test01

First Test using John-The-Ripper with suite

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 1911197-AS-TEST0102678
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
firsttest
November 19 2019
  5 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


test01OpenBenchmarking.orgPhoronix Test SuiteIntel Core i5 @ 1.80GHz (2 Cores / 4 Threads)Apple MacBook AirApple SSD2 x 4 GB DDR3-1600MHz251GB APPLE SSD SM0256GIntel HD 6000 2GBCmacOS 10.14.618.7.0 (x86_64)Apple LLVM 10.0.1 (clang-1001.0.46.4) + GCC 4.2.1NTFS1440x900ProcessorMotherboardChipsetMemoryDiskGraphicsMonitorOSKernelCompilerFile-SystemScreen ResolutionTest01 BenchmarksSystem Logs- XPC_FLAGS=0x0

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: Blowfishfirsttest2004006008001000SE +/- 12.72, N = 310961. (CC) gcc options: -m64 -lssl -lcrypto -pthread -lm -lz -ldl -lbz2 -mavx2 -O3 -march=native -std=gnu89 -Qunused-arguments -funroll-loops

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: MD5firsttest13K26K39K52K65KSE +/- 665.58, N = 3602081. (CC) gcc options: -m64 -lssl -lcrypto -pthread -lm -lz -ldl -lbz2 -mavx2 -O3 -march=native -std=gnu89 -Qunused-arguments -funroll-loops