2_amd_jtr

VMware testing on Ubuntu 18.04 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2005275-NI-2005274NI19
Jump To Table - Results

View

Do Not Show Noisy Results
Do Not Show Results With Incomplete Data
Do Not Show Results With Little Change/Spread
List Notable Results

Statistics

Show Overall Harmonic Mean(s)
Show Overall Geometric Mean
Show Wins / Losses Counts (Pie Chart)
Normalize Results
Remove Outliers Before Calculating Averages

Graph Settings

Force Line Graphs Where Applicable
Convert To Scalar Where Applicable
Prefer Vertical Bar Graphs

Additional Graphs

Show Perf Per Core/Thread Calculation Graphs Where Applicable

Table

Show Detailed System Result Table

Run Management

Highlight
Result
Hide
Result
Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
2_amd_jtr
May 27 2020
  2 Minutes
3_amd_jtr
May 27 2020
  2 Minutes
4_amd_jtr
May 27 2020
  2 Minutes
Invert Hiding All Results Option
  2 Minutes

Only show results where is faster than


2_amd_jtrOpenBenchmarking.orgPhoronix Test Suite8 x AMD EPYC 7542 32-Core (15 Cores)AMD EPYC 7542 32-Core (8 Cores)Intel 440BX (6.00 BIOS)Intel 440BX/ZX/DX16GB17GB Virtual diskllvmpipe 16GBVMware VMXNET3Ubuntu 18.044.15.0-101-generic (x86_64)3.3 Mesa 19.2.8 (LLVM 9.0 128 bits)GCC 7.5.0ext41176x885VMwareProcessorsMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelOpenGLCompilerFile-SystemScreen ResolutionSystem Layer2_amd_jtr BenchmarksSystem Logs- --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++ --enable-libmpx --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib --with-tune=generic --without-cuda-driver -v - CPU Microcode: 0x8301038- itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full AMD retpoline IBPB: conditional STIBP: disabled RSB filling + tsx_async_abort: Not affected

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: Blowfish2_amd_jtr3_amd_jtr4_amd_jtr2K4K6K8K10KSE +/- 31.86, N = 3SE +/- 29.02, N = 3SE +/- 14.84, N = 31084110900109271. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -lgmp -pthread -lm -lz -ldl -lcrypt
OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: Blowfish2_amd_jtr3_amd_jtr4_amd_jtr2K4K6K8K10KMin: 10800 / Avg: 10841.33 / Max: 10904Min: 10862 / Avg: 10900 / Max: 10957Min: 10897 / Avg: 10926.67 / Max: 109421. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -lgmp -pthread -lm -lz -ldl -lcrypt