AES support in SunJCE
Hi,
Does anyone know when SunJCE will support AES. I tried to experiment with 1.4.2 version and didnt see any support. However IBM JCE ( comes with the 1.4.2 version) seems to have support for it.
Thanks.
Sunitha.
sorry!
Actually, I was trying out with 1.4.1 jvm and hence AES wasnt working.
However, sun jce in 1.4.2 AES is supported.
Sunitha.
Similar Messages
-
Hi all,
is there any function that specifies key size "secret key" used in AES cryptographic algorithm? if not which key size is supported?
thanks alot.Hi again,
i ve tried what you have told me but it gave me error ERROR: java.security.InvalidKeyException: Illegal key size or default parameters
here is the code
SecureRandom sprng = SecureRandom.getInstance("SHA1PRNG");
KeyGenerator key = KeyGenerator.getInstance("AES");
//key.init(sprng);
key.init(192, sprng);
SecretKey encKey = key.generateKey();
symmetricKey=encKey;
Cipher encAES = Cipher.getInstance("AES");
encAES.init(Cipher.ENCRYPT_MODE, encKey);
encMsg=encAES.doFinal(message.getBytes());can any body help me plz! -
Is RSA supported by SunJCE?
Please, this may sound too basic, but I need to know from you whether SunJCE provider includes the RSA algorithm!
Anyway, it is surprising that Java has so little
support for public encryption that lies at the heart
of cryptology, and security in general. Thanks for
your help!It's not at all surprising if you know anything about US Export regulations. Those have been recently relaxed - which is why RSA is available as a Cipher now in 1.5.
The standard Java library has some of the best encryption support I've seen, built in. There are Providers available, for free, that give you access to nearly every algorithm I can think of. JAAS provides access to a wide variety of authentication and authorization protocols. HTTPS is brain-dead easy. I can write my own TrustManager class, to control how (and from whom!) my program accepts certificates. There is built-in support for configurable SecurityManagers, that allow you fine-grained control over the allowed operations of the executing program.
In what context does Java provide "little support for...security in general"?
Grant -
Is AES supported in 1.4.1
Hi is there a reason why I cannot use AES with 1.4.1 and a Mac OSX 1.2.8 machine?
DES and Blowfish worked so far.
What gives?
Thanks in advanceIf 1.4.2 is available for the Mac, then yes - other wise, no.
You can use a different Provider - try bouncycastle.org, should work just fine.
Grant -
Is it available an AES256 encryption support for the SRA Gateway Service?
Otherwise, is it possible to plug-in a custom/self-made cipher?
Finally (this is an RFE) it will be interesting if the Gateway could do the encryption job by using openssl APIs instead of the NSS ones, so that one could use his own openssl-based engine.Hi Walt, thank you for the feedback and for using the Remote Desktop app.
We look at the user feedback in the Store and other site and know how important Gateway is to Remote Desktop, notably so on a phone.
This is on our list of scenarios to enable, look for it in a future update later this year.
Thanks,
David Belanger
This post is "AS IS" and confers no rights. -
Hi!
I am trying to use SUN's default provider SunJCE to generate secret key out of DH key agreement. jdk version is 1.4.2.
And I had ran into trouble of KeyAgreement not wanting to generate an AES key.
java.security.NoSuchAlgorithmException: Unsupported secret key algorithm: AES
at com.sun.crypto.provider.DHKeyAgreement.engineGenerateSecret(DashoA6275)
at javax.crypto.KeyAgreement.generateSecret(DashoA6275)
at Test.CryptoTests.main(CryptoTests.java:67)Do I understand right that there is no way to generate AES secret key out of SunJCE's v1.42 KeyAgreement?
Of course I can use Blowfish or DESEDE, it's just that I prefer to use AES. I'd also prefer not to use third party providers' libraries.
How stupid would be an idea to generate Blowfish key, convert it into a string form and use it as a password for a previously generated AES Cipher?How stupid would be an idea to generate Blowfish key,
convert it into a string form and use it as a password
for a previously generated AES Cipher?Ooooops. I've just discovered that there is no PBE + AES encryption in SunJCE. Looks like I'll have to settle with the Blowfish. -
Hey all,
I just registered here in an attempt to fix my problem... I've tried everything I can think of.
My problem seems simple. I do this:
SecretKeySpec keyspec = new SecretKeySpec(key, "AES");
SecretKeyFactory factory = SecretKeyFactory.getInstance("AES");
SecretKey secretkey = factory.generateSecret(keyspec);
Cipher aes = Cipher.getInstance("AES");
aes.init(Cipher.DECRYPT_MODE, secretkey);
return aes.doFinal(data);
And I get this:
java.security.NoSuchAlgorithmException: Algorithm AES not available
at javax.crypto.SunJCE_b.a(DashoA12275)
at javax.crypto.SecretKeyFactory.getInstance(DashoA12275)
at system.Decryptor.decrypt(Decryptor.java:78)
at system.Decryptor.<init>(Decryptor.java:43)
This is at the 'SecretKeyFactory.getInstance("AES");' line. When removed, the 'Cipher.getInstance("AES");' line complains about the same thing ("No support for AES").
In order to remedy this problem I've tried the following:
- Installing Java 1.4.2_09 (I had 1.4.2_05)
- Installing Java 5.0 Update 4 and using that instead
- Using the Bouncy Castle Provider
- Using the Cryptix JCE Provider
- Installing the unlimited strength policy files
- Not using Eclipse
- Forcing the SunJCE Provider (result in "no such algorithm: AES for provider SunJCE")
- Using DES (same error messages, only for DES!)
- Rebooting (I just didn't know anymore :P)
Short from reinstalling Windows 2000 I can't think of anything else. I googled for two nights trying to find people with the same problem but it appears I'm pretty unique... none of the fixes I found worked. I'm pretty sure it must be something related to my set up, since by all means, it should work.
Does anyone have any idea what I can do to fix it? Thanks in advance for any of your help!hi there,
I just read your posts and apperently I have the same problem.
I get an error message: "Algorithm AES not available"
the thing is this: on my computer (XP) everything works fine! the encryption AES is working (I also able to decrypt)!!! but when I try the SAME code on a different computer (MS2003) it generates the error: "Algorithm AES not available"
is there any file I should add so it will work?
thanks for any help
peter -
Invalid stream header Exception - AES PBE with SealedObject
I am trying to do an PBE encryption with AES algorithm and SunJCE provider, using the SealedObject class to encrypt/decrypt the data...
And Im still getting the "invalid stream header" exception. Ive searched this forum, readed lots of posts, examples etc...
Here is my code for encryption (i collected it from more classes, so hopefully I didnt forget anything...):
//assume that INPUT_STREAM is the source of plaintext
//and OUTPUT_STREAM is the stream to save the ciphertext data to
char[] pass; //assume initialized password
SecureRandom r = new SecureRandom();
byte[] salt = new byte[20];
r.nextBytes(salt);
SecretKeyFactory factory = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA1");
KeySpec keySpec = new PBEKeySpec(pass, salt, 1536, 128);
SecretKey pbKey = factory.generateSecret(keySpec);
SecretKeySpec key = new SecretKeySpec(pbKey.getEncoded(), "AES");
Cipher ciph = Cipher.getInstance("AES/CTR/NoPadding");
ciph.init(Cipher.ENCRYPT_MODE, key);
ByteArrayOutputStream byteOut = new ByteArrayOutputStream();
int ch;
while ((ch = INPUT_STREAM.read()) >= 0) {
byteOut.write(ch);
SealedObject sealed = new SealedObject(byteOut.toByteArray(), ciph);
BufferedOutputStream bufOut = new BufferedOutputStream(OUTPUTSTREAM);
ObjectOutputStream objOut = new ObjectOutputStream(bufOut);
objOut.writeObject(sealed);
objOut.close();
}And here is my code for decrypting:
//assume that INPUT_STREAM is the source of ciphertext
//and OUTPUT_STREAM is the stream to save the plaintext data to
char[] pass; //assume initialized password
SecureRandom r = new SecureRandom();
byte[] salt = new byte[20];
r.nextBytes(salt);
SecretKeyFactory factory = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA1");
KeySpec keySpec = new PBEKeySpec(pass, salt, 1536, 128);
SecretKey pbKey = factory.generateSecret(keySpec);
SecretKeySpec key = new SecretKeySpec(pbKey.getEncoded(), "AES");
BufferedInputStream bufIn = new BufferedInputStream(INPUT_STREAM); //MARK #1
ObjectInputStream objIn = new ObjectInputStream(bufIn);
SealedObject sealed = (SealedObject) objIn.readObject();
byte[] unsealed = (byte[]) sealed.getObject(key); //MARK #2
ByteArrayInputStream byteIn = new ByteArrayInputStream(unsealed);
int ch;
while ((ch = byteIn.read()) >= 0) {
OUTPUT_STREAM.write(ch);
OUTPUT_STREAM.close();Everytime I run it, it gives me this exception:
Exception in thread "main" java.io.StreamCorruptedException: invalid stream header: B559ADBE
at java.io.ObjectInputStream.readStreamHeader(ObjectInputStream.java:783)
at java.io.ObjectInputStream.<init>(ObjectInputStream.java:280)
at javax.crypto.SunJCE_i.<init>(DashoA13*..)
at javax.crypto.SealedObject.unseal(DashoA13*..)
at javax.crypto.SealedObject.getObject(DashoA13*..)
at oopsifrovanie.engine.ItemToCrypt.decrypt(ItemToCrypt.java:91) //MARKED AS #2
at oopsifrovanie.Main.main(Main.java:37) //The class with all code below MARK #1I've also found out that the hashCode of the generated "key" object in the decrypting routine is not the same as the hashCode of the "key" object in the ecrypting routine. Can this be a problem? I assume that maybe yes... but don't know what to do...
When I delete the r.nextBytes(salt); from both routines, the hashCodes are the same, but that's not the thing I want to do...
I think, that the source of problem can be this part of code (generating the key):
SecretKeyFactory factory = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA1");
KeySpec keySpec = new PBEKeySpec(pass, salt, 1536, 128);
SecretKey pbKey = factory.generateSecret(keySpec);
SecretKeySpec key = new SecretKeySpec(pbKey.getEncoded(), "AES");But I derived it from posts like: [http://forums.sun.com/thread.jspa?threadID=5307763] and [http://stackoverflow.com/questions/992019/java-256bit-aes-encryption] and they claimed it's working there...
Is there anyone that can help me?
Btw, I don't want to use any other providers like Bouncycastle etc. and I want to use PBE with AES and also SealedObject to store the parameters of encryption...Yes, it really uses only one Cipher object, but it does decoding in a little nonstandard (not often used) way, by using the SealedObject class and its getObject(Key key) method. You can check these links for documentation: [http://java.sun.com/javase/6/docs/technotes/guides/security/crypto/CryptoSpec.html#SealedObject] and [http://java.sun.com/javase/6/docs/api/javax/crypto/SealedObject.html] So the question is, why it doesn't work also with the AES routines, because it should.
Btw, according to [http://java.sun.com/javase/6/docs/technotes/guides/security/SunProviders.html#SunJCEProvider] PBEWithSHA1AndDESede/CBC/PKCS5Padding is a valid JCE algorithm for the Cipher class.
Firstly, I was generating the key for AES enc./decryption this way and it was working:
char[] pass; //assume initialized password
byte[] bpass = new byte[pass.length];
for (int i = 0; i < pass.length; i++) {
bpass[i] = (byte) pass;
SecretKeySpec key = new SecretKeySpec(bpass, "AES");
But I think, that it really wasn't secure, so I wanted to build a key from the password using the PBE.
Maybe there's also a way how to do this part of my AES PBE algorithm: *KeySpec keySpec = new PBEKeySpec(pass, salt, 1536, 128);* manually (with my own algorithm), but I dont know how to do it and I'd like it to be really secure.
Btw, thanks for your will to help. -
I am currently attempting to activate IPSecurity on Solaris and I am having a host of issues. I am hoping someone on the forums have done this before.
Here are the steps that I have figured out:
1) Create Certificates and add them into the database: I am fairly certain that this has been done correctly since when the in.iked daemon comes up it reads in my CA certificate and my server certificate that I have created.
2) Edit the /etc/inet/ike/config file. I have edited this file but there is an odd thing here. Looking at the man page it says that I should be able to do use AES for the phase 1 SA. However when I use the key word for the aes it tells me it is an error. <Question> Is the AES support only on 10? Is there away I can tell the version of the in.iked daemon I am working with?
3) Activate the in.iked server with the config file. I have done this and used the -p2 -d options so I can see the log file that goes with it.
4)Update the /etc/inet/ipsec.init file: I have done this but here is another instance that things do not make sense. I create a phase 2 proposal devoid of all encryption algorithms and the default one came up. It only had AES and Blowfish. There was no Triple DES option available even though in the man page is there. <question> how do I get the version number of the ipsecconf command.
5)I then use the ipsecconf command to suck in the ipsec.init profile. I have done this successfully with AES and can do a list display.
Usage<<<< I attempt to run a traffic from my solaris to my partner machine that matches the phase 2 traffic descriptors however when the traffic arrives it is not encrypted and the solaris did not attempt to negotiate a tunnel.
When I attempt to initiate a VPN from the other side all I get is parameter mismatch on the Solaris side however the parameters that I have configured all seem to match.
<Questions>
1) Is there some better messages available above -p2 -d
2) Is there a way to initiate a phase 1 negotiation on the SA. ikeadm command does not seem to have that.
3) Is there a service that I have to activate to start the IPSecurity pieces?http://www.sun.com/servers/coolthreads/t2000/specs.xml
no.
Darren -
Hi all,
Just looking at the AES standard, or wiki of it
http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
It mentions that AES supports the following (in the notes just at the bottom of the web page)
Key sizes of 128, 160, 192, 224, and 256 bits are supported by the Rijndael algorithm, but only the 128, 192, and 256-bit key sizes are specified in the AES standard.
Block sizes of 128, 160, 192, 224, and 256 bits are supported by the Rijndael algorithm, but only the 128-bit block size is specified in the AES standard.
What does the WLCs use for an AES key size when you enable a WPA2 policy with AES encryption?
Many thx
Ken128 bits was supported on the autonomous code, so I'm sure the LWAPP solution also uses 128 bits with three possible key lengths 128, 192 and 256 bits.
-
No AES-NI Instructions on T410 / i5 560M
Hello,
Has anyone else had issues with AES-NI instructions missing on the T410? I just got mine, with an i5 560M, and neither TrueCrypt nor CPU-Z see the AES instructions as a capability for the chip. I've seen very little online about this issue, so a couple of things:
1. The i5 560M definitely supports AES-NI. Intel's site, and everyone else's, says so. The whole i5 line does.
2. I've tried this in both 64-bit and 32-bit Windows.
3. CPU-Z definitely has support for detecting AES-NI in processors that support it. I've even seen a screenshot of an i5 560M showing AES instructions in CPU-Z. Mine, however, doesn't show AES support. TrueCrypt confirms.
4. There are no settings in the BIOS pertaining to AES instructions.
This is a pretty big deal for me--AES-NI offers a huge performance benefit for those using encrypted drives through software like TrueCrypt.
I expect this is a BIOS bug, but does anyone have any other info?
Thanks!Hello mate,
The wole i5 line doesn't support AES-NI but the 560M does.
What version of TrueCrypt are you using ? TrueCrypt support AES from the 7.0
Knowledge is of two kinds. We know a subject ourselves, or we know where we can find information on it.
ThinkPad T510 4313-CTO Windows 8 x64 - Intel Core i7-620M - NVIDIA NVS 3100M - 8GB RAM - 240GB SSD- Intel Centrino Ultimate-N 6300 - Gobi 2000.
ThinkPad Helix 3697-CTO Windows 8.1 x64 - Intel Core i7-3667U - Intel HD Graphics 4000 - 8GB RAM- 256GB SSD - Intel Centrino Advanced-N 6205 - Ericsson C5621gw -
PBE With SHA1 And DES on SunJCE
Previously i used Bouncy Castle for using the "PBEWithSHA1AndDES" cipher. However, Now we are porting to pure SunJCE. When I print the provider capabilities, The best I could get was "PBEWithMD5AndDES". Is it somehow possible to do PBE using SHA1 in SunJCE? I really dont want to use MD5 because it is less secure than SHA1.
This is one of the alternatives i thought of :-
1) Write my own PKCS 5 Key generator(That uses SHA1 Message Digest)
2) Use the resultant key with the simple DES Cipher, which I retrive using
Cipher.getInstance("DES").
Is there any other alternative which will save me the trouble?
Thanks in advanceThe hash (MD5 or SHA1) is only used in the generation of the DES key from the password and using MD5 will make little difference to the security of your system since the entropy of the DES key generation will probably be dominated by the password used.
The generation of the DES key from password using SHA1 is not a trivial process and I will guarantee that, unless you follow the formal specification exactly, you will create a key that is less secure than using the built in MD5 version.
Unless you are creating compatibility with an existing system (which does not seem likely from your posting) then you should not really use DES at all. The latest algorithm is AES but I don't think there is a PBE using AES in the SunJCE. You can use PBEWithSHA1AndDESede - PBE with Triple DES which is nearly as secure as AES but slower than AES.
Also, why do you need to use PBE? For various reasons I avoid this if at all possible.
Message was edited by:
sabre150 -
KeyAgreement can't generate AES Cipher
Hi,
I tried to generate a SecretKey out of a completed Diffie-Hellamn KeyAgreement but it doesn't work.
If I use keyAgreement.generate("DESede"); with J2SE 1.4.2 it functions properly, but if I use "AES" instead it throws a NoSuchAlgorithmException.
Does anyone know how to use AES for Secret generation with a KeyAgreement?
Thanks
SurfaczerThe diffie hellmen implementation must support the creation of AES
keys. Just because a provider supports AES does not mean their DH
implementation does and chances are that is what is wrong. Sun's
DH impl explicitly checks the alg name and does a if / else if
operation to create appropriate sized keys. AES supports variable
size keys. So what should the alg name AES create? And now you
see the crux of the problem. AES has several OIDs which define
AES in various modes of operation and with various key sizes.
Those might more accurately define the key size desired but there
is a problem. Sun's if / else if doesn't really fit that model...
So I will bet that they just haven't implemented it yet primarily
because they need to define the algorithm names they will support.
For example maybe AES-128 or aes128 or something like that... Of
course it could just be an oversight as well. Someone would have
to go back and modify their existing DH code to add AES support
and maybe they forgot. Maybe you should post a bug report and see
what they say! -
Two days ago my phone locked up and when I could access again, my contact list was only a few names and email addresses. ALL phone numbers wiped from the phone. I have been using google sync for three years to sync contact and calendar to gmail and then sync gmail to iphone, and it has been seemless. I would think this was the problem, however the contacts and phone numbers that were added directly the phone are no longer on the phone either....which point to a phone problem.
I went home, to update but ended up having to "restore" from backup, which I did. The contacts were visible for less than 24 hours, but then disappeared again the next day. I have tried forums for google sync as that would solve a large amount of the contacts, but I still can't seem to find a solution for the other contacts added directly to the phone.
are there any new glitches/issues with the iOS 6 that cause this problem?
phone is 3GS.
thanks.Do the numbers still exist in your google contacts?
Google recently terminated support for new configurations of gmail using Exchange Active Sync for unpaid accounts. In theory, existing configurations will continue to work, but there have been some problem reports.
I've seen several mentions of the problem you describe in the last few days and so far, they've gone unresolved as far as I can tell. The root cause may be in google's termination of AES support.
Facebook contact sync may also be a suspect. -
Hyper-V not installing on Windows 8.1
Hi
I can't activate the Hyper-V feature of Windows 8.1. Whenever I enable the feature all goes well, I reboot when prompted. But after the reboot Hyper-V is not installed - it's shown as not installed in "Turn Windows feature on and off".
The Windows Setup log has an information event (ID 11) "Update Microsoft-Hyper-V of package Microsoft-Hyper-V-ClientEdition-Package failed to be turned on. Status: 0x800f0922."
I tried DISM.exe /Online /Cleanup-Image /RestoreHealth, but that made difference.
I also tried activating the feature through DISM, but no joy.
Finally, I tried changing my SSD to a spare I had, and doing a fresh Windows 8.1 install on the new SSD, but Hyper-V still doesn't install.
I have a i7 CPU, and virtualization is enabled in the BIOS.
RoyOutput from Coreinfo -v:
Intel(R) Core(TM) i7-4790K CPU @ 4.00GHz
Intel64 Family 6 Model 60 Stepping 3, GenuineIntel
Microcode signature: 0000001A
HTT *
Hyperthreading enabled
HYPERVISOR -
Hypervisor is present
VMX *
Supports Intel hardware-assisted virtualization
SVM -
Supports AMD hardware-assisted virtualization
X64 *
Supports 64-bit mode
SMX -
Supports Intel trusted execution
SKINIT -
Supports AMD SKINIT
NX *
Supports no-execute page protection
SMEP *
Supports Supervisor Mode Execution Prevention
SMAP -
Supports Supervisor Mode Access Prevention
PAGE1GB *
Supports 1 GB large pages
PAE *
Supports > 32-bit physical addresses
PAT *
Supports Page Attribute Table
PSE *
Supports 4 MB pages
PSE36 *
Supports > 32-bit address 4 MB pages
PGE *
Supports global bit in page tables
SS *
Supports bus snooping for cache operations
VME *
Supports Virtual-8086 mode
RDWRFSGSBASE *
Supports direct GS/FS base access
FPU *
Implements i387 floating point instructions
MMX *
Supports MMX instruction set
MMXEXT -
Implements AMD MMX extensions
3DNOW -
Supports 3DNow! instructions
3DNOWEXT -
Supports 3DNow! extension instructions
SSE *
Supports Streaming SIMD Extensions
SSE2 *
Supports Streaming SIMD Extensions 2
SSE3 *
Supports Streaming SIMD Extensions 3
SSSE3 *
Supports Supplemental SIMD Extensions 3
SSE4a -
Supports Streaming SIMDR Extensions 4a
SSE4.1 *
Supports Streaming SIMD Extensions 4.1
SSE4.2 *
Supports Streaming SIMD Extensions 4.2
AES *
Supports AES extensions
AVX *
Supports AVX intruction extensions
FMA *
Supports FMA extensions using YMM state
MSR *
Implements RDMSR/WRMSR instructions
MTRR *
Supports Memory Type Range Registers
XSAVE *
Supports XSAVE/XRSTOR instructions
OSXSAVE *
Supports XSETBV/XGETBV instructions
RDRAND *
Supports RDRAND instruction
RDSEED -
Supports RDSEED instruction
CMOV *
Supports CMOVcc instruction
CLFSH *
Supports CLFLUSH instruction
CX8 *
Supports compare and exchange 8-byte instructions
CX16 *
Supports CMPXCHG16B instruction
BMI1 *
Supports bit manipulation extensions 1
BMI2 *
Supports bit manipulation extensions 2
ADX -
Supports ADCX/ADOX instructions
DCA -
Supports prefetch from memory-mapped device
F16C *
Supports half-precision instruction
FXSR *
Supports FXSAVE/FXSTOR instructions
FFXSR -
Supports optimized FXSAVE/FSRSTOR instruction
MONITOR *
Supports MONITOR and MWAIT instructions
MOVBE *
Supports MOVBE instruction
ERMSB *
Supports Enhanced REP MOVSB/STOSB
PCLMULDQ *
Supports PCLMULDQ instruction
POPCNT *
Supports POPCNT instruction
LZCNT *
Supports LZCNT instruction
SEP *
Supports fast system call instructions
LAHF-SAHF *
Supports LAHF/SAHF instructions in 64-bit mode
HLE *
Supports Hardware Lock Elision instructions
RTM *
Supports Restricted Transactional Memory instructions
DE *
Supports I/O breakpoints including CR4.DE
DTES64 *
Can write history of 64-bit branch addresses
DS *
Implements memory-resident debug buffer
DS-CPL *
Supports Debug Store feature with CPL
PCID *
Supports PCIDs and settable CR4.PCIDE
INVPCID *
Supports INVPCID instruction
PDCM *
Supports Performance Capabilities MSR
RDTSCP *
Supports RDTSCP instruction
TSC *
Supports RDTSC instruction
TSC-DEADLINE *
Local APIC supports one-shot deadline timer
TSC-INVARIANT *
TSC runs at constant rate
xTPR *
Supports disabling task priority messages
EIST *
Supports Enhanced Intel Speedstep
ACPI *
Implements MSR for power management
TM *
Implements thermal monitor circuitry
TM2 *
Implements Thermal Monitor 2 control
APIC *
Implements software-accessible local APIC
x2APIC *
Supports x2APIC
CNXT-ID -
L1 data cache mode adaptive or BIOS
MCE *
Supports Machine Check, INT18 and CR4.MCE
MCA *
Implements Machine Check Architecture
PBE *
Supports use of FERR#/PBE# pin
PSN -
Implements 96-bit processor serial number
PREFETCHW *
Supports PREFETCHW instruction
Maximum implemented CPUID leaves: 0000000D (Basic), 80000008 (Extended).
Logical to Physical Processor Map:
**------ Physical Processor 0 (Hyperthreaded)
--**---- Physical Processor 1 (Hyperthreaded)
----**-- Physical Processor 2 (Hyperthreaded)
------** Physical Processor 3 (Hyperthreaded)
Logical Processor to Socket Map:
******** Socket 0
Logical Processor to NUMA Node Map:
******** NUMA Node 0
No NUMA nodes.
Logical Processor to Cache Map:
**------ Data Cache 0, Level 1, 32 KB, Assoc 8, LineSize 64
**------ Instruction Cache 0, Level 1, 32 KB, Assoc 8, LineSize 64
**------ Unified Cache 0, Level 2, 256 KB, Assoc 8, LineSize 64
******** Unified Cache 1, Level 3, 8 MB, Assoc 16, LineSize 64
--**---- Data Cache 1, Level 1, 32 KB, Assoc 8, LineSize 64
--**---- Instruction Cache 1, Level 1, 32 KB, Assoc 8, LineSize 64
--**---- Unified Cache 2, Level 2, 256 KB, Assoc 8, LineSize 64
----**-- Data Cache 2, Level 1, 32 KB, Assoc 8, LineSize 64
----**-- Instruction Cache 2, Level 1, 32 KB, Assoc 8, LineSize 64
----**-- Unified Cache 3, Level 2, 256 KB, Assoc 8, LineSize 64
------** Data Cache 3, Level 1, 32 KB, Assoc 8, LineSize 64
------** Instruction Cache 3, Level 1, 32 KB, Assoc 8, LineSize 64
------** Unified Cache 4, Level 2, 256 KB, Assoc 8, LineSize 64
Logical Processor to Group Map:
******** Group 0
Maybe you are looking for
-
Disable the save icon of pdf document?
Hello, My gool is to disable the save icon of pdf document when i open the pdf document inside flex application. Have you any ideas? Thanks in advance,
-
HELP! Files suddenly disappear
Hi, I am using Macbook pro and running OS X 10.5.7 I have partitioned my drive to have boot camp to boot Windows Vista So disk1 is my Mac drive and Untitled is Windows. I used NTFS-3G and MacFUSE to mount to Windows I have logged to Mac and copied wh
-
Safari, mail, software update very slow on new imac
Hello, I recently upgraded to a 21.5" i3 imac and transferred everything from my old imac (core 2 duo, os 10.4.10) anything involving the internet is painfully slow, safari 5.02, firefox, mail, even the software update (but once it "catches"- downloa
-
Javascript Support in Office 365 APIs
Looking at the Office 365 API Preview, I came across this sentence in the Discovery Service section. "Currently, the Discovery Service APIs are available in a .NET C# managed portable library that can be used by Native, Windows Store, and Windows Pho
-
ITunes crashes in Lion 10.7.3
I went to the apple store because iTunes was crashing at start-up. Someone at the apple store told me to break up my music library of 16,000 songs into three folders and then add it manually. It worked for a bit but then began to determine gapless pl