getprop("ro.product.device") == "tucana" || abort("E3004: This package is for \"tucana\" devices; this is a \"" + getprop("ro.product.device") + "\".");
ui_print("Source: Xiaomi/tucana_eea/tucana:9/PKQ1.190302.001/V11.0.5.0.PFDEUXM:user/release-keys");
ui_print("Target: Xiaomi/tucana_eea/tucana:9/PKQ1.190302.001/V11.0.9.0.PFDEUXM:user/release-keys");
ui_print("Verifying current system...");
getprop("ro.build.fingerprint") == "Xiaomi/tucana_eea/tucana:9/PKQ1.190302.001/V11.0.5.0.PFDEUXM:user/release-keys" ||
    getprop("ro.build.fingerprint") == "Xiaomi/tucana_eea/tucana:9/PKQ1.190302.001/V11.0.9.0.PFDEUXM:user/release-keys" ||
    abort("E3001: Package expects build fingerprint of Xiaomi/tucana_eea/tucana:9/PKQ1.190302.001/V11.0.5.0.PFDEUXM:user/release-keys or Xiaomi/tucana_eea/tucana:9/PKQ1.190302.001/V11.0.9.0.PFDEUXM:user/release-keys; this device has " + getprop("ro.build.fingerprint") + ".");
show_progress(0.100000, 5);
apply_patch_check("EMMC:/dev/block/bootdevice/by-name/boot:134217728:a7a5eb842e9e25b9adf78bf87dbc5281899c8eca:134217728:7d3e6f8db72ae23edeac36fcd95f674992265a20") || abort("E3005: \"EMMC:/dev/block/bootdevice/by-name/boot:134217728:a7a5eb842e9e25b9adf78bf87dbc5281899c8eca:134217728:7d3e6f8db72ae23edeac36fcd95f674992265a20\" has unexpected contents.");
apply_patch_space(322121728) || abort("E3006: Not enough free space on /cache to apply patches.");
show_progress(0.100000, 70);
if (range_sha1("/dev/block/bootdevice/by-name/system", "254,1,302,317,688,8381,32770,33053,36405,39585,40576,41117,41304,41547,41561,41810,42629,43525,86614,87382,87738,88322,98306,98589,101520,102096,102389,102428,102465,102497,102531,102968,103088,103093,103104,104569,104570,104751,104755,104776,104797,104907,104908,104935,105100,106181,106568,106573,106576,106664,128060,128788,129612,129806,129917,130301,136244,136287,136485,136609,136615,136634,136650,136919,136979,137049,137091,137098,137135,137317,137318,137841,137968,138060,138068,138136,138177,138260,138359,138450,138569,138612,138958,139216,151525,151580,151608,153709,160170,160485,160491,160514,160516,160540,160610,160634,163842,164125,166241,166318,166428,166469,166489,166510,173219,173521,173873,174037,174040,174104,174521,174623,174646,174777,174962,175425,229378,229661,294914,295197,303358,303385,303390,303405,303411,303474,303486,303509,303538,303574,303609,303660,303662,303736,303747,303764,524301,532384,613091,613299,614814,615596,615663,615724,615892,616015,616050,616090,623312,624775,635734,636221,636245,636320,636366,636433,636448,636993,637008,637269,637320,637569,637716,637799,637927,638253,638518,638524,638558,638576,638600,638631,638654,638708,638952,639064,639311,639347,639363,639568,639571,639759,639975,640077,640098,640483,640611,640702,640893,640900,640929,640992,641040,641046,641055,641140,641145,641210,641585,641612,641684,641929,641959,642025,642065,642923,642925,642930,642953,643544,643548,643554,643737,643745,643756,643829,643848,643883,644050,644129,644217,644791,645060,645350,645883,646398,702370,705799,706937,707361,707364,708862,709051,709536,722519,728152,795471,799090,799091,799441,819202,819485,884738,885021,932816,932817,934139,1048576,1048577,1048579,1048580,1161015,1179411,1179647,1179648") == "38b76f0b0d4f61471225058efc2a81183b024d27" || block_image_verify("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat")) then
ui_print("Verified system image...");
else
check_first_block("/dev/block/bootdevice/by-name/system");
ifelse (block_image_recover("/dev/block/bootdevice/by-name/system", "254,1,302,317,688,8381,32770,33053,36405,39585,40576,41117,41304,41547,41561,41810,42629,43525,86614,87382,87738,88322,98306,98589,101520,102096,102389,102428,102465,102497,102531,102968,103088,103093,103104,104569,104570,104751,104755,104776,104797,104907,104908,104935,105100,106181,106568,106573,106576,106664,128060,128788,129612,129806,129917,130301,136244,136287,136485,136609,136615,136634,136650,136919,136979,137049,137091,137098,137135,137317,137318,137841,137968,138060,138068,138136,138177,138260,138359,138450,138569,138612,138958,139216,151525,151580,151608,153709,160170,160485,160491,160514,160516,160540,160610,160634,163842,164125,166241,166318,166428,166469,166489,166510,173219,173521,173873,174037,174040,174104,174521,174623,174646,174777,174962,175425,229378,229661,294914,295197,303358,303385,303390,303405,303411,303474,303486,303509,303538,303574,303609,303660,303662,303736,303747,303764,524301,532384,613091,613299,614814,615596,615663,615724,615892,616015,616050,616090,623312,624775,635734,636221,636245,636320,636366,636433,636448,636993,637008,637269,637320,637569,637716,637799,637927,638253,638518,638524,638558,638576,638600,638631,638654,638708,638952,639064,639311,639347,639363,639568,639571,639759,639975,640077,640098,640483,640611,640702,640893,640900,640929,640992,641040,641046,641055,641140,641145,641210,641585,641612,641684,641929,641959,642025,642065,642923,642925,642930,642953,643544,643548,643554,643737,643745,643756,643829,643848,643883,644050,644129,644217,644791,645060,645350,645883,646398,702370,705799,706937,707361,707364,708862,709051,709536,722519,728152,795471,799090,799091,799441,819202,819485,884738,885021,932816,932817,934139,1048576,1048577,1048579,1048580,1161015,1179411,1179647,1179648") && block_image_verify("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat"), ui_print("system recovered successfully."), abort("E1004: system partition fails to recover"));
endif;
if (range_sha1("/dev/block/bootdevice/by-name/vendor", "22,1,139,142,144,159,317,8223,32770,32895,98306,98431,163842,163967,229378,229503,294914,295039,388146,515995,524173,524287,524288") == "866760136d714a4971b2b627794771929e6a9312" || block_image_verify("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat")) then
ui_print("Verified vendor image...");
else
check_first_block("/dev/block/bootdevice/by-name/vendor");
ifelse (block_image_recover("/dev/block/bootdevice/by-name/vendor", "22,1,139,142,144,159,317,8223,32770,32895,98306,98431,163842,163967,229378,229503,294914,295039,388146,515995,524173,524287,524288") && block_image_verify("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat"), ui_print("vendor recovered successfully."), abort("E2004: vendor partition fails to recover"));
endif;

# ---- start making changes here ----

ui_print("Patching boot image...");
show_progress(0.100000, 10);
apply_patch("EMMC:/dev/block/bootdevice/by-name/boot:134217728:a7a5eb842e9e25b9adf78bf87dbc5281899c8eca:134217728:7d3e6f8db72ae23edeac36fcd95f674992265a20",
            "-", 7d3e6f8db72ae23edeac36fcd95f674992265a20, 134217728,
            a7a5eb842e9e25b9adf78bf87dbc5281899c8eca, package_extract_file("patch/boot.img.p")) || abort("Failed to apply patch \"patch/boot.img.p \".");

# ---- radio update tasks ----

ui_print("Patching firmware images...");
package_extract_file("firmware-update/cmnlib64.mbn", "/dev/block/bootdevice/by-name/cmnlib64");
package_extract_file("firmware-update/imagefv.elf", "/dev/block/bootdevice/by-name/imagefv");
package_extract_file("firmware-update/cmnlib.mbn", "/dev/block/bootdevice/by-name/cmnlib");
package_extract_file("firmware-update/hyp.mbn", "/dev/block/bootdevice/by-name/hyp");
package_extract_file("firmware-update/BTFM.bin", "/dev/block/bootdevice/by-name/bluetooth");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tz");
package_extract_file("firmware-update/aop.mbn", "/dev/block/bootdevice/by-name/aop");
package_extract_file("firmware-update/xbl_config.elf", "/dev/block/bootdevice/by-name/xbl_config");
package_extract_file("firmware-update/storsec.mbn", "/dev/block/bootdevice/by-name/storsec");
package_extract_file("firmware-update/uefi_sec.mbn", "/dev/block/bootdevice/by-name/uefisecapp");
package_extract_file("firmware-update/NON-HLOS.bin", "/dev/block/bootdevice/by-name/modem");
package_extract_file("firmware-update/qupv3fw.elf", "/dev/block/bootdevice/by-name/qupfw");
package_extract_file("firmware-update/abl.elf", "/dev/block/bootdevice/by-name/abl");
package_extract_file("firmware-update/dspso.bin", "/dev/block/bootdevice/by-name/dsp");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfg");
package_extract_file("firmware-update/xbl.elf", "/dev/block/bootdevice/by-name/xbl");
package_extract_file("firmware-update/km4.mbn", "/dev/block/bootdevice/by-name/keymaster");
package_extract_file("firmware-update/cmnlib64.mbn", "/dev/block/bootdevice/by-name/cmnlib64bak");
package_extract_file("firmware-update/imagefv.elf", "/dev/block/bootdevice/by-name/imagefvbak");
package_extract_file("firmware-update/cmnlib.mbn", "/dev/block/bootdevice/by-name/cmnlibbak");
package_extract_file("firmware-update/hyp.mbn", "/dev/block/bootdevice/by-name/hypbak");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tzbak");
package_extract_file("firmware-update/aop.mbn", "/dev/block/bootdevice/by-name/aopbak");
package_extract_file("firmware-update/xbl_config.elf", "/dev/block/bootdevice/by-name/xbl_configbak");
package_extract_file("firmware-update/uefi_sec.mbn", "/dev/block/bootdevice/by-name/uefisecappbak");
package_extract_file("firmware-update/qupv3fw.elf", "/dev/block/bootdevice/by-name/qupfwbak");
package_extract_file("firmware-update/abl.elf", "/dev/block/bootdevice/by-name/ablbak");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfgbak");
package_extract_file("firmware-update/xbl.elf", "/dev/block/bootdevice/by-name/xblbak");
package_extract_file("firmware-update/km4.mbn", "/dev/block/bootdevice/by-name/keymasterbak");
show_progress(0.600000, 600);
ui_print("Patching system image after verification.");
block_image_update("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat") ||
  abort("E1001: Failed to update system image.");
ui_print("Patching vendor image after verification.");
block_image_update("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat") ||
  abort("E2001: Failed to update vendor image.");

# ---- radio update tasks 2 ----

ui_print("Patching vbmeta dtbo logo binimages...");
package_extract_file("firmware-update/vbmeta.img", "/dev/block/bootdevice/by-name/vbmeta");
package_extract_file("firmware-update/dtbo.img", "/dev/block/bootdevice/by-name/dtbo");
show_progress(0.100000, 2);
