Implementation notes: amd64, speed2supercop, crypto_aead/elephant176v1

Computer: speed2supercop
Microarchitecture: amd64; Haswell+AES (306c3)
Architecture: amd64
CPU ID: GenuineIntel-000306c3-1fc9cbf5
SUPERCOP version: 20240425
Operation: crypto_aead
Primitive: elephant176v1
TimeObject sizeTest sizeImplementationCompilerBenchmark dateSUPERCOP version
1219719327877 1024 023669 1784 928T:refgcc_-march=native_-mtune=native_-O3_-fomit-frame-pointer_-fwrapv_-fPIC_-fPIE2024042620240425
1494577243513 1024 017485 1784 928T:refgcc_-march=native_-mtune=native_-O2_-fomit-frame-pointer_-fwrapv_-fPIC_-fPIE2024042620240425
2792799522912 1024 016445 1784 928T:refgcc_-march=native_-mtune=native_-O_-fomit-frame-pointer_-fwrapv_-fPIC_-fPIE2024042620240425
6794818602330 1024 014568 1760 896T:refgcc_-march=native_-mtune=native_-Os_-fomit-frame-pointer_-fwrapv_-fPIC_-fPIE2024042620240425

Compiler output

Implementation: T:ref
Security model: timingleaks
Compiler: gcc -march=native -mtune=native -O3 -fomit-frame-pointer -fwrapv -fPIC -fPIE
encrypt.c: encrypt.c: In function 'crypto_aead_impl':
encrypt.c: encrypt.c:140:13: warning: 'memcpy' reading 32 or more bytes from a region of size 22 [-Wstringop-overread]
encrypt.c: 140 | memcpy(c + offset, c_buffer, r_size);
encrypt.c: | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
encrypt.c: encrypt.c:120:10: note: source object 'c_buffer' of size 22
encrypt.c: 120 | BYTE c_buffer[BLOCK_SIZE];
encrypt.c: | ^~~~~~~~

Number of similar (compiler,implementation) pairs: 1, namely:
CompilerImplementations
gcc -march=native -mtune=native -O3 -fomit-frame-pointer -fwrapv -fPIC -fPIE T:ref