How to Install and Uninstall libseteec0 Package on openSuSE Tumbleweed
Last updated: December 27,2024
1. Install "libseteec0" package
Please follow the guidelines below to install libseteec0 on openSuSE Tumbleweed
$
sudo zypper refresh
Copied
$
sudo zypper install
libseteec0
Copied
2. Uninstall "libseteec0" package
Please follow the step by step instructions below to uninstall libseteec0 on openSuSE Tumbleweed:
$
sudo zypper remove
libseteec0
Copied
3. Information about the libseteec0 package on openSuSE Tumbleweed
Information for package libseteec0:
-----------------------------------
Repository : openSUSE-Tumbleweed-Oss
Name : libseteec0
Version : 4.1.0-1.1
Arch : x86_64
Vendor : openSUSE
Installed Size : 14.2 KiB
Installed : No
Status : not installed
Source package : optee-client-4.1.0-1.1.src
Upstream URL : https://github.com/OP-TEE/optee_client
Summary : Library implementing the Secure Element control
Description :
When a Secure Element -supported by OP-TEE- enables SCP03, the
encryption keys could have been derived from the HUK and therefore not
known to the normal world.
In such circumstances, APDU frames will need to be routed to the
secure world for encryption before sending them to the SE and then
decrypted when processing the response.
Secure Elements supporting SCP03 are shipped with predefined keys
stored in persistent memory and documented in their data sheets.
This library provides an interface to enable SCP03 using those
non-secure keys. It also provides an interface to rotate these default
keys and derive board unique new ones before enabling the SCP03
session.
-----------------------------------
Repository : openSUSE-Tumbleweed-Oss
Name : libseteec0
Version : 4.1.0-1.1
Arch : x86_64
Vendor : openSUSE
Installed Size : 14.2 KiB
Installed : No
Status : not installed
Source package : optee-client-4.1.0-1.1.src
Upstream URL : https://github.com/OP-TEE/optee_client
Summary : Library implementing the Secure Element control
Description :
When a Secure Element -supported by OP-TEE- enables SCP03, the
encryption keys could have been derived from the HUK and therefore not
known to the normal world.
In such circumstances, APDU frames will need to be routed to the
secure world for encryption before sending them to the SE and then
decrypted when processing the response.
Secure Elements supporting SCP03 are shipped with predefined keys
stored in persistent memory and documented in their data sheets.
This library provides an interface to enable SCP03 using those
non-secure keys. It also provides an interface to rotate these default
keys and derive board unique new ones before enabling the SCP03
session.