pts_john_the_ripper_test

Xen HVM domU 4.2.amazon testing on Red Hat Enterprise Linux 8.0 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2003316-VE-PTSJOHNTH61
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
pst_john_the_ripper_test_3103200916
March 31 2020
  5 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


pts_john_the_ripper_testOpenBenchmarking.orgPhoronix Test SuiteIntel Xeon E5-2676 v3 (1 Core)Xen HVM domU (4.2.amazon BIOS)Intel 440FX 82441FX PMC1 x 1024 MB RAM10GBCirrus Logic GD 5446Red Hat Enterprise Linux 8.04.18.0-80.4.2.el8_0.x86_64 (x86_64)GCC 8.3.1 20190507xfs1024x768Xen HVM domU 4.2.amazonProcessorMotherboardChipsetMemoryDiskGraphicsOSKernelCompilerFile-SystemScreen ResolutionSystem LayerPts_john_the_ripper_test BenchmarksSystem Logs- --build=x86_64-redhat-linux --disable-libmpx --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-cet --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,fortran,lto --enable-multilib --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-gcc-major-version-only --with-isl --with-linker-hash-style=gnu --with-tune=generic --without-cuda-driver - CPU Microcode: 0x43- SELinux + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT Host state unknown + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: Blowfishpst_john_the_ripper_test_31032009162004006008001000SE +/- 1.15, N = 39671. (CC) gcc options: -O3 --param -std=gnu89

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: MD5pst_john_the_ripper_test_310320091614K28K42K56K70KSE +/- 332.67, N = 3671661. (CC) gcc options: -O3 --param -std=gnu89