Test results for armeabi, tinker, crypto_aead/flexaead128b064v1

[Page version: 20241024 12:18:11]

Measurements for armeabi, tinker, crypto_aead Test results for armeabi, tinker, crypto_aead Test results for crypto_aead/flexaead128b064v1
Computer: tinker
Microarchitecture: armeabi; Cortex-A17 (410fc0d1)
Architecture: armeabi
CPU ID: unknown CPU ID
SUPERCOP version: 20240909
Operation: crypto_aead
Primitive: flexaead128b064v1
TimeObject sizeTest sizeImplementationCompilerBenchmark dateSUPERCOP version
22364135408 0 016237 384 824T:refgcc -march=native -mtune=native -O2 -fwrapv -fPIC -fPIE -gdwarf-4 -Wall2024092720240909
29809769100 0 022794 412 824T:refclang -mcpu=native -O3 -fwrapv -Qunused-arguments -fPIC -fPIE -gdwarf-4 -Wall2024092720240909
31979735556 0 015949 384 816T:refgcc -march=native -mtune=native -O -fwrapv -fPIC -fPIE -gdwarf-4 -Wall2024092720240909
34710103264 0 012085 376 816T:refgcc -march=native -mtune=native -Os -fwrapv -fPIC -fPIE -gdwarf-4 -Wall2024092720240909

Compiler output


encrypt.c: In function ‘dirShuffleLayer’,
encrypt.c:     inlined from ‘dirPFK’ at encrypt.c:371:3,
encrypt.c:     inlined from ‘sumAD’ at encrypt.c:445:2:
encrypt.c: encrypt.c:342:32: warning: writing 1 byte into a region of size 0 [-Wstringop-overflow=]
encrypt.c:   342 |                 *(state+2*i+0) = ( (*(block+i+0)) & 0xf0)    + ((*(block+i+(blocklen/2))&0xf0)>>4);
encrypt.c:       |                 ~~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
encrypt.c: encrypt.c: In function ‘sumAD’:
encrypt.c: encrypt.c:35:18: note: at offset 8 into destination object ‘state’ of size 8
encrypt.c:    35 |    unsigned char state[BLOCKSIZE];
encrypt.c:       |                  ^~~~~
encrypt.c: In function ‘dirShuffleLayer’,
encrypt.c:     inlined from ‘dirPFK’ at encrypt.c:371:3,
encrypt.c:     inlined from ‘sumAD’ at encrypt.c:445:2:
encrypt.c: encrypt.c:343:32: warning: writing 1 byte into a region of size 0 [-Wstringop-overflow=]
encrypt.c:   343 |                 *(state+2*i+1) = ( (*(block+i+0)  & 0x0f)<<4)  + ((*(block+i+(blocklen/2))&0x0f));
encrypt.c:       |                 ~~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
encrypt.c: encrypt.c: In function ‘sumAD’:
encrypt.c: encrypt.c:35:18: note: at offset 9 into destination object ‘state’ of size 8
encrypt.c:    35 |    unsigned char state[BLOCKSIZE];
encrypt.c:       |                  ^~~~~
encrypt.c: In function ‘dirShuffleLayer’,
encrypt.c:     inlined from ‘dirPFK’ at encrypt.c:371:3,
encrypt.c:     inlined from ‘sumAD’ at encrypt.c:445:2:
encrypt.c: encrypt.c:342:32: warning: writing 1 byte into a region of size 0 [-Wstringop-overflow=]
encrypt.c:   342 |                 *(state+2*i+0) = ( (*(block+i+0)) & 0xf0)    + ((*(block+i+(blocklen/2))&0xf0)>>4);
encrypt.c: ...

Number of similar (implementation,compiler) pairs: 1, namely:
ImplementationCompiler
T:refgcc -march=native -mtune=native -O3 -fwrapv -fPIC -fPIE -gdwarf-4 -Wall (12.2.0)

Namespace violations


encrypt.o FlexAEADv1_init T
encrypt.o decryptBlock T
encrypt.o dirPFK T
encrypt.o dirSBox0 R
encrypt.o dirSBoxLayer T
encrypt.o dirShuffleLayer T
encrypt.o encryptBlock T
encrypt.o inc32 T
encrypt.o invPFK T
encrypt.o invSBox0 R
encrypt.o invSBoxLayer T
encrypt.o invShuffleLayer T
encrypt.o padBlock T
encrypt.o sumAD T
encrypt.o unpadBlock T

Number of similar (implementation,compiler) pairs: 4, namely:
ImplementationCompiler
T:refclang -mcpu=native -O3 -fwrapv -Qunused-arguments -fPIC -fPIE -gdwarf-4 -Wall (Debian_Clang_14.0.6)
T:refgcc -march=native -mtune=native -O2 -fwrapv -fPIC -fPIE -gdwarf-4 -Wall (12.2.0)
T:refgcc -march=native -mtune=native -O -fwrapv -fPIC -fPIE -gdwarf-4 -Wall (12.2.0)
T:refgcc -march=native -mtune=native -Os -fwrapv -fPIC -fPIE -gdwarf-4 -Wall (12.2.0)