How to Install and Uninstall libsodium.i686 Package on Fedora 34
Last updated: February 12,2025
1. Install "libsodium.i686" package
This guide let you learn how to install libsodium.i686 on Fedora 34
$
sudo dnf update
Copied
$
sudo dnf install
libsodium.i686
Copied
2. Uninstall "libsodium.i686" package
Please follow the instructions below to uninstall libsodium.i686 on Fedora 34:
$
sudo dnf remove
libsodium.i686
Copied
$
sudo dnf autoremove
Copied
3. Information about the libsodium.i686 package on Fedora 34
Last metadata expiration check: 1:47:31 ago on Tue Sep 6 08:10:37 2022.
Available Packages
Name : libsodium
Version : 1.0.18
Release : 7.fc34
Architecture : i686
Size : 188 k
Source : libsodium-1.0.18-7.fc34.src.rpm
Repository : fedora
Summary : The Sodium crypto library
URL : http://libsodium.org/
License : ISC
Description : Sodium is a new, easy-to-use software library for encryption, decryption,
: signatures, password hashing and more. It is a portable, cross-compilable,
: installable, packageable fork of NaCl, with a compatible API, and an extended
: API to improve usability even further. Its goal is to provide all of the core
: operations needed to build higher-level cryptographic tools. The design
: choices emphasize security, and "magic constants" have clear rationales.
:
: The same cannot be said of NIST curves, where the specific origins of certain
: constants are not described by the standards. And despite the emphasis on
: higher security, primitives are faster across-the-board than most
: implementations of the NIST standards.
Available Packages
Name : libsodium
Version : 1.0.18
Release : 7.fc34
Architecture : i686
Size : 188 k
Source : libsodium-1.0.18-7.fc34.src.rpm
Repository : fedora
Summary : The Sodium crypto library
URL : http://libsodium.org/
License : ISC
Description : Sodium is a new, easy-to-use software library for encryption, decryption,
: signatures, password hashing and more. It is a portable, cross-compilable,
: installable, packageable fork of NaCl, with a compatible API, and an extended
: API to improve usability even further. Its goal is to provide all of the core
: operations needed to build higher-level cryptographic tools. The design
: choices emphasize security, and "magic constants" have clear rationales.
:
: The same cannot be said of NIST curves, where the specific origins of certain
: constants are not described by the standards. And despite the emphasis on
: higher security, primitives are faster across-the-board than most
: implementations of the NIST standards.