old_blowfish

Intel Core i7-4720HQ testing with a ASUS N550JX v1.0 (N550JX.202 BIOS) and ASUS Intel HD 4600 2GB on Ubuntu 14.04 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2009258-NE-OLDBLOWFI46
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
old blowfish
September 25 2020
  7 Minutes


old_blowfishOpenBenchmarking.orgPhoronix Test SuiteIntel Core i7-4720HQ @ 3.60GHz (4 Cores / 8 Threads)ASUS N550JX v1.0 (N550JX.202 BIOS)Intel Xeon E3-1200 v3/4th8GB1000GB Seagate ST1000LM024 HN-MASUS Intel HD 4600 2GB (1200MHz)Intel Xeon E3-1200 v3/4thRealtek RTL8111/8168/8411 + Intel 7260Ubuntu 14.044.4.0-148-generic (x86_64)Unity 7.2.6X Server 1.15.1intel 2.99.910GCC 4.8.5ext41920x1080ProcessorMotherboardChipsetMemoryDiskGraphicsAudioNetworkOSKernelDesktopDisplay ServerDisplay DriverCompilerFile-SystemScreen ResolutionOld_blowfish BenchmarksSystem Logs- --build=x86_64-linux-gnu --disable-browser-plugin --disable-libmudflap --disable-werror --enable-checking=release --enable-clocale=gnu --enable-gnu-unique-object --enable-gtk-cairo --enable-java-awt=gtk --enable-java-home --enable-languages=c,c++,java,go,d,fortran,objc,obj-c++ --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-nls --enable-objc-gc --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-arch-directory=amd64 --with-multilib-list=m32,m64,mx32 --with-tune=generic -v - Scaling Governor: intel_pstate performance - CPU Microcode: 0x27- l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB IBRS_FW

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: Blowfishold blowfish7001400210028003500SE +/- 120.10, N = 1234291. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -pthread -lm -lz -ldl -lcrypt