How to Install and Uninstall libtomcrypt.i686 Package on Fedora 36
Last updated: January 09,2025
1. Install "libtomcrypt.i686" package
Please follow the steps below to install libtomcrypt.i686 on Fedora 36
$
sudo dnf update
Copied
$
sudo dnf install
libtomcrypt.i686
Copied
2. Uninstall "libtomcrypt.i686" package
Here is a brief guide to show you how to uninstall libtomcrypt.i686 on Fedora 36:
$
sudo dnf remove
libtomcrypt.i686
Copied
$
sudo dnf autoremove
Copied
3. Information about the libtomcrypt.i686 package on Fedora 36
Last metadata expiration check: 2:23:57 ago on Thu Sep 8 02:05:26 2022.
Available Packages
Name : libtomcrypt
Version : 1.18.2
Release : 14.fc36
Architecture : i686
Size : 405 k
Source : libtomcrypt-1.18.2-14.fc36.src.rpm
Repository : fedora
Summary : A comprehensive, portable cryptographic toolkit
URL : http://www.libtom.net/
License : Public Domain or WTFPL
Description : A comprehensive, modular and portable cryptographic toolkit that provides
: developers with a vast array of well known published block ciphers, one-way hash
: functions, chaining modes, pseudo-random number generators, public key
: cryptography and a plethora of other routines.
:
: Designed from the ground up to be very simple to use. It has a modular and
: standard API that allows new ciphers, hashes and PRNGs to be added or removed
: without change to the overall end application. It features easy to use functions
: and a complete user manual which has many source snippet examples.
Available Packages
Name : libtomcrypt
Version : 1.18.2
Release : 14.fc36
Architecture : i686
Size : 405 k
Source : libtomcrypt-1.18.2-14.fc36.src.rpm
Repository : fedora
Summary : A comprehensive, portable cryptographic toolkit
URL : http://www.libtom.net/
License : Public Domain or WTFPL
Description : A comprehensive, modular and portable cryptographic toolkit that provides
: developers with a vast array of well known published block ciphers, one-way hash
: functions, chaining modes, pseudo-random number generators, public key
: cryptography and a plethora of other routines.
:
: Designed from the ground up to be very simple to use. It has a modular and
: standard API that allows new ciphers, hashes and PRNGs to be added or removed
: without change to the overall end application. It features easy to use functions
: and a complete user manual which has many source snippet examples.