Test results for armeabi, tinker, crypto_aead/flexaead128b064v1
[Page version: 20241024 12:18:11]
Measurements for armeabi, tinker, crypto_aead
Test results for armeabi, tinker, crypto_aead
Test results for crypto_aead/flexaead128b064v1
Computer: tinker
Microarchitecture: armeabi; Cortex-A17 (410fc0d1)
Architecture: armeabi
CPU ID: unknown CPU ID
SUPERCOP version: 20240909
Operation: crypto_aead
Primitive: flexaead128b064v1
Time | Object size | Test size | Implementation | Compiler | Benchmark date | SUPERCOP version |
2236413 | 5408 0 0 | 16237 384 824 | T:ref | gcc -march=native -mtune=native -O2 -fwrapv -fPIC -fPIE -gdwarf-4 -Wall | 20240927 | 20240909 |
2980976 | 9100 0 0 | 22794 412 824 | T:ref | clang -mcpu=native -O3 -fwrapv -Qunused-arguments -fPIC -fPIE -gdwarf-4 -Wall | 20240927 | 20240909 |
3197973 | 5556 0 0 | 15949 384 816 | T:ref | gcc -march=native -mtune=native -O -fwrapv -fPIC -fPIE -gdwarf-4 -Wall | 20240927 | 20240909 |
3471010 | 3264 0 0 | 12085 376 816 | T:ref | gcc -march=native -mtune=native -Os -fwrapv -fPIC -fPIE -gdwarf-4 -Wall | 20240927 | 20240909 |
Compiler output
encrypt.c: In function ‘dirShuffleLayer’,
encrypt.c: inlined from ‘dirPFK’ at encrypt.c:371:3,
encrypt.c: inlined from ‘sumAD’ at encrypt.c:445:2:
encrypt.c: encrypt.c:342:32: warning: writing 1 byte into a region of size 0 [-Wstringop-overflow=]
encrypt.c: 342 | *(state+2*i+0) = ( (*(block+i+0)) & 0xf0) + ((*(block+i+(blocklen/2))&0xf0)>>4);
encrypt.c: | ~~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
encrypt.c: encrypt.c: In function ‘sumAD’:
encrypt.c: encrypt.c:35:18: note: at offset 8 into destination object ‘state’ of size 8
encrypt.c: 35 | unsigned char state[BLOCKSIZE];
encrypt.c: | ^~~~~
encrypt.c: In function ‘dirShuffleLayer’,
encrypt.c: inlined from ‘dirPFK’ at encrypt.c:371:3,
encrypt.c: inlined from ‘sumAD’ at encrypt.c:445:2:
encrypt.c: encrypt.c:343:32: warning: writing 1 byte into a region of size 0 [-Wstringop-overflow=]
encrypt.c: 343 | *(state+2*i+1) = ( (*(block+i+0) & 0x0f)<<4) + ((*(block+i+(blocklen/2))&0x0f));
encrypt.c: | ~~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
encrypt.c: encrypt.c: In function ‘sumAD’:
encrypt.c: encrypt.c:35:18: note: at offset 9 into destination object ‘state’ of size 8
encrypt.c: 35 | unsigned char state[BLOCKSIZE];
encrypt.c: | ^~~~~
encrypt.c: In function ‘dirShuffleLayer’,
encrypt.c: inlined from ‘dirPFK’ at encrypt.c:371:3,
encrypt.c: inlined from ‘sumAD’ at encrypt.c:445:2:
encrypt.c: encrypt.c:342:32: warning: writing 1 byte into a region of size 0 [-Wstringop-overflow=]
encrypt.c: 342 | *(state+2*i+0) = ( (*(block+i+0)) & 0xf0) + ((*(block+i+(blocklen/2))&0xf0)>>4);
encrypt.c: ...
Number of similar (implementation,compiler) pairs: 1, namely:
Implementation | Compiler |
T:ref | gcc -march=native -mtune=native -O3 -fwrapv -fPIC -fPIE -gdwarf-4 -Wall (12.2.0) |
Namespace violations
encrypt.o FlexAEADv1_init T
encrypt.o decryptBlock T
encrypt.o dirPFK T
encrypt.o dirSBox0 R
encrypt.o dirSBoxLayer T
encrypt.o dirShuffleLayer T
encrypt.o encryptBlock T
encrypt.o inc32 T
encrypt.o invPFK T
encrypt.o invSBox0 R
encrypt.o invSBoxLayer T
encrypt.o invShuffleLayer T
encrypt.o padBlock T
encrypt.o sumAD T
encrypt.o unpadBlock T
Number of similar (implementation,compiler) pairs: 4, namely:
Implementation | Compiler |
T:ref | clang -mcpu=native -O3 -fwrapv -Qunused-arguments -fPIC -fPIE -gdwarf-4 -Wall (Debian_Clang_14.0.6) |
T:ref | gcc -march=native -mtune=native -O2 -fwrapv -fPIC -fPIE -gdwarf-4 -Wall (12.2.0) |
T:ref | gcc -march=native -mtune=native -O -fwrapv -fPIC -fPIE -gdwarf-4 -Wall (12.2.0) |
T:ref | gcc -march=native -mtune=native -Os -fwrapv -fPIC -fPIE -gdwarf-4 -Wall (12.2.0) |