Warning: file_get_contents(/data/phpspider/zhask/data//catemap/4/c/69.json): failed to open stream: No such file or directory in /data/phpspider/zhask/libs/function.php on line 167

Warning: Invalid argument supplied for foreach() in /data/phpspider/zhask/libs/tag.function.php on line 1116

Notice: Undefined index: in /data/phpspider/zhask/libs/function.php on line 180

Warning: array_chunk() expects parameter 1 to be array, null given in /data/phpspider/zhask/libs/function.php on line 181
C 为什么Openmp转换工作,但尝试openmpi显示错误_C_Parallel Processing_Openmpi - Fatal编程技术网

C 为什么Openmp转换工作,但尝试openmpi显示错误

C 为什么Openmp转换工作,但尝试openmpi显示错误,c,parallel-processing,openmpi,C,Parallel Processing,Openmpi,当我使用openmp并行化下面的代码时,它工作得非常好,但是尝试使用openmpi并行化相同的代码时,似乎存在一系列问题,我真的不知道如何解决,因为我对openmpi语法不熟悉。请问如何将此代码转换为MPI版本 当我运行命令时: mpic++ firstmpi.c -o firstmpi -lcrypto 产生的错误有: firstmpi.c: In function ‘unsigned char* decrypt(unsigned char*, int, unsigned char*, un

当我使用openmp并行化下面的代码时,它工作得非常好,但是尝试使用openmpi并行化相同的代码时,似乎存在一系列问题,我真的不知道如何解决,因为我对openmpi语法不熟悉。请问如何将此代码转换为MPI版本

当我运行命令时:

mpic++ firstmpi.c -o firstmpi -lcrypto
产生的错误有:

firstmpi.c: In function ‘unsigned char* decrypt(unsigned char*, int, unsigned char*, unsigned char*)’:
firstmpi.c:24:38: error: invalid conversion from ‘void*’ to ‘unsigned char*’ [-fpermissive]
     unsigned char* plaintext = malloc(ciphertext_len);
                                ~~~~~~^~~~~~~~~~~~~~~~
firstmpi.c: In function ‘void initAES(const unsigned char*, unsigned char*, unsigned char*, unsigned char*)’:
firstmpi.c:105:70: error: invalid conversion from ‘const unsigned char*’ to ‘const char*’ [-fpermissive]
    EVP_BytesToKey(EVP_aes_128_cbc(), EVP_sha1(), salt, pass, strlen(pass), 1, key, iv);
                                                                     ^~~~

In file included from firstmpi.c:3:
/usr/include/string.h:384:35: note:   initializing argument 1 of ‘size_t strlen(const char*)’
 extern size_t strlen (const char *__s)
                       ~~~~~~~~~~~~^~~
firstmpi.c: In function ‘int main(int, char**)’:
firstmpi.c:123:23: warning: ISO C++ forbids converting a string constant to ‘char*’ [-Wwrite-strings]
     char* plaintext = "This is the top seret message in parallel computing! Please keep it in a safe place.";
                       ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
firstmpi.c:178:56: error: invalid conversion from ‘unsigned char*’ to ‘char*’ [-fpermissive]
                           if(checkPlaintext(plaintext, result)==0){
                                                        ^~~~~~
firstmpi.c:109:43: note:   initializing argument 2 of ‘int checkPlaintext(char*, char*)’
 int checkPlaintext(char* plaintext, char* result){
         
这是openmpi代码:

int main (int argc, char** argv)
{

    // password 12345
    // it took 9 seconds to work out
    char* ciphertext_base64 = (char*) "U2FsdGVkX19q3SzS6GhhzAKgK/YhFVTkM3RLVxxZ+nM6yXdfLZtvhyRR4oGohDotiifnR1iKyitSpiBM3hng+eoFfGbtgCu3Zh9DwIhgfS5A+OTl5a4L7pRFG4yL432HsMGRC1hy1RNPSzA0U5YyWA==\n";

    char* plaintext = "This is the top seret message in parallel computing! Please keep it in a safe place.";
    char dict[] = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz"; // changed

    int decryptedtext_len, ciphertext_len, dict_len;

    // cipher (binary) pointer and length
    size_t cipher_len; // size_t is sizeof(type)
    unsigned char* ciphertext;

    unsigned char salt[8];

    ERR_load_crypto_strings();

    Base64Decode(ciphertext_base64, &ciphertext, &cipher_len);

    unsigned char key[16];
    unsigned char iv[16];

    unsigned char plainpassword[] = "00000";
    unsigned char* password = &plainpassword[0];

    // retrive the slater from ciphertext (binary)
    if (strncmp((const char*)ciphertext,"Salted__",8) == 0) { // find the keyword "Salted__"

        memcpy(salt,&ciphertext[8],8);
        ciphertext += 16;
        cipher_len -= 16;

    }

    dict_len = strlen(dict);

    time_t begin = time(NULL);

    int process_Rank, size_Of_Cluster;
    MPI_Init(&argc, &argv);
    MPI_Comm_size(MPI_COMM_WORLD, &size_Of_Cluster);
    MPI_Comm_rank(MPI_COMM_WORLD, &process_Rank);

    for(int i=0; i<dict_len; i++){
      for(int j=0; j<dict_len; j++)
          for(int k=0; k<dict_len; k++)
              for(int l=0; l<dict_len; l++)
                  for(int m=0; m<dict_len; m++){
                      *password = dict[i];
                      *(password+1) = dict[j];
                      *(password+2) = dict[k];
                      *(password+3) = dict[l];
                      *(password+4) = dict[m];


                      initAES(password, salt, key, iv);
                      unsigned char* result = decrypt(ciphertext, cipher_len, key, iv);

                      if (success == 1){
                          if(checkPlaintext(plaintext, result)==0){

                              printf("Password is %s\n", password);

                              time_t end = time(NULL);
                              printf("Time elpased is %ld seconds", (end - begin));

                              return 0;
                          }
                      }
                      free(result);
                  }
    }

    MPI_Finalize();
    // Clean up

    EVP_cleanup();
    ERR_free_strings();


    return 0;
}
int main(int argc,char**argv)
{
//密码12345
//这花了9秒钟的时间
char*ciphertext_base64=(char*)“u2fsdgvkx19q3sz6ghhzakgk/yhfvvtkm3rlvxz+nm6yxdflztvhyrr4ogohodotifnr1kyitspibm3hng+eoFfGbtgCu3Zh9DwIhgfS5A+otl5a4l7prfg4yl432hsmgrc1hy1rnpsza0u5ywa=\n”;
char*plaintext=“这是并行计算中最重要的seret消息!请将其保存在安全的地方。”;
char dict[]=“0123456789abcdefghijklmnopqrstuvxyzabcdefghijklmnopqrstuvxyz”;//已更改
整数解密文本、密文、密文;
//密码(二进制)指针和长度
size\u t cipher\u len;//size\u t是sizeof(类型)
无符号字符*密文;
无符号半焦盐[8];
错误加载加密字符串();
base64解码(密文、base64、密文和密文);
无符号字符键[16];
无符号字符iv[16];
未签名字符密码[]=“00000”;
未签名字符*密码=&plainpassword[0];
//从密文(二进制)检索slater
如果(strncmp((const char*)密文,“Salted\uuuuu8)=0{//查找关键字“Salted\uuuuuu”
memcpy(salt和密文[8],8);
密文+=16;
密码_len-=16;
}
dict_len=strlen(dict);
时间\u t开始=时间(空);
int进程排名,集群大小;
MPI_Init(&argc,&argv);
MPI通信大小(MPI通信世界和集群大小);
MPI通信等级(MPI通信世界和过程等级);
对于(int i=0;i
#include <openssl/ssl.h>
#include <openssl/err.h>
#include <string.h>
#include <stdio.h>
#include <time.h>


int success = 0;

void handleOpenSSLErrors(void)
{
    ERR_print_errors_fp(stderr);
    abort();
}

unsigned char* decrypt(unsigned char *ciphertext, int ciphertext_len, unsigned char *key, unsigned char *iv ){

    EVP_CIPHER_CTX *ctx;
    unsigned char *plaintexts;
    int len;
    int plaintext_len;

    unsigned char* plaintext = malloc(ciphertext_len);
    bzero(plaintext,ciphertext_len);

    /* Create and initialise the context */

    if(!(ctx = EVP_CIPHER_CTX_new())) handleOpenSSLErrors();

    /* Initialise the decryption operation. IMPORTANT - ensure you use a key
    * and IV size appropriate for your cipher
    * IV size for *most* modes is the same as the block size. For AES this
    * is 128 bits */

    if(1 != EVP_DecryptInit_ex(ctx, EVP_aes_128_cbc(), NULL, key, iv))
        handleOpenSSLErrors();


    EVP_CIPHER_CTX_set_key_length(ctx, EVP_MAX_KEY_LENGTH);

    /* Provide the message to be decrypted, and obtain the plaintext output.
    * EVP_DecryptUpdate can be called multiple times if necessary
    */
    if(1 != EVP_DecryptUpdate(ctx, plaintext, &len, ciphertext, ciphertext_len))
        handleOpenSSLErrors();

    plaintext_len = len;

    /* Finalise the decryption. Further plaintext bytes may be written at
    * this stage.
    */

    // return 1 if decryption successful, otherwise 0
    if(1 == EVP_DecryptFinal_ex(ctx, plaintext + len, &len)){

        success = 1;
        plaintext_len += len;
    }

    /* Add the null terminator */
    plaintext[plaintext_len] = 0;

    /* Clean up */
    EVP_CIPHER_CTX_free(ctx);
    //delete [] plaintext;
    return plaintext;
}


size_t calcDecodeLength(char* b64input) {
    size_t len = strlen(b64input), padding = 0;

    if (b64input[len-1] == '=' && b64input[len-2] == '=') //last two chars are =
        padding = 2;
    else if (b64input[len-1] == '=') //last char is =
        padding = 1;
    return (len*3)/4 - padding;
}

void Base64Decode( char* b64message, unsigned char** buffer, size_t* length) {


    BIO *bio, *b64;  // A BIO is an I/O strean abstraction

    int decodeLen = calcDecodeLength(b64message);
    *buffer = (unsigned char*)malloc(decodeLen + 1);
    (*buffer)[decodeLen] = '\0';

    bio = BIO_new_mem_buf(b64message, -1);
    b64 = BIO_new(BIO_f_base64());
    bio = BIO_push(b64, bio);

    //BIO_set_flags(bio, BIO_FLAGS_BASE64_NO_NL); //Do not use newlines to flush buffer
    *length = BIO_read(bio, *buffer, strlen(b64message));
    BIO_free_all(bio);
}

void initAES(const unsigned char *pass, unsigned char* salt, unsigned char* key, unsigned char* iv )
{
    //initialisatio of key and iv with 0
    bzero(key,sizeof(key));
    bzero(iv,sizeof(iv));

    EVP_BytesToKey(EVP_aes_128_cbc(), EVP_sha1(), salt, pass, strlen(pass), 1, key, iv);
}


int checkPlaintext(char* plaintext, char* result){

    int length = 10; // we just check the first then characters
    return strncmp(plaintext, result, length);

}

int main (void)
{

    // password 12345
    // it took 9 seconds to work out
    char* ciphertext_base64 = (char*) "U2FsdGVkX19q3SzS6GhhzAKgK/YhFVTkM3RLVxxZ+nM6yXdfLZtvhyRR4oGohDotiifnR1iKyitSpiBM3hng+eoFfGbtgCu3Zh9DwIhgfS5A+OTl5a4L7pRFG4yL432HsMGRC1hy1RNPSzA0U5YyWA==\n";

    char* plaintext = "This is the top seret message in parallel computing! Please keep it in a safe place.";
    char dict[] = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz"; // changed

    int decryptedtext_len, ciphertext_len, dict_len;

    // cipher (binary) pointer and length
    size_t cipher_len; // size_t is sizeof(type)
    unsigned char* ciphertext;

    unsigned char salt[8];

    ERR_load_crypto_strings();

    Base64Decode(ciphertext_base64, &ciphertext, &cipher_len);

    unsigned char key[16];
    unsigned char iv[16];

    unsigned char plainpassword[] = "00000";
    unsigned char* password = &plainpassword[0];

    // retrive the slater from ciphertext (binary)
    if (strncmp((const char*)ciphertext,"Salted__",8) == 0) { // find the keyword "Salted__"

        memcpy(salt,&ciphertext[8],8);
        ciphertext += 16;
        cipher_len -= 16;

    }

    dict_len = strlen(dict);

    time_t begin = time(NULL);


    for(int i=0; i<dict_len; i++)
        for(int j=0; j<dict_len; j++)
            for(int k=0; k<dict_len; k++)
                for(int l=0; l<dict_len; l++)
                    for(int m=0; m<dict_len; m++){
                        *password = dict[i];
                        *(password+1) = dict[j];
                        *(password+2) = dict[k];
                        *(password+3) = dict[l];
                        *(password+4) = dict[m];


                        initAES(password, salt, key, iv);
                        unsigned char* result = decrypt(ciphertext, cipher_len, key, iv);

                        if (success == 1){
                            if(checkPlaintext(plaintext, result)==0){

                                printf("Password is %s\n", password);

                                time_t end = time(NULL);
                                printf("Time elpased is %ld seconds", (end - begin));

                                return 0;
                            }

                        }

                        free(result);
                    }


    // Clean up

    EVP_cleanup();
    ERR_free_strings();


    return 0;
}