often RSA wrapped for licenses
+ optional RemoteAttestation RemoteAttestation = 5;
+}
+
+message SignedServiceCertificate {
+ enum MessageType {
+ LICENSE_REQUEST = 1;
+ LICENSE = 2;
+ ERROR_RESPONSE = 3;
+ SERVICE_CERTIFICATE_REQUEST = 4;
+ SERVICE_CERTIFICATE = 5;
+ }
+ optional MessageType Type = 1; // has in incorrect overlap with License_KeyContainer_SecurityLevel
+ optional SignedDeviceCertificate Msg = 2; // this has to be casted dynamically, to LicenseRequest, License or LicenseError (? unconfirmed), for Request, no other fields but Type need to be present
+ // for SERVICE_CERTIFICATE, only Type and Msg are present, and it's just a DeviceCertificate with CertificateType set to SERVICE
+ optional bytes Signature = 3; // might be different type of signatures (ex. RSA vs AES CMAC(??), unconfirmed for now)
+ optional bytes SessionKey = 4; // often RSA wrapped for licenses
+ optional RemoteAttestation RemoteAttestation = 5;
+}
+
+//vmp support
+message FileHashes {
+ message Signature {
+ optional string filename = 1;
+ optional bool test_signing = 2; //0 - release, 1 - testing
+ optional bytes SHA512Hash = 3;
+ optional bool main_exe = 4; //0 for dlls, 1 for exe, this is field 3 in file
+ optional bytes signature = 5;
+ }
+ optional bytes signer = 1;
+ repeated Signature signatures = 2;
+}
diff --git a/pywidevine/cdm/formats/wv_proto2_pb2.py b/pywidevine/cdm/formats/wv_proto2_pb2.py
new file mode 100644
index 0000000..4c2a6d1
--- /dev/null
+++ b/pywidevine/cdm/formats/wv_proto2_pb2.py
@@ -0,0 +1,3324 @@
+# Generated by the protocol buffer compiler. DO NOT EDIT!
+# source: pywidevine/cdm/formats/wv_proto2.proto
+
+import sys
+_b=sys.version_info[0]<3 and (lambda x:x) or (lambda x:x.encode('latin1'))
+from google.protobuf.internal import enum_type_wrapper
+from google.protobuf import descriptor as _descriptor
+from google.protobuf import message as _message
+from google.protobuf import reflection as _reflection
+from google.protobuf import symbol_database as _symbol_database
+from google.protobuf import descriptor_pb2
+# @@protoc_insertion_point(imports)
+
+_sym_db = _symbol_database.Default()
+
+
+
+
+DESCRIPTOR = _descriptor.FileDescriptor(
+ name='pywidevine/cdm/formats/wv_proto2.proto',
+ package='',
+ syntax='proto2',
+ serialized_pb=_b('\n&pywidevine/cdm/formats/wv_proto2.proto\"\xe7\x05\n\x14\x43lientIdentification\x12-\n\x04Type\x18\x01 \x02(\x0e\x32\x1f.ClientIdentification.TokenType\x12\'\n\x05Token\x18\x02 \x01(\x0b\x32\x18.SignedDeviceCertificate\x12\x33\n\nClientInfo\x18\x03 \x03(\x0b\x32\x1f.ClientIdentification.NameValue\x12\x1b\n\x13ProviderClientToken\x18\x04 \x01(\x0c\x12\x16\n\x0eLicenseCounter\x18\x05 \x01(\r\x12\x45\n\x13_ClientCapabilities\x18\x06 \x01(\x0b\x32(.ClientIdentification.ClientCapabilities\x12 \n\x0b_FileHashes\x18\x07 \x01(\x0b\x32\x0b.FileHashes\x1a(\n\tNameValue\x12\x0c\n\x04Name\x18\x01 \x02(\t\x12\r\n\x05Value\x18\x02 \x02(\t\x1a\xa4\x02\n\x12\x43lientCapabilities\x12\x13\n\x0b\x43lientToken\x18\x01 \x01(\r\x12\x14\n\x0cSessionToken\x18\x02 \x01(\r\x12\"\n\x1aVideoResolutionConstraints\x18\x03 \x01(\r\x12L\n\x0eMaxHdcpVersion\x18\x04 \x01(\x0e\x32\x34.ClientIdentification.ClientCapabilities.HdcpVersion\x12\x1b\n\x13OemCryptoApiVersion\x18\x05 \x01(\r\"T\n\x0bHdcpVersion\x12\r\n\tHDCP_NONE\x10\x00\x12\x0b\n\x07HDCP_V1\x10\x01\x12\x0b\n\x07HDCP_V2\x10\x02\x12\r\n\tHDCP_V2_1\x10\x03\x12\r\n\tHDCP_V2_2\x10\x04\"S\n\tTokenType\x12\n\n\x06KEYBOX\x10\x00\x12\x16\n\x12\x44\x45VICE_CERTIFICATE\x10\x01\x12\"\n\x1eREMOTE_ATTESTATION_CERTIFICATE\x10\x02\"\x9b\x02\n\x11\x44\x65viceCertificate\x12\x30\n\x04Type\x18\x01 \x02(\x0e\x32\".DeviceCertificate.CertificateType\x12\x14\n\x0cSerialNumber\x18\x02 \x01(\x0c\x12\x1b\n\x13\x43reationTimeSeconds\x18\x03 \x01(\r\x12\x11\n\tPublicKey\x18\x04 \x01(\x0c\x12\x10\n\x08SystemId\x18\x05 \x01(\r\x12\x1c\n\x14TestDeviceDeprecated\x18\x06 \x01(\r\x12\x11\n\tServiceId\x18\x07 \x01(\x0c\"K\n\x0f\x43\x65rtificateType\x12\x08\n\x04ROOT\x10\x00\x12\x10\n\x0cINTERMEDIATE\x10\x01\x12\x0f\n\x0bUSER_DEVICE\x10\x02\x12\x0b\n\x07SERVICE\x10\x03\"\xc4\x01\n\x17\x44\x65viceCertificateStatus\x12\x14\n\x0cSerialNumber\x18\x01 \x01(\x0c\x12:\n\x06Status\x18\x02 \x01(\x0e\x32*.DeviceCertificateStatus.CertificateStatus\x12*\n\nDeviceInfo\x18\x04 \x01(\x0b\x32\x16.ProvisionedDeviceInfo\"+\n\x11\x43\x65rtificateStatus\x12\t\n\x05VALID\x10\x00\x12\x0b\n\x07REVOKED\x10\x01\"o\n\x1b\x44\x65viceCertificateStatusList\x12\x1b\n\x13\x43reationTimeSeconds\x18\x01 \x01(\r\x12\x33\n\x11\x43\x65rtificateStatus\x18\x02 \x03(\x0b\x32\x18.DeviceCertificateStatus\"\xaf\x01\n\x1d\x45ncryptedClientIdentification\x12\x11\n\tServiceId\x18\x01 \x02(\t\x12&\n\x1eServiceCertificateSerialNumber\x18\x02 \x01(\x0c\x12\x19\n\x11\x45ncryptedClientId\x18\x03 \x02(\x0c\x12\x1b\n\x13\x45ncryptedClientIdIv\x18\x04 \x02(\x0c\x12\x1b\n\x13\x45ncryptedPrivacyKey\x18\x05 \x02(\x0c\"\x9c\x01\n\x15LicenseIdentification\x12\x11\n\tRequestId\x18\x01 \x01(\x0c\x12\x11\n\tSessionId\x18\x02 \x01(\x0c\x12\x12\n\nPurchaseId\x18\x03 \x01(\x0c\x12\x1a\n\x04Type\x18\x04 \x01(\x0e\x32\x0c.LicenseType\x12\x0f\n\x07Version\x18\x05 \x01(\r\x12\x1c\n\x14ProviderSessionToken\x18\x06 \x01(\x0c\"\xa1\x0e\n\x07License\x12\"\n\x02Id\x18\x01 \x01(\x0b\x32\x16.LicenseIdentification\x12 \n\x07_Policy\x18\x02 \x01(\x0b\x32\x0f.License.Policy\x12\"\n\x03Key\x18\x03 \x03(\x0b\x32\x15.License.KeyContainer\x12\x18\n\x10LicenseStartTime\x18\x04 \x01(\r\x12!\n\x19RemoteAttestationVerified\x18\x05 \x01(\r\x12\x1b\n\x13ProviderClientToken\x18\x06 \x01(\x0c\x12\x18\n\x10ProtectionScheme\x18\x07 \x01(\r\x1a\xbb\x02\n\x06Policy\x12\x0f\n\x07\x43\x61nPlay\x18\x01 \x01(\x08\x12\x12\n\nCanPersist\x18\x02 \x01(\x08\x12\x10\n\x08\x43\x61nRenew\x18\x03 \x01(\x08\x12\x1d\n\x15RentalDurationSeconds\x18\x04 \x01(\r\x12\x1f\n\x17PlaybackDurationSeconds\x18\x05 \x01(\r\x12\x1e\n\x16LicenseDurationSeconds\x18\x06 \x01(\r\x12&\n\x1eRenewalRecoveryDurationSeconds\x18\x07 \x01(\r\x12\x18\n\x10RenewalServerUrl\x18\x08 \x01(\t\x12\x1b\n\x13RenewalDelaySeconds\x18\t \x01(\r\x12#\n\x1bRenewalRetryIntervalSeconds\x18\n \x01(\r\x12\x16\n\x0eRenewWithUsage\x18\x0b \x01(\x08\x1a\xf9\t\n\x0cKeyContainer\x12\n\n\x02Id\x18\x01 \x01(\x0c\x12\n\n\x02Iv\x18\x02 \x01(\x0c\x12\x0b\n\x03Key\x18\x03 \x01(\x0c\x12+\n\x04Type\x18\x04 \x01(\x0e\x32\x1d.License.KeyContainer.KeyType\x12\x32\n\x05Level\x18\x05 \x01(\x0e\x32#.License.KeyContainer.SecurityLevel\x12\x42\n\x12RequiredProtection\x18\x06 \x01(\x0b\x32&.License.KeyContainer.OutputProtection\x12\x43\n\x13RequestedProtection\x18\x07 \x01(\x0b\x32&.License.KeyContainer.OutputProtection\x12\x35\n\x0b_KeyControl\x18\x08 \x01(\x0b\x32 .License.KeyContainer.KeyControl\x12[\n\x1e_OperatorSessionKeyPermissions\x18\t \x01(\x0b\x32\x33.License.KeyContainer.OperatorSessionKeyPermissions\x12S\n\x1aVideoResolutionConstraints\x18\n \x03(\x0b\x32/.License.KeyContainer.VideoResolutionConstraint\x1a\xdb\x01\n\x10OutputProtection\x12\x42\n\x04Hdcp\x18\x01 \x01(\x0e\x32\x34.ClientIdentification.ClientCapabilities.HdcpVersion\x12>\n\tCgmsFlags\x18\x02 \x01(\x0e\x32+.License.KeyContainer.OutputProtection.CGMS\"C\n\x04\x43GMS\x12\r\n\tCOPY_FREE\x10\x00\x12\r\n\tCOPY_ONCE\x10\x02\x12\x0e\n\nCOPY_NEVER\x10\x03\x12\r\n\tCGMS_NONE\x10*\x1a\x31\n\nKeyControl\x12\x17\n\x0fKeyControlBlock\x18\x01 \x02(\x0c\x12\n\n\x02Iv\x18\x02 \x02(\x0c\x1a|\n\x1dOperatorSessionKeyPermissions\x12\x14\n\x0c\x41llowEncrypt\x18\x01 \x01(\r\x12\x14\n\x0c\x41llowDecrypt\x18\x02 \x01(\r\x12\x11\n\tAllowSign\x18\x03 \x01(\r\x12\x1c\n\x14\x41llowSignatureVerify\x18\x04 \x01(\r\x1a\x99\x01\n\x19VideoResolutionConstraint\x12\x1b\n\x13MinResolutionPixels\x18\x01 \x01(\r\x12\x1b\n\x13MaxResolutionPixels\x18\x02 \x01(\r\x12\x42\n\x12RequiredProtection\x18\x03 \x01(\x0b\x32&.License.KeyContainer.OutputProtection\"J\n\x07KeyType\x12\x0b\n\x07SIGNING\x10\x01\x12\x0b\n\x07\x43ONTENT\x10\x02\x12\x0f\n\x0bKEY_CONTROL\x10\x03\x12\x14\n\x10OPERATOR_SESSION\x10\x04\"z\n\rSecurityLevel\x12\x14\n\x10SW_SECURE_CRYPTO\x10\x01\x12\x14\n\x10SW_SECURE_DECODE\x10\x02\x12\x14\n\x10HW_SECURE_CRYPTO\x10\x03\x12\x14\n\x10HW_SECURE_DECODE\x10\x04\x12\x11\n\rHW_SECURE_ALL\x10\x05\"\x98\x01\n\x0cLicenseError\x12&\n\tErrorCode\x18\x01 \x01(\x0e\x32\x13.LicenseError.Error\"`\n\x05\x45rror\x12\x1e\n\x1aINVALID_DEVICE_CERTIFICATE\x10\x01\x12\x1e\n\x1aREVOKED_DEVICE_CERTIFICATE\x10\x02\x12\x17\n\x13SERVICE_UNAVAILABLE\x10\x03\"\xac\x07\n\x0eLicenseRequest\x12\'\n\x08\x43lientId\x18\x01 \x01(\x0b\x32\x15.ClientIdentification\x12\x38\n\tContentId\x18\x02 \x01(\x0b\x32%.LicenseRequest.ContentIdentification\x12)\n\x04Type\x18\x03 \x01(\x0e\x32\x1b.LicenseRequest.RequestType\x12\x13\n\x0bRequestTime\x18\x04 \x01(\r\x12!\n\x19KeyControlNonceDeprecated\x18\x05 \x01(\x0c\x12)\n\x0fProtocolVersion\x18\x06 \x01(\x0e\x32\x10.ProtocolVersion\x12\x17\n\x0fKeyControlNonce\x18\x07 \x01(\r\x12\x39\n\x11\x45ncryptedClientId\x18\x08 \x01(\x0b\x32\x1e.EncryptedClientIdentification\x1a\xa2\x04\n\x15\x43ontentIdentification\x12:\n\x06\x43\x65ncId\x18\x01 \x01(\x0b\x32*.LicenseRequest.ContentIdentification.CENC\x12:\n\x06WebmId\x18\x02 \x01(\x0b\x32*.LicenseRequest.ContentIdentification.WebM\x12\x46\n\x07License\x18\x03 \x01(\x0b\x32\x35.LicenseRequest.ContentIdentification.ExistingLicense\x1a_\n\x04\x43\x45NC\x12!\n\x04Pssh\x18\x01 \x01(\x0b\x32\x13.WidevineCencHeader\x12!\n\x0bLicenseType\x18\x02 \x01(\x0e\x32\x0c.LicenseType\x12\x11\n\tRequestId\x18\x03 \x01(\x0c\x1aL\n\x04WebM\x12\x0e\n\x06Header\x18\x01 \x01(\x0c\x12!\n\x0bLicenseType\x18\x02 \x01(\x0e\x32\x0c.LicenseType\x12\x11\n\tRequestId\x18\x03 \x01(\x0c\x1a\x99\x01\n\x0f\x45xistingLicense\x12)\n\tLicenseId\x18\x01 \x01(\x0b\x32\x16.LicenseIdentification\x12\x1b\n\x13SecondsSinceStarted\x18\x02 \x01(\r\x12\x1e\n\x16SecondsSinceLastPlayed\x18\x03 \x01(\r\x12\x1e\n\x16SessionUsageTableEntry\x18\x04 \x01(\x0c\"0\n\x0bRequestType\x12\x07\n\x03NEW\x10\x01\x12\x0b\n\x07RENEWAL\x10\x02\x12\x0b\n\x07RELEASE\x10\x03\"\xa9\x07\n\x11LicenseRequestRaw\x12\'\n\x08\x43lientId\x18\x01 \x01(\x0b\x32\x15.ClientIdentification\x12;\n\tContentId\x18\x02 \x01(\x0b\x32(.LicenseRequestRaw.ContentIdentification\x12,\n\x04Type\x18\x03 \x01(\x0e\x32\x1e.LicenseRequestRaw.RequestType\x12\x13\n\x0bRequestTime\x18\x04 \x01(\r\x12!\n\x19KeyControlNonceDeprecated\x18\x05 \x01(\x0c\x12)\n\x0fProtocolVersion\x18\x06 \x01(\x0e\x32\x10.ProtocolVersion\x12\x17\n\x0fKeyControlNonce\x18\x07 \x01(\r\x12\x39\n\x11\x45ncryptedClientId\x18\x08 \x01(\x0b\x32\x1e.EncryptedClientIdentification\x1a\x96\x04\n\x15\x43ontentIdentification\x12=\n\x06\x43\x65ncId\x18\x01 \x01(\x0b\x32-.LicenseRequestRaw.ContentIdentification.CENC\x12=\n\x06WebmId\x18\x02 \x01(\x0b\x32-.LicenseRequestRaw.ContentIdentification.WebM\x12I\n\x07License\x18\x03 \x01(\x0b\x32\x38.LicenseRequestRaw.ContentIdentification.ExistingLicense\x1aJ\n\x04\x43\x45NC\x12\x0c\n\x04Pssh\x18\x01 \x01(\x0c\x12!\n\x0bLicenseType\x18\x02 \x01(\x0e\x32\x0c.LicenseType\x12\x11\n\tRequestId\x18\x03 \x01(\x0c\x1aL\n\x04WebM\x12\x0e\n\x06Header\x18\x01 \x01(\x0c\x12!\n\x0bLicenseType\x18\x02 \x01(\x0e\x32\x0c.LicenseType\x12\x11\n\tRequestId\x18\x03 \x01(\x0c\x1a\x99\x01\n\x0f\x45xistingLicense\x12)\n\tLicenseId\x18\x01 \x01(\x0b\x32\x16.LicenseIdentification\x12\x1b\n\x13SecondsSinceStarted\x18\x02 \x01(\r\x12\x1e\n\x16SecondsSinceLastPlayed\x18\x03 \x01(\r\x12\x1e\n\x16SessionUsageTableEntry\x18\x04 \x01(\x0c\"0\n\x0bRequestType\x12\x07\n\x03NEW\x10\x01\x12\x0b\n\x07RENEWAL\x10\x02\x12\x0b\n\x07RELEASE\x10\x03\"\xa6\x02\n\x15ProvisionedDeviceInfo\x12\x10\n\x08SystemId\x18\x01 \x01(\r\x12\x0b\n\x03Soc\x18\x02 \x01(\t\x12\x14\n\x0cManufacturer\x18\x03 \x01(\t\x12\r\n\x05Model\x18\x04 \x01(\t\x12\x12\n\nDeviceType\x18\x05 \x01(\t\x12\x11\n\tModelYear\x18\x06 \x01(\r\x12=\n\rSecurityLevel\x18\x07 \x01(\x0e\x32&.ProvisionedDeviceInfo.WvSecurityLevel\x12\x12\n\nTestDevice\x18\x08 \x01(\r\"O\n\x0fWvSecurityLevel\x12\x15\n\x11LEVEL_UNSPECIFIED\x10\x00\x12\x0b\n\x07LEVEL_1\x10\x01\x12\x0b\n\x07LEVEL_2\x10\x02\x12\x0b\n\x07LEVEL_3\x10\x03\"\x15\n\x13ProvisioningOptions\"\x15\n\x13ProvisioningRequest\"\x16\n\x14ProvisioningResponse\"i\n\x11RemoteAttestation\x12\x33\n\x0b\x43\x65rtificate\x18\x01 \x01(\x0b\x32\x1e.EncryptedClientIdentification\x12\x0c\n\x04Salt\x18\x02 \x01(\t\x12\x11\n\tSignature\x18\x03 \x01(\t\"\r\n\x0bSessionInit\"\x0e\n\x0cSessionState\"\x1d\n\x1bSignedCertificateStatusList\"\x86\x01\n\x17SignedDeviceCertificate\x12.\n\x12_DeviceCertificate\x18\x01 \x01(\x0b\x32\x12.DeviceCertificate\x12\x11\n\tSignature\x18\x02 \x01(\x0c\x12(\n\x06Signer\x18\x03 \x01(\x0b\x32\x18.SignedDeviceCertificate\"\x1b\n\x19SignedProvisioningMessage\"\x9b\x02\n\rSignedMessage\x12(\n\x04Type\x18\x01 \x01(\x0e\x32\x1a.SignedMessage.MessageType\x12\x0b\n\x03Msg\x18\x02 \x01(\x0c\x12\x11\n\tSignature\x18\x03 \x01(\x0c\x12\x12\n\nSessionKey\x18\x04 \x01(\x0c\x12-\n\x11RemoteAttestation\x18\x05 \x01(\x0b\x32\x12.RemoteAttestation\"}\n\x0bMessageType\x12\x13\n\x0fLICENSE_REQUEST\x10\x01\x12\x0b\n\x07LICENSE\x10\x02\x12\x12\n\x0e\x45RROR_RESPONSE\x10\x03\x12\x1f\n\x1bSERVICE_CERTIFICATE_REQUEST\x10\x04\x12\x17\n\x13SERVICE_CERTIFICATE\x10\x05\"\xc5\x02\n\x12WidevineCencHeader\x12\x30\n\talgorithm\x18\x01 \x01(\x0e\x32\x1d.WidevineCencHeader.Algorithm\x12\x0e\n\x06key_id\x18\x02 \x03(\x0c\x12\x10\n\x08provider\x18\x03 \x01(\t\x12\x12\n\ncontent_id\x18\x04 \x01(\x0c\x12\x1d\n\x15track_type_deprecated\x18\x05 \x01(\t\x12\x0e\n\x06policy\x18\x06 \x01(\t\x12\x1b\n\x13\x63rypto_period_index\x18\x07 \x01(\r\x12\x17\n\x0fgrouped_license\x18\x08 \x01(\x0c\x12\x19\n\x11protection_scheme\x18\t \x01(\r\x12\x1d\n\x15\x63rypto_period_seconds\x18\n \x01(\r\"(\n\tAlgorithm\x12\x0f\n\x0bUNENCRYPTED\x10\x00\x12\n\n\x06\x41\x45SCTR\x10\x01\"\xba\x02\n\x14SignedLicenseRequest\x12/\n\x04Type\x18\x01 \x01(\x0e\x32!.SignedLicenseRequest.MessageType\x12\x1c\n\x03Msg\x18\x02 \x01(\x0b\x32\x0f.LicenseRequest\x12\x11\n\tSignature\x18\x03 \x01(\x0c\x12\x12\n\nSessionKey\x18\x04 \x01(\x0c\x12-\n\x11RemoteAttestation\x18\x05 \x01(\x0b\x32\x12.RemoteAttestation\"}\n\x0bMessageType\x12\x13\n\x0fLICENSE_REQUEST\x10\x01\x12\x0b\n\x07LICENSE\x10\x02\x12\x12\n\x0e\x45RROR_RESPONSE\x10\x03\x12\x1f\n\x1bSERVICE_CERTIFICATE_REQUEST\x10\x04\x12\x17\n\x13SERVICE_CERTIFICATE\x10\x05\"\xc3\x02\n\x17SignedLicenseRequestRaw\x12\x32\n\x04Type\x18\x01 \x01(\x0e\x32$.SignedLicenseRequestRaw.MessageType\x12\x1f\n\x03Msg\x18\x02 \x01(\x0b\x32\x12.LicenseRequestRaw\x12\x11\n\tSignature\x18\x03 \x01(\x0c\x12\x12\n\nSessionKey\x18\x04 \x01(\x0c\x12-\n\x11RemoteAttestation\x18\x05 \x01(\x0b\x32\x12.RemoteAttestation\"}\n\x0bMessageType\x12\x13\n\x0fLICENSE_REQUEST\x10\x01\x12\x0b\n\x07LICENSE\x10\x02\x12\x12\n\x0e\x45RROR_RESPONSE\x10\x03\x12\x1f\n\x1bSERVICE_CERTIFICATE_REQUEST\x10\x04\x12\x17\n\x13SERVICE_CERTIFICATE\x10\x05\"\xa5\x02\n\rSignedLicense\x12(\n\x04Type\x18\x01 \x01(\x0e\x32\x1a.SignedLicense.MessageType\x12\x15\n\x03Msg\x18\x02 \x01(\x0b\x32\x08.License\x12\x11\n\tSignature\x18\x03 \x01(\x0c\x12\x12\n\nSessionKey\x18\x04 \x01(\x0c\x12-\n\x11RemoteAttestation\x18\x05 \x01(\x0b\x32\x12.RemoteAttestation\"}\n\x0bMessageType\x12\x13\n\x0fLICENSE_REQUEST\x10\x01\x12\x0b\n\x07LICENSE\x10\x02\x12\x12\n\x0e\x45RROR_RESPONSE\x10\x03\x12\x1f\n\x1bSERVICE_CERTIFICATE_REQUEST\x10\x04\x12\x17\n\x13SERVICE_CERTIFICATE\x10\x05\"\xcb\x02\n\x18SignedServiceCertificate\x12\x33\n\x04Type\x18\x01 \x01(\x0e\x32%.SignedServiceCertificate.MessageType\x12%\n\x03Msg\x18\x02 \x01(\x0b\x32\x18.SignedDeviceCertificate\x12\x11\n\tSignature\x18\x03 \x01(\x0c\x12\x12\n\nSessionKey\x18\x04 \x01(\x0c\x12-\n\x11RemoteAttestation\x18\x05 \x01(\x0b\x32\x12.RemoteAttestation\"}\n\x0bMessageType\x12\x13\n\x0fLICENSE_REQUEST\x10\x01\x12\x0b\n\x07LICENSE\x10\x02\x12\x12\n\x0e\x45RROR_RESPONSE\x10\x03\x12\x1f\n\x1bSERVICE_CERTIFICATE_REQUEST\x10\x04\x12\x17\n\x13SERVICE_CERTIFICATE\x10\x05\"\xb5\x01\n\nFileHashes\x12\x0e\n\x06signer\x18\x01 \x01(\x0c\x12)\n\nsignatures\x18\x02 \x03(\x0b\x32\x15.FileHashes.Signature\x1al\n\tSignature\x12\x10\n\x08\x66ilename\x18\x01 \x01(\t\x12\x14\n\x0ctest_signing\x18\x02 \x01(\x08\x12\x12\n\nSHA512Hash\x18\x03 \x01(\x0c\x12\x10\n\x08main_exe\x18\x04 \x01(\x08\x12\x11\n\tsignature\x18\x05 \x01(\x0c*1\n\x0bLicenseType\x12\x08\n\x04ZERO\x10\x00\x12\x0b\n\x07\x44\x45\x46\x41ULT\x10\x01\x12\x0b\n\x07OFFLINE\x10\x02*\x1e\n\x0fProtocolVersion\x12\x0b\n\x07\x43URRENT\x10\x15')
+)
+_sym_db.RegisterFileDescriptor(DESCRIPTOR)
+
+_LICENSETYPE = _descriptor.EnumDescriptor(
+ name='LicenseType',
+ full_name='LicenseType',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='ZERO', index=0, number=0,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='DEFAULT', index=1, number=1,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='OFFLINE', index=2, number=2,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=8362,
+ serialized_end=8411,
+)
+_sym_db.RegisterEnumDescriptor(_LICENSETYPE)
+
+LicenseType = enum_type_wrapper.EnumTypeWrapper(_LICENSETYPE)
+_PROTOCOLVERSION = _descriptor.EnumDescriptor(
+ name='ProtocolVersion',
+ full_name='ProtocolVersion',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='CURRENT', index=0, number=21,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=8413,
+ serialized_end=8443,
+)
+_sym_db.RegisterEnumDescriptor(_PROTOCOLVERSION)
+
+ProtocolVersion = enum_type_wrapper.EnumTypeWrapper(_PROTOCOLVERSION)
+ZERO = 0
+DEFAULT = 1
+OFFLINE = 2
+CURRENT = 21
+
+
+_CLIENTIDENTIFICATION_CLIENTCAPABILITIES_HDCPVERSION = _descriptor.EnumDescriptor(
+ name='HdcpVersion',
+ full_name='ClientIdentification.ClientCapabilities.HdcpVersion',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='HDCP_NONE', index=0, number=0,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='HDCP_V1', index=1, number=1,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='HDCP_V2', index=2, number=2,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='HDCP_V2_1', index=3, number=3,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='HDCP_V2_2', index=4, number=4,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=617,
+ serialized_end=701,
+)
+_sym_db.RegisterEnumDescriptor(_CLIENTIDENTIFICATION_CLIENTCAPABILITIES_HDCPVERSION)
+
+_CLIENTIDENTIFICATION_TOKENTYPE = _descriptor.EnumDescriptor(
+ name='TokenType',
+ full_name='ClientIdentification.TokenType',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='KEYBOX', index=0, number=0,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='DEVICE_CERTIFICATE', index=1, number=1,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='REMOTE_ATTESTATION_CERTIFICATE', index=2, number=2,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=703,
+ serialized_end=786,
+)
+_sym_db.RegisterEnumDescriptor(_CLIENTIDENTIFICATION_TOKENTYPE)
+
+_DEVICECERTIFICATE_CERTIFICATETYPE = _descriptor.EnumDescriptor(
+ name='CertificateType',
+ full_name='DeviceCertificate.CertificateType',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='ROOT', index=0, number=0,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='INTERMEDIATE', index=1, number=1,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='USER_DEVICE', index=2, number=2,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='SERVICE', index=3, number=3,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=997,
+ serialized_end=1072,
+)
+_sym_db.RegisterEnumDescriptor(_DEVICECERTIFICATE_CERTIFICATETYPE)
+
+_DEVICECERTIFICATESTATUS_CERTIFICATESTATUS = _descriptor.EnumDescriptor(
+ name='CertificateStatus',
+ full_name='DeviceCertificateStatus.CertificateStatus',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='VALID', index=0, number=0,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='REVOKED', index=1, number=1,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=1228,
+ serialized_end=1271,
+)
+_sym_db.RegisterEnumDescriptor(_DEVICECERTIFICATESTATUS_CERTIFICATESTATUS)
+
+_LICENSE_KEYCONTAINER_OUTPUTPROTECTION_CGMS = _descriptor.EnumDescriptor(
+ name='CGMS',
+ full_name='License.KeyContainer.OutputProtection.CGMS',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='COPY_FREE', index=0, number=0,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='COPY_ONCE', index=1, number=2,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='COPY_NEVER', index=2, number=3,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='CGMS_NONE', index=3, number=42,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=2949,
+ serialized_end=3016,
+)
+_sym_db.RegisterEnumDescriptor(_LICENSE_KEYCONTAINER_OUTPUTPROTECTION_CGMS)
+
+_LICENSE_KEYCONTAINER_KEYTYPE = _descriptor.EnumDescriptor(
+ name='KeyType',
+ full_name='License.KeyContainer.KeyType',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='SIGNING', index=0, number=1,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='CONTENT', index=1, number=2,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='KEY_CONTROL', index=2, number=3,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='OPERATOR_SESSION', index=3, number=4,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=3351,
+ serialized_end=3425,
+)
+_sym_db.RegisterEnumDescriptor(_LICENSE_KEYCONTAINER_KEYTYPE)
+
+_LICENSE_KEYCONTAINER_SECURITYLEVEL = _descriptor.EnumDescriptor(
+ name='SecurityLevel',
+ full_name='License.KeyContainer.SecurityLevel',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='SW_SECURE_CRYPTO', index=0, number=1,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='SW_SECURE_DECODE', index=1, number=2,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='HW_SECURE_CRYPTO', index=2, number=3,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='HW_SECURE_DECODE', index=3, number=4,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='HW_SECURE_ALL', index=4, number=5,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=3427,
+ serialized_end=3549,
+)
+_sym_db.RegisterEnumDescriptor(_LICENSE_KEYCONTAINER_SECURITYLEVEL)
+
+_LICENSEERROR_ERROR = _descriptor.EnumDescriptor(
+ name='Error',
+ full_name='LicenseError.Error',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='INVALID_DEVICE_CERTIFICATE', index=0, number=1,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='REVOKED_DEVICE_CERTIFICATE', index=1, number=2,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='SERVICE_UNAVAILABLE', index=2, number=3,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=3608,
+ serialized_end=3704,
+)
+_sym_db.RegisterEnumDescriptor(_LICENSEERROR_ERROR)
+
+_LICENSEREQUEST_REQUESTTYPE = _descriptor.EnumDescriptor(
+ name='RequestType',
+ full_name='LicenseRequest.RequestType',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='NEW', index=0, number=1,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='RENEWAL', index=1, number=2,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='RELEASE', index=2, number=3,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=4599,
+ serialized_end=4647,
+)
+_sym_db.RegisterEnumDescriptor(_LICENSEREQUEST_REQUESTTYPE)
+
+_LICENSEREQUESTRAW_REQUESTTYPE = _descriptor.EnumDescriptor(
+ name='RequestType',
+ full_name='LicenseRequestRaw.RequestType',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='NEW', index=0, number=1,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='RENEWAL', index=1, number=2,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='RELEASE', index=2, number=3,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=4599,
+ serialized_end=4647,
+)
+_sym_db.RegisterEnumDescriptor(_LICENSEREQUESTRAW_REQUESTTYPE)
+
+_PROVISIONEDDEVICEINFO_WVSECURITYLEVEL = _descriptor.EnumDescriptor(
+ name='WvSecurityLevel',
+ full_name='ProvisionedDeviceInfo.WvSecurityLevel',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='LEVEL_UNSPECIFIED', index=0, number=0,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='LEVEL_1', index=1, number=1,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='LEVEL_2', index=2, number=2,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='LEVEL_3', index=3, number=3,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=5805,
+ serialized_end=5884,
+)
+_sym_db.RegisterEnumDescriptor(_PROVISIONEDDEVICEINFO_WVSECURITYLEVEL)
+
+_SIGNEDMESSAGE_MESSAGETYPE = _descriptor.EnumDescriptor(
+ name='MessageType',
+ full_name='SignedMessage.MessageType',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='LICENSE_REQUEST', index=0, number=1,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='LICENSE', index=1, number=2,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='ERROR_RESPONSE', index=2, number=3,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='SERVICE_CERTIFICATE_REQUEST', index=3, number=4,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='SERVICE_CERTIFICATE', index=4, number=5,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=6450,
+ serialized_end=6575,
+)
+_sym_db.RegisterEnumDescriptor(_SIGNEDMESSAGE_MESSAGETYPE)
+
+_WIDEVINECENCHEADER_ALGORITHM = _descriptor.EnumDescriptor(
+ name='Algorithm',
+ full_name='WidevineCencHeader.Algorithm',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='UNENCRYPTED', index=0, number=0,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='AESCTR', index=1, number=1,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=6863,
+ serialized_end=6903,
+)
+_sym_db.RegisterEnumDescriptor(_WIDEVINECENCHEADER_ALGORITHM)
+
+_SIGNEDLICENSEREQUEST_MESSAGETYPE = _descriptor.EnumDescriptor(
+ name='MessageType',
+ full_name='SignedLicenseRequest.MessageType',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='LICENSE_REQUEST', index=0, number=1,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='LICENSE', index=1, number=2,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='ERROR_RESPONSE', index=2, number=3,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='SERVICE_CERTIFICATE_REQUEST', index=3, number=4,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='SERVICE_CERTIFICATE', index=4, number=5,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=6450,
+ serialized_end=6575,
+)
+_sym_db.RegisterEnumDescriptor(_SIGNEDLICENSEREQUEST_MESSAGETYPE)
+
+_SIGNEDLICENSEREQUESTRAW_MESSAGETYPE = _descriptor.EnumDescriptor(
+ name='MessageType',
+ full_name='SignedLicenseRequestRaw.MessageType',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='LICENSE_REQUEST', index=0, number=1,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='LICENSE', index=1, number=2,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='ERROR_RESPONSE', index=2, number=3,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='SERVICE_CERTIFICATE_REQUEST', index=3, number=4,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='SERVICE_CERTIFICATE', index=4, number=5,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=6450,
+ serialized_end=6575,
+)
+_sym_db.RegisterEnumDescriptor(_SIGNEDLICENSEREQUESTRAW_MESSAGETYPE)
+
+_SIGNEDLICENSE_MESSAGETYPE = _descriptor.EnumDescriptor(
+ name='MessageType',
+ full_name='SignedLicense.MessageType',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='LICENSE_REQUEST', index=0, number=1,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='LICENSE', index=1, number=2,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='ERROR_RESPONSE', index=2, number=3,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='SERVICE_CERTIFICATE_REQUEST', index=3, number=4,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='SERVICE_CERTIFICATE', index=4, number=5,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=6450,
+ serialized_end=6575,
+)
+_sym_db.RegisterEnumDescriptor(_SIGNEDLICENSE_MESSAGETYPE)
+
+_SIGNEDSERVICECERTIFICATE_MESSAGETYPE = _descriptor.EnumDescriptor(
+ name='MessageType',
+ full_name='SignedServiceCertificate.MessageType',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='LICENSE_REQUEST', index=0, number=1,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='LICENSE', index=1, number=2,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='ERROR_RESPONSE', index=2, number=3,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='SERVICE_CERTIFICATE_REQUEST', index=3, number=4,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='SERVICE_CERTIFICATE', index=4, number=5,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=6450,
+ serialized_end=6575,
+)
+_sym_db.RegisterEnumDescriptor(_SIGNEDSERVICECERTIFICATE_MESSAGETYPE)
+
+
+_CLIENTIDENTIFICATION_NAMEVALUE = _descriptor.Descriptor(
+ name='NameValue',
+ full_name='ClientIdentification.NameValue',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Name', full_name='ClientIdentification.NameValue.Name', index=0,
+ number=1, type=9, cpp_type=9, label=2,
+ has_default_value=False, default_value=_b("").decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Value', full_name='ClientIdentification.NameValue.Value', index=1,
+ number=2, type=9, cpp_type=9, label=2,
+ has_default_value=False, default_value=_b("").decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=366,
+ serialized_end=406,
+)
+
+_CLIENTIDENTIFICATION_CLIENTCAPABILITIES = _descriptor.Descriptor(
+ name='ClientCapabilities',
+ full_name='ClientIdentification.ClientCapabilities',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='ClientToken', full_name='ClientIdentification.ClientCapabilities.ClientToken', index=0,
+ number=1, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SessionToken', full_name='ClientIdentification.ClientCapabilities.SessionToken', index=1,
+ number=2, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='VideoResolutionConstraints', full_name='ClientIdentification.ClientCapabilities.VideoResolutionConstraints', index=2,
+ number=3, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='MaxHdcpVersion', full_name='ClientIdentification.ClientCapabilities.MaxHdcpVersion', index=3,
+ number=4, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='OemCryptoApiVersion', full_name='ClientIdentification.ClientCapabilities.OemCryptoApiVersion', index=4,
+ number=5, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ _CLIENTIDENTIFICATION_CLIENTCAPABILITIES_HDCPVERSION,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=409,
+ serialized_end=701,
+)
+
+_CLIENTIDENTIFICATION = _descriptor.Descriptor(
+ name='ClientIdentification',
+ full_name='ClientIdentification',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Type', full_name='ClientIdentification.Type', index=0,
+ number=1, type=14, cpp_type=8, label=2,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Token', full_name='ClientIdentification.Token', index=1,
+ number=2, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='ClientInfo', full_name='ClientIdentification.ClientInfo', index=2,
+ number=3, type=11, cpp_type=10, label=3,
+ has_default_value=False, default_value=[],
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='ProviderClientToken', full_name='ClientIdentification.ProviderClientToken', index=3,
+ number=4, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='LicenseCounter', full_name='ClientIdentification.LicenseCounter', index=4,
+ number=5, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='_ClientCapabilities', full_name='ClientIdentification._ClientCapabilities', index=5,
+ number=6, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='_FileHashes', full_name='ClientIdentification._FileHashes', index=6,
+ number=7, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[_CLIENTIDENTIFICATION_NAMEVALUE, _CLIENTIDENTIFICATION_CLIENTCAPABILITIES, ],
+ enum_types=[
+ _CLIENTIDENTIFICATION_TOKENTYPE,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=43,
+ serialized_end=786,
+)
+
+
+_DEVICECERTIFICATE = _descriptor.Descriptor(
+ name='DeviceCertificate',
+ full_name='DeviceCertificate',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Type', full_name='DeviceCertificate.Type', index=0,
+ number=1, type=14, cpp_type=8, label=2,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SerialNumber', full_name='DeviceCertificate.SerialNumber', index=1,
+ number=2, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='CreationTimeSeconds', full_name='DeviceCertificate.CreationTimeSeconds', index=2,
+ number=3, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='PublicKey', full_name='DeviceCertificate.PublicKey', index=3,
+ number=4, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SystemId', full_name='DeviceCertificate.SystemId', index=4,
+ number=5, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='TestDeviceDeprecated', full_name='DeviceCertificate.TestDeviceDeprecated', index=5,
+ number=6, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='ServiceId', full_name='DeviceCertificate.ServiceId', index=6,
+ number=7, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ _DEVICECERTIFICATE_CERTIFICATETYPE,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=789,
+ serialized_end=1072,
+)
+
+
+_DEVICECERTIFICATESTATUS = _descriptor.Descriptor(
+ name='DeviceCertificateStatus',
+ full_name='DeviceCertificateStatus',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='SerialNumber', full_name='DeviceCertificateStatus.SerialNumber', index=0,
+ number=1, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Status', full_name='DeviceCertificateStatus.Status', index=1,
+ number=2, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='DeviceInfo', full_name='DeviceCertificateStatus.DeviceInfo', index=2,
+ number=4, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ _DEVICECERTIFICATESTATUS_CERTIFICATESTATUS,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=1075,
+ serialized_end=1271,
+)
+
+
+_DEVICECERTIFICATESTATUSLIST = _descriptor.Descriptor(
+ name='DeviceCertificateStatusList',
+ full_name='DeviceCertificateStatusList',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='CreationTimeSeconds', full_name='DeviceCertificateStatusList.CreationTimeSeconds', index=0,
+ number=1, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='CertificateStatus', full_name='DeviceCertificateStatusList.CertificateStatus', index=1,
+ number=2, type=11, cpp_type=10, label=3,
+ has_default_value=False, default_value=[],
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=1273,
+ serialized_end=1384,
+)
+
+
+_ENCRYPTEDCLIENTIDENTIFICATION = _descriptor.Descriptor(
+ name='EncryptedClientIdentification',
+ full_name='EncryptedClientIdentification',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='ServiceId', full_name='EncryptedClientIdentification.ServiceId', index=0,
+ number=1, type=9, cpp_type=9, label=2,
+ has_default_value=False, default_value=_b("").decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='ServiceCertificateSerialNumber', full_name='EncryptedClientIdentification.ServiceCertificateSerialNumber', index=1,
+ number=2, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='EncryptedClientId', full_name='EncryptedClientIdentification.EncryptedClientId', index=2,
+ number=3, type=12, cpp_type=9, label=2,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='EncryptedClientIdIv', full_name='EncryptedClientIdentification.EncryptedClientIdIv', index=3,
+ number=4, type=12, cpp_type=9, label=2,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='EncryptedPrivacyKey', full_name='EncryptedClientIdentification.EncryptedPrivacyKey', index=4,
+ number=5, type=12, cpp_type=9, label=2,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=1387,
+ serialized_end=1562,
+)
+
+
+_LICENSEIDENTIFICATION = _descriptor.Descriptor(
+ name='LicenseIdentification',
+ full_name='LicenseIdentification',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='RequestId', full_name='LicenseIdentification.RequestId', index=0,
+ number=1, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SessionId', full_name='LicenseIdentification.SessionId', index=1,
+ number=2, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='PurchaseId', full_name='LicenseIdentification.PurchaseId', index=2,
+ number=3, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Type', full_name='LicenseIdentification.Type', index=3,
+ number=4, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Version', full_name='LicenseIdentification.Version', index=4,
+ number=5, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='ProviderSessionToken', full_name='LicenseIdentification.ProviderSessionToken', index=5,
+ number=6, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=1565,
+ serialized_end=1721,
+)
+
+
+_LICENSE_POLICY = _descriptor.Descriptor(
+ name='Policy',
+ full_name='License.Policy',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='CanPlay', full_name='License.Policy.CanPlay', index=0,
+ number=1, type=8, cpp_type=7, label=1,
+ has_default_value=False, default_value=False,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='CanPersist', full_name='License.Policy.CanPersist', index=1,
+ number=2, type=8, cpp_type=7, label=1,
+ has_default_value=False, default_value=False,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='CanRenew', full_name='License.Policy.CanRenew', index=2,
+ number=3, type=8, cpp_type=7, label=1,
+ has_default_value=False, default_value=False,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RentalDurationSeconds', full_name='License.Policy.RentalDurationSeconds', index=3,
+ number=4, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='PlaybackDurationSeconds', full_name='License.Policy.PlaybackDurationSeconds', index=4,
+ number=5, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='LicenseDurationSeconds', full_name='License.Policy.LicenseDurationSeconds', index=5,
+ number=6, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RenewalRecoveryDurationSeconds', full_name='License.Policy.RenewalRecoveryDurationSeconds', index=6,
+ number=7, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RenewalServerUrl', full_name='License.Policy.RenewalServerUrl', index=7,
+ number=8, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b("").decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RenewalDelaySeconds', full_name='License.Policy.RenewalDelaySeconds', index=8,
+ number=9, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RenewalRetryIntervalSeconds', full_name='License.Policy.RenewalRetryIntervalSeconds', index=9,
+ number=10, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RenewWithUsage', full_name='License.Policy.RenewWithUsage', index=10,
+ number=11, type=8, cpp_type=7, label=1,
+ has_default_value=False, default_value=False,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=1958,
+ serialized_end=2273,
+)
+
+_LICENSE_KEYCONTAINER_OUTPUTPROTECTION = _descriptor.Descriptor(
+ name='OutputProtection',
+ full_name='License.KeyContainer.OutputProtection',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Hdcp', full_name='License.KeyContainer.OutputProtection.Hdcp', index=0,
+ number=1, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='CgmsFlags', full_name='License.KeyContainer.OutputProtection.CgmsFlags', index=1,
+ number=2, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ _LICENSE_KEYCONTAINER_OUTPUTPROTECTION_CGMS,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=2797,
+ serialized_end=3016,
+)
+
+_LICENSE_KEYCONTAINER_KEYCONTROL = _descriptor.Descriptor(
+ name='KeyControl',
+ full_name='License.KeyContainer.KeyControl',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='KeyControlBlock', full_name='License.KeyContainer.KeyControl.KeyControlBlock', index=0,
+ number=1, type=12, cpp_type=9, label=2,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Iv', full_name='License.KeyContainer.KeyControl.Iv', index=1,
+ number=2, type=12, cpp_type=9, label=2,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=3018,
+ serialized_end=3067,
+)
+
+_LICENSE_KEYCONTAINER_OPERATORSESSIONKEYPERMISSIONS = _descriptor.Descriptor(
+ name='OperatorSessionKeyPermissions',
+ full_name='License.KeyContainer.OperatorSessionKeyPermissions',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='AllowEncrypt', full_name='License.KeyContainer.OperatorSessionKeyPermissions.AllowEncrypt', index=0,
+ number=1, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='AllowDecrypt', full_name='License.KeyContainer.OperatorSessionKeyPermissions.AllowDecrypt', index=1,
+ number=2, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='AllowSign', full_name='License.KeyContainer.OperatorSessionKeyPermissions.AllowSign', index=2,
+ number=3, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='AllowSignatureVerify', full_name='License.KeyContainer.OperatorSessionKeyPermissions.AllowSignatureVerify', index=3,
+ number=4, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=3069,
+ serialized_end=3193,
+)
+
+_LICENSE_KEYCONTAINER_VIDEORESOLUTIONCONSTRAINT = _descriptor.Descriptor(
+ name='VideoResolutionConstraint',
+ full_name='License.KeyContainer.VideoResolutionConstraint',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='MinResolutionPixels', full_name='License.KeyContainer.VideoResolutionConstraint.MinResolutionPixels', index=0,
+ number=1, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='MaxResolutionPixels', full_name='License.KeyContainer.VideoResolutionConstraint.MaxResolutionPixels', index=1,
+ number=2, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RequiredProtection', full_name='License.KeyContainer.VideoResolutionConstraint.RequiredProtection', index=2,
+ number=3, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=3196,
+ serialized_end=3349,
+)
+
+_LICENSE_KEYCONTAINER = _descriptor.Descriptor(
+ name='KeyContainer',
+ full_name='License.KeyContainer',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Id', full_name='License.KeyContainer.Id', index=0,
+ number=1, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Iv', full_name='License.KeyContainer.Iv', index=1,
+ number=2, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Key', full_name='License.KeyContainer.Key', index=2,
+ number=3, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Type', full_name='License.KeyContainer.Type', index=3,
+ number=4, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=1,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Level', full_name='License.KeyContainer.Level', index=4,
+ number=5, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=1,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RequiredProtection', full_name='License.KeyContainer.RequiredProtection', index=5,
+ number=6, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RequestedProtection', full_name='License.KeyContainer.RequestedProtection', index=6,
+ number=7, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='_KeyControl', full_name='License.KeyContainer._KeyControl', index=7,
+ number=8, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='_OperatorSessionKeyPermissions', full_name='License.KeyContainer._OperatorSessionKeyPermissions', index=8,
+ number=9, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='VideoResolutionConstraints', full_name='License.KeyContainer.VideoResolutionConstraints', index=9,
+ number=10, type=11, cpp_type=10, label=3,
+ has_default_value=False, default_value=[],
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[_LICENSE_KEYCONTAINER_OUTPUTPROTECTION, _LICENSE_KEYCONTAINER_KEYCONTROL, _LICENSE_KEYCONTAINER_OPERATORSESSIONKEYPERMISSIONS, _LICENSE_KEYCONTAINER_VIDEORESOLUTIONCONSTRAINT, ],
+ enum_types=[
+ _LICENSE_KEYCONTAINER_KEYTYPE,
+ _LICENSE_KEYCONTAINER_SECURITYLEVEL,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=2276,
+ serialized_end=3549,
+)
+
+_LICENSE = _descriptor.Descriptor(
+ name='License',
+ full_name='License',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Id', full_name='License.Id', index=0,
+ number=1, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='_Policy', full_name='License._Policy', index=1,
+ number=2, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Key', full_name='License.Key', index=2,
+ number=3, type=11, cpp_type=10, label=3,
+ has_default_value=False, default_value=[],
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='LicenseStartTime', full_name='License.LicenseStartTime', index=3,
+ number=4, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RemoteAttestationVerified', full_name='License.RemoteAttestationVerified', index=4,
+ number=5, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='ProviderClientToken', full_name='License.ProviderClientToken', index=5,
+ number=6, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='ProtectionScheme', full_name='License.ProtectionScheme', index=6,
+ number=7, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[_LICENSE_POLICY, _LICENSE_KEYCONTAINER, ],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=1724,
+ serialized_end=3549,
+)
+
+
+_LICENSEERROR = _descriptor.Descriptor(
+ name='LicenseError',
+ full_name='LicenseError',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='ErrorCode', full_name='LicenseError.ErrorCode', index=0,
+ number=1, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=1,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ _LICENSEERROR_ERROR,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=3552,
+ serialized_end=3704,
+)
+
+
+_LICENSEREQUEST_CONTENTIDENTIFICATION_CENC = _descriptor.Descriptor(
+ name='CENC',
+ full_name='LicenseRequest.ContentIdentification.CENC',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Pssh', full_name='LicenseRequest.ContentIdentification.CENC.Pssh', index=0,
+ number=1, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='LicenseType', full_name='LicenseRequest.ContentIdentification.CENC.LicenseType', index=1,
+ number=2, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RequestId', full_name='LicenseRequest.ContentIdentification.CENC.RequestId', index=2,
+ number=3, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=4268,
+ serialized_end=4363,
+)
+
+_LICENSEREQUEST_CONTENTIDENTIFICATION_WEBM = _descriptor.Descriptor(
+ name='WebM',
+ full_name='LicenseRequest.ContentIdentification.WebM',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Header', full_name='LicenseRequest.ContentIdentification.WebM.Header', index=0,
+ number=1, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='LicenseType', full_name='LicenseRequest.ContentIdentification.WebM.LicenseType', index=1,
+ number=2, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RequestId', full_name='LicenseRequest.ContentIdentification.WebM.RequestId', index=2,
+ number=3, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=4365,
+ serialized_end=4441,
+)
+
+_LICENSEREQUEST_CONTENTIDENTIFICATION_EXISTINGLICENSE = _descriptor.Descriptor(
+ name='ExistingLicense',
+ full_name='LicenseRequest.ContentIdentification.ExistingLicense',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='LicenseId', full_name='LicenseRequest.ContentIdentification.ExistingLicense.LicenseId', index=0,
+ number=1, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SecondsSinceStarted', full_name='LicenseRequest.ContentIdentification.ExistingLicense.SecondsSinceStarted', index=1,
+ number=2, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SecondsSinceLastPlayed', full_name='LicenseRequest.ContentIdentification.ExistingLicense.SecondsSinceLastPlayed', index=2,
+ number=3, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SessionUsageTableEntry', full_name='LicenseRequest.ContentIdentification.ExistingLicense.SessionUsageTableEntry', index=3,
+ number=4, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=4444,
+ serialized_end=4597,
+)
+
+_LICENSEREQUEST_CONTENTIDENTIFICATION = _descriptor.Descriptor(
+ name='ContentIdentification',
+ full_name='LicenseRequest.ContentIdentification',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='CencId', full_name='LicenseRequest.ContentIdentification.CencId', index=0,
+ number=1, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='WebmId', full_name='LicenseRequest.ContentIdentification.WebmId', index=1,
+ number=2, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='License', full_name='LicenseRequest.ContentIdentification.License', index=2,
+ number=3, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[_LICENSEREQUEST_CONTENTIDENTIFICATION_CENC, _LICENSEREQUEST_CONTENTIDENTIFICATION_WEBM, _LICENSEREQUEST_CONTENTIDENTIFICATION_EXISTINGLICENSE, ],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=4051,
+ serialized_end=4597,
+)
+
+_LICENSEREQUEST = _descriptor.Descriptor(
+ name='LicenseRequest',
+ full_name='LicenseRequest',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='ClientId', full_name='LicenseRequest.ClientId', index=0,
+ number=1, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='ContentId', full_name='LicenseRequest.ContentId', index=1,
+ number=2, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Type', full_name='LicenseRequest.Type', index=2,
+ number=3, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=1,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RequestTime', full_name='LicenseRequest.RequestTime', index=3,
+ number=4, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='KeyControlNonceDeprecated', full_name='LicenseRequest.KeyControlNonceDeprecated', index=4,
+ number=5, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='ProtocolVersion', full_name='LicenseRequest.ProtocolVersion', index=5,
+ number=6, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=21,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='KeyControlNonce', full_name='LicenseRequest.KeyControlNonce', index=6,
+ number=7, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='EncryptedClientId', full_name='LicenseRequest.EncryptedClientId', index=7,
+ number=8, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[_LICENSEREQUEST_CONTENTIDENTIFICATION, ],
+ enum_types=[
+ _LICENSEREQUEST_REQUESTTYPE,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=3707,
+ serialized_end=4647,
+)
+
+
+_LICENSEREQUESTRAW_CONTENTIDENTIFICATION_CENC = _descriptor.Descriptor(
+ name='CENC',
+ full_name='LicenseRequestRaw.ContentIdentification.CENC',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Pssh', full_name='LicenseRequestRaw.ContentIdentification.CENC.Pssh', index=0,
+ number=1, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='LicenseType', full_name='LicenseRequestRaw.ContentIdentification.CENC.LicenseType', index=1,
+ number=2, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RequestId', full_name='LicenseRequestRaw.ContentIdentification.CENC.RequestId', index=2,
+ number=3, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=5229,
+ serialized_end=5303,
+)
+
+_LICENSEREQUESTRAW_CONTENTIDENTIFICATION_WEBM = _descriptor.Descriptor(
+ name='WebM',
+ full_name='LicenseRequestRaw.ContentIdentification.WebM',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Header', full_name='LicenseRequestRaw.ContentIdentification.WebM.Header', index=0,
+ number=1, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='LicenseType', full_name='LicenseRequestRaw.ContentIdentification.WebM.LicenseType', index=1,
+ number=2, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RequestId', full_name='LicenseRequestRaw.ContentIdentification.WebM.RequestId', index=2,
+ number=3, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=4365,
+ serialized_end=4441,
+)
+
+_LICENSEREQUESTRAW_CONTENTIDENTIFICATION_EXISTINGLICENSE = _descriptor.Descriptor(
+ name='ExistingLicense',
+ full_name='LicenseRequestRaw.ContentIdentification.ExistingLicense',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='LicenseId', full_name='LicenseRequestRaw.ContentIdentification.ExistingLicense.LicenseId', index=0,
+ number=1, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SecondsSinceStarted', full_name='LicenseRequestRaw.ContentIdentification.ExistingLicense.SecondsSinceStarted', index=1,
+ number=2, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SecondsSinceLastPlayed', full_name='LicenseRequestRaw.ContentIdentification.ExistingLicense.SecondsSinceLastPlayed', index=2,
+ number=3, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SessionUsageTableEntry', full_name='LicenseRequestRaw.ContentIdentification.ExistingLicense.SessionUsageTableEntry', index=3,
+ number=4, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=4444,
+ serialized_end=4597,
+)
+
+_LICENSEREQUESTRAW_CONTENTIDENTIFICATION = _descriptor.Descriptor(
+ name='ContentIdentification',
+ full_name='LicenseRequestRaw.ContentIdentification',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='CencId', full_name='LicenseRequestRaw.ContentIdentification.CencId', index=0,
+ number=1, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='WebmId', full_name='LicenseRequestRaw.ContentIdentification.WebmId', index=1,
+ number=2, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='License', full_name='LicenseRequestRaw.ContentIdentification.License', index=2,
+ number=3, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[_LICENSEREQUESTRAW_CONTENTIDENTIFICATION_CENC, _LICENSEREQUESTRAW_CONTENTIDENTIFICATION_WEBM, _LICENSEREQUESTRAW_CONTENTIDENTIFICATION_EXISTINGLICENSE, ],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=5003,
+ serialized_end=5537,
+)
+
+_LICENSEREQUESTRAW = _descriptor.Descriptor(
+ name='LicenseRequestRaw',
+ full_name='LicenseRequestRaw',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='ClientId', full_name='LicenseRequestRaw.ClientId', index=0,
+ number=1, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='ContentId', full_name='LicenseRequestRaw.ContentId', index=1,
+ number=2, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Type', full_name='LicenseRequestRaw.Type', index=2,
+ number=3, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=1,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RequestTime', full_name='LicenseRequestRaw.RequestTime', index=3,
+ number=4, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='KeyControlNonceDeprecated', full_name='LicenseRequestRaw.KeyControlNonceDeprecated', index=4,
+ number=5, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='ProtocolVersion', full_name='LicenseRequestRaw.ProtocolVersion', index=5,
+ number=6, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=21,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='KeyControlNonce', full_name='LicenseRequestRaw.KeyControlNonce', index=6,
+ number=7, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='EncryptedClientId', full_name='LicenseRequestRaw.EncryptedClientId', index=7,
+ number=8, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[_LICENSEREQUESTRAW_CONTENTIDENTIFICATION, ],
+ enum_types=[
+ _LICENSEREQUESTRAW_REQUESTTYPE,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=4650,
+ serialized_end=5587,
+)
+
+
+_PROVISIONEDDEVICEINFO = _descriptor.Descriptor(
+ name='ProvisionedDeviceInfo',
+ full_name='ProvisionedDeviceInfo',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='SystemId', full_name='ProvisionedDeviceInfo.SystemId', index=0,
+ number=1, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Soc', full_name='ProvisionedDeviceInfo.Soc', index=1,
+ number=2, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b("").decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Manufacturer', full_name='ProvisionedDeviceInfo.Manufacturer', index=2,
+ number=3, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b("").decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Model', full_name='ProvisionedDeviceInfo.Model', index=3,
+ number=4, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b("").decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='DeviceType', full_name='ProvisionedDeviceInfo.DeviceType', index=4,
+ number=5, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b("").decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='ModelYear', full_name='ProvisionedDeviceInfo.ModelYear', index=5,
+ number=6, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SecurityLevel', full_name='ProvisionedDeviceInfo.SecurityLevel', index=6,
+ number=7, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='TestDevice', full_name='ProvisionedDeviceInfo.TestDevice', index=7,
+ number=8, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ _PROVISIONEDDEVICEINFO_WVSECURITYLEVEL,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=5590,
+ serialized_end=5884,
+)
+
+
+_PROVISIONINGOPTIONS = _descriptor.Descriptor(
+ name='ProvisioningOptions',
+ full_name='ProvisioningOptions',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=5886,
+ serialized_end=5907,
+)
+
+
+_PROVISIONINGREQUEST = _descriptor.Descriptor(
+ name='ProvisioningRequest',
+ full_name='ProvisioningRequest',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=5909,
+ serialized_end=5930,
+)
+
+
+_PROVISIONINGRESPONSE = _descriptor.Descriptor(
+ name='ProvisioningResponse',
+ full_name='ProvisioningResponse',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=5932,
+ serialized_end=5954,
+)
+
+
+_REMOTEATTESTATION = _descriptor.Descriptor(
+ name='RemoteAttestation',
+ full_name='RemoteAttestation',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Certificate', full_name='RemoteAttestation.Certificate', index=0,
+ number=1, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Salt', full_name='RemoteAttestation.Salt', index=1,
+ number=2, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b("").decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Signature', full_name='RemoteAttestation.Signature', index=2,
+ number=3, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b("").decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=5956,
+ serialized_end=6061,
+)
+
+
+_SESSIONINIT = _descriptor.Descriptor(
+ name='SessionInit',
+ full_name='SessionInit',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=6063,
+ serialized_end=6076,
+)
+
+
+_SESSIONSTATE = _descriptor.Descriptor(
+ name='SessionState',
+ full_name='SessionState',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=6078,
+ serialized_end=6092,
+)
+
+
+_SIGNEDCERTIFICATESTATUSLIST = _descriptor.Descriptor(
+ name='SignedCertificateStatusList',
+ full_name='SignedCertificateStatusList',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=6094,
+ serialized_end=6123,
+)
+
+
+_SIGNEDDEVICECERTIFICATE = _descriptor.Descriptor(
+ name='SignedDeviceCertificate',
+ full_name='SignedDeviceCertificate',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='_DeviceCertificate', full_name='SignedDeviceCertificate._DeviceCertificate', index=0,
+ number=1, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Signature', full_name='SignedDeviceCertificate.Signature', index=1,
+ number=2, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Signer', full_name='SignedDeviceCertificate.Signer', index=2,
+ number=3, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=6126,
+ serialized_end=6260,
+)
+
+
+_SIGNEDPROVISIONINGMESSAGE = _descriptor.Descriptor(
+ name='SignedProvisioningMessage',
+ full_name='SignedProvisioningMessage',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=6262,
+ serialized_end=6289,
+)
+
+
+_SIGNEDMESSAGE = _descriptor.Descriptor(
+ name='SignedMessage',
+ full_name='SignedMessage',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Type', full_name='SignedMessage.Type', index=0,
+ number=1, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=1,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Msg', full_name='SignedMessage.Msg', index=1,
+ number=2, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Signature', full_name='SignedMessage.Signature', index=2,
+ number=3, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SessionKey', full_name='SignedMessage.SessionKey', index=3,
+ number=4, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RemoteAttestation', full_name='SignedMessage.RemoteAttestation', index=4,
+ number=5, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ _SIGNEDMESSAGE_MESSAGETYPE,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=6292,
+ serialized_end=6575,
+)
+
+
+_WIDEVINECENCHEADER = _descriptor.Descriptor(
+ name='WidevineCencHeader',
+ full_name='WidevineCencHeader',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='algorithm', full_name='WidevineCencHeader.algorithm', index=0,
+ number=1, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='key_id', full_name='WidevineCencHeader.key_id', index=1,
+ number=2, type=12, cpp_type=9, label=3,
+ has_default_value=False, default_value=[],
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='provider', full_name='WidevineCencHeader.provider', index=2,
+ number=3, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b("").decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='content_id', full_name='WidevineCencHeader.content_id', index=3,
+ number=4, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='track_type_deprecated', full_name='WidevineCencHeader.track_type_deprecated', index=4,
+ number=5, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b("").decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='policy', full_name='WidevineCencHeader.policy', index=5,
+ number=6, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b("").decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='crypto_period_index', full_name='WidevineCencHeader.crypto_period_index', index=6,
+ number=7, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='grouped_license', full_name='WidevineCencHeader.grouped_license', index=7,
+ number=8, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='protection_scheme', full_name='WidevineCencHeader.protection_scheme', index=8,
+ number=9, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='crypto_period_seconds', full_name='WidevineCencHeader.crypto_period_seconds', index=9,
+ number=10, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ _WIDEVINECENCHEADER_ALGORITHM,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=6578,
+ serialized_end=6903,
+)
+
+
+_SIGNEDLICENSEREQUEST = _descriptor.Descriptor(
+ name='SignedLicenseRequest',
+ full_name='SignedLicenseRequest',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Type', full_name='SignedLicenseRequest.Type', index=0,
+ number=1, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=1,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Msg', full_name='SignedLicenseRequest.Msg', index=1,
+ number=2, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Signature', full_name='SignedLicenseRequest.Signature', index=2,
+ number=3, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SessionKey', full_name='SignedLicenseRequest.SessionKey', index=3,
+ number=4, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RemoteAttestation', full_name='SignedLicenseRequest.RemoteAttestation', index=4,
+ number=5, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ _SIGNEDLICENSEREQUEST_MESSAGETYPE,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=6906,
+ serialized_end=7220,
+)
+
+
+_SIGNEDLICENSEREQUESTRAW = _descriptor.Descriptor(
+ name='SignedLicenseRequestRaw',
+ full_name='SignedLicenseRequestRaw',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Type', full_name='SignedLicenseRequestRaw.Type', index=0,
+ number=1, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=1,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Msg', full_name='SignedLicenseRequestRaw.Msg', index=1,
+ number=2, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Signature', full_name='SignedLicenseRequestRaw.Signature', index=2,
+ number=3, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SessionKey', full_name='SignedLicenseRequestRaw.SessionKey', index=3,
+ number=4, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RemoteAttestation', full_name='SignedLicenseRequestRaw.RemoteAttestation', index=4,
+ number=5, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ _SIGNEDLICENSEREQUESTRAW_MESSAGETYPE,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=7223,
+ serialized_end=7546,
+)
+
+
+_SIGNEDLICENSE = _descriptor.Descriptor(
+ name='SignedLicense',
+ full_name='SignedLicense',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Type', full_name='SignedLicense.Type', index=0,
+ number=1, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=1,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Msg', full_name='SignedLicense.Msg', index=1,
+ number=2, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Signature', full_name='SignedLicense.Signature', index=2,
+ number=3, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SessionKey', full_name='SignedLicense.SessionKey', index=3,
+ number=4, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RemoteAttestation', full_name='SignedLicense.RemoteAttestation', index=4,
+ number=5, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ _SIGNEDLICENSE_MESSAGETYPE,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=7549,
+ serialized_end=7842,
+)
+
+
+_SIGNEDSERVICECERTIFICATE = _descriptor.Descriptor(
+ name='SignedServiceCertificate',
+ full_name='SignedServiceCertificate',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Type', full_name='SignedServiceCertificate.Type', index=0,
+ number=1, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=1,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Msg', full_name='SignedServiceCertificate.Msg', index=1,
+ number=2, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Signature', full_name='SignedServiceCertificate.Signature', index=2,
+ number=3, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SessionKey', full_name='SignedServiceCertificate.SessionKey', index=3,
+ number=4, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RemoteAttestation', full_name='SignedServiceCertificate.RemoteAttestation', index=4,
+ number=5, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ _SIGNEDSERVICECERTIFICATE_MESSAGETYPE,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=7845,
+ serialized_end=8176,
+)
+
+
+_FILEHASHES_SIGNATURE = _descriptor.Descriptor(
+ name='Signature',
+ full_name='FileHashes.Signature',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='filename', full_name='FileHashes.Signature.filename', index=0,
+ number=1, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b("").decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='test_signing', full_name='FileHashes.Signature.test_signing', index=1,
+ number=2, type=8, cpp_type=7, label=1,
+ has_default_value=False, default_value=False,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SHA512Hash', full_name='FileHashes.Signature.SHA512Hash', index=2,
+ number=3, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='main_exe', full_name='FileHashes.Signature.main_exe', index=3,
+ number=4, type=8, cpp_type=7, label=1,
+ has_default_value=False, default_value=False,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='signature', full_name='FileHashes.Signature.signature', index=4,
+ number=5, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=8252,
+ serialized_end=8360,
+)
+
+_FILEHASHES = _descriptor.Descriptor(
+ name='FileHashes',
+ full_name='FileHashes',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='signer', full_name='FileHashes.signer', index=0,
+ number=1, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='signatures', full_name='FileHashes.signatures', index=1,
+ number=2, type=11, cpp_type=10, label=3,
+ has_default_value=False, default_value=[],
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[_FILEHASHES_SIGNATURE, ],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto2',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=8179,
+ serialized_end=8360,
+)
+
+_CLIENTIDENTIFICATION_NAMEVALUE.containing_type = _CLIENTIDENTIFICATION
+_CLIENTIDENTIFICATION_CLIENTCAPABILITIES.fields_by_name['MaxHdcpVersion'].enum_type = _CLIENTIDENTIFICATION_CLIENTCAPABILITIES_HDCPVERSION
+_CLIENTIDENTIFICATION_CLIENTCAPABILITIES.containing_type = _CLIENTIDENTIFICATION
+_CLIENTIDENTIFICATION_CLIENTCAPABILITIES_HDCPVERSION.containing_type = _CLIENTIDENTIFICATION_CLIENTCAPABILITIES
+_CLIENTIDENTIFICATION.fields_by_name['Type'].enum_type = _CLIENTIDENTIFICATION_TOKENTYPE
+_CLIENTIDENTIFICATION.fields_by_name['Token'].message_type = _SIGNEDDEVICECERTIFICATE
+_CLIENTIDENTIFICATION.fields_by_name['ClientInfo'].message_type = _CLIENTIDENTIFICATION_NAMEVALUE
+_CLIENTIDENTIFICATION.fields_by_name['_ClientCapabilities'].message_type = _CLIENTIDENTIFICATION_CLIENTCAPABILITIES
+_CLIENTIDENTIFICATION.fields_by_name['_FileHashes'].message_type = _FILEHASHES
+_CLIENTIDENTIFICATION_TOKENTYPE.containing_type = _CLIENTIDENTIFICATION
+_DEVICECERTIFICATE.fields_by_name['Type'].enum_type = _DEVICECERTIFICATE_CERTIFICATETYPE
+_DEVICECERTIFICATE_CERTIFICATETYPE.containing_type = _DEVICECERTIFICATE
+_DEVICECERTIFICATESTATUS.fields_by_name['Status'].enum_type = _DEVICECERTIFICATESTATUS_CERTIFICATESTATUS
+_DEVICECERTIFICATESTATUS.fields_by_name['DeviceInfo'].message_type = _PROVISIONEDDEVICEINFO
+_DEVICECERTIFICATESTATUS_CERTIFICATESTATUS.containing_type = _DEVICECERTIFICATESTATUS
+_DEVICECERTIFICATESTATUSLIST.fields_by_name['CertificateStatus'].message_type = _DEVICECERTIFICATESTATUS
+_LICENSEIDENTIFICATION.fields_by_name['Type'].enum_type = _LICENSETYPE
+_LICENSE_POLICY.containing_type = _LICENSE
+_LICENSE_KEYCONTAINER_OUTPUTPROTECTION.fields_by_name['Hdcp'].enum_type = _CLIENTIDENTIFICATION_CLIENTCAPABILITIES_HDCPVERSION
+_LICENSE_KEYCONTAINER_OUTPUTPROTECTION.fields_by_name['CgmsFlags'].enum_type = _LICENSE_KEYCONTAINER_OUTPUTPROTECTION_CGMS
+_LICENSE_KEYCONTAINER_OUTPUTPROTECTION.containing_type = _LICENSE_KEYCONTAINER
+_LICENSE_KEYCONTAINER_OUTPUTPROTECTION_CGMS.containing_type = _LICENSE_KEYCONTAINER_OUTPUTPROTECTION
+_LICENSE_KEYCONTAINER_KEYCONTROL.containing_type = _LICENSE_KEYCONTAINER
+_LICENSE_KEYCONTAINER_OPERATORSESSIONKEYPERMISSIONS.containing_type = _LICENSE_KEYCONTAINER
+_LICENSE_KEYCONTAINER_VIDEORESOLUTIONCONSTRAINT.fields_by_name['RequiredProtection'].message_type = _LICENSE_KEYCONTAINER_OUTPUTPROTECTION
+_LICENSE_KEYCONTAINER_VIDEORESOLUTIONCONSTRAINT.containing_type = _LICENSE_KEYCONTAINER
+_LICENSE_KEYCONTAINER.fields_by_name['Type'].enum_type = _LICENSE_KEYCONTAINER_KEYTYPE
+_LICENSE_KEYCONTAINER.fields_by_name['Level'].enum_type = _LICENSE_KEYCONTAINER_SECURITYLEVEL
+_LICENSE_KEYCONTAINER.fields_by_name['RequiredProtection'].message_type = _LICENSE_KEYCONTAINER_OUTPUTPROTECTION
+_LICENSE_KEYCONTAINER.fields_by_name['RequestedProtection'].message_type = _LICENSE_KEYCONTAINER_OUTPUTPROTECTION
+_LICENSE_KEYCONTAINER.fields_by_name['_KeyControl'].message_type = _LICENSE_KEYCONTAINER_KEYCONTROL
+_LICENSE_KEYCONTAINER.fields_by_name['_OperatorSessionKeyPermissions'].message_type = _LICENSE_KEYCONTAINER_OPERATORSESSIONKEYPERMISSIONS
+_LICENSE_KEYCONTAINER.fields_by_name['VideoResolutionConstraints'].message_type = _LICENSE_KEYCONTAINER_VIDEORESOLUTIONCONSTRAINT
+_LICENSE_KEYCONTAINER.containing_type = _LICENSE
+_LICENSE_KEYCONTAINER_KEYTYPE.containing_type = _LICENSE_KEYCONTAINER
+_LICENSE_KEYCONTAINER_SECURITYLEVEL.containing_type = _LICENSE_KEYCONTAINER
+_LICENSE.fields_by_name['Id'].message_type = _LICENSEIDENTIFICATION
+_LICENSE.fields_by_name['_Policy'].message_type = _LICENSE_POLICY
+_LICENSE.fields_by_name['Key'].message_type = _LICENSE_KEYCONTAINER
+_LICENSEERROR.fields_by_name['ErrorCode'].enum_type = _LICENSEERROR_ERROR
+_LICENSEERROR_ERROR.containing_type = _LICENSEERROR
+_LICENSEREQUEST_CONTENTIDENTIFICATION_CENC.fields_by_name['Pssh'].message_type = _WIDEVINECENCHEADER
+_LICENSEREQUEST_CONTENTIDENTIFICATION_CENC.fields_by_name['LicenseType'].enum_type = _LICENSETYPE
+_LICENSEREQUEST_CONTENTIDENTIFICATION_CENC.containing_type = _LICENSEREQUEST_CONTENTIDENTIFICATION
+_LICENSEREQUEST_CONTENTIDENTIFICATION_WEBM.fields_by_name['LicenseType'].enum_type = _LICENSETYPE
+_LICENSEREQUEST_CONTENTIDENTIFICATION_WEBM.containing_type = _LICENSEREQUEST_CONTENTIDENTIFICATION
+_LICENSEREQUEST_CONTENTIDENTIFICATION_EXISTINGLICENSE.fields_by_name['LicenseId'].message_type = _LICENSEIDENTIFICATION
+_LICENSEREQUEST_CONTENTIDENTIFICATION_EXISTINGLICENSE.containing_type = _LICENSEREQUEST_CONTENTIDENTIFICATION
+_LICENSEREQUEST_CONTENTIDENTIFICATION.fields_by_name['CencId'].message_type = _LICENSEREQUEST_CONTENTIDENTIFICATION_CENC
+_LICENSEREQUEST_CONTENTIDENTIFICATION.fields_by_name['WebmId'].message_type = _LICENSEREQUEST_CONTENTIDENTIFICATION_WEBM
+_LICENSEREQUEST_CONTENTIDENTIFICATION.fields_by_name['License'].message_type = _LICENSEREQUEST_CONTENTIDENTIFICATION_EXISTINGLICENSE
+_LICENSEREQUEST_CONTENTIDENTIFICATION.containing_type = _LICENSEREQUEST
+_LICENSEREQUEST.fields_by_name['ClientId'].message_type = _CLIENTIDENTIFICATION
+_LICENSEREQUEST.fields_by_name['ContentId'].message_type = _LICENSEREQUEST_CONTENTIDENTIFICATION
+_LICENSEREQUEST.fields_by_name['Type'].enum_type = _LICENSEREQUEST_REQUESTTYPE
+_LICENSEREQUEST.fields_by_name['ProtocolVersion'].enum_type = _PROTOCOLVERSION
+_LICENSEREQUEST.fields_by_name['EncryptedClientId'].message_type = _ENCRYPTEDCLIENTIDENTIFICATION
+_LICENSEREQUEST_REQUESTTYPE.containing_type = _LICENSEREQUEST
+_LICENSEREQUESTRAW_CONTENTIDENTIFICATION_CENC.fields_by_name['LicenseType'].enum_type = _LICENSETYPE
+_LICENSEREQUESTRAW_CONTENTIDENTIFICATION_CENC.containing_type = _LICENSEREQUESTRAW_CONTENTIDENTIFICATION
+_LICENSEREQUESTRAW_CONTENTIDENTIFICATION_WEBM.fields_by_name['LicenseType'].enum_type = _LICENSETYPE
+_LICENSEREQUESTRAW_CONTENTIDENTIFICATION_WEBM.containing_type = _LICENSEREQUESTRAW_CONTENTIDENTIFICATION
+_LICENSEREQUESTRAW_CONTENTIDENTIFICATION_EXISTINGLICENSE.fields_by_name['LicenseId'].message_type = _LICENSEIDENTIFICATION
+_LICENSEREQUESTRAW_CONTENTIDENTIFICATION_EXISTINGLICENSE.containing_type = _LICENSEREQUESTRAW_CONTENTIDENTIFICATION
+_LICENSEREQUESTRAW_CONTENTIDENTIFICATION.fields_by_name['CencId'].message_type = _LICENSEREQUESTRAW_CONTENTIDENTIFICATION_CENC
+_LICENSEREQUESTRAW_CONTENTIDENTIFICATION.fields_by_name['WebmId'].message_type = _LICENSEREQUESTRAW_CONTENTIDENTIFICATION_WEBM
+_LICENSEREQUESTRAW_CONTENTIDENTIFICATION.fields_by_name['License'].message_type = _LICENSEREQUESTRAW_CONTENTIDENTIFICATION_EXISTINGLICENSE
+_LICENSEREQUESTRAW_CONTENTIDENTIFICATION.containing_type = _LICENSEREQUESTRAW
+_LICENSEREQUESTRAW.fields_by_name['ClientId'].message_type = _CLIENTIDENTIFICATION
+_LICENSEREQUESTRAW.fields_by_name['ContentId'].message_type = _LICENSEREQUESTRAW_CONTENTIDENTIFICATION
+_LICENSEREQUESTRAW.fields_by_name['Type'].enum_type = _LICENSEREQUESTRAW_REQUESTTYPE
+_LICENSEREQUESTRAW.fields_by_name['ProtocolVersion'].enum_type = _PROTOCOLVERSION
+_LICENSEREQUESTRAW.fields_by_name['EncryptedClientId'].message_type = _ENCRYPTEDCLIENTIDENTIFICATION
+_LICENSEREQUESTRAW_REQUESTTYPE.containing_type = _LICENSEREQUESTRAW
+_PROVISIONEDDEVICEINFO.fields_by_name['SecurityLevel'].enum_type = _PROVISIONEDDEVICEINFO_WVSECURITYLEVEL
+_PROVISIONEDDEVICEINFO_WVSECURITYLEVEL.containing_type = _PROVISIONEDDEVICEINFO
+_REMOTEATTESTATION.fields_by_name['Certificate'].message_type = _ENCRYPTEDCLIENTIDENTIFICATION
+_SIGNEDDEVICECERTIFICATE.fields_by_name['_DeviceCertificate'].message_type = _DEVICECERTIFICATE
+_SIGNEDDEVICECERTIFICATE.fields_by_name['Signer'].message_type = _SIGNEDDEVICECERTIFICATE
+_SIGNEDMESSAGE.fields_by_name['Type'].enum_type = _SIGNEDMESSAGE_MESSAGETYPE
+_SIGNEDMESSAGE.fields_by_name['RemoteAttestation'].message_type = _REMOTEATTESTATION
+_SIGNEDMESSAGE_MESSAGETYPE.containing_type = _SIGNEDMESSAGE
+_WIDEVINECENCHEADER.fields_by_name['algorithm'].enum_type = _WIDEVINECENCHEADER_ALGORITHM
+_WIDEVINECENCHEADER_ALGORITHM.containing_type = _WIDEVINECENCHEADER
+_SIGNEDLICENSEREQUEST.fields_by_name['Type'].enum_type = _SIGNEDLICENSEREQUEST_MESSAGETYPE
+_SIGNEDLICENSEREQUEST.fields_by_name['Msg'].message_type = _LICENSEREQUEST
+_SIGNEDLICENSEREQUEST.fields_by_name['RemoteAttestation'].message_type = _REMOTEATTESTATION
+_SIGNEDLICENSEREQUEST_MESSAGETYPE.containing_type = _SIGNEDLICENSEREQUEST
+_SIGNEDLICENSEREQUESTRAW.fields_by_name['Type'].enum_type = _SIGNEDLICENSEREQUESTRAW_MESSAGETYPE
+_SIGNEDLICENSEREQUESTRAW.fields_by_name['Msg'].message_type = _LICENSEREQUESTRAW
+_SIGNEDLICENSEREQUESTRAW.fields_by_name['RemoteAttestation'].message_type = _REMOTEATTESTATION
+_SIGNEDLICENSEREQUESTRAW_MESSAGETYPE.containing_type = _SIGNEDLICENSEREQUESTRAW
+_SIGNEDLICENSE.fields_by_name['Type'].enum_type = _SIGNEDLICENSE_MESSAGETYPE
+_SIGNEDLICENSE.fields_by_name['Msg'].message_type = _LICENSE
+_SIGNEDLICENSE.fields_by_name['RemoteAttestation'].message_type = _REMOTEATTESTATION
+_SIGNEDLICENSE_MESSAGETYPE.containing_type = _SIGNEDLICENSE
+_SIGNEDSERVICECERTIFICATE.fields_by_name['Type'].enum_type = _SIGNEDSERVICECERTIFICATE_MESSAGETYPE
+_SIGNEDSERVICECERTIFICATE.fields_by_name['Msg'].message_type = _SIGNEDDEVICECERTIFICATE
+_SIGNEDSERVICECERTIFICATE.fields_by_name['RemoteAttestation'].message_type = _REMOTEATTESTATION
+_SIGNEDSERVICECERTIFICATE_MESSAGETYPE.containing_type = _SIGNEDSERVICECERTIFICATE
+_FILEHASHES_SIGNATURE.containing_type = _FILEHASHES
+_FILEHASHES.fields_by_name['signatures'].message_type = _FILEHASHES_SIGNATURE
+DESCRIPTOR.message_types_by_name['ClientIdentification'] = _CLIENTIDENTIFICATION
+DESCRIPTOR.message_types_by_name['DeviceCertificate'] = _DEVICECERTIFICATE
+DESCRIPTOR.message_types_by_name['DeviceCertificateStatus'] = _DEVICECERTIFICATESTATUS
+DESCRIPTOR.message_types_by_name['DeviceCertificateStatusList'] = _DEVICECERTIFICATESTATUSLIST
+DESCRIPTOR.message_types_by_name['EncryptedClientIdentification'] = _ENCRYPTEDCLIENTIDENTIFICATION
+DESCRIPTOR.message_types_by_name['LicenseIdentification'] = _LICENSEIDENTIFICATION
+DESCRIPTOR.message_types_by_name['License'] = _LICENSE
+DESCRIPTOR.message_types_by_name['LicenseError'] = _LICENSEERROR
+DESCRIPTOR.message_types_by_name['LicenseRequest'] = _LICENSEREQUEST
+DESCRIPTOR.message_types_by_name['LicenseRequestRaw'] = _LICENSEREQUESTRAW
+DESCRIPTOR.message_types_by_name['ProvisionedDeviceInfo'] = _PROVISIONEDDEVICEINFO
+DESCRIPTOR.message_types_by_name['ProvisioningOptions'] = _PROVISIONINGOPTIONS
+DESCRIPTOR.message_types_by_name['ProvisioningRequest'] = _PROVISIONINGREQUEST
+DESCRIPTOR.message_types_by_name['ProvisioningResponse'] = _PROVISIONINGRESPONSE
+DESCRIPTOR.message_types_by_name['RemoteAttestation'] = _REMOTEATTESTATION
+DESCRIPTOR.message_types_by_name['SessionInit'] = _SESSIONINIT
+DESCRIPTOR.message_types_by_name['SessionState'] = _SESSIONSTATE
+DESCRIPTOR.message_types_by_name['SignedCertificateStatusList'] = _SIGNEDCERTIFICATESTATUSLIST
+DESCRIPTOR.message_types_by_name['SignedDeviceCertificate'] = _SIGNEDDEVICECERTIFICATE
+DESCRIPTOR.message_types_by_name['SignedProvisioningMessage'] = _SIGNEDPROVISIONINGMESSAGE
+DESCRIPTOR.message_types_by_name['SignedMessage'] = _SIGNEDMESSAGE
+DESCRIPTOR.message_types_by_name['WidevineCencHeader'] = _WIDEVINECENCHEADER
+DESCRIPTOR.message_types_by_name['SignedLicenseRequest'] = _SIGNEDLICENSEREQUEST
+DESCRIPTOR.message_types_by_name['SignedLicenseRequestRaw'] = _SIGNEDLICENSEREQUESTRAW
+DESCRIPTOR.message_types_by_name['SignedLicense'] = _SIGNEDLICENSE
+DESCRIPTOR.message_types_by_name['SignedServiceCertificate'] = _SIGNEDSERVICECERTIFICATE
+DESCRIPTOR.message_types_by_name['FileHashes'] = _FILEHASHES
+DESCRIPTOR.enum_types_by_name['LicenseType'] = _LICENSETYPE
+DESCRIPTOR.enum_types_by_name['ProtocolVersion'] = _PROTOCOLVERSION
+
+ClientIdentification = _reflection.GeneratedProtocolMessageType('ClientIdentification', (_message.Message,), dict(
+
+ NameValue = _reflection.GeneratedProtocolMessageType('NameValue', (_message.Message,), dict(
+ DESCRIPTOR = _CLIENTIDENTIFICATION_NAMEVALUE,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:ClientIdentification.NameValue)
+ ))
+ ,
+
+ ClientCapabilities = _reflection.GeneratedProtocolMessageType('ClientCapabilities', (_message.Message,), dict(
+ DESCRIPTOR = _CLIENTIDENTIFICATION_CLIENTCAPABILITIES,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:ClientIdentification.ClientCapabilities)
+ ))
+ ,
+ DESCRIPTOR = _CLIENTIDENTIFICATION,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:ClientIdentification)
+ ))
+_sym_db.RegisterMessage(ClientIdentification)
+_sym_db.RegisterMessage(ClientIdentification.NameValue)
+_sym_db.RegisterMessage(ClientIdentification.ClientCapabilities)
+
+DeviceCertificate = _reflection.GeneratedProtocolMessageType('DeviceCertificate', (_message.Message,), dict(
+ DESCRIPTOR = _DEVICECERTIFICATE,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:DeviceCertificate)
+ ))
+_sym_db.RegisterMessage(DeviceCertificate)
+
+DeviceCertificateStatus = _reflection.GeneratedProtocolMessageType('DeviceCertificateStatus', (_message.Message,), dict(
+ DESCRIPTOR = _DEVICECERTIFICATESTATUS,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:DeviceCertificateStatus)
+ ))
+_sym_db.RegisterMessage(DeviceCertificateStatus)
+
+DeviceCertificateStatusList = _reflection.GeneratedProtocolMessageType('DeviceCertificateStatusList', (_message.Message,), dict(
+ DESCRIPTOR = _DEVICECERTIFICATESTATUSLIST,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:DeviceCertificateStatusList)
+ ))
+_sym_db.RegisterMessage(DeviceCertificateStatusList)
+
+EncryptedClientIdentification = _reflection.GeneratedProtocolMessageType('EncryptedClientIdentification', (_message.Message,), dict(
+ DESCRIPTOR = _ENCRYPTEDCLIENTIDENTIFICATION,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:EncryptedClientIdentification)
+ ))
+_sym_db.RegisterMessage(EncryptedClientIdentification)
+
+LicenseIdentification = _reflection.GeneratedProtocolMessageType('LicenseIdentification', (_message.Message,), dict(
+ DESCRIPTOR = _LICENSEIDENTIFICATION,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:LicenseIdentification)
+ ))
+_sym_db.RegisterMessage(LicenseIdentification)
+
+License = _reflection.GeneratedProtocolMessageType('License', (_message.Message,), dict(
+
+ Policy = _reflection.GeneratedProtocolMessageType('Policy', (_message.Message,), dict(
+ DESCRIPTOR = _LICENSE_POLICY,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:License.Policy)
+ ))
+ ,
+
+ KeyContainer = _reflection.GeneratedProtocolMessageType('KeyContainer', (_message.Message,), dict(
+
+ OutputProtection = _reflection.GeneratedProtocolMessageType('OutputProtection', (_message.Message,), dict(
+ DESCRIPTOR = _LICENSE_KEYCONTAINER_OUTPUTPROTECTION,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:License.KeyContainer.OutputProtection)
+ ))
+ ,
+
+ KeyControl = _reflection.GeneratedProtocolMessageType('KeyControl', (_message.Message,), dict(
+ DESCRIPTOR = _LICENSE_KEYCONTAINER_KEYCONTROL,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:License.KeyContainer.KeyControl)
+ ))
+ ,
+
+ OperatorSessionKeyPermissions = _reflection.GeneratedProtocolMessageType('OperatorSessionKeyPermissions', (_message.Message,), dict(
+ DESCRIPTOR = _LICENSE_KEYCONTAINER_OPERATORSESSIONKEYPERMISSIONS,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:License.KeyContainer.OperatorSessionKeyPermissions)
+ ))
+ ,
+
+ VideoResolutionConstraint = _reflection.GeneratedProtocolMessageType('VideoResolutionConstraint', (_message.Message,), dict(
+ DESCRIPTOR = _LICENSE_KEYCONTAINER_VIDEORESOLUTIONCONSTRAINT,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:License.KeyContainer.VideoResolutionConstraint)
+ ))
+ ,
+ DESCRIPTOR = _LICENSE_KEYCONTAINER,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:License.KeyContainer)
+ ))
+ ,
+ DESCRIPTOR = _LICENSE,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:License)
+ ))
+_sym_db.RegisterMessage(License)
+_sym_db.RegisterMessage(License.Policy)
+_sym_db.RegisterMessage(License.KeyContainer)
+_sym_db.RegisterMessage(License.KeyContainer.OutputProtection)
+_sym_db.RegisterMessage(License.KeyContainer.KeyControl)
+_sym_db.RegisterMessage(License.KeyContainer.OperatorSessionKeyPermissions)
+_sym_db.RegisterMessage(License.KeyContainer.VideoResolutionConstraint)
+
+LicenseError = _reflection.GeneratedProtocolMessageType('LicenseError', (_message.Message,), dict(
+ DESCRIPTOR = _LICENSEERROR,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:LicenseError)
+ ))
+_sym_db.RegisterMessage(LicenseError)
+
+LicenseRequest = _reflection.GeneratedProtocolMessageType('LicenseRequest', (_message.Message,), dict(
+
+ ContentIdentification = _reflection.GeneratedProtocolMessageType('ContentIdentification', (_message.Message,), dict(
+
+ CENC = _reflection.GeneratedProtocolMessageType('CENC', (_message.Message,), dict(
+ DESCRIPTOR = _LICENSEREQUEST_CONTENTIDENTIFICATION_CENC,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:LicenseRequest.ContentIdentification.CENC)
+ ))
+ ,
+
+ WebM = _reflection.GeneratedProtocolMessageType('WebM', (_message.Message,), dict(
+ DESCRIPTOR = _LICENSEREQUEST_CONTENTIDENTIFICATION_WEBM,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:LicenseRequest.ContentIdentification.WebM)
+ ))
+ ,
+
+ ExistingLicense = _reflection.GeneratedProtocolMessageType('ExistingLicense', (_message.Message,), dict(
+ DESCRIPTOR = _LICENSEREQUEST_CONTENTIDENTIFICATION_EXISTINGLICENSE,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:LicenseRequest.ContentIdentification.ExistingLicense)
+ ))
+ ,
+ DESCRIPTOR = _LICENSEREQUEST_CONTENTIDENTIFICATION,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:LicenseRequest.ContentIdentification)
+ ))
+ ,
+ DESCRIPTOR = _LICENSEREQUEST,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:LicenseRequest)
+ ))
+_sym_db.RegisterMessage(LicenseRequest)
+_sym_db.RegisterMessage(LicenseRequest.ContentIdentification)
+_sym_db.RegisterMessage(LicenseRequest.ContentIdentification.CENC)
+_sym_db.RegisterMessage(LicenseRequest.ContentIdentification.WebM)
+_sym_db.RegisterMessage(LicenseRequest.ContentIdentification.ExistingLicense)
+
+LicenseRequestRaw = _reflection.GeneratedProtocolMessageType('LicenseRequestRaw', (_message.Message,), dict(
+
+ ContentIdentification = _reflection.GeneratedProtocolMessageType('ContentIdentification', (_message.Message,), dict(
+
+ CENC = _reflection.GeneratedProtocolMessageType('CENC', (_message.Message,), dict(
+ DESCRIPTOR = _LICENSEREQUESTRAW_CONTENTIDENTIFICATION_CENC,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:LicenseRequestRaw.ContentIdentification.CENC)
+ ))
+ ,
+
+ WebM = _reflection.GeneratedProtocolMessageType('WebM', (_message.Message,), dict(
+ DESCRIPTOR = _LICENSEREQUESTRAW_CONTENTIDENTIFICATION_WEBM,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:LicenseRequestRaw.ContentIdentification.WebM)
+ ))
+ ,
+
+ ExistingLicense = _reflection.GeneratedProtocolMessageType('ExistingLicense', (_message.Message,), dict(
+ DESCRIPTOR = _LICENSEREQUESTRAW_CONTENTIDENTIFICATION_EXISTINGLICENSE,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:LicenseRequestRaw.ContentIdentification.ExistingLicense)
+ ))
+ ,
+ DESCRIPTOR = _LICENSEREQUESTRAW_CONTENTIDENTIFICATION,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:LicenseRequestRaw.ContentIdentification)
+ ))
+ ,
+ DESCRIPTOR = _LICENSEREQUESTRAW,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:LicenseRequestRaw)
+ ))
+_sym_db.RegisterMessage(LicenseRequestRaw)
+_sym_db.RegisterMessage(LicenseRequestRaw.ContentIdentification)
+_sym_db.RegisterMessage(LicenseRequestRaw.ContentIdentification.CENC)
+_sym_db.RegisterMessage(LicenseRequestRaw.ContentIdentification.WebM)
+_sym_db.RegisterMessage(LicenseRequestRaw.ContentIdentification.ExistingLicense)
+
+ProvisionedDeviceInfo = _reflection.GeneratedProtocolMessageType('ProvisionedDeviceInfo', (_message.Message,), dict(
+ DESCRIPTOR = _PROVISIONEDDEVICEINFO,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:ProvisionedDeviceInfo)
+ ))
+_sym_db.RegisterMessage(ProvisionedDeviceInfo)
+
+ProvisioningOptions = _reflection.GeneratedProtocolMessageType('ProvisioningOptions', (_message.Message,), dict(
+ DESCRIPTOR = _PROVISIONINGOPTIONS,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:ProvisioningOptions)
+ ))
+_sym_db.RegisterMessage(ProvisioningOptions)
+
+ProvisioningRequest = _reflection.GeneratedProtocolMessageType('ProvisioningRequest', (_message.Message,), dict(
+ DESCRIPTOR = _PROVISIONINGREQUEST,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:ProvisioningRequest)
+ ))
+_sym_db.RegisterMessage(ProvisioningRequest)
+
+ProvisioningResponse = _reflection.GeneratedProtocolMessageType('ProvisioningResponse', (_message.Message,), dict(
+ DESCRIPTOR = _PROVISIONINGRESPONSE,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:ProvisioningResponse)
+ ))
+_sym_db.RegisterMessage(ProvisioningResponse)
+
+RemoteAttestation = _reflection.GeneratedProtocolMessageType('RemoteAttestation', (_message.Message,), dict(
+ DESCRIPTOR = _REMOTEATTESTATION,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:RemoteAttestation)
+ ))
+_sym_db.RegisterMessage(RemoteAttestation)
+
+SessionInit = _reflection.GeneratedProtocolMessageType('SessionInit', (_message.Message,), dict(
+ DESCRIPTOR = _SESSIONINIT,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:SessionInit)
+ ))
+_sym_db.RegisterMessage(SessionInit)
+
+SessionState = _reflection.GeneratedProtocolMessageType('SessionState', (_message.Message,), dict(
+ DESCRIPTOR = _SESSIONSTATE,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:SessionState)
+ ))
+_sym_db.RegisterMessage(SessionState)
+
+SignedCertificateStatusList = _reflection.GeneratedProtocolMessageType('SignedCertificateStatusList', (_message.Message,), dict(
+ DESCRIPTOR = _SIGNEDCERTIFICATESTATUSLIST,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:SignedCertificateStatusList)
+ ))
+_sym_db.RegisterMessage(SignedCertificateStatusList)
+
+SignedDeviceCertificate = _reflection.GeneratedProtocolMessageType('SignedDeviceCertificate', (_message.Message,), dict(
+ DESCRIPTOR = _SIGNEDDEVICECERTIFICATE,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:SignedDeviceCertificate)
+ ))
+_sym_db.RegisterMessage(SignedDeviceCertificate)
+
+SignedProvisioningMessage = _reflection.GeneratedProtocolMessageType('SignedProvisioningMessage', (_message.Message,), dict(
+ DESCRIPTOR = _SIGNEDPROVISIONINGMESSAGE,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:SignedProvisioningMessage)
+ ))
+_sym_db.RegisterMessage(SignedProvisioningMessage)
+
+SignedMessage = _reflection.GeneratedProtocolMessageType('SignedMessage', (_message.Message,), dict(
+ DESCRIPTOR = _SIGNEDMESSAGE,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:SignedMessage)
+ ))
+_sym_db.RegisterMessage(SignedMessage)
+
+WidevineCencHeader = _reflection.GeneratedProtocolMessageType('WidevineCencHeader', (_message.Message,), dict(
+ DESCRIPTOR = _WIDEVINECENCHEADER,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:WidevineCencHeader)
+ ))
+_sym_db.RegisterMessage(WidevineCencHeader)
+
+SignedLicenseRequest = _reflection.GeneratedProtocolMessageType('SignedLicenseRequest', (_message.Message,), dict(
+ DESCRIPTOR = _SIGNEDLICENSEREQUEST,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:SignedLicenseRequest)
+ ))
+_sym_db.RegisterMessage(SignedLicenseRequest)
+
+SignedLicenseRequestRaw = _reflection.GeneratedProtocolMessageType('SignedLicenseRequestRaw', (_message.Message,), dict(
+ DESCRIPTOR = _SIGNEDLICENSEREQUESTRAW,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:SignedLicenseRequestRaw)
+ ))
+_sym_db.RegisterMessage(SignedLicenseRequestRaw)
+
+SignedLicense = _reflection.GeneratedProtocolMessageType('SignedLicense', (_message.Message,), dict(
+ DESCRIPTOR = _SIGNEDLICENSE,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:SignedLicense)
+ ))
+_sym_db.RegisterMessage(SignedLicense)
+
+SignedServiceCertificate = _reflection.GeneratedProtocolMessageType('SignedServiceCertificate', (_message.Message,), dict(
+ DESCRIPTOR = _SIGNEDSERVICECERTIFICATE,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:SignedServiceCertificate)
+ ))
+_sym_db.RegisterMessage(SignedServiceCertificate)
+
+FileHashes = _reflection.GeneratedProtocolMessageType('FileHashes', (_message.Message,), dict(
+
+ Signature = _reflection.GeneratedProtocolMessageType('Signature', (_message.Message,), dict(
+ DESCRIPTOR = _FILEHASHES_SIGNATURE,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:FileHashes.Signature)
+ ))
+ ,
+ DESCRIPTOR = _FILEHASHES,
+ __module__ = 'pywidevine.cdm.formats.wv_proto2_pb2'
+ # @@protoc_insertion_point(class_scope:FileHashes)
+ ))
+_sym_db.RegisterMessage(FileHashes)
+_sym_db.RegisterMessage(FileHashes.Signature)
+
+
+# @@protoc_insertion_point(module_scope)
diff --git a/pywidevine/cdm/formats/wv_proto3.proto b/pywidevine/cdm/formats/wv_proto3.proto
new file mode 100644
index 0000000..7861b02
--- /dev/null
+++ b/pywidevine/cdm/formats/wv_proto3.proto
@@ -0,0 +1,389 @@
+// beware proto3 won't show missing fields it seems, need to change to "proto2" and add "optional" before every field, and remove all the dummy enum members I added:
+syntax = "proto3";
+
+// from x86 (partial), most of it from the ARM version:
+message ClientIdentification {
+ enum TokenType {
+ KEYBOX = 0;
+ DEVICE_CERTIFICATE = 1;
+ REMOTE_ATTESTATION_CERTIFICATE = 2;
+ }
+ message NameValue {
+ string Name = 1;
+ string Value = 2;
+ }
+ message ClientCapabilities {
+ enum HdcpVersion {
+ HDCP_NONE = 0;
+ HDCP_V1 = 1;
+ HDCP_V2 = 2;
+ HDCP_V2_1 = 3;
+ HDCP_V2_2 = 4;
+ }
+ uint32 ClientToken = 1;
+ uint32 SessionToken = 2;
+ uint32 VideoResolutionConstraints = 3;
+ HdcpVersion MaxHdcpVersion = 4;
+ uint32 OemCryptoApiVersion = 5;
+ }
+ TokenType Type = 1;
+ //bytes Token = 2; // by default the client treats this as blob, but it's usually a DeviceCertificate, so for usefulness sake, I'm replacing it with this one:
+ SignedDeviceCertificate Token = 2;
+ repeated NameValue ClientInfo = 3;
+ bytes ProviderClientToken = 4;
+ uint32 LicenseCounter = 5;
+ ClientCapabilities _ClientCapabilities = 6; // how should we deal with duped names? will have to look at proto docs later
+}
+
+message DeviceCertificate {
+ enum CertificateType {
+ ROOT = 0;
+ INTERMEDIATE = 1;
+ USER_DEVICE = 2;
+ SERVICE = 3;
+ }
+ //ProvisionedDeviceInfo.WvSecurityLevel Type = 1; // is this how one is supposed to call it? (it's an enum) there might be a bug here, with CertificateType getting confused with WvSecurityLevel, for now renaming it (verify against other binaries)
+ CertificateType Type = 1;
+ bytes SerialNumber = 2;
+ uint32 CreationTimeSeconds = 3;
+ bytes PublicKey = 4;
+ uint32 SystemId = 5;
+ uint32 TestDeviceDeprecated = 6; // is it bool or int?
+ bytes ServiceId = 7; // service URL for service certificates
+}
+
+// missing some references,
+message DeviceCertificateStatus {
+ enum CertificateStatus {
+ VALID = 0;
+ REVOKED = 1;
+ }
+ bytes SerialNumber = 1;
+ CertificateStatus Status = 2;
+ ProvisionedDeviceInfo DeviceInfo = 4; // where is 3? is it deprecated?
+}
+
+message DeviceCertificateStatusList {
+ uint32 CreationTimeSeconds = 1;
+ repeated DeviceCertificateStatus CertificateStatus = 2;
+}
+
+message EncryptedClientIdentification {
+ string ServiceId = 1;
+ bytes ServiceCertificateSerialNumber = 2;
+ bytes EncryptedClientId = 3;
+ bytes EncryptedClientIdIv = 4;
+ bytes EncryptedPrivacyKey = 5;
+}
+
+// todo: fill (for this top-level type, it might be impossible/difficult)
+enum LicenseType {
+ ZERO = 0;
+ DEFAULT = 1; // do not know what this is either, but should be 1; on recent versions may go up to 3 (latest x86)
+}
+
+// todo: fill (for this top-level type, it might be impossible/difficult)
+// this is just a guess because these globals got lost, but really, do we need more?
+enum ProtocolVersion {
+ DUMMY = 0;
+ CURRENT = 21; // don't have symbols for this
+}
+
+
+message LicenseIdentification {
+ bytes RequestId = 1;
+ bytes SessionId = 2;
+ bytes PurchaseId = 3;
+ LicenseType Type = 4;
+ uint32 Version = 5;
+ bytes ProviderSessionToken = 6;
+}
+
+
+message License {
+ message Policy {
+ uint32 CanPlay = 1;
+ uint32 CanPersist = 2;
+ uint32 CanRenew = 3;
+ uint32 RentalDurationSeconds = 4;
+ uint32 PlaybackDurationSeconds = 5;
+ uint32 LicenseDurationSeconds = 6;
+ uint32 RenewalRecoveryDurationSeconds = 7;
+ string RenewalServerUrl = 8;
+ uint32 RenewalDelaySeconds = 9;
+ uint32 RenewalRetryIntervalSeconds = 10;
+ uint32 RenewWithUsage = 11;
+ uint32 UnknownPolicy12 = 12;
+ }
+ message KeyContainer {
+ enum KeyType {
+ _NOKEYTYPE = 0; // dummy, added to satisfy proto3, not present in original
+ SIGNING = 1;
+ CONTENT = 2;
+ KEY_CONTROL = 3;
+ OPERATOR_SESSION = 4;
+ }
+ enum SecurityLevel {
+ _NOSECLEVEL = 0; // dummy, added to satisfy proto3, not present in original
+ SW_SECURE_CRYPTO = 1;
+ SW_SECURE_DECODE = 2;
+ HW_SECURE_CRYPTO = 3;
+ HW_SECURE_DECODE = 4;
+ HW_SECURE_ALL = 5;
+ }
+ message OutputProtection {
+ enum CGMS {
+ COPY_FREE = 0;
+ COPY_ONCE = 2;
+ COPY_NEVER = 3;
+ CGMS_NONE = 0x2A; // PC default!
+ }
+ ClientIdentification.ClientCapabilities.HdcpVersion Hdcp = 1; // it's most likely a copy of Hdcp version available here, but compiler optimized it away
+ CGMS CgmsFlags = 2;
+ }
+ message KeyControl {
+ bytes KeyControlBlock = 1; // what is this?
+ bytes Iv = 2;
+ }
+ message OperatorSessionKeyPermissions {
+ uint32 AllowEncrypt = 1;
+ uint32 AllowDecrypt = 2;
+ uint32 AllowSign = 3;
+ uint32 AllowSignatureVerify = 4;
+ }
+ message VideoResolutionConstraint {
+ uint32 MinResolutionPixels = 1;
+ uint32 MaxResolutionPixels = 2;
+ OutputProtection RequiredProtection = 3;
+ }
+ bytes Id = 1;
+ bytes Iv = 2;
+ bytes Key = 3;
+ KeyType Type = 4;
+ SecurityLevel Level = 5;
+ OutputProtection RequiredProtection = 6;
+ OutputProtection RequestedProtection = 7;
+ KeyControl _KeyControl = 8; // duped names, etc
+ OperatorSessionKeyPermissions _OperatorSessionKeyPermissions = 9; // duped names, etc
+ repeated VideoResolutionConstraint VideoResolutionConstraints = 10;
+ }
+ LicenseIdentification Id = 1;
+ Policy _Policy = 2; // duped names, etc
+ repeated KeyContainer Key = 3;
+ uint32 LicenseStartTime = 4;
+ uint32 RemoteAttestationVerified = 5; // bool?
+ bytes ProviderClientToken = 6;
+ // there might be more, check with newer versions (I see field 7-8 in a lic)
+ // this appeared in latest x86:
+ uint32 ProtectionScheme = 7; // type unconfirmed fully, but it's likely as WidevineCencHeader describesit (fourcc)
+ bytes UnknownHdcpDataField = 8;
+}
+
+message LicenseError {
+ enum Error {
+ DUMMY_NO_ERROR = 0; // dummy, added to satisfy proto3
+ INVALID_DEVICE_CERTIFICATE = 1;
+ REVOKED_DEVICE_CERTIFICATE = 2;
+ SERVICE_UNAVAILABLE = 3;
+ }
+ //LicenseRequest.RequestType ErrorCode; // clang mismatch
+ Error ErrorCode = 1;
+}
+
+message LicenseRequest {
+ message ContentIdentification {
+ message CENC {
+ // bytes Pssh = 1; // the client's definition is opaque, it doesn't care about the contents, but the PSSH has a clear definition that is understood and requested by the server, thus I'll replace it with:
+ WidevineCencHeader Pssh = 1;
+ LicenseType LicenseType = 2; // unfortunately the LicenseType symbols are not present, acceptable value seems to only be 1
+ bytes RequestId = 3;
+ }
+ message WebM {
+ bytes Header = 1; // identical to CENC, aside from PSSH and the parent field number used
+ LicenseType LicenseType = 2;
+ bytes RequestId = 3;
+ }
+ message ExistingLicense {
+ LicenseIdentification LicenseId = 1;
+ uint32 SecondsSinceStarted = 2;
+ uint32 SecondsSinceLastPlayed = 3;
+ bytes SessionUsageTableEntry = 4;
+ }
+ CENC CencId = 1;
+ WebM WebmId = 2;
+ ExistingLicense License = 3;
+ }
+ enum RequestType {
+ DUMMY_REQ_TYPE = 0; // dummy, added to satisfy proto3
+ NEW = 1;
+ RENEWAL = 2;
+ RELEASE = 3;
+ }
+ ClientIdentification ClientId = 1;
+ ContentIdentification ContentId = 2;
+ RequestType Type = 3;
+ uint32 RequestTime = 4;
+ bytes KeyControlNonceDeprecated = 5;
+ ProtocolVersion ProtocolVersion = 6; // lacking symbols for this
+ uint32 KeyControlNonce = 7;
+ EncryptedClientIdentification EncryptedClientId = 8;
+}
+
+message ProvisionedDeviceInfo {
+ enum WvSecurityLevel {
+ LEVEL_UNSPECIFIED = 0;
+ LEVEL_1 = 1;
+ LEVEL_2 = 2;
+ LEVEL_3 = 3;
+ }
+ uint32 SystemId = 1;
+ string Soc = 2;
+ string Manufacturer = 3;
+ string Model = 4;
+ string DeviceType = 5;
+ uint32 ModelYear = 6;
+ WvSecurityLevel SecurityLevel = 7;
+ uint32 TestDevice = 8; // bool?
+}
+
+
+// todo: fill
+message ProvisioningOptions {
+}
+
+// todo: fill
+message ProvisioningRequest {
+}
+
+// todo: fill
+message ProvisioningResponse {
+}
+
+message RemoteAttestation {
+ EncryptedClientIdentification Certificate = 1;
+ string Salt = 2;
+ string Signature = 3;
+}
+
+// todo: fill
+message SessionInit {
+}
+
+// todo: fill
+message SessionState {
+}
+
+// todo: fill
+message SignedCertificateStatusList {
+}
+
+message SignedDeviceCertificate {
+
+ //bytes DeviceCertificate = 1; // again, they use a buffer where it's supposed to be a message, so we'll replace it with what it really is:
+ DeviceCertificate _DeviceCertificate = 1; // how should we deal with duped names? will have to look at proto docs later
+ bytes Signature = 2;
+ SignedDeviceCertificate Signer = 3;
+}
+
+
+// todo: fill
+message SignedProvisioningMessage {
+}
+
+// the root of all messages, from either server or client
+message SignedMessage {
+ enum MessageType {
+ DUMMY_MSG_TYPE = 0; // dummy, added to satisfy proto3
+ LICENSE_REQUEST = 1;
+ LICENSE = 2;
+ ERROR_RESPONSE = 3;
+ SERVICE_CERTIFICATE_REQUEST = 4;
+ SERVICE_CERTIFICATE = 5;
+ }
+ MessageType Type = 1; // has in incorrect overlap with License_KeyContainer_SecurityLevel
+ bytes Msg = 2; // this has to be casted dynamically, to LicenseRequest, License or LicenseError (? unconfirmed), for Request, no other fields but Type need to be present
+ // for SERVICE_CERTIFICATE, only Type and Msg are present, and it's just a DeviceCertificate with CertificateType set to SERVICE
+ bytes Signature = 3; // might be different type of signatures (ex. RSA vs AES CMAC(??), unconfirmed for now)
+ bytes SessionKey = 4; // often RSA wrapped for licenses
+ RemoteAttestation RemoteAttestation = 5;
+}
+
+
+
+// This message is copied from google's docs, not reversed:
+message WidevineCencHeader {
+ enum Algorithm {
+ UNENCRYPTED = 0;
+ AESCTR = 1;
+ };
+ Algorithm algorithm = 1;
+ repeated bytes key_id = 2;
+
+ // Content provider name.
+ string provider = 3;
+
+ // A content identifier, specified by content provider.
+ bytes content_id = 4;
+
+ // Track type. Acceptable values are SD, HD and AUDIO. Used to
+ // differentiate content keys used by an asset.
+ string track_type_deprecated = 5;
+
+ // The name of a registered policy to be used for this asset.
+ string policy = 6;
+
+ // Crypto period index, for media using key rotation.
+ uint32 crypto_period_index = 7;
+
+ // Optional protected context for group content. The grouped_license is a
+ // serialized SignedMessage.
+ bytes grouped_license = 8;
+
+ // Protection scheme identifying the encryption algorithm.
+ // Represented as one of the following 4CC values:
+ // 'cenc' (AESCTR), 'cbc1' (AESCBC),
+ // 'cens' (AESCTR subsample), 'cbcs' (AESCBC subsample).
+ uint32 protection_scheme = 9;
+
+ // Optional. For media using key rotation, this represents the duration
+ // of each crypto period in seconds.
+ uint32 crypto_period_seconds = 10;
+}
+
+
+
+
+// from here on, it's just for testing, these messages don't exist in the binaries, I'm adding them to avoid detecting type programmatically
+message SignedLicenseRequest {
+ enum MessageType {
+ DUMMY_MSG_TYPE = 0; // dummy, added to satisfy proto3
+ LICENSE_REQUEST = 1;
+ LICENSE = 2;
+ ERROR_RESPONSE = 3;
+ SERVICE_CERTIFICATE_REQUEST = 4;
+ SERVICE_CERTIFICATE = 5;
+ }
+ MessageType Type = 1; // has in incorrect overlap with License_KeyContainer_SecurityLevel
+ LicenseRequest Msg = 2; // this has to be casted dynamically, to LicenseRequest, License or LicenseError (? unconfirmed), for Request, no other fields but Type need to be present
+ // for SERVICE_CERTIFICATE, only Type and Msg are present, and it's just a DeviceCertificate with CertificateType set to SERVICE
+ bytes Signature = 3; // might be different type of signatures (ex. RSA vs AES CMAC(??), unconfirmed for now)
+ bytes SessionKey = 4; // often RSA wrapped for licenses
+ RemoteAttestation RemoteAttestation = 5;
+}
+
+message SignedLicense {
+ enum MessageType {
+ DUMMY_MSG_TYPE = 0; // dummy, added to satisfy proto3
+ LICENSE_REQUEST = 1;
+ LICENSE = 2;
+ ERROR_RESPONSE = 3;
+ SERVICE_CERTIFICATE_REQUEST = 4;
+ SERVICE_CERTIFICATE = 5;
+ }
+ MessageType Type = 1; // has in incorrect overlap with License_KeyContainer_SecurityLevel
+ License Msg = 2; // this has to be casted dynamically, to LicenseRequest, License or LicenseError (? unconfirmed), for Request, no other fields but Type need to be present
+ // for SERVICE_CERTIFICATE, only Type and Msg are present, and it's just a DeviceCertificate with CertificateType set to SERVICE
+ bytes Signature = 3; // might be different type of signatures (ex. RSA vs AES CMAC(??), unconfirmed for now)
+ bytes SessionKey = 4; // often RSA wrapped for licenses
+ RemoteAttestation RemoteAttestation = 5;
+}
\ No newline at end of file
diff --git a/pywidevine/cdm/formats/wv_proto3_pb2.py b/pywidevine/cdm/formats/wv_proto3_pb2.py
new file mode 100644
index 0000000..11ae09f
--- /dev/null
+++ b/pywidevine/cdm/formats/wv_proto3_pb2.py
@@ -0,0 +1,2686 @@
+# Generated by the protocol buffer compiler. DO NOT EDIT!
+# source: wv_proto3.proto
+
+import sys
+_b=sys.version_info[0]<3 and (lambda x:x) or (lambda x:x.encode('latin1'))
+from google.protobuf.internal import enum_type_wrapper
+from google.protobuf import descriptor as _descriptor
+from google.protobuf import message as _message
+from google.protobuf import reflection as _reflection
+from google.protobuf import symbol_database as _symbol_database
+from google.protobuf import descriptor_pb2
+# @@protoc_insertion_point(imports)
+
+_sym_db = _symbol_database.Default()
+
+
+
+
+DESCRIPTOR = _descriptor.FileDescriptor(
+ name='wv_proto3.proto',
+ package='',
+ syntax='proto3',
+ serialized_pb=_b('\n\x0fwv_proto3.proto\"\xc5\x05\n\x14\x43lientIdentification\x12-\n\x04Type\x18\x01 \x01(\x0e\x32\x1f.ClientIdentification.TokenType\x12\'\n\x05Token\x18\x02 \x01(\x0b\x32\x18.SignedDeviceCertificate\x12\x33\n\nClientInfo\x18\x03 \x03(\x0b\x32\x1f.ClientIdentification.NameValue\x12\x1b\n\x13ProviderClientToken\x18\x04 \x01(\x0c\x12\x16\n\x0eLicenseCounter\x18\x05 \x01(\r\x12\x45\n\x13_ClientCapabilities\x18\x06 \x01(\x0b\x32(.ClientIdentification.ClientCapabilities\x1a(\n\tNameValue\x12\x0c\n\x04Name\x18\x01 \x01(\t\x12\r\n\x05Value\x18\x02 \x01(\t\x1a\xa4\x02\n\x12\x43lientCapabilities\x12\x13\n\x0b\x43lientToken\x18\x01 \x01(\r\x12\x14\n\x0cSessionToken\x18\x02 \x01(\r\x12\"\n\x1aVideoResolutionConstraints\x18\x03 \x01(\r\x12L\n\x0eMaxHdcpVersion\x18\x04 \x01(\x0e\x32\x34.ClientIdentification.ClientCapabilities.HdcpVersion\x12\x1b\n\x13OemCryptoApiVersion\x18\x05 \x01(\r\"T\n\x0bHdcpVersion\x12\r\n\tHDCP_NONE\x10\x00\x12\x0b\n\x07HDCP_V1\x10\x01\x12\x0b\n\x07HDCP_V2\x10\x02\x12\r\n\tHDCP_V2_1\x10\x03\x12\r\n\tHDCP_V2_2\x10\x04\"S\n\tTokenType\x12\n\n\x06KEYBOX\x10\x00\x12\x16\n\x12\x44\x45VICE_CERTIFICATE\x10\x01\x12\"\n\x1eREMOTE_ATTESTATION_CERTIFICATE\x10\x02\"\x9b\x02\n\x11\x44\x65viceCertificate\x12\x30\n\x04Type\x18\x01 \x01(\x0e\x32\".DeviceCertificate.CertificateType\x12\x14\n\x0cSerialNumber\x18\x02 \x01(\x0c\x12\x1b\n\x13\x43reationTimeSeconds\x18\x03 \x01(\r\x12\x11\n\tPublicKey\x18\x04 \x01(\x0c\x12\x10\n\x08SystemId\x18\x05 \x01(\r\x12\x1c\n\x14TestDeviceDeprecated\x18\x06 \x01(\r\x12\x11\n\tServiceId\x18\x07 \x01(\x0c\"K\n\x0f\x43\x65rtificateType\x12\x08\n\x04ROOT\x10\x00\x12\x10\n\x0cINTERMEDIATE\x10\x01\x12\x0f\n\x0bUSER_DEVICE\x10\x02\x12\x0b\n\x07SERVICE\x10\x03\"\xc4\x01\n\x17\x44\x65viceCertificateStatus\x12\x14\n\x0cSerialNumber\x18\x01 \x01(\x0c\x12:\n\x06Status\x18\x02 \x01(\x0e\x32*.DeviceCertificateStatus.CertificateStatus\x12*\n\nDeviceInfo\x18\x04 \x01(\x0b\x32\x16.ProvisionedDeviceInfo\"+\n\x11\x43\x65rtificateStatus\x12\t\n\x05VALID\x10\x00\x12\x0b\n\x07REVOKED\x10\x01\"o\n\x1b\x44\x65viceCertificateStatusList\x12\x1b\n\x13\x43reationTimeSeconds\x18\x01 \x01(\r\x12\x33\n\x11\x43\x65rtificateStatus\x18\x02 \x03(\x0b\x32\x18.DeviceCertificateStatus\"\xaf\x01\n\x1d\x45ncryptedClientIdentification\x12\x11\n\tServiceId\x18\x01 \x01(\t\x12&\n\x1eServiceCertificateSerialNumber\x18\x02 \x01(\x0c\x12\x19\n\x11\x45ncryptedClientId\x18\x03 \x01(\x0c\x12\x1b\n\x13\x45ncryptedClientIdIv\x18\x04 \x01(\x0c\x12\x1b\n\x13\x45ncryptedPrivacyKey\x18\x05 \x01(\x0c\"\x9c\x01\n\x15LicenseIdentification\x12\x11\n\tRequestId\x18\x01 \x01(\x0c\x12\x11\n\tSessionId\x18\x02 \x01(\x0c\x12\x12\n\nPurchaseId\x18\x03 \x01(\x0c\x12\x1a\n\x04Type\x18\x04 \x01(\x0e\x32\x0c.LicenseType\x12\x0f\n\x07Version\x18\x05 \x01(\r\x12\x1c\n\x14ProviderSessionToken\x18\x06 \x01(\x0c\"\xfa\x0e\n\x07License\x12\"\n\x02Id\x18\x01 \x01(\x0b\x32\x16.LicenseIdentification\x12 \n\x07_Policy\x18\x02 \x01(\x0b\x32\x0f.License.Policy\x12\"\n\x03Key\x18\x03 \x03(\x0b\x32\x15.License.KeyContainer\x12\x18\n\x10LicenseStartTime\x18\x04 \x01(\r\x12!\n\x19RemoteAttestationVerified\x18\x05 \x01(\r\x12\x1b\n\x13ProviderClientToken\x18\x06 \x01(\x0c\x12\x18\n\x10ProtectionScheme\x18\x07 \x01(\r\x12\x1c\n\x14UnknownHdcpDataField\x18\x08 \x01(\x0c\x1a\xd4\x02\n\x06Policy\x12\x0f\n\x07\x43\x61nPlay\x18\x01 \x01(\r\x12\x12\n\nCanPersist\x18\x02 \x01(\r\x12\x10\n\x08\x43\x61nRenew\x18\x03 \x01(\r\x12\x1d\n\x15RentalDurationSeconds\x18\x04 \x01(\r\x12\x1f\n\x17PlaybackDurationSeconds\x18\x05 \x01(\r\x12\x1e\n\x16LicenseDurationSeconds\x18\x06 \x01(\r\x12&\n\x1eRenewalRecoveryDurationSeconds\x18\x07 \x01(\r\x12\x18\n\x10RenewalServerUrl\x18\x08 \x01(\t\x12\x1b\n\x13RenewalDelaySeconds\x18\t \x01(\r\x12#\n\x1bRenewalRetryIntervalSeconds\x18\n \x01(\r\x12\x16\n\x0eRenewWithUsage\x18\x0b \x01(\r\x12\x17\n\x0fUnknownPolicy12\x18\x0c \x01(\r\x1a\x9b\n\n\x0cKeyContainer\x12\n\n\x02Id\x18\x01 \x01(\x0c\x12\n\n\x02Iv\x18\x02 \x01(\x0c\x12\x0b\n\x03Key\x18\x03 \x01(\x0c\x12+\n\x04Type\x18\x04 \x01(\x0e\x32\x1d.License.KeyContainer.KeyType\x12\x32\n\x05Level\x18\x05 \x01(\x0e\x32#.License.KeyContainer.SecurityLevel\x12\x42\n\x12RequiredProtection\x18\x06 \x01(\x0b\x32&.License.KeyContainer.OutputProtection\x12\x43\n\x13RequestedProtection\x18\x07 \x01(\x0b\x32&.License.KeyContainer.OutputProtection\x12\x35\n\x0b_KeyControl\x18\x08 \x01(\x0b\x32 .License.KeyContainer.KeyControl\x12[\n\x1e_OperatorSessionKeyPermissions\x18\t \x01(\x0b\x32\x33.License.KeyContainer.OperatorSessionKeyPermissions\x12S\n\x1aVideoResolutionConstraints\x18\n \x03(\x0b\x32/.License.KeyContainer.VideoResolutionConstraint\x1a\xdb\x01\n\x10OutputProtection\x12\x42\n\x04Hdcp\x18\x01 \x01(\x0e\x32\x34.ClientIdentification.ClientCapabilities.HdcpVersion\x12>\n\tCgmsFlags\x18\x02 \x01(\x0e\x32+.License.KeyContainer.OutputProtection.CGMS\"C\n\x04\x43GMS\x12\r\n\tCOPY_FREE\x10\x00\x12\r\n\tCOPY_ONCE\x10\x02\x12\x0e\n\nCOPY_NEVER\x10\x03\x12\r\n\tCGMS_NONE\x10*\x1a\x31\n\nKeyControl\x12\x17\n\x0fKeyControlBlock\x18\x01 \x01(\x0c\x12\n\n\x02Iv\x18\x02 \x01(\x0c\x1a|\n\x1dOperatorSessionKeyPermissions\x12\x14\n\x0c\x41llowEncrypt\x18\x01 \x01(\r\x12\x14\n\x0c\x41llowDecrypt\x18\x02 \x01(\r\x12\x11\n\tAllowSign\x18\x03 \x01(\r\x12\x1c\n\x14\x41llowSignatureVerify\x18\x04 \x01(\r\x1a\x99\x01\n\x19VideoResolutionConstraint\x12\x1b\n\x13MinResolutionPixels\x18\x01 \x01(\r\x12\x1b\n\x13MaxResolutionPixels\x18\x02 \x01(\r\x12\x42\n\x12RequiredProtection\x18\x03 \x01(\x0b\x32&.License.KeyContainer.OutputProtection\"Z\n\x07KeyType\x12\x0e\n\n_NOKEYTYPE\x10\x00\x12\x0b\n\x07SIGNING\x10\x01\x12\x0b\n\x07\x43ONTENT\x10\x02\x12\x0f\n\x0bKEY_CONTROL\x10\x03\x12\x14\n\x10OPERATOR_SESSION\x10\x04\"\x8b\x01\n\rSecurityLevel\x12\x0f\n\x0b_NOSECLEVEL\x10\x00\x12\x14\n\x10SW_SECURE_CRYPTO\x10\x01\x12\x14\n\x10SW_SECURE_DECODE\x10\x02\x12\x14\n\x10HW_SECURE_CRYPTO\x10\x03\x12\x14\n\x10HW_SECURE_DECODE\x10\x04\x12\x11\n\rHW_SECURE_ALL\x10\x05\"\xac\x01\n\x0cLicenseError\x12&\n\tErrorCode\x18\x01 \x01(\x0e\x32\x13.LicenseError.Error\"t\n\x05\x45rror\x12\x12\n\x0e\x44UMMY_NO_ERROR\x10\x00\x12\x1e\n\x1aINVALID_DEVICE_CERTIFICATE\x10\x01\x12\x1e\n\x1aREVOKED_DEVICE_CERTIFICATE\x10\x02\x12\x17\n\x13SERVICE_UNAVAILABLE\x10\x03\"\xc0\x07\n\x0eLicenseRequest\x12\'\n\x08\x43lientId\x18\x01 \x01(\x0b\x32\x15.ClientIdentification\x12\x38\n\tContentId\x18\x02 \x01(\x0b\x32%.LicenseRequest.ContentIdentification\x12)\n\x04Type\x18\x03 \x01(\x0e\x32\x1b.LicenseRequest.RequestType\x12\x13\n\x0bRequestTime\x18\x04 \x01(\r\x12!\n\x19KeyControlNonceDeprecated\x18\x05 \x01(\x0c\x12)\n\x0fProtocolVersion\x18\x06 \x01(\x0e\x32\x10.ProtocolVersion\x12\x17\n\x0fKeyControlNonce\x18\x07 \x01(\r\x12\x39\n\x11\x45ncryptedClientId\x18\x08 \x01(\x0b\x32\x1e.EncryptedClientIdentification\x1a\xa2\x04\n\x15\x43ontentIdentification\x12:\n\x06\x43\x65ncId\x18\x01 \x01(\x0b\x32*.LicenseRequest.ContentIdentification.CENC\x12:\n\x06WebmId\x18\x02 \x01(\x0b\x32*.LicenseRequest.ContentIdentification.WebM\x12\x46\n\x07License\x18\x03 \x01(\x0b\x32\x35.LicenseRequest.ContentIdentification.ExistingLicense\x1a_\n\x04\x43\x45NC\x12!\n\x04Pssh\x18\x01 \x01(\x0b\x32\x13.WidevineCencHeader\x12!\n\x0bLicenseType\x18\x02 \x01(\x0e\x32\x0c.LicenseType\x12\x11\n\tRequestId\x18\x03 \x01(\x0c\x1aL\n\x04WebM\x12\x0e\n\x06Header\x18\x01 \x01(\x0c\x12!\n\x0bLicenseType\x18\x02 \x01(\x0e\x32\x0c.LicenseType\x12\x11\n\tRequestId\x18\x03 \x01(\x0c\x1a\x99\x01\n\x0f\x45xistingLicense\x12)\n\tLicenseId\x18\x01 \x01(\x0b\x32\x16.LicenseIdentification\x12\x1b\n\x13SecondsSinceStarted\x18\x02 \x01(\r\x12\x1e\n\x16SecondsSinceLastPlayed\x18\x03 \x01(\r\x12\x1e\n\x16SessionUsageTableEntry\x18\x04 \x01(\x0c\"D\n\x0bRequestType\x12\x12\n\x0e\x44UMMY_REQ_TYPE\x10\x00\x12\x07\n\x03NEW\x10\x01\x12\x0b\n\x07RENEWAL\x10\x02\x12\x0b\n\x07RELEASE\x10\x03\"\xa6\x02\n\x15ProvisionedDeviceInfo\x12\x10\n\x08SystemId\x18\x01 \x01(\r\x12\x0b\n\x03Soc\x18\x02 \x01(\t\x12\x14\n\x0cManufacturer\x18\x03 \x01(\t\x12\r\n\x05Model\x18\x04 \x01(\t\x12\x12\n\nDeviceType\x18\x05 \x01(\t\x12\x11\n\tModelYear\x18\x06 \x01(\r\x12=\n\rSecurityLevel\x18\x07 \x01(\x0e\x32&.ProvisionedDeviceInfo.WvSecurityLevel\x12\x12\n\nTestDevice\x18\x08 \x01(\r\"O\n\x0fWvSecurityLevel\x12\x15\n\x11LEVEL_UNSPECIFIED\x10\x00\x12\x0b\n\x07LEVEL_1\x10\x01\x12\x0b\n\x07LEVEL_2\x10\x02\x12\x0b\n\x07LEVEL_3\x10\x03\"\x15\n\x13ProvisioningOptions\"\x15\n\x13ProvisioningRequest\"\x16\n\x14ProvisioningResponse\"i\n\x11RemoteAttestation\x12\x33\n\x0b\x43\x65rtificate\x18\x01 \x01(\x0b\x32\x1e.EncryptedClientIdentification\x12\x0c\n\x04Salt\x18\x02 \x01(\t\x12\x11\n\tSignature\x18\x03 \x01(\t\"\r\n\x0bSessionInit\"\x0e\n\x0cSessionState\"\x1d\n\x1bSignedCertificateStatusList\"\x86\x01\n\x17SignedDeviceCertificate\x12.\n\x12_DeviceCertificate\x18\x01 \x01(\x0b\x32\x12.DeviceCertificate\x12\x11\n\tSignature\x18\x02 \x01(\x0c\x12(\n\x06Signer\x18\x03 \x01(\x0b\x32\x18.SignedDeviceCertificate\"\x1b\n\x19SignedProvisioningMessage\"\xb0\x02\n\rSignedMessage\x12(\n\x04Type\x18\x01 \x01(\x0e\x32\x1a.SignedMessage.MessageType\x12\x0b\n\x03Msg\x18\x02 \x01(\x0c\x12\x11\n\tSignature\x18\x03 \x01(\x0c\x12\x12\n\nSessionKey\x18\x04 \x01(\x0c\x12-\n\x11RemoteAttestation\x18\x05 \x01(\x0b\x32\x12.RemoteAttestation\"\x91\x01\n\x0bMessageType\x12\x12\n\x0e\x44UMMY_MSG_TYPE\x10\x00\x12\x13\n\x0fLICENSE_REQUEST\x10\x01\x12\x0b\n\x07LICENSE\x10\x02\x12\x12\n\x0e\x45RROR_RESPONSE\x10\x03\x12\x1f\n\x1bSERVICE_CERTIFICATE_REQUEST\x10\x04\x12\x17\n\x13SERVICE_CERTIFICATE\x10\x05\"\xc5\x02\n\x12WidevineCencHeader\x12\x30\n\talgorithm\x18\x01 \x01(\x0e\x32\x1d.WidevineCencHeader.Algorithm\x12\x0e\n\x06key_id\x18\x02 \x03(\x0c\x12\x10\n\x08provider\x18\x03 \x01(\t\x12\x12\n\ncontent_id\x18\x04 \x01(\x0c\x12\x1d\n\x15track_type_deprecated\x18\x05 \x01(\t\x12\x0e\n\x06policy\x18\x06 \x01(\t\x12\x1b\n\x13\x63rypto_period_index\x18\x07 \x01(\r\x12\x17\n\x0fgrouped_license\x18\x08 \x01(\x0c\x12\x19\n\x11protection_scheme\x18\t \x01(\r\x12\x1d\n\x15\x63rypto_period_seconds\x18\n \x01(\r\"(\n\tAlgorithm\x12\x0f\n\x0bUNENCRYPTED\x10\x00\x12\n\n\x06\x41\x45SCTR\x10\x01\"\xcf\x02\n\x14SignedLicenseRequest\x12/\n\x04Type\x18\x01 \x01(\x0e\x32!.SignedLicenseRequest.MessageType\x12\x1c\n\x03Msg\x18\x02 \x01(\x0b\x32\x0f.LicenseRequest\x12\x11\n\tSignature\x18\x03 \x01(\x0c\x12\x12\n\nSessionKey\x18\x04 \x01(\x0c\x12-\n\x11RemoteAttestation\x18\x05 \x01(\x0b\x32\x12.RemoteAttestation\"\x91\x01\n\x0bMessageType\x12\x12\n\x0e\x44UMMY_MSG_TYPE\x10\x00\x12\x13\n\x0fLICENSE_REQUEST\x10\x01\x12\x0b\n\x07LICENSE\x10\x02\x12\x12\n\x0e\x45RROR_RESPONSE\x10\x03\x12\x1f\n\x1bSERVICE_CERTIFICATE_REQUEST\x10\x04\x12\x17\n\x13SERVICE_CERTIFICATE\x10\x05\"\xba\x02\n\rSignedLicense\x12(\n\x04Type\x18\x01 \x01(\x0e\x32\x1a.SignedLicense.MessageType\x12\x15\n\x03Msg\x18\x02 \x01(\x0b\x32\x08.License\x12\x11\n\tSignature\x18\x03 \x01(\x0c\x12\x12\n\nSessionKey\x18\x04 \x01(\x0c\x12-\n\x11RemoteAttestation\x18\x05 \x01(\x0b\x32\x12.RemoteAttestation\"\x91\x01\n\x0bMessageType\x12\x12\n\x0e\x44UMMY_MSG_TYPE\x10\x00\x12\x13\n\x0fLICENSE_REQUEST\x10\x01\x12\x0b\n\x07LICENSE\x10\x02\x12\x12\n\x0e\x45RROR_RESPONSE\x10\x03\x12\x1f\n\x1bSERVICE_CERTIFICATE_REQUEST\x10\x04\x12\x17\n\x13SERVICE_CERTIFICATE\x10\x05*$\n\x0bLicenseType\x12\x08\n\x04ZERO\x10\x00\x12\x0b\n\x07\x44\x45\x46\x41ULT\x10\x01*)\n\x0fProtocolVersion\x12\t\n\x05\x44UMMY\x10\x00\x12\x0b\n\x07\x43URRENT\x10\x15\x62\x06proto3')
+)
+
+_LICENSETYPE = _descriptor.EnumDescriptor(
+ name='LicenseType',
+ full_name='LicenseType',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='ZERO', index=0, number=0,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='DEFAULT', index=1, number=1,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=6713,
+ serialized_end=6749,
+)
+_sym_db.RegisterEnumDescriptor(_LICENSETYPE)
+
+LicenseType = enum_type_wrapper.EnumTypeWrapper(_LICENSETYPE)
+_PROTOCOLVERSION = _descriptor.EnumDescriptor(
+ name='ProtocolVersion',
+ full_name='ProtocolVersion',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='DUMMY', index=0, number=0,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='CURRENT', index=1, number=21,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=6751,
+ serialized_end=6792,
+)
+_sym_db.RegisterEnumDescriptor(_PROTOCOLVERSION)
+
+ProtocolVersion = enum_type_wrapper.EnumTypeWrapper(_PROTOCOLVERSION)
+ZERO = 0
+DEFAULT = 1
+DUMMY = 0
+CURRENT = 21
+
+
+_CLIENTIDENTIFICATION_CLIENTCAPABILITIES_HDCPVERSION = _descriptor.EnumDescriptor(
+ name='HdcpVersion',
+ full_name='ClientIdentification.ClientCapabilities.HdcpVersion',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='HDCP_NONE', index=0, number=0,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='HDCP_V1', index=1, number=1,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='HDCP_V2', index=2, number=2,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='HDCP_V2_1', index=3, number=3,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='HDCP_V2_2', index=4, number=4,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=560,
+ serialized_end=644,
+)
+_sym_db.RegisterEnumDescriptor(_CLIENTIDENTIFICATION_CLIENTCAPABILITIES_HDCPVERSION)
+
+_CLIENTIDENTIFICATION_TOKENTYPE = _descriptor.EnumDescriptor(
+ name='TokenType',
+ full_name='ClientIdentification.TokenType',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='KEYBOX', index=0, number=0,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='DEVICE_CERTIFICATE', index=1, number=1,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='REMOTE_ATTESTATION_CERTIFICATE', index=2, number=2,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=646,
+ serialized_end=729,
+)
+_sym_db.RegisterEnumDescriptor(_CLIENTIDENTIFICATION_TOKENTYPE)
+
+_DEVICECERTIFICATE_CERTIFICATETYPE = _descriptor.EnumDescriptor(
+ name='CertificateType',
+ full_name='DeviceCertificate.CertificateType',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='ROOT', index=0, number=0,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='INTERMEDIATE', index=1, number=1,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='USER_DEVICE', index=2, number=2,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='SERVICE', index=3, number=3,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=940,
+ serialized_end=1015,
+)
+_sym_db.RegisterEnumDescriptor(_DEVICECERTIFICATE_CERTIFICATETYPE)
+
+_DEVICECERTIFICATESTATUS_CERTIFICATESTATUS = _descriptor.EnumDescriptor(
+ name='CertificateStatus',
+ full_name='DeviceCertificateStatus.CertificateStatus',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='VALID', index=0, number=0,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='REVOKED', index=1, number=1,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=1171,
+ serialized_end=1214,
+)
+_sym_db.RegisterEnumDescriptor(_DEVICECERTIFICATESTATUS_CERTIFICATESTATUS)
+
+_LICENSE_KEYCONTAINER_OUTPUTPROTECTION_CGMS = _descriptor.EnumDescriptor(
+ name='CGMS',
+ full_name='License.KeyContainer.OutputProtection.CGMS',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='COPY_FREE', index=0, number=0,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='COPY_ONCE', index=1, number=2,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='COPY_NEVER', index=2, number=3,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='CGMS_NONE', index=3, number=42,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=2947,
+ serialized_end=3014,
+)
+_sym_db.RegisterEnumDescriptor(_LICENSE_KEYCONTAINER_OUTPUTPROTECTION_CGMS)
+
+_LICENSE_KEYCONTAINER_KEYTYPE = _descriptor.EnumDescriptor(
+ name='KeyType',
+ full_name='License.KeyContainer.KeyType',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='_NOKEYTYPE', index=0, number=0,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='SIGNING', index=1, number=1,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='CONTENT', index=2, number=2,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='KEY_CONTROL', index=3, number=3,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='OPERATOR_SESSION', index=4, number=4,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=3349,
+ serialized_end=3439,
+)
+_sym_db.RegisterEnumDescriptor(_LICENSE_KEYCONTAINER_KEYTYPE)
+
+_LICENSE_KEYCONTAINER_SECURITYLEVEL = _descriptor.EnumDescriptor(
+ name='SecurityLevel',
+ full_name='License.KeyContainer.SecurityLevel',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='_NOSECLEVEL', index=0, number=0,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='SW_SECURE_CRYPTO', index=1, number=1,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='SW_SECURE_DECODE', index=2, number=2,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='HW_SECURE_CRYPTO', index=3, number=3,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='HW_SECURE_DECODE', index=4, number=4,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='HW_SECURE_ALL', index=5, number=5,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=3442,
+ serialized_end=3581,
+)
+_sym_db.RegisterEnumDescriptor(_LICENSE_KEYCONTAINER_SECURITYLEVEL)
+
+_LICENSEERROR_ERROR = _descriptor.EnumDescriptor(
+ name='Error',
+ full_name='LicenseError.Error',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='DUMMY_NO_ERROR', index=0, number=0,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='INVALID_DEVICE_CERTIFICATE', index=1, number=1,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='REVOKED_DEVICE_CERTIFICATE', index=2, number=2,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='SERVICE_UNAVAILABLE', index=3, number=3,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=3640,
+ serialized_end=3756,
+)
+_sym_db.RegisterEnumDescriptor(_LICENSEERROR_ERROR)
+
+_LICENSEREQUEST_REQUESTTYPE = _descriptor.EnumDescriptor(
+ name='RequestType',
+ full_name='LicenseRequest.RequestType',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='DUMMY_REQ_TYPE', index=0, number=0,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='NEW', index=1, number=1,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='RENEWAL', index=2, number=2,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='RELEASE', index=3, number=3,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=4651,
+ serialized_end=4719,
+)
+_sym_db.RegisterEnumDescriptor(_LICENSEREQUEST_REQUESTTYPE)
+
+_PROVISIONEDDEVICEINFO_WVSECURITYLEVEL = _descriptor.EnumDescriptor(
+ name='WvSecurityLevel',
+ full_name='ProvisionedDeviceInfo.WvSecurityLevel',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='LEVEL_UNSPECIFIED', index=0, number=0,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='LEVEL_1', index=1, number=1,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='LEVEL_2', index=2, number=2,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='LEVEL_3', index=3, number=3,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=4937,
+ serialized_end=5016,
+)
+_sym_db.RegisterEnumDescriptor(_PROVISIONEDDEVICEINFO_WVSECURITYLEVEL)
+
+_SIGNEDMESSAGE_MESSAGETYPE = _descriptor.EnumDescriptor(
+ name='MessageType',
+ full_name='SignedMessage.MessageType',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='DUMMY_MSG_TYPE', index=0, number=0,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='LICENSE_REQUEST', index=1, number=1,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='LICENSE', index=2, number=2,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='ERROR_RESPONSE', index=3, number=3,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='SERVICE_CERTIFICATE_REQUEST', index=4, number=4,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='SERVICE_CERTIFICATE', index=5, number=5,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=5583,
+ serialized_end=5728,
+)
+_sym_db.RegisterEnumDescriptor(_SIGNEDMESSAGE_MESSAGETYPE)
+
+_WIDEVINECENCHEADER_ALGORITHM = _descriptor.EnumDescriptor(
+ name='Algorithm',
+ full_name='WidevineCencHeader.Algorithm',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='UNENCRYPTED', index=0, number=0,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='AESCTR', index=1, number=1,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=6016,
+ serialized_end=6056,
+)
+_sym_db.RegisterEnumDescriptor(_WIDEVINECENCHEADER_ALGORITHM)
+
+_SIGNEDLICENSEREQUEST_MESSAGETYPE = _descriptor.EnumDescriptor(
+ name='MessageType',
+ full_name='SignedLicenseRequest.MessageType',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='DUMMY_MSG_TYPE', index=0, number=0,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='LICENSE_REQUEST', index=1, number=1,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='LICENSE', index=2, number=2,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='ERROR_RESPONSE', index=3, number=3,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='SERVICE_CERTIFICATE_REQUEST', index=4, number=4,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='SERVICE_CERTIFICATE', index=5, number=5,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=5583,
+ serialized_end=5728,
+)
+_sym_db.RegisterEnumDescriptor(_SIGNEDLICENSEREQUEST_MESSAGETYPE)
+
+_SIGNEDLICENSE_MESSAGETYPE = _descriptor.EnumDescriptor(
+ name='MessageType',
+ full_name='SignedLicense.MessageType',
+ filename=None,
+ file=DESCRIPTOR,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='DUMMY_MSG_TYPE', index=0, number=0,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='LICENSE_REQUEST', index=1, number=1,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='LICENSE', index=2, number=2,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='ERROR_RESPONSE', index=3, number=3,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='SERVICE_CERTIFICATE_REQUEST', index=4, number=4,
+ options=None,
+ type=None),
+ _descriptor.EnumValueDescriptor(
+ name='SERVICE_CERTIFICATE', index=5, number=5,
+ options=None,
+ type=None),
+ ],
+ containing_type=None,
+ options=None,
+ serialized_start=5583,
+ serialized_end=5728,
+)
+_sym_db.RegisterEnumDescriptor(_SIGNEDLICENSE_MESSAGETYPE)
+
+
+_CLIENTIDENTIFICATION_NAMEVALUE = _descriptor.Descriptor(
+ name='NameValue',
+ full_name='ClientIdentification.NameValue',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Name', full_name='ClientIdentification.NameValue.Name', index=0,
+ number=1, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b("").decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Value', full_name='ClientIdentification.NameValue.Value', index=1,
+ number=2, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b("").decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=309,
+ serialized_end=349,
+)
+
+_CLIENTIDENTIFICATION_CLIENTCAPABILITIES = _descriptor.Descriptor(
+ name='ClientCapabilities',
+ full_name='ClientIdentification.ClientCapabilities',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='ClientToken', full_name='ClientIdentification.ClientCapabilities.ClientToken', index=0,
+ number=1, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SessionToken', full_name='ClientIdentification.ClientCapabilities.SessionToken', index=1,
+ number=2, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='VideoResolutionConstraints', full_name='ClientIdentification.ClientCapabilities.VideoResolutionConstraints', index=2,
+ number=3, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='MaxHdcpVersion', full_name='ClientIdentification.ClientCapabilities.MaxHdcpVersion', index=3,
+ number=4, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='OemCryptoApiVersion', full_name='ClientIdentification.ClientCapabilities.OemCryptoApiVersion', index=4,
+ number=5, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ _CLIENTIDENTIFICATION_CLIENTCAPABILITIES_HDCPVERSION,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=352,
+ serialized_end=644,
+)
+
+_CLIENTIDENTIFICATION = _descriptor.Descriptor(
+ name='ClientIdentification',
+ full_name='ClientIdentification',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Type', full_name='ClientIdentification.Type', index=0,
+ number=1, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Token', full_name='ClientIdentification.Token', index=1,
+ number=2, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='ClientInfo', full_name='ClientIdentification.ClientInfo', index=2,
+ number=3, type=11, cpp_type=10, label=3,
+ has_default_value=False, default_value=[],
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='ProviderClientToken', full_name='ClientIdentification.ProviderClientToken', index=3,
+ number=4, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='LicenseCounter', full_name='ClientIdentification.LicenseCounter', index=4,
+ number=5, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='_ClientCapabilities', full_name='ClientIdentification._ClientCapabilities', index=5,
+ number=6, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[_CLIENTIDENTIFICATION_NAMEVALUE, _CLIENTIDENTIFICATION_CLIENTCAPABILITIES, ],
+ enum_types=[
+ _CLIENTIDENTIFICATION_TOKENTYPE,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=20,
+ serialized_end=729,
+)
+
+
+_DEVICECERTIFICATE = _descriptor.Descriptor(
+ name='DeviceCertificate',
+ full_name='DeviceCertificate',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Type', full_name='DeviceCertificate.Type', index=0,
+ number=1, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SerialNumber', full_name='DeviceCertificate.SerialNumber', index=1,
+ number=2, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='CreationTimeSeconds', full_name='DeviceCertificate.CreationTimeSeconds', index=2,
+ number=3, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='PublicKey', full_name='DeviceCertificate.PublicKey', index=3,
+ number=4, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SystemId', full_name='DeviceCertificate.SystemId', index=4,
+ number=5, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='TestDeviceDeprecated', full_name='DeviceCertificate.TestDeviceDeprecated', index=5,
+ number=6, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='ServiceId', full_name='DeviceCertificate.ServiceId', index=6,
+ number=7, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ _DEVICECERTIFICATE_CERTIFICATETYPE,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=732,
+ serialized_end=1015,
+)
+
+
+_DEVICECERTIFICATESTATUS = _descriptor.Descriptor(
+ name='DeviceCertificateStatus',
+ full_name='DeviceCertificateStatus',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='SerialNumber', full_name='DeviceCertificateStatus.SerialNumber', index=0,
+ number=1, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Status', full_name='DeviceCertificateStatus.Status', index=1,
+ number=2, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='DeviceInfo', full_name='DeviceCertificateStatus.DeviceInfo', index=2,
+ number=4, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ _DEVICECERTIFICATESTATUS_CERTIFICATESTATUS,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=1018,
+ serialized_end=1214,
+)
+
+
+_DEVICECERTIFICATESTATUSLIST = _descriptor.Descriptor(
+ name='DeviceCertificateStatusList',
+ full_name='DeviceCertificateStatusList',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='CreationTimeSeconds', full_name='DeviceCertificateStatusList.CreationTimeSeconds', index=0,
+ number=1, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='CertificateStatus', full_name='DeviceCertificateStatusList.CertificateStatus', index=1,
+ number=2, type=11, cpp_type=10, label=3,
+ has_default_value=False, default_value=[],
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=1216,
+ serialized_end=1327,
+)
+
+
+_ENCRYPTEDCLIENTIDENTIFICATION = _descriptor.Descriptor(
+ name='EncryptedClientIdentification',
+ full_name='EncryptedClientIdentification',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='ServiceId', full_name='EncryptedClientIdentification.ServiceId', index=0,
+ number=1, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b("").decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='ServiceCertificateSerialNumber', full_name='EncryptedClientIdentification.ServiceCertificateSerialNumber', index=1,
+ number=2, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='EncryptedClientId', full_name='EncryptedClientIdentification.EncryptedClientId', index=2,
+ number=3, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='EncryptedClientIdIv', full_name='EncryptedClientIdentification.EncryptedClientIdIv', index=3,
+ number=4, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='EncryptedPrivacyKey', full_name='EncryptedClientIdentification.EncryptedPrivacyKey', index=4,
+ number=5, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=1330,
+ serialized_end=1505,
+)
+
+
+_LICENSEIDENTIFICATION = _descriptor.Descriptor(
+ name='LicenseIdentification',
+ full_name='LicenseIdentification',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='RequestId', full_name='LicenseIdentification.RequestId', index=0,
+ number=1, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SessionId', full_name='LicenseIdentification.SessionId', index=1,
+ number=2, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='PurchaseId', full_name='LicenseIdentification.PurchaseId', index=2,
+ number=3, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Type', full_name='LicenseIdentification.Type', index=3,
+ number=4, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Version', full_name='LicenseIdentification.Version', index=4,
+ number=5, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='ProviderSessionToken', full_name='LicenseIdentification.ProviderSessionToken', index=5,
+ number=6, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=1508,
+ serialized_end=1664,
+)
+
+
+_LICENSE_POLICY = _descriptor.Descriptor(
+ name='Policy',
+ full_name='License.Policy',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='CanPlay', full_name='License.Policy.CanPlay', index=0,
+ number=1, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='CanPersist', full_name='License.Policy.CanPersist', index=1,
+ number=2, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='CanRenew', full_name='License.Policy.CanRenew', index=2,
+ number=3, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RentalDurationSeconds', full_name='License.Policy.RentalDurationSeconds', index=3,
+ number=4, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='PlaybackDurationSeconds', full_name='License.Policy.PlaybackDurationSeconds', index=4,
+ number=5, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='LicenseDurationSeconds', full_name='License.Policy.LicenseDurationSeconds', index=5,
+ number=6, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RenewalRecoveryDurationSeconds', full_name='License.Policy.RenewalRecoveryDurationSeconds', index=6,
+ number=7, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RenewalServerUrl', full_name='License.Policy.RenewalServerUrl', index=7,
+ number=8, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b("").decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RenewalDelaySeconds', full_name='License.Policy.RenewalDelaySeconds', index=8,
+ number=9, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RenewalRetryIntervalSeconds', full_name='License.Policy.RenewalRetryIntervalSeconds', index=9,
+ number=10, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RenewWithUsage', full_name='License.Policy.RenewWithUsage', index=10,
+ number=11, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='UnknownPolicy12', full_name='License.Policy.UnknownPolicy12', index=11,
+ number=12, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=1931,
+ serialized_end=2271,
+)
+
+_LICENSE_KEYCONTAINER_OUTPUTPROTECTION = _descriptor.Descriptor(
+ name='OutputProtection',
+ full_name='License.KeyContainer.OutputProtection',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Hdcp', full_name='License.KeyContainer.OutputProtection.Hdcp', index=0,
+ number=1, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='CgmsFlags', full_name='License.KeyContainer.OutputProtection.CgmsFlags', index=1,
+ number=2, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ _LICENSE_KEYCONTAINER_OUTPUTPROTECTION_CGMS,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=2795,
+ serialized_end=3014,
+)
+
+_LICENSE_KEYCONTAINER_KEYCONTROL = _descriptor.Descriptor(
+ name='KeyControl',
+ full_name='License.KeyContainer.KeyControl',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='KeyControlBlock', full_name='License.KeyContainer.KeyControl.KeyControlBlock', index=0,
+ number=1, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Iv', full_name='License.KeyContainer.KeyControl.Iv', index=1,
+ number=2, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=3016,
+ serialized_end=3065,
+)
+
+_LICENSE_KEYCONTAINER_OPERATORSESSIONKEYPERMISSIONS = _descriptor.Descriptor(
+ name='OperatorSessionKeyPermissions',
+ full_name='License.KeyContainer.OperatorSessionKeyPermissions',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='AllowEncrypt', full_name='License.KeyContainer.OperatorSessionKeyPermissions.AllowEncrypt', index=0,
+ number=1, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='AllowDecrypt', full_name='License.KeyContainer.OperatorSessionKeyPermissions.AllowDecrypt', index=1,
+ number=2, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='AllowSign', full_name='License.KeyContainer.OperatorSessionKeyPermissions.AllowSign', index=2,
+ number=3, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='AllowSignatureVerify', full_name='License.KeyContainer.OperatorSessionKeyPermissions.AllowSignatureVerify', index=3,
+ number=4, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=3067,
+ serialized_end=3191,
+)
+
+_LICENSE_KEYCONTAINER_VIDEORESOLUTIONCONSTRAINT = _descriptor.Descriptor(
+ name='VideoResolutionConstraint',
+ full_name='License.KeyContainer.VideoResolutionConstraint',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='MinResolutionPixels', full_name='License.KeyContainer.VideoResolutionConstraint.MinResolutionPixels', index=0,
+ number=1, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='MaxResolutionPixels', full_name='License.KeyContainer.VideoResolutionConstraint.MaxResolutionPixels', index=1,
+ number=2, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RequiredProtection', full_name='License.KeyContainer.VideoResolutionConstraint.RequiredProtection', index=2,
+ number=3, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=3194,
+ serialized_end=3347,
+)
+
+_LICENSE_KEYCONTAINER = _descriptor.Descriptor(
+ name='KeyContainer',
+ full_name='License.KeyContainer',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Id', full_name='License.KeyContainer.Id', index=0,
+ number=1, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Iv', full_name='License.KeyContainer.Iv', index=1,
+ number=2, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Key', full_name='License.KeyContainer.Key', index=2,
+ number=3, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Type', full_name='License.KeyContainer.Type', index=3,
+ number=4, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Level', full_name='License.KeyContainer.Level', index=4,
+ number=5, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RequiredProtection', full_name='License.KeyContainer.RequiredProtection', index=5,
+ number=6, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RequestedProtection', full_name='License.KeyContainer.RequestedProtection', index=6,
+ number=7, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='_KeyControl', full_name='License.KeyContainer._KeyControl', index=7,
+ number=8, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='_OperatorSessionKeyPermissions', full_name='License.KeyContainer._OperatorSessionKeyPermissions', index=8,
+ number=9, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='VideoResolutionConstraints', full_name='License.KeyContainer.VideoResolutionConstraints', index=9,
+ number=10, type=11, cpp_type=10, label=3,
+ has_default_value=False, default_value=[],
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[_LICENSE_KEYCONTAINER_OUTPUTPROTECTION, _LICENSE_KEYCONTAINER_KEYCONTROL, _LICENSE_KEYCONTAINER_OPERATORSESSIONKEYPERMISSIONS, _LICENSE_KEYCONTAINER_VIDEORESOLUTIONCONSTRAINT, ],
+ enum_types=[
+ _LICENSE_KEYCONTAINER_KEYTYPE,
+ _LICENSE_KEYCONTAINER_SECURITYLEVEL,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=2274,
+ serialized_end=3581,
+)
+
+_LICENSE = _descriptor.Descriptor(
+ name='License',
+ full_name='License',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Id', full_name='License.Id', index=0,
+ number=1, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='_Policy', full_name='License._Policy', index=1,
+ number=2, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Key', full_name='License.Key', index=2,
+ number=3, type=11, cpp_type=10, label=3,
+ has_default_value=False, default_value=[],
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='LicenseStartTime', full_name='License.LicenseStartTime', index=3,
+ number=4, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RemoteAttestationVerified', full_name='License.RemoteAttestationVerified', index=4,
+ number=5, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='ProviderClientToken', full_name='License.ProviderClientToken', index=5,
+ number=6, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='ProtectionScheme', full_name='License.ProtectionScheme', index=6,
+ number=7, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='UnknownHdcpDataField', full_name='License.UnknownHdcpDataField', index=7,
+ number=8, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[_LICENSE_POLICY, _LICENSE_KEYCONTAINER, ],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=1667,
+ serialized_end=3581,
+)
+
+
+_LICENSEERROR = _descriptor.Descriptor(
+ name='LicenseError',
+ full_name='LicenseError',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='ErrorCode', full_name='LicenseError.ErrorCode', index=0,
+ number=1, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ _LICENSEERROR_ERROR,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=3584,
+ serialized_end=3756,
+)
+
+
+_LICENSEREQUEST_CONTENTIDENTIFICATION_CENC = _descriptor.Descriptor(
+ name='CENC',
+ full_name='LicenseRequest.ContentIdentification.CENC',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Pssh', full_name='LicenseRequest.ContentIdentification.CENC.Pssh', index=0,
+ number=1, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='LicenseType', full_name='LicenseRequest.ContentIdentification.CENC.LicenseType', index=1,
+ number=2, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RequestId', full_name='LicenseRequest.ContentIdentification.CENC.RequestId', index=2,
+ number=3, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=4320,
+ serialized_end=4415,
+)
+
+_LICENSEREQUEST_CONTENTIDENTIFICATION_WEBM = _descriptor.Descriptor(
+ name='WebM',
+ full_name='LicenseRequest.ContentIdentification.WebM',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Header', full_name='LicenseRequest.ContentIdentification.WebM.Header', index=0,
+ number=1, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='LicenseType', full_name='LicenseRequest.ContentIdentification.WebM.LicenseType', index=1,
+ number=2, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RequestId', full_name='LicenseRequest.ContentIdentification.WebM.RequestId', index=2,
+ number=3, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=4417,
+ serialized_end=4493,
+)
+
+_LICENSEREQUEST_CONTENTIDENTIFICATION_EXISTINGLICENSE = _descriptor.Descriptor(
+ name='ExistingLicense',
+ full_name='LicenseRequest.ContentIdentification.ExistingLicense',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='LicenseId', full_name='LicenseRequest.ContentIdentification.ExistingLicense.LicenseId', index=0,
+ number=1, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SecondsSinceStarted', full_name='LicenseRequest.ContentIdentification.ExistingLicense.SecondsSinceStarted', index=1,
+ number=2, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SecondsSinceLastPlayed', full_name='LicenseRequest.ContentIdentification.ExistingLicense.SecondsSinceLastPlayed', index=2,
+ number=3, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SessionUsageTableEntry', full_name='LicenseRequest.ContentIdentification.ExistingLicense.SessionUsageTableEntry', index=3,
+ number=4, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=4496,
+ serialized_end=4649,
+)
+
+_LICENSEREQUEST_CONTENTIDENTIFICATION = _descriptor.Descriptor(
+ name='ContentIdentification',
+ full_name='LicenseRequest.ContentIdentification',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='CencId', full_name='LicenseRequest.ContentIdentification.CencId', index=0,
+ number=1, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='WebmId', full_name='LicenseRequest.ContentIdentification.WebmId', index=1,
+ number=2, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='License', full_name='LicenseRequest.ContentIdentification.License', index=2,
+ number=3, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[_LICENSEREQUEST_CONTENTIDENTIFICATION_CENC, _LICENSEREQUEST_CONTENTIDENTIFICATION_WEBM, _LICENSEREQUEST_CONTENTIDENTIFICATION_EXISTINGLICENSE, ],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=4103,
+ serialized_end=4649,
+)
+
+_LICENSEREQUEST = _descriptor.Descriptor(
+ name='LicenseRequest',
+ full_name='LicenseRequest',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='ClientId', full_name='LicenseRequest.ClientId', index=0,
+ number=1, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='ContentId', full_name='LicenseRequest.ContentId', index=1,
+ number=2, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Type', full_name='LicenseRequest.Type', index=2,
+ number=3, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RequestTime', full_name='LicenseRequest.RequestTime', index=3,
+ number=4, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='KeyControlNonceDeprecated', full_name='LicenseRequest.KeyControlNonceDeprecated', index=4,
+ number=5, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='ProtocolVersion', full_name='LicenseRequest.ProtocolVersion', index=5,
+ number=6, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='KeyControlNonce', full_name='LicenseRequest.KeyControlNonce', index=6,
+ number=7, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='EncryptedClientId', full_name='LicenseRequest.EncryptedClientId', index=7,
+ number=8, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[_LICENSEREQUEST_CONTENTIDENTIFICATION, ],
+ enum_types=[
+ _LICENSEREQUEST_REQUESTTYPE,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=3759,
+ serialized_end=4719,
+)
+
+
+_PROVISIONEDDEVICEINFO = _descriptor.Descriptor(
+ name='ProvisionedDeviceInfo',
+ full_name='ProvisionedDeviceInfo',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='SystemId', full_name='ProvisionedDeviceInfo.SystemId', index=0,
+ number=1, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Soc', full_name='ProvisionedDeviceInfo.Soc', index=1,
+ number=2, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b("").decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Manufacturer', full_name='ProvisionedDeviceInfo.Manufacturer', index=2,
+ number=3, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b("").decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Model', full_name='ProvisionedDeviceInfo.Model', index=3,
+ number=4, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b("").decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='DeviceType', full_name='ProvisionedDeviceInfo.DeviceType', index=4,
+ number=5, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b("").decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='ModelYear', full_name='ProvisionedDeviceInfo.ModelYear', index=5,
+ number=6, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SecurityLevel', full_name='ProvisionedDeviceInfo.SecurityLevel', index=6,
+ number=7, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='TestDevice', full_name='ProvisionedDeviceInfo.TestDevice', index=7,
+ number=8, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ _PROVISIONEDDEVICEINFO_WVSECURITYLEVEL,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=4722,
+ serialized_end=5016,
+)
+
+
+_PROVISIONINGOPTIONS = _descriptor.Descriptor(
+ name='ProvisioningOptions',
+ full_name='ProvisioningOptions',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=5018,
+ serialized_end=5039,
+)
+
+
+_PROVISIONINGREQUEST = _descriptor.Descriptor(
+ name='ProvisioningRequest',
+ full_name='ProvisioningRequest',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=5041,
+ serialized_end=5062,
+)
+
+
+_PROVISIONINGRESPONSE = _descriptor.Descriptor(
+ name='ProvisioningResponse',
+ full_name='ProvisioningResponse',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=5064,
+ serialized_end=5086,
+)
+
+
+_REMOTEATTESTATION = _descriptor.Descriptor(
+ name='RemoteAttestation',
+ full_name='RemoteAttestation',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Certificate', full_name='RemoteAttestation.Certificate', index=0,
+ number=1, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Salt', full_name='RemoteAttestation.Salt', index=1,
+ number=2, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b("").decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Signature', full_name='RemoteAttestation.Signature', index=2,
+ number=3, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b("").decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=5088,
+ serialized_end=5193,
+)
+
+
+_SESSIONINIT = _descriptor.Descriptor(
+ name='SessionInit',
+ full_name='SessionInit',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=5195,
+ serialized_end=5208,
+)
+
+
+_SESSIONSTATE = _descriptor.Descriptor(
+ name='SessionState',
+ full_name='SessionState',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=5210,
+ serialized_end=5224,
+)
+
+
+_SIGNEDCERTIFICATESTATUSLIST = _descriptor.Descriptor(
+ name='SignedCertificateStatusList',
+ full_name='SignedCertificateStatusList',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=5226,
+ serialized_end=5255,
+)
+
+
+_SIGNEDDEVICECERTIFICATE = _descriptor.Descriptor(
+ name='SignedDeviceCertificate',
+ full_name='SignedDeviceCertificate',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='_DeviceCertificate', full_name='SignedDeviceCertificate._DeviceCertificate', index=0,
+ number=1, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Signature', full_name='SignedDeviceCertificate.Signature', index=1,
+ number=2, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Signer', full_name='SignedDeviceCertificate.Signer', index=2,
+ number=3, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=5258,
+ serialized_end=5392,
+)
+
+
+_SIGNEDPROVISIONINGMESSAGE = _descriptor.Descriptor(
+ name='SignedProvisioningMessage',
+ full_name='SignedProvisioningMessage',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=5394,
+ serialized_end=5421,
+)
+
+
+_SIGNEDMESSAGE = _descriptor.Descriptor(
+ name='SignedMessage',
+ full_name='SignedMessage',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Type', full_name='SignedMessage.Type', index=0,
+ number=1, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Msg', full_name='SignedMessage.Msg', index=1,
+ number=2, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Signature', full_name='SignedMessage.Signature', index=2,
+ number=3, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SessionKey', full_name='SignedMessage.SessionKey', index=3,
+ number=4, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RemoteAttestation', full_name='SignedMessage.RemoteAttestation', index=4,
+ number=5, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ _SIGNEDMESSAGE_MESSAGETYPE,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=5424,
+ serialized_end=5728,
+)
+
+
+_WIDEVINECENCHEADER = _descriptor.Descriptor(
+ name='WidevineCencHeader',
+ full_name='WidevineCencHeader',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='algorithm', full_name='WidevineCencHeader.algorithm', index=0,
+ number=1, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='key_id', full_name='WidevineCencHeader.key_id', index=1,
+ number=2, type=12, cpp_type=9, label=3,
+ has_default_value=False, default_value=[],
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='provider', full_name='WidevineCencHeader.provider', index=2,
+ number=3, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b("").decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='content_id', full_name='WidevineCencHeader.content_id', index=3,
+ number=4, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='track_type_deprecated', full_name='WidevineCencHeader.track_type_deprecated', index=4,
+ number=5, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b("").decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='policy', full_name='WidevineCencHeader.policy', index=5,
+ number=6, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b("").decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='crypto_period_index', full_name='WidevineCencHeader.crypto_period_index', index=6,
+ number=7, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='grouped_license', full_name='WidevineCencHeader.grouped_license', index=7,
+ number=8, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='protection_scheme', full_name='WidevineCencHeader.protection_scheme', index=8,
+ number=9, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='crypto_period_seconds', full_name='WidevineCencHeader.crypto_period_seconds', index=9,
+ number=10, type=13, cpp_type=3, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ _WIDEVINECENCHEADER_ALGORITHM,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=5731,
+ serialized_end=6056,
+)
+
+
+_SIGNEDLICENSEREQUEST = _descriptor.Descriptor(
+ name='SignedLicenseRequest',
+ full_name='SignedLicenseRequest',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Type', full_name='SignedLicenseRequest.Type', index=0,
+ number=1, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Msg', full_name='SignedLicenseRequest.Msg', index=1,
+ number=2, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Signature', full_name='SignedLicenseRequest.Signature', index=2,
+ number=3, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SessionKey', full_name='SignedLicenseRequest.SessionKey', index=3,
+ number=4, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RemoteAttestation', full_name='SignedLicenseRequest.RemoteAttestation', index=4,
+ number=5, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ _SIGNEDLICENSEREQUEST_MESSAGETYPE,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=6059,
+ serialized_end=6394,
+)
+
+
+_SIGNEDLICENSE = _descriptor.Descriptor(
+ name='SignedLicense',
+ full_name='SignedLicense',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='Type', full_name='SignedLicense.Type', index=0,
+ number=1, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Msg', full_name='SignedLicense.Msg', index=1,
+ number=2, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='Signature', full_name='SignedLicense.Signature', index=2,
+ number=3, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='SessionKey', full_name='SignedLicense.SessionKey', index=3,
+ number=4, type=12, cpp_type=9, label=1,
+ has_default_value=False, default_value=_b(""),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ _descriptor.FieldDescriptor(
+ name='RemoteAttestation', full_name='SignedLicense.RemoteAttestation', index=4,
+ number=5, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ options=None),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ _SIGNEDLICENSE_MESSAGETYPE,
+ ],
+ options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=6397,
+ serialized_end=6711,
+)
+
+_CLIENTIDENTIFICATION_NAMEVALUE.containing_type = _CLIENTIDENTIFICATION
+_CLIENTIDENTIFICATION_CLIENTCAPABILITIES.fields_by_name['MaxHdcpVersion'].enum_type = _CLIENTIDENTIFICATION_CLIENTCAPABILITIES_HDCPVERSION
+_CLIENTIDENTIFICATION_CLIENTCAPABILITIES.containing_type = _CLIENTIDENTIFICATION
+_CLIENTIDENTIFICATION_CLIENTCAPABILITIES_HDCPVERSION.containing_type = _CLIENTIDENTIFICATION_CLIENTCAPABILITIES
+_CLIENTIDENTIFICATION.fields_by_name['Type'].enum_type = _CLIENTIDENTIFICATION_TOKENTYPE
+_CLIENTIDENTIFICATION.fields_by_name['Token'].message_type = _SIGNEDDEVICECERTIFICATE
+_CLIENTIDENTIFICATION.fields_by_name['ClientInfo'].message_type = _CLIENTIDENTIFICATION_NAMEVALUE
+_CLIENTIDENTIFICATION.fields_by_name['_ClientCapabilities'].message_type = _CLIENTIDENTIFICATION_CLIENTCAPABILITIES
+_CLIENTIDENTIFICATION_TOKENTYPE.containing_type = _CLIENTIDENTIFICATION
+_DEVICECERTIFICATE.fields_by_name['Type'].enum_type = _DEVICECERTIFICATE_CERTIFICATETYPE
+_DEVICECERTIFICATE_CERTIFICATETYPE.containing_type = _DEVICECERTIFICATE
+_DEVICECERTIFICATESTATUS.fields_by_name['Status'].enum_type = _DEVICECERTIFICATESTATUS_CERTIFICATESTATUS
+_DEVICECERTIFICATESTATUS.fields_by_name['DeviceInfo'].message_type = _PROVISIONEDDEVICEINFO
+_DEVICECERTIFICATESTATUS_CERTIFICATESTATUS.containing_type = _DEVICECERTIFICATESTATUS
+_DEVICECERTIFICATESTATUSLIST.fields_by_name['CertificateStatus'].message_type = _DEVICECERTIFICATESTATUS
+_LICENSEIDENTIFICATION.fields_by_name['Type'].enum_type = _LICENSETYPE
+_LICENSE_POLICY.containing_type = _LICENSE
+_LICENSE_KEYCONTAINER_OUTPUTPROTECTION.fields_by_name['Hdcp'].enum_type = _CLIENTIDENTIFICATION_CLIENTCAPABILITIES_HDCPVERSION
+_LICENSE_KEYCONTAINER_OUTPUTPROTECTION.fields_by_name['CgmsFlags'].enum_type = _LICENSE_KEYCONTAINER_OUTPUTPROTECTION_CGMS
+_LICENSE_KEYCONTAINER_OUTPUTPROTECTION.containing_type = _LICENSE_KEYCONTAINER
+_LICENSE_KEYCONTAINER_OUTPUTPROTECTION_CGMS.containing_type = _LICENSE_KEYCONTAINER_OUTPUTPROTECTION
+_LICENSE_KEYCONTAINER_KEYCONTROL.containing_type = _LICENSE_KEYCONTAINER
+_LICENSE_KEYCONTAINER_OPERATORSESSIONKEYPERMISSIONS.containing_type = _LICENSE_KEYCONTAINER
+_LICENSE_KEYCONTAINER_VIDEORESOLUTIONCONSTRAINT.fields_by_name['RequiredProtection'].message_type = _LICENSE_KEYCONTAINER_OUTPUTPROTECTION
+_LICENSE_KEYCONTAINER_VIDEORESOLUTIONCONSTRAINT.containing_type = _LICENSE_KEYCONTAINER
+_LICENSE_KEYCONTAINER.fields_by_name['Type'].enum_type = _LICENSE_KEYCONTAINER_KEYTYPE
+_LICENSE_KEYCONTAINER.fields_by_name['Level'].enum_type = _LICENSE_KEYCONTAINER_SECURITYLEVEL
+_LICENSE_KEYCONTAINER.fields_by_name['RequiredProtection'].message_type = _LICENSE_KEYCONTAINER_OUTPUTPROTECTION
+_LICENSE_KEYCONTAINER.fields_by_name['RequestedProtection'].message_type = _LICENSE_KEYCONTAINER_OUTPUTPROTECTION
+_LICENSE_KEYCONTAINER.fields_by_name['_KeyControl'].message_type = _LICENSE_KEYCONTAINER_KEYCONTROL
+_LICENSE_KEYCONTAINER.fields_by_name['_OperatorSessionKeyPermissions'].message_type = _LICENSE_KEYCONTAINER_OPERATORSESSIONKEYPERMISSIONS
+_LICENSE_KEYCONTAINER.fields_by_name['VideoResolutionConstraints'].message_type = _LICENSE_KEYCONTAINER_VIDEORESOLUTIONCONSTRAINT
+_LICENSE_KEYCONTAINER.containing_type = _LICENSE
+_LICENSE_KEYCONTAINER_KEYTYPE.containing_type = _LICENSE_KEYCONTAINER
+_LICENSE_KEYCONTAINER_SECURITYLEVEL.containing_type = _LICENSE_KEYCONTAINER
+_LICENSE.fields_by_name['Id'].message_type = _LICENSEIDENTIFICATION
+_LICENSE.fields_by_name['_Policy'].message_type = _LICENSE_POLICY
+_LICENSE.fields_by_name['Key'].message_type = _LICENSE_KEYCONTAINER
+_LICENSEERROR.fields_by_name['ErrorCode'].enum_type = _LICENSEERROR_ERROR
+_LICENSEERROR_ERROR.containing_type = _LICENSEERROR
+_LICENSEREQUEST_CONTENTIDENTIFICATION_CENC.fields_by_name['Pssh'].message_type = _WIDEVINECENCHEADER
+_LICENSEREQUEST_CONTENTIDENTIFICATION_CENC.fields_by_name['LicenseType'].enum_type = _LICENSETYPE
+_LICENSEREQUEST_CONTENTIDENTIFICATION_CENC.containing_type = _LICENSEREQUEST_CONTENTIDENTIFICATION
+_LICENSEREQUEST_CONTENTIDENTIFICATION_WEBM.fields_by_name['LicenseType'].enum_type = _LICENSETYPE
+_LICENSEREQUEST_CONTENTIDENTIFICATION_WEBM.containing_type = _LICENSEREQUEST_CONTENTIDENTIFICATION
+_LICENSEREQUEST_CONTENTIDENTIFICATION_EXISTINGLICENSE.fields_by_name['LicenseId'].message_type = _LICENSEIDENTIFICATION
+_LICENSEREQUEST_CONTENTIDENTIFICATION_EXISTINGLICENSE.containing_type = _LICENSEREQUEST_CONTENTIDENTIFICATION
+_LICENSEREQUEST_CONTENTIDENTIFICATION.fields_by_name['CencId'].message_type = _LICENSEREQUEST_CONTENTIDENTIFICATION_CENC
+_LICENSEREQUEST_CONTENTIDENTIFICATION.fields_by_name['WebmId'].message_type = _LICENSEREQUEST_CONTENTIDENTIFICATION_WEBM
+_LICENSEREQUEST_CONTENTIDENTIFICATION.fields_by_name['License'].message_type = _LICENSEREQUEST_CONTENTIDENTIFICATION_EXISTINGLICENSE
+_LICENSEREQUEST_CONTENTIDENTIFICATION.containing_type = _LICENSEREQUEST
+_LICENSEREQUEST.fields_by_name['ClientId'].message_type = _CLIENTIDENTIFICATION
+_LICENSEREQUEST.fields_by_name['ContentId'].message_type = _LICENSEREQUEST_CONTENTIDENTIFICATION
+_LICENSEREQUEST.fields_by_name['Type'].enum_type = _LICENSEREQUEST_REQUESTTYPE
+_LICENSEREQUEST.fields_by_name['ProtocolVersion'].enum_type = _PROTOCOLVERSION
+_LICENSEREQUEST.fields_by_name['EncryptedClientId'].message_type = _ENCRYPTEDCLIENTIDENTIFICATION
+_LICENSEREQUEST_REQUESTTYPE.containing_type = _LICENSEREQUEST
+_PROVISIONEDDEVICEINFO.fields_by_name['SecurityLevel'].enum_type = _PROVISIONEDDEVICEINFO_WVSECURITYLEVEL
+_PROVISIONEDDEVICEINFO_WVSECURITYLEVEL.containing_type = _PROVISIONEDDEVICEINFO
+_REMOTEATTESTATION.fields_by_name['Certificate'].message_type = _ENCRYPTEDCLIENTIDENTIFICATION
+_SIGNEDDEVICECERTIFICATE.fields_by_name['_DeviceCertificate'].message_type = _DEVICECERTIFICATE
+_SIGNEDDEVICECERTIFICATE.fields_by_name['Signer'].message_type = _SIGNEDDEVICECERTIFICATE
+_SIGNEDMESSAGE.fields_by_name['Type'].enum_type = _SIGNEDMESSAGE_MESSAGETYPE
+_SIGNEDMESSAGE.fields_by_name['RemoteAttestation'].message_type = _REMOTEATTESTATION
+_SIGNEDMESSAGE_MESSAGETYPE.containing_type = _SIGNEDMESSAGE
+_WIDEVINECENCHEADER.fields_by_name['algorithm'].enum_type = _WIDEVINECENCHEADER_ALGORITHM
+_WIDEVINECENCHEADER_ALGORITHM.containing_type = _WIDEVINECENCHEADER
+_SIGNEDLICENSEREQUEST.fields_by_name['Type'].enum_type = _SIGNEDLICENSEREQUEST_MESSAGETYPE
+_SIGNEDLICENSEREQUEST.fields_by_name['Msg'].message_type = _LICENSEREQUEST
+_SIGNEDLICENSEREQUEST.fields_by_name['RemoteAttestation'].message_type = _REMOTEATTESTATION
+_SIGNEDLICENSEREQUEST_MESSAGETYPE.containing_type = _SIGNEDLICENSEREQUEST
+_SIGNEDLICENSE.fields_by_name['Type'].enum_type = _SIGNEDLICENSE_MESSAGETYPE
+_SIGNEDLICENSE.fields_by_name['Msg'].message_type = _LICENSE
+_SIGNEDLICENSE.fields_by_name['RemoteAttestation'].message_type = _REMOTEATTESTATION
+_SIGNEDLICENSE_MESSAGETYPE.containing_type = _SIGNEDLICENSE
+DESCRIPTOR.message_types_by_name['ClientIdentification'] = _CLIENTIDENTIFICATION
+DESCRIPTOR.message_types_by_name['DeviceCertificate'] = _DEVICECERTIFICATE
+DESCRIPTOR.message_types_by_name['DeviceCertificateStatus'] = _DEVICECERTIFICATESTATUS
+DESCRIPTOR.message_types_by_name['DeviceCertificateStatusList'] = _DEVICECERTIFICATESTATUSLIST
+DESCRIPTOR.message_types_by_name['EncryptedClientIdentification'] = _ENCRYPTEDCLIENTIDENTIFICATION
+DESCRIPTOR.message_types_by_name['LicenseIdentification'] = _LICENSEIDENTIFICATION
+DESCRIPTOR.message_types_by_name['License'] = _LICENSE
+DESCRIPTOR.message_types_by_name['LicenseError'] = _LICENSEERROR
+DESCRIPTOR.message_types_by_name['LicenseRequest'] = _LICENSEREQUEST
+DESCRIPTOR.message_types_by_name['ProvisionedDeviceInfo'] = _PROVISIONEDDEVICEINFO
+DESCRIPTOR.message_types_by_name['ProvisioningOptions'] = _PROVISIONINGOPTIONS
+DESCRIPTOR.message_types_by_name['ProvisioningRequest'] = _PROVISIONINGREQUEST
+DESCRIPTOR.message_types_by_name['ProvisioningResponse'] = _PROVISIONINGRESPONSE
+DESCRIPTOR.message_types_by_name['RemoteAttestation'] = _REMOTEATTESTATION
+DESCRIPTOR.message_types_by_name['SessionInit'] = _SESSIONINIT
+DESCRIPTOR.message_types_by_name['SessionState'] = _SESSIONSTATE
+DESCRIPTOR.message_types_by_name['SignedCertificateStatusList'] = _SIGNEDCERTIFICATESTATUSLIST
+DESCRIPTOR.message_types_by_name['SignedDeviceCertificate'] = _SIGNEDDEVICECERTIFICATE
+DESCRIPTOR.message_types_by_name['SignedProvisioningMessage'] = _SIGNEDPROVISIONINGMESSAGE
+DESCRIPTOR.message_types_by_name['SignedMessage'] = _SIGNEDMESSAGE
+DESCRIPTOR.message_types_by_name['WidevineCencHeader'] = _WIDEVINECENCHEADER
+DESCRIPTOR.message_types_by_name['SignedLicenseRequest'] = _SIGNEDLICENSEREQUEST
+DESCRIPTOR.message_types_by_name['SignedLicense'] = _SIGNEDLICENSE
+DESCRIPTOR.enum_types_by_name['LicenseType'] = _LICENSETYPE
+DESCRIPTOR.enum_types_by_name['ProtocolVersion'] = _PROTOCOLVERSION
+_sym_db.RegisterFileDescriptor(DESCRIPTOR)
+
+ClientIdentification = _reflection.GeneratedProtocolMessageType('ClientIdentification', (_message.Message,), dict(
+
+ NameValue = _reflection.GeneratedProtocolMessageType('NameValue', (_message.Message,), dict(
+ DESCRIPTOR = _CLIENTIDENTIFICATION_NAMEVALUE,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:ClientIdentification.NameValue)
+ ))
+ ,
+
+ ClientCapabilities = _reflection.GeneratedProtocolMessageType('ClientCapabilities', (_message.Message,), dict(
+ DESCRIPTOR = _CLIENTIDENTIFICATION_CLIENTCAPABILITIES,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:ClientIdentification.ClientCapabilities)
+ ))
+ ,
+ DESCRIPTOR = _CLIENTIDENTIFICATION,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:ClientIdentification)
+ ))
+_sym_db.RegisterMessage(ClientIdentification)
+_sym_db.RegisterMessage(ClientIdentification.NameValue)
+_sym_db.RegisterMessage(ClientIdentification.ClientCapabilities)
+
+DeviceCertificate = _reflection.GeneratedProtocolMessageType('DeviceCertificate', (_message.Message,), dict(
+ DESCRIPTOR = _DEVICECERTIFICATE,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:DeviceCertificate)
+ ))
+_sym_db.RegisterMessage(DeviceCertificate)
+
+DeviceCertificateStatus = _reflection.GeneratedProtocolMessageType('DeviceCertificateStatus', (_message.Message,), dict(
+ DESCRIPTOR = _DEVICECERTIFICATESTATUS,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:DeviceCertificateStatus)
+ ))
+_sym_db.RegisterMessage(DeviceCertificateStatus)
+
+DeviceCertificateStatusList = _reflection.GeneratedProtocolMessageType('DeviceCertificateStatusList', (_message.Message,), dict(
+ DESCRIPTOR = _DEVICECERTIFICATESTATUSLIST,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:DeviceCertificateStatusList)
+ ))
+_sym_db.RegisterMessage(DeviceCertificateStatusList)
+
+EncryptedClientIdentification = _reflection.GeneratedProtocolMessageType('EncryptedClientIdentification', (_message.Message,), dict(
+ DESCRIPTOR = _ENCRYPTEDCLIENTIDENTIFICATION,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:EncryptedClientIdentification)
+ ))
+_sym_db.RegisterMessage(EncryptedClientIdentification)
+
+LicenseIdentification = _reflection.GeneratedProtocolMessageType('LicenseIdentification', (_message.Message,), dict(
+ DESCRIPTOR = _LICENSEIDENTIFICATION,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:LicenseIdentification)
+ ))
+_sym_db.RegisterMessage(LicenseIdentification)
+
+License = _reflection.GeneratedProtocolMessageType('License', (_message.Message,), dict(
+
+ Policy = _reflection.GeneratedProtocolMessageType('Policy', (_message.Message,), dict(
+ DESCRIPTOR = _LICENSE_POLICY,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:License.Policy)
+ ))
+ ,
+
+ KeyContainer = _reflection.GeneratedProtocolMessageType('KeyContainer', (_message.Message,), dict(
+
+ OutputProtection = _reflection.GeneratedProtocolMessageType('OutputProtection', (_message.Message,), dict(
+ DESCRIPTOR = _LICENSE_KEYCONTAINER_OUTPUTPROTECTION,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:License.KeyContainer.OutputProtection)
+ ))
+ ,
+
+ KeyControl = _reflection.GeneratedProtocolMessageType('KeyControl', (_message.Message,), dict(
+ DESCRIPTOR = _LICENSE_KEYCONTAINER_KEYCONTROL,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:License.KeyContainer.KeyControl)
+ ))
+ ,
+
+ OperatorSessionKeyPermissions = _reflection.GeneratedProtocolMessageType('OperatorSessionKeyPermissions', (_message.Message,), dict(
+ DESCRIPTOR = _LICENSE_KEYCONTAINER_OPERATORSESSIONKEYPERMISSIONS,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:License.KeyContainer.OperatorSessionKeyPermissions)
+ ))
+ ,
+
+ VideoResolutionConstraint = _reflection.GeneratedProtocolMessageType('VideoResolutionConstraint', (_message.Message,), dict(
+ DESCRIPTOR = _LICENSE_KEYCONTAINER_VIDEORESOLUTIONCONSTRAINT,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:License.KeyContainer.VideoResolutionConstraint)
+ ))
+ ,
+ DESCRIPTOR = _LICENSE_KEYCONTAINER,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:License.KeyContainer)
+ ))
+ ,
+ DESCRIPTOR = _LICENSE,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:License)
+ ))
+_sym_db.RegisterMessage(License)
+_sym_db.RegisterMessage(License.Policy)
+_sym_db.RegisterMessage(License.KeyContainer)
+_sym_db.RegisterMessage(License.KeyContainer.OutputProtection)
+_sym_db.RegisterMessage(License.KeyContainer.KeyControl)
+_sym_db.RegisterMessage(License.KeyContainer.OperatorSessionKeyPermissions)
+_sym_db.RegisterMessage(License.KeyContainer.VideoResolutionConstraint)
+
+LicenseError = _reflection.GeneratedProtocolMessageType('LicenseError', (_message.Message,), dict(
+ DESCRIPTOR = _LICENSEERROR,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:LicenseError)
+ ))
+_sym_db.RegisterMessage(LicenseError)
+
+LicenseRequest = _reflection.GeneratedProtocolMessageType('LicenseRequest', (_message.Message,), dict(
+
+ ContentIdentification = _reflection.GeneratedProtocolMessageType('ContentIdentification', (_message.Message,), dict(
+
+ CENC = _reflection.GeneratedProtocolMessageType('CENC', (_message.Message,), dict(
+ DESCRIPTOR = _LICENSEREQUEST_CONTENTIDENTIFICATION_CENC,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:LicenseRequest.ContentIdentification.CENC)
+ ))
+ ,
+
+ WebM = _reflection.GeneratedProtocolMessageType('WebM', (_message.Message,), dict(
+ DESCRIPTOR = _LICENSEREQUEST_CONTENTIDENTIFICATION_WEBM,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:LicenseRequest.ContentIdentification.WebM)
+ ))
+ ,
+
+ ExistingLicense = _reflection.GeneratedProtocolMessageType('ExistingLicense', (_message.Message,), dict(
+ DESCRIPTOR = _LICENSEREQUEST_CONTENTIDENTIFICATION_EXISTINGLICENSE,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:LicenseRequest.ContentIdentification.ExistingLicense)
+ ))
+ ,
+ DESCRIPTOR = _LICENSEREQUEST_CONTENTIDENTIFICATION,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:LicenseRequest.ContentIdentification)
+ ))
+ ,
+ DESCRIPTOR = _LICENSEREQUEST,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:LicenseRequest)
+ ))
+_sym_db.RegisterMessage(LicenseRequest)
+_sym_db.RegisterMessage(LicenseRequest.ContentIdentification)
+_sym_db.RegisterMessage(LicenseRequest.ContentIdentification.CENC)
+_sym_db.RegisterMessage(LicenseRequest.ContentIdentification.WebM)
+_sym_db.RegisterMessage(LicenseRequest.ContentIdentification.ExistingLicense)
+
+ProvisionedDeviceInfo = _reflection.GeneratedProtocolMessageType('ProvisionedDeviceInfo', (_message.Message,), dict(
+ DESCRIPTOR = _PROVISIONEDDEVICEINFO,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:ProvisionedDeviceInfo)
+ ))
+_sym_db.RegisterMessage(ProvisionedDeviceInfo)
+
+ProvisioningOptions = _reflection.GeneratedProtocolMessageType('ProvisioningOptions', (_message.Message,), dict(
+ DESCRIPTOR = _PROVISIONINGOPTIONS,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:ProvisioningOptions)
+ ))
+_sym_db.RegisterMessage(ProvisioningOptions)
+
+ProvisioningRequest = _reflection.GeneratedProtocolMessageType('ProvisioningRequest', (_message.Message,), dict(
+ DESCRIPTOR = _PROVISIONINGREQUEST,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:ProvisioningRequest)
+ ))
+_sym_db.RegisterMessage(ProvisioningRequest)
+
+ProvisioningResponse = _reflection.GeneratedProtocolMessageType('ProvisioningResponse', (_message.Message,), dict(
+ DESCRIPTOR = _PROVISIONINGRESPONSE,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:ProvisioningResponse)
+ ))
+_sym_db.RegisterMessage(ProvisioningResponse)
+
+RemoteAttestation = _reflection.GeneratedProtocolMessageType('RemoteAttestation', (_message.Message,), dict(
+ DESCRIPTOR = _REMOTEATTESTATION,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:RemoteAttestation)
+ ))
+_sym_db.RegisterMessage(RemoteAttestation)
+
+SessionInit = _reflection.GeneratedProtocolMessageType('SessionInit', (_message.Message,), dict(
+ DESCRIPTOR = _SESSIONINIT,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:SessionInit)
+ ))
+_sym_db.RegisterMessage(SessionInit)
+
+SessionState = _reflection.GeneratedProtocolMessageType('SessionState', (_message.Message,), dict(
+ DESCRIPTOR = _SESSIONSTATE,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:SessionState)
+ ))
+_sym_db.RegisterMessage(SessionState)
+
+SignedCertificateStatusList = _reflection.GeneratedProtocolMessageType('SignedCertificateStatusList', (_message.Message,), dict(
+ DESCRIPTOR = _SIGNEDCERTIFICATESTATUSLIST,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:SignedCertificateStatusList)
+ ))
+_sym_db.RegisterMessage(SignedCertificateStatusList)
+
+SignedDeviceCertificate = _reflection.GeneratedProtocolMessageType('SignedDeviceCertificate', (_message.Message,), dict(
+ DESCRIPTOR = _SIGNEDDEVICECERTIFICATE,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:SignedDeviceCertificate)
+ ))
+_sym_db.RegisterMessage(SignedDeviceCertificate)
+
+SignedProvisioningMessage = _reflection.GeneratedProtocolMessageType('SignedProvisioningMessage', (_message.Message,), dict(
+ DESCRIPTOR = _SIGNEDPROVISIONINGMESSAGE,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:SignedProvisioningMessage)
+ ))
+_sym_db.RegisterMessage(SignedProvisioningMessage)
+
+SignedMessage = _reflection.GeneratedProtocolMessageType('SignedMessage', (_message.Message,), dict(
+ DESCRIPTOR = _SIGNEDMESSAGE,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:SignedMessage)
+ ))
+_sym_db.RegisterMessage(SignedMessage)
+
+WidevineCencHeader = _reflection.GeneratedProtocolMessageType('WidevineCencHeader', (_message.Message,), dict(
+ DESCRIPTOR = _WIDEVINECENCHEADER,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:WidevineCencHeader)
+ ))
+_sym_db.RegisterMessage(WidevineCencHeader)
+
+SignedLicenseRequest = _reflection.GeneratedProtocolMessageType('SignedLicenseRequest', (_message.Message,), dict(
+ DESCRIPTOR = _SIGNEDLICENSEREQUEST,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:SignedLicenseRequest)
+ ))
+_sym_db.RegisterMessage(SignedLicenseRequest)
+
+SignedLicense = _reflection.GeneratedProtocolMessageType('SignedLicense', (_message.Message,), dict(
+ DESCRIPTOR = _SIGNEDLICENSE,
+ __module__ = 'wv_proto3_pb2'
+ # @@protoc_insertion_point(class_scope:SignedLicense)
+ ))
+_sym_db.RegisterMessage(SignedLicense)
+
+
+# @@protoc_insertion_point(module_scope)
diff --git a/pywidevine/cdm/key.py b/pywidevine/cdm/key.py
new file mode 100644
index 0000000..3d85e21
--- /dev/null
+++ b/pywidevine/cdm/key.py
@@ -0,0 +1,15 @@
+import binascii
+
+
+class Key:
+ def __init__(self, kid, type, key, permissions=[]):
+ self.kid = kid
+ self.type = type
+ self.key = key
+ self.permissions = permissions
+
+ def __repr__(self):
+ if self.type == "OPERATOR_SESSION":
+ return "key(kid={}, type={}, key={}, permissions={})".format(binascii.hexlify(self.kid), self.type, binascii.hexlify(self.key), self.permissions)
+ else:
+ return "key(kid={}, type={}, key={})".format(binascii.hexlify(self.kid), self.type, binascii.hexlify(self.key))
diff --git a/pywidevine/cdm/session.py b/pywidevine/cdm/session.py
new file mode 100644
index 0000000..0f7295c
--- /dev/null
+++ b/pywidevine/cdm/session.py
@@ -0,0 +1,18 @@
+class Session:
+ def __init__(self, session_id, init_data, device_config, offline):
+ self.session_id = session_id
+ self.init_data = init_data
+ self.offline = offline
+ self.device_config = device_config
+ self.device_key = None
+ self.session_key = None
+ self.derived_keys = {
+ 'enc': None,
+ 'auth_1': None,
+ 'auth_2': None
+ }
+ self.license_request = None
+ self.license = None
+ self.service_certificate = None
+ self.privacy_mode = False
+ self.keys = []
diff --git a/pywidevine/cdm/vmp.py b/pywidevine/cdm/vmp.py
new file mode 100644
index 0000000..42ab1bf
--- /dev/null
+++ b/pywidevine/cdm/vmp.py
@@ -0,0 +1,102 @@
+try:
+ from google.protobuf.internal.decoder import _DecodeVarint as _di # this was tested to work with protobuf 3, but it's an internal API (any varint decoder might work)
+except ImportError:
+ # this is generic and does not depend on pb internals, however it will decode "larger" possible numbers than pb decoder which has them fixed
+ def LEB128_decode(buffer, pos, limit = 64):
+ result = 0
+ shift = 0
+ while True:
+ b = buffer[pos]
+ pos += 1
+ result |= ((b & 0x7F) << shift)
+ if not (b & 0x80):
+ return (result, pos)
+ shift += 7
+ if shift > limit:
+ raise Exception("integer too large, shift: {}".format(shift))
+ _di = LEB128_decode
+
+
+class FromFileMixin:
+ @classmethod
+ def from_file(cls, filename):
+ """Load given a filename"""
+ with open(filename,"rb") as f:
+ return cls(f.read())
+
+# the signatures use a format internally similar to
+# protobuf's encoding, but without wire types
+class VariableReader(FromFileMixin):
+ """Protobuf-like encoding reader"""
+
+ def __init__(self, buf):
+ self.buf = buf
+ self.pos = 0
+ self.size = len(buf)
+
+ def read_int(self):
+ """Read a variable length integer"""
+ # _DecodeVarint will take care of out of range errors
+ (val, nextpos) = _di(self.buf, self.pos)
+ self.pos = nextpos
+ return val
+
+ def read_bytes_raw(self, size):
+ """Read size bytes"""
+ b = self.buf[self.pos:self.pos+size]
+ self.pos += size
+ return b
+
+ def read_bytes(self):
+ """Read a bytes object"""
+ size = self.read_int()
+ return self.read_bytes_raw(size)
+
+ def is_end(self):
+ return (self.size == self.pos)
+
+
+class TaggedReader(VariableReader):
+ """Tagged reader, needed for implementing a WideVine signature reader"""
+
+ def read_tag(self):
+ """Read a tagged buffer"""
+ return (self.read_int(), self.read_bytes())
+
+ def read_all_tags(self, max_tag=3):
+ tags = {}
+ while (not self.is_end()):
+ (tag, bytes) = self.read_tag()
+ if (tag > max_tag):
+ raise IndexError("tag out of bound: got {}, max {}".format(tag, max_tag))
+
+ tags[tag] = bytes
+ return tags
+
+class WideVineSignatureReader(FromFileMixin):
+ """Parses a widevine .sig signature file."""
+
+ SIGNER_TAG = 1
+ SIGNATURE_TAG = 2
+ ISMAINEXE_TAG = 3
+
+ def __init__(self, buf):
+ reader = TaggedReader(buf)
+ self.version = reader.read_int()
+ if (self.version != 0):
+ raise Exception("Unsupported signature format version {}".format(self.version))
+ self.tags = reader.read_all_tags()
+
+ self.signer = self.tags[self.SIGNER_TAG]
+ self.signature = self.tags[self.SIGNATURE_TAG]
+
+ extra = self.tags[self.ISMAINEXE_TAG]
+ if (len(extra) != 1 or (extra[0] > 1)):
+ raise Exception("Unexpected 'ismainexe' field value (not '\\x00' or '\\x01'), please check: {0}".format(extra))
+
+ self.mainexe = bool(extra[0])
+
+ @classmethod
+ def get_tags(cls, filename):
+ """Return a dictionary of each tag in the signature file"""
+ return cls.from_file(filename).tags
diff --git a/pywidevine/clients/__pycache__/proxy_config.cpython-39.pyc b/pywidevine/clients/__pycache__/proxy_config.cpython-39.pyc
new file mode 100644
index 0000000..219b338
Binary files /dev/null and b/pywidevine/clients/__pycache__/proxy_config.cpython-39.pyc differ
diff --git a/pywidevine/clients/dictionary.py b/pywidevine/clients/dictionary.py
new file mode 100644
index 0000000..9139ea3
--- /dev/null
+++ b/pywidevine/clients/dictionary.py
@@ -0,0 +1,44 @@
+import re
+from unidecode import unidecode
+
+def get_release_tag(default_filename, vcodec, video_height, acodec, channels, bitrate, module, tag, isDual):
+ video_codec = ''
+
+ if 'avc' in vcodec:
+ video_codec = 'x264'
+ if 'hvc' in vcodec:
+ video_codec = 'x265'
+ elif 'dvh' in vcodec:
+ video_codec = 'HDR'
+ if isDual==True:
+ video_codec = video_codec + '.DUAL'
+
+ audio_codec = ''
+ if 'mp4a' in acodec:
+ audio_codec = 'AAC'
+ if acodec == 'ac-3':
+ audio_codec = 'DD'
+ if acodec == 'ec-3':
+ audio_codec = 'DDP'
+ elif acodec == 'ec-3' and bitrate > 700000:
+ audio_codec = 'Atmos'
+
+ audio_channels = ''
+ if channels == '2':
+ audio_channels = '2.0'
+ elif channels == '6':
+ audio_channels = '5.1'
+ audio_format = audio_codec + audio_channels
+
+ #if isDual==True:
+ # audio_format = audio_codec + '.DUAL'
+
+
+ default_filename = default_filename.replace('&', '.and.')
+ default_filename = re.sub(r'[]!"#$%\'()*+,:;<=>?@\\^_`{|}~[-]', '', default_filename)
+ default_filename = default_filename.replace(' ', '.')
+ default_filename = re.sub(r'\.{2,}', '.', default_filename)
+ default_filename = unidecode(default_filename)
+
+ output_name = '{}.{}p.{}.WEB-DL.{}.{}-{}'.format(default_filename, video_height, str(module), audio_format, video_codec, tag)
+ return output_name
\ No newline at end of file
diff --git a/pywidevine/clients/paramountplus/__pycache__/config.cpython-37.pyc b/pywidevine/clients/paramountplus/__pycache__/config.cpython-37.pyc
new file mode 100644
index 0000000..a1e6f1a
Binary files /dev/null and b/pywidevine/clients/paramountplus/__pycache__/config.cpython-37.pyc differ
diff --git a/pywidevine/clients/paramountplus/__pycache__/config.cpython-39.pyc b/pywidevine/clients/paramountplus/__pycache__/config.cpython-39.pyc
new file mode 100644
index 0000000..9397a46
Binary files /dev/null and b/pywidevine/clients/paramountplus/__pycache__/config.cpython-39.pyc differ
diff --git a/pywidevine/clients/paramountplus/__pycache__/downloader.cpython-37.pyc b/pywidevine/clients/paramountplus/__pycache__/downloader.cpython-37.pyc
new file mode 100644
index 0000000..ebd10b5
Binary files /dev/null and b/pywidevine/clients/paramountplus/__pycache__/downloader.cpython-37.pyc differ
diff --git a/pywidevine/clients/paramountplus/__pycache__/downloader.cpython-39.pyc b/pywidevine/clients/paramountplus/__pycache__/downloader.cpython-39.pyc
new file mode 100644
index 0000000..f3e961a
Binary files /dev/null and b/pywidevine/clients/paramountplus/__pycache__/downloader.cpython-39.pyc differ
diff --git a/pywidevine/clients/paramountplus/config.py b/pywidevine/clients/paramountplus/config.py
new file mode 100644
index 0000000..72f23fa
--- /dev/null
+++ b/pywidevine/clients/paramountplus/config.py
@@ -0,0 +1,35 @@
+from shutil import which
+from os.path import dirname, realpath, join
+from os import pathsep, environ
+
+SCRIPT_PATH = dirname(realpath('paramountplus'))
+
+BINARIES_FOLDER = join(SCRIPT_PATH, 'binaries')
+
+MP4DECRYPT_BINARY = 'mp4decrypt'
+MEDIAINFO_BINARY = 'mediainfo'
+MP4DUMP_BINARY = 'mp4dump'
+MKVMERGE_BINARY = 'mkvmerge'
+FFMPEG_BINARY = 'ffmpeg'
+FFMPEG_BINARY = 'ffmpeg'
+ARIA2C_BINARY = 'aria2c'
+SUBTITLE_EDIT_BINARY = 'subtitleedit'
+
+# Add binaries folder to PATH as the first item
+environ['PATH'] = pathsep.join([BINARIES_FOLDER, environ['PATH']])
+
+MP4DECRYPT = which(MP4DECRYPT_BINARY)
+MEDIAINFO = which(MEDIAINFO_BINARY)
+MP4DUMP = which(MP4DUMP_BINARY)
+MKVMERGE = which(MKVMERGE_BINARY)
+FFMPEG = which(FFMPEG_BINARY)
+ARIA2C = which(ARIA2C_BINARY)
+SUBTITLE_EDIT = which(SUBTITLE_EDIT_BINARY)
+
+class WvDownloaderConfig(object):
+ def __init__(self, xml, base_url, output_file, track_id, format_id):
+ self.xml = xml
+ self.base_url = base_url
+ self.output_file = output_file
+ self.track_id = track_id
+ self.format_id = format_id
diff --git a/pywidevine/clients/paramountplus/downloader.py b/pywidevine/clients/paramountplus/downloader.py
new file mode 100644
index 0000000..80df265
--- /dev/null
+++ b/pywidevine/clients/paramountplus/downloader.py
@@ -0,0 +1,116 @@
+import requests, pathlib
+import math, subprocess
+import os, sys, shutil
+
+class WvDownloader(object):
+ def __init__(self, config):
+ self.xml = config.xml
+ self.output_file = config.output_file
+ self.config = config
+
+ def download_track(self, aria2c_infile, file_name):
+ aria2c_opts = [
+ 'aria2c',
+ '--enable-color=false',
+ '--allow-overwrite=true',
+ '--summary-interval=0',
+ '--download-result=hide',
+ '--async-dns=false',
+ '--check-certificate=false',
+ '--auto-file-renaming=false',
+ '--file-allocation=none',
+ '--console-log-level=warn',
+ '-x16', '-s16', '-j16',
+ '-i', aria2c_infile]
+ subprocess.run(aria2c_opts)
+
+ source_files = pathlib.Path(temp_folder).rglob(r'./*.mp4')
+ with open(file_name, mode='wb') as (destination):
+ for file in source_files:
+ with open(file, mode='rb') as (source):
+ shutil.copyfileobj(source, destination)
+ if os.path.exists(temp_folder):
+ shutil.rmtree(temp_folder)
+ os.remove(aria2c_infile)
+ print('\nDone!')
+
+ def process_url_templace(self, template, representation_id, bandwidth, time, number):
+ if representation_id is not None: result = template.replace('$RepresentationID$', representation_id)
+ if number is not None:
+ nstart = result.find('$Number')
+ if nstart >= 0:
+ nend = result.find('$', nstart+1)
+ if nend >= 0:
+ var = result[nstart+1 : nend]
+ if 'Number%' in var:
+ value = var[6:] % (int(number))
+ else:
+ value = number
+ result = result.replace('$'+var+'$', value)
+ if bandwidth is not None: result = result.replace('$Bandwidth$', bandwidth)
+ if time is not None: result = result.replace('$Time$', time)
+ result = result.replace('$$', '$').replace('../', '')
+ return result
+
+ def generate_segments(self):
+ segment_template = self.get_segment_template()
+ return self.get_segments(segment_template)
+
+ def get_segments(self, segment_template):
+ urls = []
+ urls.append(self.config.base_url + segment_template['@initialization'].replace('$RepresentationID$', self.config.format_id))
+ current_number = 1
+ for seg in self.force_segmentimeline(segment_template):
+ if '@t' in seg:
+ current_time = seg['@t']
+ for i in range(int(seg.get('@r', 0)) + 1):
+ urls.append(self.config.base_url + self.process_url_templace(segment_template['@media'],
+ representation_id=self.config.format_id,
+ bandwidth=None, time=str(current_time), number=str(current_number)))
+ current_number += 1
+ current_time += seg['@d']
+ return urls
+
+ def force_segmentimeline(self, segment_timeline):
+ if isinstance(segment_timeline['SegmentTimeline']['S'], list):
+ x16 = segment_timeline['SegmentTimeline']['S']
+ else:
+ x16 = [segment_timeline['SegmentTimeline']['S']]
+ return x16
+
+ def force_instance(self, x):
+ if isinstance(x['Representation'], list):
+ X = x['Representation']
+ else:
+ X = [x['Representation']]
+ return X
+
+ def get_segment_template(self):
+ x = [item for (i, item) in enumerate(self.xml['MPD']['Period']['AdaptationSet']) if self.config.track_id == item["@id"]][0]
+ segment_level = [item['SegmentTemplate'] for (i, item) in enumerate(self.force_instance(x)) if self.config.format_id == item["@id"]][0]
+ return segment_level
+
+ def run(self):
+ urls = self.generate_segments()
+
+ print('\n' + self.output_file)
+ global temp_folder
+ aria2c_infile = 'aria2c_infile.txt'
+ if os.path.isfile(aria2c_infile):
+ os.remove(aria2c_infile)
+ temp_folder = self.output_file.replace('.mp4', '')
+ if os.path.exists(temp_folder):
+ shutil.rmtree(temp_folder)
+ if not os.path.exists(temp_folder):
+ os.makedirs(temp_folder)
+
+ if len(urls) > 1:
+ num_segments = int(math.log10(len(urls))) + 1
+ with open(aria2c_infile, 'a', encoding='utf8') as (file):
+ for (i, url) in enumerate(urls):
+ file.write(f'{url}\n')
+ file.write(f'\tout={temp_folder}.{i:0{num_segments}d}.mp4\n')
+ file.write(f'\tdir={temp_folder}\n')
+ file.flush()
+ self.download_track(aria2c_infile, self.output_file)
+ print('Done!')
diff --git a/pywidevine/clients/proxy_config.py b/pywidevine/clients/proxy_config.py
new file mode 100644
index 0000000..73f003d
--- /dev/null
+++ b/pywidevine/clients/proxy_config.py
@@ -0,0 +1,15 @@
+
+config = {
+ 'proxies': {
+ 'none': None
+ },
+}
+
+class ProxyConfig(object):
+ def __init__(self, proxies):
+ self.config = config
+ self.config['proxies'] = proxies
+
+ def get_proxy(self, proxy):
+ return self.config['proxies'].get(proxy)
+
diff --git a/pywidevine/decrypt/wvdecrypt.py b/pywidevine/decrypt/wvdecrypt.py
new file mode 100644
index 0000000..fd99b85
--- /dev/null
+++ b/pywidevine/decrypt/wvdecrypt.py
@@ -0,0 +1,53 @@
+import logging, subprocess, re, base64
+from pywidevine.cdm import cdm, deviceconfig
+
+class WvDecrypt(object):
+ WV_SYSTEM_ID = [
+ 237, 239, 139, 169, 121, 214, 74, 206, 163, 200, 39, 220, 213, 29, 33, 237]
+
+ def __init__(self, init_data_b64, cert_data_b64):
+ self.init_data_b64 = init_data_b64
+ self.cert_data_b64 = cert_data_b64
+ self.cdm = cdm.Cdm()
+
+ def check_pssh(pssh_b64):
+ pssh = base64.b64decode(pssh_b64)
+ if not pssh[12:28] == bytes(self.WV_SYSTEM_ID):
+ new_pssh = bytearray([0, 0, 0])
+ new_pssh.append(32 + len(pssh))
+ new_pssh[4:] = bytearray(b'pssh')
+ new_pssh[8:] = [0, 0, 0, 0]
+ new_pssh[13:] = self.WV_SYSTEM_ID
+ new_pssh[29:] = [0, 0, 0, 0]
+ new_pssh[31] = len(pssh)
+ new_pssh[32:] = pssh
+ return base64.b64encode(new_pssh)
+ else:
+ return pssh_b64
+
+ self.session = self.cdm.open_session(check_pssh(self.init_data_b64), deviceconfig.DeviceConfig(deviceconfig.device_android_generic))
+ if self.cert_data_b64:
+ self.cdm.set_service_certificate(self.session, self.cert_data_b64)
+
+ def log_message(self, msg):
+ return ('{}').format(msg)
+
+ def start_process(self):
+ keyswvdecrypt = []
+ try:
+ for key in self.cdm.get_keys(self.session):
+ if key.type == 'CONTENT':
+ keyswvdecrypt.append(self.log_message('{}:{}'.format(key.kid.hex(),key.key.hex())))
+ except Exception:
+ return (
+ False, keyswvdecrypt)
+
+ return (
+ True, keyswvdecrypt)
+
+ def get_challenge(self):
+ return self.cdm.get_license_request(self.session)
+
+ def update_license(self, license_b64):
+ self.cdm.provide_license(self.session, license_b64)
+ return True
diff --git a/pywidevine/decrypt/wvdecryptcustom.py b/pywidevine/decrypt/wvdecryptcustom.py
new file mode 100644
index 0000000..9c19f0f
--- /dev/null
+++ b/pywidevine/decrypt/wvdecryptcustom.py
@@ -0,0 +1,59 @@
+# uncompyle6 version 3.7.3
+# Python bytecode 3.6 (3379)
+# Decompiled from: Python 3.7.8 (tags/v3.7.8:4b47a5b6ba, Jun 28 2020, 08:53:46) [MSC v.1916 64 bit (AMD64)]
+# Embedded file name: pywidevine\decrypt\wvdecryptcustom.py
+import logging, subprocess, re, base64
+from pywidevine.cdm import cdm, deviceconfig
+
+class WvDecrypt(object):
+ WV_SYSTEM_ID = [
+ 237, 239, 139, 169, 121, 214, 74, 206, 163, 200, 39, 220, 213, 29, 33, 237]
+
+ def __init__(self, init_data_b64, cert_data_b64, device):
+ self.init_data_b64 = init_data_b64
+ self.cert_data_b64 = cert_data_b64
+ self.device = device
+ self.cdm = cdm.Cdm()
+
+ def check_pssh(pssh_b64):
+ pssh = base64.b64decode(pssh_b64)
+ if not pssh[12:28] == bytes(self.WV_SYSTEM_ID):
+ new_pssh = bytearray([0, 0, 0])
+ new_pssh.append(32 + len(pssh))
+ new_pssh[4:] = bytearray(b'pssh')
+ new_pssh[8:] = [0, 0, 0, 0]
+ new_pssh[13:] = self.WV_SYSTEM_ID
+ new_pssh[29:] = [0, 0, 0, 0]
+ new_pssh[31] = len(pssh)
+ new_pssh[32:] = pssh
+ return base64.b64encode(new_pssh)
+ else:
+ return pssh_b64
+
+ self.session = self.cdm.open_session(check_pssh(self.init_data_b64), deviceconfig.DeviceConfig(self.device))
+ if self.cert_data_b64:
+ self.cdm.set_service_certificate(self.session, self.cert_data_b64)
+
+ def log_message(self, msg):
+ return '{}'.format(msg)
+
+ def start_process(self):
+ keyswvdecrypt = []
+ try:
+ for key in self.cdm.get_keys(self.session):
+ if key.type == 'CONTENT':
+ keyswvdecrypt.append(self.log_message('{}:{}'.format(key.kid.hex(), key.key.hex())))
+
+ except Exception:
+ return (
+ False, keyswvdecrypt)
+ else:
+ return (
+ True, keyswvdecrypt)
+
+ def get_challenge(self):
+ return self.cdm.get_license_request(self.session)
+
+ def update_license(self, license_b64):
+ self.cdm.provide_license(self.session, license_b64)
+ return True
\ No newline at end of file
diff --git a/pywidevine/muxer/__pycache__/muxer.cpython-39.pyc b/pywidevine/muxer/__pycache__/muxer.cpython-39.pyc
new file mode 100644
index 0000000..d60c52c
Binary files /dev/null and b/pywidevine/muxer/__pycache__/muxer.cpython-39.pyc differ
diff --git a/pywidevine/muxer/muxer.py b/pywidevine/muxer/muxer.py
new file mode 100644
index 0000000..1964890
--- /dev/null
+++ b/pywidevine/muxer/muxer.py
@@ -0,0 +1,271 @@
+# -*- coding: utf-8 -*-
+import os
+import subprocess
+
+class Muxer(object):
+ def __init__(self, CurrentName, SeasonFolder, CurrentHeigh, Type, mkvmergeexe):
+ self.CurrentName = CurrentName
+ self.SeasonFolder = SeasonFolder
+ self.CurrentHeigh = CurrentHeigh
+ self.Type = Type
+ self.mkvmergeexe = mkvmergeexe
+
+ def mkvmerge_muxer(self, lang):
+ VideoInputNoExist = False
+ if os.path.isfile(self.CurrentName + ' [' + self.CurrentHeigh + 'p] [CBR].h264'):
+ VideoInputName = self.CurrentName + ' [' + self.CurrentHeigh + 'p] [CBR].h264'
+ if self.Type == "show":
+ VideoOutputName = os.path.join(self.SeasonFolder, self.CurrentName + ' [' + self.CurrentHeigh + 'p] [CBR].mkv')
+ else:
+ VideoOutputName = self.CurrentName + ' [' + self.CurrentHeigh + 'p] [CBR].mkv'
+
+ if os.path.isfile(self.CurrentName + ' [' + self.CurrentHeigh + 'p].h264'):
+ VideoInputName = self.CurrentName + ' [' + self.CurrentHeigh + 'p].h264'
+ if self.Type == "show":
+ VideoOutputName = os.path.join(self.SeasonFolder, self.CurrentName + ' [' + self.CurrentHeigh + 'p].mkv')
+ else:
+ VideoOutputName = self.CurrentName + ' [' + self.CurrentHeigh + 'p].mkv'
+
+ elif os.path.isfile(self.CurrentName + ' [' + self.CurrentHeigh + 'p] [HEVC].mp4'):
+ VideoInputName = self.CurrentName + ' [' + self.CurrentHeigh + 'p] [HEVC].mp4'
+ if self.Type == "show":
+ VideoOutputName = os.path.join(self.SeasonFolder, self.CurrentName + ' [' + self.CurrentHeigh + 'p] [HEVC].mkv')
+ else:
+ VideoOutputName = self.CurrentName + ' [' + self.CurrentHeigh + 'p] [HEVC].mkv'
+
+ elif os.path.isfile(self.CurrentName + ' [' + self.CurrentHeigh + 'p] [HEVC].h265'):
+ VideoInputName = self.CurrentName + ' [' + self.CurrentHeigh + 'p] [HEVC].h265'
+ if self.Type == "show":
+ VideoOutputName = os.path.join(self.SeasonFolder, self.CurrentName + ' [' + self.CurrentHeigh + 'p] [HEVC].mkv')
+ else:
+ VideoOutputName = self.CurrentName + ' [' + self.CurrentHeigh + 'p] [HEVC].mkv'
+
+ elif os.path.isfile(self.CurrentName + ' [' + self.CurrentHeigh + 'p] [VP9].mp4'):
+ VideoInputName = self.CurrentName + ' [' + self.CurrentHeigh + 'p] [VP9].mp4'
+ if self.Type == "show":
+ VideoOutputName = os.path.join(self.SeasonFolder, self.CurrentName + ' [' + self.CurrentHeigh + 'p] [VP9].mkv')
+ else:
+ VideoOutputName = self.CurrentName + ' [' + self.CurrentHeigh + 'p] [VP9].mkv'
+
+ elif os.path.isfile(self.CurrentName + ' [' + self.CurrentHeigh + 'p] [VP9].vp9'):
+ VideoInputName = self.CurrentName + ' [' + self.CurrentHeigh + 'p] [VP9].vp9'
+ if self.Type == "show":
+ VideoOutputName = os.path.join(self.SeasonFolder, self.CurrentName + ' [' + self.CurrentHeigh + 'p] [VP9].mkv')
+ else:
+ VideoOutputName = self.CurrentName + ' [' + self.CurrentHeigh + 'p] [VP9].mkv'
+
+ elif os.path.isfile(self.CurrentName + ' [' + self.CurrentHeigh + 'p] [HDR].mp4'):
+ VideoInputName = self.CurrentName + ' [' + self.CurrentHeigh + 'p] [HDR].mp4'
+ if self.Type == "show":
+ VideoOutputName = os.path.join(self.SeasonFolder, self.CurrentName + ' [' + self.CurrentHeigh + 'p] [HDR].mkv')
+ else:
+ VideoOutputName = self.CurrentName + ' [' + self.CurrentHeigh + 'p] [HDR].mkv'
+
+ elif os.path.isfile(self.CurrentName + ' [' + self.CurrentHeigh + 'p] [HDR].h265'):
+ VideoInputName = self.CurrentName + ' [' + self.CurrentHeigh + 'p] [HDR].h265'
+ if self.Type == "show":
+ VideoOutputName = os.path.join(self.SeasonFolder, self.CurrentName + ' [' + self.CurrentHeigh + 'p] [HDR].mkv')
+ else:
+ VideoOutputName = self.CurrentName + ' [' + self.CurrentHeigh + 'p] [HDR].mkv'
+
+ elif os.path.isfile(self.CurrentName + ' [' + self.CurrentHeigh + 'p] [AVC HIGH].mp4'):
+ VideoInputName = self.CurrentName + ' [' + self.CurrentHeigh + 'p] [AVC HIGH].mp4'
+ if self.Type == "show":
+ VideoOutputName = os.path.join(self.SeasonFolder, self.CurrentName + ' [' + self.CurrentHeigh + 'p] [AVC HIGH].mkv')
+ else:
+ VideoOutputName = self.CurrentName + ' [' + self.CurrentHeigh + 'p] [AVC HIGH].mkv'
+
+ elif os.path.isfile(self.CurrentName + ' [' + self.CurrentHeigh + 'p] [AVC HIGH].h264'):
+ VideoInputName = self.CurrentName + ' [' + self.CurrentHeigh + 'p] [AVC HIGH].h264'
+ if self.Type == "show":
+ VideoOutputName = os.path.join(self.SeasonFolder, self.CurrentName + ' [' + self.CurrentHeigh + 'p] [AVC HIGH].mkv')
+ else:
+ VideoOutputName = self.CurrentName + ' [' + self.CurrentHeigh + 'p] [AVC HIGH].mkv'
+
+ elif os.path.isfile(self.CurrentName + ' [' + self.CurrentHeigh + 'p] [CBR].mp4'):
+ VideoInputName = self.CurrentName + ' [' + self.CurrentHeigh + 'p] [CBR].mp4'
+ if self.Type == "show":
+ VideoOutputName = os.path.join(self.SeasonFolder, self.CurrentName + ' [' + self.CurrentHeigh + 'p] [CBR].mkv')
+ else:
+ VideoOutputName = self.CurrentName + ' [' + self.CurrentHeigh + 'p] [CBR].mkv'
+
+ elif os.path.isfile(self.CurrentName + ' [' + self.CurrentHeigh + 'p].mp4'):
+ VideoInputName = self.CurrentName + ' [' + self.CurrentHeigh + 'p].mp4'
+ if self.Type == "show":
+ VideoOutputName = os.path.join(self.SeasonFolder, self.CurrentName + ' [' + self.CurrentHeigh + 'p].mkv')
+ else:
+ VideoOutputName = self.CurrentName + ' [' + self.CurrentHeigh + 'p].mkv'
+ else:
+ VideoInputNoExist = True
+
+ if VideoInputNoExist == False:
+ AudioExtensionsList=[
+ ".ac3",
+ ".mka",
+ ".eac3",
+ ".m4a",
+ ".dts",
+ ".mp3",
+ ".aac"
+ ]
+
+ SubsExtensionsList= [
+ ".srt",
+ ".ass",
+ ]
+
+ if lang == "English":
+ language_tag = "English"
+
+ if language_tag == "English":
+ subs_forced = 'Forced'
+ subs_sdh = 'SDH'
+ #["en", "en", "eng", "English", "yes", "yes"]
+ #[audio_language, subs_language, language_id, language_name, audio_default, subs_default]
+ LanguageList = [
+ ["es-la", "es-la", "spa", "Spanish", "yes", "no"],
+ ["es", "es", "spa", "Castilian", "no", "no"],
+ ["en", "en", "eng", "English", "no", "no"],
+ ["pt-BR", "pt-BR", "por", "Brazilian Portuguese", "no", "no"],
+ ["cat", "cat", "cat", "Catalan", "no", "no"],
+ ["eu", "eu", "baq", "Basque", "no", "no"],
+ ["fr", "fr", "fre", "French", "no", "no"],
+ ["fr-bg", "fr-bg", "fre", "French (Belgium)", "no", "no"],
+ ["fr-lu", "fr-lu", "fre", "French (Luxembourg)", "no", "no"],
+ ["fr-ca", "fr-ca", "fre", "French (Canada)", "no", "no"],
+ ["de", "de", "ger", "German", "no", "no"],
+ ["it", "it", "ita", "Italian", "no", "no"],
+ ["pl", "pl", "pol", "Polish", "no", "no"],
+ ["tr", "tr", "tur", "Turkish", "no", "no"],
+ ["hy", "hy", "arm", "Armenian", "no", "no"],
+ ["sv", "sv", "swe", "Swedish", "no", "no"],
+ ["da", "da", "dan", "Danish", "no", "no"],
+ ["fi", "fi", "fin", "Finnish", "no", "no"],
+ ["nl", "nl", "dut", "Dutch", "no", "no"],
+ ["nl-be", "nl-be", "dut", "Flemish", "no", "no"],
+ ["no", "no", "nor", "Norwegian", "no", "no"],
+ ["lv", "lv", "lav", "Latvian", "no", "no"],
+ ["is", "is", "ice", "Icelandic", "no", "no"],
+ ["ru", "ru", "rus", "Russian", "no", "no"],
+ ["uk", "uk", "ukr", "Ukrainian", "no", "no"],
+ ["hu", "hu", "hun", "Hungarian", "no", "no"],
+ ["bg", "bg", "bul", "Bulgarian", "no", "no"],
+ ["hr", "hr", "hrv", "Croatian", "no", "no"],
+ ["lt", "lt", "lit", "Lithuanian", "no", "no"],
+ ["et", "et", "est", "Estonian", "no", "no"],
+ ["el", "el", "gre", "Greek", "no", "no"],
+ ["he", "he", "heb", "Hebrew", "no", "no"],
+ ["ar", "ar", "ara", "Arabic", "no", "no"],
+ ["fa", "fa", "per", "Persian", "no", "no"],
+ ["ro", "ro", "rum", "Romanian", "no", "no"],
+ ["sr", "sr", "srp", "Serbian", "no", "no"],
+ ["cs", "cs", "cze", "Czech", "no", "no"],
+ ["sk", "sk", "slo", "Slovak", "no", "no"],
+ ["sl", "sl", "slv", "Slovenian", "no", "no"],
+ ["sq", "sq", "alb", "Albanian", "no", "no"],
+ ["bs", "bs", "bos", "Bosnian", "no", "no"],
+ ["mk", "mk", "mac", "Macedonian", "no", "no"],
+ ["hi", "hi", "hin", "Hindi", "no", "no"],
+ ["bn", "bn", "ben", "Bengali", "no", "no"],
+ ["ur", "ur", "urd", "Urdu", "no", "no"],
+ ["pa", "pa", "pan", "Punjabi", "no", "no"],
+ ["ta", "ta", "tam", "Tamil", "no", "no"],
+ ["te", "te", "tel", "Telugu", "no", "no"],
+ ["mr", "mr", "mar", "Marathi", "no", "no"],
+ ["kn", "kn", "kan", "Kannada (India)", "no", "no"],
+ ["gu", "gu", "guj", "Gujarati", "no", "no"],
+ ["ml", "ml", "mal", "Malayalam", "no", "no"],
+ ["si", "si", "sin", "Sinhala", "no", "no"],
+ ["as", "as", "asm", "Assamese", "no", "no"],
+ ["mni", "mni", "mni", "Manipuri", "no", "no"],
+ ["tl", "tl", "tgl", "Tagalog", "no", "no"],
+ ["id", "id", "ind", "Indonesian", "no", "no"],
+ ["ms", "ms", "may", "Malay", "no", "no"],
+ ["fil", "fil", "fil", "Filipino", "no", "no"],
+ ["vi", "vi", "vie", "Vietnamese", "no", "no"],
+ ["th", "th", "tha", "Thai", "no", "no"],
+ ["km", "km", "khm", "Khmer", "no", "no"],
+ ["ko", "ko", "kor", "Korean", "no", "no"],
+ ["zh", "zh", "chi", "Mandarin", "no", "no"],
+ ["yue", "yue", "chi", "Cantonese", "no", "no"],
+ ["zh-hans", "zh-hans", "chi", "Chinese (Simplified)", "no", "no"],
+ ["zh-hant", "zh-hant", "chi", "Chinese (Traditional)", "no", "no"],
+ ["zh-hk", "zh-hk", "chi", "Chinese (Simplified)", "no", "no"],
+ ["zh-tw", "zh-tw", "chi", "Chinese (Traditional)", "no", "no"],
+ ["zh-sg", "zh-sg", "chi", "Chinese (Singapore)", "no", "no"],
+ ["ja", "ja", "jpn", "Japanese", "no", "no"],
+ ["tlh", "tlh", "tlh", "Klingon", "no", "no"],
+ ["zxx", "zxx", "zxx", "No Dialogue", "no", "no"]
+ ]
+
+ ALLAUDIOS = []
+ default_active_audio = False
+ for audio_language, subs_language, language_id, language_name, audio_default, subs_default in LanguageList:
+ for AudioExtension in AudioExtensionsList:
+ if os.path.isfile(self.CurrentName + ' (' + audio_language + ')' + AudioExtension):
+ if default_active_audio == True: audio_default = "no"
+ ALLAUDIOS = ALLAUDIOS + ['--language', '0:' + audio_language, '--track-name', '0:' + language_name, '--default-track', '0:' + audio_default, '(', self.CurrentName + ' (' + audio_language + ')' + AudioExtension, ')']
+ if audio_default == "yes": default_active_audio = True
+
+ for audio_language, subs_language, language_id, language_name, audio_default, subs_default in LanguageList:
+ for AudioExtension in AudioExtensionsList:
+ if os.path.isfile(self.CurrentName + ' (' + audio_language + '-ad)' + AudioExtension):
+ if default_active_audio == True: audio_default = "no"
+ ALLAUDIOS = ALLAUDIOS + ['--language', '0:' + audio_language, '--track-name', '0:' + language_name + ' (Audio Description)', '--default-track', '0:no', '(', self.CurrentName + ' (' + audio_language + '-ad)' + AudioExtension, ')']
+ if audio_default == "yes": default_active_audio = True
+
+ OnlyOneLanguage = False
+ if len(ALLAUDIOS) == 9:
+ OnlyOneLanguage = True
+
+ elif len(ALLAUDIOS) == 18:
+ if ALLAUDIOS[1] == ALLAUDIOS[10]:
+ if '-ad' in ALLAUDIOS[7] or '-ad' in ALLAUDIOS[16]:
+ OnlyOneLanguage = True
+ else:
+ OnlyOneLanguage = False
+
+
+ ALLSUBS = []
+ default_active_subs = False
+ for audio_language, subs_language, language_id, language_name, audio_default, subs_default in LanguageList:
+ for SubsExtension in SubsExtensionsList:
+ if os.path.isfile(self.CurrentName + ' (' + subs_language + '-forced)' + SubsExtension):
+ if subs_default == "yes": default_active_subs = True
+ ALLSUBS = ALLSUBS + ['--language', '0:' + language_id, '--track-name', '0:' + subs_forced, '--forced-track', '0:yes', '--default-track', '0:' + subs_default, '--compression', '0:none', '(', self.CurrentName + ' (' + subs_language + '-forced)' + SubsExtension, ')']
+
+ if OnlyOneLanguage == True:
+ if default_active_subs == True: subs_default = "no"
+ if os.path.isfile(self.CurrentName + ' (' + subs_language + ')' + SubsExtension):
+ ALLSUBS = ALLSUBS + ['--language', '0:' + language_id, '--forced-track', '0:no', '--default-track', '0:' + subs_default, '--compression', '0:none', '(', self.CurrentName + ' (' + subs_language + ')' + SubsExtension, ')']
+
+ else:
+ if os.path.isfile(self.CurrentName + ' (' + subs_language + ')' + SubsExtension):
+ ALLSUBS = ALLSUBS + ['--language', '0:' + language_id, '--forced-track', '0:no', '--default-track', '0:no', '--compression', '0:none', '(', self.CurrentName + ' (' + subs_language + ')' + SubsExtension, ')']
+
+ if os.path.isfile(self.CurrentName + ' (' + subs_language + '-sdh)' + SubsExtension):
+ ALLSUBS = ALLSUBS + ['--language', '0:' + language_id, '--track-name', '0:' + subs_sdh, '--forced-track', '0:no', '--default-track', '0:no', '--compression', '0:none', '(', self.CurrentName + ' (' + subs_language + '-sdh)' + SubsExtension, ')']
+
+ #(Chapters)
+ if os.path.isfile(self.CurrentName+' Chapters.txt'):
+ CHAPTERS=['--chapter-charset', 'UTF-8', '--chapters', self.CurrentName + ' Chapters.txt']
+ else:
+ CHAPTERS=[]
+
+
+ mkvmerge_command_video = [self.mkvmergeexe,
+ '-q',
+ '--output',
+ VideoOutputName,
+ '--language',
+ '0:und',
+ '--default-track',
+ '0:yes',
+ '(',
+ VideoInputName,
+ ')']
+
+
+
+ mkvmerge_command = mkvmerge_command_video + ALLAUDIOS + ALLSUBS + CHAPTERS
+ mkvmerge_process = subprocess.run(mkvmerge_command)
diff --git a/requirements.txt b/requirements.txt
new file mode 100644
index 0000000..86b8dbc
--- /dev/null
+++ b/requirements.txt
@@ -0,0 +1,16 @@
+pymediainfo==5.1.0
+future==0.18.2
+xmltodict==0.12.0
+m3u8==0.9.0
+requests==2.25.1
+asgiref==3.4.1
+titlecase==2.2.0
+graphql-core==2.3.2
+streamlink==2.2.0
+Unidecode==1.2.0
+tqdm==4.61.1
+isodate==0.6.0
+graphql-relay==2.0.1
+prettytable==2.1.0
+urllib3==1.26.5
+PyJWT==2.1.0