NAME

gcloud kms asymmetric-decrypt - decrypt an input file using an asymmetric-encryption key version

SYNOPSIS

gcloud kms asymmetric-decrypt --ciphertext-file=CIPHERTEXT_FILE --plaintext-file=PLAINTEXT_FILE [--key=KEY] [--keyring=KEYRING] [--location=LOCATION] [--skip-integrity-verification] [--version=VERSION] [GCLOUD_WIDE_FLAG ...]

DESCRIPTION

Decrypts the given ciphertext file using the provided asymmetric-encryption key version and saves the decrypted data to the plaintext file.

By default, the command performs integrity verification on data sent to and received from Cloud KMS. Use --skip-integrity-verification to disable integrity verification.

EXAMPLES

The following command will read the file '/tmp/my/secret.file.enc', decrypt it using the asymmetric CryptoKey dont-panic Version 3 and write the plaintext to '/tmp/my/secret.file.dec'.

$ gcloud kms asymmetric-decrypt --location=us-central1 \ --keyring=hitchhiker --key=dont-panic --version=3 \ --ciphertext-file=/tmp/my/secret.file.enc \ --plaintext-file=/tmp/my/secret.file.dec

REQUIRED FLAGS

--ciphertext-file=CIPHERTEXT_FILE

File path of the ciphertext file to decrypt.

--plaintext-file=PLAINTEXT_FILE

File path of the plaintext file to output.

OPTIONAL FLAGS

--key=KEY

to use for asymmetric-decryption.

--keyring=KEYRING

Key ring of the key.

--location=LOCATION

Location of the keyring.

--skip-integrity-verification

Skip integrity verification on request and response API fields.

--version=VERSION

Version to use for asymmetric-decryption.

GCLOUD WIDE FLAGS

These flags are available to all commands: --access-token-file, --account, --billing-project, --configuration, --flags-file, --flatten, --format, --help, --impersonate-service-account, --log-http, --project, --quiet, --trace-token, --user-output-enabled, --verbosity.

Run $ gcloud help for details.

NOTES

These variants are also available:

$ gcloud alpha kms asymmetric-decrypt

$ gcloud beta kms asymmetric-decrypt