AES support in SunJCE

Hi,
Does anyone know when SunJCE will support AES. I tried to experiment with 1.4.2 version and didnt see any support. However IBM JCE ( comes with the 1.4.2 version) seems to have support for it.
Thanks.
Sunitha.

sorry!
Actually, I was trying out with 1.4.1 jvm and hence AES wasnt working.
However, sun jce in 1.4.2 AES is supported.
Sunitha.

Similar Messages

  • AES supported key sizes!

    Hi all,
    is there any function that specifies key size "secret key" used in AES cryptographic algorithm? if not which key size is supported?
    thanks alot.

    Hi again,
    i ve tried what you have told me but it gave me error ERROR: java.security.InvalidKeyException: Illegal key size or default parameters
    here is the code
    SecureRandom sprng = SecureRandom.getInstance("SHA1PRNG");
                KeyGenerator key = KeyGenerator.getInstance("AES");
                //key.init(sprng);
                key.init(192,  sprng);
                SecretKey encKey = key.generateKey();
                symmetricKey=encKey;
                Cipher encAES = Cipher.getInstance("AES");
                encAES.init(Cipher.ENCRYPT_MODE, encKey);
                encMsg=encAES.doFinal(message.getBytes());can any body help me plz!

  • Is RSA supported by SunJCE?

    Please, this may sound too basic, but I need to know from you whether SunJCE provider includes the RSA algorithm!

    Anyway, it is surprising that Java has so little
    support for public encryption that lies at the heart
    of cryptology, and security in general. Thanks for
    your help!It's not at all surprising if you know anything about US Export regulations. Those have been recently relaxed - which is why RSA is available as a Cipher now in 1.5.
    The standard Java library has some of the best encryption support I've seen, built in. There are Providers available, for free, that give you access to nearly every algorithm I can think of. JAAS provides access to a wide variety of authentication and authorization protocols. HTTPS is brain-dead easy. I can write my own TrustManager class, to control how (and from whom!) my program accepts certificates. There is built-in support for configurable SecurityManagers, that allow you fine-grained control over the allowed operations of the executing program.
    In what context does Java provide "little support for...security in general"?
    Grant

  • Is AES supported in 1.4.1

    Hi is there a reason why I cannot use AES with 1.4.1 and a Mac OSX 1.2.8 machine?
    DES and Blowfish worked so far.
    What gives?
    Thanks in advance

    If 1.4.2 is available for the Mac, then yes - other wise, no.
    You can use a different Provider - try bouncycastle.org, should work just fine.
    Grant

  • AES support for SRA Gateway

    Is it available an AES256 encryption support for the SRA Gateway Service?
    Otherwise, is it possible to plug-in a custom/self-made cipher?
    Finally (this is an RFE) it will be interesting if the Gateway could do the encryption job by using openssl APIs instead of the NSS ones, so that one could use his own openssl-based engine.

    Hi Walt, thank you for the feedback and for using the Remote Desktop app.
    We look at the user feedback in the Store and other site and know how important Gateway is to Remote Desktop, notably so on a phone.
    This is on our list of scenarios to enable, look for it in a future update later this year.
    Thanks,
    David Belanger
    This post is "AS IS" and confers no rights.

  • SunJCE, DH+AES

    Hi!
    I am trying to use SUN's default provider SunJCE to generate secret key out of DH key agreement. jdk version is 1.4.2.
    And I had ran into trouble of KeyAgreement not wanting to generate an AES key.
    java.security.NoSuchAlgorithmException: Unsupported secret key algorithm: AES
         at com.sun.crypto.provider.DHKeyAgreement.engineGenerateSecret(DashoA6275)
         at javax.crypto.KeyAgreement.generateSecret(DashoA6275)
         at Test.CryptoTests.main(CryptoTests.java:67)Do I understand right that there is no way to generate AES secret key out of SunJCE's v1.42 KeyAgreement?
    Of course I can use Blowfish or DESEDE, it's just that I prefer to use AES. I'd also prefer not to use third party providers' libraries.
    How stupid would be an idea to generate Blowfish key, convert it into a string form and use it as a password for a previously generated AES Cipher?

    How stupid would be an idea to generate Blowfish key,
    convert it into a string form and use it as a password
    for a previously generated AES Cipher?Ooooops. I've just discovered that there is no PBE + AES encryption in SunJCE. Looks like I'll have to settle with the Blowfish.

  • Can't get AES to work

    Hey all,
    I just registered here in an attempt to fix my problem... I've tried everything I can think of.
    My problem seems simple. I do this:
    SecretKeySpec keyspec = new SecretKeySpec(key, "AES");
    SecretKeyFactory factory = SecretKeyFactory.getInstance("AES");
    SecretKey secretkey = factory.generateSecret(keyspec);
    Cipher aes = Cipher.getInstance("AES");
    aes.init(Cipher.DECRYPT_MODE, secretkey);
    return aes.doFinal(data);
    And I get this:
    java.security.NoSuchAlgorithmException: Algorithm AES not available
    at javax.crypto.SunJCE_b.a(DashoA12275)
    at javax.crypto.SecretKeyFactory.getInstance(DashoA12275)
    at system.Decryptor.decrypt(Decryptor.java:78)
    at system.Decryptor.<init>(Decryptor.java:43)
    This is at the 'SecretKeyFactory.getInstance("AES");' line. When removed, the 'Cipher.getInstance("AES");' line complains about the same thing ("No support for AES").
    In order to remedy this problem I've tried the following:
    - Installing Java 1.4.2_09 (I had 1.4.2_05)
    - Installing Java 5.0 Update 4 and using that instead
    - Using the Bouncy Castle Provider
    - Using the Cryptix JCE Provider
    - Installing the unlimited strength policy files
    - Not using Eclipse
    - Forcing the SunJCE Provider (result in "no such algorithm: AES for provider SunJCE")
    - Using DES (same error messages, only for DES!)
    - Rebooting (I just didn't know anymore :P)
    Short from reinstalling Windows 2000 I can't think of anything else. I googled for two nights trying to find people with the same problem but it appears I'm pretty unique... none of the fixes I found worked. I'm pretty sure it must be something related to my set up, since by all means, it should work.
    Does anyone have any idea what I can do to fix it? Thanks in advance for any of your help!

    hi there,
    I just read your posts and apperently I have the same problem.
    I get an error message: "Algorithm AES not available"
    the thing is this: on my computer (XP) everything works fine! the encryption AES is working (I also able to decrypt)!!! but when I try the SAME code on a different computer (MS2003) it generates the error: "Algorithm AES not available"
    is there any file I should add so it will work?
    thanks for any help
    peter

  • Invalid stream header Exception - AES PBE with SealedObject

    I am trying to do an PBE encryption with AES algorithm and SunJCE provider, using the SealedObject class to encrypt/decrypt the data...
    And Im still getting the "invalid stream header" exception. Ive searched this forum, readed lots of posts, examples etc...
    Here is my code for encryption (i collected it from more classes, so hopefully I didnt forget anything...):
        //assume that INPUT_STREAM is the source of plaintext
        //and OUTPUT_STREAM is the stream to save the ciphertext data to
        char[] pass; //assume initialized password
        SecureRandom r = new SecureRandom();
        byte[] salt = new byte[20];
        r.nextBytes(salt);
        SecretKeyFactory factory = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA1");
        KeySpec keySpec = new PBEKeySpec(pass, salt, 1536, 128);
        SecretKey pbKey = factory.generateSecret(keySpec);
        SecretKeySpec key = new SecretKeySpec(pbKey.getEncoded(), "AES");
        Cipher ciph = Cipher.getInstance("AES/CTR/NoPadding");
        ciph.init(Cipher.ENCRYPT_MODE, key);
        ByteArrayOutputStream byteOut = new ByteArrayOutputStream();
        int ch;
        while ((ch = INPUT_STREAM.read()) >= 0) {
          byteOut.write(ch);
        SealedObject sealed = new SealedObject(byteOut.toByteArray(), ciph);
        BufferedOutputStream bufOut = new BufferedOutputStream(OUTPUTSTREAM);
        ObjectOutputStream objOut = new ObjectOutputStream(bufOut);   
        objOut.writeObject(sealed);
        objOut.close();
      }And here is my code for decrypting:
        //assume that INPUT_STREAM is the source of ciphertext
        //and OUTPUT_STREAM is the stream to save the plaintext data to
        char[] pass; //assume initialized password
        SecureRandom r = new SecureRandom();
        byte[] salt = new byte[20];
        r.nextBytes(salt);
        SecretKeyFactory factory = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA1");
        KeySpec keySpec = new PBEKeySpec(pass, salt, 1536, 128);
        SecretKey pbKey = factory.generateSecret(keySpec);
        SecretKeySpec key = new SecretKeySpec(pbKey.getEncoded(), "AES");
        BufferedInputStream bufIn = new BufferedInputStream(INPUT_STREAM);    //MARK #1
        ObjectInputStream objIn = new ObjectInputStream(bufIn);   
        SealedObject sealed = (SealedObject) objIn.readObject();   
        byte[] unsealed = (byte[]) sealed.getObject(key);          //MARK #2
        ByteArrayInputStream byteIn = new ByteArrayInputStream(unsealed);
        int ch;
        while ((ch = byteIn.read()) >= 0) {
          OUTPUT_STREAM.write(ch);
        OUTPUT_STREAM.close();Everytime I run it, it gives me this exception:
    Exception in thread "main" java.io.StreamCorruptedException: invalid stream header: B559ADBE
         at java.io.ObjectInputStream.readStreamHeader(ObjectInputStream.java:783)
         at java.io.ObjectInputStream.<init>(ObjectInputStream.java:280)
         at javax.crypto.SunJCE_i.<init>(DashoA13*..)
         at javax.crypto.SealedObject.unseal(DashoA13*..)
         at javax.crypto.SealedObject.getObject(DashoA13*..)
         at oopsifrovanie.engine.ItemToCrypt.decrypt(ItemToCrypt.java:91)  //MARKED AS #2
         at oopsifrovanie.Main.main(Main.java:37)    //The class with all code below MARK #1I've also found out that the hashCode of the generated "key" object in the decrypting routine is not the same as the hashCode of the "key" object in the ecrypting routine. Can this be a problem? I assume that maybe yes... but don't know what to do...
    When I delete the r.nextBytes(salt); from both routines, the hashCodes are the same, but that's not the thing I want to do...
    I think, that the source of problem can be this part of code (generating the key):
        SecretKeyFactory factory = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA1");
        KeySpec keySpec = new PBEKeySpec(pass, salt, 1536, 128);
        SecretKey pbKey = factory.generateSecret(keySpec);
        SecretKeySpec key = new SecretKeySpec(pbKey.getEncoded(), "AES");But I derived it from posts like: [http://forums.sun.com/thread.jspa?threadID=5307763] and [http://stackoverflow.com/questions/992019/java-256bit-aes-encryption] and they claimed it's working there...
    Is there anyone that can help me?
    Btw, I don't want to use any other providers like Bouncycastle etc. and I want to use PBE with AES and also SealedObject to store the parameters of encryption...

    Yes, it really uses only one Cipher object, but it does decoding in a little nonstandard (not often used) way, by using the SealedObject class and its getObject(Key key) method. You can check these links for documentation: [http://java.sun.com/javase/6/docs/technotes/guides/security/crypto/CryptoSpec.html#SealedObject] and [http://java.sun.com/javase/6/docs/api/javax/crypto/SealedObject.html] So the question is, why it doesn't work also with the AES routines, because it should.
    Btw, according to [http://java.sun.com/javase/6/docs/technotes/guides/security/SunProviders.html#SunJCEProvider] PBEWithSHA1AndDESede/CBC/PKCS5Padding is a valid JCE algorithm for the Cipher class.
    Firstly, I was generating the key for AES enc./decryption this way and it was working:
    char[] pass; //assume initialized password
    byte[] bpass = new byte[pass.length];
        for (int i = 0; i < pass.length; i++) {
          bpass[i] = (byte) pass;
    SecretKeySpec key = new SecretKeySpec(bpass, "AES");
    But I think, that it really wasn't secure, so I wanted to build a key from the password using the PBE.
    Maybe there's also a way how to do this part of my AES PBE algorithm: *KeySpec keySpec = new PBEKeySpec(pass, salt, 1536, 128);* manually (with my own algorithm), but I dont know how to do it and I'd like it to be really secure.
    Btw, thanks for your will to help.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   

  • Solaris 9 IPSec support

    I am currently attempting to activate IPSecurity on Solaris and I am having a host of issues. I am hoping someone on the forums have done this before.
    Here are the steps that I have figured out:
    1) Create Certificates and add them into the database: I am fairly certain that this has been done correctly since when the in.iked daemon comes up it reads in my CA certificate and my server certificate that I have created.
    2) Edit the /etc/inet/ike/config file. I have edited this file but there is an odd thing here. Looking at the man page it says that I should be able to do use AES for the phase 1 SA. However when I use the key word for the aes it tells me it is an error. <Question> Is the AES support only on 10? Is there away I can tell the version of the in.iked daemon I am working with?
    3) Activate the in.iked server with the config file. I have done this and used the -p2 -d options so I can see the log file that goes with it.
    4)Update the /etc/inet/ipsec.init file: I have done this but here is another instance that things do not make sense. I create a phase 2 proposal devoid of all encryption algorithms and the default one came up. It only had AES and Blowfish. There was no Triple DES option available even though in the man page is there. <question> how do I get the version number of the ipsecconf command.
    5)I then use the ipsecconf command to suck in the ipsec.init profile. I have done this successfully with AES and can do a list display.
    Usage<<<< I attempt to run a traffic from my solaris to my partner machine that matches the phase 2 traffic descriptors however when the traffic arrives it is not encrypted and the solaris did not attempt to negotiate a tunnel.
    When I attempt to initiate a VPN from the other side all I get is parameter mismatch on the Solaris side however the parameters that I have configured all seem to match.
    <Questions>
    1) Is there some better messages available above -p2 -d
    2) Is there a way to initiate a phase 1 negotiation on the SA. ikeadm command does not seem to have that.
    3) Is there a service that I have to activate to start the IPSecurity pieces?

    http://www.sun.com/servers/coolthreads/t2000/specs.xml
    no.
    Darren

  • WPA2 AES encryption Key Sizes

    Hi all,
    Just looking at the AES standard, or wiki of it
    http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
    It mentions that AES supports the following (in the notes just at the bottom of the web page)
    Key sizes of 128, 160, 192, 224, and 256 bits are supported by the Rijndael algorithm, but only the 128, 192, and 256-bit key sizes are specified in the AES standard.
    Block sizes of 128, 160, 192, 224, and 256 bits are supported by the Rijndael algorithm, but only the 128-bit block size is specified in the AES standard.
    What does the WLCs use for an AES key size when you enable a WPA2 policy with AES encryption?
    Many thx
    Ken

    128 bits was supported on the autonomous code, so I'm sure the LWAPP solution also uses 128 bits with three possible key lengths 128, 192 and 256 bits.

  • No AES-NI Instructions on T410 / i5 560M

    Hello,
    Has anyone else had issues with AES-NI instructions missing on the T410?  I just got mine, with an i5 560M, and neither TrueCrypt nor CPU-Z see the AES instructions as a capability for the chip.  I've seen very little online about this issue, so a couple of things:
    1. The i5 560M definitely supports AES-NI.  Intel's site, and everyone else's, says so.  The whole i5 line does.
    2. I've tried this in both 64-bit and 32-bit Windows.
    3. CPU-Z definitely has support for detecting AES-NI in processors that support it.  I've even seen a screenshot of an i5 560M showing AES instructions in CPU-Z.  Mine, however, doesn't show AES support.  TrueCrypt confirms.
    4. There are no settings in the BIOS pertaining to AES instructions.
    This is a pretty big deal for me--AES-NI offers a huge performance benefit for those using encrypted drives through software like TrueCrypt.
    I expect this is a BIOS bug, but does anyone have any other info?
    Thanks!

    Hello mate,
    The wole i5 line doesn't support AES-NI but the 560M does.
    What version of TrueCrypt are you using ? TrueCrypt support AES from the 7.0
    Knowledge is of two kinds. We know a subject ourselves, or we know where we can find information on it.
    ThinkPad T510 4313-CTO Windows 8 x64 - Intel Core i7-620M - NVIDIA NVS 3100M - 8GB RAM - 240GB SSD- Intel Centrino Ultimate-N 6300 - Gobi 2000.
    ThinkPad Helix 3697-CTO Windows 8.1 x64 - Intel Core i7-3667U - Intel HD Graphics 4000 - 8GB RAM- 256GB SSD - Intel Centrino Advanced-N 6205 - Ericsson C5621gw

  • PBE With SHA1 And DES on SunJCE

    Previously i used Bouncy Castle for using the "PBEWithSHA1AndDES" cipher. However, Now we are porting to pure SunJCE. When I print the provider capabilities, The best I could get was "PBEWithMD5AndDES". Is it somehow possible to do PBE using SHA1 in SunJCE? I really dont want to use MD5 because it is less secure than SHA1.
    This is one of the alternatives i thought of :-
    1) Write my own PKCS 5 Key generator(That uses SHA1 Message Digest)
    2) Use the resultant key with the simple DES Cipher, which I retrive using
    Cipher.getInstance("DES").
    Is there any other alternative which will save me the trouble?
    Thanks in advance

    The hash (MD5 or SHA1) is only used in the generation of the DES key from the password and using MD5 will make little difference to the security of your system since the entropy of the DES key generation will probably be dominated by the password used.
    The generation of the DES key from password using SHA1 is not a trivial process and I will guarantee that, unless you follow the formal specification exactly, you will create a key that is less secure than using the built in MD5 version.
    Unless you are creating compatibility with an existing system (which does not seem likely from your posting) then you should not really use DES at all. The latest algorithm is AES but I don't think there is a PBE using AES in the SunJCE. You can use PBEWithSHA1AndDESede - PBE with Triple DES which is nearly as secure as AES but slower than AES.
    Also, why do you need to use PBE? For various reasons I avoid this if at all possible.
    Message was edited by:
    sabre150

  • KeyAgreement can't generate AES Cipher

    Hi,
    I tried to generate a SecretKey out of a completed Diffie-Hellamn KeyAgreement but it doesn't work.
    If I use keyAgreement.generate("DESede"); with J2SE 1.4.2 it functions properly, but if I use "AES" instead it throws a NoSuchAlgorithmException.
    Does anyone know how to use AES for Secret generation with a KeyAgreement?
    Thanks
    Surfaczer

    The diffie hellmen implementation must support the creation of AES
    keys. Just because a provider supports AES does not mean their DH
    implementation does and chances are that is what is wrong. Sun's
    DH impl explicitly checks the alg name and does a if / else if
    operation to create appropriate sized keys. AES supports variable
    size keys. So what should the alg name AES create? And now you
    see the crux of the problem. AES has several OIDs which define
    AES in various modes of operation and with various key sizes.
    Those might more accurately define the key size desired but there
    is a problem. Sun's if / else if doesn't really fit that model...
    So I will bet that they just haven't implemented it yet primarily
    because they need to define the algorithm names they will support.
    For example maybe AES-128 or aes128 or something like that... Of
    course it could just be an oversight as well. Someone would have
    to go back and modify their existing DH code to add AES support
    and maybe they forgot. Maybe you should post a bug report and see
    what they say!

  • TS3398 I have lost my contacts that were entered into my iphone in addition to those that are synced from my exchange account. Iphone is only showing email addresses, no contacts with phone numbers.

    Two days ago my phone locked up and when I could access again, my contact list was only a few names and email addresses.  ALL phone numbers wiped from the phone.  I have been using google sync for three years to sync contact and calendar to gmail and then sync gmail to iphone, and it has been seemless.  I would think this was the problem, however the contacts and phone numbers that were added directly the phone are no longer on the phone either....which point to a phone problem.
    I went home, to update but ended up having to "restore" from backup, which I did.  The contacts were visible for less than 24 hours, but then disappeared again the next day.  I have tried forums for google sync as that would solve a large amount of the contacts, but I still can't seem to find a solution for the other contacts added directly to the phone.
    are there any new glitches/issues with the iOS 6 that cause this problem?
    phone is 3GS.
    thanks.

    Do the numbers still exist in your google contacts?
    Google recently terminated support for new configurations of gmail using Exchange Active Sync for unpaid accounts. In theory, existing configurations will continue to work, but there have been some problem reports.
    I've seen several mentions of the problem you describe in the last few days and so far, they've gone unresolved as far as I can tell. The root cause may be in google's termination of AES support.
    Facebook contact sync may also be a suspect.

  • Hyper-V not installing on Windows 8.1

    Hi
    I can't activate the Hyper-V feature of Windows 8.1.  Whenever I enable the feature all goes well, I reboot when prompted.  But after the reboot Hyper-V is not installed - it's shown as not installed in "Turn Windows feature on and off".
    The Windows Setup log has an information event (ID 11) "Update Microsoft-Hyper-V of package Microsoft-Hyper-V-ClientEdition-Package failed to be turned on. Status: 0x800f0922."
    I tried DISM.exe /Online /Cleanup-Image /RestoreHealth, but that made difference.
    I also tried activating the feature through DISM, but no joy.
    Finally, I tried changing my SSD to a spare I had, and doing a fresh Windows 8.1 install on the new SSD, but Hyper-V still doesn't install.
    I have a i7 CPU, and virtualization is enabled in the BIOS.
    Roy

    Output from Coreinfo -v:
    Intel(R) Core(TM) i7-4790K CPU @ 4.00GHz
    Intel64 Family 6 Model 60 Stepping 3, GenuineIntel
    Microcode signature: 0000001A
    HTT       *
    Hyperthreading enabled
    HYPERVISOR -
    Hypervisor is present
    VMX       *
    Supports Intel hardware-assisted virtualization
    SVM       -
    Supports AMD hardware-assisted virtualization
    X64       *
    Supports 64-bit mode
    SMX       -
    Supports Intel trusted execution
    SKINIT     -
    Supports AMD SKINIT
    NX         *
    Supports no-execute page protection
    SMEP       *
    Supports Supervisor Mode Execution Prevention
    SMAP       -
    Supports Supervisor Mode Access Prevention
    PAGE1GB   *
    Supports 1 GB large pages
    PAE       *
    Supports > 32-bit physical addresses
    PAT       *
    Supports Page Attribute Table
    PSE       *
    Supports 4 MB pages
    PSE36     *
    Supports > 32-bit address 4 MB pages
    PGE       *
    Supports global bit in page tables
    SS         *
    Supports bus snooping for cache operations
    VME       *
    Supports Virtual-8086 mode
    RDWRFSGSBASE *
    Supports direct GS/FS base access
    FPU       *
    Implements i387 floating point instructions
    MMX       *
    Supports MMX instruction set
    MMXEXT     -
    Implements AMD MMX extensions
    3DNOW     -
    Supports 3DNow! instructions
    3DNOWEXT   -
    Supports 3DNow! extension instructions
    SSE       *
    Supports Streaming SIMD Extensions
    SSE2       *
    Supports Streaming SIMD Extensions 2
    SSE3       *
    Supports Streaming SIMD Extensions 3
    SSSE3     *
    Supports Supplemental SIMD Extensions 3
    SSE4a     -
    Supports Streaming SIMDR Extensions 4a
    SSE4.1     *
    Supports Streaming SIMD Extensions 4.1
    SSE4.2     *
    Supports Streaming SIMD Extensions 4.2
    AES       *
    Supports AES extensions
    AVX       *
    Supports AVX intruction extensions
    FMA       *
    Supports FMA extensions using YMM state
    MSR       *
    Implements RDMSR/WRMSR instructions
    MTRR       *
    Supports Memory Type Range Registers
    XSAVE     *
    Supports XSAVE/XRSTOR instructions
    OSXSAVE   *
    Supports XSETBV/XGETBV instructions
    RDRAND     *
    Supports RDRAND instruction
    RDSEED     -
    Supports RDSEED instruction
    CMOV       *
    Supports CMOVcc instruction
    CLFSH     *
    Supports CLFLUSH instruction
    CX8       *
    Supports compare and exchange 8-byte instructions
    CX16       *
    Supports CMPXCHG16B instruction
    BMI1       *
    Supports bit manipulation extensions 1
    BMI2       *
    Supports bit manipulation extensions 2
    ADX       -
    Supports ADCX/ADOX instructions
    DCA       -
    Supports prefetch from memory-mapped device
    F16C       *
    Supports half-precision instruction
    FXSR       *
    Supports FXSAVE/FXSTOR instructions
    FFXSR     -
    Supports optimized FXSAVE/FSRSTOR instruction
    MONITOR   *
    Supports MONITOR and MWAIT instructions
    MOVBE     *
    Supports MOVBE instruction
    ERMSB     *
    Supports Enhanced REP MOVSB/STOSB
    PCLMULDQ   *
    Supports PCLMULDQ instruction
    POPCNT     *
    Supports POPCNT instruction
    LZCNT     *
    Supports LZCNT instruction
    SEP       *
    Supports fast system call instructions
    LAHF-SAHF *
    Supports LAHF/SAHF instructions in 64-bit mode
    HLE       *
    Supports Hardware Lock Elision instructions
    RTM       *
    Supports Restricted Transactional Memory instructions
    DE         *
    Supports I/O breakpoints including CR4.DE
    DTES64     *
    Can write history of 64-bit branch addresses
    DS         *
    Implements memory-resident debug buffer
    DS-CPL     *
    Supports Debug Store feature with CPL
    PCID       *
    Supports PCIDs and settable CR4.PCIDE
    INVPCID   *
    Supports INVPCID instruction
    PDCM       *
    Supports Performance Capabilities MSR
    RDTSCP     *
    Supports RDTSCP instruction
    TSC       *
    Supports RDTSC instruction
    TSC-DEADLINE *
    Local APIC supports one-shot deadline timer
    TSC-INVARIANT *
    TSC runs at constant rate
    xTPR       *
    Supports disabling task priority messages
    EIST       *
    Supports Enhanced Intel Speedstep
    ACPI       *
    Implements MSR for power management
    TM         *
    Implements thermal monitor circuitry
    TM2       *
    Implements Thermal Monitor 2 control
    APIC       *
    Implements software-accessible local APIC
    x2APIC     *
    Supports x2APIC
    CNXT-ID   -
    L1 data cache mode adaptive or BIOS
    MCE       *
    Supports Machine Check, INT18 and CR4.MCE
    MCA       *
    Implements Machine Check Architecture
    PBE       *
    Supports use of FERR#/PBE# pin
    PSN       -
    Implements 96-bit processor serial number
    PREFETCHW *
    Supports PREFETCHW instruction
    Maximum implemented CPUID leaves: 0000000D (Basic), 80000008 (Extended).
    Logical to Physical Processor Map:
    **------  Physical Processor 0 (Hyperthreaded)
    --**----  Physical Processor 1 (Hyperthreaded)
    ----**--  Physical Processor 2 (Hyperthreaded)
    ------**  Physical Processor 3 (Hyperthreaded)
    Logical Processor to Socket Map:
    ********  Socket 0
    Logical Processor to NUMA Node Map:
    ********  NUMA Node 0
    No NUMA nodes.
    Logical Processor to Cache Map:
    **------  Data Cache          0, Level 1,   32 KB, Assoc   8, LineSize  64
    **------  Instruction Cache   0, Level 1,   32 KB, Assoc   8, LineSize  64
    **------  Unified Cache       0, Level 2,  256 KB, Assoc   8, LineSize  64
    ********  Unified Cache       1, Level 3,    8 MB, Assoc  16, LineSize  64
    --**----  Data Cache          1, Level 1,   32 KB, Assoc   8, LineSize  64
    --**----  Instruction Cache   1, Level 1,   32 KB, Assoc   8, LineSize  64
    --**----  Unified Cache       2, Level 2,  256 KB, Assoc   8, LineSize  64
    ----**--  Data Cache          2, Level 1,   32 KB, Assoc   8, LineSize  64
    ----**--  Instruction Cache   2, Level 1,   32 KB, Assoc   8, LineSize  64
    ----**--  Unified Cache       3, Level 2,  256 KB, Assoc   8, LineSize  64
    ------**  Data Cache          3, Level 1,   32 KB, Assoc   8, LineSize  64
    ------**  Instruction Cache   3, Level 1,   32 KB, Assoc   8, LineSize  64
    ------**  Unified Cache       4, Level 2,  256 KB, Assoc   8, LineSize  64
    Logical Processor to Group Map:
    ********  Group 0

Maybe you are looking for

  • Disable the save icon of pdf document?

    Hello, My gool is to disable the save icon of pdf document when i open the pdf document inside flex application. Have you any ideas? Thanks in advance,

  • HELP!  Files suddenly disappear

    Hi, I am using Macbook pro and running OS X 10.5.7 I have partitioned my drive to have boot camp to boot Windows Vista So disk1 is my Mac drive and Untitled is Windows. I used NTFS-3G and MacFUSE to mount to Windows I have logged to Mac and copied wh

  • Safari, mail, software update very slow on new imac

    Hello, I recently upgraded to a 21.5" i3 imac and transferred everything from my old imac (core 2 duo, os 10.4.10) anything involving the internet is painfully slow, safari 5.02, firefox, mail, even the software update (but once it "catches"- downloa

  • Javascript Support in Office 365 APIs

    Looking at the Office 365 API Preview, I came across this sentence in the Discovery Service section. "Currently, the Discovery Service APIs are available in a .NET C# managed portable library that can be used by Native, Windows Store, and Windows Pho

  • ITunes crashes in Lion 10.7.3

    I went to the apple store because iTunes was crashing at start-up. Someone at the apple store told me to break up my music library of 16,000 songs into three folders and then add it manually. It worked for a bit but then began to determine gapless pl