pts-mnr1-cryptography

AMD Phenom II X4 955 testing with a ASUS M4A79 Deluxe (4101 BIOS) and Gigabyte AMD Radeon RX 6600/6600 XT/6600M on Ubuntu 22.04 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2409126-FRIK-PTSMNR140
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
AMD Phenom II X4 955
September 12
  24 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


pts-mnr1-cryptographyOpenBenchmarking.orgPhoronix Test SuiteAMD Phenom II X4 955 @ 3.20GHz (4 Cores)ASUS M4A79 Deluxe (4101 BIOS)AMD RD790 + SB7x0/SB8x0/SB9x012GB256GB MTFDDAK256MAY-1AGigabyte AMD Radeon RX 6600/6600 XT/6600MAMD Navi 21 HDMI AudioRealtek RTL8111/8168/8411Ubuntu 22.046.8.0-40-generic (x86_64)X Server 1.20.13OpenCL 2.1 AMD-APP (3625.0)1.3.255GCC 11.4.0ext41280x720ProcessorMotherboardChipsetMemoryDiskGraphicsAudioNetworkOSKernelDisplay ServerOpenCLVulkanCompilerFile-SystemScreen ResolutionPts-mnr1-cryptography BenchmarksSystem Logs- amdgpu.ppfeaturemask=0xfff7ffff - Transparent Huge Pages: madvise - --build=x86_64-linux-gnu --disable-vtable-verify --disable-werror --enable-bootstrap --enable-cet --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-gnu-unique-object --enable-languages=c,ada,c++,go,brig,d,fortran,objc,obj-c++,m2 --enable-libphobos-checking=release --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-link-serialization=2 --enable-multiarch --enable-multilib --enable-nls --enable-objc-gc=auto --enable-offload-targets=nvptx-none=/build/gcc-11-XeT9lY/gcc-11-11.4.0/debian/tmp-nvptx/usr,amdgcn-amdhsa=/build/gcc-11-XeT9lY/gcc-11-11.4.0/debian/tmp-gcn/usr --enable-plugin --enable-shared --enable-threads=posix --host=x86_64-linux-gnu --program-prefix=x86_64-linux-gnu- --target=x86_64-linux-gnu --with-abi=m64 --with-arch-32=i686 --with-build-config=bootstrap-lto-lean --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-multilib-list=m32,m64,mx32 --with-target-system-zlib=auto --with-tune=generic --without-cuda-driver -v - Scaling Governor: acpi-cpufreq schedutil - CPU Microcode: 0x10000db - gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Not affected + spec_store_bypass: Not affected + spectre_v1: Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers + spectre_v2: Vulnerable; STIBP: disabled; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected

pts-mnr1-cryptographyjohn-the-ripper: MD5john-the-ripper: HMAC-SHA512john-the-ripper: Blowfishjohn-the-ripper: WPA PSKjohn-the-ripper: bcryptAMD Phenom II X4 9551043244086667363927403649OpenBenchmarking.org

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: MD5AMD Phenom II X4 95520K40K60K80K100KSE +/- 822.46, N = 151043241. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -lgmp -lm -lrt -lz -ldl -lcrypt

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: HMAC-SHA512AMD Phenom II X4 955900K1800K2700K3600K4500KSE +/- 58743.32, N = 340866671. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -lgmp -lm -lrt -lz -ldl -lcrypt

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: BlowfishAMD Phenom II X4 9558001600240032004000SE +/- 8.51, N = 336391. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -lgmp -lm -lrt -lz -ldl -lcrypt

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: WPA PSKAMD Phenom II X4 9556001200180024003000SE +/- 27.78, N = 527401. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -lgmp -lm -lrt -lz -ldl -lcrypt

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: bcryptAMD Phenom II X4 9558001600240032004000SE +/- 21.59, N = 336491. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -lgmp -lm -lrt -lz -ldl -lcrypt