john-the-ripper-1.8.0-fdrop-deref-attr

john-the-ripper-1.8.0-fdrop-deref-attr

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2403163-NE-JOHNTHERI54
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
john-the-ripper-1.8.0-fdrop-deref-attr
March 16
  11 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


john-the-ripper-1.8.0-fdrop-deref-attrOpenBenchmarking.orgPhoronix Test SuiteIntel Core i5-10500 @ 3.10GHz (6 Cores)Dell 0NDYHG (1.25.0 BIOS)Intel Tiger Lake-H8GBPC SN730 NVMe WDC 256GB + 1000GB MB001000GWFGF + 0GB SD Card ReaderIntel CometLake-S GT2 [UHD 630] (1150MHz)Realtek ALC3246IntelDebian 126.1.0-13-amd64 (x86_64)X Server 1.21.1.7GCC 12.2.0ext4ProcessorMotherboardChipsetMemoryDiskGraphicsAudioNetworkOSKernelDisplay ServerCompilerFile-SystemJohn-the-ripper-1.8.0-fdrop-deref-attr BenchmarksSystem Logs- Transparent Huge Pages: always- LDFLAGS=- Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0xf8- gather_data_sampling: Mitigation of Microcode + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT disabled + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Mitigation of Microcode + tsx_async_abort: Not affected

john-the-ripper-1.8.0-fdrop-deref-attrjohn-the-ripper: bcryptjohn-the-ripper: WPA PSKjohn-the-ripper: Blowfishjohn-the-ripper: HMAC-SHA512john-the-ripper: MD5john-the-ripper-1.8.0-fdrop-deref-attr115622151155416333366579OpenBenchmarking.org

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: bcryptjohn-the-ripper-1.8.0-fdrop-deref-attr2004006008001000SE +/- 0.67, N = 31156

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: WPA PSKjohn-the-ripper-1.8.0-fdrop-deref-attr5001000150020002500SE +/- 6.17, N = 32215

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: Blowfishjohn-the-ripper-1.8.0-fdrop-deref-attr2004006008001000SE +/- 1.67, N = 31155

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: HMAC-SHA512john-the-ripper-1.8.0-fdrop-deref-attr900K1800K2700K3600K4500KSE +/- 333.33, N = 34163333

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: MD5john-the-ripper-1.8.0-fdrop-deref-attr14K28K42K56K70KSE +/- 35.10, N = 366579