diff --git a/src/cmd_decrypt.rs b/src/cmd_decrypt.rs index 83560e5..ac41335 100644 --- a/src/cmd_decrypt.rs +++ b/src/cmd_decrypt.rs @@ -239,7 +239,7 @@ fn try_decrypt_key(config: &Option, TinyEncryptEnvelopType::PgpX25519 => try_decrypt_key_ecdh_pgp_x25519(envelop, pin), TinyEncryptEnvelopType::Ecdh => try_decrypt_key_ecdh(config, envelop, pin, ENC_AES256_GCM_P256, slot), TinyEncryptEnvelopType::EcdhP384 => try_decrypt_key_ecdh(config, envelop, pin, ENC_AES256_GCM_P384, slot), - unknown_type => simple_error!("Unknown or not supported type: {}", unknown_type.get_name()), + unknown_type => simple_error!("Unknown or unsupported type: {}", unknown_type.get_name()), } } @@ -250,7 +250,7 @@ fn try_decrypt_key_ecdh(config: &Option, slot: &Option) -> XResult> { let wrap_key = WrapKey::parse(&envelop.encrypted_key)?; if wrap_key.header.enc.as_str() != expected_enc_type { - return simple_error!("Unsupported header requires: {}, actual: {}", expected_enc_type, &wrap_key.header.enc); + return simple_error!("Unsupported header, requires: {} actual: {}", expected_enc_type, &wrap_key.header.enc); } let e_pub_key = &wrap_key.header.e_pub_key; let e_pub_key_bytes = opt_result!(util::decode_base64_url_no_pad(e_pub_key), "Invalid envelop: {}"); @@ -282,7 +282,7 @@ fn try_decrypt_key_ecdh(config: &Option, fn try_decrypt_key_ecdh_pgp_x25519(envelop: &TinyEncryptEnvelop, pin: &Option) -> XResult> { let wrap_key = WrapKey::parse(&envelop.encrypted_key)?; if wrap_key.header.enc.as_str() != ENC_AES256_GCM_X25519 { - return simple_error!("Unsupported header requires: {}, actual: {}", ENC_AES256_GCM_X25519, &wrap_key.header.enc); + return simple_error!("Unsupported header, requires: {} actual: {}", ENC_AES256_GCM_X25519, &wrap_key.header.enc); } let e_pub_key = &wrap_key.header.e_pub_key; let epk_bytes = opt_result!(util::decode_base64_url_no_pad(e_pub_key), "Invalid envelop: {}");