diff --git a/futurerestore/futurerestore.cpp b/futurerestore/futurerestore.cpp index f3408d06..569c083b 100644 --- a/futurerestore/futurerestore.cpp +++ b/futurerestore/futurerestore.cpp @@ -920,7 +920,7 @@ void futurerestore::doRestore(const char *ipsw) { plist_t manifest = plist_dict_get_item(build_identity, "Manifest"); //this is the buildidentity used for restore - printf("checking APTicket to be valid for this restore...\n"); //if we are in pwnDFU, just use first APTicket. We don't need to check nonces. + printf("checking if the APTicket is valid for this restore...\n"); //if we are in pwnDFU, just use first APTicket. We don't need to check nonces. auto im4m = (_enterPwnRecoveryRequested || _rerestoreiOS9) ? _im4ms.at(0) : nonceMatchesIM4Ms(); uint64_t deviceEcid = getDeviceEcid(); @@ -935,7 +935,7 @@ void futurerestore::doRestore(const char *ipsw) { retassure(im4mEcid, "Failed to read ECID from APTicket\n"); if (im4mEcid != deviceEcid) { - error("ECID inside APTicket does not match device ECID\n"); + error("ECID inside of the APTicket does not match the device's ECID\n"); printf("APTicket is valid for %16llu (dec) but device is %16llu (dec)\n", im4mEcid, deviceEcid); if (_skipBlob) { info("[WARNING] NOT VALIDATING SHSH BLOBS ECID!\n"); @@ -943,13 +943,13 @@ void futurerestore::doRestore(const char *ipsw) { reterror("APTicket can't be used for restoring this device\n"); } } else - printf("Verified ECID in APTicket matches device ECID\n"); + printf("Verified ECID in APTicket matches the device's ECID\n"); if (_client->image4supported) { - printf("checking APTicket to be valid for this restore...\n"); + printf("checking if the APTicket is valid for this restore...\n"); if (im4mEcid != deviceEcid) { - error("ECID inside APTicket does not match device ECID\n"); + error("ECID inside of the APTicket does not match the device's ECID\n"); printf("APTicket is valid for %16llu (dec) but device is %16llu (dec)\n", im4mEcid, deviceEcid); if (_skipBlob) { info("[WARNING] NOT VALIDATING SHSH BLOBS ECID!\n"); @@ -957,7 +957,7 @@ void futurerestore::doRestore(const char *ipsw) { reterror("APTicket can't be used for restoring this device\n"); } } else - printf("Verified ECID in APTicket matches device ECID\n"); + printf("Verified ECID in APTicket matches the device's ECID\n"); plist_t ticketIdentity = nullptr; @@ -1049,7 +1049,7 @@ void futurerestore::doRestore(const char *ipsw) { retassure(_client->basebandBuildIdentity, "BasebandBuildIdentity not loaded, refusing to continue"); } else { - warning("WARNING: we don't have a basebandbuildmanifest, does not flashing baseband!\n"); + warning("WARNING: we don't have a BasebandBuildManifest, won't flash baseband!\n"); } if (_client->image4supported) { @@ -1318,7 +1318,7 @@ void futurerestore::doRestore(const char *ipsw) { debug("Waiting for device to enter restore mode...\n"); cond_wait_timeout(&client->device_event_cond, &client->device_event_mutex, 180000); retassure((client->mode == MODE_RESTORE || (mutex_unlock(&client->device_event_mutex), 0)), - "Device can't enter to restore mode"); + "Unable to place device into restore mode"); mutex_unlock(&client->device_event_mutex); info("About to restore device... \n");