mirror of
https://github.com/tihmstar/futurerestore.git
synced 2025-04-20 14:31:41 +00:00
Wording fixes (#63)
This commit is contained in:
parent
1c29b9bcea
commit
04f8b7d4f2
|
@ -920,7 +920,7 @@ void futurerestore::doRestore(const char *ipsw) {
|
|||
|
||||
plist_t manifest = plist_dict_get_item(build_identity, "Manifest"); //this is the buildidentity used for restore
|
||||
|
||||
printf("checking APTicket to be valid for this restore...\n"); //if we are in pwnDFU, just use first APTicket. We don't need to check nonces.
|
||||
printf("checking if the APTicket is valid for this restore...\n"); //if we are in pwnDFU, just use first APTicket. We don't need to check nonces.
|
||||
auto im4m = (_enterPwnRecoveryRequested || _rerestoreiOS9) ? _im4ms.at(0) : nonceMatchesIM4Ms();
|
||||
|
||||
uint64_t deviceEcid = getDeviceEcid();
|
||||
|
@ -935,7 +935,7 @@ void futurerestore::doRestore(const char *ipsw) {
|
|||
retassure(im4mEcid, "Failed to read ECID from APTicket\n");
|
||||
|
||||
if (im4mEcid != deviceEcid) {
|
||||
error("ECID inside APTicket does not match device ECID\n");
|
||||
error("ECID inside of the APTicket does not match the device's ECID\n");
|
||||
printf("APTicket is valid for %16llu (dec) but device is %16llu (dec)\n", im4mEcid, deviceEcid);
|
||||
if (_skipBlob) {
|
||||
info("[WARNING] NOT VALIDATING SHSH BLOBS ECID!\n");
|
||||
|
@ -943,13 +943,13 @@ void futurerestore::doRestore(const char *ipsw) {
|
|||
reterror("APTicket can't be used for restoring this device\n");
|
||||
}
|
||||
} else
|
||||
printf("Verified ECID in APTicket matches device ECID\n");
|
||||
printf("Verified ECID in APTicket matches the device's ECID\n");
|
||||
|
||||
if (_client->image4supported) {
|
||||
printf("checking APTicket to be valid for this restore...\n");
|
||||
printf("checking if the APTicket is valid for this restore...\n");
|
||||
|
||||
if (im4mEcid != deviceEcid) {
|
||||
error("ECID inside APTicket does not match device ECID\n");
|
||||
error("ECID inside of the APTicket does not match the device's ECID\n");
|
||||
printf("APTicket is valid for %16llu (dec) but device is %16llu (dec)\n", im4mEcid, deviceEcid);
|
||||
if (_skipBlob) {
|
||||
info("[WARNING] NOT VALIDATING SHSH BLOBS ECID!\n");
|
||||
|
@ -957,7 +957,7 @@ void futurerestore::doRestore(const char *ipsw) {
|
|||
reterror("APTicket can't be used for restoring this device\n");
|
||||
}
|
||||
} else
|
||||
printf("Verified ECID in APTicket matches device ECID\n");
|
||||
printf("Verified ECID in APTicket matches the device's ECID\n");
|
||||
|
||||
plist_t ticketIdentity = nullptr;
|
||||
|
||||
|
@ -1049,7 +1049,7 @@ void futurerestore::doRestore(const char *ipsw) {
|
|||
|
||||
retassure(_client->basebandBuildIdentity, "BasebandBuildIdentity not loaded, refusing to continue");
|
||||
} else {
|
||||
warning("WARNING: we don't have a basebandbuildmanifest, does not flashing baseband!\n");
|
||||
warning("WARNING: we don't have a BasebandBuildManifest, won't flash baseband!\n");
|
||||
}
|
||||
|
||||
if (_client->image4supported) {
|
||||
|
@ -1318,7 +1318,7 @@ void futurerestore::doRestore(const char *ipsw) {
|
|||
debug("Waiting for device to enter restore mode...\n");
|
||||
cond_wait_timeout(&client->device_event_cond, &client->device_event_mutex, 180000);
|
||||
retassure((client->mode == MODE_RESTORE || (mutex_unlock(&client->device_event_mutex), 0)),
|
||||
"Device can't enter to restore mode");
|
||||
"Unable to place device into restore mode");
|
||||
mutex_unlock(&client->device_event_mutex);
|
||||
|
||||
info("About to restore device... \n");
|
||||
|
|
Loading…
Reference in a new issue