* Import keyanalyze into signing-party. Thanks to Matthew Wilcox for the
[pgp-tools.git] / keyanalyze / keyanalyze.1
1 .\" keyanalyze, a program for analysing webs of trust
2 .\" manpage Copyright (C) 2004 Matthew Wilcox
3 .\"
4 .\" This program is free software; you can redistribute it and/or
5 .\" modify it under the terms of the GNU General Public License
6 .\" as published by the Free Software Foundation; either version 2
7 .\" of the License, or (at your option) any later version.
8 .\"
9 .TH keyanalyze 1
10
11 .SH NAME
12 keyanalyze \- Web of Trust analysis
13
14 .SH SYNTAX
15 \fBkeyanalyze\fP [ \fB\-i\fP \fIinfile\fP ] [ \fB\-o\fP \fIoutdir\fP ] [ \fB\-1\fP ]
16
17 .SH DESCRIPTION
18 \fIkeyanalyze\fP analyses the web of trust within a group of keys. It
19 takes preprocessed keys as input (see
20 .BR process_keys (1))
21 and produces an output directory full of statistics about the keys.
22
23 .SH OPTIONS
24 .TP
25 .BI \-i " infile"
26 Read from \fIinfile\fP instead of \fBpreprocess.keys\fP.
27 .TP
28 .BI \-o " outdir"
29 Put the results in \fIoutdir\fP instead of \fBoutput/\fP. The directory
30 will be created if it does not already exist.
31 .TP
32 .BI \-1
33 Per default, \fBkeyanalyze\fP writes the output into subdirectories named after
34 the first two characters of the key ID. This options disables this; useful for
35 small keyrings.
36
37 .SH AUTHORS
38 M. Drew Streib <dtype@dtype.org>,
39 .br
40 Thomas Roessler <roessler@does\-not\-exist.org>,
41 .br
42 Hal J. Burch <hburch@halport.lumeta.com>,
43 .br
44 Matt Kraai <kraai@alumni.carnegiemellon.edu>,
45 .br
46 Steve Langasek <vorlon@netexpress.net>,
47 .br
48 Matthew Wilcox <matthew@wil.cx>