<?xml version="1.0" encoding="utf-8"?>
<!--
 * Copyright (C) 2022 The Android Open Source Project
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *      http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 -->

<resources>
    <string name="activityNotStartedException">Activity Failed to Start!</string>
    <string name="airplaneModeEnable">enable</string>
    <string name="airplaneModeDisable">disable</string>
    <string name="assumptionFailure">ServiceState Object or Bundle returned NULL</string>
    <string name="errorMessage">Device is vulnerable to b/210118427! hence any app with
        READ_PHONE_STATE permission can access Cell Location</string>
    <string name="failedToDisable">Failed to Disable Airplane mode!</string>
    <string name="failedToEnable">Failed to Enable Airplane mode!</string>
    <string name="failedToExecute">Failed to execute shell command!</string>
    <string name="failedToOpenApp">Failed to open the app!</string>
    <string name="getAirplaneModeStatus">settings get global airplane_mode_on</string>
    <string name="passMessage">Test Passed.Fix is present.</string>
    <string name="MESSAGE_KEY">MESSAGE</string>
    <string name="RESULT_KEY">RESULT</string>
    <string name="SHARED_PREFERENCE">CVE_2022_20115</string>
    <string name="serviceStateIntentExtra">android.intent.extra.SERVICE_STATE</string>
    <string name="sendBroadcast">cmd connectivity airplane-mode</string>
</resources>
