Skip to content

A script for scanning a Java projects for pointers which may indicate whether its bundling its own crypto, or possible to make FIPS compliant.

Notifications You must be signed in to change notification settings

mamccorm/java-crypto-check

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 

Repository files navigation

java-crypto-check

THIS IS NOT CONCLUSIVE, AND IS LARGELY AN EXPERIMENT AT THIS POINT. DO NOT TREAT THIS AS AN AUTHORATIVE SOURCE OF TRUTH.

A python script which scans a Java applications source code, to look for usage of bundled crypto librarys, as well as crypto algorithms not permitted under FIPS 140-2.

The purpose of this script is to aid decision making when determining if a Java application can be made FIPS compliant.

This is not intended to be a Yes/No check, but more a developer tool to provide additional information in the exploratory process.

Running:

python3 scan.py /path/to/your/source/code

If matches are found, each match (filepath) will be printed to the console log, as well as a summary:

# Individual matches printed here...
# ...

Detailed Summary of Detections:
  - 48 instance(s) of: javax.crypto
  - 49 instance(s) of: apache commons codec
  - 6 instance(s) of: bouncy castle
  - 88 instance(s) of: md5
  - 12 instance(s) of: sha1
  - 365 instance(s) of: des
  - 3 instance(s) of: rc4

Excluded file patterns: *Test.java, *SmokeTest*

About

A script for scanning a Java projects for pointers which may indicate whether its bundling its own crypto, or possible to make FIPS compliant.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages