blob: 0fd17f5abce8390086bb3138da9f6082a13eb7a7 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<!--
* Copyright (C) 2022 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
-->
<resources>
<string name="activityNotStartedException">Activity Failed to Start!</string>
<string name="airplaneModeEnable">enable</string>
<string name="airplaneModeDisable">disable</string>
<string name="assumptionFailure">ServiceState Object or Bundle returned NULL</string>
<string name="errorMessage">Device is vulnerable to b/210118427! hence any app with
READ_PHONE_STATE permission can access Cell Location</string>
<string name="failedToDisable">Failed to Disable Airplane mode!</string>
<string name="failedToEnable">Failed to Enable Airplane mode!</string>
<string name="failedToExecute">Failed to execute shell command!</string>
<string name="failedToOpenApp">Failed to open the app!</string>
<string name="getAirplaneModeStatus">settings get global airplane_mode_on</string>
<string name="passMessage">Test Passed.Fix is present.</string>
<string name="MESSAGE_KEY">MESSAGE</string>
<string name="RESULT_KEY">RESULT</string>
<string name="SHARED_PREFERENCE">CVE_2022_20115</string>
<string name="serviceStateIntentExtra">android.intent.extra.SERVICE_STATE</string>
<string name="sendBroadcast">cmd connectivity airplane-mode</string>
</resources>