john_the_ripper1

ARMv7 rev 10 testing on Ubuntu 12.04 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 1505196-AR-JOHNTHERI63
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
1970-01-01 02:39
January 01 1970
 
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


john_the_ripper1OpenBenchmarking.orgPhoronix Test SuiteARMv7 rev 10 @ 1.00GHz (2 Cores)Freescale i.MX 6Quad/DualLite/Solo Sabre-SD Board748MB8GB SEM08GUbuntu 12.043.0.35-2666-gbdde708 (armv7l)GCC 4.6ext2/ext3ProcessorMotherboardMemoryDiskOSKernelCompilerFile-SystemJohn_the_ripper1 BenchmarksSystem Logs

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.8.0Test: Traditional DES1970-01-01 02:39100M200M300M400M500MSE +/- 4409499.53, N = 3454269333

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.8.0Test: MD51970-01-01 02:392K4K6K8K10KSE +/- 20.42, N = 38064

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.8.0Test: Blowfish1970-01-01 02:39120240360480600SE +/- 4.51, N = 3541