ronnylov

4 x AMD Opteron 6276 testing with a Supermicro H8QG6 and Matrox s MGA G200eW WPCM450 on Arch Linux via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 1710186-TY-RONNYLOV007
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
john-the-ripper
October 18 2017
 
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


ronnylovOpenBenchmarking.orgPhoronix Test Suite4 x AMD Opteron 6276 @ 2.30GHz (64 Cores)Supermicro H8QG6AMD RD890 + SB7x0/SB8x0/SB9x030720MB1500GB SAMSUNG HD154UIMatrox s MGA G200eW WPCM450Intel 82576 Gigabit ConnectionArch Linux4.13.7-1-ARCH (x86_64)GCC 7.2.0ext41024x768ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelCompilerFile-SystemScreen ResolutionRonnylov BenchmarksSystem Logs- Scaling Governor: acpi-cpufreq schedutil

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.8.0Test: Blowfishjohn-the-ripper6K12K18K24K30KSE +/- 448.03, N = 3294191. (CC) gcc options: -fopenmp -lcrypt

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.8.0Test: Traditional DESjohn-the-ripper20M40M60M80M100MSE +/- 471412.53, N = 3833786671. (CC) gcc options: -fopenmp -lcrypt

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.8.0Test: MD5john-the-ripper110K220K330K440K550KSE +/- 82.33, N = 35047921. (CC) gcc options: -fopenmp -lcrypt