mondul / HiyaCFW-Helper

Tool for making the HiyaCFW (and TWiLightMenu++) installation process simpler
The Unlicense
119 stars 18 forks source link

Korean region not supported #55

Closed kimjaejundfadsf closed 4 years ago

kimjaejundfadsf commented 5 years ago

How can I use hiyacfw? hiyacfw run...... error : not supported region

You can also provide nand.bin.(1.4.6k) ....ㅠㅠㅋ help me..........

mondul commented 5 years ago

Please upload your nand dump to your google drive and share the link in order to update the helper and make it compatible with korean DSis

kimjaejundfadsf commented 5 years ago

my nds nand.... korea version

very very thank you

mondul commented 5 years ago

Thanks. Now I'm trying to find the v512 launcher (the one from system version 1.4.1K) in order to add full support.

SAENGGAK commented 5 years ago

I'm sorry but the latest version of Korean DSi is 1.4.6K, not 1.4.1.

mondul commented 5 years ago

@SAENGGAK HiyaCFW uses a modified version of the v512 launcher from the 1.4.0U/J/E/A (1.4.1K) system version, that's why the one present in the NAND dump is not used, instead it has to be downloaded from the big N servers and patched afterwards. The problem that I had is that it is not available for download, ergo the Helper at this time does not support Korea or China DSis. Someone from GBATemp provided me with a copy of the launcher and I'm in the process of testing if it can be used for Hiya.

Chiharuuu commented 5 years ago

I have a 1.4.1K NAND dump from my DSi if it can help, I'm eager to get HiyaCFW running on this console too.

mondul commented 5 years ago

@Chiharuuu That will help a lot, thanks. Someone provided me with a pre-patched launcher but does not work for running HiyaCFW from the SD card, that's why I have not released it.

Chiharuuu commented 5 years ago

@mondul here is the NAND from my DSi, firmware 1.4.1K. If it's corrupted somehow I can always dump it again.

kimjaejundfadsf commented 5 years ago

1.4.6k not supported???? ㅜㅜ

Darxmax commented 5 years ago

Some problems with 1.4.1k Checking NAND file...

Downloading latest HiyaCFW release...

Extracting ARM7/ARM9 BIOS from NAND...

Patching ARM7/ARM9 BIOS...

Prepending data to ARM9 BIOS...

Generating new bootloader...

Decrypting NAND...

Extracting files from NAND...

Downloading KOR launcher... ERROR: Could not download KOR launcher

Cleaning... Done

mondul commented 5 years ago

Still working on it, at this moment the patched launcher can't boot HiyaCFW from the SD card

mondul commented 5 years ago

@kimjaejundfadsf @Chiharuuu @Darxmax Made another test and it doesn't boot in no$gba, I just get a white screen. I would like some feedback on what happens on a real console. Can anyone of you download the latest release of the helper, put this file at the same folder where you extracted it, run the helper and let me know what happens on your console? Thanks!

Darxmax commented 5 years ago

Yep, that working.

Chiharuuu commented 5 years ago

Patching with the KOR launcher now works, but I can't get TwilightMenu++ to show on the system menu, or autoboot either. Tried both installing it from the Helper, and manually installing it too...

Darxmax commented 5 years ago

Patching with the KOR launcher now works, but I can't get TwilightMenu++ to show on the system menu, or autoboot either. Tried both installing it from the Helper, and manually installing it too. Yes, some problems, but i resolved by unlaunch in option - > no button-> and choose TwilightMenu++ -> save and exit.

Sohelvai15 commented 5 years ago

KOR launcher now works Perfectly.Thank You for Your Hard Work.

thenist commented 4 years ago

does anyone has this file?

mondul commented 4 years ago

@thenist Pushed to a new branch in 01a6902d98aa139055ef9af9a81870a34f80d5b7

BigFarm commented 4 years ago

It doesn't work for my dsi (1.4.6k)

Checking NAND file...

Downloading latest HiyaCFW release...

Extracting ARM7/ARM9 BIOS from NAND...

Patching ARM7/ARM9 BIOS...

Prepending data to ARM9 BIOS...

Generating new bootloader...

Decrypting NAND...

Extracting files from NAND...

Downloading KOR launcher... ERROR: Could not download KOR launcher

Cleaning... Done

kimjaejundfadsf commented 4 years ago

my ofw version 1.4.6k

kor luncher Works very very gooooooooooooooooooooooooooooooooood

  1. Uploaded kor file to naver.com ;;;;;;
  2. Python source modification with rlopen('naver....myfile url/' + self.launcher_region) as src, open(self.launcher_region, 'wb') as dst:
  3. pyinstall HiyaCFW_Helper.py
  4. Insert an existing version of Windows folder.
  5. cfw proceeded.

=========Progress was successful===========

I was busy and now I have to check. I'm very sorry. Thank you so much for your hard work.

kimjaejundfadsf commented 4 years ago

console log

Opening HiyaCFW Helper... Initializing GUI... Searching for 7-Zip in the Windows registry... Searching for 7-Zip in the 32-bit Windows registry... 7-Zip not found. Will use fatcat for extraction. TWLTool v1.6.1 by WulfyStylez Special thanks to CaitSith2

CTR: 000000: 00 66 02 00 00 9a fd ff ff 99 fd ff 00 00 00 00 .f.............. Normalkey: 000000: 98 ee 80 80 00 6c b4 f6 3a c2 6e 62 f9 ec 34 ad .....l..:.nb..4. CTR: 000000: 00 76 02 00 00 8a fd ff ff 89 fd ff 00 00 00 00 .v.............. Normalkey: 000000: 98 ee 80 80 00 6c b4 f6 3a c2 6e 62 f9 ec 34 ad .....l..:.nb..4. Nintendo DS rom tool 1.24 - Nov 2 2005 00:24:53 by Rafael Vuijk (aka DarkFader) TWLTool v1.6.1 by WulfyStylez Special thanks to CaitSith2

reading consoleid/CID from nocashinfo block Processing twln... 0.00 % complete. 12.14 % complete. 24.28 % complete. 36.42 % complete. 48.56 % complete. 60.70 % complete. 72.84 % complete. 84.98 % complete. 97.11 % complete. 100.00% complete. Processing twlp... 0.00 % complete. 76.42 % complete. 100.00% complete. Crypt complete!

Extracting /sys/log/product.log to C:/test/output/sys/log/product.log Extracting /sys/log/sysmenu.log to C:/test/output/sys/log/sysmenu.log Extracting /sys/log/shop.log to C:/test/output/sys/log/shop.log Extracting /sys/HWINFO_S.dat to C:/test/output/sys/HWINFO_S.dat Extracting /sys/HWINFO_N.dat to C:/test/output/sys/HWINFO_N.dat Extracting /sys/cert.sys to C:/test/output/sys/cert.sys Extracting /sys/HWID.sgn to C:/test/output/sys/HWID.sgn Extracting /sys/TWLFontTable.dat to C:/test/output/sys/TWLFontTable.dat Extracting /sys/dev.kp to C:/test/output/sys/dev.kp Extracting /title/00030017/484e414b/data/private.sav to C:/test/output/title/00030017/484e414b/data/private.sav Extracting /title/00030017/484e414b/content/title.tmd to C:/test/output/title/00030017/484e414b/content/title.tmd Extracting /title/00030017/484e414b/content/00000005.app to C:/test/output/title/00030017/484e414b/content/00000005.app Extracting /title/00030015/484e4f4b/data/ec.cfg to C:/test/output/title/00030015/484e4f4b/data/ec.cfg Extracting /title/00030015/484e4f4b/content/00000000.app to C:/test/output/title/00030015/484e4f4b/content/00000000.app Extracting /title/00030015/484e4f4b/content/title.tmd to C:/test/output/title/00030015/484e4f4b/content/title.tmd Extracting /title/00030015/484e424b/content/title.tmd to C:/test/output/title/00030015/484e424b/content/title.tmd Extracting /title/00030015/484e424b/content/00000001.app to C:/test/output/title/00030015/484e424b/content/00000001.app Extracting /title/00030015/484e464b/data/private.sav to C:/test/output/title/00030015/484e464b/data/private.sav Extracting /title/00030015/484e464b/data/ec.cfg to C:/test/output/title/00030015/484e464b/data/ec.cfg Extracting /title/00030015/484e464b/content/title.tmd to C:/test/output/title/00030015/484e464b/content/title.tmd Extracting /title/00030015/484e464b/content/00000006.app to C:/test/output/title/00030015/484e464b/content/00000006.app Extracting /title/0003000f/484e4341/content/00000002.app to C:/test/output/title/0003000f/484e4341/content/00000002.app Extracting /title/0003000f/484e4341/content/title.tmd to C:/test/output/title/0003000f/484e4341/content/title.tmd Extracting /title/0003000f/484e4841/content/title.tmd to C:/test/output/title/0003000f/484e4841/content/title.tmd Extracting /title/0003000f/484e4841/content/00000006.app to C:/test/output/title/0003000f/484e4841/content/00000006.app Extracting /title/0003000f/484e4c4b/content/title.tmd to C:/test/output/title/0003000f/484e4c4b/content/title.tmd Extracting /title/0003000f/484e4c4b/content/00000006.app to C:/test/output/title/0003000f/484e4c4b/content/00000006.app Extracting /title/00030005/484e444b/content/00000000.app to C:/test/output/title/00030005/484e444b/content/00000000.app Extracting /title/00030005/484e444b/content/title.tmd to C:/test/output/title/00030005/484e444b/content/title.tmd Extracting /title/00030005/484e454b/content/00000000.app to C:/test/output/title/00030005/484e454b/content/00000000.app Extracting /title/00030005/484e454b/content/title.tmd to C:/test/output/title/00030005/484e454b/content/title.tmd Extracting /title/00030005/484e494b/data/private.sav to C:/test/output/title/00030005/484e494b/data/private.sav Extracting /title/00030005/484e494b/content/00000000.app to C:/test/output/title/00030005/484e494b/content/00000000.app Extracting /title/00030005/484e494b/content/title.tmd to C:/test/output/title/00030005/484e494b/content/title.tmd Extracting /title/00030005/484e4b4b/data/private.sav to C:/test/output/title/00030005/484e4b4b/data/private.sav Extracting /title/00030005/484e4b4b/content/00000000.app to C:/test/output/title/00030005/484e4b4b/content/00000000.app Extracting /title/00030005/484e4b4b/content/title.tmd to C:/test/output/title/00030005/484e4b4b/content/title.tmd Extracting /ticket/00030017/484e414b.tik to C:/test/output/ticket/00030017/484e414b.tik Extracting /ticket/00030015/484e4f4b.tik to C:/test/output/ticket/00030015/484e4f4b.tik Extracting /ticket/00030015/484e424b.tik to C:/test/output/ticket/00030015/484e424b.tik Extracting /ticket/00030015/484e464b.tik to C:/test/output/ticket/00030015/484e464b.tik Extracting /ticket/0003000f/484e4341.tik to C:/test/output/ticket/0003000f/484e4341.tik Extracting /ticket/0003000f/484e4841.tik to C:/test/output/ticket/0003000f/484e4841.tik Extracting /ticket/0003000f/484e4c4b.tik to C:/test/output/ticket/0003000f/484e4c4b.tik Extracting /ticket/00030005/484e444b.tik to C:/test/output/ticket/00030005/484e444b.tik Extracting /ticket/00030005/484e454b.tik to C:/test/output/ticket/00030005/484e454b.tik Extracting /ticket/00030005/484e494b.tik to C:/test/output/ticket/00030005/484e494b.tik Extracting /ticket/00030005/484e4b4b.tik to C:/test/output/ticket/00030005/484e4b4b.tik Extracting /shared1/TWLCFG0.dat to C:/test/output/shared1/TWLCFG0.dat Extracting /shared1/TWLCFG1.dat to C:/test/output/shared1/TWLCFG1.dat Extracting /shared2/launcher/wrap.bin to C:/test/output/shared2/launcher/wrap.bin Extracting /shared2/0000 to C:/test/output/shared2/0000

gui log

Checking NAND file...

Downloading latest HiyaCFW release...

Extracting ARM7/ARM9 BIOS from NAND...

Patching ARM7/ARM9 BIOS...

Prepending data to ARM9 BIOS...

Generating new bootloader...

Decrypting NAND...

Extracting files from NAND...

Downloading KOR launcher...

Copying HiyaCFW files...

Downloading latest TWiLight Menu++ release...

Copying TWiLightMenu files...

Cleaning... Done! Eject your SD card and insert it into your DSi