getprop("ro.product.device") == "tucana" || abort("E3004: This package is for \"tucana\" devices; this is a \"" + getprop("ro.product.device") + "\".");
ui_print("Source: Xiaomi/tucana/tucana:9/PKQ1.190302.001/V11.0.8.0.PFDMIXM:user/release-keys");
ui_print("Target: Xiaomi/tucana/tucana:9/PKQ1.190302.001/V11.0.9.0.PFDMIXM:user/release-keys");
ui_print("Verifying current system...");
getprop("ro.build.fingerprint") == "Xiaomi/tucana/tucana:9/PKQ1.190302.001/V11.0.8.0.PFDMIXM:user/release-keys" ||
    getprop("ro.build.fingerprint") == "Xiaomi/tucana/tucana:9/PKQ1.190302.001/V11.0.9.0.PFDMIXM:user/release-keys" ||
    abort("E3001: Package expects build fingerprint of Xiaomi/tucana/tucana:9/PKQ1.190302.001/V11.0.8.0.PFDMIXM:user/release-keys or Xiaomi/tucana/tucana:9/PKQ1.190302.001/V11.0.9.0.PFDMIXM:user/release-keys; this device has " + getprop("ro.build.fingerprint") + ".");
show_progress(0.100000, 5);
apply_patch_check("EMMC:/dev/block/bootdevice/by-name/boot:134217728:21dd11f6ebe0f3f85c60aa877fec182d211d6b66:134217728:2613b494ecf257a46bd27528f25729b580e17fd6") || abort("E3005: \"EMMC:/dev/block/bootdevice/by-name/boot:134217728:21dd11f6ebe0f3f85c60aa877fec182d211d6b66:134217728:2613b494ecf257a46bd27528f25729b580e17fd6\" has unexpected contents.");
apply_patch_space(134217728) || abort("E3006: Not enough free space on /cache to apply patches.");
show_progress(0.100000, 70);
if (range_sha1("/dev/block/bootdevice/by-name/system", "46,1,302,317,686,8381,8387,8394,8396,22327,22328,28577,28578,32768,32770,38137,38138,44977,44978,45643,45644,48369,50269,51472,98306,98589,163842,164125,229378,229661,294914,295197,524302,532384,819202,819485,884738,885021,962194,1048576,1048577,1048579,1048580,1161015,1179411,1179647,1179648") == "c5a4cd8cc85b841ce9b6aeb2a7bace47b29db56b" || block_image_verify("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat")) then
ui_print("Verified system image...");
else
check_first_block("/dev/block/bootdevice/by-name/system");
ifelse (block_image_recover("/dev/block/bootdevice/by-name/system", "46,1,302,317,686,8381,8387,8394,8396,22327,22328,28577,28578,32768,32770,38137,38138,44977,44978,45643,45644,48369,50269,51472,98306,98589,163842,164125,229378,229661,294914,295197,524302,532384,819202,819485,884738,885021,962194,1048576,1048577,1048579,1048580,1161015,1179411,1179647,1179648") && block_image_verify("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat"), ui_print("system recovered successfully."), abort("E1004: system partition fails to recover"));
endif;
if (range_sha1("/dev/block/bootdevice/by-name/vendor", "138,1,141,142,144,159,318,8223,8231,26038,26039,32768,32770,52692,52693,59790,59791,76051,76052,87404,87405,87408,87409,95903,95904,98304,98306,98956,100568,101019,101020,112152,112153,136166,136167,136256,136257,137528,137529,138888,138889,139729,139730,140690,140691,141504,141505,144123,144124,145668,145669,151173,151174,156398,156399,161883,161884,163840,163842,167066,167067,167752,167753,168599,168600,168831,168832,173736,173737,178745,178746,180118,180119,180490,180491,185813,185814,194688,194690,194891,195082,195124,195125,195132,195165,195189,195190,195207,195208,195227,195228,195229,195240,195249,195299,197053,197054,197110,197111,207503,207504,207633,207634,208224,208225,209855,209857,210104,210105,210107,210108,210115,210116,210118,210123,210125,210126,210144,210145,210769,210770,211065,211066,211484,211485,211554,211555,211567,211568,211997,229378,229503,294914,295039,431311,515995,524173,524287,524288") == "542823e4a37c3dcd5688b3cd2129715906d68218" || block_image_verify("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat")) then
ui_print("Verified vendor image...");
else
check_first_block("/dev/block/bootdevice/by-name/vendor");
ifelse (block_image_recover("/dev/block/bootdevice/by-name/vendor", "138,1,141,142,144,159,318,8223,8231,26038,26039,32768,32770,52692,52693,59790,59791,76051,76052,87404,87405,87408,87409,95903,95904,98304,98306,98956,100568,101019,101020,112152,112153,136166,136167,136256,136257,137528,137529,138888,138889,139729,139730,140690,140691,141504,141505,144123,144124,145668,145669,151173,151174,156398,156399,161883,161884,163840,163842,167066,167067,167752,167753,168599,168600,168831,168832,173736,173737,178745,178746,180118,180119,180490,180491,185813,185814,194688,194690,194891,195082,195124,195125,195132,195165,195189,195190,195207,195208,195227,195228,195229,195240,195249,195299,197053,197054,197110,197111,207503,207504,207633,207634,208224,208225,209855,209857,210104,210105,210107,210108,210115,210116,210118,210123,210125,210126,210144,210145,210769,210770,211065,211066,211484,211485,211554,211555,211567,211568,211997,229378,229503,294914,295039,431311,515995,524173,524287,524288") && block_image_verify("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat"), ui_print("vendor recovered successfully."), abort("E2004: vendor partition fails to recover"));
endif;

# ---- start making changes here ----

ui_print("Patching boot image...");
show_progress(0.100000, 10);
apply_patch("EMMC:/dev/block/bootdevice/by-name/boot:134217728:21dd11f6ebe0f3f85c60aa877fec182d211d6b66:134217728:2613b494ecf257a46bd27528f25729b580e17fd6",
            "-", 2613b494ecf257a46bd27528f25729b580e17fd6, 134217728,
            21dd11f6ebe0f3f85c60aa877fec182d211d6b66, package_extract_file("patch/boot.img.p")) || abort("Failed to apply patch \"patch/boot.img.p \".");

# ---- radio update tasks ----

ui_print("Patching firmware images...");
package_extract_file("firmware-update/cmnlib64.mbn", "/dev/block/bootdevice/by-name/cmnlib64");
package_extract_file("firmware-update/NON-HLOS.bin", "/dev/block/bootdevice/by-name/modem");
package_extract_file("firmware-update/cmnlib.mbn", "/dev/block/bootdevice/by-name/cmnlib");
package_extract_file("firmware-update/hyp.mbn", "/dev/block/bootdevice/by-name/hyp");
package_extract_file("firmware-update/BTFM.bin", "/dev/block/bootdevice/by-name/bluetooth");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tz");
package_extract_file("firmware-update/aop.mbn", "/dev/block/bootdevice/by-name/aop");
package_extract_file("firmware-update/xbl_config.elf", "/dev/block/bootdevice/by-name/xbl_config");
package_extract_file("firmware-update/storsec.mbn", "/dev/block/bootdevice/by-name/storsec");
package_extract_file("firmware-update/uefi_sec.mbn", "/dev/block/bootdevice/by-name/uefisecapp");
package_extract_file("firmware-update/imagefv.elf", "/dev/block/bootdevice/by-name/imagefv");
package_extract_file("firmware-update/qupv3fw.elf", "/dev/block/bootdevice/by-name/qupfw");
package_extract_file("firmware-update/abl.elf", "/dev/block/bootdevice/by-name/abl");
package_extract_file("firmware-update/dspso.bin", "/dev/block/bootdevice/by-name/dsp");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfg");
package_extract_file("firmware-update/xbl.elf", "/dev/block/bootdevice/by-name/xbl");
package_extract_file("firmware-update/km4.mbn", "/dev/block/bootdevice/by-name/keymaster");
package_extract_file("firmware-update/cmnlib64.mbn", "/dev/block/bootdevice/by-name/cmnlib64bak");
package_extract_file("firmware-update/cmnlib.mbn", "/dev/block/bootdevice/by-name/cmnlibbak");
package_extract_file("firmware-update/hyp.mbn", "/dev/block/bootdevice/by-name/hypbak");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tzbak");
package_extract_file("firmware-update/aop.mbn", "/dev/block/bootdevice/by-name/aopbak");
package_extract_file("firmware-update/xbl_config.elf", "/dev/block/bootdevice/by-name/xbl_configbak");
package_extract_file("firmware-update/uefi_sec.mbn", "/dev/block/bootdevice/by-name/uefisecappbak");
package_extract_file("firmware-update/imagefv.elf", "/dev/block/bootdevice/by-name/imagefvbak");
package_extract_file("firmware-update/qupv3fw.elf", "/dev/block/bootdevice/by-name/qupfwbak");
package_extract_file("firmware-update/abl.elf", "/dev/block/bootdevice/by-name/ablbak");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfgbak");
package_extract_file("firmware-update/xbl.elf", "/dev/block/bootdevice/by-name/xblbak");
package_extract_file("firmware-update/km4.mbn", "/dev/block/bootdevice/by-name/keymasterbak");
show_progress(0.600000, 600);
ui_print("Patching system image after verification.");
block_image_update("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat") ||
  abort("E1001: Failed to update system image.");
ui_print("Patching vendor image after verification.");
block_image_update("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat") ||
  abort("E2001: Failed to update vendor image.");

# ---- radio update tasks 2 ----

ui_print("Patching vbmeta dtbo logo binimages...");
package_extract_file("firmware-update/vbmeta.img", "/dev/block/bootdevice/by-name/vbmeta");
package_extract_file("firmware-update/dtbo.img", "/dev/block/bootdevice/by-name/dtbo");
show_progress(0.100000, 2);
