Sqlite query
SELECT datetime(i.mtime_ns / 1E9 , 'unixepoch', 'localtime'),n.name,
'sql_data_'||b.obj_id FROM contents c
JOIN names n ON n.id = c.name_id
JOIN inodes i ON i.id=c.inode
JOIN inode_blocks ib ON ib.inode=i.id
JOIN blocks b ON b.id=ib.block_id
order by i.mtime_ns;
=>
return for each file the corresponding sql_data_xxx files.
Le mardi 30 août 2016 09:31:52 UTC+2, thomas denimal a écrit :
>
> Hello everybody,
>
>
> For testing purposes ( for example, fs cannot be mounted anymore), i would
> like to know if its possible to decrypt manually the files ?
> I can retrieve metadata from the sqlite database ( using the .db file) so
> that part is ok.
> After retrieving all the s3ql_data_x files, how to decrypt them ? I tried
> with openssl using AES256 and the fs passphrase or master key without
> success....
>
> Another question, is compression (LZMA by default) is applied to all the
> files ?
>
> Thanks for your help
> Thomas DENIMAL
>
--
You received this message because you are subscribed to the Google Groups
"s3ql" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
For more options, visit https://groups.google.com/d/optout.