How to Install and Uninstall golang-github-youmark-pkcs8-dev Package on Kali Linux
Last updated: December 23,2024
1. Install "golang-github-youmark-pkcs8-dev" package
This guide let you learn how to install golang-github-youmark-pkcs8-dev on Kali Linux
$
sudo apt update
Copied
$
sudo apt install
golang-github-youmark-pkcs8-dev
Copied
2. Uninstall "golang-github-youmark-pkcs8-dev" package
Please follow the guidelines below to uninstall golang-github-youmark-pkcs8-dev on Kali Linux:
$
sudo apt remove
golang-github-youmark-pkcs8-dev
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the golang-github-youmark-pkcs8-dev package on Kali Linux
Package: golang-github-youmark-pkcs8-dev
Source: golang-github-youmark-pkcs8
Version: 1.1-3
Installed-Size: 36
Maintainer: Debian Go Packaging Team
Architecture: all
Depends: golang-golang-x-crypto-dev
Size: 10744
SHA256: 8c4adc744a33837d35d2b68f2ba23e6695bc5febec2590e8b2b4a019e1b57cf3
SHA1: 5ec3572ac4d98ec9bddc666f709a4f5082f9e521
MD5sum: 6d1f65824a581aef41766ecb7ff1450a
Description: Go package to parse and convert private keys in PKCS#8 format (library)
pkcs8 OpenSSL can generate private keys in both "traditional format"
and PKCS#8 format. Newer applications are advised to use more
secure PKCS#8 format. Go standard crypto package provides a function
(http://golang.org/pkg/crypto/x509/#ParsePKCS8PrivateKey) to parse
private key in PKCS#8 format. There is a limitation to this function. It
can only handle unencrypted PKCS#8 private keys. To use this function,
the user has to save the private key in file without encryption, which
is a bad practice to leave private keys unprotected on file systems. In
addition, Go standard package lacks the functions to convert RSA/ECDSA
private keys into PKCS#8 format.
.
pkcs8 package fills the gap here. It implements functions
to process private keys in PKCS#8 format, as defined in
RFC5208 (https://tools.ietf.org/html/rfc5208) and RFC5958
(https://tools.ietf.org/html/rfc5958). It can handle both unencrypted
PKCS#8 PrivateKeyInfo format and EncryptedPrivateKeyInfo format with
PKCS#5 (v2.0) algorithms.
Description-md5:
Multi-Arch: foreign
Homepage: https://github.com/youmark/pkcs8
Section: golang
Priority: optional
Filename: pool/main/g/golang-github-youmark-pkcs8/golang-github-youmark-pkcs8-dev_1.1-3_all.deb
Source: golang-github-youmark-pkcs8
Version: 1.1-3
Installed-Size: 36
Maintainer: Debian Go Packaging Team
Architecture: all
Depends: golang-golang-x-crypto-dev
Size: 10744
SHA256: 8c4adc744a33837d35d2b68f2ba23e6695bc5febec2590e8b2b4a019e1b57cf3
SHA1: 5ec3572ac4d98ec9bddc666f709a4f5082f9e521
MD5sum: 6d1f65824a581aef41766ecb7ff1450a
Description: Go package to parse and convert private keys in PKCS#8 format (library)
pkcs8 OpenSSL can generate private keys in both "traditional format"
and PKCS#8 format. Newer applications are advised to use more
secure PKCS#8 format. Go standard crypto package provides a function
(http://golang.org/pkg/crypto/x509/#ParsePKCS8PrivateKey) to parse
private key in PKCS#8 format. There is a limitation to this function. It
can only handle unencrypted PKCS#8 private keys. To use this function,
the user has to save the private key in file without encryption, which
is a bad practice to leave private keys unprotected on file systems. In
addition, Go standard package lacks the functions to convert RSA/ECDSA
private keys into PKCS#8 format.
.
pkcs8 package fills the gap here. It implements functions
to process private keys in PKCS#8 format, as defined in
RFC5208 (https://tools.ietf.org/html/rfc5208) and RFC5958
(https://tools.ietf.org/html/rfc5958). It can handle both unencrypted
PKCS#8 PrivateKeyInfo format and EncryptedPrivateKeyInfo format with
PKCS#5 (v2.0) algorithms.
Description-md5:
Multi-Arch: foreign
Homepage: https://github.com/youmark/pkcs8
Section: golang
Priority: optional
Filename: pool/main/g/golang-github-youmark-pkcs8/golang-github-youmark-pkcs8-dev_1.1-3_all.deb