diff --git a/app/views/check/show.html.erb b/app/views/check/show.html.erb index 1582daa..a2448f6 100644 --- a/app/views/check/show.html.erb +++ b/app/views/check/show.html.erb @@ -2,7 +2,8 @@

- [<%= self.type.to_s.upcase %>] <%= @host %> (<%= l @analysis.updated_at %>) + [<%= self.type.to_s.upcase %>] <%= @host %> + (<%= l @analysis.updated_at %>)

<% if Time.now - @analysis.updated_at >= Rails.configuration.refresh_delay %> @@ -12,71 +13,84 @@ <% end %>
- <% @result.each do |host| %> + <% @result.each do |host| + if host.error %>

- <%= rank_label host[:grade].to_sym %> + <%= rank_label :X %> <%= host[:ip] %> : <%= host[:port] %> - (<%= host[:hostname] %>)

+ (<%= host[:hostname] %>) + + <%= t 'Error during analysis:' %> + <%= host.error %>
+ <% next; end %> +
+
+

+ <%= rank_label host[:grade].to_sym %> + <%= host[:ip] %> : <%= host[:port] %> + (<%= host[:hostname] %>)

+
+
-
-
- - - - - - - - - - - - - - - - - - - - - <% - handshakes = host[:handshakes] - all_ciphers = handshakes[:ciphers].group_by { |c| c[:protocol] } - CryptCheck::Tls::Method.each do |protocol| - ciphers = all_ciphers.fetch(protocol.to_sym.to_s, []) - .collect { |c| CryptCheck::Tls::Cipher.new protocol, c[:name] }.sort - unless ciphers.empty? %> +
+
+
<%= t 'Name' %><%= t 'Key exchange' %><%= t 'Authentication' %><%= t 'Encryption' %><%= t 'MAC' %><%= t 'PFS' %>
<%= t 'Type' %><%= t 'Key size' %><%= t 'Block size' %><%= t 'Mode' %><%= t 'Type' %><%= t 'Size' %>
+ + + + + + + + + + + + + + + + + + + + <% + handshakes = host[:handshakes] + all_ciphers = handshakes[:ciphers].group_by { |c| c[:protocol] } + CryptCheck::Tls::Method.each do |protocol| + ciphers = all_ciphers.fetch(protocol.to_sym.to_s, []) + .collect { |c| CryptCheck::Tls::Cipher.new protocol, c[:name] }.sort + unless ciphers.empty? %> + + + + <% ciphers.each do |cipher| + kex = cipher.kex + auth = cipher.auth + enc = cipher.encryption + mac = cipher.hmac + pfs = cipher.pfs? + %> - + + <%= cipher_kex_type_cell kex %> + <%= cipher_auth_type_cell auth %> + <%= cipher_enc_type_cell enc[0] %> + <%= cipher_enc_key_size_cell enc[1] %> + <%= cipher_enc_block_size_cell enc[2] %> + <%= cipher_enc_mode_cell enc[3] %> + <%= cipher_mac_type_cell mac[0] %> + <%= cipher_mac_size_cell mac[1] %> + <%= cipher_pfs_cell pfs %> - <% ciphers.each do |cipher| - kex = cipher.kex - auth = cipher.auth - enc = cipher.encryption - mac = cipher.hmac - pfs = cipher.pfs? - %> - - - <%= cipher_kex_type_cell kex %> - <%= cipher_auth_type_cell auth %> - <%= cipher_enc_type_cell enc[0] %> - <%= cipher_enc_key_size_cell enc[1] %> - <%= cipher_enc_block_size_cell enc[2] %> - <%= cipher_enc_mode_cell enc[3] %> - <%= cipher_mac_type_cell mac[0] %> - <%= cipher_mac_size_cell mac[1] %> - <%= cipher_pfs_cell pfs %> - - <% end end end %> - -
<%= t 'Name' %><%= t 'Key exchange' %><%= t 'Authentication' %><%= t 'Encryption' %><%= t 'MAC' %><%= t 'PFS' %>
<%= t 'Type' %><%= t 'Key size' %><%= t 'Block size' %><%= t 'Mode' %><%= t 'Type' %><%= t 'Size' %>
<%= protocol_label protocol %>
<%= protocol_label protocol %><%= cipher_name_label cipher %>
<%= cipher_name_label cipher %>
-
+ <% end end end %> + +
+ <% end %>