JtR-test1

microsoft testing on Ubuntu 20.04 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2007117-NE-JTRTEST1140
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
test1
July 11 2020
  4 Minutes


JtR-test1OpenBenchmarking.orgPhoronix Test SuiteAMD Ryzen 7 2700X Eight-Core (8 Cores / 16 Threads)14GB2 x 275GB Virtual DiskUbuntu 20.044.19.104-microsoft-standard (x86_64)X ServerGCC 5.5.0ext4microsoftProcessorMemoryDiskOSKernelDisplay ServerCompilerFile-SystemSystem LayerJtR-test1 BenchmarksSystem Logs- --disable-multilib --disable-nls --enable-checking=release --enable-languages=c,c++,objc,obj-c++,fortran --with-boot-ldflags='-static-libstdc++ --with-gmp=/home/linuxbrew/.linuxbrew/opt/gmp --with-mpc=/home/linuxbrew/.linuxbrew/opt/libmpc --with-mpfr=/home/linuxbrew/.linuxbrew/opt/mpfr -static-libgcc - CPU Microcode: 0xffffffff- itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional STIBP: disabled RSB filling + tsx_async_abort: Not affected

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: MD5test1100K200K300K400K500KSE +/- 8002.39, N = 34748261. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -lgmp -pthread -lm -lz -ldl -lcrypt -lbz2