teste ripper 01

jhon the ripper

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2002134-HU-TESTERIPP47
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
jhon-the-ripper
February 13 2020
  4 Minutes


teste ripper 01OpenBenchmarking.orgPhoronix Test SuiteARMv7 Cortex-A53 @ 1.20GHz (4 Cores)BCM2835 Raspberry Pi 3 Model B Rev 1.2927MB32GB SB32GBCM2708Raspbian 9.84.14.98-v7+ (armv7l)GCC 6.3.0 20170516ext4656x416ProcessorMotherboardMemoryDiskGraphicsOSKernelCompilerFile-SystemScreen ResolutionTeste Ripper 01 BenchmarksSystem Logs- --build=arm-linux-gnueabihf --disable-browser-plugin --disable-libitm --disable-libquadmath --disable-sjlj-exceptions --enable-checking=release --enable-clocale=gnu --enable-gnu-unique-object --enable-gtk-cairo --enable-java-awt=gtk --enable-java-home --enable-languages=c,ada,c++,java,go,d,fortran,objc,obj-c++ --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-multiarch --enable-nls --enable-objc-gc=auto --enable-plugin --enable-shared --enable-threads=posix --host=arm-linux-gnueabihf --program-prefix=arm-linux-gnueabihf- --target=arm-linux-gnueabihf --with-arch-directory=arm --with-arch=armv6 --with-default-libstdcxx-abi=new --with-float=hard --with-fpu=vfp --with-target-system-zlib -v - Scaling Governor: BCM2835 Freq ondemand

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 1.9.0-jumbo-1Test: MD5jhon-the-ripper3K6K9K12K15KSE +/- 3.53, N = 3118311. (CC) gcc options: -lssl -lcrypto -fopenmp -pthread -lm -lz -ldl -lcrypt