4
4
* Injector based on reswitched/fusee-launcher.
5
5
"""
6
6
7
+ import os
7
8
import threading
8
9
import tkinter
9
10
import platform
@@ -62,7 +63,7 @@ def runInjector(self):
62
63
intermezzoPath = self .parent .intermezzoPath
63
64
payloadPath = self .parent .payloadPath
64
65
65
- if not intermezzoPath or not payloadPath :
66
+ if not os . path . isfile ( intermezzoPath ) or not os . path . isfile ( payloadPath ) :
66
67
print ("Error: You must set both an Intermezzo path and a Payload path!" )
67
68
self .processError ('VarsNotSet' )
68
69
return
@@ -85,8 +86,10 @@ def runInjector(self):
85
86
# Retrieve and print the device's ID.
86
87
# NOTE: We have to read the first 16 anyways before we can proceed.
87
88
deviceID = self .readDeviceID ()
88
- print ("Nintendo Switch with device ID: (%s) located!" % hex (deviceID ))
89
- self .parent .gui .setDeviceID (hex (deviceID ))
89
+ deviceIDHex = int .from_bytes (bytes (deviceID ), byteorder = 'little' )
90
+
91
+ print ("Nintendo Switch with device ID: (%#x) located!" % deviceIDHex )
92
+ self .parent .gui .setDeviceID (deviceIDHex )
90
93
91
94
# Use the maximum length accepted by RCM, so we can transmit as much payload as
92
95
# we want; we'll take over before we get to the end.
@@ -164,14 +167,12 @@ def runInjector(self):
164
167
print ("Lost connection to the Switch... (THIS IS NOT AN ERROR! Unless you've unplugged it)." )
165
168
print ("SUCCESS! The exploit has been triggered and you can now safely unplug your Switch!" )
166
169
self .processInfo ('SuccessfulExploit' )
167
- return
168
170
169
171
# Any other exception is unknown.
170
172
except Exception as e :
171
173
print (e )
172
174
print ("Error: An unknown error occured while triggering the exploit..." )
173
175
self .processError ('UnknownError' )
174
- return
175
176
176
177
def read (self , length ):
177
178
"""
0 commit comments