Applied keyanalyze_manpage.diff patch into keyanalyse source
[pgp-tools.git] / keyanalyze / keyanalyze.1
1 .\" keyanalyze, a program for analysing webs of trust
2 .\" manpage Copyright (C) 2004 Matthew Wilcox
3 .\"
4 .\" This program is free software; you can redistribute it and/or
5 .\" modify it under the terms of the GNU General Public License
6 .\" as published by the Free Software Foundation; either version 2
7 .\" of the License, or (at your option) any later version.
8 .\"
9 .TH keyanalyze 1
10
11 .SH NAME
12 keyanalyze \- Web of Trust analysis
13
14 .SH SYNTAX
15 \fBkeyanalyze\fP [ \fB\-h1\fP ] [ \fB\-i\fP \fIinfile\fP ] [ \fB\-o\fP \fIoutdir\fP ]
16
17 .SH DESCRIPTION
18 \fIkeyanalyze\fP analyses the web of trust within a group of keys. It
19 takes preprocessed keys as input (see
20 .BR process_keys (1))
21 and produces an output directory full of statistics about the keys.
22
23 Usually called like
24 $ pgpring \-S \-k ./keyring.gpg | process_keys > preprocess.keys
25 $ keyanalyze
26
27 .SH OPTIONS
28 .TP
29 .BI \-i " infile"
30 Read from \fIinfile\fP instead of \fBpreprocess.keys\fP.
31 .TP
32 .BI \-o " outdir"
33 Put the results in \fIoutdir\fP instead of \fBoutput/\fP. The directory
34 will be created if it does not already exist.
35 .TP
36 .BI \-h
37 Print help.
38 .TP
39 .BI \-1
40 Per default, \fBkeyanalyze\fP writes the output into subdirectories named after
41 the first two characters of the key ID. This options disables this; useful for
42 small keyrings.
43
44 .SH AUTHORS
45 M. Drew Streib <dtype@dtype.org>,
46 .br
47 Thomas Roessler <roessler@does\-not\-exist.org>,
48 .br
49 Hal J. Burch <hburch@halport.lumeta.com>,
50 .br
51 Matt Kraai <kraai@alumni.carnegiemellon.edu>,
52 .br
53 Steve Langasek <vorlon@netexpress.net>,
54 .br
55 Matthew Wilcox <matthew@wil.cx>