getprop("ro.product.device") == "toco" || abort("E3004: This package is for \"toco\" devices; this is a \"" + getprop("ro.product.device") + "\".");
ui_print("Source: Xiaomi/toco_eea/toco:10/QKQ1.190825.002/V11.0.10.0.QFNEUXM:user/release-keys");
ui_print("Target: Xiaomi/toco_eea/toco:10/QKQ1.190825.002/V11.0.11.0.QFNEUXM:user/release-keys");
ui_print("Verifying current system...");
getprop("ro.build.fingerprint") == "Xiaomi/toco_eea/toco:10/QKQ1.190825.002/V11.0.10.0.QFNEUXM:user/release-keys" ||
    getprop("ro.build.fingerprint") == "Xiaomi/toco_eea/toco:10/QKQ1.190825.002/V11.0.11.0.QFNEUXM:user/release-keys" ||
    abort("E3001: Package expects build fingerprint of Xiaomi/toco_eea/toco:10/QKQ1.190825.002/V11.0.10.0.QFNEUXM:user/release-keys or Xiaomi/toco_eea/toco:10/QKQ1.190825.002/V11.0.11.0.QFNEUXM:user/release-keys; this device has " + getprop("ro.build.fingerprint") + ".");
show_progress(0.100000, 10);
patch_partition_check("EMMC:/dev/block/bootdevice/by-name/boot:134217728:4a24732ef8783746487f3c26e2ec40de92c4760c",
                      "EMMC:/dev/block/bootdevice/by-name/boot:134217728:e63c042870a2db2a4255de094c3723076896a41d") ||
    abort("E3005: \"EMMC:/dev/block/bootdevice/by-name/boot:134217728:4a24732ef8783746487f3c26e2ec40de92c4760c\" or \"EMMC:/dev/block/bootdevice/by-name/boot:134217728:e63c042870a2db2a4255de094c3723076896a41d\" has unexpected contents.");
apply_patch_space(134217728) || abort("E3006: Not enough free space on /cache to apply patches.");
show_progress(0.100000, 70);
if (range_sha1(map_partition("system"), "44,1,191,224,233,235,236,482,486,498,499,518,519,1836,1837,2260,26128,26134,26135,27502,27503,32730,32731,32768,32770,32924,32945,33122,98306,98460,163842,163996,229378,229532,294914,295068,393036,393063,622599,622613,629327,631279,641282,641421,641422") == "a17f40cc503266bd12576b878f170392cffe051f" || block_image_verify(map_partition("system"), package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat")) then
ui_print("Verified system image...");
else
check_first_block(map_partition("system"));
ifelse (block_image_recover(map_partition("system"), "44,1,191,224,233,235,236,482,486,498,499,518,519,1836,1837,2260,26128,26134,26135,27502,27503,32730,32731,32768,32770,32924,32945,33122,98306,98460,163842,163996,229378,229532,294914,295068,393036,393063,622599,622613,629327,631279,641282,641421,641422") && block_image_verify(map_partition("system"), package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat"), ui_print("system recovered successfully."), abort("E1004: system partition fails to recover"));
endif;
if (range_sha1(map_partition("vendor"), "158,1,98,108,112,117,118,199,203,208,209,1915,1919,2397,2398,2659,2663,2667,2668,2670,2681,2703,2704,2740,2744,2794,2795,2807,2811,2815,2816,2819,2825,2826,2827,3150,3151,3156,3160,3173,3174,3182,3186,3190,3191,3689,3739,3758,4063,4140,4141,5186,5192,14661,14662,14777,14828,15422,15423,15427,15429,15432,15434,15437,15439,15442,15444,15447,15449,15452,15454,15458,15460,15461,15462,15464,15466,15467,15468,15470,15472,15473,15474,15482,15484,15485,15486,15488,15490,15491,15492,15496,15497,15501,15503,15506,15508,15511,15513,15516,15518,15521,15523,15524,15525,15534,15535,15536,15537,15558,15559,15560,15561,15566,15567,15571,15572,15576,15577,15581,15582,15587,15588,15592,15593,15594,15595,15598,15599,15600,15601,15604,15605,15606,15607,15959,15960,16980,16983,26676,26677,28373,28374,29072,32770,32836,98306,98372,163842,163908,229378,229444,262160,262166,270174,271103,275400,275469,275470") == "6846fc79f25d4e06ad1a1d1f8c593020dc052383" || block_image_verify(map_partition("vendor"), package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat")) then
ui_print("Verified vendor image...");
else
check_first_block(map_partition("vendor"));
ifelse (block_image_recover(map_partition("vendor"), "158,1,98,108,112,117,118,199,203,208,209,1915,1919,2397,2398,2659,2663,2667,2668,2670,2681,2703,2704,2740,2744,2794,2795,2807,2811,2815,2816,2819,2825,2826,2827,3150,3151,3156,3160,3173,3174,3182,3186,3190,3191,3689,3739,3758,4063,4140,4141,5186,5192,14661,14662,14777,14828,15422,15423,15427,15429,15432,15434,15437,15439,15442,15444,15447,15449,15452,15454,15458,15460,15461,15462,15464,15466,15467,15468,15470,15472,15473,15474,15482,15484,15485,15486,15488,15490,15491,15492,15496,15497,15501,15503,15506,15508,15511,15513,15516,15518,15521,15523,15524,15525,15534,15535,15536,15537,15558,15559,15560,15561,15566,15567,15571,15572,15576,15577,15581,15582,15587,15588,15592,15593,15594,15595,15598,15599,15600,15601,15604,15605,15606,15607,15959,15960,16980,16983,26676,26677,28373,28374,29072,32770,32836,98306,98372,163842,163908,229378,229444,262160,262166,270174,271103,275400,275469,275470") && block_image_verify(map_partition("vendor"), package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat"), ui_print("vendor recovered successfully."), abort("E2004: vendor partition fails to recover"));
endif;
if (range_sha1(map_partition("product"), "84,1,90,5380,5381,5396,5400,5404,5405,8049,8050,9626,9627,9673,9677,11797,11800,11804,11805,11844,11845,11852,11858,11859,11860,11866,11872,11873,11874,11934,11938,11943,11944,14699,14700,18172,18173,20580,20581,20944,20948,21455,21456,21468,21474,21475,21476,23316,23320,24757,24758,28770,28774,32761,32762,32768,32770,32839,32850,39733,39734,40139,40140,47305,47306,55308,55309,56772,56773,65536,65547,67853,98306,98375,163842,163911,229378,229447,262152,262155,284784,285649,290177,290249,290250") == "e2b9b5cb0e15a0f3888a973ce2b2ea414475510f" || block_image_verify(map_partition("product"), package_extract_file("product.transfer.list"), "product.new.dat", "product.patch.dat")) then
ui_print("Verified product image...");
else
check_first_block(map_partition("product"));
ifelse (block_image_recover(map_partition("product"), "84,1,90,5380,5381,5396,5400,5404,5405,8049,8050,9626,9627,9673,9677,11797,11800,11804,11805,11844,11845,11852,11858,11859,11860,11866,11872,11873,11874,11934,11938,11943,11944,14699,14700,18172,18173,20580,20581,20944,20948,21455,21456,21468,21474,21475,21476,23316,23320,24757,24758,28770,28774,32761,32762,32768,32770,32839,32850,39733,39734,40139,40140,47305,47306,55308,55309,56772,56773,65536,65547,67853,98306,98375,163842,163911,229378,229447,262152,262155,284784,285649,290177,290249,290250") && block_image_verify(map_partition("product"), package_extract_file("product.transfer.list"), "product.new.dat", "product.patch.dat"), ui_print("product recovered successfully."), abort("E2004: product partition fails to recover"));
endif;
if (range_sha1(map_partition("odm"), "8,1,11,12,15,207,213,229,230") == "49cccd97ea258b10ecddcbc8683b793177fa3140" || block_image_verify(map_partition("odm"), package_extract_file("odm.transfer.list"), "odm.new.dat", "odm.patch.dat")) then
ui_print("Verified odm image...");
else
check_first_block(map_partition("odm"));
ifelse (block_image_recover(map_partition("odm"), "8,1,11,12,15,207,213,229,230") && block_image_verify(map_partition("odm"), package_extract_file("odm.transfer.list"), "odm.new.dat", "odm.patch.dat"), ui_print("odm recovered successfully."), abort("E2004: odm partition fails to recover"));
endif;

# ---- start making changes here ----

ui_print("Patching boot image...");
show_progress(0.100000, 10);
patch_partition("EMMC:/dev/block/bootdevice/by-name/boot:134217728:4a24732ef8783746487f3c26e2ec40de92c4760c",
                "EMMC:/dev/block/bootdevice/by-name/boot:134217728:e63c042870a2db2a4255de094c3723076896a41d",
                package_extract_file("boot.img.p")) ||
    abort("E3008: Failed to apply patch to EMMC:/dev/block/bootdevice/by-name/boot:134217728:e63c042870a2db2a4255de094c3723076896a41d");

# ---- radio update tasks ----

ui_print("Patching firmware images...");
package_extract_file("firmware-update/cmnlib64.mbn", "/dev/block/bootdevice/by-name/cmnlib64");
package_extract_file("firmware-update/NON-HLOS.bin", "/dev/block/bootdevice/by-name/modem");
package_extract_file("firmware-update/cmnlib.mbn", "/dev/block/bootdevice/by-name/cmnlib");
package_extract_file("firmware-update/hyp.mbn", "/dev/block/bootdevice/by-name/hyp");
package_extract_file("firmware-update/km4.mbn", "/dev/block/bootdevice/by-name/keymaster");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tz");
package_extract_file("firmware-update/aop.mbn", "/dev/block/bootdevice/by-name/aop");
package_extract_file("firmware-update/xbl_config.elf", "/dev/block/bootdevice/by-name/xbl_config");
package_extract_file("firmware-update/BTFM.bin", "/dev/block/bootdevice/by-name/bluetooth");
package_extract_file("firmware-update/uefi_sec.mbn", "/dev/block/bootdevice/by-name/uefisecapp");
package_extract_file("firmware-update/imagefv.elf", "/dev/block/bootdevice/by-name/imagefv");
package_extract_file("firmware-update/qupv3fw.elf", "/dev/block/bootdevice/by-name/qupfw");
package_extract_file("firmware-update/abl.elf", "/dev/block/bootdevice/by-name/abl");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfg");
package_extract_file("firmware-update/storsec.mbn", "/dev/block/bootdevice/by-name/storsec");
package_extract_file("firmware-update/xbl.elf", "/dev/block/bootdevice/by-name/xbl");
package_extract_file("firmware-update/cmnlib64.mbn", "/dev/block/bootdevice/by-name/cmnlib64bak");
package_extract_file("firmware-update/cmnlib.mbn", "/dev/block/bootdevice/by-name/cmnlibbak");
package_extract_file("firmware-update/hyp.mbn", "/dev/block/bootdevice/by-name/hypbak");
package_extract_file("firmware-update/km4.mbn", "/dev/block/bootdevice/by-name/keymasterbak");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tzbak");
package_extract_file("firmware-update/aop.mbn", "/dev/block/bootdevice/by-name/aopbak");
package_extract_file("firmware-update/xbl_config.elf", "/dev/block/bootdevice/by-name/xbl_configbak");
package_extract_file("firmware-update/uefi_sec.mbn", "/dev/block/bootdevice/by-name/uefisecappbak");
package_extract_file("firmware-update/imagefv.elf", "/dev/block/bootdevice/by-name/imagefvbak");
package_extract_file("firmware-update/qupv3fw.elf", "/dev/block/bootdevice/by-name/qupfwbak");
package_extract_file("firmware-update/abl.elf", "/dev/block/bootdevice/by-name/ablbak");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfgbak");
package_extract_file("firmware-update/xbl.elf", "/dev/block/bootdevice/by-name/xblbak");
show_progress(0.600000, 600);

# --- Start patching dynamic partitions ---


# Patch partition vendor

ui_print("Patching vendor image after verification.");
block_image_update(map_partition("vendor"), package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat") ||
  abort("E2001: Failed to update vendor image.");

# Update dynamic partition metadata

assert(update_dynamic_partitions(package_extract_file("dynamic_partitions_op_list")));

# Patch partition product

ui_print("Patching product image after verification.");
block_image_update(map_partition("product"), package_extract_file("product.transfer.list"), "product.new.dat", "product.patch.dat") ||
  abort("E2001: Failed to update product image.");

# Patch partition system

ui_print("Patching system image after verification.");
block_image_update(map_partition("system"), package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat") ||
  abort("E1001: Failed to update system image.");

# Patch partition odm

ui_print("Patching odm image after verification.");
block_image_update(map_partition("odm"), package_extract_file("odm.transfer.list"), "odm.new.dat", "odm.patch.dat") ||
  abort("E2001: Failed to update odm image.");

# --- End patching dynamic partitions ---

show_progress(0.100000, 2);

# ---- radio update tasks 2 ----

ui_print("Patching vbmeta dtbo logo binimages...");
package_extract_file("firmware-update/vbmeta_system.img", "/dev/block/bootdevice/by-name/vbmeta_system");
package_extract_file("firmware-update/dtbo.img", "/dev/block/bootdevice/by-name/dtbo");
package_extract_file("firmware-update/vbmeta.img", "/dev/block/bootdevice/by-name/vbmeta");
