old_blowfish
Intel Core i7-4720HQ testing with a ASUS N550JX v1.0 (N550JX.202 BIOS) and ASUS Intel HD 4600 2GB on Ubuntu 14.04 via the Phoronix Test Suite.
old blowfish
Processor: Intel Core i7-4720HQ @ 3.60GHz (4 Cores / 8 Threads), Motherboard: ASUS N550JX v1.0 (N550JX.202 BIOS), Chipset: Intel Xeon E3-1200 v3/4th, Memory: 8GB, Disk: 1000GB Seagate ST1000LM024 HN-M, Graphics: ASUS Intel HD 4600 2GB (1200MHz), Audio: Intel Xeon E3-1200 v3/4th, Network: Realtek RTL8111/8168/8411 + Intel 7260
OS: Ubuntu 14.04, Kernel: 4.4.0-148-generic (x86_64), Desktop: Unity 7.2.6, Display Server: X Server 1.15.1, Display Driver: intel 2.99.910, Compiler: GCC 4.8.5, File-System: ext4, Screen Resolution: 1920x1080
Compiler Notes: --build=x86_64-linux-gnu --disable-browser-plugin --disable-libmudflap --disable-werror --enable-checking=release --enable-clocale=gnu --enable-gnu-unique-object --enable-gtk-cairo --enable-java-awt=gtk --enable-java-home --enable-languages=c,c++,java,go,d,fortran,objc,obj-c++ --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-nls --enable-objc-gc --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-arch-directory=amd64 --with-multilib-list=m32,m64,mx32 --with-tune=generic -v
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x27
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB IBRS_FW
John The Ripper
This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.
old blowfish
Processor: Intel Core i7-4720HQ @ 3.60GHz (4 Cores / 8 Threads), Motherboard: ASUS N550JX v1.0 (N550JX.202 BIOS), Chipset: Intel Xeon E3-1200 v3/4th, Memory: 8GB, Disk: 1000GB Seagate ST1000LM024 HN-M, Graphics: ASUS Intel HD 4600 2GB (1200MHz), Audio: Intel Xeon E3-1200 v3/4th, Network: Realtek RTL8111/8168/8411 + Intel 7260
OS: Ubuntu 14.04, Kernel: 4.4.0-148-generic (x86_64), Desktop: Unity 7.2.6, Display Server: X Server 1.15.1, Display Driver: intel 2.99.910, Compiler: GCC 4.8.5, File-System: ext4, Screen Resolution: 1920x1080
Compiler Notes: --build=x86_64-linux-gnu --disable-browser-plugin --disable-libmudflap --disable-werror --enable-checking=release --enable-clocale=gnu --enable-gnu-unique-object --enable-gtk-cairo --enable-java-awt=gtk --enable-java-home --enable-languages=c,c++,java,go,d,fortran,objc,obj-c++ --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-nls --enable-objc-gc --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-arch-directory=amd64 --with-multilib-list=m32,m64,mx32 --with-tune=generic -v
Processor Notes: Scaling Governor: intel_pstate performance - CPU Microcode: 0x27
Security Notes: l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB IBRS_FW
Testing initiated at 25 September 2020 09:17 by user abhishek.