pts_crypto_stornode

2 x Intel Xeon E5-2620 v2 testing with a Supermicro X9DRD-7LN4F and Matrox s MGA G200eW WPCM450 on Ubuntu 14.04 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 1607083-GA-PTSCRYPTO11
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
s1971
July 08 2016
 
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


pts_crypto_stornodeOpenBenchmarking.orgPhoronix Test Suite2 x Intel Xeon E5-2620 v2 @ 2.60GHz (24 Cores)Supermicro X9DRD-7LN4FIntel Xeon E7 v2/Xeon16 x 16384 MB DDR3-1333MHz Micron60GB KINGSTON SV300S3 + 36 x 6001GB HGST HUS726060ALMatrox s MGA G200eW WPCM450Intel I350 Gigabit ConnectionUbuntu 14.043.16.0-41-generic (x86_64)GCC 4.8.4ext4640x480ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelCompilerFile-SystemScreen ResolutionPts_crypto_stornode BenchmarksSystem Logs- --build=x86_64-linux-gnu --disable-browser-plugin --disable-libmudflap --disable-werror --enable-checking=release --enable-clocale=gnu --enable-gnu-unique-object --enable-gtk-cairo --enable-java-awt=gtk --enable-java-home --enable-languages=c,c++,java,go,d,fortran,objc,obj-c++ --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-nls --enable-objc-gc --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-arch-directory=amd64 --with-multilib-list=m32,m64,mx32 --with-tune=generic -v - Scaling Governor: intel_pstate powersave

pts_crypto_stornodegcrypt: CAMELLIA256-ECB Cipherjohn-the-ripper: Blowfishjohn-the-ripper: Traditional DESjohn-the-ripper: MD5gnupg: 1GB File Encryptions19713398528170693339703211.20OpenBenchmarking.org

Gcrypt Library

OpenBenchmarking.orgMicroseconds, Fewer Is BetterGcrypt Library 1.4.4CAMELLIA256-ECB Ciphers19717001400210028003500SE +/- 56.59, N = 633981. (CC) gcc options: -O2 -fvisibility=hidden

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.8.0Test: Blowfishs197111002200330044005500SE +/- 19.70, N = 352811. (CC) gcc options: -fopenmp -lcrypt

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.8.0Test: Traditional DESs19711.5M3M4.5M6M7.5MSE +/- 95254.63, N = 370693331. (CC) gcc options: -fopenmp -lcrypt

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.8.0Test: MD5s197120K40K60K80K100KSE +/- 443.48, N = 3970321. (CC) gcc options: -fopenmp -lcrypt

GnuPG

OpenBenchmarking.orgSeconds, Fewer Is BetterGnuPG 1.4.101GB File Encryptions19713691215SE +/- 0.08, N = 411.201. (CC) gcc options: -O2 -MT -MD -MP -MF