Tests
Suites
Latest Results
Search
Register
Login
Popular Tests
Timed Linux Kernel Compilation
SVT-AV1
7-Zip Compression
Stockfish
x265
FFmpeg
Newest Tests
LiteRT
WarpX
Epoch
Valkey
Whisperfile
XNNPACK
Recently Updated Tests
ASTC Encoder
SVT-AV1
Unvanquished
Primesieve
XNNPACK
oneDNN
New & Recently Updated Tests
Recently Updated Suites
Database Test Suite
Machine Learning
Steam
New & Recently Updated Suites
Component Benchmarks
CPUs / Processors
GPUs / Graphics
OpenGL
Disks / Storage
Motherboards
File-Systems
Operating Systems
OpenBenchmarking.org
Corporate / Organization Info
Bug Reports / Feature Requests
John The Ripper 1.6.2
pts/john-the-ripper-1.6.2
- 07 April 2018 -
Use gmake on BSDs
downloads.xml
<?xml version="1.0"?> <!--Phoronix Test Suite v8.0.0m2--> <PhoronixTestSuite> <Downloads> <Package> <URL>http://www.openwall.com/john/j/john-1.8.0-jumbo-1.tar.gz, http://distro.ibiblio.org/openwall/projects/john/1.8.0/john-1.8.0-jumbo-1.tar.gz, http://download.openwall.net/pub/projects/john/1.8.0/john-1.8.0-jumbo-1.tar.gz</URL> <MD5>69f6a26037ad56676116ea2114f35a79</MD5> <SHA256>8a059d3caa798e2eb1eddacefb5c4d886c8df55dbf3eac314648bee499eec65d</SHA256> <FileSize>30786455</FileSize> <PlatformSpecific>Linux, Solaris, BSD, MacOSX</PlatformSpecific> </Package> <Package> <URL>http://www.openwall.com/john/j/john180j1w.zip, http://distro.ibiblio.org/openwall/projects/john/1.8.0/john180j1w.zip, http://download.openwall.net/pub/projects/john/1.8.0/john180j1w.zip</URL> <MD5>40c348e5bfc020d1ea09ee2d857d54f6</MD5> <SHA256>05c6a884248c76e8774131b621624d6e31a635003204e8232e2dc49292ae8aa0</SHA256> <FileSize>35585413</FileSize> <PlatformSpecific>Windows</PlatformSpecific> </Package> </Downloads> </PhoronixTestSuite>
install.sh
#!/bin/sh tar -zxvf john-1.8.0-jumbo-1.tar.gz cd john-1.8.0-jumbo-1/src/ CFLAGS="-O3 -march=native $CFLAGS -std=gnu89" ./configure --disable-native-tests --disable-opencl CFLAGS="-O3 -march=native $CFLAGS -std=gnu89" make -j $NUM_CPU_CORES echo $? > ~/install-exit-status cd ~/ echo "#!/bin/sh cd john-1.8.0-jumbo-1/run/ ./john \$@ > \$LOG_FILE 2>&1 echo \$? > ~/test-exit-status" > john-the-ripper chmod +x john-the-ripper
install_bsd.sh
#!/bin/sh tar -zxvf john-1.8.0-jumbo-1.tar.gz cd john-1.8.0-jumbo-1/src/ CFLAGS="-O3 -march=native $CFLAGS -std=gnu89" ./configure --disable-native-tests --disable-opencl CFLAGS="-O3 -march=native $CFLAGS -std=gnu89" gmake -j $NUM_CPU_CORES echo $? > ~/install-exit-status cd ~/ echo "#!/bin/sh cd john-1.8.0-jumbo-1/run/ ./john \$@ > \$LOG_FILE 2>&1 echo \$? > ~/test-exit-status" > john-the-ripper chmod +x john-the-ripper
install_windows.sh
#!/bin/sh unzip -o john180j1w.zip echo "#!/bin/sh cd john180j1w/run/ ./john.exe \$@ > \$LOG_FILE 2>&1" > john-the-ripper chmod +x john-the-ripper
results-definition.xml
<?xml version="1.0"?> <!--Phoronix Test Suite v8.0.0m2--> <PhoronixTestSuite> <ResultsParser> <OutputTemplate>Benchmarking: descrypt, traditional crypt(3) [DES 128/128 SSE2-16]... DONE Many salts: #_RESULT_# c/s real, 1260K c/s virtual Only one salt: 9227K c/s real, 1172K c/s virtual</OutputTemplate> <MatchToTestArguments>--format=descrypt</MatchToTestArguments> <LineBeforeHint>traditional crypt</LineBeforeHint> <StripResultPostfix>K</StripResultPostfix> <MultiplyResultBy>1000</MultiplyResultBy> </ResultsParser> <ResultsParser> <OutputTemplate>Benchmarking: md5crypt [MD5 32/64 X2]... DONE Raw: #_RESULT_# c/s real, 10323 c/s virtual</OutputTemplate> <MatchToTestArguments>--format=md5crypt</MatchToTestArguments> <LineBeforeHint>md5crypt</LineBeforeHint> </ResultsParser> <ResultsParser> <OutputTemplate>Benchmarking: bcrypt ("$2a$05", 32 iterations) [Blowfish 32/64 X2]... DONE Raw: #_RESULT_# c/s real, 768 c/s virtual </OutputTemplate> <MatchToTestArguments>--format=bcrypt</MatchToTestArguments> <LineBeforeHint>Blowfish</LineBeforeHint> </ResultsParser> </PhoronixTestSuite>
test-definition.xml
<?xml version="1.0"?> <!--Phoronix Test Suite v8.0.0m2--> <PhoronixTestSuite> <TestInformation> <Title>John The Ripper</Title> <AppVersion>1.8.0-jumbo-1</AppVersion> <Description>This is a benchmark of John The Ripper, which is a password cracker.</Description> <ResultScale>Real C/S</ResultScale> <Proportion>HIB</Proportion> <TimesToRun>3</TimesToRun> </TestInformation> <TestProfile> <Version>1.6.2</Version> <SupportedPlatforms>Linux, Solaris, BSD, MacOSX, Windows</SupportedPlatforms> <SoftwareType>Utility</SoftwareType> <TestType>Processor</TestType> <License>Free</License> <Status>Verified</Status> <ExternalDependencies>build-utilities, openssl-development</ExternalDependencies> <EnvironmentSize>102</EnvironmentSize> <ProjectURL>http://www.openwall.com/john/</ProjectURL> <Maintainer>Michael Larabel</Maintainer> </TestProfile> <TestSettings> <Default> <Arguments>--test=20 </Arguments> </Default> <Option> <DisplayName>Test</DisplayName> <Identifier>run-test</Identifier> <ArgumentPrefix></ArgumentPrefix> <ArgumentPostfix></ArgumentPostfix> <DefaultEntry>0</DefaultEntry> <Menu> <Entry> <Name>Traditional DES</Name> <Value>--format=descrypt</Value> <Message></Message> </Entry> <Entry> <Name>MD5</Name> <Value>--format=md5crypt</Value> <Message></Message> </Entry> <Entry> <Name>Blowfish</Name> <Value>--format=bcrypt</Value> <Message></Message> </Entry> </Menu> </Option> </TestSettings> </PhoronixTestSuite>