john-the-ripper-1.8.0-mllvm-zero-uninit-loads

john-the-ripper-1.8.0-mllvm-zero-uninit-loads

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2407225-NE-JOHNTHERI46
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
john-the-ripper-1.8.0-mllvm-zero-uninit-loads
July 22
  11 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


john-the-ripper-1.8.0-mllvm-zero-uninit-loadsOpenBenchmarking.orgPhoronix Test SuiteARMv8 Neoverse-N1 @ 3.00GHz (160 Cores)Oracle TLA MB TRAY A1-2c (77015500 BIOS)1008GB215GB BlockVolumemgag200drmfbUbuntu 22.046.5.0-1025-oracle (aarch64)1.3.255GCC 11.4.0ext41024x768ProcessorMotherboardMemoryDiskGraphicsOSKernelVulkanCompilerFile-SystemScreen ResolutionJohn-the-ripper-1.8.0-mllvm-zero-uninit-loads PerformanceSystem Logs- libiscsi.debug_libiscsi_eh=1 - Transparent Huge Pages: madvise- Scaling Governor: cppc_cpufreq performance (Boost: Disabled)- gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of CSV2 BHB + srbds: Not affected + tsx_async_abort: Not affected

john-the-ripper-1.8.0-mllvm-zero-uninit-loadsjohn-the-ripper: MD5john-the-ripper: HMAC-SHA512john-the-ripper: bcryptjohn-the-ripper: WPA PSKjohn-the-ripper: Blowfishjohn-the-ripper-1.8.0-mllvm-zero-uninit-loads2902013620009011080901OpenBenchmarking.org

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: MD5john-the-ripper-1.8.0-mllvm-zero-uninit-loads6K12K18K24K30KSE +/- 1.33, N = 329020

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: HMAC-SHA512john-the-ripper-1.8.0-mllvm-zero-uninit-loads300K600K900K1200K1500KSE +/- 0.00, N = 31362000

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: bcryptjohn-the-ripper-1.8.0-mllvm-zero-uninit-loads2004006008001000SE +/- 0.00, N = 3901

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: WPA PSKjohn-the-ripper-1.8.0-mllvm-zero-uninit-loads2004006008001000SE +/- 0.33, N = 31080

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: Blowfishjohn-the-ripper-1.8.0-mllvm-zero-uninit-loads2004006008001000SE +/- 0.00, N = 3901