commit 85fe8fdc019d9e39bf9b278a9449e05871655e11
parent bfe9ed7e93df73ca8f1fb15461c9f190572d43e9
Author: Jaromil <jaromil@dyne.org>
Date:   Sun, 11 May 2014 09:28:01 +0200
Merge pull request #107 from gdrooid/master
Message formatting inconsistencies
Diffstat:
| M | tomb |  |  | 462 | ++++++++++++++++++++++++++++++++++++++++---------------------------------------- | 
1 file changed, 231 insertions(+), 231 deletions(-)
diff --git a/tomb b/tomb
@@ -73,20 +73,20 @@ typeset -h _tty
 
 _have_shm() {
     # Check availability of 1MB of SHM
-    xxx "_have_shm 0 We need only 1 MB of RAM"
+    _verbose "_have_shm 0 We need only 1 MB of RAM."
     [[ -k /dev/shm ]] || return 1
 
     local -i SHM RAM
 
     SHM=$(df -k -B 4K -a -t tmpfs /dev/shm | awk '/\/dev\/shm/ { print $4; }')
     (( $? )) && return 1
-    xxx "_have_shm 1 SHM $SHM KB are available"
+    _verbose "_have_shm 1 SHM $SHM KB are available."
 
     RAM=$(awk '/MemFree/ { print $2 }' /proc/meminfo)
-    xxx "_have_shm 2 RAM $RAM KB are free"
+    _verbose "_have_shm 2 RAM $RAM KB are free."
     (( $RAM >= 1024 )) && return 0
 
-    xxx "_have_shm 3 RAM $RAM KB left only :("
+    _verbose "_have_shm 3 RAM $RAM KB left only :("
     # Now we have more RAM than affected to SHM, so we can expect some for our little needs.
     # Does that work when SHM is disabled from kernel config?
     return 1
@@ -101,7 +101,7 @@ safe_dir() {
     while (( $tries < 3 )) ; do
 	tries+=1
 	if _have_shm; then
-	    xxx "safe_dir creating $1 dir in RAM"
+	    _verbose "safe_dir creating $1 dir in RAM."
 	    if (( $MKTEMP )); then
 		mktemp -d /dev/shm/tomb.$1.$$.XXXXXXX
 	    else
@@ -112,7 +112,7 @@ safe_dir() {
 	    return 0
 	else
 	    _warning "WARNING: we cannot ensure we're running in RAM."
-		 xxx "Wait a bit before retrying... (attempt $tries)"
+            _verbose "Wait a bit before retrying... (attempt $tries)."
 	    sync && sleep 0.5
 	fi
     done
@@ -122,7 +122,7 @@ safe_dir() {
 
 # Provide a random filename in shared memory
 safe_filename() {
-    _have_shm || die "No access to shared memory on this system, sorry."
+    _have_shm || _failure "No access to shared memory on this system, sorry."
     (( $MKTEMP )) && \
 	mktemp -u /dev/shm/tomb.$1.$$.XXXXXXX || \
 	print "/dev/shm/tomb.$1.$$.$RANDOM$RANDOM"
@@ -165,14 +165,14 @@ check_swap() {
 	    fi
 	fi
     done
-    no  "An active swap partition is detected, this poses security risks."
+    _warning  "An active swap partition is detected, this poses security risks."
     if [[ $ret -eq 2 ]]; then
-	yes "All your swaps are belong to crypt.  Good."
+	_success "All your swaps are belong to crypt.  Good."
     else
-	no  "You can deactivate all swap partitions using the command:"
-	no  " swapoff -a"
-	no  "But if you want to proceed like this, use the -f (force) flag."
-	die "Operation aborted."
+	_warning  "You can deactivate all swap partitions using the command:"
+	_warning  " swapoff -a"
+	_warning  "But if you want to proceed like this, use the -f (force) flag."
+	_failure "Operation aborted."
     fi
     return $ret
 }
@@ -207,7 +207,7 @@ ask_password() {
 	GTK2_RC=/usr/share/themes/tomb/gtk-2.0-key/gtkrc
     fi
 
-    title="Insert tomb password"
+    title="Insert tomb password."
     if [ $2 ]; then title="$2"; fi
 
     output=`cat <<EOF | GTK2_RC_FILES=${GTK2_RC} pinentry 2>/dev/null | tail -n +7
@@ -231,7 +231,7 @@ exec_as_user() {
 	exec $@[@]
 	return $?
     fi
-    xxx "exec_as_user '$SUDO_USER': ${(f)@}"
+    _verbose "exec_as_user '$SUDO_USER': ${(f)@}"
     sudo -u $SUDO_USER "${@[@]}"
     return $?
 }
@@ -241,7 +241,7 @@ check_priv() {
     # save original user
     username=$USER
     if [ $UID != 0 ]; then
-	xxx "Using sudo for root execution of '${TOMBEXEC} ${(f)OLDARGS}'"
+	_verbose "Using sudo for root execution of '${TOMBEXEC} ${(f)OLDARGS}'."
 	# check if sudo has a timestamp active
 	sudok=false
 
@@ -257,7 +257,7 @@ GETPIN
 EOF
 	    fi
 	else
-	    _verbose "Escalating privileges using sudo-pwd"
+	    _verbose "Escalating privileges using sudo-pwd."
 	    sudo -S -v <<<`option_value --sudo-pwd`
 	fi
 	sudo "${TOMBEXEC}" -U ${UID} -G ${GID} -T ${TTY} "${(@)OLDARGS}"
@@ -267,10 +267,10 @@ EOF
     # check if we have support for loop mounting
     losetup -f > /dev/null
     { test "$?" = "0" } || {
-	no "Loop mount of volumes is not supported on this machine, this error"
-	no "often occurs on VPS and kernels that don't provide the loop module."
-	no "It is impossible to use Tomb on this machine at this conditions."
-	die "Operation aborted."
+	_warning "Loop mount of volumes is not supported on this machine, this error"
+	_warning "often occurs on VPS and kernels that don't provide the loop module."
+	_warning "It is impossible to use Tomb on this machine at this conditions."
+	_failure "Operation aborted."
     }
 
     # make sure necessary kernel modules are loaded
@@ -282,10 +282,10 @@ EOF
 
 # check if a filename is a valid tomb
 is_valid_tomb() {
-    xxx "is_valid_tomb $1"
+    _verbose "is_valid_tomb $1"
     # argument check
     { test "$1" = "" } && {
-	_warning "Tomb file is missing from arguments"; return 1 }
+	_warning "Tomb file is missing from arguments."; return 1 }
     # file checks
     { test -r "$1" } || {
 	_warning "Tomb file not found: $1"; return 1 }
@@ -498,7 +498,7 @@ progress() {
 check_bin() {
     # check for required programs
     for req in cryptsetup pinentry sudo gpg; do
-	command -v $req >/dev/null || die "Cannot find $req. It's a requirement to use Tomb, please install it." 1
+	command -v $req >/dev/null || _failure "Cannot find $req. It's a requirement to use Tomb, please install it." 1
     done
 
     export PATH=/sbin:/usr/sbin:$PATH
@@ -542,18 +542,18 @@ load_key() {
     # take the name of a tomb file as argument
     if option_is_set -k ; then
 	if [[ "`option_value -k`" == "-" ]]; then
-	    xxx "load_key reading from stdin"
+	    _verbose "load_key reading from stdin."
 	    # take key from stdin
 	    tombkeydir=`safe_dir load_key_stdin` # global used to check if key from stdin
-	    xxx "tempdir is $tombkeydir"
-	    act "waiting for the key to be piped from stdin... "
+	    _verbose "tempdir is $tombkeydir"
+	    act "Waiting for the key to be piped from stdin... "
 	    cat > ${tombkeydir}/stdin.tmp.key
 	    print ok >&2
 	    tombdir=${tombkeydir}
 	    tombfile=stdin.tmp.key
 	    tombname="stdin"
 	elif [[ "`option_value -k`" != "" ]]; then
-	    xxx "load_key argument: `option_value -k`"
+	    _verbose "load_key argument: `option_value -k`"
 	    # take key from a file
 	    tombkey=`option_value -k`
 	    tombdir=`dirname $tombkey`
@@ -561,21 +561,21 @@ load_key() {
 	fi
 
     else # no -k specified
-	die "this operation requires a key file to be specified using the -k option"
+	_failure "This operation requires a key file to be specified using the -k option."
 	return 1
     fi
 
     tombkey=${tombdir}/${tombfile}
 
-    xxx "load_key: ${tombkey}"
+    _verbose "load_key: ${tombkey}"
     { test -r "${tombkey}" } || {
-	_warning "Key not found, specify one using -k"
+	_warning "Key not found, specify one using -k."
 	drop_key
 	return 1 }
 
     # this does a check on the file header
     if ! is_valid_key ${tombkey}; then
-	_warning "The key seems invalid, the application/pgp header is missing"
+	_warning "The key seems invalid, the application/pgp header is missing."
 	drop_key
 	return 1
     fi
@@ -589,12 +589,12 @@ load_key() {
 ask_key_password() {
     tombkey="$1"
     local keyname=`basename $tombkey`
-    _message "a password is required to use key ${keyname}"
+    _message "A password is required to use key ${keyname}"
     local passok=0
     local tombpass=""
     if option_is_set --tomb-pwd; then
 	    tombpass=`option_value --tomb-pwd`
-	    xxx "ask_key_password takes tombpass from CLI argument: $tombpass"
+	    _verbose "ask_key_password takes tombpass from CLI argument: $tombpass"
 
 	    get_lukskey "$tombpass" ${tombkey} >/dev/null
 
@@ -609,7 +609,7 @@ ask_key_password() {
 		tombpass=`exec_as_user ${TOMBEXEC} askpass "Insert password to use key: $keyname (retry $c)"`
 	    fi
 	    if [[ $? != 0 ]]; then
-		_warning "User aborted password dialog"
+		_warning "User aborted password dialog."
 		return 1
 	    fi
 
@@ -638,13 +638,13 @@ change_passwd() {
 
     # check the keyfile
     if ! [ -r $keyfile ]; then
-	_warning "key not found: $keyfile"
+	_warning "Key not found: $keyfile"
 	return 1
     fi
 
     if ! is_valid_key $keyfile ; then
-	_warning "file doesn't seems to be a tomb key: $keyfile"
-	_warning "operation aborted."
+	_warning "File doesn't seems to be a tomb key: $keyfile"
+	_warning "Operation aborted."
 	return 1
     fi
 
@@ -657,7 +657,7 @@ change_passwd() {
 
     tombpass=`ask_key_password $keyfile`
     { test $? = 0 } || {
-	die "No valid password supplied" }
+	_failure "No valid password supplied." }
 
     get_lukskey "${tombpass}" ${keyfile} > ${lukskey};
 
@@ -671,14 +671,14 @@ change_passwd() {
 	gen_key $lukskey $algopt > ${tmpnewkey}
 
 	if ! is_valid_key $tmpnewkey; then
-	    die "Error: the newly generated keyfile does not seem valid"
+	    _failure "Error: the newly generated keyfile does not seem valid."
 	else
 	    # copy the new key as the original keyfile name
 	    cp "${tmpnewkey}" "${keyfile}"
 	    _success "Your passphrase was successfully updated."
 	fi
     } always {
-	_verbose "cleanup: $tmpnewkey $lukskey"
+	_verbose "Cleanup: $tmpnewkey $lukskey"
 	# wipe all temp file
 	${=WIPE} "${tmpnewkey}"
 	${=WIPE} "${lukskey}"
@@ -689,21 +689,21 @@ change_passwd() {
 
 # To be called after load_key()
 drop_key() {
-    xxx "drop_key $tombkey"
+    _verbose "drop_key $tombkey"
     # delete key if temp stored from stdin
     if [[ "$tombkey" =~ "/dev/shm/tomb.load_key_stdin" ]]; then
 	{ test -r ${tombkey} } && {
-	    _message "removing key temporarily stored from stdin"
+	    _message "Removing key temporarily stored from stdin"
 	    ${=WIPE} ${tombkey}; rmdir `dirname ${tombkey}` }
     fi
 }
 
 #$1 is the keyfile we are checking
 is_valid_key() {
-    xxx "is_valid_key $1"
+    _verbose "is_valid_key $1"
     # argument check
     { test "$1" = "" } && {
-	_warning "Key file is missing from arguments"; return 1 }
+	_warning "Key file is missing from arguments."; return 1 }
     # file checks
     { test -r "$1" } || {
 	_warning "Key file not found: $1"; return 1 }
@@ -716,7 +716,7 @@ is_valid_key() {
 	return 0 }
     # if no BEGIN header found then we try to recover it
     [[ `file $1 -bi` =~ text/plain ]] && {
-	_warning "Key data found with missing headers, attempting recovery"
+	_warning "Key data found with missing headers, attempting recovery."
 	local tmp_keyfix=`safe_filename keyfix`
 	touch $tmp_keyfix
 	# make sure KDF header comes first
@@ -750,7 +750,7 @@ get_lukskey() {
     local tombpass=$1
     local keyfile=$2
     firstline=`head -n1 $keyfile`
-    xxx "get_lukskey XXX $keyfile"
+    _verbose "get_lukskey XXX $keyfile"
     if [[ $firstline =~ '^_KDF_' ]]; then
 	_verbose "KDF: `cut -d_ -f 3 <<<$firstline`"
 	case `cut -d_ -f 3 <<<$firstline` in
@@ -759,7 +759,7 @@ get_lukskey() {
 		tombpass=$(tomb-kdb-pbkdf2 ${=pbkdf2_param} 2> /dev/null <<<$tombpass)
 		;;
 	    *)
-		_failure "No suitable program for KDF `cut -f 3 <<<$firstline`"
+		_failure "No suitable program for KDF `cut -f 3 <<<$firstline`."
 		unset tombpass
 		return 1
 		;;
@@ -769,7 +769,7 @@ get_lukskey() {
     # fix for gpg 1.4.11 where the --status-* options don't work ;^/
     gpgver=`gpg --version | awk '/^gpg/ {print $3}'`
     if [ "$gpgver" = "1.4.11" ]; then
-	xxx "GnuPG is version 1.4.11 - adopting status fix"
+	_verbose "GnuPG is version 1.4.11 - adopting status fix."
 
 	print ${tombpass} | \
 	    gpg --batch --passphrase-fd 0 --no-tty --no-options -d "${keyfile}"
@@ -779,7 +779,7 @@ get_lukskey() {
     else # using status-file in gpg != 1.4.11
 
 	res=`safe_filename lukskey`
-	{ test $? = 0 } || { unset tombpass; die "Fatal error creating temp file." }
+	{ test $? = 0 } || { unset tombpass; _failure "Fatal error creating temp file." }
 
 	print ${tombpass} | \
 	    gpg --batch --passphrase-fd 0 --no-tty --no-options --status-fd 2 \
@@ -791,7 +791,7 @@ get_lukskey() {
 	ret=$?; rm -f $res
 
     fi
-    xxx "get_lukskey returns $ret"
+    _verbose "get_lukskey returns $ret"
     return $ret
 }
 
@@ -811,16 +811,16 @@ gen_key() {
 	    # 3 tries to write two times a matching password
 	    tombpass=`exec_as_user ${TOMBEXEC} askpass "Secure key for ${tombname}"`
 	    if [[ $? != 0 ]]; then
-		die "User aborted"
+		_failure "User aborted."
 	    fi
 	    if [ -z $tombpass ]; then
-		_warning "you set empty password, which is not possible"
+		_warning "You set empty password, which is not possible."
 		continue
 	    fi
 	    tombpasstmp=$tombpass
 	    tombpass=`exec_as_user ${TOMBEXEC} askpass "Secure key for ${tombname} (again)"`
 	    if [[ $? != 0 ]]; then
-		die "User aborted"
+		_failure "User aborted."
 	    fi
 	    if [ "$tombpasstmp" = "$tombpass" ]; then
 		break;
@@ -830,7 +830,7 @@ gen_key() {
 	done
     else
 	tombpass="`option_value --tomb-pwd`"
-	xxx "gen_key takes tombpass from CLI argument: $tombpass"
+	_verbose "gen_key takes tombpass from CLI argument: $tombpass"
     fi
 
     header=""
@@ -843,12 +843,12 @@ gen_key() {
 	    if [[ "$itertime" != <-> ]]; then
 		unset tombpass
 		unset tombpasstmp
-		die "Wrong argument for --kdf: must be an integer number (iteration seconds)"
+		_failure "Wrong argument for --kdf: must be an integer number (iteration seconds)."
 	    fi
 	    # --kdf takes one parameter: iter time (on present machine) in seconds
 	    local -i microseconds
 	    microseconds=$((itertime*10000))
-	    yes "Using KDF, iterations: $microseconds"
+	    _success "Using KDF, iterations: $microseconds"
 	    pbkdf2_salt=`tomb-kdb-pbkdf2-gensalt`
 	    pbkdf2_iter=`tomb-kdb-pbkdf2-getiter $microseconds`
 	    # We use a length of 64bytes = 512bits (more than needed!?)
@@ -873,7 +873,7 @@ gen_key() {
 # prints an array of ciphers available in gnupg (to encrypt keys)
 list_gnupg_ciphers() {
     # prints an error if GnuPG is not found
-    which gpg > /dev/null || die "gpg (GnuPG) is not found, Tomb cannot function without it."
+    which gpg > /dev/null || _failure "gpg (GnuPG) is not found, Tomb cannot function without it."
 
     ciphers=(`gpg --version | awk '
 BEGIN { ciphers=0 }
@@ -892,20 +892,20 @@ bury_key() {
     imagefile=$1
 
     { is_valid_key ${tombkey} } || {
-	die "Bury failed: not a tomb key $tombkey" }
+	_failure "Bury failed: not a tomb key $tombkey" }
 
     file $imagefile | grep JPEG > /dev/null
     if [ $? != 0 ]; then
-	_warning "encode failed: $imagefile is not a jpeg image"
+	_warning "Encode failed: $imagefile is not a jpeg image."
 	return 1
     fi
 
     _success "Encoding key $tombkey inside image $imagefile"
-    _message "please confirm the key password for the encoding"
+    _message "Please confirm the key password for the encoding"
     tombpass=`ask_key_password $tombkey`
     { test $? = 0 } || {
 	_warning "Wrong password supplied."
-	die "You shall not bury a key whose password is unknown to you."
+	_failure "You shall not bury a key whose password is unknown to you."
     }
 
     # we omit armor strings since having them as constants can give
@@ -918,10 +918,10 @@ bury_key() {
     | steghide embed --embedfile - --coverfile ${imagefile} \
     -p ${tombpass} -z 9 -e serpent cbc
     if [ $? != 0 ]; then
-	_warning "encoding error: steghide reports problems"
+	_warning "Encoding error: steghide reports problems."
 	res=1
     else
-	_success "tomb key encoded succesfully into image ${imagefile}"
+	_success "Tomb key encoded succesfully into image ${imagefile}"
 	res=0
     fi
 
@@ -937,15 +937,15 @@ exhume_key() {
 
     file $imagefile | grep JPEG > /dev/null
     if [ $? != 0 ]; then
-	_warning "encode failed: $imagefile is not a jpeg image"
+	_warning "Encode failed: $imagefile is not a jpeg image."
 	return 1
     fi
 
     if [[ -e "$tombkey" ]]; then
 	_warning "File exists: $tombkey"
 	{ option_is_set -f } || {
-	    _warning "Make explicit use of --force to overwrite"
-	    die "Refusing to overwrite file. Operation aborted." }
+	    _warning "Make explicit use of --force to overwrite."
+	    _failure "Refusing to overwrite file. Operation aborted." }
 	_warning "Use of --force selected: overwriting."
 	rm -f ${tombkey}
     fi
@@ -953,7 +953,7 @@ exhume_key() {
     _message "Trying to exhume a key out of image $imagefile"
     if option_is_set --tomb-pwd; then
 	    tombpass=`option_value --tomb-pwd`
-	    xxx "ask_key_password takes tombpass from CLI argument: $tombpass"
+	    _verbose "ask_key_password takes tombpass from CLI argument: $tombpass"
     else
 	tombpass=`exec_as_user ${TOMBEXEC} askpass "Steg password for ${tombkey}"`
     fi
@@ -964,11 +964,11 @@ exhume_key() {
     unset tombpass
 
     if [ $res = 0 ]; then
-	_success "${tombkey} succesfully decoded"
+	_success "${tombkey} succesfully decoded."
 	return 0
     fi
 
-    _warning "nothing found in $imagefile"
+    _warning "Nothing found in $imagefile"
     return 1
 }
 
@@ -977,19 +977,19 @@ exhume_key() {
 engrave_key() {
     # load key from options
     tombkey="`load_key $1`"
-    { test $? = 0 } || { die "No key specified." }
+    { test $? = 0 } || { _failure "No key specified." }
     keyname=`basename $tombkey`
     pngname="$keyname.qr.png"
 
-    yes "Rendering a printable QRCode for key: $tombkey"
+    _success "Rendering a printable QRCode for key: $tombkey"
     # we omit armor strings to save space
     awk '
 /^-----/ {next}
 /^Version/ {next}
 {print $0}' ${tombkey} | qrencode --size 4 --level H \
     --casesensitive -o "$pngname"
-    { test $? = 0 } || { die "QREncode reported an error." }
-    yes "Operation successful:"
+    { test $? = 0 } || { _failure "QREncode reported an error." }
+    _success "Operation successful:"
     _message "`ls -lh $pngname`"
     _message "`file $pngname`"
 }
@@ -1008,7 +1008,7 @@ engrave_key() {
 
 
 forge_key() {
-    xxx "forge_key()"
+    _verbose "forge_key()"
     _check_swap
 
     # can be specified both as simple argument or using -k
@@ -1016,7 +1016,7 @@ forge_key() {
     { option_is_set -k } && { destkey="`option_value -k`" }
 
     { test "$destkey" = "" } && {
-	_warning "no key name specified for creation"
+	_warning "No key name specified for creation."
 	return 1 }
 
     # make sure that gnupg doesn't quits with an error before first run
@@ -1026,18 +1026,18 @@ forge_key() {
 
     { test -r "$destkey" } && {
 	_warning "Forging this key would overwrite an existing file. Operation aborted."
-	die "`ls -lh $destkey`"    }
+	_failure "`ls -lh $destkey`"    }
 
     # create the keyfile in tmpfs so that we leave less traces in RAM
     local keytmp=`safe_dir forge`
-    (( $? )) && die "error creating temp dir"
-    xxx "safe_dir at $keytmp"
+    (( $? )) && _failure "Error creating temp dir."
+    _verbose "safe_dir at $keytmp"
 
     mount tmpfs "${keytmp}" -t tmpfs -o size=1m
     if [ $? != 0 ]; then
-	_warning "cannot mount tmpfs filesystem in volatile memory"
+	_warning "Cannot mount tmpfs filesystem in volatile memory."
 	rm -r "${keytmp}"
-	die "operation aborted."
+	_failure "Operation aborted."
     fi
 
     local algo
@@ -1048,7 +1048,7 @@ forge_key() {
 
     local tombkey="$destkey"
 
-    _message "this operation takes time, keep using this computer on other tasks,"
+    _message "This operation takes time, keep using this computer on other tasks,"
     _message "once done you will be asked to choose a password for your tomb."
     _message "To make it faster you can move the mouse around."
     _message "If you are on a server, you can use an Entropy Generation Daemon."
@@ -1060,18 +1060,18 @@ forge_key() {
 	random_source=/dev/urandom
     fi
 
-    xxx "Data dump using ${DD[1]} from $random_source"
+    _verbose "Data dump using ${DD[1]} from $random_source"
     ${=DD} bs=1 count=256 if=$random_source of=${keytmp}/tomb.tmp
 
     if ! [ -r ${keytmp}/tomb.tmp ]; then
-	_warning "cannot generate encryption key"
+	_warning "Cannot generate encryption key."
 	umount ${keytmp}
 	rm -r $keytmp
-	die "operation aborted."
+	_failure "Operation aborted."
     fi
 
     _success "Choose the password of your key: ${tombkey}"
-    _message "(you can also change it later using 'tomb passwd')"
+    _message "(You can also change it later using 'tomb passwd'.)"
     touch ${tombkey}
     chown ${_uid}:${_gid} ${tombkey}
     chmod 0600 ${tombkey}
@@ -1081,13 +1081,13 @@ forge_key() {
     gen_key "${keytmp}/tomb.tmp" "$algo" > ${tombkey}
     # this does a check on the file header
     if ! is_valid_key ${tombkey}; then
-	_warning "The key does not seem to be valid"
+	_warning "The key does not seem to be valid."
 	_warning "Dumping contents to screen:"
 	cat ${tombkey}
 	_warning "--"
 	umount ${keytmp}
 	rm -r $keytmp
-	die "operation aborted."
+	_failure "Operation aborted."
     fi
 
     ${=WIPE} ${keytmp}/tomb.tmp # no need really, but anyway
@@ -1096,7 +1096,7 @@ forge_key() {
 
     chown ${_uid}:${_gid} ${tombkey}
 
-    _message "done forging $tombkey"
+    _message "Done forging $tombkey"
     _success "Your key is ready:"
     ls -lh ${tombkey}
 }
@@ -1109,7 +1109,7 @@ dig_tomb() {
     _check_swap
 
     if ! [ $1 ]; then
-	_warning "no tomb name specified for creation"
+	_warning "No tomb name specified for creation."
 	return 1
     fi
 
@@ -1124,11 +1124,11 @@ dig_tomb() {
     # require the specification of the size of the tomb (-s) in MB
     tombsize="`option_value -s`"
 
-    [ $tombsize ] || die "Size argument missing, use -s"
+    [ $tombsize ] || _failure "Size argument missing, use -s"
 
-    [[ $tombsize != <-> ]] && die "Size argument is not an integer"
+    [[ $tombsize != <-> ]] && _failure "Size argument is not an integer."
 
-    [[ $tombsize -lt 10 ]] && die "Tombs can't be smaller than 10 megabytes"
+    [[ $tombsize -lt 10 ]] && _failure "Tombs can't be smaller than 10 megabytes."
 
     if [ -e ${tombdir}/${tombfile} ]; then
 	_warning "A tomb exists already. I'm not digging here:"
@@ -1144,17 +1144,17 @@ dig_tomb() {
     chmod 0600 "${tombdir}/${tombfile}"
     chown $_uid:$_gid "${tombdir}/${tombfile}"
 
-    xxx "Data dump using ${DD[1]} from /dev/urandom"
+    _verbose "Data dump using ${DD[1]} from /dev/urandom"
     ${=DD} if=/dev/urandom bs=1048576 count=${tombsize} of=${tombdir}/${tombfile}
 
     if [ $? = 0 -a -e ${tombdir}/${tombfile} ]; then
 	_message " `ls -lh ${tombdir}/${tombfile}`"
     else
-	die "Error creating the tomb ${tombdir}/${tombfile}, operation aborted."
+	_failure "Error creating the tomb ${tombdir}/${tombfile}, operation aborted."
     fi
 
     _success "Done digging $tombname"
-    _message "your tomb is not yet ready, you need to forge a key and lock it:"
+    _message "Your tomb is not yet ready, you need to forge a key and lock it:"
     _message "tomb forge ${tombname}.tomb.key"
     _message "tomb lock ${tombname}.tomb -k ${tombname}.tomb.key"
 }
@@ -1165,8 +1165,8 @@ dig_tomb() {
 # it take arguments as the LUKS cipher to be used
 lock_tomb_with_key() {
     if ! [ $1 ]; then
-	_warning "no tomb specified for locking"
-	_warning "usage: tomb lock file.tomb file.tomb.key"
+	_warning "No tomb specified for locking."
+	_warning "Usage: tomb lock file.tomb file.tomb.key"
 	return 1
     fi
 
@@ -1178,32 +1178,32 @@ lock_tomb_with_key() {
     tombname=${tombfile%%\.*}
 
     { test -f ${tombdir}/${tombfile} } || {
-	die "There is no tomb here. You have to it dig first."
+	_failure "There is no tomb here. You have to it dig first."
 	return 1 }
 
-    xxx "tomb found: ${tombdir}/${tombfile}"
+    _verbose "Tomb found: ${tombdir}/${tombfile}"
 
     nstloop=`losetup -f` # get the number for next loopback device
     losetup -f ${tombdir}/${tombfile} # allocates the next loopback for our file
 
-    xxx "loop mounted on ${nstloop}"
+    _verbose "Loop mounted on ${nstloop}"
 
-    _message "checking if the tomb is empty (we never step on somebody else's bones)"
+    _message "Checking if the tomb is empty (we never step on somebody else's bones)."
     cryptsetup isLuks ${nstloop}
     if [ $? = 0 ]; then
 	# is it a LUKS encrypted nest? then bail out and avoid reformatting it
-	_warning "The tomb was already locked with another key"
+	_warning "The tomb was already locked with another key."
 	losetup -d ${nstloop}
-	die "Operation aborted. I cannot lock an already locked tomb. Go dig a new one."
+	_failure "Operation aborted. I cannot lock an already locked tomb. Go dig a new one."
     else
-	_message "fine, this tomb seems empty."
+	_message "Fine, this tomb seems empty."
     fi
 
     # load key from options or file
     tombkey=`load_key ${tombdir}/${tombfile}`
     { test $? = 0 } || {
 	losetup -d $nstloop
-	die "Aborting operations: error loading key $tombkey" }
+	_failure "Aborting operations: error loading key $tombkey" }
 	# make sure to call drop_key later
 
     # the encryption cipher for a tomb can be set when locking using -o
@@ -1214,48 +1214,48 @@ lock_tomb_with_key() {
 	# old default was aes-cbc-essiv:sha256
 	# for more alternatives refer to cryptsetup(8)
     fi
-    _message "locking using cipher: $cipher"
+    _message "Locking using cipher: $cipher"
 
     # get the pass from the user and check it
     tombpass=`ask_key_password "$tombkey"`
     { test $? = 0 } || {
 	losetup -d ${nstloop}
-	die "No valid password supplied" }
+	_failure "No valid password supplied." }
 
     _success "Locking ${tombfile} with ${tombkey}"
 
-    _message "formatting Luks mapped device"
+    _message "Formatting Luks mapped device."
     get_lukskey "${tombpass}" ${tombkey} | \
 	cryptsetup --key-file -   --batch-mode \
 	--cipher ${cipher} --key-size 256 --key-slot 0 \
 	luksFormat ${nstloop}
     if ! [ $? = 0 ]; then
-	_warning "cryptsetup luksFormat returned an error"
+	_warning "cryptsetup luksFormat returned an error."
 	unset tombpass
 	losetup -d $nstloop
-	die "Operation aborted."
+	_failure "Operation aborted."
     fi
 
     get_lukskey "${tombpass}" ${tombkey} | \
 	cryptsetup --key-file - \
 	--cipher ${cipher} luksOpen ${nstloop} tomb.tmp
     if ! [ $? = 0 ]; then
-	_warning "cryptsetup luksOpen returned an error"
+	_warning "cryptsetup luksOpen returned an error."
 	unset tombpass
 	losetup -d $nstloop
-	die "Operation aborted."
+	_failure "Operation aborted."
     fi
 
     # cleanup tombs
     unset tombpass
     drop_key # make sure all temp files are out
 
-    _message "formatting your Tomb with Ext3/Ext4 filesystem"
+    _message "Formatting your Tomb with Ext3/Ext4 filesystem."
     ${=MKFS} ${tombname} /dev/mapper/tomb.tmp
 
     if [ $? != 0 ]; then
-	_warning "Tomb format returned an error"
-	_warning "your tomb ${tombfile} may be corrupted."
+	_warning "Tomb format returned an error."
+	_warning "Your tomb ${tombfile} may be corrupted."
     fi
 
     sync
@@ -1264,7 +1264,7 @@ lock_tomb_with_key() {
     losetup -d ${nstloop}
 
 
-    _message "done locking $tombname using Luks dm-crypt ${create_cipher}"
+    _message "Done locking $tombname using Luks dm-crypt ${create_cipher}"
     _success "Your tomb is ready in ${tombdir}/${tombfile} and secured with key ${tombkey}"
 
 }
@@ -1273,33 +1273,33 @@ lock_tomb_with_key() {
 change_tomb_key() {
     _check_swap
 
-    { option_is_set -k } || { die "Specify the new key with -k" }
+    { option_is_set -k } || { _failure "Specify the new key with -k" }
     newkey="`option_value -k`"
 
     { is_valid_key "$newkey" } || {
-	die "New key invalid. Check your usage of the --key option." }
+	_failure "New key invalid. Check your usage of the --key option." }
 
     oldkey="$1"
     { is_valid_key "$oldkey" } || {
-	die "Old key invalid. Check your usage of the first argument." }
+	_failure "Old key invalid. Check your usage of the first argument." }
 
     { is_valid_tomb "$2" } || {
-	die "Specify the name of a tomb as second argument" }
+	_failure "Specify the name of a tomb as second argument." }
 
     nstloop=`losetup -f`
     { test $? = 255 } && {
-	die "Too many tombs are open. Please close any of them to proceed." }
+	_failure "Too many tombs are open. Please close any of them to proceed." }
     losetup -f "$2"
     cryptsetup isLuks ${nstloop}
     # is it a LUKS encrypted nest? we check one more timesee cryptsetup(1)
     { test $? = 0 } || {
 	losetup -d "$nstloop"
-	die "Not a valid LUKS encrypted volume: $2" }
+	_failure "Not a valid LUKS encrypted volume: $2" }
 
     # we have everything, prepare to mount
-    yes "Changing lock on tomb $tombname"
-    _message "old key: $oldkey"
-    _message "new key: $newkey"
+    _success "Changing lock on tomb $tombname"
+    _message "Old key: $oldkey"
+    _message "New key: $newkey"
 
     # render the mapper
     mapdate=`date +%s`
@@ -1310,36 +1310,36 @@ change_tomb_key() {
     # load the new key from the -k option
     tombkey=`load_key`
     { test $? = 0 } || {
-	die "Aborting operations: error loading new key $tombkey"    }
+	_failure "Aborting operations: error loading new key $tombkey"    }
 
     newkeypass=`ask_key_password $tombkey`
     { test $? = 0 } || {
-	die "No valid password supplied for the new key" }
+	_failure "No valid password supplied for the new key." }
     newkeyfile="`safe_filename newkey`"
     get_lukskey "$newkeypass" "$newkey" > $newkeyfile
 
     # load the old key
     oldkeypass="`ask_key_password $oldkey`"
     { test $? = 0 } || {
-	die "No valid password supplied for the old key" }
+	_failure "No valid password supplied for the old key." }
 
     # luksOpen the tomb (not really mounting, just on the loopback)
     get_lukskey "$oldkeypass" "$oldkey" | \
 	cryptsetup --key-file - luksOpen ${nstloop} ${mapper}
     { test $? = 0 } || {
 	losetup -d "$nstloop"
-	die "Unexpected error in luksOpen." }
+	_failure "Unexpected error in luksOpen." }
 
     get_lukskey "$oldkeypass" "$oldkey" | \
 	cryptsetup --key-file - luksChangeKey "$nstloop" "$newkeyfile"
     { test $? = 0 } || {
 	losetup -d "$nstloop"
-	die "Unexpected error in luksChangeKey." }
+	_failure "Unexpected error in luksChangeKey." }
 
     cryptsetup luksClose "${mapper}"
     { test $? = 0 } || {
 	losetup -d "$nstloop"
-	die "Unexpected error in luksClose." }
+	_failure "Unexpected error in luksClose." }
 
 
     drop_key
@@ -1347,7 +1347,7 @@ change_tomb_key() {
     ${=WIPE} "$newkeyfile"
     losetup -d ${nstloop}
 
-    yes "Succesfully changed key for tomb: $2"
+    _success "Succesfully changed key for tomb: $2"
     _message "The new key is: $newkey"
 
     return 0
@@ -1355,18 +1355,18 @@ change_tomb_key() {
 
 # backward compatibility
 create_tomb() {
-    xxx "create_tomb(): ${=@} ${=OLDARGS}"
+    _verbose "create_tomb(): ${=@} ${=OLDARGS}"
     if ! [ $1 ]; then
-	_warning "no tomb name specified for creation"
+	_warning "No tomb name specified for creation."
 	return 1
     fi
 
 
     { test -r "$1" } && {
 	_warning "Creating this tomb would overwrite an existing file. Operation aborted."
-	die "`ls -lh $1`"    }
+	_failure "`ls -lh $1`"    }
 
-    { test $? = 0 } || { die "Failed to dig tomb, operation aborted." }
+    { test $? = 0 } || { _failure "Failed to dig tomb, operation aborted." }
 
 
     tombfile=`basename $1`
@@ -1377,12 +1377,12 @@ create_tomb() {
 
     ${TOMBEXEC} dig ${=PARAM}
     ${TOMBEXEC} forge ${tombdir}/${tombfile}.key
-    { test $? = 0 } || { die "Failed to forge key, operation aborted." }
+    { test $? = 0 } || { _failure "Failed to forge key, operation aborted." }
 
     ${TOMBEXEC} lock ${tombdir}/${tombfile} -k ${tombdir}/${tombfile}.key
-    { test $? = 0 } || { die "Failed to lock tomb with key, operation aborted." }
+    { test $? = 0 } || { _failure "Failed to lock tomb with key, operation aborted." }
 
-    yes "Tomb $tombname succesfully created"
+    _success "Tomb $tombname succesfully created."
     ls -l ${tombfile}*
 }
 
@@ -1396,7 +1396,7 @@ mount_tomb() {
     _check_swap
 
     if ! [ ${1} ]; then
-	_warning "no tomb name specified for creation"
+	_warning "No tomb name specified for creation."
 	return 1
     fi
 
@@ -1413,21 +1413,21 @@ mount_tomb() {
     # check file type (if its a Luks fs)
     file ${tombdir}/${tombfile} | grep -i 'luks encrypted file' 2>&1 >/dev/null
     if [ $? != 0 ]; then
-	_warning "$1 is not a valid tomb file, operation aborted"
+	_warning "$1 is not a valid tomb file, operation aborted."
 	return 1
     fi
     tombname=${tombfile%%\.*}
-    xxx "tomb found: ${tombdir}/${tombfile}"
+    _verbose "Tomb found: ${tombdir}/${tombfile}"
 
     # load_key called here
     tombkey=`load_key ${tombdir}/${tombfile}`
     { test $? = 0 } || {
-	die "Aborting operations: error loading key $tombkey"    }
+	_failure "Aborting operations: error loading key $tombkey"    }
 
 
     if [ "$2" = "" ]; then
 	tombmount=/media/${tombfile}
-	_message "mountpoint not specified, using default: $tombmount"
+	_message "Mountpoint not specified, using default: $tombmount"
     else
 	tombmount=$2
     fi
@@ -1436,7 +1436,7 @@ mount_tomb() {
     mount -l | grep "${tombfile}.*\[$tombname\]$" 2>&1 > /dev/null
     if [ $? = 0 ]; then
 	_warning "$tombname is already open."
-	_message "here below its status is reported:"
+	_message "Here below its status is reported:"
 	list_tombs ${tombname}
 	return 0
     fi
@@ -1446,26 +1446,26 @@ mount_tomb() {
 
     nstloop=`losetup -f`
     if [ $? = 255 ]; then
-	die "too many tomb opened. Please close any of them to open another tomb"
+	_failure "Too many tombs open. Please close any of them to open another tomb."
     fi
-    xxx "next free loop device: $nstloop"
+    _verbose "Next free loop device: $nstloop"
     losetup -f ${tombdir}/${tombfile}
 
     cryptsetup isLuks ${nstloop}
     if [ $? != 0 ]; then
 	# is it a LUKS encrypted nest? see cryptsetup(1)
-	_warning "$tombfile is not a valid Luks encrypted storage file"
+	_warning "$tombfile is not a valid Luks encrypted storage file."
 	losetup -d ${nstloop}
 	return 1
     fi
-    say "this tomb is a valid LUKS encrypted device"
+    _message "This tomb is a valid LUKS encrypted device."
 
     luksdump="`cryptsetup luksDump ${nstloop}`"
     tombdump=(`print $luksdump | awk '
 	/^Cipher name/ {print $3}
 	/^Cipher mode/ {print $3}
 	/^Hash spec/   {print $3}'`)
-    say "cipher is \"$tombdump[1]\" mode \"$tombdump[2]\" hash \"$tombdump[3]\""
+    _message "Cipher is \"$tombdump[1]\" mode \"$tombdump[2]\" hash \"$tombdump[3]\""
 
     slotwarn=`print $luksdump | awk '
 	BEGIN { zero=0 }
@@ -1478,14 +1478,14 @@ mount_tomb() {
     mapdate=`date +%s`
 
     mapper="tomb.${tombname}.${mapdate}.`basename $nstloop`"
-    xxx "dev mapper device: $mapper"
-    xxx "tomb key: $tombkey"
+    _verbose "dev mapper device: $mapper"
+    _verbose "Tomb key: $tombkey"
     keyname=`basename $tombkey | cut -d. -f1`
 
     tombpass=`ask_key_password $tombkey`
     { test $? = 0 } || {
 	losetup -d ${nstloop}
-	die "No valid password supplied" }
+	_failure "No valid password supplied." }
 
     get_lukskey "${tombpass}" ${tombkey} | \
 	cryptsetup --key-file - luksOpen ${nstloop} ${mapper}
@@ -1497,7 +1497,7 @@ mount_tomb() {
 
     if ! [ -r /dev/mapper/${mapper} ]; then
 	losetup -d ${nstloop}
-	die "failure mounting the encrypted file"
+	_failure "Failure mounting the encrypted file."
     fi
 
     # array: [ cipher, keysize, loopdevice ]
@@ -1505,12 +1505,12 @@ mount_tomb() {
     /cipher:/  {print $2}
     /keysize:/ {print $2}
     /device:/  {print $2}'`)
-    yes "Success unlocking tomb $tombname"
-    xxx "key size is $tombstat[2] for cipher $tombstat[1]"
+    _success "Success unlocking tomb $tombname"
+    _verbose "Key size is $tombstat[2] for cipher $tombstat[1]"
 
-    _message "checking filesystem via $tombstat[3]"
+    _message "Checking filesystem via $tombstat[3]"
     fsck -p -C0 /dev/mapper/${mapper}
-    xxx "tomb engraved as $tombname"
+    _verbose "Tomb engraved as $tombname"
     tune2fs -L ${tombname} /dev/mapper/${mapper} > /dev/null
 
     # we need root from here on
@@ -1530,8 +1530,8 @@ mount_tomb() {
 	tombuid="`cat ${tombmount}/.uid`"
 	tomblast="`cat ${tombmount}/.last`"
 	tombuser=`awk -F: '/:'"$tombuid"':/ {print $1}' /etc/passwd`
-	say "last visit by $fg_bold[white]$tombuser($tombuid)$fg_no_bold[white] from $fg_bold[white]$tombtty$fg_no_bold[white] on $fg_bold[white]$tombhost$fg_no_bold[white]"
-	say "on date $fg_bold[white]`date --date @${tomblast} +%c`$fg_no_bold[white]"
+	_message "Last visit by $fg_bold[white]$tombuser($tombuid)$fg_no_bold[white] from $fg_bold[white]$tombtty$fg_no_bold[white] on $fg_bold[white]$tombhost$fg_no_bold[white]"
+	_message "on date $fg_bold[white]`date --date @${tomblast} +%c`$fg_no_bold[white]"
     }
     # write down the UID and TTY that opened the tomb
     rm -f ${tombmount}/.uid
@@ -1566,15 +1566,15 @@ exec_safe_bind_hooks() {
     local ME=${SUDO_USER:-$(whoami)}
     local HOME=$(awk -v a="$ME" -F ':' '{if ($1 == a) print $6}' /etc/passwd 2>/dev/null)
     if [ $? -ne 0 ]; then
-	_warning "how pitiful!  A tomb, and no HOME"
+	_warning "How pitiful!  A tomb, and no HOME."
 	return 1
     fi
     if [ -z "$MOUNTPOINT" -o ! -d "$MOUNTPOINT" ]; then
-	_warning "cannot exec bind hooks without a mounted tomb."
+	_warning "Cannot exec bind hooks without a mounted tomb."
 	return 1
     fi
     if ! [ -r "$MOUNTPOINT/bind-hooks" ]; then
-	xxx "bind-hooks not found in $MOUNTPOINT"
+	_verbose "bind-hooks not found in $MOUNTPOINT"
 	return 1
     fi
     typeset -al mounted
@@ -1613,7 +1613,7 @@ exec_safe_post_hooks() {
     # make encrypted executables.
     cat ${mnt}/post-hooks | head -n1 | grep '^#!/'
     if [ $? = 0 ]; then
-	_success "post hooks found, executing as user $SUDO_USER"
+	_success "Post hooks found, executing as user $SUDO_USER."
 	exec_as_user ${mnt}/post-hooks "$2" "$1"
     fi
 }
@@ -1629,7 +1629,7 @@ list_tombs() {
     # list all open tombs
     mounted_tombs=(`list_tomb_mounts $1`)
     { test ${#mounted_tombs} = 0 } && {
-	die "I can't see any ${1:-open} tomb, may they all rest in peace." }
+	_failure "I can't see any ${1:-open} tomb, may they all rest in peace." }
 
     for t in ${mounted_tombs}; do
 	mapper=`basename ${t[(ws:;:)1]}`
@@ -1759,7 +1759,7 @@ BEGIN { main="" }
 # needs an argument: name of tomb whose hooks belong
 list_tomb_binds() {
     if [ "$1" = "" ]; then
-	_failure "internal error: list_tomb_binds called without argument."; fi
+	_failure "Internal error: list_tomb_binds called without argument."; fi
 
     # list bind hooks on util-linux 2.20 (Debian 7)
     mount -l \
@@ -1791,30 +1791,30 @@ BEGIN { main="" }
 # $1 is optional, to specify a tomb
 index_tombs() {
     { command -v updatedb > /dev/null } || {
-	die "Cannot index tombs on this system: updatedb (mlocate) not installed" }
+	_failure "Cannot index tombs on this system: updatedb (mlocate) not installed." }
 
     updatedbver=`updatedb --version | grep '^updatedb'`
     [[ "$updatedbver" =~ "GNU findutils" ]] && {
-	_warning "Cannot use GNU findutils for index/search commands" }
+	_warning "Cannot use GNU findutils for index/search commands." }
     [[ "$updatedbver" =~ "mlocate" ]] || {
-	die "Index command needs 'mlocate' to be installed." }
+	_failure "Index command needs 'mlocate' to be installed." }
 
-    xxx "$updatedbver"
+    _verbose "$updatedbver"
 
     mounted_tombs=(`list_tomb_mounts $1`)
     { test ${#mounted_tombs} = 0 } && {
-	if [ $1 ]; then die "There seems to be no open tomb engraved as [$1]"
-	else die "I can't see any open tomb, may they all rest in peace."
+	if [ $1 ]; then _failure "There seems to be no open tomb engraved as [$1]"
+	else _failure "I can't see any open tomb, may they all rest in peace."
 	fi
     }
 
 
-    yes "Creating and updating search indexes"
+    _success "Creating and updating search indexes."
 
     # start the LibreOffice document converter if installed
     { command -v unoconv >/dev/null } && {
 	unoconv -l 2>/dev/null &
-	xxx "unoconv listener launched"
+	_verbose "unoconv listener launched."
 	sleep 1 }
 
     for t in ${mounted_tombs}; do
@@ -1822,14 +1822,14 @@ index_tombs() {
 	tombname=${t[(ws:;:)5]}
 	tombmount=${t[(ws:;:)2]}
 	{ test -r ${tombmount}/.noindex } && {
-	    say "skipping $tombname (.noindex found)"
+	    _message "Skipping $tombname (.noindex found)."
 	    continue }
-	say "indexing $tombname filenames..."
+	_message "Indexing $tombname filenames..."
 	updatedb -l 0 -o ${tombmount}/.updatedb -U ${tombmount}
 
 	# here we use swish to index file contents
 	{ test $SWISH = 1 } && {
-	    say "indexing $tombname contents..."
+	    _message "Indexing $tombname contents..."
 	    swishrc=`safe_filename swish`
 
 	    cat <<EOF > $swishrc
@@ -1898,55 +1898,55 @@ IndexContents HTML* .htm .html .shtml
 IndexContents XML*  .xml
 EOF
 
-	    xxx "Using swish-e to create index"
+	    _verbose "Using swish-e to create index."
 	    swish-e -c $swishrc -S fs -v3
 	    rm -f $swishrc
 	}
 
-	say "search index updated"
+	_message "Search index updated."
     done
 }
 search_tombs() {
     { command -v locate > /dev/null } || {
-	die "Cannot index tombs on this system: updatedb (mlocate) not installed" }
+	_failure "Cannot index tombs on this system: updatedb (mlocate) not installed." }
 
     updatedbver=`updatedb --version | grep '^updatedb'`
     [[ "$updatedbver" =~ "GNU findutils" ]] && {
-	_warning "Cannot use GNU findutils for index/search commands" }
+	_warning "Cannot use GNU findutils for index/search commands." }
     [[ "$updatedbver" =~ "mlocate" ]] || {
-	die "Index command needs 'mlocate' to be installed." }
+	_failure "Index command needs 'mlocate' to be installed." }
 
-    xxx "$updatedbver"
+    _verbose "$updatedbver"
 
     # list all open tombs
     mounted_tombs=(`list_tomb_mounts`)
     if [ ${#mounted_tombs} = 0 ]; then
-	die "I can't see any open tomb, may they all rest in peace."; fi
+	_failure "I can't see any open tomb, may they all rest in peace."; fi
 
-    yes "Searching for: $fg_bold[white]${(f)@}$fg_no_bold[white]"
+    _success "Searching for: $fg_bold[white]${(f)@}$fg_no_bold[white]"
     for t in ${mounted_tombs}; do
-	xxx "checking for index: ${t}"
+	_verbose "Checking for index: ${t}"
 	mapper=`basename ${t[(ws:;:)1]}`
 	tombname=${t[(ws:;:)5]}
 	tombmount=${t[(ws:;:)2]}
 	if [ -r ${tombmount}/.updatedb ]; then
 
 	    # use mlocate to search hits on filenames
-	    say "Searching filenames in tomb $tombname"
+	    _message "Searching filenames in tomb $tombname"
 	    locate -d ${tombmount}/.updatedb -e -i "${(f)@}"
-	    say "Matches found: `locate -d ${tombmount}/.updatedb -e -i -c ${(f)@}`"
+	    _message "Matches found: `locate -d ${tombmount}/.updatedb -e -i -c ${(f)@}`"
 
 	    # use swish-e to search over contents
 	    { test $SWISH = 1 } && { test -r $tombmount/.swish } && {
-		say "Searching contents in tomb $tombname"
+		_message "Searching contents in tomb $tombname"
 		swish-search -w ${=@} -f $tombmount/.swish -H0 }
 
 	else
-	    no "skipping tomb $tombname: not indexed"
-	    no "run 'tomb index' to create indexes"
+	    _warning "Skipping tomb $tombname: not indexed."
+	    _warning "Run 'tomb index' to create indexes."
 	fi
     done
-    say "Search completed."
+    _message "Search completed."
 }
 
 # }}} - Index and search
@@ -1955,9 +1955,9 @@ search_tombs() {
 
 # resize tomb file size
 resize_tomb() {
-    _message "Commanded to resize tomb $1 to $opts[-s] megabytes"
+    _message "Commanded to resize tomb $1 to $opts[-s] megabytes."
     if ! [ $1 ]; then
-	_failure "No tomb name specified for resizing"
+	_failure "No tomb name specified for resizing."
     elif ! [ -r "$1" ]; then
 	_failure "Cannot find $1"
     fi
@@ -1965,7 +1965,7 @@ resize_tomb() {
 
     local newtombsize="`option_value -s`"
     { test "$newtombsize" = "" } && {
-	die "Aborting operations: new size was not specified, use -s" }
+	_failure "Aborting operations: new size was not specified, use -s" }
 
     local c tombpass tombkey
 
@@ -1977,29 +1977,29 @@ resize_tomb() {
     local tombkey="`load_key ${tombdir}/${tombfile}`"
     # make sure to call drop_key later
     { test -r "$tombkey" } || {
-	die "Aborting operations: key not found, use -k" }
+	_failure "Aborting operations: key not found, use -k" }
 
     local oldtombsize=$(( `stat -c %s "$1" 2>/dev/null` / 1048576 ))
     local mounted_tomb=`mount -l |
 	awk -vtomb="[$tombname]" '/^\/dev\/mapper\/tomb/ { if($7==tomb) print $1 }'`
 
     if [ "$mounted_tomb" ]; then
-	_failure "the tomb $tombname is open, to resize it it needs to be close."
+	_failure "The tomb $tombname is open, to resize it it needs to be closed."
     fi
 
     if ! [ "$newtombsize" ] ; then
 	_failure "You must specify the new size of $tombname"
     elif [[ $newtombsize != <-> ]]; then
-	_failure "Size is not an integer"
+	_failure "Size is not an integer."
     elif [ "$newtombsize" -le "$oldtombsize" ]; then
-	_failure "the new size must be greater then old tomb size."
+	_failure "The new size must be greater then old tomb size."
     fi
 
     delta="$(( $newtombsize - $oldtombsize ))"
 
     act "Generating ${tombfile} of ${newtombsize}MiB"
 
-    xxx "Data dump using ${DD[1]} from /dev/urandom"
+    _verbose "Data dump using ${DD[1]} from /dev/urandom"
     ${=DD} if=/dev/urandom bs=1048576 count=${delta} >> ${tombdir}/${tombfile}
 
     { test $? = 0 } || {
@@ -2007,11 +2007,11 @@ resize_tomb() {
 
     tombpass=`ask_key_password $tombkey`
     { test $? = 0 } || {
-	die "No valid password supplied" }
+	_failure "No valid password supplied." }
 
     local nstloop=`losetup -f`
     if [ $? = 255 ]; then
-	_failure "too many tomb opened. Please close any of them to open another tomb"
+	_failure "Too many tombs opened. Please close any of them to open another tomb."
     fi
 
     losetup -f ${tombdir}/${tombfile}
@@ -2027,7 +2027,7 @@ resize_tomb() {
 
     if ! [ -r /dev/mapper/${mapper} ]; then
 	losetup -d ${nstloop}
-	_failure "failure mounting the encrypted file"
+	_failure "Failure mounting the encrypted file."
     fi
 
     cryptsetup resize "${mapper}"
@@ -2073,7 +2073,7 @@ umount_tomb() {
     fi
 
     { test ${#mounted_tombs} = 0 } && {
-	    _warning "There is no open tomb to be closed"
+	    _warning "There is no open tomb to be closed."
 	    return 1 }
 
     { test ${#mounted_tombs} -gt 1 } && { test "$1" = "" } && {
@@ -2081,7 +2081,7 @@ umount_tomb() {
 	    _warning "or issue the command 'tomb close all' to close them all."
 	    return 1 }
 
-    say "Tomb close $1"
+    _message "Tomb close $1"
 
     for t in ${mounted_tombs}; do
 	mapper=`basename ${t[(ws:;:)1]}`
@@ -2091,9 +2091,9 @@ umount_tomb() {
 	tombfsopts=${t[(ws:;:)4]}
 	tombloop=${mapper[(ws:.:)4]}
 
-	xxx "name: $tombname"
-	xxx "mount: $tombmount"
-	xxx "mapper: $mapper"
+	_verbose "Name: $tombname"
+	_verbose "Mount: $tombmount"
+	_verbose "Mapper: $mapper"
 
 	{ test -e "$mapper" } && {
 	    _warning "Tomb not found: $1"
@@ -2102,13 +2102,13 @@ umount_tomb() {
 
 	if [ $SLAM ]; then
 	    _success "Slamming tomb $tombname mounted on $tombmount"
-	    _message "Kill all processes busy inside the tomb"
+	    _message "Kill all processes busy inside the tomb."
 	    if ! slam_tomb "$tombmount"; then
 		_warning "Cannot slam the tomb $tombname"
 		return 1
 	    fi
 	else
-	    say "Closing tomb $tombname mounted on $tombmount"
+	    _message "Closing tomb $tombname mounted on $tombmount"
 	fi
 
     # check if there are binded dirs and close them
@@ -2116,11 +2116,11 @@ umount_tomb() {
 	for b in ${bind_tombs}; do
 	    bind_mapper="${b[(ws:;:)1]}"
 	    bind_mount="${b[(ws:;:)2]}"
-	    _message "closing tomb bind hook: $bind_mount"
+	    _message "Closing tomb bind hook: $bind_mount"
 	    umount $bind_mount
 	    if [[ $? != 0 ]]; then
 		if [ $SLAM ]; then
-		    _success "Slamming tomb: killing all processes using this hook"
+		    _success "Slamming tomb: killing all processes using this hook."
 		    slam_tomb "$bind_mount"
 		    if [[ $? == 1 ]]; then
 			_warning "Cannot slam the bind hook $bind_mount"
@@ -2138,7 +2138,7 @@ umount_tomb() {
 	    exec_safe_post_hooks ${tombmount%%/} close
 	fi
 
-	xxx "performing umount of $tombmount"
+	_verbose "Performing umount of $tombmount"
 	umount ${tombmount}
 	if ! [ $? = 0 ]; then _warning "Tomb is busy, cannot umount!"
 	else
@@ -2149,7 +2149,7 @@ umount_tomb() {
 
 	cryptsetup luksClose $mapper
 	{ test $? = 0 } || {
-	    _warning "error occurred in cryptsetup luksClose ${mapper}"
+	    _warning "Error occurred in cryptsetup luksClose ${mapper}"
 	    return 1 }
 
 	losetup -d "/dev/$tombloop"
@@ -2169,11 +2169,11 @@ slam_tomb() {
     fi
     #Note: shells are NOT killed by INT or TERM, but they are killed by HUP
     for s in TERM HUP KILL; do
-	xxx "Sending $s to processes inside the tomb:"
+	_verbose "Sending $s to processes inside the tomb:"
 	if option_is_set -D; then
 	    ps -fp `fuser -m /media/a.tomb 2> /dev/null`|
 	    while read line; do
-		xxx $line
+		_verbose $line
 	    done
 	fi
 	fuser -s -m "$1" -k -M -$s
@@ -2266,7 +2266,7 @@ main() {
 	fi
 	unset discardme
     if ! zparseopts -M -E -D -Adiscardme ${every_opts}; then
-		die "error parsing"
+		_failure "Error parsing."
 		return 127
 	fi
     unset discardme
@@ -2277,8 +2277,8 @@ main() {
 
     if [[ -z ${(k)subcommands_opts[$subcommand]} ]]; then
 	_warning "There's no such command \"$subcommand\"."
-	_failure "Please try -h for help" 127
-#        die "Subcommand '$subcommand' doesn't exist" 127
+	_failure "Please try -h for help." 127
+#        _failure "Subcommand '$subcommand' doesn't exist" 127
     fi
     argv=(${oldstar})
     unset oldstar
@@ -2291,7 +2291,7 @@ main() {
 	zparseopts -M -E -D -Aopts ${cmd_opts}
 	if [[ $? != 0 ]]; then
 	    _warning "Some error occurred during option processing."
-	    die "See \"tomb help\" for more info" 127
+	    _failure "See \"tomb help\" for more info." 127
 	fi
     fi
     #build PARAM (array of arguments) and check if there are unrecognized options
@@ -2303,7 +2303,7 @@ main() {
 	    continue #it shouldnt be appended to PARAM
 	elif [[ $arg[1] == '-'  ]]; then
 	    if [[ $ok == 0 ]]; then
-		die "unrecognized option $arg for subcommand $subcommand" 127
+		_failure "Unrecognized option $arg for subcommand $subcommand" 127
 	    fi
 	fi
 	PARAM+=$arg
@@ -2320,7 +2320,7 @@ main() {
     if ! option_is_set --unsecure-dev-mode; then
 	for opt in --sudo-pwd --tomb-pwd --use-urandom --tomb-old-pwd; do
 	    if option_is_set $opt; then
-		die "You specified option $opt, which is DANGEROUS and should only be used for testing\nIf you really want so, add --unsecure-dev-mode" 127
+		_failure "You specified option $opt, which is DANGEROUS and should only be used for testing\nIf you really want so, add --unsecure-dev-mode" 127
 	    fi
 	done
     fi
@@ -2331,8 +2331,8 @@ main() {
     if option_is_set -G; then _gid="`option_value -G`"; fi
     if option_is_set -T; then _tty="`option_value -T`"; fi
 
-    xxx "Tomb command: $subcommand ${PARAM}"
-    xxx "caller uid[$_uid] gid[$_gid] tty[$_tty]"
+    _verbose "Tomb command: $subcommand ${PARAM}"
+    _verbose "Caller: uid[$_uid], gid[$_gid], tty[$_tty]."
 
     case "$subcommand" in
 
@@ -2356,7 +2356,7 @@ main() {
 
 	engrave)
 	    { test "$QRENCODE" = 0 } && {
-		die "QREncode not installed: cannot engrave keys on paper." }
+		_failure "QREncode not installed: cannot engrave keys on paper." }
 	    engrave_key ${=PARAM}
 	    ;;
 
@@ -2394,17 +2394,17 @@ main() {
 	    ;;
 	bury)
 	    { test "$STEGHIDE" = 0 } && {
-		die "Steghide not installed: cannot bury keys into images." }
+		_failure "Steghide not installed: cannot bury keys into images." }
 	    bury_key $PARAM[1]
 	    ;;
 	exhume)
 	    { test "$STEGHIDE" = 0 } && {
-		die "Steghide not installed: cannot exhume keys from images." }
+		_failure "Steghide not installed: cannot exhume keys from images." }
 	    exhume_key $PARAM[1]
 	    ;;
 	resize)
 	    { test "$RESIZER" = 0 } && {
-		die "Resize2fs not installed: cannot resize tombs." }
+		_failure "Resize2fs not installed: cannot resize tombs." }
 	    check_priv
 	    resize_tomb $PARAM[1]
 	    ;;
@@ -2444,8 +2444,8 @@ EOF
 	    usage
 	    ;;
 	*)
-	    _warning "command \"$subcommand\" not recognized"
-	    _message "try -h for help"
+	    _warning "Command \"$subcommand\" not recognized."
+	    _message "Try -h for help."
 	    return 1
 	    ;;
     esac