diff --git a/app/views/check/show.html.erb b/app/views/check/show.html.erb
index 1582daa..a2448f6 100644
--- a/app/views/check/show.html.erb
+++ b/app/views/check/show.html.erb
@@ -2,7 +2,8 @@
- [<%= self.type.to_s.upcase %>] <%= @host %> (<%= l @analysis.updated_at %>)
+ [<%= self.type.to_s.upcase %>] <%= @host %>
+ (<%= l @analysis.updated_at %>)
<% if Time.now - @analysis.updated_at >= Rails.configuration.refresh_delay %>
@@ -12,71 +13,84 @@
<% end %>
- <% @result.each do |host| %>
+ <% @result.each do |host|
+ if host.error %>
- <%= rank_label host[:grade].to_sym %>
+ <%= rank_label :X %>
<%= host[:ip] %> : <%= host[:port] %>
- (<%= host[:hostname] %>)
+ (<%= host[:hostname] %>)
+
+ <%= t 'Error during analysis:' %>
+ <%= host.error %>
+ <% next; end %>
+
+
+
+ <%= rank_label host[:grade].to_sym %>
+ <%= host[:ip] %> : <%= host[:port] %>
+ (<%= host[:hostname] %>)
+
+
-
-
-
-
-
- <%= t 'Name' %> |
- <%= t 'Key exchange' %> |
- <%= t 'Authentication' %> |
- <%= t 'Encryption' %> |
- <%= t 'MAC' %> |
- <%= t 'PFS' %> |
-
-
- <%= t 'Type' %> |
- <%= t 'Key size' %> |
- <%= t 'Block size' %> |
- <%= t 'Mode' %> |
- <%= t 'Type' %> |
- <%= t 'Size' %> |
-
-
-
- <%
- handshakes = host[:handshakes]
- all_ciphers = handshakes[:ciphers].group_by { |c| c[:protocol] }
- CryptCheck::Tls::Method.each do |protocol|
- ciphers = all_ciphers.fetch(protocol.to_sym.to_s, [])
- .collect { |c| CryptCheck::Tls::Cipher.new protocol, c[:name] }.sort
- unless ciphers.empty? %>
+
+
+
+
+
+ <%= t 'Name' %> |
+ <%= t 'Key exchange' %> |
+ <%= t 'Authentication' %> |
+ <%= t 'Encryption' %> |
+ <%= t 'MAC' %> |
+ <%= t 'PFS' %> |
+
+
+ <%= t 'Type' %> |
+ <%= t 'Key size' %> |
+ <%= t 'Block size' %> |
+ <%= t 'Mode' %> |
+ <%= t 'Type' %> |
+ <%= t 'Size' %> |
+
+
+
+ <%
+ handshakes = host[:handshakes]
+ all_ciphers = handshakes[:ciphers].group_by { |c| c[:protocol] }
+ CryptCheck::Tls::Method.each do |protocol|
+ ciphers = all_ciphers.fetch(protocol.to_sym.to_s, [])
+ .collect { |c| CryptCheck::Tls::Cipher.new protocol, c[:name] }.sort
+ unless ciphers.empty? %>
+
+ <%= protocol_label protocol %> |
+
+ <% ciphers.each do |cipher|
+ kex = cipher.kex
+ auth = cipher.auth
+ enc = cipher.encryption
+ mac = cipher.hmac
+ pfs = cipher.pfs?
+ %>
- <%= protocol_label protocol %> |
+ <%= cipher_name_label cipher %> |
+ <%= cipher_kex_type_cell kex %>
+ <%= cipher_auth_type_cell auth %>
+ <%= cipher_enc_type_cell enc[0] %>
+ <%= cipher_enc_key_size_cell enc[1] %>
+ <%= cipher_enc_block_size_cell enc[2] %>
+ <%= cipher_enc_mode_cell enc[3] %>
+ <%= cipher_mac_type_cell mac[0] %>
+ <%= cipher_mac_size_cell mac[1] %>
+ <%= cipher_pfs_cell pfs %>
- <% ciphers.each do |cipher|
- kex = cipher.kex
- auth = cipher.auth
- enc = cipher.encryption
- mac = cipher.hmac
- pfs = cipher.pfs?
- %>
-
- <%= cipher_name_label cipher %> |
- <%= cipher_kex_type_cell kex %>
- <%= cipher_auth_type_cell auth %>
- <%= cipher_enc_type_cell enc[0] %>
- <%= cipher_enc_key_size_cell enc[1] %>
- <%= cipher_enc_block_size_cell enc[2] %>
- <%= cipher_enc_mode_cell enc[3] %>
- <%= cipher_mac_type_cell mac[0] %>
- <%= cipher_mac_size_cell mac[1] %>
- <%= cipher_pfs_cell pfs %>
-
- <% end end end %>
-
-
-
+ <% end end end %>
+
+
+
<% end %>