john-the-ripper-1.8.0-fdrop-deref-attr

john-the-ripper-1.8.0-fdrop-deref-attr

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2407256-NE-JOHNTHERI37
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
john-the-ripper-1.8.0-fdrop-deref-attr
July 25
  11 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


john-the-ripper-1.8.0-fdrop-deref-attrOpenBenchmarking.orgPhoronix Test Suite2 x AMD EPYC 9J14 96-Core @ 2.60GHz (192 Cores)Oracle Asm MB+Tray E5-2c (83040400 BIOS)AMD Device 14a42272GB215GB BlockVolumeASPEED2 x Mellanox MT2892Ubuntu 22.046.5.0-1025-oracle (x86_64)1.3.255GCC 11.4.0ext41024x768ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelVulkanCompilerFile-SystemScreen ResolutionJohn-the-ripper-1.8.0-fdrop-deref-attr BenchmarksSystem Logs- libiscsi.debug_libiscsi_eh=1 - Transparent Huge Pages: madvise- Scaling Governor: acpi-cpufreq performance (Boost: Disabled) - CPU Microcode: 0xa10113e - gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Mitigation of Safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; STIBP: always-on; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected

john-the-ripper-1.8.0-fdrop-deref-attrjohn-the-ripper: bcryptjohn-the-ripper: WPA PSKjohn-the-ripper: Blowfishjohn-the-ripper: HMAC-SHA512john-the-ripper: MD5john-the-ripper-1.8.0-fdrop-deref-attr1108486011088409000138758OpenBenchmarking.org

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: bcryptjohn-the-ripper-1.8.0-fdrop-deref-attr2004006008001000SE +/- 0.58, N = 31108

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: WPA PSKjohn-the-ripper-1.8.0-fdrop-deref-attr10002000300040005000SE +/- 5.67, N = 34860

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: Blowfishjohn-the-ripper-1.8.0-fdrop-deref-attr2004006008001000SE +/- 0.33, N = 31108

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: HMAC-SHA512john-the-ripper-1.8.0-fdrop-deref-attr2M4M6M8M10MSE +/- 1154.70, N = 38409000

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: MD5john-the-ripper-1.8.0-fdrop-deref-attr30K60K90K120K150KSE +/- 444.65, N = 3138758