Sometimes, the result of a crypto operation returns a list of invalid keys encountered in processing the request. The following structure is used to hold information about such a key.
This is a pointer to a structure used to store a part of the result of a crypto operation which takes user IDs as one input parameter. The structure contains the following members:
This is a pointer to the next invalid key structure in the linked
NULL if this is the last element.
The fingerprint or key ID of the invalid key encountered.
An error code describing the reason why the key was found invalid.
|• Decrypt:||Decrypting a ciphertext.|
|• Verify:||Verifying a signature.|
|• Decrypt and Verify:||Decrypting a signed ciphertext.|
|• Sign:||Creating a signature.|
|• Encrypt:||Encrypting a plaintext.|