getprop("ro.product.device") == "tucana" || abort("E3004: This package is for \"tucana\" devices; this is a \"" + getprop("ro.product.device") + "\".");
ui_print("Source: Xiaomi/tucana/tucana:10/QKQ1.190825.002/V12.0.2.0.QFDMIXM:user/release-keys");
ui_print("Target: Xiaomi/tucana/tucana:10/QKQ1.190825.002/V12.0.3.0.QFDMIXM:user/release-keys");
ui_print("Verifying current system...");
getprop("ro.build.fingerprint") == "Xiaomi/tucana/tucana:10/QKQ1.190825.002/V12.0.2.0.QFDMIXM:user/release-keys" ||
    getprop("ro.build.fingerprint") == "Xiaomi/tucana/tucana:10/QKQ1.190825.002/V12.0.3.0.QFDMIXM:user/release-keys" ||
    abort("E3001: Package expects build fingerprint of Xiaomi/tucana/tucana:10/QKQ1.190825.002/V12.0.2.0.QFDMIXM:user/release-keys or Xiaomi/tucana/tucana:10/QKQ1.190825.002/V12.0.3.0.QFDMIXM:user/release-keys; this device has " + getprop("ro.build.fingerprint") + ".");
show_progress(0.100000, 10);
patch_partition_check("EMMC:/dev/block/bootdevice/by-name/boot:134217728:c5305030aa8029570ff7980526c11d442df88c94",
                      "EMMC:/dev/block/bootdevice/by-name/boot:134217728:0e9412db0f88034ef3910ca43a251cde3a611ac0") ||
    abort("E3005: \"EMMC:/dev/block/bootdevice/by-name/boot:134217728:c5305030aa8029570ff7980526c11d442df88c94\" or \"EMMC:/dev/block/bootdevice/by-name/boot:134217728:0e9412db0f88034ef3910ca43a251cde3a611ac0\" has unexpected contents.");
apply_patch_space(135405568) || abort("E3006: Not enough free space on /cache to apply patches.");
show_progress(0.100000, 70);
if (range_sha1("/dev/block/bootdevice/by-name/system", "178,1,745,791,805,838,845,847,848,1094,1099,1101,1102,1208,1209,1694,1695,2383,2384,2386,2388,2389,2390,2405,2406,2587,2600,2632,2775,3729,3760,3762,3763,3767,3768,3776,3777,3778,3779,6363,6484,8632,8662,9138,9139,9141,9142,9546,9547,9549,9550,10546,10548,16487,16488,16621,16622,19391,19393,20401,21877,25659,25661,27011,28875,32768,32770,33053,33054,34890,34891,34893,34895,34954,34955,35088,35090,35250,35254,35262,35263,35271,35275,35280,35312,35315,35812,35828,35845,35849,65537,66042,98306,98589,98590,99095,131073,131578,163842,164125,164126,164631,167635,168558,168560,168586,184017,184580,184582,184600,196609,197114,229378,229661,229662,230167,262145,262650,294914,295197,295198,295703,327681,328186,360449,360954,393217,393722,425985,426490,458753,459258,491521,492026,524289,524794,546845,550797,550799,550845,557057,557562,589825,590330,622593,623098,655361,655866,688129,688634,720897,721402,753665,754170,786433,786938,819202,819485,819486,819991,851969,852474,884738,885021,885022,885527,917505,918010,950273,950778,983041,983546,1013003,1146880,1146881,1161015,1179411,1179647,1179648") == "0800656d315bfed9db3579435768737ce213a7b8" || block_image_verify("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat")) then
ui_print("Verified system image...");
else
check_first_block("/dev/block/bootdevice/by-name/system");
ifelse (block_image_recover("/dev/block/bootdevice/by-name/system", "178,1,745,791,805,838,845,847,848,1094,1099,1101,1102,1208,1209,1694,1695,2383,2384,2386,2388,2389,2390,2405,2406,2587,2600,2632,2775,3729,3760,3762,3763,3767,3768,3776,3777,3778,3779,6363,6484,8632,8662,9138,9139,9141,9142,9546,9547,9549,9550,10546,10548,16487,16488,16621,16622,19391,19393,20401,21877,25659,25661,27011,28875,32768,32770,33053,33054,34890,34891,34893,34895,34954,34955,35088,35090,35250,35254,35262,35263,35271,35275,35280,35312,35315,35812,35828,35845,35849,65537,66042,98306,98589,98590,99095,131073,131578,163842,164125,164126,164631,167635,168558,168560,168586,184017,184580,184582,184600,196609,197114,229378,229661,229662,230167,262145,262650,294914,295197,295198,295703,327681,328186,360449,360954,393217,393722,425985,426490,458753,459258,491521,492026,524289,524794,546845,550797,550799,550845,557057,557562,589825,590330,622593,623098,655361,655866,688129,688634,720897,721402,753665,754170,786433,786938,819202,819485,819486,819991,851969,852474,884738,885021,885022,885527,917505,918010,950273,950778,983041,983546,1013003,1146880,1146881,1161015,1179411,1179647,1179648") && block_image_verify("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat"), ui_print("system recovered successfully."), abort("E1004: system partition fails to recover"));
endif;
if (range_sha1("/dev/block/bootdevice/by-name/vendor", "126,1,308,633,641,651,655,660,661,742,746,751,752,2458,2462,2940,2941,3202,3206,3211,3212,3214,3215,3217,3228,3466,3470,3520,3683,3695,3699,3703,3704,3707,3711,3715,3716,4224,4228,4241,4242,4250,4254,4259,4260,4548,4574,4757,4807,5208,5209,5261,5301,6338,7086,7228,7290,7437,7594,7678,7770,15610,15611,15726,15727,16495,16496,17128,17129,18104,18110,20363,20364,22013,22014,23285,23286,32768,32770,32895,32896,45129,45131,52739,52740,57412,65537,66042,98306,98431,98432,98937,131073,131578,163842,163967,163968,164473,196609,197114,229378,229503,229504,230009,262145,262650,294914,295039,295040,295545,327681,328186,360449,360954,393217,393722,425985,426490,458753,459258,461661,491520,491521,515995,524173,524287,524288") == "946df5c808bfbe58ba872288b385dd823b67c071" || block_image_verify("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat")) then
ui_print("Verified vendor image...");
else
check_first_block("/dev/block/bootdevice/by-name/vendor");
ifelse (block_image_recover("/dev/block/bootdevice/by-name/vendor", "126,1,308,633,641,651,655,660,661,742,746,751,752,2458,2462,2940,2941,3202,3206,3211,3212,3214,3215,3217,3228,3466,3470,3520,3683,3695,3699,3703,3704,3707,3711,3715,3716,4224,4228,4241,4242,4250,4254,4259,4260,4548,4574,4757,4807,5208,5209,5261,5301,6338,7086,7228,7290,7437,7594,7678,7770,15610,15611,15726,15727,16495,16496,17128,17129,18104,18110,20363,20364,22013,22014,23285,23286,32768,32770,32895,32896,45129,45131,52739,52740,57412,65537,66042,98306,98431,98432,98937,131073,131578,163842,163967,163968,164473,196609,197114,229378,229503,229504,230009,262145,262650,294914,295039,295040,295545,327681,328186,360449,360954,393217,393722,425985,426490,458753,459258,461661,491520,491521,515995,524173,524287,524288") && block_image_verify("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat"), ui_print("vendor recovered successfully."), abort("E2004: vendor partition fails to recover"));
endif;

# ---- start making changes here ----

ui_print("Patching boot image...");
show_progress(0.100000, 10);
patch_partition("EMMC:/dev/block/bootdevice/by-name/boot:134217728:c5305030aa8029570ff7980526c11d442df88c94",
                "EMMC:/dev/block/bootdevice/by-name/boot:134217728:0e9412db0f88034ef3910ca43a251cde3a611ac0",
                package_extract_file("boot.img.p")) ||
    abort("E3008: Failed to apply patch to EMMC:/dev/block/bootdevice/by-name/boot:134217728:0e9412db0f88034ef3910ca43a251cde3a611ac0");

# ---- radio update tasks ----

ui_print("Patching firmware images...");
package_extract_file("firmware-update/cmnlib64.mbn", "/dev/block/bootdevice/by-name/cmnlib64");
package_extract_file("firmware-update/imagefv.elf", "/dev/block/bootdevice/by-name/imagefv");
package_extract_file("firmware-update/cmnlib.mbn", "/dev/block/bootdevice/by-name/cmnlib");
package_extract_file("firmware-update/hyp.mbn", "/dev/block/bootdevice/by-name/hyp");
package_extract_file("firmware-update/BTFM.bin", "/dev/block/bootdevice/by-name/bluetooth");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tz");
package_extract_file("firmware-update/aop.mbn", "/dev/block/bootdevice/by-name/aop");
package_extract_file("firmware-update/xbl_config.elf", "/dev/block/bootdevice/by-name/xbl_config");
package_extract_file("firmware-update/storsec.mbn", "/dev/block/bootdevice/by-name/storsec");
package_extract_file("firmware-update/uefi_sec.mbn", "/dev/block/bootdevice/by-name/uefisecapp");
package_extract_file("firmware-update/NON-HLOS.bin", "/dev/block/bootdevice/by-name/modem");
package_extract_file("firmware-update/qupv3fw.elf", "/dev/block/bootdevice/by-name/qupfw");
package_extract_file("firmware-update/abl.elf", "/dev/block/bootdevice/by-name/abl");
package_extract_file("firmware-update/dspso.bin", "/dev/block/bootdevice/by-name/dsp");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfg");
package_extract_file("firmware-update/xbl.elf", "/dev/block/bootdevice/by-name/xbl");
package_extract_file("firmware-update/km4.mbn", "/dev/block/bootdevice/by-name/keymaster");
package_extract_file("firmware-update/cmnlib64.mbn", "/dev/block/bootdevice/by-name/cmnlib64bak");
package_extract_file("firmware-update/imagefv.elf", "/dev/block/bootdevice/by-name/imagefvbak");
package_extract_file("firmware-update/cmnlib.mbn", "/dev/block/bootdevice/by-name/cmnlibbak");
package_extract_file("firmware-update/hyp.mbn", "/dev/block/bootdevice/by-name/hypbak");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tzbak");
package_extract_file("firmware-update/aop.mbn", "/dev/block/bootdevice/by-name/aopbak");
package_extract_file("firmware-update/xbl_config.elf", "/dev/block/bootdevice/by-name/xbl_configbak");
package_extract_file("firmware-update/uefi_sec.mbn", "/dev/block/bootdevice/by-name/uefisecappbak");
package_extract_file("firmware-update/qupv3fw.elf", "/dev/block/bootdevice/by-name/qupfwbak");
package_extract_file("firmware-update/abl.elf", "/dev/block/bootdevice/by-name/ablbak");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfgbak");
package_extract_file("firmware-update/xbl.elf", "/dev/block/bootdevice/by-name/xblbak");
package_extract_file("firmware-update/km4.mbn", "/dev/block/bootdevice/by-name/keymasterbak");
show_progress(0.600000, 600);
ui_print("Patching system image after verification.");
block_image_update("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat") ||
  abort("E1001: Failed to update system image.");
ui_print("Patching vendor image after verification.");
block_image_update("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat") ||
  abort("E2001: Failed to update vendor image.");
show_progress(0.100000, 2);

# ---- radio update tasks 2 ----

ui_print("Patching vbmeta dtbo logo binimages...");
package_extract_file("firmware-update/dtbo.img", "/dev/block/bootdevice/by-name/dtbo");
package_extract_file("firmware-update/vbmeta.img", "/dev/block/bootdevice/by-name/vbmeta");
