john-the-ripper-1.8.0-Xclang-no-enable-noundef-analysis

john-the-ripper-1.8.0-Xclang-no-enable-noundef-analysis

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2403179-NE-JOHNTHERI31
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
john-the-ripper-1.8.0-Xclang-no-enable-noundef-analysis
March 17
  11 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


john-the-ripper-1.8.0-Xclang-no-enable-noundef-analysisOpenBenchmarking.orgPhoronix Test SuiteIntel Core i5-10500 @ 3.10GHz (6 Cores)Dell 0NDYHG (1.25.0 BIOS)Intel Tiger Lake-H8GBPC SN730 NVMe WDC 256GB + 1000GB MB001000GWFGF + 0GB SD Card ReaderIntel CometLake-S GT2 [UHD 630] (1150MHz)Realtek ALC3246IntelDebian 126.1.0-13-amd64 (x86_64)X Server 1.21.1.7GCC 12.2.0ext4ProcessorMotherboardChipsetMemoryDiskGraphicsAudioNetworkOSKernelDisplay ServerCompilerFile-SystemJohn-the-ripper-1.8.0-Xclang-no-enable-noundef-analysis PerformanceSystem Logs- Transparent Huge Pages: always- LDFLAGS=- Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0xf8- gather_data_sampling: Mitigation of Microcode + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT disabled + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Mitigation of Microcode + tsx_async_abort: Not affected

john-the-ripper-1.8.0-Xclang-no-enable-noundef-analysisjohn-the-ripper: bcryptjohn-the-ripper: WPA PSKjohn-the-ripper: Blowfishjohn-the-ripper: HMAC-SHA512john-the-ripper: MD5john-the-ripper-1.8.0-Xclang-no-enable-noundef-analysis115722201157415733366746OpenBenchmarking.org

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: bcryptjohn-the-ripper-1.8.0-Xclang-no-enable-noundef-analysis2004006008001000SE +/- 0.88, N = 31157

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: WPA PSKjohn-the-ripper-1.8.0-Xclang-no-enable-noundef-analysis5001000150020002500SE +/- 0.00, N = 32220

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: Blowfishjohn-the-ripper-1.8.0-Xclang-no-enable-noundef-analysis2004006008001000SE +/- 0.00, N = 31157

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: HMAC-SHA512john-the-ripper-1.8.0-Xclang-no-enable-noundef-analysis900K1800K2700K3600K4500KSE +/- 4255.72, N = 34157333

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: MD5john-the-ripper-1.8.0-Xclang-no-enable-noundef-analysis14K28K42K56K70KSE +/- 12.74, N = 366746