john-the-ripper-1.8.0-fno-delete-null-pointer-checks

john-the-ripper-1.8.0-fno-delete-null-pointer-checks

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2407152-NE-JOHNTHERI44
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
john-the-ripper-1.8.0-fno-delete-null-pointer-checks
July 15
  12 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


john-the-ripper-1.8.0-fno-delete-null-pointer-checksOpenBenchmarking.orgPhoronix Test Suite2 x AMD EPYC 9J14 96-Core @ 2.60GHz (192 Cores)Oracle Asm MB+Tray E5-2c (83040400 BIOS)AMD Device 14a42272GB215GB BlockVolumeASPEED2 x Mellanox MT2892Ubuntu 22.046.5.0-1025-oracle (x86_64)1.3.255GCC 11.4.0ext41024x768ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelVulkanCompilerFile-SystemScreen ResolutionJohn-the-ripper-1.8.0-fno-delete-null-pointer-checks PerformanceSystem Logs- libiscsi.debug_libiscsi_eh=1 - Transparent Huge Pages: madvise- Scaling Governor: acpi-cpufreq performance (Boost: Disabled) - CPU Microcode: 0xa10113e- gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Mitigation of Safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; STIBP: always-on; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected

john-the-ripper-1.8.0-fno-delete-null-pointer-checksjohn-the-ripper: bcryptjohn-the-ripper: WPA PSKjohn-the-ripper: Blowfishjohn-the-ripper: HMAC-SHA512john-the-ripper: MD5john-the-ripper-1.8.0-fno-delete-null-pointer-checks1108484511098405667138871OpenBenchmarking.org

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: bcryptjohn-the-ripper-1.8.0-fno-delete-null-pointer-checks2004006008001000SE +/- 0.33, N = 31108

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: WPA PSKjohn-the-ripper-1.8.0-fno-delete-null-pointer-checks10002000300040005000SE +/- 20.50, N = 54845

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: Blowfishjohn-the-ripper-1.8.0-fno-delete-null-pointer-checks2004006008001000SE +/- 0.33, N = 31109

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: HMAC-SHA512john-the-ripper-1.8.0-fno-delete-null-pointer-checks2M4M6M8M10MSE +/- 1452.97, N = 38405667

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: MD5john-the-ripper-1.8.0-fno-delete-null-pointer-checks30K60K90K120K150KSE +/- 273.14, N = 3138871