File: gpgme.info, Node: Crypto Operations, Next: Miscellaneous, Prev: Key Management, Up: Contexts 7.6 Crypto Operations ===================== Sometimes, the result of a crypto operation returns a list of invalid keys encountered in processing the request. The following structure is used to hold information about such a key. -- Data type: gpgme_invalid_key_t This is a pointer to a structure used to store a part of the result of a crypto operation which takes user IDs as one input parameter. The structure contains the following members: ‘gpgme_invalid_key_t next’ This is a pointer to the next invalid key structure in the linked list, or ‘NULL’ if this is the last element. ‘char *fpr’ The fingerprint or key ID of the invalid key encountered. ‘gpgme_error_t reason’ An error code describing the reason why the key was found invalid. * Menu: * Decrypt:: Decrypting a ciphertext. * Verify:: Verifying a signature. * Decrypt and Verify:: Decrypting a signed ciphertext. * Sign:: Creating a signature. * Encrypt:: Encrypting a plaintext.