openssl20190722

Ryzen 5 2400G ASUS PRIME B350M-E 32 GiB RAM

HTML result view exported from: https://openbenchmarking.org/result/1907223-HV-OPENSSL2042.

openssl20190722ProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDesktopDisplay ServerDisplay DriverCompilerFile-SystemScreen ResolutionOpenSSL 20190722AMD Ryzen 5 2400G @ 3.60GHz (4 Cores / 8 Threads)ASUS PRIME B350M-E (4023 BIOS)AMD Raven/Raven231744MB2 x 1000GB Western Digital WD10EZEX-00W + 250GB Western Digital WDS250G2B0B-ASUS AMD Radeon Vega / Mobile 1GB (1250/1200MHz)AMD Raven/Raven2/FenghuangFP-988DRealtek RTL8111/8168/8411 + Intel 7260Arch Linux5.2.2-arch1-1-ARCH (x86_64)XfceX Server 1.20.5modesetting 1.20.5GCC 9.1.0xfs1280x1024OpenBenchmarking.org- --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++ --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu - Scaling Governor: acpi-cpufreq schedutil- l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling

openssl20190722openssl: RSA 4096-bit PerformanceStandard ErrorStandard DeviationOpenSSL 20190722800.401.100.24%OpenBenchmarking.org

OpenSSL

RSA 4096-bit Performance

OpenBenchmarking.orgSigns Per Second, More Is BetterOpenSSL 1.1.1RSA 4096-bit PerformanceOpenSSL 201907222004006008001000SE +/- 1.10, N = 3800.401. (CC) gcc options: -pthread -m64 -O3 -lssl -lcrypto -ldl


Phoronix Test Suite v10.8.4