1keyanalyze(1)               General Commands Manual              keyanalyze(1)
2
3
4

NAME

6       keyanalyze - Web of Trust analysis
7
8

SYNTAX

10       keyanalyze [ -h1 ] [ -i infile ] [ -o outdir ]
11
12

DESCRIPTION

14       keyanalyze  analyses the web of trust within a group of keys.  It takes
15       preprocessed keys as input (see process_keys(1)) and produces an output
16       directory full of statistics about the keys.
17
18       Usually called like
19        $ pgpring -S -k ./keyring.gpg | process_keys > preprocess.keys
20        $ keyanalyze
21
22

OPTIONS

24       -i infile
25              Read from infile instead of preprocess.keys.
26
27       -o outdir
28              Put  the  results  in  outdir instead of output/.  The directory
29              will be created if it does not already exist.
30
31       -h     Print help.
32
33       -1     Per default, keyanalyze writes the  output  into  subdirectories
34              named after the first two characters of the key ID. This options
35              disables this; useful for small keyrings.
36
37

AUTHORS

39       M. Drew Streib <dtype@dtype.org>,
40       Thomas Roessler <roessler@does-not-exist.org>,
41       Hal J. Burch <hburch@halport.lumeta.com>,
42       Matt Kraai <kraai@alumni.carnegiemellon.edu>,
43       Steve Langasek <vorlon@netexpress.net>,
44       Matthew Wilcox <matthew@wil.cx>
45
46
47
48                                                                 keyanalyze(1)
Impressum