openssl-base openssl-base
Compare your own system(s) to this result file with the
Phoronix Test Suite by running the command:
phoronix-test-suite benchmark 2401058-NE-OPENSSLBA67 openssl-base Processor: 2 x Intel Xeon E5-2680 v3 @ 3.30GHz (24 Cores / 48 Threads), Motherboard: Dell 0CN7X8 (2.7.1 BIOS), Chipset: Intel Xeon E7 v3/Xeon, Memory: 32GB, Disk: 480GB INTEL SSDSC2BB480G7R, Graphics: Matrox G200eR2, Monitor: SMS27A350H, Network: 4 x Broadcom NetXtreme BCM5720 PCIe
OS: Ubuntu 22.04, Kernel: 5.15.0-82-generic (x86_64), Desktop: GNOME Shell 42.9, Display Server: X Server 1.18.4, Vulkan: 1.3.238, Compiler: Clang 18.0.0 + GCC 11.4.0, File-System: nfs, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madviseEnvironment Notes: LDFLAGS=Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x49Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
openssl-base OpenBenchmarking.org Phoronix Test Suite 2 x Intel Xeon E5-2680 v3 @ 3.30GHz (24 Cores / 48 Threads) Dell 0CN7X8 (2.7.1 BIOS) Intel Xeon E7 v3/Xeon 32GB 480GB INTEL SSDSC2BB480G7R Matrox G200eR2 SMS27A350H 4 x Broadcom NetXtreme BCM5720 PCIe Ubuntu 22.04 5.15.0-82-generic (x86_64) GNOME Shell 42.9 X Server 1.18.4 1.3.238 Clang 18.0.0 + GCC 11.4.0 nfs 1024x768 Processor Motherboard Chipset Memory Disk Graphics Monitor Network OS Kernel Desktop Display Server Vulkan Compiler File-System Screen Resolution Openssl-base Benchmarks System Logs - Transparent Huge Pages: madvise - LDFLAGS= - Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x49 - gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
OpenSSL OpenSSL is an open-source toolkit that implements SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols. This test profile makes use of the built-in "openssl speed" benchmarking capabilities. Learn more via the OpenBenchmarking.org test page.
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.1 Algorithm: SHA256 openssl-base 1200M 2400M 3600M 4800M 6000M SE +/- 1104255.28, N = 3 5439392700 1. (CC) clang options: -pthread -m64 -Qunused-arguments -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.1 Algorithm: ChaCha20-Poly1305 openssl-base 8000M 16000M 24000M 32000M 40000M SE +/- 40829446.65, N = 3 39623136860 1. (CC) clang options: -pthread -m64 -Qunused-arguments -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.1 Algorithm: AES-256-GCM openssl-base 11000M 22000M 33000M 44000M 55000M SE +/- 54865866.11, N = 3 51351023233 1. (CC) clang options: -pthread -m64 -Qunused-arguments -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.1 Algorithm: AES-128-GCM openssl-base 14000M 28000M 42000M 56000M 70000M SE +/- 58797114.32, N = 3 66345945593 1. (CC) clang options: -pthread -m64 -Qunused-arguments -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.1 Algorithm: SHA512 openssl-base 1300M 2600M 3900M 5200M 6500M SE +/- 7290105.04, N = 3 5908628773 1. (CC) clang options: -pthread -m64 -Qunused-arguments -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org byte/s, More Is Better OpenSSL 3.1 Algorithm: ChaCha20 openssl-base 14000M 28000M 42000M 56000M 70000M SE +/- 33334381.47, N = 3 63774464417 1. (CC) clang options: -pthread -m64 -Qunused-arguments -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org verify/s, More Is Better OpenSSL 3.1 Algorithm: RSA4096 openssl-base 50K 100K 150K 200K 250K SE +/- 65.10, N = 3 212151.2 1. (CC) clang options: -pthread -m64 -Qunused-arguments -O3 -lssl -lcrypto -ldl
OpenBenchmarking.org sign/s, More Is Better OpenSSL 3.1 Algorithm: RSA4096 openssl-base 700 1400 2100 2800 3500 SE +/- 0.24, N = 3 3098.4 1. (CC) clang options: -pthread -m64 -Qunused-arguments -O3 -lssl -lcrypto -ldl
openssl-base Processor: 2 x Intel Xeon E5-2680 v3 @ 3.30GHz (24 Cores / 48 Threads), Motherboard: Dell 0CN7X8 (2.7.1 BIOS), Chipset: Intel Xeon E7 v3/Xeon, Memory: 32GB, Disk: 480GB INTEL SSDSC2BB480G7R, Graphics: Matrox G200eR2, Monitor: SMS27A350H, Network: 4 x Broadcom NetXtreme BCM5720 PCIe
OS: Ubuntu 22.04, Kernel: 5.15.0-82-generic (x86_64), Desktop: GNOME Shell 42.9, Display Server: X Server 1.18.4, Vulkan: 1.3.238, Compiler: Clang 18.0.0 + GCC 11.4.0, File-System: nfs, Screen Resolution: 1024x768
Kernel Notes: Transparent Huge Pages: madviseEnvironment Notes: LDFLAGS=Processor Notes: Scaling Governor: intel_cpufreq performance - CPU Microcode: 0x49Security Notes: gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected
Testing initiated at 5 January 2024 16:02 by user mciverj.