gcloud kms asymmetric-decrypt - decrypt an input file using an asymmetric-encryption key version
gcloud kms asymmetric-decrypt --ciphertext-file=CIPHERTEXT_FILE --plaintext-file=PLAINTEXT_FILE [--key=KEY] [--keyring=KEYRING] [--location=LOCATION] [--skip-integrity-verification] [--version=VERSION] [GCLOUD_WIDE_FLAG ...]
Decrypts the given ciphertext file using the provided asymmetric-encryption key version and saves the decrypted data to the plaintext file.
By default, the command performs integrity verification on data sent to and received from Cloud KMS. Use --skip-integrity-verification to disable integrity verification.
The following command will read the file '/tmp/my/secret.file.enc', decrypt it using the asymmetric CryptoKey dont-panic Version 3 and write the plaintext to '/tmp/my/secret.file.dec'.
$ gcloud kms asymmetric-decrypt --location=us-central1 \ --keyring=hitchhiker --key=dont-panic --version=3 \ --ciphertext-file=/tmp/my/secret.file.enc \ --plaintext-file=/tmp/my/secret.file.dec
- --ciphertext-file=CIPHERTEXT_FILE
File path of the ciphertext file to decrypt.
- --plaintext-file=PLAINTEXT_FILE
File path of the plaintext file to output.
- --key=KEY
to use for asymmetric-decryption.
- --keyring=KEYRING
Key ring of the key.
- --location=LOCATION
Location of the keyring.
- --skip-integrity-verification
Skip integrity verification on request and response API fields.
- --version=VERSION
Version to use for asymmetric-decryption.
These flags are available to all commands: --access-token-file, --account, --billing-project, --configuration, --flags-file, --flatten, --format, --help, --impersonate-service-account, --log-http, --project, --quiet, --trace-token, --user-output-enabled, --verbosity.
Run $ gcloud help for details.
These variants are also available:
$ gcloud alpha kms asymmetric-decrypt
$ gcloud beta kms asymmetric-decrypt