john-the-ripper-base

john-the-ripper-base

HTML result view exported from: https://openbenchmarking.org/result/2406058-NE-JOHNTHERI61&grw.

john-the-ripper-baseProcessorMotherboardChipsetMemoryDiskGraphicsMonitorNetworkOSKernelDesktopDisplay ServerVulkanCompilerFile-SystemScreen Resolutionjohn-the-ripper-base2 x Intel Xeon E5-2680 v3 @ 3.30GHz (24 Cores / 48 Threads)Dell 0CN7X8 (2.7.1 BIOS)Intel Xeon E7 v3/Xeon32GB480GB INTEL SSDSC2BB480G7RMatrox G200eR2SMS27A350H4 x Broadcom NetXtreme BCM5720 PCIeUbuntu 22.045.15.0-82-generic (x86_64)GNOME Shell 42.9X Server 1.18.41.3.238Clang 18.0.0git + GCC 11.4.0nfs1024x768OpenBenchmarking.org- Transparent Huge Pages: madvise- LDFLAGS=- Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x49- gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected

john-the-ripper-basejohn-the-ripper: bcryptjohn-the-ripper: WPA PSKjohn-the-ripper: Blowfishjohn-the-ripper: HMAC-SHA512john-the-ripper: MD5john-the-ripper-base107324301072337200059671OpenBenchmarking.org

John The Ripper

Test: bcrypt

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: bcryptjohn-the-ripper-base2004006008001000SE +/- 0.58, N = 310731. (CC) clang options: -m64 -lssl -lcrypto -lgmp -lm -lrt -lz -ldl -lcrypt -lbz2 -mavx2 -O3 -march=native -Qunused-arguments -std=gnu89 -funroll-loops

John The Ripper

Test: WPA PSK

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: WPA PSKjohn-the-ripper-base5001000150020002500SE +/- 2.73, N = 324301. (CC) clang options: -m64 -lssl -lcrypto -lgmp -lm -lrt -lz -ldl -lcrypt -lbz2 -mavx2 -O3 -march=native -Qunused-arguments -std=gnu89 -funroll-loops

John The Ripper

Test: Blowfish

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: Blowfishjohn-the-ripper-base2004006008001000SE +/- 0.88, N = 310721. (CC) clang options: -m64 -lssl -lcrypto -lgmp -lm -lrt -lz -ldl -lcrypt -lbz2 -mavx2 -O3 -march=native -Qunused-arguments -std=gnu89 -funroll-loops

John The Ripper

Test: HMAC-SHA512

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: HMAC-SHA512john-the-ripper-base700K1400K2100K2800K3500KSE +/- 1154.70, N = 333720001. (CC) clang options: -m64 -lssl -lcrypto -lgmp -lm -lrt -lz -ldl -lcrypt -lbz2 -mavx2 -O3 -march=native -Qunused-arguments -std=gnu89 -funroll-loops

John The Ripper

Test: MD5

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: MD5john-the-ripper-base13K26K39K52K65KSE +/- 9.60, N = 3596711. (CC) clang options: -m64 -lssl -lcrypto -lgmp -lm -lrt -lz -ldl -lcrypt -lbz2 -mavx2 -O3 -march=native -Qunused-arguments -std=gnu89 -funroll-loops


Phoronix Test Suite v10.8.5