pi john

ARMv8 Cortex-A72 testing with a BCM2835 Raspberry Pi 400 Rev 1.0 and vc4drmfb on Debian 11 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2303176-NE-PIJOHN58478
Jump To Table - Results

View

Do Not Show Noisy Results
Do Not Show Results With Incomplete Data
Do Not Show Results With Little Change/Spread
List Notable Results
Show Result Confidence Charts
Allow Limiting Results To Certain Suite(s)

Statistics

Show Overall Harmonic Mean(s)
Show Overall Geometric Mean
Show Wins / Losses Counts (Pie Chart)
Normalize Results
Remove Outliers Before Calculating Averages

Graph Settings

Force Line Graphs Where Applicable
Convert To Scalar Where Applicable
Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Highlight
Result
Toggle/Hide
Result
Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
a
March 17 2023
  14 Minutes
b
March 17 2023
  5 Minutes
c
March 17 2023
  5 Minutes
Invert Behavior (Only Show Selected Data)
  8 Minutes

Only show results where is faster than
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


pi johnOpenBenchmarking.orgPhoronix Test SuiteARMv8 Cortex-A72 @ 1.80GHz (4 Cores)BCM2835 Raspberry Pi 400 Rev 1.0Broadcom BCM27114096MB128GB SF128vc4drmfbDELL P2210HDebian 115.15.84-v8+ (aarch64)LXDEX Server 1.20.11GCC 10.2.1 20210110ext41920x1080ProcessorMotherboardChipsetMemoryDiskGraphicsMonitorOSKernelDesktopDisplay ServerCompilerFile-SystemScreen ResolutionPi John BenchmarksSystem Logs- snd_bcm2835.enable_compat_alsa=0 snd_bcm2835.enable_hdmi=1 - --build=aarch64-linux-gnu --disable-libquadmath --disable-libquadmath-support --disable-werror --enable-bootstrap --enable-checking=release --enable-clocale=gnu --enable-default-pie --enable-fix-cortex-a53-843419 --enable-gnu-unique-object --enable-languages=c,ada,c++,go,d,fortran,objc,obj-c++,m2 --enable-libphobos-checking=release --enable-libstdcxx-debug --enable-libstdcxx-time=yes --enable-link-mutex --enable-multiarch --enable-nls --enable-objc-gc=auto --enable-plugin --enable-shared --enable-threads=posix --host=aarch64-linux-gnu --program-prefix=aarch64-linux-gnu- --target=aarch64-linux-gnu --with-build-config=bootstrap-lto-lean --with-default-libstdcxx-abi=new --with-gcc-major-version-only --with-target-system-zlib=auto -v - Scaling Governor: cpufreq-dt ondemand- itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of __user pointer sanitization + spectre_v2: Vulnerable + srbds: Not affected + tsx_async_abort: Not affected

abcResult OverviewPhoronix Test Suite100%103%106%108%John The RipperJohn The RipperJohn The RipperGoogle DracoJohn The RipperGoogle DracoJohn The RipperbcryptBlowfishMD5Church FacadeHMAC-SHA512LionWPA PSK

pi johnjohn-the-ripper: bcryptjohn-the-ripper: WPA PSKjohn-the-ripper: Blowfishjohn-the-ripper: HMAC-SHA512john-the-ripper: MD5draco: Liondraco: Church Facadeabc162516731466216000037588175672713014641673162321650003762317550272221625167416272162000370261757927080OpenBenchmarking.org

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: bcryptabc30060090012001500SE +/- 1.20, N = 31625146416251. (CC) gcc options: -fopenmp

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: WPA PSKabc4008001200160020001673167316741. (CC) gcc options: -fopenmp

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: Blowfishabc30060090012001500SE +/- 2.08, N = 31466162316271. (CC) gcc options: -fopenmp

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: HMAC-SHA512abc500K1000K1500K2000K2500KSE +/- 2309.40, N = 32160000216500021620001. (CC) gcc options: -fopenmp

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: MD5abc8K16K24K32K40KSE +/- 56.89, N = 33758837623370261. (CC) gcc options: -fopenmp

Google Draco

Draco is a library developed by Google for compressing/decompressing 3D geometric meshes and point clouds. This test profile uses some Artec3D PLY models as the sample 3D model input formats for Draco compression/decompression. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgms, Fewer Is BetterGoogle Draco 1.5.6Model: Lionabc4K8K12K16K20KSE +/- 16.83, N = 31756717550175791. (CXX) g++ options: -O3

OpenBenchmarking.orgms, Fewer Is BetterGoogle Draco 1.5.6Model: Church Facadeabc6K12K18K24K30KSE +/- 29.67, N = 32713027222270801. (CXX) g++ options: -O3

7 Results Shown

John The Ripper:
  bcrypt
  WPA PSK
  Blowfish
  HMAC-SHA512
  MD5
Google Draco:
  Lion
  Church Facade