imo, their are comparing the hash of the 3 versions against a stored hash. This will help slowing down brute force attacks(http://en.wikipedia.org/wiki/Bcrypt), although it does make brute force attack 3 times easier, since now you can hit the correct password 3 times with the same set of characters.
I'd not confuse 3 hash-rounds with anything to do with Bcrypt, which is several orders of magnitude off from what most-all Bcrypt libs will have as their default rounds. Most that I've browsed will have a default work-factor of 10 (or 1024 -- 210 -- rounds), with Python's de jour using a factor of 12 (or 4096 rounds).