john-the-ripper Blowfish

ARMv7 rev 5 testing on Raspbian 8.0 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 1611269-LO-JOHNTHERI85
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
Blowfish
November 26 2016
 


john-the-ripper BlowfishOpenBenchmarking.orgPhoronix Test SuiteARMv7 rev 5 @ 1.00GHz (4 Cores)BCM2709 Raspberry Pi 2 Model B Rev 1.11024MB16GB SP16GRaspbian 8.04.4.32-v7+ (armv7l)GCC 4.9.2ext4720x480ProcessorMotherboardMemoryDiskOSKernelCompilerFile-SystemScreen ResolutionJohn-the-ripper Blowfish BenchmarksSystem Logs- --build=arm-linux-gnueabihf --disable-browser-plugin --disable-libitm --disable-libquadmath --disable-sjlj-exceptions --enable-checking=release --enable-clocale=gnu --enable-gnu-unique-object --enable-gtk-cairo --enable-java-awt=gtk --enable-java-home --enable-languages=c,c++,java,go,d,fortran,objc,obj-c++ --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-nls --enable-objc-gc --enable-plugin --enable-shared --enable-threads=posix --host=arm-linux-gnueabihf --target=arm-linux-gnueabihf --with-arch-directory=arm --with-arch=armv6 --with-float=hard --with-fpu=vfp -v - Scaling Governor: BCM2835 Freq ondemand

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.8.0Test: BlowfishBlowfish90180270360450SE +/- 2.60, N = 34291. (CC) gcc options: -fopenmp