pts-john

John the Ripper Test Phoronix

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2008049-AS-PTSJOHN5515
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
John the Ripper Test Phoronix
August 04 2020
  20 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


pts-johnOpenBenchmarking.orgPhoronix Test SuiteIntel Core i7-3770 @ 3.90GHz (4 Cores / 8 Threads)LENOVO MAHOBAY (9SKT39AUS BIOS)Intel Xeon E3-1200 v2/3rd8192 MB + 4096 MB DDR3-1600MT/s500GB Western Digital WD5000AAKX-0Intel Gen7 (1150MHz)Realtek ALC662 rev3Intel 82579LMFedora 315.7.9-100.fc31.x86_64 (x86_64)GNOME Shell 3.34.5X Server 1.20.6modesetting 1.20.6OpenCL 1.2 pocl 1.5-pre RelWithDebInfo LLVM 9.0.0 RELOC SLEEF DISTRO POCL_DEBUG + OpenCL 1.1 Mesa 19.2.8Clang 9.0.1 + LLVM 9.0.1ext4ProcessorMotherboardChipsetMemoryDiskGraphicsAudioNetworkOSKernelDesktopDisplay ServerDisplay DriverOpenCLCompilerFile-SystemPts-john BenchmarksSystem Logs- --build=x86_64-redhat-linux --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,objc,obj-c++,ada,go,d,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=i686 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver - Scaling Governor: intel_pstate powersave- itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Vulnerable: No microcode + tsx_async_abort: Not affected

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: BlowfishJohn the Ripper Test Phoronix12002400360048006000SE +/- 89.61, N = 155508

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: MD5John the Ripper Test Phoronix40K80K120K160K200KSE +/- 4358.24, N = 12208468