getprop("ro.product.device") == "olivelite" || abort("E3004: This package is for \"olivelite\" devices; this is a \"" + getprop("ro.product.device") + "\".");
ui_print("Source: Xiaomi/olivelite/olivelite:9/PKQ1.190319.001/V10.3.0.5.PCPCNXM:user/release-keys");
ui_print("Target: Xiaomi/olivelite/olivelite:9/PKQ1.190319.001/V10.3.3.0.PCPCNXM:user/release-keys");
ui_print("Verifying current system...");
getprop("ro.build.fingerprint") == "Xiaomi/olivelite/olivelite:9/PKQ1.190319.001/V10.3.0.5.PCPCNXM:user/release-keys" ||
    getprop("ro.build.fingerprint") == "Xiaomi/olivelite/olivelite:9/PKQ1.190319.001/V10.3.3.0.PCPCNXM:user/release-keys" ||
    abort("E3001: Package expects build fingerprint of Xiaomi/olivelite/olivelite:9/PKQ1.190319.001/V10.3.0.5.PCPCNXM:user/release-keys or Xiaomi/olivelite/olivelite:9/PKQ1.190319.001/V10.3.3.0.PCPCNXM:user/release-keys; this device has " + getprop("ro.build.fingerprint") + ".");
show_progress(0.100000, 5);
apply_patch_check("EMMC:/dev/block/bootdevice/by-name/boot:33554432:470f9dc340677cbc160085b131f35752e656b28f:33554432:9e0702ce023d816b4b92d23d7538d93c5334c0e1") || abort("E3005: \"EMMC:/dev/block/bootdevice/by-name/boot:33554432:470f9dc340677cbc160085b131f35752e656b28f:33554432:9e0702ce023d816b4b92d23d7538d93c5334c0e1\" has unexpected contents.");
apply_patch_space(53710848) || abort("E3006: Not enough free space on /cache to apply patches.");
show_progress(0.100000, 70);
if (range_sha1("/dev/block/bootdevice/by-name/system", "40,1,270,285,556,8349,8356,8358,8360,8361,8363,8364,8365,8601,8941,9538,9549,9558,32770,33021,98306,98557,163842,164093,229378,229629,294914,295165,524291,524303,524304,532384,600846,819200,819202,884736,884738,1032011,1048363,1048575,1048576") == "93e81a34101a0c6ac40cd145eaa044a9591c389e" || block_image_verify("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat")) then
ui_print("Verified system image...");
else
check_first_block("/dev/block/bootdevice/by-name/system");
ifelse (block_image_recover("/dev/block/bootdevice/by-name/system", "40,1,270,285,556,8349,8356,8358,8360,8361,8363,8364,8365,8601,8941,9538,9549,9558,32770,33021,98306,98557,163842,164093,229378,229629,294914,295165,524291,524303,524304,532384,600846,819200,819202,884736,884738,1032011,1048363,1048575,1048576") && block_image_verify("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat"), ui_print("system recovered successfully."), abort("E1004: system partition fails to recover"));
endif;
if (range_sha1("/dev/block/bootdevice/by-name/vendor", "34,1,69,71,73,80,343,4112,4119,4333,4334,4928,4929,5284,5285,5297,5305,7172,7173,7516,7517,7750,32770,32832,98306,98368,140605,163840,163842,229376,229378,257987,262077,262143,262144") == "c217bcd4f2bdc89c386b98e084202f9aef8b5932" || block_image_verify("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat")) then
ui_print("Verified vendor image...");
else
check_first_block("/dev/block/bootdevice/by-name/vendor");
ifelse (block_image_recover("/dev/block/bootdevice/by-name/vendor", "34,1,69,71,73,80,343,4112,4119,4333,4334,4928,4929,5284,5285,5297,5305,7172,7173,7516,7517,7750,32770,32832,98306,98368,140605,163840,163842,229376,229378,257987,262077,262143,262144") && block_image_verify("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat"), ui_print("vendor recovered successfully."), abort("E2004: vendor partition fails to recover"));
endif;

# ---- start making changes here ----

ui_print("Patching boot image...");
show_progress(0.100000, 10);
apply_patch("EMMC:/dev/block/bootdevice/by-name/boot:33554432:470f9dc340677cbc160085b131f35752e656b28f:33554432:9e0702ce023d816b4b92d23d7538d93c5334c0e1",
            "-", 9e0702ce023d816b4b92d23d7538d93c5334c0e1, 33554432,
            470f9dc340677cbc160085b131f35752e656b28f, package_extract_file("patch/boot.img.p")) || abort("Failed to apply patch \"patch/boot.img.p \".");

# ---- radio update tasks ----

ui_print("Patching firmware images...");
package_extract_file("firmware-update/splash.img", "/dev/block/bootdevice/by-name/splash");
package_extract_file("firmware-update/NON-HLOS.bin", "/dev/block/bootdevice/by-name/modem");
package_extract_file("firmware-update/rpm.mbn", "/dev/block/bootdevice/by-name/rpm");
package_extract_file("firmware-update/km4.mbn", "/dev/block/bootdevice/by-name/keymaster");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tz");
package_extract_file("firmware-update/mdtp.img", "/dev/block/bootdevice/by-name/mdtp");
package_extract_file("firmware-update/emmc_appsboot.mbn", "/dev/block/bootdevice/by-name/aboot");
package_extract_file("firmware-update/sbl1.mbn", "/dev/block/bootdevice/by-name/sbl1");
package_extract_file("firmware-update/cmnlib64_30.mbn", "/dev/block/bootdevice/by-name/cmnlib64");
package_extract_file("firmware-update/adspso.bin", "/dev/block/bootdevice/by-name/dsp");
package_extract_file("firmware-update/cmnlib_30.mbn", "/dev/block/bootdevice/by-name/cmnlib");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfg");
package_extract_file("firmware-update/rpm.mbn", "/dev/block/bootdevice/by-name/rpmbak");
package_extract_file("firmware-update/km4.mbn", "/dev/block/bootdevice/by-name/keymasterbak");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tzbak");
package_extract_file("firmware-update/emmc_appsboot.mbn", "/dev/block/bootdevice/by-name/abootbak");
package_extract_file("firmware-update/sbl1.mbn", "/dev/block/bootdevice/by-name/sbl1bak");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfgbak");
show_progress(0.600000, 400);
ui_print("Patching system image after verification.");
block_image_update("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat") ||
  abort("E1001: Failed to update system image.");
ui_print("Patching vendor image after verification.");
block_image_update("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat") ||
  abort("E2001: Failed to update vendor image.");

# ---- radio update tasks 2 ----

ui_print("Patching vbmeta dtbo logo binimages...");
package_extract_file("firmware-update/vbmeta.img", "/dev/block/bootdevice/by-name/vbmeta");
package_extract_file("firmware-update/dtbo.img", "/dev/block/bootdevice/by-name/dtbo");
show_progress(0.100000, 2);
