How to Install and Uninstall cryptlib.x86_64 Package on Fedora 38

Last updated: October 13,2024

1. Install "cryptlib.x86_64" package

Please follow the step by step instructions below to install cryptlib.x86_64 on Fedora 38

$ sudo dnf update $ sudo dnf install cryptlib.x86_64

2. Uninstall "cryptlib.x86_64" package

Please follow the step by step instructions below to uninstall cryptlib.x86_64 on Fedora 38:

$ sudo dnf remove cryptlib.x86_64 $ sudo dnf autoremove

3. Information about the cryptlib.x86_64 package on Fedora 38

Last metadata expiration check: 2:33:23 ago on Sat Mar 16 22:59:57 2024.
Available Packages
Name : cryptlib
Version : 3.4.7
Release : 4.fc38
Architecture : x86_64
Size : 775 k
Source : cryptlib-3.4.7-4.fc38.src.rpm
Repository : updates
Summary : Security library and toolkit for encryption and authentication services
URL : https://www.cs.auckland.ac.nz/~pgut001/cryptlib
License : Sleepycat and OpenSSL
Description : Cryptlib is a powerful security toolkit that allows even inexperienced crypto
: programmers to easily add encryption and authentication services to their
: software. The high-level interface provides anyone with the ability to add
: strong security capabilities to an application in as little as half an hour,
: without needing to know any of the low-level details that make the encryption
: or authentication work. Because of this, cryptlib dramatically reduces the
: cost involved in adding security to new or existing applications.
:
: At the highest level, cryptlib provides implementations of complete security
: services such as S/MIME and PGP/OpenPGP secure enveloping, SSL/TLS and
: SSH secure sessions, CA services such as CMP, SCEP, RTCS, and OCSP, and other
: security operations such as secure time-stamping. Since cryptlib uses
: industry-standard X.509, S/MIME, PGP/OpenPGP, and SSH/SSL/TLS data formats,
: the resulting encrypted or signed data can be easily transported to other
: systems and processed there, and cryptlib itself runs on virtually any
: operating system - cryptlib doesn't tie you to a single system.
: This allows email, files and EDI transactions to be authenticated with
: digital signatures and encrypted in an industry-standard format.