getprop("ro.product.device") == "tucana" || abort("E3004: This package is for \"tucana\" devices; this is a \"" + getprop("ro.product.device") + "\".");
ui_print("Source: Xiaomi/tucana/tucana:11/RKQ1.200826.002/V12.5.6.0.RFDMIXM:user/release-keys");
ui_print("Target: Xiaomi/tucana/tucana:11/RKQ1.200826.002/V13.0.1.0.RFDMIXM:user/release-keys");
ui_print("Verifying current system...");
getprop("ro.build.fingerprint") == "Xiaomi/tucana/tucana:11/RKQ1.200826.002/V12.5.6.0.RFDMIXM:user/release-keys" ||
    getprop("ro.build.fingerprint") == "Xiaomi/tucana/tucana:11/RKQ1.200826.002/V13.0.1.0.RFDMIXM:user/release-keys" ||
    abort("E3001: Package expects build fingerprint of Xiaomi/tucana/tucana:11/RKQ1.200826.002/V12.5.6.0.RFDMIXM:user/release-keys or Xiaomi/tucana/tucana:11/RKQ1.200826.002/V13.0.1.0.RFDMIXM:user/release-keys; this device has " + getprop("ro.build.fingerprint") + ".");
patch_partition_check(concat("EMMC:","/dev/block/bootdevice/by-name/boot",":134217728:504843a128d5bd025cddbfb169dedd201f900058"),
                      concat("EMMC:","/dev/block/bootdevice/by-name/boot",":134217728:994e02614dd5a7a7b18dbdaa11fefa0ca7a62dea")) ||
    abort(concat("E3005: \"",concat("EMMC:","/dev/block/bootdevice/by-name/boot",":134217728:504843a128d5bd025cddbfb169dedd201f900058"),"\" or \"",concat("EMMC:","/dev/block/bootdevice/by-name/boot",":134217728:994e02614dd5a7a7b18dbdaa11fefa0ca7a62dea"),"\" has unexpected contents."));
apply_patch_space(145256448) || abort("E3006: Not enough free space on /cache to apply patches.");
if (range_sha1("/dev/block/bootdevice/by-name/system", "142,1,416,508,522,537,546,548,553,555,556,932,933,934,935,1124,1125,1453,1454,1456,1457,2011,2012,2015,2016,2316,2320,2329,2381,2382,2654,2655,2769,2770,2842,2843,3710,3719,3774,3775,4089,4090,4224,4225,4307,4308,5292,6438,7658,7758,7759,11183,32771,33276,65537,66042,98307,98812,131073,131578,163843,164348,196609,197114,215660,229376,229379,230940,262145,262650,294915,295420,327681,328186,342290,342972,360449,360954,393217,393722,397586,397589,398748,398802,413185,413581,413880,416212,416214,417333,417334,417386,417387,418787,418788,419150,419151,420514,425651,425777,425985,426490,458753,459258,491521,492026,524289,524794,557057,557562,589825,590330,622593,623098,655361,655866,688129,688634,720897,721402,753665,754170,786433,786938,819203,819708,851969,852474,884739,885244,917505,918010,950273,950778,983041,983546,1012981,1146880,1146881,1161015,1179411,1179647,1179648") == "9a107b012d70f89449d4881d1548ca064eb5c83a" || block_image_verify("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat")) then
ui_print("Verified system image...");
else
check_first_block("/dev/block/bootdevice/by-name/system");
ifelse (block_image_recover("/dev/block/bootdevice/by-name/system", "142,1,416,508,522,537,546,548,553,555,556,932,933,934,935,1124,1125,1453,1454,1456,1457,2011,2012,2015,2016,2316,2320,2329,2381,2382,2654,2655,2769,2770,2842,2843,3710,3719,3774,3775,4089,4090,4224,4225,4307,4308,5292,6438,7658,7758,7759,11183,32771,33276,65537,66042,98307,98812,131073,131578,163843,164348,196609,197114,215660,229376,229379,230940,262145,262650,294915,295420,327681,328186,342290,342972,360449,360954,393217,393722,397586,397589,398748,398802,413185,413581,413880,416212,416214,417333,417334,417386,417387,418787,418788,419150,419151,420514,425651,425777,425985,426490,458753,459258,491521,492026,524289,524794,557057,557562,589825,590330,622593,623098,655361,655866,688129,688634,720897,721402,753665,754170,786433,786938,819203,819708,851969,852474,884739,885244,917505,918010,950273,950778,983041,983546,1012981,1146880,1146881,1161015,1179411,1179647,1179648") && block_image_verify("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat"), ui_print("system recovered successfully."), abort("E1004: system partition fails to recover"));
endif;
if (range_sha1("/dev/block/bootdevice/by-name/vendor", "38,1,197,508,32771,33276,65537,66042,98307,98812,131073,131578,163843,164348,196609,197114,229379,229884,262145,262650,294915,295420,327681,328186,360449,360954,393217,393722,425985,426490,458753,459258,490677,491520,491521,515995,524173,524287,524288") == "507c7ba12eb716c40926fd8d3316832dbd30b414" || block_image_verify("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat")) then
ui_print("Verified vendor image...");
else
check_first_block("/dev/block/bootdevice/by-name/vendor");
ifelse (block_image_recover("/dev/block/bootdevice/by-name/vendor", "38,1,197,508,32771,33276,65537,66042,98307,98812,131073,131578,163843,164348,196609,197114,229379,229884,262145,262650,294915,295420,327681,328186,360449,360954,393217,393722,425985,426490,458753,459258,490677,491520,491521,515995,524173,524287,524288") && block_image_verify("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat"), ui_print("vendor recovered successfully."), abort("E2004: vendor partition fails to recover"));
endif;

# ---- start making changes here ----


# ---- radio update tasks ----

ui_print("Patching firmware images...");
package_extract_file("firmware-update/cmnlib64.mbn", "/dev/block/bootdevice/by-name/cmnlib64");
package_extract_file("firmware-update/imagefv.elf", "/dev/block/bootdevice/by-name/imagefv");
package_extract_file("firmware-update/cmnlib.mbn", "/dev/block/bootdevice/by-name/cmnlib");
package_extract_file("firmware-update/hyp.mbn", "/dev/block/bootdevice/by-name/hyp");
package_extract_file("firmware-update/BTFM.bin", "/dev/block/bootdevice/by-name/bluetooth");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tz");
package_extract_file("firmware-update/aop.mbn", "/dev/block/bootdevice/by-name/aop");
package_extract_file("firmware-update/xbl_config.elf", "/dev/block/bootdevice/by-name/xbl_config");
package_extract_file("firmware-update/storsec.mbn", "/dev/block/bootdevice/by-name/storsec");
package_extract_file("firmware-update/uefi_sec.mbn", "/dev/block/bootdevice/by-name/uefisecapp");
package_extract_file("firmware-update/NON-HLOS.bin", "/dev/block/bootdevice/by-name/modem");
package_extract_file("firmware-update/qupv3fw.elf", "/dev/block/bootdevice/by-name/qupfw");
package_extract_file("firmware-update/abl.elf", "/dev/block/bootdevice/by-name/abl");
package_extract_file("firmware-update/dspso.bin", "/dev/block/bootdevice/by-name/dsp");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfg");
package_extract_file("firmware-update/xbl.elf", "/dev/block/bootdevice/by-name/xbl");
package_extract_file("firmware-update/km4.mbn", "/dev/block/bootdevice/by-name/keymaster");
package_extract_file("firmware-update/cmnlib64.mbn", "/dev/block/bootdevice/by-name/cmnlib64bak");
package_extract_file("firmware-update/imagefv.elf", "/dev/block/bootdevice/by-name/imagefvbak");
package_extract_file("firmware-update/cmnlib.mbn", "/dev/block/bootdevice/by-name/cmnlibbak");
package_extract_file("firmware-update/hyp.mbn", "/dev/block/bootdevice/by-name/hypbak");
package_extract_file("firmware-update/tz.mbn", "/dev/block/bootdevice/by-name/tzbak");
package_extract_file("firmware-update/aop.mbn", "/dev/block/bootdevice/by-name/aopbak");
package_extract_file("firmware-update/xbl_config.elf", "/dev/block/bootdevice/by-name/xbl_configbak");
package_extract_file("firmware-update/uefi_sec.mbn", "/dev/block/bootdevice/by-name/uefisecappbak");
package_extract_file("firmware-update/qupv3fw.elf", "/dev/block/bootdevice/by-name/qupfwbak");
package_extract_file("firmware-update/abl.elf", "/dev/block/bootdevice/by-name/ablbak");
package_extract_file("firmware-update/devcfg.mbn", "/dev/block/bootdevice/by-name/devcfgbak");
package_extract_file("firmware-update/xbl.elf", "/dev/block/bootdevice/by-name/xblbak");
package_extract_file("firmware-update/km4.mbn", "/dev/block/bootdevice/by-name/keymasterbak");
ui_print("Patching system image after verification.");
show_progress(0.800000, 0);
block_image_update("/dev/block/bootdevice/by-name/system", package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat") ||
  abort("E1001: Failed to update system image.");
ui_print("Patching vendor image after verification.");
show_progress(0.100000, 0);
block_image_update("/dev/block/bootdevice/by-name/vendor", package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat") ||
  abort("E2001: Failed to update vendor image.");
ui_print("Patching boot image...");
show_progress(0.100000, 10);
patch_partition(concat("EMMC:","/dev/block/bootdevice/by-name/boot",":134217728:504843a128d5bd025cddbfb169dedd201f900058"),
                concat("EMMC:","/dev/block/bootdevice/by-name/boot",":134217728:994e02614dd5a7a7b18dbdaa11fefa0ca7a62dea"),
                package_extract_file("boot.img.p")) ||
    abort(concat(        "E3008: Failed to apply patch to ",concat("EMMC:","/dev/block/bootdevice/by-name/boot",":134217728:994e02614dd5a7a7b18dbdaa11fefa0ca7a62dea")));

# ---- radio update tasks 2 ----

ui_print("Patching vbmeta dtbo logo binimages...");
package_extract_file("firmware-update/dtbo.img", "/dev/block/bootdevice/by-name/dtbo");
package_extract_file("firmware-update/vbmeta.img", "/dev/block/bootdevice/by-name/vbmeta");
set_progress(1.000000);
