How to Install and Uninstall cryptlib.i686 Package on Fedora 34

Last updated: November 26,2024

1. Install "cryptlib.i686" package

Here is a brief guide to show you how to install cryptlib.i686 on Fedora 34

$ sudo dnf update $ sudo dnf install cryptlib.i686

2. Uninstall "cryptlib.i686" package

Here is a brief guide to show you how to uninstall cryptlib.i686 on Fedora 34:

$ sudo dnf remove cryptlib.i686 $ sudo dnf autoremove

3. Information about the cryptlib.i686 package on Fedora 34

Last metadata expiration check: 2:34:20 ago on Tue Sep 6 08:10:37 2022.
Available Packages
Name : cryptlib
Version : 3.4.5
Release : 15.fc34
Architecture : i686
Size : 764 k
Source : cryptlib-3.4.5-15.fc34.src.rpm
Repository : fedora
Summary : Security library and toolkit for encryption and authentication services
URL : https://www.cs.auckland.ac.nz/~pgut001/cryptlib
License : Sleepycat and OpenSSL
Description : Cryptlib is a powerful security toolkit that allows even inexperienced crypto
: programmers to easily add encryption and authentication services to their
: software. The high-level interface provides anyone with the ability to add
: strong security capabilities to an application in as little as half an hour,
: without needing to know any of the low-level details that make the encryption
: or authentication work. Because of this, cryptlib dramatically reduces the
: cost involved in adding security to new or existing applications.
:
: At the highest level, cryptlib provides implementations of complete security
: services such as S/MIME and PGP/OpenPGP secure enveloping, SSL/TLS and
: SSH secure sessions, CA services such as CMP, SCEP, RTCS, and OCSP, and other
: security operations such as secure time-stamping. Since cryptlib uses
: industry-standard X.509, S/MIME, PGP/OpenPGP, and SSH/SSL/TLS data formats,
: the resulting encrypted or signed data can be easily transported to other
: systems and processed there, and cryptlib itself runs on virtually any
: operating system - cryptlib doesn't tie you to a single system.
: This allows email, files and EDI transactions to be authenticated with
: digital signatures and encrypted in an industry-standard format.