How to Install and Uninstall libmbedtls14 Package on openSUSE Leap
Last updated: December 24,2024
1. Install "libmbedtls14" package
Learn how to install libmbedtls14 on openSUSE Leap
$
sudo zypper refresh
Copied
$
sudo zypper install
libmbedtls14
Copied
2. Uninstall "libmbedtls14" package
Please follow the guidelines below to uninstall libmbedtls14 on openSUSE Leap:
$
sudo zypper remove
libmbedtls14
Copied
3. Information about the libmbedtls14 package on openSUSE Leap
Information for package libmbedtls14:
-------------------------------------
Repository : Update repository of openSUSE Backports
Name : libmbedtls14
Version : 2.28.7-bp155.2.3.1
Arch : x86_64
Vendor : openSUSE
Installed Size : 247.7 KiB
Installed : No
Status : not installed
Source package : mbedtls-2.28.7-bp155.2.3.1.src
Upstream URL : https://tls.mbed.org
Summary : Transport Layer Security protocol suite
Description :
mbedtls implements the SSL 3.0, TLS 1.0, 1.1 and 1.2 protocols. It
supports a number of extensions such as SSL Session Tickets (RFC
5077), Server Name Indication (SNI) (RFC 6066), Truncated HMAC (RFC
6066), Max Fragment Length (RFC 6066), Secure Renegotiation (RFC
5746) and Application Layer Protocol Negotiation (ALPN). It
understands the RSA, (EC)DH(E)-RSA, (EC)DH(E)-PSK and RSA-PSK key
exchanges.
-------------------------------------
Repository : Update repository of openSUSE Backports
Name : libmbedtls14
Version : 2.28.7-bp155.2.3.1
Arch : x86_64
Vendor : openSUSE
Installed Size : 247.7 KiB
Installed : No
Status : not installed
Source package : mbedtls-2.28.7-bp155.2.3.1.src
Upstream URL : https://tls.mbed.org
Summary : Transport Layer Security protocol suite
Description :
mbedtls implements the SSL 3.0, TLS 1.0, 1.1 and 1.2 protocols. It
supports a number of extensions such as SSL Session Tickets (RFC
5077), Server Name Indication (SNI) (RFC 6066), Truncated HMAC (RFC
6066), Max Fragment Length (RFC 6066), Secure Renegotiation (RFC
5746) and Application Layer Protocol Negotiation (ALPN). It
understands the RSA, (EC)DH(E)-RSA, (EC)DH(E)-PSK and RSA-PSK key
exchanges.