john-the-ripper-1.8.0-fcheck-div-rem-overflow

john-the-ripper-1.8.0-fcheck-div-rem-overflow

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2407232-NE-JOHNTHERI71
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
john-the-ripper-1.8.0-fcheck-div-rem-overflow
July 23
  14 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


john-the-ripper-1.8.0-fcheck-div-rem-overflowOpenBenchmarking.orgPhoronix Test Suite2 x AMD EPYC 9J14 96-Core @ 2.60GHz (192 Cores)Oracle Asm MB+Tray E5-2c (83040400 BIOS)AMD Device 14a42272GB215GB BlockVolumeASPEED2 x Mellanox MT2892Ubuntu 22.046.5.0-1025-oracle (x86_64)1.3.255GCC 11.4.0ext41024x768ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelVulkanCompilerFile-SystemScreen ResolutionJohn-the-ripper-1.8.0-fcheck-div-rem-overflow BenchmarksSystem Logs- libiscsi.debug_libiscsi_eh=1 - Transparent Huge Pages: madvise- Scaling Governor: acpi-cpufreq performance (Boost: Disabled) - CPU Microcode: 0xa10113e- gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Mitigation of Safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; STIBP: always-on; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected

john-the-ripper-1.8.0-fcheck-div-rem-overflowjohn-the-ripper: WPA PSKjohn-the-ripper: MD5john-the-ripper: HMAC-SHA512john-the-ripper: bcryptjohn-the-ripper: Blowfishjohn-the-ripper-1.8.0-fcheck-div-rem-overflow4839139209839700011081103OpenBenchmarking.org

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: WPA PSKjohn-the-ripper-1.8.0-fcheck-div-rem-overflow10002000300040005000SE +/- 16.62, N = 84839

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: MD5john-the-ripper-1.8.0-fcheck-div-rem-overflow30K60K90K120K150KSE +/- 114.10, N = 3139209

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: HMAC-SHA512john-the-ripper-1.8.0-fcheck-div-rem-overflow2M4M6M8M10MSE +/- 3511.88, N = 38397000

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: bcryptjohn-the-ripper-1.8.0-fcheck-div-rem-overflow2004006008001000SE +/- 0.00, N = 31108

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: Blowfishjohn-the-ripper-1.8.0-fcheck-div-rem-overflow2004006008001000SE +/- 5.17, N = 31103