e470_cpu_john-the-ripper

Intel Core i7-7500U testing with a LENOVO 20H1CTO1WW (R0DET99W 1.99 BIOS) and Intel HD 620 on ManjaroLinux 20.2 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2012309-FI-E470CPUJO34
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
e470_cpu_john-the-ripper_1
December 30 2020
  5 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


e470_cpu_john-the-ripperOpenBenchmarking.orgPhoronix Test SuiteIntel Core i7-7500U @ 3.50GHz (2 Cores / 4 Threads)LENOVO 20H1CTO1WW (R0DET99W 1.99 BIOS)Intel Xeon E3-1200 v6/7th16GB256GB SanDisk SD8TB8U2Intel HD 620 (1050MHz)Conexant CX20753/4S24F350Realtek RTL8111/8168/8411 + Intel 8265 / 8275ManjaroLinux 20.25.9.11-3-MANJARO (x86_64)KDE Plasma 5.20.4X Server 1.20.10modesetting 1.20.104.6 Mesa 20.2.3GCC 10.2.0 + Clang 11.0.0Target:ext41920x1080ProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDesktopDisplay ServerDisplay DriverOpenGLCompilerFile-SystemScreen ResolutionE470_cpu_john-the-ripper BenchmarksSystem Logs- --disable-libssp --disable-libstdcxx-pch --disable-libunwind-exceptions --disable-werror --enable-__cxa_atexit --enable-cet=auto --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-default-ssp --enable-gnu-indirect-function --enable-gnu-unique-object --enable-install-libiberty --enable-languages=c,c++,ada,fortran,go,lto,objc,obj-c++,d --enable-lto --enable-multilib --enable-plugin --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-isl --with-linker-hash-style=gnu - Scaling Governor: intel_pstate powersave - CPU Microcode: 0xde- itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline IBPB: conditional IBRS_FW STIBP: conditional RSB filling + srbds: Mitigation of Microcode + tsx_async_abort: Not affected

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: Blowfishe470_cpu_john-the-ripper_17001400210028003500SE +/- 1.00, N = 332961. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -lgmp -pthread -lm -lz -ldl -lcrypt -lbz2

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: MD5e470_cpu_john-the-ripper_140K80K120K160K200KSE +/- 219.65, N = 31965691. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -lgmp -pthread -lm -lz -ldl -lcrypt -lbz2