john-the-ripper-1.8.0-fignore-pure-const-attrs

john-the-ripper-1.8.0-fignore-pure-const-attrs

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2311097-NE-JOHNTHERI13
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
john-the-ripper-1.8.0-fignore-pure-const-attrs
November 09 2023
  11 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


john-the-ripper-1.8.0-fignore-pure-const-attrsOpenBenchmarking.orgPhoronix Test SuiteIntel Core i5-10500 @ 4.50GHz (6 Cores / 12 Threads)Dell 0NDYHG (1.5.2 BIOS)Intel Tiger Lake-H8GB1000GB MB001000GWFGF + 0GB SD Card ReaderIntel CometLake-S GT2 [UHD 630] (1150MHz)Realtek ALC3246LS24A40xUIntelDebian 126.1.0-13-amd64 (x86_64)GNOME Shell 43.6X ServerGCC 12.2.0ext41920x1080ProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDesktopDisplay ServerCompilerFile-SystemScreen ResolutionJohn-the-ripper-1.8.0-fignore-pure-const-attrs PerformanceSystem Logs- Transparent Huge Pages: always- FLAGS=-fignore-pure-const-attrs LDFLAGS=- Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0xf8- gather_data_sampling: Mitigation of Microcode + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Mitigation of Microcode + tsx_async_abort: Not affected

john-the-ripper-1.8.0-fignore-pure-const-attrsjohn-the-ripper: bcryptjohn-the-ripper: WPA PSKjohn-the-ripper: Blowfishjohn-the-ripper: HMAC-SHA512john-the-ripper: MD5john-the-ripper-1.8.0-fignore-pure-const-attrs167732241677603433396977OpenBenchmarking.org

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: bcryptjohn-the-ripper-1.8.0-fignore-pure-const-attrs400800120016002000SE +/- 0.33, N = 31677

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: WPA PSKjohn-the-ripper-1.8.0-fignore-pure-const-attrs7001400210028003500SE +/- 7.36, N = 33224

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: Blowfishjohn-the-ripper-1.8.0-fignore-pure-const-attrs400800120016002000SE +/- 0.33, N = 31677

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: HMAC-SHA512john-the-ripper-1.8.0-fignore-pure-const-attrs1.3M2.6M3.9M5.2M6.5MSE +/- 881.92, N = 36034333

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: MD5john-the-ripper-1.8.0-fignore-pure-const-attrs20K40K60K80K100KSE +/- 11.57, N = 396977