gcloud alpha kms asymmetric-decrypt

NAME
gcloud alpha kms asymmetric-decrypt - decrypt an input file using an asymmetric-encryption key version
SYNOPSIS
gcloud alpha kms asymmetric-decrypt --ciphertext-file=CIPHERTEXT_FILE --plaintext-file=PLAINTEXT_FILE [--key=KEY] [--keyring=KEYRING] [--location=LOCATION] [--skip-integrity-verification] [--version=VERSION] [GCLOUD_WIDE_FLAG]
DESCRIPTION
(ALPHA) Decrypts the given ciphertext file using the provided asymmetric-encryption key version and saves the decrypted data to the plaintext file.

By default, the command performs integrity verification on data sent to and received from Cloud KMS. Use --skip-integrity-verification to disable integrity verification.

EXAMPLES
The following command will read the file '/tmp/my/secret.file.enc', decrypt it using the asymmetric CryptoKey dont-panic Version 3 and write the plaintext to '/tmp/my/secret.file.dec'.
gcloud alpha kms asymmetric-decrypt --location=us-central1 --keyring=hitchhiker --key=dont-panic --version=3 --ciphertext-file=/tmp/my/secret.file.enc --plaintext-file=/tmp/my/secret.file.dec
REQUIRED FLAGS
--ciphertext-file=CIPHERTEXT_FILE
File path of the ciphertext file to decrypt.
--plaintext-file=PLAINTEXT_FILE
File path of the plaintext file to output.
OPTIONAL FLAGS
--key=KEY
to use for asymmetric-decryption.
--keyring=KEYRING
Key ring of the key.
--location=LOCATION
Location of the keyring.
--skip-integrity-verification
Skip integrity verification on request and response API fields.
--version=VERSION
Version to use for asymmetric-decryption.
GCLOUD WIDE FLAGS
These flags are available to all commands: --access-token-file, --account, --billing-project, --configuration, --flags-file, --flatten, --format, --help, --impersonate-service-account, --log-http, --project, --quiet, --trace-token, --user-output-enabled, --verbosity.

Run $ gcloud help for details.

NOTES
This command is currently in alpha and might change without notice. If this command fails with API permission errors despite specifying the correct project, you might be trying to access an API with an invitation-only early access allowlist. These variants are also available:
gcloud kms asymmetric-decrypt
gcloud beta kms asymmetric-decrypt