john-the-ripper-1.8.0run

2 x Intel Xeon E5-2620 v2 testing with a ASUS Z9PE-D8 WS (5503 BIOS) and ASPEED on CentOS Stream 9 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2404292-NE-JOHNTHERI99
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
NewGVNTrunkO2
April 29
  11 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


john-the-ripper-1.8.0runOpenBenchmarking.orgPhoronix Test Suite2 x Intel Xeon E5-2620 v2 @ 2.60GHz (12 Cores / 24 Threads)ASUS Z9PE-D8 WS (5503 BIOS)Intel Xeon E7 v2/Xeon32GB256GB Samsung SSD 850 + 2000GB Western Digital WD20EARX-00PASPEEDRealtek ALC8982 x Intel 82574LCentOS Stream 95.14.0-437.el9.x86_64 (x86_64)X ServerGCC 11.4.1 20231218 + PGI Compiler 16.10-0 + LLVM 3.1 + CUDA 11.2ext41024x768ProcessorMotherboardChipsetMemoryDiskGraphicsAudioNetworkOSKernelDisplay ServerCompilerFile-SystemScreen ResolutionJohn-the-ripper-1.8.0run BenchmarksSystem Logs- Transparent Huge Pages: always- CXXFLAGS="-O2 -mllvm -enable-newgvn" CFLAGS="-O2 -mllvm -enable-newgvn"- Optimized build with assertions; Built Apr 11 2013 (07:43:48); Default target: i386-pc-linux-gnu; Host CPU: i686 - Scaling Governor: intel_cpufreq conservative - CPU Microcode: 0x42e- gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected

john-the-ripper-1.8.0runjohn-the-ripper: MD5john-the-ripper: HMAC-SHA512john-the-ripper: bcryptjohn-the-ripper: WPA PSKjohn-the-ripper: BlowfishNewGVNTrunkO23004414686677951014802OpenBenchmarking.org

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: MD5NewGVNTrunkO26K12K18K24K30KSE +/- 109.99, N = 330044

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: HMAC-SHA512NewGVNTrunkO2300K600K900K1200K1500KSE +/- 8743.25, N = 31468667

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: bcryptNewGVNTrunkO22004006008001000SE +/- 5.86, N = 3795

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: WPA PSKNewGVNTrunkO22004006008001000SE +/- 4.00, N = 31014

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: BlowfishNewGVNTrunkO22004006008001000SE +/- 5.17, N = 3802