john-the-ripper-fwrapv

john-the-ripper-fwrapv

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2310264-NE-JOHNTHERI03
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
john-the-ripper-fwrapv
October 27 2023
  11 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


john-the-ripper-fwrapvOpenBenchmarking.orgPhoronix Test Suite2 x Intel Xeon E5-2680 v2 @ 3.60GHz (20 Cores / 40 Threads)HP 158A (J61 v03.69 BIOS)Intel Xeon E7 v2/Xeon64GB2000GB TOSHIBA DT01ACA2 + 256GB SanDisk SD8TB8U2NVIDIA NVE4 4GBRealtek ALC262LS24A40xUIntel 82579LM + Intel 82574LDebian 115.10.0-21-amd64 (x86_64)X Server 1.20.11nouveau4.3 Mesa 20.3.51.0.2GCC 10.2.1 20210110ext41920x1080ProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDisplay ServerDisplay DriverOpenGLVulkanCompilerFile-SystemScreen ResolutionJohn-the-ripper-fwrapv BenchmarksSystem Logs- Transparent Huge Pages: always- FLAGS=":-fwrapv:-fignore-pure-const-attrs:-fno-strict-aliasing:-fstrict-enums:-fno-delete-null-pointer-checks:-fconstrain-shift-value:-fno-finite-loops:-fno-constrain-bool-value:-fno-use-default-alignment:-fdrop-inbounds-from-gep -mllvm -disable-oob-analysis:-mllvm -zero-uninit-loads:-mllvm -disable-object-based-analysis:-fcheck-div-rem-overflow:-fdrop-noalias-restrict-attr:-fdrop-align-attr:-fdrop-deref-attr:-Xclang -no-enable-noundef-analysis:-fdrop-ub-builtins:-all" LDFLAGS= - Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x417- itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected

john-the-ripper-fwrapvjohn-the-ripper: bcryptjohn-the-ripper: WPA PSKjohn-the-ripper: Blowfishjohn-the-ripper: HMAC-SHA512john-the-ripper: MD5john-the-ripper-fwrapv110114831104206366742248OpenBenchmarking.org

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: bcryptjohn-the-ripper-fwrapv2004006008001000SE +/- 3.00, N = 31101

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: WPA PSKjohn-the-ripper-fwrapv30060090012001500SE +/- 0.67, N = 31483

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: Blowfishjohn-the-ripper-fwrapv20040060080010001104

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: HMAC-SHA512john-the-ripper-fwrapv400K800K1200K1600K2000KSE +/- 333.33, N = 32063667

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: MD5john-the-ripper-fwrapv9K18K27K36K45KSE +/- 7.54, N = 342248