1 .\" keyanalyze, a program for analysing webs of trust
2 .\" manpage Copyright (C) 2004 Matthew Wilcox
4 .\" This program is free software; you can redistribute it and/or
5 .\" modify it under the terms of the GNU General Public License
6 .\" as published by the Free Software Foundation; either version 2
7 .\" of the License, or (at your option) any later version.
12 keyanalyze \- Web of Trust analysis
15 \fBkeyanalyze\fP [ \fB\-h1\fP ] [ \fB\-i\fP \fIinfile\fP ] [ \fB\-o\fP \fIoutdir\fP ]
18 \fIkeyanalyze\fP analyses the web of trust within a group of keys. It
19 takes preprocessed keys as input (see
21 and produces an output directory full of statistics about the keys.
24 $ pgpring \-S \-k ./keyring.gpg | process_keys > preprocess.keys
30 Read from \fIinfile\fP instead of \fBpreprocess.keys\fP.
33 Put the results in \fIoutdir\fP instead of \fBoutput/\fP. The directory
34 will be created if it does not already exist.
40 Per default, \fBkeyanalyze\fP writes the output into subdirectories named after
41 the first two characters of the key ID. This options disables this; useful for
45 M. Drew Streib <dtype@dtype.org>,
47 Thomas Roessler <roessler@does\-not\-exist.org>,
49 Hal J. Burch <hburch@halport.lumeta.com>,
51 Matt Kraai <kraai@alumni.carnegiemellon.edu>,
53 Steve Langasek <vorlon@netexpress.net>,
55 Matthew Wilcox <matthew@wil.cx>