How to Install and Uninstall libtomcrypt.x86_64 Package on Red Hat Enterprise Linux 8 (RHEL 8)
Last updated: November 29,2024
1. Install "libtomcrypt.x86_64" package
Please follow the step by step instructions below to install libtomcrypt.x86_64 on Red Hat Enterprise Linux 8 (RHEL 8)
$
sudo dnf update
Copied
$
sudo dnf install
libtomcrypt.x86_64
Copied
2. Uninstall "libtomcrypt.x86_64" package
This guide let you learn how to uninstall libtomcrypt.x86_64 on Red Hat Enterprise Linux 8 (RHEL 8):
$
sudo dnf remove
libtomcrypt.x86_64
Copied
$
sudo dnf autoremove
Copied
3. Information about the libtomcrypt.x86_64 package on Red Hat Enterprise Linux 8 (RHEL 8)
Last metadata expiration check: 0:13:22 ago on Mon Feb 26 15:59:38 2024.
Available Packages
Name : libtomcrypt
Version : 1.18.2
Release : 5.el8
Architecture : x86_64
Size : 384 k
Source : libtomcrypt-1.18.2-5.el8.src.rpm
Repository : epel
Summary : A comprehensive, portable cryptographic toolkit
URL : http://www.libtom.net/
License : Public Domain or WTFPL
Description : A comprehensive, modular and portable cryptographic toolkit that provides
: developers with a vast array of well known published block ciphers, one-way hash
: functions, chaining modes, pseudo-random number generators, public key
: cryptography and a plethora of other routines.
:
: Designed from the ground up to be very simple to use. It has a modular and
: standard API that allows new ciphers, hashes and PRNGs to be added or removed
: without change to the overall end application. It features easy to use functions
: and a complete user manual which has many source snippet examples.
Available Packages
Name : libtomcrypt
Version : 1.18.2
Release : 5.el8
Architecture : x86_64
Size : 384 k
Source : libtomcrypt-1.18.2-5.el8.src.rpm
Repository : epel
Summary : A comprehensive, portable cryptographic toolkit
URL : http://www.libtom.net/
License : Public Domain or WTFPL
Description : A comprehensive, modular and portable cryptographic toolkit that provides
: developers with a vast array of well known published block ciphers, one-way hash
: functions, chaining modes, pseudo-random number generators, public key
: cryptography and a plethora of other routines.
:
: Designed from the ground up to be very simple to use. It has a modular and
: standard API that allows new ciphers, hashes and PRNGs to be added or removed
: without change to the overall end application. It features easy to use functions
: and a complete user manual which has many source snippet examples.