Decrypt the payload content in the command line
Use the matched-data-cli tool to decrypt a payload in the command line.
-
Download the
matched-data-clitool for your platform from the Releases page on GitHub, under Assets. -
Extract the content of the downloaded
.tar.gzfile to a local folder. -
Open a command line window and change to the local folder containing the
matched-data-clibinary. -
Create two files: one with your private key and another one with the encrypted payload:
Replace
<PRIVATE_KEY>with your private key and<ENCRYPTED_PAYLOAD>with the encrypted payload.Note: The first
printfcommand will make your private key visible in your command history. -
Run the following command to decrypt the payload:
Example
The following example creates two files — one with the private key and another one with the encrypted payload — and runs the matched-data-cli tool to decrypt the payload in the encrypted_payload.txt file: