nr_decrypt

The nr_decrypt utility decrypts call logs, waveforms, and diagnostic logs. It accepts a file or directory as input, and can recursively decrypt a tree of files. The utility ignores any non-encrypted files.

The utility accepts call logs as input. The output file omits the .enc file extension. For example, the encrypted myLog-LOG.enc becomes myLog-LOG. (If the input file does not have the .enc file extension, the tool adds an underscore prefix. For example, the encrypted myLog-LOG becomes _myLog-LOG.)

Note: When decrypting more than one file, you must add the .enc extension to the input. (The tool does not accept the ".log" file extension.)

The utility is located in: %SWISRSDK%\amd64\bin

Usage

nr_decrypt -i target [-r] [-d] [-f] -prv privateKeyFile
       [-pass privateKeyPassword]
       [-reenc pubKeyFile]

Options

-i target

Required. A directory or filename.

-r

Optional. Proceeds recursively through all files in all subdirectories. This argument is relevant when -i is a directory.

-d

Optional. Deletes encrypted files upon successful decryption.

-f

Optional. Forces replacement of previously decrypted files (if any).

-prv privateKeyFile

Required. The private key corresponding to the public key used for encryption in the session.xml.

-pass privateKeyPassword

Required if you generated the privateKeyFile with a password.

-reenc pubKeyFile

Optional. Uses OpenSSL to re-encrypt the file with a new key after decrypting the file with the privateKeyFile. For example, this argument is useful for providing data to Nuance for troubleshooting purposes, without revealing your private key or risking exposure of secure data to a third party.

Example

This typical example decrypts all logs (call logs and audio waveforms) in the data directory and its subdirectories. It deletes the encrypted files after decrypting them. The resulting files appear as if security levels were never activated:

> nr_decrypt.exe -i $NUANCE_DATA_DIR/calllogs -r -d -f -prv mySecretKey 

This simple example decrypts a single log file. The password is required because the user encrypted the private key during generation (see Example).

> nr_decrypt.exe -i myLog-LOG -prv mySecretKey -pass abracadabra

This simple example decrypts a single waveform file.

> nr_decrypt.exe -i myWaveFile.wav -prv mySecretKey