r6525-john-the-ripper

2 x AMD EPYC 73F3 16-Core testing with a (2.8.4 BIOS) and Matrox G200eW3 on Rocky Linux 8.10 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2409095-NE-R6525JOHN86
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
2 x AMD EPYC 73F3 16-Core
September 09
  11 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


r6525-john-the-ripperOpenBenchmarking.orgPhoronix Test Suite2 x AMD EPYC 73F3 16-Core @ 4.04GHz (32 Cores / 64 Threads)(2.8.4 BIOS)AMD Starship/Matisse256GB3840GB PERC H755N FrontMatrox G200eW34 x Intel X710 for 10GbE SFP+ + 2 x Intel X710 for 10GBASE-T + 2 x Broadcom NetXtreme BCM5720 PCIeRocky Linux 8.104.18.0-553.8.1.el8_10.x86_64 (x86_64)GCC 8.5.0 20210514xfs1024x768ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelCompilerFile-SystemScreen ResolutionR6525-john-the-ripper BenchmarksSystem Logs- Transparent Huge Pages: always- Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0xa0011d3- SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_rstack_overflow: Mitigation of Safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: always-on RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected

r6525-john-the-ripperjohn-the-ripper: MD5john-the-ripper: HMAC-SHA512john-the-ripper: WPA PSKjohn-the-ripper: Blowfishjohn-the-ripper: bcrypt2 x AMD EPYC 73F3 16-Core87631015271000313711593315848OpenBenchmarking.org

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: MD52 x AMD EPYC 73F3 16-Core200K400K600K800K1000KSE +/- 3307.47, N = 3876310

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: HMAC-SHA5122 x AMD EPYC 73F3 16-Core3M6M9M12M15MSE +/- 71451.62, N = 315271000

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: WPA PSK2 x AMD EPYC 73F3 16-Core7K14K21K28K35KSE +/- 160.51, N = 331371

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: Blowfish2 x AMD EPYC 73F3 16-Core3K6K9K12K15KSE +/- 63.44, N = 315933

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: bcrypt2 x AMD EPYC 73F3 16-Core3K6K9K12K15KSE +/- 64.54, N = 315848