reads the provided key files and writes a new key file
containing only the keys required for the operations
specified via the
(list and extract archives),
(delete archives), and
since it is impossible to delete an individual archive without
being able to read it; while a key file generated with
can be used to delete all the archives stored, but not individual
command requires either (1)
(archive deleting), (2)
(archive creating), or (3)
command requires either (1) both
(archive writing) and
(archive reading) keys, or (2)
(archive deleting) keys.
(archive deleting) keys, since it needs to be able to delete
option is specified, the user will be prompted to enter a passphrase (twice)
to be used to encrypt the key file.
option is specified, a maximum of
bytes of RAM will be used in the scrypt key derivation function to
encrypt the key file; it may be necessary to set this option if a key
file is being created on a system with far more RAM than the system
on which the key file will be used.
option is specified, a maximum of approximately
seconds will be used in the scrypt key derivation function to encrypt
the key file.
Note that if none of the
options are specified, a key file will be produced which does not
contain any keys.
This is probably not very useful.