getprop("ro.product.device") == "tucana" || abort("E3004: This package is for \"tucana\" devices; this is a \"" + getprop("ro.product.device") + "\".");
ui_print("Source: Xiaomi/tucana/tucana:10/QKQ1.190825.002/V12.0.3.0.QFDMIXM:user/release-keys");
ui_print("Target: Xiaomi/tucana/tucana:10/QKQ1.190825.002/V12.0.4.0.QFDMIXM:user/release-keys");
ui_print("Verifying current system...");
getprop("ro.build.fingerprint") == "Xiaomi/tucana/tucana:10/QKQ1.190825.002/V12.0.3.0.QFDMIXM:user/release-keys" ||
    getprop("ro.build.fingerprint") == "Xiaomi/tucana/tucana:10/QKQ1.190825.002/V12.0.4.0.QFDMIXM:user/release-keys" ||
    abort("E3001: Package expects build fingerprint of Xiaomi/tucana/tucana:10/QKQ1.190825.002/V12.0.3.0.QFDMIXM:user/release-keys or Xiaomi/tucana/tucana:10/QKQ1.190825.002/V12.0.4.0.QFDMIXM:user/release-keys; this device has " + getprop("ro.build.fingerprint") + ".");
show_progress(0.100000, 10);
patch_partition_check("EMMC:/dev/block/bootdevice/by-name/boot:134217728:489471c59dbd32e42763ae624f13a73765a038fa",
                      "EMMC:/dev/block/bootdevice/by-name/boot:134217728:c5305030aa8029570ff7980526c11d442df88c94") ||
    abort("E3005: \"EMMC:/dev/block/bootdevice/by-name/boot:134217728:489471c59dbd32e42763ae624f13a73765a038fa\" or \"EMMC:/dev/block/bootdevice/by-name/boot:134217728:c5305030aa8029570ff7980526c11d442df88c94\" has unexpected contents.");
apply_patch_space(134217728) || abort("E3006: Not enough free space on /cache to apply patches.");
show_progress(0.100000, 70);
if (range_sha1("/dev/block/bootdevice/by-name/system", "214,1,744,791,805,838,845,847,848,1094,1099,1101,1102,1208,1209,1694,1695,2383,2384,2386,2388,2389,2390,2405,2406,2587,2588,2920,3030,3050,3061,3729,3760,3762,3763,3767,3768,3776,3777,3778,3779,5099,5303,5613,5883,7596,7781,8375,8509,8588,8662,9138,9139,9141,9547,9549,9550,10546,10548,16487,16488,16621,16622,19391,19393,25659,25661,32768,32770,33053,33054,34890,34891,34893,34895,34954,34955,35088,35090,35250,35254,35262,35263,35271,35275,35280,35281,35308,35312,35316,35317,35808,35812,35828,35829,35841,35845,35849,53030,53717,53719,53743,65537,66042,98306,98589,98590,99095,131073,131578,163842,164125,164126,164631,196609,197114,229378,229661,229662,230167,262145,262650,294914,295197,295198,295703,327681,328186,333933,333937,336007,336011,360449,360954,393217,393722,402700,403964,425985,426490,456636,456639,458753,459258,460314,467392,467393,471965,475207,479502,491521,492026,524289,524794,557057,557562,589825,590330,611860,613331,614149,617642,617681,620798,622593,623098,623340,624056,628381,628382,628496,628497,628508,628509,628559,628560,628602,628603,634688,637274,655361,655866,688129,688634,720897,721402,753665,754170,786433,786938,819202,819485,819486,819991,851969,852474,884738,885021,885022,885527,917505,918010,950273,950778,983041,983546,1015809,1016314,1029026,1146880,1146881,1161015,1179411,1179647,1179648") == "bed00c1dc9ff5ae6a2fcfbf0d401c31a06c85c6b" || block_image_verify("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat")) then
ui_print("Verified system image...");
else
check_first_block("/dev/block/bootdevice/by-name/system");
ifelse (block_image_recover("/dev/block/bootdevice/by-name/system", "214,1,744,791,805,838,845,847,848,1094,1099,1101,1102,1208,1209,1694,1695,2383,2384,2386,2388,2389,2390,2405,2406,2587,2588,2920,3030,3050,3061,3729,3760,3762,3763,3767,3768,3776,3777,3778,3779,5099,5303,5613,5883,7596,7781,8375,8509,8588,8662,9138,9139,9141,9547,9549,9550,10546,10548,16487,16488,16621,16622,19391,19393,25659,25661,32768,32770,33053,33054,34890,34891,34893,34895,34954,34955,35088,35090,35250,35254,35262,35263,35271,35275,35280,35281,35308,35312,35316,35317,35808,35812,35828,35829,35841,35845,35849,53030,53717,53719,53743,65537,66042,98306,98589,98590,99095,131073,131578,163842,164125,164126,164631,196609,197114,229378,229661,229662,230167,262145,262650,294914,295197,295198,295703,327681,328186,333933,333937,336007,336011,360449,360954,393217,393722,402700,403964,425985,426490,456636,456639,458753,459258,460314,467392,467393,471965,475207,479502,491521,492026,524289,524794,557057,557562,589825,590330,611860,613331,614149,617642,617681,620798,622593,623098,623340,624056,628381,628382,628496,628497,628508,628509,628559,628560,628602,628603,634688,637274,655361,655866,688129,688634,720897,721402,753665,754170,786433,786938,819202,819485,819486,819991,851969,852474,884738,885021,885022,885527,917505,918010,950273,950778,983041,983546,1015809,1016314,1029026,1146880,1146881,1161015,1179411,1179647,1179648") && block_image_verify("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat"), ui_print("system recovered successfully."), abort("E1004: system partition fails to recover"));
endif;
if (range_sha1("/dev/block/bootdevice/by-name/vendor", "124,1,308,633,641,651,655,660,661,742,746,751,752,2458,2462,2475,2941,3202,3206,3211,3212,3214,3215,3217,3228,3466,3470,3475,3521,3682,3683,3695,3699,3703,3704,3707,3711,3715,3716,4224,4228,4241,4242,4250,4254,4259,4260,4757,4807,4826,5131,5208,5209,6338,7086,7678,7770,15610,15611,15726,15727,15843,15895,16495,16496,17128,17129,18104,18110,20363,20364,22013,22014,23285,23286,32768,32770,32895,32896,45129,45131,52739,52740,57412,65537,66042,98306,98431,98432,98937,131073,131578,163842,163967,163968,164473,196609,197114,229378,229503,229504,230009,262145,262650,294914,295039,295040,295545,327681,328186,360449,360954,393217,393722,425985,426490,458753,459258,465007,491520,491521,515995,524173,524287,524288") == "79fd8644620cca30098b5fc25952ab5a1651cefc" || block_image_verify("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat")) then
ui_print("Verified vendor image...");
else
check_first_block("/dev/block/bootdevice/by-name/vendor");
ifelse (block_image_recover("/dev/block/bootdevice/by-name/vendor", "124,1,308,633,641,651,655,660,661,742,746,751,752,2458,2462,2475,2941,3202,3206,3211,3212,3214,3215,3217,3228,3466,3470,3475,3521,3682,3683,3695,3699,3703,3704,3707,3711,3715,3716,4224,4228,4241,4242,4250,4254,4259,4260,4757,4807,4826,5131,5208,5209,6338,7086,7678,7770,15610,15611,15726,15727,15843,15895,16495,16496,17128,17129,18104,18110,20363,20364,22013,22014,23285,23286,32768,32770,32895,32896,45129,45131,52739,52740,57412,65537,66042,98306,98431,98432,98937,131073,131578,163842,163967,163968,164473,196609,197114,229378,229503,229504,230009,262145,262650,294914,295039,295040,295545,327681,328186,360449,360954,393217,393722,425985,426490,458753,459258,465007,491520,491521,515995,524173,524287,524288") && block_image_verify("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat"), ui_print("vendor recovered successfully."), abort("E2004: vendor partition fails to recover"));
endif;

# ---- start making changes here ----

ui_print("Patching boot image...");
show_progress(0.100000, 10);
patch_partition("EMMC:/dev/block/bootdevice/by-name/boot:134217728:489471c59dbd32e42763ae624f13a73765a038fa",
                "EMMC:/dev/block/bootdevice/by-name/boot:134217728:c5305030aa8029570ff7980526c11d442df88c94",
                package_extract_file("boot.img.p")) ||
    abort("E3008: Failed to apply patch to EMMC:/dev/block/bootdevice/by-name/boot:134217728:c5305030aa8029570ff7980526c11d442df88c94");

# ---- radio update tasks ----

ui_print("Patching firmware images...");
package_extract_file("firmware-update/cmnlib64.mbn", "/dev/block/bootdevice/by-name/cmnlib64");
package_extract_file("firmware-update/NON-HLOS.bin", "/dev/block/bootdevice/by-name/modem");
package_extract_file("firmware-update/cmnlib.mbn", "/dev/block/bootdevice/by-name/cmnlib");
package_extract_file("firmware-update/hyp.mbn", "/dev/block/bootdevice/by-name/hyp");
package_extract_file("firmware-update/BTFM.bin", "/dev/block/bootdevice/by-name/bluetooth");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tz");
package_extract_file("firmware-update/aop.mbn", "/dev/block/bootdevice/by-name/aop");
package_extract_file("firmware-update/xbl_config.elf", "/dev/block/bootdevice/by-name/xbl_config");
package_extract_file("firmware-update/storsec.mbn", "/dev/block/bootdevice/by-name/storsec");
package_extract_file("firmware-update/uefi_sec.mbn", "/dev/block/bootdevice/by-name/uefisecapp");
package_extract_file("firmware-update/imagefv.elf", "/dev/block/bootdevice/by-name/imagefv");
package_extract_file("firmware-update/qupv3fw.elf", "/dev/block/bootdevice/by-name/qupfw");
package_extract_file("firmware-update/abl.elf", "/dev/block/bootdevice/by-name/abl");
package_extract_file("firmware-update/dspso.bin", "/dev/block/bootdevice/by-name/dsp");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfg");
package_extract_file("firmware-update/xbl.elf", "/dev/block/bootdevice/by-name/xbl");
package_extract_file("firmware-update/km4.mbn", "/dev/block/bootdevice/by-name/keymaster");
package_extract_file("firmware-update/cmnlib64.mbn", "/dev/block/bootdevice/by-name/cmnlib64bak");
package_extract_file("firmware-update/cmnlib.mbn", "/dev/block/bootdevice/by-name/cmnlibbak");
package_extract_file("firmware-update/hyp.mbn", "/dev/block/bootdevice/by-name/hypbak");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tzbak");
package_extract_file("firmware-update/aop.mbn", "/dev/block/bootdevice/by-name/aopbak");
package_extract_file("firmware-update/xbl_config.elf", "/dev/block/bootdevice/by-name/xbl_configbak");
package_extract_file("firmware-update/uefi_sec.mbn", "/dev/block/bootdevice/by-name/uefisecappbak");
package_extract_file("firmware-update/imagefv.elf", "/dev/block/bootdevice/by-name/imagefvbak");
package_extract_file("firmware-update/qupv3fw.elf", "/dev/block/bootdevice/by-name/qupfwbak");
package_extract_file("firmware-update/abl.elf", "/dev/block/bootdevice/by-name/ablbak");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfgbak");
package_extract_file("firmware-update/xbl.elf", "/dev/block/bootdevice/by-name/xblbak");
package_extract_file("firmware-update/km4.mbn", "/dev/block/bootdevice/by-name/keymasterbak");
show_progress(0.600000, 600);
ui_print("Patching system image after verification.");
block_image_update("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat") ||
  abort("E1001: Failed to update system image.");
ui_print("Patching vendor image after verification.");
block_image_update("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat") ||
  abort("E2001: Failed to update vendor image.");
show_progress(0.100000, 2);

# ---- radio update tasks 2 ----

ui_print("Patching vbmeta dtbo logo binimages...");
package_extract_file("firmware-update/dtbo.img", "/dev/block/bootdevice/by-name/dtbo");
package_extract_file("firmware-update/vbmeta.img", "/dev/block/bootdevice/by-name/vbmeta");
