How to Install and Uninstall libkcapi.x86_64 Package on Red Hat Enterprise Linux 8 (RHEL 8)
Last updated: November 27,2024
1. Install "libkcapi.x86_64" package
Learn how to install libkcapi.x86_64 on Red Hat Enterprise Linux 8 (RHEL 8)
$
sudo dnf update
Copied
$
sudo dnf install
libkcapi.x86_64
Copied
2. Uninstall "libkcapi.x86_64" package
This tutorial shows how to uninstall libkcapi.x86_64 on Red Hat Enterprise Linux 8 (RHEL 8):
$
sudo dnf remove
libkcapi.x86_64
Copied
$
sudo dnf autoremove
Copied
3. Information about the libkcapi.x86_64 package on Red Hat Enterprise Linux 8 (RHEL 8)
Last metadata expiration check: 1:18:58 ago on Mon Feb 26 15:59:38 2024.
Available Packages
Name : libkcapi
Version : 1.2.0
Release : 2.el8
Architecture : x86_64
Size : 48 k
Source : libkcapi-1.2.0-2.el8.src.rpm
Repository : ubi-8-baseos-rpms
Summary : User space interface to the Linux Kernel Crypto API
URL : http://www.chronox.de/libkcapi.html
License : BSD or GPLv2
Description : libkcapi allows user-space to access the Linux kernel crypto API.
:
: This library uses the netlink interface and exports easy to use APIs
: so that a developer does not need to consider the low-level netlink
: interface handling.
:
: The library does not implement any cipher algorithms. All consumer
: requests are sent to the kernel for processing. Results from the
: kernel crypto API are returned to the consumer via the library API.
:
: The kernel interface and therefore this library can be used by
: unprivileged processes.
Available Packages
Name : libkcapi
Version : 1.2.0
Release : 2.el8
Architecture : x86_64
Size : 48 k
Source : libkcapi-1.2.0-2.el8.src.rpm
Repository : ubi-8-baseos-rpms
Summary : User space interface to the Linux Kernel Crypto API
URL : http://www.chronox.de/libkcapi.html
License : BSD or GPLv2
Description : libkcapi allows user-space to access the Linux kernel crypto API.
:
: This library uses the netlink interface and exports easy to use APIs
: so that a developer does not need to consider the low-level netlink
: interface handling.
:
: The library does not implement any cipher algorithms. All consumer
: requests are sent to the kernel for processing. Results from the
: kernel crypto API are returned to the consumer via the library API.
:
: The kernel interface and therefore this library can be used by
: unprivileged processes.