Uploaded By:Phoronix Test Suite
This is a benchmark of John The Ripper, which is a password cracker.
pts/john-the-ripper-1.5.1 [10 Aug 2014 12:14:29 EDT]- Support for building John The Ripper on non-x86 architectures. Change submitted by Michael Schloh.
pts/john-the-ripper-1.5.0 [10 Jan 2014 14:09:42 EST]- Update against upstream John The Ripper 1.8.0.
pts/john-the-ripper-1.4.1 [23 Jan 2013 13:14:38 EST]- Disable the cache share since the latest JTR upstream version seems to have issues with the parsing when using the PTS cache share.
pts/john-the-ripper-1.4.0 [04 Oct 2012 00:11:49 EDT]- Update against John The Ripper 1.7.9-jumbo-7 upstream plus use openssl-development external dependency.
pts/john-the-ripper-1.3.0 [21 Feb 2012 10:45:27 EST]- Set the OMPFLAGS on make.
pts/john-the-ripper-1.2.0 [07 Dec 2011 12:26:09 EST]- Update against John The Ripper 1.7.9 upstream.
pts/john-the-ripper-1.1.0 [27 Aug 2011 14:09:59 EDT]- Update against upstream John 1.7.8.
pts/john-the-ripper-1.0.1 [06 Dec 2010 14:53:59 EST]- Initial import into OpenBenchmarking.org
Find More Test Results
Post A Comment
Legal Disclaimer & Disclosure | Features | Contact
Copyright © 2010 - 2015 by Phoronix Media.
Powered By OpenBenchmarking.org Server b1190; pts-core HAMMERFEST.
OpenBenchmarking.org is a component of the Phoronix Test Suite.
All trademarks used are properties of their respective owners. All rights reserved.