How to Install and Uninstall blake3.x86_64 Package on Red Hat Enterprise Linux 8 (RHEL 8)
Last updated: November 23,2024
1. Install "blake3.x86_64" package
Please follow the step by step instructions below to install blake3.x86_64 on Red Hat Enterprise Linux 8 (RHEL 8)
$
sudo dnf update
Copied
$
sudo dnf install
blake3.x86_64
Copied
2. Uninstall "blake3.x86_64" package
This is a short guide on how to uninstall blake3.x86_64 on Red Hat Enterprise Linux 8 (RHEL 8):
$
sudo dnf remove
blake3.x86_64
Copied
$
sudo dnf autoremove
Copied
3. Information about the blake3.x86_64 package on Red Hat Enterprise Linux 8 (RHEL 8)
Last metadata expiration check: 1:58:56 ago on Mon Feb 26 15:59:38 2024.
Available Packages
Name : blake3
Version : 1.5.0
Release : 1.el8
Architecture : x86_64
Size : 38 k
Source : blake3-1.5.0-1.el8.src.rpm
Repository : epel
Summary : Official C implementation of the BLAKE3 cryptographic hash function
URL : https://github.com/BLAKE3-team/BLAKE3/
License : Apache-2.0
Description : BLAKE3 is a cryptographic hash function that is:
: - Much faster than MD5, SHA-1, SHA-2, SHA-3, and BLAKE2.
: - Secure, unlike MD5 and SHA-1. And secure against length extension, unlike
: SHA-2.
: - Highly parallelizable across any number of threads and SIMD lanes, because
: it's a Merkle tree on the inside.
: - Capable of verified streaming and incremental updates, again because it's a
: Merkle tree.
: - A PRF, MAC, KDF, and XOF, as well as a regular hash.
: - One algorithm with no variants, which is fast on x86-64 and also on smaller
: architectures.
Available Packages
Name : blake3
Version : 1.5.0
Release : 1.el8
Architecture : x86_64
Size : 38 k
Source : blake3-1.5.0-1.el8.src.rpm
Repository : epel
Summary : Official C implementation of the BLAKE3 cryptographic hash function
URL : https://github.com/BLAKE3-team/BLAKE3/
License : Apache-2.0
Description : BLAKE3 is a cryptographic hash function that is:
: - Much faster than MD5, SHA-1, SHA-2, SHA-3, and BLAKE2.
: - Secure, unlike MD5 and SHA-1. And secure against length extension, unlike
: SHA-2.
: - Highly parallelizable across any number of threads and SIMD lanes, because
: it's a Merkle tree on the inside.
: - Capable of verified streaming and incremental updates, again because it's a
: Merkle tree.
: - A PRF, MAC, KDF, and XOF, as well as a regular hash.
: - One algorithm with no variants, which is fast on x86-64 and also on smaller
: architectures.