# Command Line
WARNING
This documentation is in progress.
# Setup
# Usage
- How to auth on the command line (
keys auth) - How to generate, list, remove, import/export keys (
keys generate,keys list...) - How to encrypt/decrypt files or piped data (
keys encrypt/decrypt) - How to sign/verify files or piped data (
keys sign/verify) - How to search for user keys and link a user to a key (
keys user search,keys user setup)