phoronix-cryptography-test-results.txt

Exynos ARMv7 rev 3 testing on Ubuntu 15.04 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 1612168-KH-PHORONIXC80
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
odroid-xu4/phoronix/cryptography
December 16 2016
 
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


phoronix-cryptography-test-results.txtOpenBenchmarking.orgPhoronix Test SuiteExynos ARMv7 rev 3 @ 1.40GHz (8 Cores)ODROID-XU32048MB128GB SL128Ubuntu 15.043.10.103+ (armv7l)X Server 1.17.12.1 Mesa 10.5.9GCC 4.9.2ext45120x1080ProcessorMotherboardMemoryDiskOSKernelDisplay ServerOpenGLCompilerFile-SystemScreen ResolutionPhoronix-cryptography-test-results.txt BenchmarksSystem Logs- --build=arm-linux-gnueabihf --disable-browser-plugin --disable-libitm --disable-libquadmath --disable-sjlj-exceptions --disable-werror --enable-checking=release --enable-clocale=gnu --enable-gnu-unique-object --enable-gtk-cairo --enable-java-awt=gtk --enable-java-home --enable-languages=c,c++,java,go,d,fortran,objc,obj-c++ --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-multilib --enable-multilib --enable-nls --enable-objc-gc --enable-plugin --enable-shared --enable-threads=posix --host=arm-linux-gnueabihf --target=arm-linux-gnueabihf --with-arch-directory=arm --with-arch=armv7-a --with-float=hard --with-fpu=vfpv3-d16 --with-mode=thumb -v - Scaling Governor: exynos_cpufreq performance

phoronix-cryptography-test-results.txtgcrypt: CAMELLIA256-ECB Ciphergnupg: 1GB File Encryptionjohn-the-ripper: Blowfishjohn-the-ripper: Traditional DESjohn-the-ripper: MD5openssl: RSA 4096-bit Performanceodroid-xu4/phoronix/cryptography447723.589758655566671899848.50OpenBenchmarking.org

Gcrypt Library

OpenBenchmarking.orgMicroseconds, Fewer Is BetterGcrypt Library 1.4.4CAMELLIA256-ECB Cipherodroid-xu4/phoronix/cryptography10002000300040005000SE +/- 32.83, N = 344771. (CC) gcc options: -O2 -fvisibility=hidden

GnuPG

OpenBenchmarking.orgSeconds, Fewer Is BetterGnuPG 1.4.101GB File Encryptionodroid-xu4/phoronix/cryptography612182430SE +/- 0.40, N = 823.581. (CC) gcc options: -O2 -MT -MD -MP -MF

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.8.0Test: Blowfishodroid-xu4/phoronix/cryptography2004006008001000SE +/- 15.34, N = 49751. (CC) gcc options: -fopenmp

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.8.0Test: Traditional DESodroid-xu4/phoronix/cryptography200M400M600M800M1000MSE +/- 10089107.04, N = 38655566671. (CC) gcc options: -fopenmp

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.8.0Test: MD5odroid-xu4/phoronix/cryptography4K8K12K16K20KSE +/- 32.95, N = 3189981. (CC) gcc options: -fopenmp

OpenSSL

OpenSSL is an open-source toolkit that implements SSL (Secure Sockets Layer) and TLS (Transport Layer Security) protocols. This test measures the RSA 4096-bit performance of OpenSSL. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgSigns Per Second, More Is BetterOpenSSL 1.0.1gRSA 4096-bit Performanceodroid-xu4/phoronix/cryptography1122334455SE +/- 0.84, N = 648.501. (CC) gcc options: -march=armv7-a -O3 -lssl -lcrypto -ldl