getprop("ro.product.device") == "cepheus" || abort("E3004: This package is for \"cepheus\" devices; this is a \"" + getprop("ro.product.device") + "\".");
ui_print("Source: Xiaomi/cepheus_eea/cepheus:10/QKQ1.190825.002/V12.0.2.0.QFAEUXM:user/release-keys");
ui_print("Target: Xiaomi/cepheus_eea/cepheus:10/QKQ1.190825.002/V12.0.3.0.QFAEUXM:user/release-keys");
ui_print("Verifying current system...");
getprop("ro.build.fingerprint") == "Xiaomi/cepheus_eea/cepheus:10/QKQ1.190825.002/V12.0.2.0.QFAEUXM:user/release-keys" ||
    getprop("ro.build.fingerprint") == "Xiaomi/cepheus_eea/cepheus:10/QKQ1.190825.002/V12.0.3.0.QFAEUXM:user/release-keys" ||
    abort("E3001: Package expects build fingerprint of Xiaomi/cepheus_eea/cepheus:10/QKQ1.190825.002/V12.0.2.0.QFAEUXM:user/release-keys or Xiaomi/cepheus_eea/cepheus:10/QKQ1.190825.002/V12.0.3.0.QFAEUXM:user/release-keys; this device has " + getprop("ro.build.fingerprint") + ".");
show_progress(0.100000, 10);
patch_partition_check("EMMC:/dev/block/bootdevice/by-name/boot:134217728:147b8cb38aac50af63d5285a4f4204c1eccae319",
                      "EMMC:/dev/block/bootdevice/by-name/boot:134217728:aea8736c37350f5998cf6354b25c996e2092dd31") ||
    abort("E3005: \"EMMC:/dev/block/bootdevice/by-name/boot:134217728:147b8cb38aac50af63d5285a4f4204c1eccae319\" or \"EMMC:/dev/block/bootdevice/by-name/boot:134217728:aea8736c37350f5998cf6354b25c996e2092dd31\" has unexpected contents.");
apply_patch_space(134217728) || abort("E3006: Not enough free space on /cache to apply patches.");
show_progress(0.100000, 70);
if (range_sha1("/dev/block/bootdevice/by-name/system", "150,1,620,728,742,754,757,775,782,784,785,1031,1036,1038,1039,1145,1146,1631,1632,2320,2321,2323,2325,2326,2327,2342,2343,2524,2537,2569,2712,3666,3697,3699,3700,3704,3705,3713,3714,3715,3716,8567,8597,9073,9074,9076,9077,9481,9482,9484,9485,10481,10483,16422,16423,16556,16557,19326,19328,25594,25596,32768,32770,32990,32991,34762,34763,34765,34767,34826,34827,34960,34962,35015,35031,35043,65537,66042,75324,91299,98306,98526,98527,99032,124316,124844,131073,131578,163842,164062,164063,164568,196609,197114,229378,229598,229599,230104,262145,262650,294914,295134,295135,295640,327681,328186,360449,360954,393217,393722,425985,426490,458753,459258,487904,491520,491521,492362,524289,524794,557057,557562,589825,590330,622593,623098,655361,655866,688129,688634,720897,721402,753665,754170,786433,786938,819202,819422,819423,819928,851969,852474,855886,884736,884738,884958,884959,903007,917316,917503,917504") == "66a8e4f67c863f418fd5d79b6a34c7051f02390a" || block_image_verify("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat")) then
ui_print("Verified system image...");
else
check_first_block("/dev/block/bootdevice/by-name/system");
ifelse (block_image_recover("/dev/block/bootdevice/by-name/system", "150,1,620,728,742,754,757,775,782,784,785,1031,1036,1038,1039,1145,1146,1631,1632,2320,2321,2323,2325,2326,2327,2342,2343,2524,2537,2569,2712,3666,3697,3699,3700,3704,3705,3713,3714,3715,3716,8567,8597,9073,9074,9076,9077,9481,9482,9484,9485,10481,10483,16422,16423,16556,16557,19326,19328,25594,25596,32768,32770,32990,32991,34762,34763,34765,34767,34826,34827,34960,34962,35015,35031,35043,65537,66042,75324,91299,98306,98526,98527,99032,124316,124844,131073,131578,163842,164062,164063,164568,196609,197114,229378,229598,229599,230104,262145,262650,294914,295134,295135,295640,327681,328186,360449,360954,393217,393722,425985,426490,458753,459258,487904,491520,491521,492362,524289,524794,557057,557562,589825,590330,622593,623098,655361,655866,688129,688634,720897,721402,753665,754170,786433,786938,819202,819422,819423,819928,851969,852474,855886,884736,884738,884958,884959,903007,917316,917503,917504") && block_image_verify("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat"), ui_print("system recovered successfully."), abort("E1004: system partition fails to recover"));
endif;
if (range_sha1("/dev/block/bootdevice/by-name/vendor", "114,1,273,602,610,620,621,702,703,767,768,770,771,773,784,786,787,795,796,804,805,834,857,936,943,1262,1312,1331,1636,1702,1703,1754,1794,2835,3583,3820,3922,4222,4314,4385,4799,12176,12177,12246,12291,12294,12295,12426,12478,13024,13957,14714,14719,16972,16973,18622,18623,19894,19895,32768,32770,32864,32865,41707,41709,44788,44789,50328,50329,65536,65537,66043,66044,69683,69684,74393,74394,79387,79388,91920,91921,98304,98306,98400,98401,101800,119014,119015,131073,131578,163842,163936,163937,164442,196609,197114,229378,229472,229473,229978,262145,262650,294914,295008,295009,295514,327681,328186,360449,360954,376477,386991,393125,393215,393216") == "fa4e6516a7aa6e26c7818d0b0a87ee7a5798c147" || block_image_verify("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat")) then
ui_print("Verified vendor image...");
else
check_first_block("/dev/block/bootdevice/by-name/vendor");
ifelse (block_image_recover("/dev/block/bootdevice/by-name/vendor", "114,1,273,602,610,620,621,702,703,767,768,770,771,773,784,786,787,795,796,804,805,834,857,936,943,1262,1312,1331,1636,1702,1703,1754,1794,2835,3583,3820,3922,4222,4314,4385,4799,12176,12177,12246,12291,12294,12295,12426,12478,13024,13957,14714,14719,16972,16973,18622,18623,19894,19895,32768,32770,32864,32865,41707,41709,44788,44789,50328,50329,65536,65537,66043,66044,69683,69684,74393,74394,79387,79388,91920,91921,98304,98306,98400,98401,101800,119014,119015,131073,131578,163842,163936,163937,164442,196609,197114,229378,229472,229473,229978,262145,262650,294914,295008,295009,295514,327681,328186,360449,360954,376477,386991,393125,393215,393216") && block_image_verify("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat"), ui_print("vendor recovered successfully."), abort("E2004: vendor partition fails to recover"));
endif;

# ---- start making changes here ----

ui_print("Patching boot image...");
show_progress(0.100000, 10);
patch_partition("EMMC:/dev/block/bootdevice/by-name/boot:134217728:147b8cb38aac50af63d5285a4f4204c1eccae319",
                "EMMC:/dev/block/bootdevice/by-name/boot:134217728:aea8736c37350f5998cf6354b25c996e2092dd31",
                package_extract_file("boot.img.p")) ||
    abort("E3008: Failed to apply patch to EMMC:/dev/block/bootdevice/by-name/boot:134217728:aea8736c37350f5998cf6354b25c996e2092dd31");

# ---- radio update tasks ----

ui_print("Patching firmware images...");
package_extract_file("firmware-update/cmnlib64.mbn", "/dev/block/bootdevice/by-name/cmnlib64");
package_extract_file("firmware-update/imagefv.elf", "/dev/block/bootdevice/by-name/imagefv");
package_extract_file("firmware-update/cmnlib.mbn", "/dev/block/bootdevice/by-name/cmnlib");
package_extract_file("firmware-update/hyp.mbn", "/dev/block/bootdevice/by-name/hyp");
package_extract_file("firmware-update/km4.mbn", "/dev/block/bootdevice/by-name/keymaster");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tz");
package_extract_file("firmware-update/aop.mbn", "/dev/block/bootdevice/by-name/aop");
package_extract_file("firmware-update/xbl_config.elf", "/dev/block/bootdevice/by-name/xbl_config");
package_extract_file("firmware-update/BTFM.bin", "/dev/block/bootdevice/by-name/bluetooth");
package_extract_file("firmware-update/uefi_sec.mbn", "/dev/block/bootdevice/by-name/uefisecapp");
package_extract_file("firmware-update/NON-HLOS.bin", "/dev/block/bootdevice/by-name/modem");
package_extract_file("firmware-update/qupv3fw.elf", "/dev/block/bootdevice/by-name/qupfw");
package_extract_file("firmware-update/abl.elf", "/dev/block/bootdevice/by-name/abl");
package_extract_file("firmware-update/dspso.bin", "/dev/block/bootdevice/by-name/dsp");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfg");
package_extract_file("firmware-update/storsec.mbn", "/dev/block/bootdevice/by-name/storsec");
package_extract_file("firmware-update/xbl.elf", "/dev/block/bootdevice/by-name/xbl");
package_extract_file("firmware-update/cmnlib64.mbn", "/dev/block/bootdevice/by-name/cmnlib64bak");
package_extract_file("firmware-update/cmnlib.mbn", "/dev/block/bootdevice/by-name/cmnlibbak");
package_extract_file("firmware-update/hyp.mbn", "/dev/block/bootdevice/by-name/hypbak");
package_extract_file("firmware-update/km4.mbn", "/dev/block/bootdevice/by-name/keymasterbak");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tzbak");
package_extract_file("firmware-update/aop.mbn", "/dev/block/bootdevice/by-name/aopbak");
package_extract_file("firmware-update/xbl_config.elf", "/dev/block/bootdevice/by-name/xbl_configbak");
package_extract_file("firmware-update/uefi_sec.mbn", "/dev/block/bootdevice/by-name/uefisecappbak");
package_extract_file("firmware-update/qupv3fw.elf", "/dev/block/bootdevice/by-name/qupfwbak");
package_extract_file("firmware-update/abl.elf", "/dev/block/bootdevice/by-name/ablbak");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfgbak");
package_extract_file("firmware-update/xbl.elf", "/dev/block/bootdevice/by-name/xblbak");
show_progress(0.600000, 600);
ui_print("Patching system image after verification.");
block_image_update("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat") ||
  abort("E1001: Failed to update system image.");
ui_print("Patching vendor image after verification.");
block_image_update("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat") ||
  abort("E2001: Failed to update vendor image.");
show_progress(0.100000, 2);

# ---- radio update tasks 2 ----

ui_print("Patching vbmeta dtbo logo binimages...");
package_extract_file("firmware-update/dtbo.img", "/dev/block/bootdevice/by-name/dtbo");
package_extract_file("firmware-update/vbmeta.img", "/dev/block/bootdevice/by-name/vbmeta");
