john-the-ripper-result.txt

Intel Xeon E-2286M testing with a Dell 0499T7 (1.6.0 BIOS) and Intel UHD 630 8GB on ManjaroLinux 18.1.5 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2001314-HU-JOHNTHERI07
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
Dell 7540 Ripper Intel
January 31 2020
  7 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


john-the-ripper-result.txtOpenBenchmarking.orgPhoronix Test SuiteIntel Xeon E-2286M @ 5.00GHz (8 Cores / 16 Threads)Dell 0499T7 (1.6.0 BIOS)Intel Cannon Lake PCH16384MB1000GB Samsung SSD 970 EVO Plus 1TB + PM981a NVMe Samsung 1024GBIntel UHD 630 8GB (300/405MHz)Realtek ALC289DENON-AVAMPIntel I219-LM + Intel Wi-Fi 6 AX200ManjaroLinux 18.1.55.4.15-2-MANJARO (x86_64)X Server 1.20.7NVIDIA 440.444.6 Mesa 19.3.2GCC 9.2.0ext41920x1080ProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDisplay ServerDisplay DriverOpenGLCompilerFile-SystemScreen ResolutionJohn-the-ripper-result.txt BenchmarksSystem Logs- --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu - Scaling Governor: intel_pstate powersave - CPU Microcode: 0xca- itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling + tsx_async_abort: Mitigation of TSX disabled

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: BlowfishDell 7540 Ripper Intel3K6K9K12K15KSE +/- 170.11, N = 6148351. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -lgmp -pthread -lm -lz -ldl -lcrypt -lbz2

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: MD5Dell 7540 Ripper Intel200K400K600K800K1000KSE +/- 3156.98, N = 37854421. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -lgmp -pthread -lm -lz -ldl -lcrypt -lbz2