### John the Ripper is a password cracked that can be parallelised. This is
### user-space bound with little or no system CPU usage unless there are more
### threads than CPUs in the system. It's suitable as a CPU benchmark, should
### also be able to detect indirect problems such as cpufreq bugs forcing lower
### frequencies to be used unnecessarily and detect some scheduler anomalies.

# MM Test Parameters
export MMTESTS="johnripper"
export RUN_WARMUP=

# Profiling parameters
export RUN_NOPROFILE=yes
export RUN_FINEPROFILE=no
export RUN_COARSEPROFILE=no
export OPROFILE_REPORT_ANNOTATE=no

# Machine configuration
#export RUN_TUNINGS="$RUN_TUNINGS sysctl"

# Test disk to setup (optional)
#export TESTDISK_RAID_DEVICES=
#export TESTDISK_RAID_MD_DEVICE=/dev/md0
#export TESTDISK_RAID_OFFSET=63
#export TESTDISK_RAID_SIZE=250019532
#export TESTDISK_RAID_TYPE=raid0
#export TESTDISK_PARTITION=/dev/sda6
#export TESTDISK_FILESYSTEM=ext3
#export TESTDISK_MKFS_PARAM="-f -d agcount=8"
#export TESTDISK_MOUNT_ARGS=""

# List of monitors
export RUN_MONITOR=yes
export MONITORS_ALWAYS=
export MONITORS_PLAIN=
export MONITORS_GZIP="proc-vmstat top"
export MONITORS_WITH_LATENCY="vmstat iostat"
export MONITOR_UPDATE_FREQUENCY=10

# john the ripper
export JOHNRIPPER_ITERATIONS=3
export JOHNRIPPER_DURATION=20
export JOHNRIPPER_MIN_THREADS=1
export JOHNRIPPER_MAX_THREADS=$((NUMCPUS*2))
