thinkpad-cryptography
Intel Core i7-4600U testing with a LENOVO 20CD00B1US (B0ET46WW 1.33 BIOS) and Intel Haswell Mobile 2GB on Slackware 14.2 x86_64 via the Phoronix Test Suite.
thinkpad-cryptography
Processor: Intel Core i7-4600U @ 3.30GHz (2 Cores / 4 Threads), Motherboard: LENOVO 20CD00B1US (B0ET46WW 1.33 BIOS), Chipset: Intel Haswell-ULT DRAM, Memory: 8192MB, Disk: 500GB HGST HTS725050A7 + 128GB NT-128, Graphics: Intel Haswell Mobile 2GB (1100MHz), Audio: Intel Haswell-ULT HD Audio, Network: Intel 7260
OS: Slackware 14.2 x86_64, Kernel: 5.4.7 (x86_64), Desktop: Xfce 4.12, Display Server: X Server 1.20.6, Display Driver: intel 2.99.917, OpenGL: 4.5 Mesa 19.3.1, Vulkan: 1.1.102, Compiler: GCC 9.2.0 + Clang 9.0.1 + LLVM 9.0.1, File-System: ext4, Screen Resolution: 1920x1080
Compiler Notes: --build=x86_64-slackware-linux --disable-gtktest --disable-install-libiberty --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-multilib --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-gnu-unique-object --enable-languages=ada,brig,c,c++,d,fortran,go,lto,objc,obj-c++ --enable-libstdcxx-dual-abi --enable-lto --enable-objc-gc --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-slackware-linux --mandir=/usr/man --target=x86_64-slackware-linux --verbose --with-arch-directory=amd64 --with-default-libstdcxx-abi=new --with-gnu-ld --with-isl
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x25
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Botan
Botan is a cross-platform open-source C++ crypto library that supports most all publicly known cryptographic algorithms. Learn more via the OpenBenchmarking.org test page.
John The Ripper
This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.
GnuPG
This test times how long it takes to encrypt a file using GnuPG. Learn more via the OpenBenchmarking.org test page.
OpenSSL
OpenSSL is an open-source toolkit that implements SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols. This test measures the RSA 4096-bit performance of OpenSSL. Learn more via the OpenBenchmarking.org test page.
thinkpad-cryptography
Processor: Intel Core i7-4600U @ 3.30GHz (2 Cores / 4 Threads), Motherboard: LENOVO 20CD00B1US (B0ET46WW 1.33 BIOS), Chipset: Intel Haswell-ULT DRAM, Memory: 8192MB, Disk: 500GB HGST HTS725050A7 + 128GB NT-128, Graphics: Intel Haswell Mobile 2GB (1100MHz), Audio: Intel Haswell-ULT HD Audio, Network: Intel 7260
OS: Slackware 14.2 x86_64, Kernel: 5.4.7 (x86_64), Desktop: Xfce 4.12, Display Server: X Server 1.20.6, Display Driver: intel 2.99.917, OpenGL: 4.5 Mesa 19.3.1, Vulkan: 1.1.102, Compiler: GCC 9.2.0 + Clang 9.0.1 + LLVM 9.0.1, File-System: ext4, Screen Resolution: 1920x1080
Compiler Notes: --build=x86_64-slackware-linux --disable-gtktest --disable-install-libiberty --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-multilib --disable-werror --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-gnu-unique-object --enable-languages=ada,brig,c,c++,d,fortran,go,lto,objc,obj-c++ --enable-libstdcxx-dual-abi --enable-lto --enable-objc-gc --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-slackware-linux --mandir=/usr/man --target=x86_64-slackware-linux --verbose --with-arch-directory=amd64 --with-default-libstdcxx-abi=new --with-gnu-ld --with-isl
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x25
Security Notes: itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + tsx_async_abort: Not affected
Testing initiated at 1 January 2020 07:58 by user yoga.