getprop("ro.product.device") == "tiare" || abort("E3004: This package is for \"tiare\" devices; this is a \"" + getprop("ro.product.device") + "\".");
ui_print("Source: Xiaomi/tiare_in/tiare:8.1.0/OPM1.171019.026/V10.2.15.0.OCLINXM:user/release-keys");
ui_print("Target: Xiaomi/tiare_in/tiare:8.1.0/OPM1.171019.026/V10.2.16.0.OCLINXM:user/release-keys");
ui_print("Verifying current system...");
getprop("ro.build.fingerprint") == "Xiaomi/tiare_in/tiare:8.1.0/OPM1.171019.026/V10.2.15.0.OCLINXM:user/release-keys" ||
    getprop("ro.build.fingerprint") == "Xiaomi/tiare_in/tiare:8.1.0/OPM1.171019.026/V10.2.16.0.OCLINXM:user/release-keys" ||
    abort("E3001: Package expects build fingerprint of Xiaomi/tiare_in/tiare:8.1.0/OPM1.171019.026/V10.2.15.0.OCLINXM:user/release-keys or Xiaomi/tiare_in/tiare:8.1.0/OPM1.171019.026/V10.2.16.0.OCLINXM:user/release-keys; this device has " + getprop("ro.build.fingerprint") + ".");
apply_patch_space(78290944) || abort("E3006: Not enough free space on /cache to apply patches.");
if (range_sha1("/dev/block/bootdevice/by-name/system", "38,1,177,187,337,5412,32770,32933,77847,82647,98306,98469,131073,139264,145231,154831,163842,164005,186627,187780,220545,221436,221502,221844,229378,229541,265485,268333,286712,291512,294914,295077,301272,301863,309153,334150,336784,336791,339456") == "a9a626fd1d7ef8fa06798fa78b648e027119f7d9" || block_image_verify("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat")) then
ui_print("Verified system image...");
else
check_first_block("/dev/block/bootdevice/by-name/system");
ifelse (block_image_recover("/dev/block/bootdevice/by-name/system", "38,1,177,187,337,5412,32770,32933,77847,82647,98306,98469,131073,139264,145231,154831,163842,164005,186627,187780,220545,221436,221502,221844,229378,229541,265485,268333,286712,291512,294914,295077,301272,301863,309153,334150,336784,336791,339456") && block_image_verify("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat"), ui_print("system recovered successfully."), abort("E1004: system partition fails to recover"));
endif;
if (range_sha1("/dev/block/bootdevice/by-name/vendor", "14,1,45,47,109,2552,32770,32809,32810,36905,74796,80127,80760,80767,81408") == "2a287680ae008bdb1d61843ac49e5e1f08d98df6" || block_image_verify("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat")) then
ui_print("Verified vendor image...");
else
check_first_block("/dev/block/bootdevice/by-name/vendor");
ifelse (block_image_recover("/dev/block/bootdevice/by-name/vendor", "14,1,45,47,109,2552,32770,32809,32810,36905,74796,80127,80760,80767,81408") && block_image_verify("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat"), ui_print("vendor recovered successfully."), abort("E2004: vendor partition fails to recover"));
endif;

# ---- start making changes here ----

write_value("0", "/sys/class/power_supply/battery/batfet_reset_enable");
write_value("0", "/sys/devices/soc/qpnp-power-on-5/kpdpwr_reset");
ui_print("Patching system image after verification.");
show_progress(0.800000, 0);
block_image_update("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat") ||
  abort("E1001: Failed to update system image.");
ui_print("Patching vendor image after verification.");
show_progress(0.100000, 0);
block_image_update("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat") ||
  abort("E2001: Failed to update vendor image.");
ui_print("Installing boot image...");
package_extract_file("boot.img", "/dev/block/bootdevice/by-name/boot");

# ---- radio update tasks ----

ui_print("Patching firmware images...");
ifelse(msm.boot_update("main"), (
package_extract_file("firmware-update/rpm.mbn", "/dev/block/bootdevice/by-name/rpm");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tz");
package_extract_file("firmware-update/emmc_appsboot.mbn", "/dev/block/bootdevice/by-name/aboot");
package_extract_file("firmware-update/lksecapp.mbn", "/dev/block/bootdevice/by-name/lksecapp");
package_extract_file("firmware-update/keymaster64.mbn", "/dev/block/bootdevice/by-name/keymaster");
package_extract_file("firmware-update/sbl1.mbn", "/dev/block/bootdevice/by-name/sbl1");
package_extract_file("firmware-update/cmnlib64_30.mbn", "/dev/block/bootdevice/by-name/cmnlib64");
package_extract_file("firmware-update/cmnlib_30.mbn", "/dev/block/bootdevice/by-name/cmnlib");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfg");
), "");
ifelse(msm.boot_update("backup"), (
package_extract_file("firmware-update/rpm.mbn", "/dev/block/bootdevice/by-name/rpmbak");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tzbak");
package_extract_file("firmware-update/emmc_appsboot.mbn", "/dev/block/bootdevice/by-name/abootbak");
package_extract_file("firmware-update/lksecapp.mbn", "/dev/block/bootdevice/by-name/lksecappbak");
package_extract_file("firmware-update/keymaster64.mbn", "/dev/block/bootdevice/by-name/keymasterbak");
package_extract_file("firmware-update/sbl1.mbn", "/dev/block/bootdevice/by-name/sbl1bak");
package_extract_file("firmware-update/cmnlib64_30.mbn", "/dev/block/bootdevice/by-name/cmnlib64bak");
package_extract_file("firmware-update/cmnlib_30.mbn", "/dev/block/bootdevice/by-name/cmnlibbak");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfgbak");
), "");
msm.boot_update("finalize");
package_extract_file("firmware-update/NON-HLOS.bin", "/dev/block/bootdevice/by-name/modem");
set_progress(1.000000);
write_value("1", "/sys/class/power_supply/battery/batfet_reset_enable");
write_value("1", "/sys/devices/soc/qpnp-power-on-5/kpdpwr_reset");
