TestBmt_john-the-ripper

2 x Intel Xeon E5-2630 0 testing with a HP ProLiant DL380p Gen8 (P70 BIOS) and Matrox MGA G200EH on CentOS 7.8.2003 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2011192-FI-TESTBMTJO84
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
TestBmt_john-the-ripper
November 19 2020
  4 Minutes


TestBmt_john-the-ripperOpenBenchmarking.orgPhoronix Test Suite2 x Intel Xeon E5-2630 0 @ 2.30GHz (12 Cores / 24 Threads)HP ProLiant DL380p Gen8 (P70 BIOS)Intel Xeon E5/Core8 x 8192 MB DDR3-1333MT/s 647650-071300GB LOGICAL VOLUME + 1200GB LOGICAL VOLUMEMatrox MGA G200EH4 x Broadcom NetXtreme BCM5719 PCIeCentOS 7.8.20033.10.0-1127.10.1.el7.x86_64 (x86_64)GCC 4.8.5 20150623ext41024x768ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelCompilerFile-SystemScreen ResolutionTestBmt_john-the-ripper BenchmarksSystem Logs- --build=x86_64-redhat-linux --disable-libgcj --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-indirect-function --enable-gnu-unique-object --enable-initfini-array --enable-languages=c,c++,objc,obj-c++,java,fortran,ada,go,lto --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=x86-64 --with-linker-hash-style=gnu --with-tune=generic - Scaling Governor: pcc-cpufreq conservative - CPU Microcode: 0x714- itlb_multihit: KVM: Mitigation of Split huge pages + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full retpoline IBPB + tsx_async_abort: Not affected

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: MD5TestBmt_john-the-ripper100K200K300K400K500KSE +/- 421.95, N = 34529151. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -lgmp -pthread -lm -lz -ldl -lcrypt