john-the-ripper_i5-6600k_64-3200_hd530

Intel Core i5-6600K testing with a ASUS Z170 PRO GAMING (2003 BIOS) and ASUS Intel HD 530 3GB on ManjaroLinux 20.0.1 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2005207-NI-JOHNTHERI21
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
john-the-ripper_i5-6600k_64-3200_hd530
May 20 2020
  5 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


john-the-ripper_i5-6600k_64-3200_hd530OpenBenchmarking.orgPhoronix Test SuiteIntel Core i5-6600K @ 3.90GHz (4 Cores)ASUS Z170 PRO GAMING (2003 BIOS)Intel Xeon E3-1200 v5/E3-150064GB240GB KINGSTON SM2280S + 2000GB Seagate ST2000DM001-1ER1 + 240GB SanDisk SDSSDA24ASUS Intel HD 530 3GB (1150MHz)Realtek ALC11502 x VX238 + 22EA63Intel I219-VManjaroLinux 20.0.15.6.12-1-MANJARO (x86_64)X Server 1.20.7 + Waylandmodesetting 1.20.74.6 Mesa 20.0.6GCC 9.3.0ext45760x1080ProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDisplay ServerDisplay DriverOpenGLCompilerFile-SystemScreen ResolutionJohn-the-ripper_i5-6600k_64-3200_hd530 BenchmarksSystem Logs- NVM_CD_FLAGS=-q- --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu - Scaling Governor: intel_pstate powersave - CPU Microcode: 0xd6- itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT disabled + mds: Mitigation of Clear buffers; SMT disabled + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: disabled RSB filling + tsx_async_abort: Mitigation of Clear buffers; SMT disabled

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: Blowfishjohn-the-ripper_i5-6600k_64-3200_hd53012002400360048006000SE +/- 48.03, N = 355351. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -lgmp -pthread -lm -lz -ldl -lcrypt -lbz2

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: MD5john-the-ripper_i5-6600k_64-3200_hd53080K160K240K320K400KSE +/- 4120.71, N = 33738791. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -lgmp -pthread -lm -lz -ldl -lcrypt -lbz2