5810b_john-the-ripper

Intel Xeon E5-2697 v3 testing with a Dell 0K240Y (A33 BIOS) and NVIDIA Quadro K2200 4GB on Ubuntu 20.04 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2010195-FI-5810BJOHN83
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
5810b_john-the-ripper
October 19 2020
  5 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


5810b_john-the-ripperOpenBenchmarking.orgPhoronix Test SuiteIntel Xeon E5-2697 v3 @ 3.60GHz (14 Cores / 28 Threads)Dell 0K240Y (A33 BIOS)Intel Xeon E7 v3/Xeon158GB2048GB INTEL SSDPEKNW020T8 + 5 x 60GB T6VM6G060-2 + 128GB LITEON LMH-128V2NVIDIA Quadro K2200 4GBNVIDIA GM107 HD AudioIntel I217-LM + 8 x Intel 82580 + Intel I210Ubuntu 20.045.4.0-51-generic (x86_64)GNOME Shell 3.36.4X Server 1.20.8modesetting 1.20.81.2.133GCC 9.3.0ext41280x1024ProcessorMotherboardChipsetMemoryDiskGraphicsAudioNetworkOSKernelDesktopDisplay ServerDisplay DriverVulkanCompilerFile-SystemScreen Resolution5810b_john-the-ripper BenchmarksSystem Logs- --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,gm2 --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none=/build/gcc-9-HskZEa/gcc-9-9.3.0/debian/tmp-nvptx/usr,hsa --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v - Scaling Governor: intel_pstate powersave - CPU Microcode: 0x43- itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Not affected + tsx_async_abort: Not affected

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: Blowfish5810b_john-the-ripper4K8K12K16K20KSE +/- 4.98, N = 3184561. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -pthread -lm -ldl -lcrypt

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: MD55810b_john-the-ripper200K400K600K800K1000KSE +/- 2728.45, N = 311513331. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -pthread -lm -ldl -lcrypt