[privilege] - various fixes
authorTomasz Paciorek <t.paciorek@samsung.com>
Tue, 8 Oct 2013 09:12:32 +0000 (11:12 +0200)
committerTomasz Paciorek <t.paciorek@samsung.com>
Tue, 8 Oct 2013 09:12:32 +0000 (11:12 +0200)
Change-Id: I029543170fbcee8ea6db4cc4335324bb7975b06b

111 files changed:
tct-privilege-tizen-tests/configure.ac
tct-privilege-tizen-tests/privilege/AlarmManager_add.html
tct-privilege-tizen-tests/privilege/AlarmManager_remove.html
tct-privilege-tizen-tests/privilege/AlarmManager_removeAll.html
tct-privilege-tizen-tests/privilege/ApplicationManager_getAppCerts.html
tct-privilege-tizen-tests/privilege/ApplicationManager_getAppMetaData.html
tct-privilege-tizen-tests/privilege/ApplicationManager_kill.html
tct-privilege-tizen-tests/privilege/ApplicationManager_launch.html
tct-privilege-tizen-tests/privilege/ApplicationManager_launchAppControl.html
tct-privilege-tizen-tests/privilege/BluetoothManager_getDefaultAdapter.html
tct-privilege-tizen-tests/privilege/BookmarkManager_add.html
tct-privilege-tizen-tests/privilege/BookmarkManager_get.html
tct-privilege-tizen-tests/privilege/BookmarkManager_remove.html
tct-privilege-tizen-tests/privilege/CalendarEvent_expandRecurrence.html
tct-privilege-tizen-tests/privilege/CalendarManager_getCalendar.html
tct-privilege-tizen-tests/privilege/CalendarManager_getCalendars.html
tct-privilege-tizen-tests/privilege/CalendarManager_getDefaultCalendar.html
tct-privilege-tizen-tests/privilege/CalendarManager_getUnifiedCalendar.html
tct-privilege-tizen-tests/privilege/CallHistory_addChangeListener.html
tct-privilege-tizen-tests/privilege/CallHistory_find.html
tct-privilege-tizen-tests/privilege/CallHistory_remove.html
tct-privilege-tizen-tests/privilege/CallHistory_removeAll.html
tct-privilege-tizen-tests/privilege/CallHistory_removeBatch.html
tct-privilege-tizen-tests/privilege/CallHistory_removeChangeListener.html
tct-privilege-tizen-tests/privilege/ContactManager_addChangeListener.html
tct-privilege-tizen-tests/privilege/ContactManager_find.html
tct-privilege-tizen-tests/privilege/ContactManager_get.html
tct-privilege-tizen-tests/privilege/ContactManager_getAddressBook.html
tct-privilege-tizen-tests/privilege/ContactManager_getAddressBooks.html
tct-privilege-tizen-tests/privilege/ContactManager_getDefaultAddressBook.html
tct-privilege-tizen-tests/privilege/ContactManager_getUnififedAddressBook.html
tct-privilege-tizen-tests/privilege/ContactManager_remove.html
tct-privilege-tizen-tests/privilege/ContactManager_removeBatch.html
tct-privilege-tizen-tests/privilege/ContactManager_removeChangeListener.html
tct-privilege-tizen-tests/privilege/ContactManager_update.html
tct-privilege-tizen-tests/privilege/ContactManager_updateBatch.html
tct-privilege-tizen-tests/privilege/ContentManager_find.html
tct-privilege-tizen-tests/privilege/ContentManager_scanFile.html
tct-privilege-tizen-tests/privilege/ContentManager_setChangeListener.html
tct-privilege-tizen-tests/privilege/ContentManager_unsetChangeListener.html
tct-privilege-tizen-tests/privilege/ContentManager_update.html
tct-privilege-tizen-tests/privilege/ContentManager_updateBatch.html
tct-privilege-tizen-tests/privilege/DataControlManager_getDataControlConsumer.html
tct-privilege-tizen-tests/privilege/DataSynchronizationManager_add.html
tct-privilege-tizen-tests/privilege/DataSynchronizationManager_get.html
tct-privilege-tizen-tests/privilege/DataSynchronizationManager_getAll.html
tct-privilege-tizen-tests/privilege/DataSynchronizationManager_getLastSyncStatistics.html
tct-privilege-tizen-tests/privilege/DataSynchronizationManager_getMaxProfilesNum.html
tct-privilege-tizen-tests/privilege/DataSynchronizationManager_getProfilesNum.html
tct-privilege-tizen-tests/privilege/DataSynchronizationManager_remove.html
tct-privilege-tizen-tests/privilege/DataSynchronizationManager_startSync.html
tct-privilege-tizen-tests/privilege/DataSynchronizationManager_stopSync.html
tct-privilege-tizen-tests/privilege/DataSynchronizationManager_update.html
tct-privilege-tizen-tests/privilege/DownloadManager_start.html
tct-privilege-tizen-tests/privilege/FileSystemManager_addStorageStateChangeListener.html
tct-privilege-tizen-tests/privilege/FileSystemManager_getStorage.html
tct-privilege-tizen-tests/privilege/FileSystemManager_listStorages.html
tct-privilege-tizen-tests/privilege/FileSystemManager_removeStorageStateChangeListener.html
tct-privilege-tizen-tests/privilege/FileSystemManager_resolve.html
tct-privilege-tizen-tests/privilege/Makefile.am
tct-privilege-tizen-tests/privilege/MessageService_loadMessageAttachment.html
tct-privilege-tizen-tests/privilege/MessageService_loadMessageBody.html
tct-privilege-tizen-tests/privilege/MessageService_sendMessage.html
tct-privilege-tizen-tests/privilege/MessageService_sync.html
tct-privilege-tizen-tests/privilege/MessageService_syncFolder.html
tct-privilege-tizen-tests/privilege/MessageStorage_addConversationsChangeListener.html
tct-privilege-tizen-tests/privilege/MessageStorage_addDraftMessage.html
tct-privilege-tizen-tests/privilege/MessageStorage_addFoldersChangeListener.html
tct-privilege-tizen-tests/privilege/MessageStorage_addMessagesChangeListener.html
tct-privilege-tizen-tests/privilege/MessageStorage_findConversations.html
tct-privilege-tizen-tests/privilege/MessageStorage_findFolders.html
tct-privilege-tizen-tests/privilege/MessageStorage_findMessages.html
tct-privilege-tizen-tests/privilege/MessageStorage_removeChangeListener.html
tct-privilege-tizen-tests/privilege/MessageStorage_removeConversations.html
tct-privilege-tizen-tests/privilege/MessageStorage_removeMessages.html
tct-privilege-tizen-tests/privilege/MessageStorage_updateMessages.html
tct-privilege-tizen-tests/privilege/NFCManager_getDefaultAdapter.html
tct-privilege-tizen-tests/privilege/NFCManager_setExclusiveMode.html
tct-privilege-tizen-tests/privilege/NetworkBearerSelection_releaseRouteToHost.html
tct-privilege-tizen-tests/privilege/NetworkBearerSelection_requestRouteToHost.html
tct-privilege-tizen-tests/privilege/NotificationManager_post.html
tct-privilege-tizen-tests/privilege/NotificationManager_remove.html
tct-privilege-tizen-tests/privilege/NotificationManager_removeAll.html
tct-privilege-tizen-tests/privilege/NotificationManager_update.html
tct-privilege-tizen-tests/privilege/PackageManager_getPackageInfo.html
tct-privilege-tizen-tests/privilege/PackageManager_getPackagesInfo.html
tct-privilege-tizen-tests/privilege/PackageManager_install.html
tct-privilege-tizen-tests/privilege/PackageManager_setPackageInfoEventListener.html
tct-privilege-tizen-tests/privilege/PackageManager_uninstall.html
tct-privilege-tizen-tests/privilege/PackageManager_unsetPackageInfoEventListener.html
tct-privilege-tizen-tests/privilege/PowerManager_request.html
tct-privilege-tizen-tests/privilege/PowerManager_setScreenBrightness.html
tct-privilege-tizen-tests/privilege/PowerManager_turnScreenOff.html
tct-privilege-tizen-tests/privilege/PowerManager_turnScreenOn.html
tct-privilege-tizen-tests/privilege/PushManager_connectService.html
tct-privilege-tizen-tests/privilege/PushManager_disconnectService.html
tct-privilege-tizen-tests/privilege/PushManager_getRegistrationId.html
tct-privilege-tizen-tests/privilege/PushManager_registerService.html
tct-privilege-tizen-tests/privilege/PushManager_unregisterService.html
tct-privilege-tizen-tests/privilege/SEService_getReaders.html
tct-privilege-tizen-tests/privilege/SEService_registerSEListener.html
tct-privilege-tizen-tests/privilege/SEService_shutdown.html
tct-privilege-tizen-tests/privilege/SEService_unregisterSEListener.html
tct-privilege-tizen-tests/privilege/SystemInfoCellularNetwork_imei.html
tct-privilege-tizen-tests/privilege/SystemInfoDeviceCapability_nativeApiVersion.html
tct-privilege-tizen-tests/privilege/SystemInfoDeviceCapability_platformVersion.html
tct-privilege-tizen-tests/privilege/SystemInfoDeviceCapability_webApiVersion.html
tct-privilege-tizen-tests/privilege/SystemSettingManager_setProperty.html
tct-privilege-tizen-tests/privilege/WebSettingManager_removeAllCookies.html
tct-privilege-tizen-tests/privilege/support/Makefile.am [new file with mode: 0644]
tct-privilege-tizen-tests/privilege/support/unitcommon.js [new file with mode: 0644]

index ec01f30729dad2392bb649936bf7a9f3b8bc21fb..61d0270a4bbb6bf27673fd047d29828555f1a31f 100644 (file)
@@ -10,6 +10,6 @@ AM_INIT_AUTOMAKE([-Wall -Werror foreign])
 
 AC_CONFIG_FILES([Makefile \
 privilege/Makefile \
-resources/Makefile \
-testkit/Makefile])
+privilege/support/Makefile \
+resources/Makefile testkit/Makefile])
 AC_OUTPUT
index efc0c55d6aa6c4e34fb8ccbca56acb968c331354..696b01853a130f25677f7a2b864df74e72090996 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>AlarmManager_add_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: AlarmManager_add_check_privilege
-//==== LABEL: Check if method AlarmManager::add() is forbidden without proper privilege
+//==== LABEL Check if method AlarmManager::add() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Alarm:AlarmManager:add M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/alarm.html
 
@@ -43,7 +43,7 @@ test(function () {
     }, function () {
         tizen.alarm.add(alarm);
     });
-}, "AlarmManager_add");
+}, document.title);
 
 </script>
 </body>
index 8341c2e59f976ff8dfbfb96365520075d5c8bd72..ff830aecb730e9ce2209132ef1ab397dde919763 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>AlarmManager_remove_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: AlarmManager_remove_check_privilege
-//==== LABEL: Check if method AlarmManager::remove() is forbidden without proper privilege
+//==== LABEL Check if method AlarmManager::remove() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Alarm:AlarmManager:remove M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/alarm.html
 
@@ -42,7 +42,7 @@ test(function () {
     }, function () {
         tizen.alarm.remove();
     });
-}, "AlarmManager_remove");
+}, document.title);
 
 </script>
 </body>
index b1ad6389472b035bd2085bfc37fc1965e1330870..62496dfe4fd11b5e7d14fa01e8d6e9873ed09cee 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>AlarmManager_removeAll_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: AlarmManager_removeAll_check_privilege
-//==== LABEL: Check if method AlarmManager::removeAll() is forbidden without proper privilege
+//==== LABEL Check if method AlarmManager::removeAll() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Alarm:AlarmManager:removeAll M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/alarm.html
 
@@ -42,7 +42,7 @@ test(function () {
     }, function () {
         tizen.alarm.removeAll();
     });
-}, "AlarmManager_removeAll");
+}, document.title);
 
 </script>
 </body>
index a0975d7325a81d1819f0950a12d38cfd183b5041..108c0ab036990aa3f10bf2a95464e1a016b0d9b4 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>ApplicationManager_getAppCerts_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: ApplicationManager_getAppCerts_check_privilege
-//==== LABEL: Check if method ApplicationManager::getAppCerts() is forbidden without proper privilege
+//==== LABEL Check if method ApplicationManager::getAppCerts() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Application:ApplicationManager:getAppCerts M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/application.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.application.getAppCerts();
     });
-}, "ApplicationManager_getAppCerts");
+}, document.title);
 
 </script>
 </body>
index 4f1a22970ab643672b84315a7bddbb8a6944f262..bf12471aaca33d6c2bc03cdf4c06b3e08fe1e1e0 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>ApplicationManager_getAppMetaData_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: ApplicationManager_getAppMetaData_check_privilege
-//==== LABEL: Check if method ApplicationManager::getAppMetaData() is forbidden without proper privilege
+//==== LABEL Check if method ApplicationManager::getAppMetaData() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Application:ApplicationManager:getAppMetaData M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/application.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.application.getAppMetaData();
     });
-}, "ApplicationManager_getAppMetaData");
+}, document.title);
 
 </script>
 </body>
index ba28cb88651837e2b39d9ae396d180154330f26b..a89cdf4a37bd9bbb77e59d74ee1b8129d5537e01 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>ApplicationManager_kill_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: ApplicationManager_kill_check_privilege
-//==== LABEL: Check if method ApplicationManager::kill() is forbidden without proper privilege
+//==== LABEL Check if method ApplicationManager::kill() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Application:ApplicationManager:kill M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/application.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.application.kill();
     });
-}, "ApplicationManager_kill");
+}, document.title);
 
 </script>
 </body>
index ca060e7668b4bcf38b90334c02a4213678717dd1..82d5f2189fd2bbd9582a0b81af9775e971177e4f 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>ApplicationManager_launch_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: ApplicationManager_launch_check_privilege
-//==== LABEL: Check if method ApplicationManager::launch() is forbidden without proper privilege
+//==== LABEL Check if method ApplicationManager::launch() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Application:ApplicationManager:launch M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/application.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.application.launch();
     });
-}, "ApplicationManager_launch");
+}, document.title);
 
 </script>
 </body>
index 4b2d4b76661987332f36a74663a33d3eaa3ad2b1..88fde92590ea5f2e14891bce7deb04780bd9035c 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>ApplicationManager_launchAppControl_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: ApplicationManager_launchAppControl_check_privilege
-//==== LABEL: Check if method ApplicationManager::launchAppControl() is forbidden without proper privilege
+//==== LABEL Check if method ApplicationManager::launchAppControl() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Application:ApplicationManager:launchAppControl M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/application.html
 
@@ -41,7 +41,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.application.launchAppControl(app);
     });
-}, "ApplicationManager_launchAppControl");
+}, document.title);
 
 </script>
 </body>
index f3ffce770701ba65ed0b2d9e868087842ea76857..3f196bdeef593930e93c7a7f9e7dbf0cf17573fb 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>BluetoothManager_getDefaultAdapter_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: BluetoothManager_getDefaultAdapter_check_privilege
-//==== LABEL: Check if method BluetoothManager::getDefaultAdapter is forbidden without proper privilege
+//==== LABEL Check if method BluetoothManager::getDefaultAdapter is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Bluetooth:BluetoothManager:getDefaultAdapter M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/bluetooth.html
 test(function () {
@@ -47,7 +47,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.bluetooth.getDefaultAdapter();
     });
-}, "BluetoothManagerr_getDefaultAdapter");
+}, document.title);
 
 </script>
 </body>
index 2f92c212eb717c4bb81dbec19b9d7bc0537a7c20..df096d9f544214a6080b3461fb3dfba6fdaef527 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>BookmarkManager_add_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: BookmarkManager_add_check_privilege
-//==== LABEL: Check if method BookmarkManager::add() is forbidden without proper privilege
+//==== LABEL Check if method BookmarkManager::add() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Bookmark:BookmarkManager:add M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/bookmark.html
 
@@ -41,7 +41,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.bookmark.add(bookmark);
     });
-}, "BookmarkManager_add");
+}, document.title);
 
 </script>
 </body>
index 61b5872f151ad0d74cf3292ab2f49e13f83ed5c0..360ba2a5d3d1104b4cc02d9eb7f7f002a16927dc 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>BookmarkManager_get_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: BookmarkManager_get_check_privilege
-//==== LABEL: Check if method BookmarkManager::get() is forbidden without proper privilege
+//==== LABEL Check if method BookmarkManager::get() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Bookmark:BookmarkManager:get M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/bookmark.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.bookmark.get();
     });
-}, "BookmarkManager_get");
+}, document.title);
 
 </script>
 </body>
index 916aaab19d841126fa08f99fe38c77f28390533c..2876350f78ebe95edd18977c715487e1b167f80c 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>BookmarkManager_remove_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: BookmarkManager_remove_check_privilege
-//==== LABEL: Check if method BookmarkManager::remove() is forbidden without proper privilege
+//==== LABEL Check if method BookmarkManager::remove() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Bookmark:BookmarkManager:remove M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/bookmark.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.bookmark.remove();
     });
-}, "BookmarkManager_remove");
+}, document.title);
 
 </script>
 </body>
index 83f419c5d9a4a723300ad65beced08019f612249..8bb2efd4e8f4ed3172638f045e77d447b6478540 100644 (file)
@@ -24,7 +24,7 @@ Authors:
 <head>
 <title>CalendarEvent_expandRecurrence_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
@@ -32,7 +32,7 @@ Authors:
 <script>
 
 //==== TEST: CalendarEvent_expandRecurrence_check_privilege
-//==== LABEL check if method CalendarEvent::expandRecurrence() is denied without privilege
+//==== LABEL Check if method CalendarEvent::expandRecurrence() is denied without privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Calendar:CalendarEvent:expandRecurrence M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/calendar.html
 
@@ -49,7 +49,7 @@ test(function () {
     }, function () {
         calendar_event.expandRecurrence(calendar_event.startDate, calendar_event.endDate, function () {});
     });
-}, "CalendarEvent_expandRecurrence");
+}, document.title);
 
 </script>
 </body>
index c3f9117b1c875d330428874336e964576795ea44..cbc110c6386e77fbdf3b1218adcc1efcfe2b29ef 100644 (file)
@@ -24,7 +24,7 @@ Authors:
 <head>
 <title>CalendarManager_getCalendar_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
@@ -32,7 +32,7 @@ Authors:
 <script>
 
 //==== TEST: CalendarManager_getCalendar_check_privilege
-//==== LABEL check if method CalendarManager::getCalendar() is denied without privilege
+//==== LABEL Check if method CalendarManager::getCalendar() is denied without privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Calendar:CalendarManager:getCalendar M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/calendar.html
 
@@ -42,7 +42,7 @@ test(function () {
     }, function () {
         tizen.calendar.getCalendar("TASK", "x");
     });
-}, "CalendarManager_getCalendar");
+}, document.title);
 
 </script>
 </body>
index 1fabc13cbf53319df6601c938c87b644532d240d..a9bcf971164fba4bf962ec96d8ea467d2d430ecf 100644 (file)
@@ -24,7 +24,7 @@ Authors:
 <head>
 <title>CalendarManager_getCalendars_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
@@ -32,7 +32,7 @@ Authors:
 <script>
 
 //==== TEST: CalendarManager_getCalendars_check_privilege
-//==== LABEL check if method CalendarManager::getCalendars() is denied without privilege
+//==== LABEL Check if method CalendarManager::getCalendars() is denied without privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Calendar:CalendarManager:getCalendars M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/calendar.html
 test(function () {
@@ -41,7 +41,7 @@ test(function () {
     }, function () {
         tizen.calendar.getCalendars("TASK", function () {});
     });
-}, "CalendarManager_getCalendars");
+}, document.title);
 
 </script>
 </body>
index d38775552261a8b0d6ec285feb7c73149e14de2e..912ba90e220ae011175771d1c9e98f6ddfb1b1b1 100644 (file)
@@ -24,7 +24,7 @@ Authors:
 <head>
 <title>CalendarManager_getDefaultCalendar_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
@@ -32,7 +32,7 @@ Authors:
 <script>
 
 //==== TEST: CalendarManager_getDefaultCalendar_check_privilege
-//==== LABEL check if method CalendarManager::getDefaultCalendar() is denied without privilege
+//==== LABEL Check if method CalendarManager::getDefaultCalendar() is denied without privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Calendar:CalendarManager:getDefaultCalendar M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/calendar.html
 test(function () {
@@ -41,7 +41,7 @@ test(function () {
     }, function () {
         tizen.calendar.getDefaultCalendar("TASK");
     });
-}, "CalendarManager_getDefaultCalendar");
+}, document.title);
 
 </script>
 </body>
index f8af325a7ecc78cf2c6d09c0f94d29d0196ef46f..a01501f6d2b1241cc2885a4273ea315e4bfbd126 100644 (file)
@@ -24,7 +24,7 @@ Authors:
 <head>
 <title>CalendarManager_getUnifiedCalendar_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
@@ -32,7 +32,7 @@ Authors:
 <script>
 
 //==== TEST: CalendarManager_getUnifiedCalendar_check_privilege
-//==== LABEL check if method CalendarManager::getUnifiedCalendar() is denied without privilege
+//==== LABEL Check if method CalendarManager::getUnifiedCalendar() is denied without privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Calendar:CalendarManager:getUnifiedCalendar M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/calendar.html
 test(function () {
@@ -41,7 +41,7 @@ test(function () {
     }, function () {
         tizen.calendar.getUnifiedCalendar("EVENT");
     });
-}, "CalendarManager_getUnifiedCalendar");
+}, document.title);
 
 </script>
 </body>
index 3b8b8d1965a6c947c6f5f1458852ea220f636fb1..806415e3921fa3a4db6e615c15c01ff7ba145418 100644 (file)
@@ -25,21 +25,21 @@ Authors:
 <head>
 <title>CallHistory_addChangeListener_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: CallHistory_addChangeListener_check_privilege
-//==== LABEL: Check if method CallHistory::addChangeListener is forbidden without proper privilege
+//==== LABEL Check if method CallHistory::addChangeListener is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Callhistory:CallHistory:addChangeListener M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/callhistory.html
 test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.callhistory.addChangeListener({});
     });
-}, "CallHistory_addChangeListener");
+}, document.title);
 
 </script>
 </body>
index fd5a5886ea8f54d026cf5f494ebbe579d0bf7657..b89efbffa37bbaef84e5bd82477ece9def8106ab 100644 (file)
@@ -25,21 +25,21 @@ Authors:
 <head>
 <title>CallHistory_find_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: CallHistory_find_check_privilege
-//==== LABEL: Check if method CallHistory::find is forbidden without proper privilege
+//==== LABEL Check if method CallHistory::find is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Callhistory:CallHistory:find M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/callhistory.html
 test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.callhistory.find(function () {});
     });
-}, "CallHistory_find");
+}, document.title);
 
 </script>
 </body>
index b0165fd7b234cc0ceaaa19ed25098b26c2e02628..0e150eeb8daf6bc2e3881d05299a5fcf5d787821 100644 (file)
@@ -25,21 +25,21 @@ Authors:
 <head>
 <title>CallHistory_remove_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: CallHistory_remove_check_privilege
-//==== LABEL: Check if method CallHistory::remove is forbidden without proper privilege
+//==== LABEL Check if method CallHistory::remove is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Callhistory:CallHistory:remove M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/callhistory.html
 test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.callhistory.remove();
     });
-}, "CallHistory_remove");
+}, document.title);
 
 </script>
 </body>
index 315c94c980286ce3883a12d20a16d67d0eafe355..3c17a029b5409d8a433db0a7c583c6fd20238540 100644 (file)
@@ -25,21 +25,21 @@ Authors:
 <head>
 <title>CallHistory_removeAll_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: CallHistory_removeAll_check_privilege
-//==== LABEL: Check if method CallHistory::removeAll is forbidden without proper privilege
+//==== LABEL Check if method CallHistory::removeAll is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Callhistory:CallHistory:removeAll M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/callhistory.html
 test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.callhistory.removeAll();
     });
-}, "CallHistory_removeAll");
+}, document.title);
 
 </script>
 </body>
index 0bafe48a13032af4033c1014f4b4d5e519ddedf6..1d61312fa75c27267a890f8bc7bb8358c57fdaba 100644 (file)
@@ -25,21 +25,21 @@ Authors:
 <head>
 <title>CallHistory_removeBatch_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: CallHistory_removeBatch_check_privilege
-//==== LABEL: Check if method CallHistory::removeBatch is forbidden without proper privilege
+//==== LABEL Check if method CallHistory::removeBatch is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Callhistory:CallHistory:removeBatch M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/callhistory.html
 test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.callhistory.removeBatch([]);
     });
-}, "CallHistory_removeBatch");
+}, document.title);
 
 </script>
 </body>
index 5332dbdb308bd1d22c40632363b3c3f04efdd659..d9caaba97159c752355ff51838353a5e175225a1 100644 (file)
@@ -25,21 +25,21 @@ Authors:
 <head>
 <title>CallHistory_removeChangeListener_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: CallHistory_removeChangeListener_check_privilege
-//==== LABEL: Check if method CallHistory::removeChangeListener is forbidden without proper privilege
+//==== LABEL Check if method CallHistory::removeChangeListener is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Callhistory:CallHistory:removeChangeListener M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/callhistory.html
 test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.callhistory.removeChangeListener(1);
     });
-}, "CallHistory_removeChangeListener");
+}, document.title);
 
 </script>
 </body>
index 850065345a3550c05b7d4304e8486a8fdd307e17..c0e8fdc1f7c53173f02a028a77a36ad047d15de9 100644 (file)
@@ -24,7 +24,7 @@ Authors:
 <head>
 <title>ContactManager_addChangeListener_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
@@ -32,7 +32,7 @@ Authors:
 <script>
 
 //==== TEST: ContactManager_addChangeListener_check_privilege
-//==== LABEL check if method ContactManager::addChangeListener() is denied without privilege
+//==== LABEL Check if method ContactManager::addChangeListener() is denied without privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Contact:ContactManager:addChangeListener M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/contact.html
 test(function () {
@@ -41,7 +41,7 @@ test(function () {
     }, function () {
         tizen.contact.addChangeListener({"onpersonsadded": function () {}});
     });
-}, "ContactManager_addChangeListener");
+}, document.title);
 
 </script>
 </body>
index cb007aaaba45bd28cf167a63aa6ed84170f1c99d..2fa494acde236262c1721223d3ea6756d334d47a 100644 (file)
@@ -24,7 +24,7 @@ Authors:
 <head>
 <title>ContactManager_find_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
@@ -32,7 +32,7 @@ Authors:
 <script>
 
 //==== TEST: ContactManager_find_check_privilege
-//==== LABEL check if method ContactManager::find() is denied without privilege
+//==== LABEL Check if method ContactManager::find() is denied without privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Contact:ContactManager:find M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/contact.html
 test(function () {
@@ -41,7 +41,7 @@ test(function () {
     }, function () {
         tizen.contact.find(function () {});
     });
-}, "ContactManager_find");
+}, document.title);
 
 </script>
 </body>
index 4435958bf99171c62cdf7f80200030376f8dc6a8..c1524aa9ba35a398d1f9738bf01c7fc32c329a62 100644 (file)
@@ -24,7 +24,7 @@ Authors:
 <head>
 <title>ContactManager_get_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
@@ -32,7 +32,7 @@ Authors:
 <script>
 
 //==== TEST: ContactManager_get_check_privilege
-//==== LABEL check if method ContactManager::get() is denied without privilege
+//==== LABEL Check if method ContactManager::get() is denied without privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Contact:ContactManager:get M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/contact.html
 test(function () {
@@ -41,7 +41,7 @@ test(function () {
     }, function () {
         tizen.contact.get("1");
     });
-}, "ContactManager_get");
+}, document.title);
 
 </script>
 </body>
index 6e8cd14dac1301f438ca931aed2258bb13c4c74e..56488905c8acc00753155d41519c7aa650968edc 100644 (file)
@@ -24,7 +24,7 @@ Authors:
 <head>
 <title>ContactManager_getAddressBook_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
@@ -32,7 +32,7 @@ Authors:
 <script>
 
 //==== TEST: ContactManager_getAddressBook_check_privilege
-//==== LABEL check if method ContactManager::getAddressBook() is denied without privilege
+//==== LABEL Check if method ContactManager::getAddressBook() is denied without privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Contact:ContactManager:getAddressBook M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/contact.html
 test(function () {
@@ -42,7 +42,7 @@ test(function () {
     }, function () {
         tizen.contact.getAddressBook("1");
     });
-}, "ContactManager_getAddressBook");
+}, document.title);
 
 </script>
 </body>
index 73203b07955bd3dd027da5f493614351c0255dfd..4ad219ba490867d4454bccc6c55f24cb879ebecf 100644 (file)
@@ -24,7 +24,7 @@ Authors:
 <head>
 <title>ContactManager_getAddressBooks_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
@@ -32,7 +32,7 @@ Authors:
 <script>
 
 //==== TEST: ContactManager_getAddressBooks_check_privilege
-//==== LABEL check if method ContactManager::getAddressBooks() is denied without privilege
+//==== LABEL Check if method ContactManager::getAddressBooks() is denied without privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Contact:ContactManager:getAddressBooks M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/contact.html
 test(function () {
@@ -41,7 +41,7 @@ test(function () {
     }, function () {
         tizen.contact.getAddressBooks(function () {});
     });
-}, "ContactManager_getAddressBooks");
+}, document.title);
 
 </script>
 </body>
index aa14c47db232a9686667b23e178802e35a3c0810..74f941d00ebf86831276954022a1b2320e669bfb 100644 (file)
@@ -24,7 +24,7 @@ Authors:
 <head>
 <title>ContactManager_getDefaultAddressBook_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
@@ -32,7 +32,7 @@ Authors:
 <script>
 
 //==== TEST: ContactManager_getDefaultAddressBook_check_privilege
-//==== LABEL check if method ContactManager::getDefaultAddressBook() is denied without privilege
+//==== LABEL Check if method ContactManager::getDefaultAddressBook() is denied without privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Contact:ContactManager:getDefaultAddressBook M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/contact.html
 test(function () {
@@ -41,7 +41,7 @@ test(function () {
     }, function () {
         tizen.contact.getDefaultAddressBook();
     });
-}, "ContactManager_getDefaultAddressBook");
+}, document.title);
 
 </script>
 </body>
index 41ea3374008f8c8c7391b56406205bfd34ddfb38..4f0f43c503bd2c4fadcaaeeacecdc3f2f87864d1 100644 (file)
@@ -24,7 +24,7 @@ Authors:
 <head>
 <title>ContactManager_getUnifiedAddressBook_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
@@ -32,7 +32,7 @@ Authors:
 <script>
 
 //==== TEST: ContactManager_getUnifiedAddressBook_check_privilege
-//==== LABEL check if method ContactManager::getUnifiedAddressBook() is denied without privilege
+//==== LABEL Check if method ContactManager::getUnifiedAddressBook() is denied without privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Contact:ContactManager:getUnifiedAddressBook M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/contact.html
 test(function () {
@@ -41,7 +41,7 @@ test(function () {
     }, function () {
         tizen.contact.getUnifiedAddressBook();
     });
-}, "ContactManager_getUnifiedAddressBook");
+}, document.title);
 
 </script>
 </body>
index 9a5bc13a5a64b72772f31f90878e98f8e3386a8f..c32d9ef0c276f720edb4ccfcdad8e9d7960654fb 100644 (file)
@@ -24,7 +24,7 @@ Authors:
 <head>
 <title>ContactManager_remove_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
@@ -32,7 +32,7 @@ Authors:
 <script>
 
 //==== TEST: ContactManager_remove_check_privilege
-//==== LABEL check if method ContactManager::remove() is denied without privilege
+//==== LABEL Check if method ContactManager::remove() is denied without privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Contact:ContactManager:remove M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/contact.html
 test(function () {
@@ -41,7 +41,7 @@ test(function () {
     }, function () {
         tizen.contact.remove("1");
     });
-}, "ContactManager_remove");
+}, document.title);
 
 </script>
 </body>
index e90af79ab5cf7e59f14e6708df3a71781aac8192..2eb9e814b109410f593532668bdc319e967a040a 100644 (file)
@@ -24,7 +24,7 @@ Authors:
 <head>
 <title>ContactManager_removeBatch_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
@@ -32,7 +32,7 @@ Authors:
 <script>
 
 //==== TEST: ContactManager_removeBatch_check_privilege
-//==== LABEL check if method ContactManager::removeBatch() is denied without privilege
+//==== LABEL Check if method ContactManager::removeBatch() is denied without privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Contact:ContactManager:removeBatch M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/contact.html
 test(function () {
@@ -41,7 +41,7 @@ test(function () {
     }, function () {
         tizen.contact.removeBatch([]);
     });
-}, "ContactManager_removeBatch");
+}, document.title);
 
 </script>
 </body>
index e9ceffa79b8c734a198ef916f64ad01559bc9525..0ea0d4fa6facf0d5787e50ea74ebd1bf14ca98ed 100644 (file)
@@ -24,7 +24,7 @@ Authors:
 <head>
 <title>ContactManager_removeChangeListener_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
@@ -32,7 +32,7 @@ Authors:
 <script>
 
 //==== TEST: ContactManager_removeChangeListener_check_privilege
-//==== LABEL check if method ContactManager::removeChangeListener() is denied without privilege
+//==== LABEL Check if method ContactManager::removeChangeListener() is denied without privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Contact:ContactManager:removeChangeListener M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/contact.html
 test(function () {
@@ -41,7 +41,7 @@ test(function () {
     }, function () {
         tizen.contact.removeChangeListener(1);
     });
-}, "ContactManager_removeChangeListener");
+}, document.title);
 
 </script>
 </body>
index b60427bcb41ab73421dc77e742ae5c5a32fd37be..fa6317bd3b08ef512ce33ef8e56167593ea34059 100644 (file)
@@ -24,7 +24,7 @@ Authors:
 <head>
 <title>ContactManager_update_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
@@ -32,7 +32,7 @@ Authors:
 <script>
 
 //==== TEST: ContactManager_update_check_privilege
-//==== LABEL check if method ContactManager::update() is denied without privilege
+//==== LABEL Check if method ContactManager::update() is denied without privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Contact:ContactManager:update M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/contact.html
 test(function () {
@@ -41,7 +41,7 @@ test(function () {
     }, function () {
         tizen.contact.update();
     });
-}, "ContactManager_update");
+}, document.title);
 
 </script>
 </body>
index 4d2cbec82b0242034a3bed80864e2165ea0855b5..be4a280a92fef8b50851564e0f0ca0b76854f92f 100644 (file)
@@ -24,7 +24,7 @@ Authors:
 <head>
 <title>ContactManager_updateBatch_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
@@ -32,7 +32,7 @@ Authors:
 <script>
 
 //==== TEST: ContactManager_updateBatch_check_privilege
-//==== LABEL check if method ContactManager::updateBatch() is denied without privilege
+//==== LABEL Check if method ContactManager::updateBatch() is denied without privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Contact:ContactManager:updateBatch M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/contact.html
 test(function () {
@@ -41,7 +41,7 @@ test(function () {
     }, function () {
         tizen.contact.updateBatch([]);
     });
-}, "ContactManager_updateBatch");
+}, document.title);
 
 </script>
 </body>
index d444f37d50198ccaed0a2c502f4a20a03c7c4a35..5052d351b866e6e2b98ba32384de63ac3baa1de7 100644 (file)
@@ -24,7 +24,7 @@ Authors:
 <head>
 <title>ContentManager_find_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
@@ -32,7 +32,7 @@ Authors:
 <script>
 
 //==== TEST: ContentManager_find_check_privilege
-//==== LABEL check if method ContentManager::find() is denied without privilege
+//==== LABEL Check if method ContentManager::find() is denied without privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Content:ContentManager:find M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/content.html
 test(function () {
@@ -41,7 +41,7 @@ test(function () {
     }, function () {
         tizen.content.find(function () {});
     });
-}, "ContentManager_find");
+}, document.title);
 
 </script>
 </body>
index bd890a191108f862fd8ef8f52db7e5e7fc3989ff..338e117b9a20387540a3fbd5ca740718d2c07d9a 100644 (file)
@@ -24,7 +24,7 @@ Authors:
 <head>
 <title>ContentManager_scanFile_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
@@ -32,7 +32,7 @@ Authors:
 <script>
 
 //==== TEST: ContentManager_scanFile_check_privilege
-//==== LABEL check if method ContentManager::scanFile() is denied without privilege
+//==== LABEL Check if method ContentManager::scanFile() is denied without privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Content:ContentManager:scanFile M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/content.html
 test(function () {
@@ -41,7 +41,7 @@ test(function () {
     }, function () {
         tizen.content.scanFile("/opt/usr/media");
     });
-}, "ContentManager_scanFile");
+}, document.title);
 
 </script>
 </body>
index 8a06e67ab0b9e506ccdc1490734555f527d72083..76043ef1ba4a8ea984b12bdd368408fa5455a140 100644 (file)
@@ -24,7 +24,7 @@ Authors:
 <head>
 <title>ContentManager_setChangeListener_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
@@ -32,7 +32,7 @@ Authors:
 <script>
 
 //==== TEST: ContentManager_setChangeListener_check_privilege
-//==== LABEL check if method ContentManager::setChangeListener() is denied without privilege
+//==== LABEL Check if method ContentManager::setChangeListener() is denied without privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Content:ContentManager:setChangeListener M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/content.html
 test(function () {
@@ -41,7 +41,7 @@ test(function () {
     }, function () {
         tizen.content.setChangeListener({});
     });
-}, "ContentManager_setChangeListener");
+}, document.title);
 
 </script>
 </body>
index 3168136f6ae11ae94596c27136f149aa78bf47fe..d5bf53c6bc7f8807e38e4c07e6cc6a3a99ecba36 100644 (file)
@@ -24,7 +24,7 @@ Authors:
 <head>
 <title>ContentManager_unsetChangeListener_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
@@ -32,7 +32,7 @@ Authors:
 <script>
 
 //==== TEST: ContentManager_unsetChangeListener_check_privilege
-//==== LABEL check if method ContentManager::unsetChangeListener() is denied without privilege
+//==== LABEL Check if method ContentManager::unsetChangeListener() is denied without privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Content:ContentManager:unsetChangeListener M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/content.html
 test(function () {
@@ -41,7 +41,7 @@ test(function () {
     }, function () {
         tizen.content.unsetChangeListener();
     });
-}, "ContentManager_unsetChangeListener");
+}, document.title);
 
 </script>
 </body>
index 320d46b26ed11b69adf9c3aa00cb3bb79bd250dc..bcc9dd7585fe919171e8b927b6aefe068405a9ed 100644 (file)
@@ -24,7 +24,7 @@ Authors:
 <head>
 <title>ContentManager_update_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
@@ -32,7 +32,7 @@ Authors:
 <script>
 
 //==== TEST: ContentManager_update_check_privilege
-//==== LABEL check if method ContentManager::update() is denied without privilege
+//==== LABEL Check if method ContentManager::update() is denied without privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Content:ContentManager:update M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/content.html
 test(function () {
@@ -41,7 +41,7 @@ test(function () {
     }, function () {
         tizen.content.update();
     });
-}, "ContentManager_update");
+}, document.title);
 
 </script>
 </body>
index 5a84ffb7764a3a59ce4db75ea1b8afdda02fa3e9..c76054816014bb4cd85851bec6f1f62965220628 100644 (file)
@@ -24,7 +24,7 @@ Authors:
 <head>
 <title>ContentManager_updateBatch_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
@@ -32,7 +32,7 @@ Authors:
 <script>
 
 //==== TEST: ContentManager_updateBatch_check_privilege
-//==== LABEL check if method ContentManager::updateBatch() is denied without privilege
+//==== LABEL Check if method ContentManager::updateBatch() is denied without privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Content:ContentManager:updateBatch M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/content.html
 test(function () {
@@ -41,7 +41,7 @@ test(function () {
     }, function () {
         tizen.content.updateBatch([]);
     });
-}, "ContentManager_updateBatch");
+}, document.title);
 
 </script>
 </body>
index b64ff18915ecb3401975352ebab63fc1c0048770..fc0ff46977922f3cd123fe1d8b39acbe38193b30 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>DataControlManager_getDataControlConsumer_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: DataControlManager_getDataControlConsumer_check_privilege
-//==== LABEL: Check if method DataControlManager::getDataControlConsumer() is forbidden without proper privilege
+//==== LABEL Check if method DataControlManager::getDataControlConsumer() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Datacontrol:DataControlManager:getDataControlConsumer M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/datacontrol.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.datacontrol.getDataControlConsumer("providerId", "dataId", "SQL");
     });
-}, "DataControlManager_getDataControlConsumer");
+}, document.title);
 
 </script>
 </body>
index 033d4f8759b0e546a9fdbeca77408fac33dad243..f04fde6d0a2c471176eedb8c130164dcb6a4538a 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>DataSynchronizationManager_add_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: DataSynchronizationManager_add_check_privilege
-//==== LABEL: Check if method DataSynchronizationManager::add() is forbidden without proper privilege
+//==== LABEL Check if method DataSynchronizationManager::add() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Datasync:DataSynchronizationManager:add M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/datasync.html
 
@@ -41,7 +41,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.datasync.add(profile);
     });
-}, "DataSynchronizationManager_add");
+}, document.title);
 
 </script>
 </body>
index cabde738a4fd8c88dc5c7a8be3d88e32f2b8f830..e53dd561ab71da938b8a165112866f7d50c8e13a 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>DataSynchronizationManager_get_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: DataSynchronizationManager_get_check_privilege
-//==== LABEL: Check if method DataSynchronizationManager::get() is forbidden without proper privilege
+//==== LABEL Check if method DataSynchronizationManager::get() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Datasync:DataSynchronizationManager:get M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/datasync.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.datasync.get("profileId");
     });
-}, "DataSynchronizationManager_get");
+}, document.title);
 
 </script>
 </body>
index 799cc3254dfac911a1a220ea73545eef2f8c1ec5..264868e80e590769b02e3474a697d9b6f5f47f02 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>DataSynchronizationManager_getAll_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: DataSynchronizationManager_getAll_check_privilege
-//==== LABEL: Check if method DataSynchronizationManager::getAll() is forbidden without proper privilege
+//==== LABEL Check if method DataSynchronizationManager::getAll() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Datasync:DataSynchronizationManager:getAll M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/datasync.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.datasync.getAll();
     });
-}, "DataSynchronizationManager_getAll");
+}, document.title);
 
 </script>
 </body>
index 9bb801ad8f55d9204c02fff2fdf79ad70844a077..9928302f8bcc6515746b5dd0969516022d051035 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>DataSynchronizationManager_getLastSyncStatistics_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: DataSynchronizationManager_getLastSyncStatistics_check_privilege
-//==== LABEL: Check if method DataSynchronizationManager::getLastSyncStatistics() is forbidden without proper privilege
+//==== LABEL Check if method DataSynchronizationManager::getLastSyncStatistics() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Datasync:DataSynchronizationManager:getLastSyncStatistics M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/datasync.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.datasync.getLastSyncStatistics("profileId");
     });
-}, "DataSynchronizationManager_getLastSyncStatistics");
+}, document.title);
 
 </script>
 </body>
index 92b3aefee24384b3b9fa2c9e88933aa2334fc266..c2cab6e63998ac74d9ab929a628e62f31ce1c5da 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>DataSynchronizationManager_getMaxProfilesNum_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: DataSynchronizationManager_getMaxProfilesNum_check_privilege
-//==== LABEL: Check if method DataSynchronizationManager::getMaxProfilesNum() is forbidden without proper privilege
+//==== LABEL Check if method DataSynchronizationManager::getMaxProfilesNum() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Datasync:DataSynchronizationManager:getMaxProfilesNum M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/datasync.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.datasync.getMaxProfilesNum();
     });
-}, "DataSynchronizationManager_getMaxProfilesNum");
+}, document.title);
 
 </script>
 </body>
index a04053c77b881b999afbfe4b42e2e91c2bf2ec10..545e154863b15cb49a1975e52ad14a7a7f17ae3c 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>DataSynchronizationManager_getProfilesNum_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: DataSynchronizationManager_getProfilesNum_check_privilege
-//==== LABEL: Check if method DataSynchronizationManager::getProfilesNum() is forbidden without proper privilege
+//==== LABEL Check if method DataSynchronizationManager::getProfilesNum() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Datasync:DataSynchronizationManager:getProfilesNum M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/datasync.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.datasync.getProfilesNum();
     });
-}, "DataSynchronizationManager_getProfilesNum");
+}, document.title);
 
 </script>
 </body>
index e358871b056f9caa6899187b0ce947ed06339732..46ebf7c0de95aee6da1e438f60e6aeaf226a5996 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>DataSynchronizationManager_remove_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: DataSynchronizationManager_remove_check_privilege
-//==== LABEL: Check if method DataSynchronizationManager::remove() is forbidden without proper privilege
+//==== LABEL Check if method DataSynchronizationManager::remove() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Datasync:DataSynchronizationManager:remove M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/datasync.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.datasync.remove("profileId");
     });
-}, "DataSynchronizationManager_remove");
+}, document.title);
 
 </script>
 </body>
index f169d14aa147cba9faf1672b547f39fdb07616ca..a30e70403cb61494467ca8f9ab38741447082a90 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>DataSynchronizationManager_startSync_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: DataSynchronizationManager_startSync_check_privilege
-//==== LABEL: Check if method DataSynchronizationManager::startSync() is forbidden without proper privilege
+//==== LABEL Check if method DataSynchronizationManager::startSync() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Datasync:DataSynchronizationManager:startSync M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/datasync.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.datasync.startSync("profileId");
     });
-}, "DataSynchronizationManager_startSync");
+}, document.title);
 
 </script>
 </body>
index 6c6540a44f6f2fe59d1b7914c98afaac33701a09..3cb7b0e7cd57330c336bded272f86e6c9c86386d 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>DataSynchronizationManager_stopSync_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: DataSynchronizationManager_stopSync_check_privilege
-//==== LABEL: Check if method DataSynchronizationManager::stopSync() is forbidden without proper privilege
+//==== LABEL Check if method DataSynchronizationManager::stopSync() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Datasync:DataSynchronizationManager:stopSync M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/datasync.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.datasync.stopSync("profileId");
     });
-}, "DataSynchronizationManager_stopSync");
+}, document.title);
 
 </script>
 </body>
index 93eadc5cb36aae46cc2b8ab9b1b002609c9c23a5..13686ade3c2ec9b6c87dd6fa5efbe977c6179177 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>DataSynchronizationManager_update_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: DataSynchronizationManager_update_check_privilege
-//==== LABEL: Check if method DataSynchronizationManager::update() is forbidden without proper privilege
+//==== LABEL Check if method DataSynchronizationManager::update() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Datasync:DataSynchronizationManager:update M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/datasync.html
 
@@ -41,7 +41,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.datasync.update(profile);
     });
-}, "DataSynchronizationManager_update");
+}, document.title);
 
 </script>
 </body>
index bc5f92dff835e636d0f3065935ff5a8ad9779818..f0f6cdc3e023eebce0c035e2aad62b284caa2d40 100644 (file)
@@ -24,7 +24,7 @@ Authors:
 <head>
 <title>DownloadManager_start_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
@@ -32,7 +32,7 @@ Authors:
 <script>
 
 //==== TEST: DownloadManager_start_check_privilege
-//==== LABEL check if method DownloadManager::start() is denied without privilege
+//==== LABEL Check if method DownloadManager::start() is denied without privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Download:DownloadManager:start M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/download.html
 test(function () {
@@ -42,7 +42,7 @@ test(function () {
     }, function () {
         tizen.download.start(request);
     });
-}, "DownloadManager_start");
+}, document.title);
 
 </script>
 </body>
index 4f946dbf70a9f3808ae869d85576dab72daf1ed6..9a5de3b8ddb26df9b010a484e55bca59c911842c 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>FileSystemManager_addStorageStateChangeListener_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: FileSystemManager_addStorageStateChangeListener_check_privilege
-//==== LABEL: Check if method FileSystemManager::addStorageStateChangeListener() is forbidden without proper privilege
+//==== LABEL Check if method FileSystemManager::addStorageStateChangeListener() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Filesystem:FileSystemManager:addStorageStateChangeListener M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/filesystem.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.filesystem.addStorageStateChangeListener(function () {});
     });
-}, "FileSystemManager_addStorageStateChangeListener");
+}, document.title);
 
 </script>
 </body>
index 5982cf18e94f0b1eeae040a1c9d20fc912dd366f..c762c31e8fc4854d6f45a0e253c545e5e699466f 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>FileSystemManager_getStorage_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: FileSystemManager_getStorage_check_privilege
-//==== LABEL: Check if method FileSystemManager::getStorage() is forbidden without proper privilege
+//==== LABEL Check if method FileSystemManager::getStorage() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Filesystem:FileSystemManager:getStorage M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/filesystem.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.filesystem.getStorage("label", function () {});
     });
-}, "FileSystemManager_getStorage");
+}, document.title);
 
 </script>
 </body>
index 49b00f05cc087332597439cf576d0c68e7b9b82d..808d086b022246657a1c4787f2f3199904bc7a49 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>FileSystemManager_listStorages_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: FileSystemManager_listStorages_check_privilege
-//==== LABEL: Check if method FileSystemManager::listStorages() is forbidden without proper privilege
+//==== LABEL Check if method FileSystemManager::listStorages() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Filesystem:FileSystemManager:listStorages M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/filesystem.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.filesystem.listStorages(function () {});
     });
-}, "FileSystemManager_listStorages");
+}, document.title);
 
 </script>
 </body>
index 9ba1aba4bcbbf81600f616dd24066e24159a640b..b185cc0e5bc09978fb40e8c0d8c19b4456c925e2 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>FileSystemManager_removeStorageStateChangeListener_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: FileSystemManager_removeStorageStateChangeListener_check_privilege
-//==== LABEL: Check if method FileSystemManager::removeStorageStateChangeListener() is forbidden without proper privilege
+//==== LABEL Check if method FileSystemManager::removeStorageStateChangeListener() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Filesystem:FileSystemManager:removeStorageStateChangeListener M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/filesystem.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.filesystem.removeStorageStateChangeListener(3);
     });
-}, "FileSystemManager_removeStorageStateChangeListener");
+}, document.title);
 
 </script>
 </body>
index 872994f6d3f0e1e1e220969b383d768970585aa8..534f2688b2b868bd5046a7d3e2ae69750e517280 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>FileSystemManager_resolve_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: FileSystemManager_resolve_check_privilege
-//==== LABEL: Check if method FileSystemManager::resolve() is forbidden without proper privilege
+//==== LABEL Check if method FileSystemManager::resolve() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Filesystem:FileSystemManager:resolve M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/filesystem.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.filesystem.resolve("music", function () {});
     });
-}, "FileSystemManager_resolve");
+}, document.title);
 
 </script>
 </body>
index 7e9611164329bba1abb3e6ca2cf75f60bf58541a..00ca0abc3fb30ef52af6913935b30808f903ada7 100644 (file)
@@ -1,3 +1,4 @@
-worker_DATA = *
-workerdir = /opt/tct-privilege-tizen-tests/privilege
-EXTRA_DIST = $(worker_DATA)
+SUBDIRS = support
+privilege_DATA = *.html
+privilegedir = /opt/tct-privilege-tizen-tests/privilege
+EXTRA_DIST = $(privilege_DATA)
index 7ee46ee3a372f2bf3d279626bf1cb36839f0c63b..ce935fa1952bee3185b3cddeec70e4a35a7c8152 100644 (file)
@@ -25,21 +25,19 @@ Authors:
 <head>
 <title>MessageService_loadMessageAttachment_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: MessageService_loadMessageAttachment_check_privilege
-//==== LABEL: Check if method MessageService::loadMessageAttachment() is forbidden without proper privilege
+//==== LABEL Check if method MessageService::loadMessageAttachment() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Messaging:MessageService:loadMessageAttachment M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/messaging.html
 
-var t = async_test("MessageService_loadMessageAttachment");
+var t = async_test(document.title), service, onService, onServiceError, attachment = new tizen.MessageAttachment("path");
 t.step(function () {
-    var service, onService, onServiceError,
-        attachment = new tizen.MessageAttachment("path");
     onService = t.step_func(function (services) {
         assert_true(services.length > 0, "services list is empty");
         service = services[0];
index 6d93b9609455dadb22ae5859c734164d3269af78..52fc7afe988317df58a3b8b00fba7c8ef52a7f70 100644 (file)
@@ -25,21 +25,19 @@ Authors:
 <head>
 <title>MessageService_loadMessageBody_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: MessageService_loadMessageBody_check_privilege
-//==== LABEL: Check if method MessageService::loadMessageBody() is forbidden without proper privilege
+//==== LABEL Check if method MessageService::loadMessageBody() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Messaging:MessageService:loadMessageBody M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/messaging.html
 
-var t = async_test("MessageService_loadMessageBody");
+var t = async_test(document.title), service, onService, onServiceError, message = new tizen.Message("messaging.sms");
 t.step(function () {
-    var service, onService, onServiceError,
-        message = new tizen.Message("messaging.sms");
     onService = t.step_func(function (services) {
         assert_true(services.length > 0, "services list is empty");
         service = services[0];
index bde8449fb0eb4d85f77938c587eb06fe8d6facd3..fb5a67c479f5dfa3c913ec35f9169cde624eab4a 100644 (file)
@@ -25,21 +25,19 @@ Authors:
 <head>
 <title>MessageService_sendMessage_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: MessageService_sendMessage_check_privilege
-//==== LABEL: Check if method MessageService::sendMessage() is forbidden without proper privilege
+//==== LABEL Check if method MessageService::sendMessage() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Messaging:MessageService:sendMessage M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/messaging.html
 
-var t = async_test("MessageService_sendMessage");
+var t = async_test(document.title), service, onService, onServiceError, message = new tizen.Message("messaging.sms");
 t.step(function () {
-    var service, onService, onServiceError,
-        message = new tizen.Message("messaging.sms");
     onService = t.step_func(function (services) {
         assert_true(services.length > 0, "services list is empty");
         service = services[0];
index f7f3942830f4e86bdf16cf6df0ac7fd112d810bf..d1e11ab7f0aa88df199a8669e9f78fa61ed6d1ba 100644 (file)
@@ -25,20 +25,19 @@ Authors:
 <head>
 <title>MessageService_sync_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: MessageService_sync_check_privilege
-//==== LABEL: Check if method MessageService::sync() is forbidden without proper privilege
+//==== LABEL Check if method MessageService::sync() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Messaging:MessageService:sync M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/messaging.html
 
-var t = async_test("MessageService_sync");
+var t = async_test(document.title), service, onService, onServiceError;
 t.step(function () {
-    var service, onService, onServiceError;
     onService = t.step_func(function (services) {
         assert_true(services.length > 0, "services list is empty");
         service = services[0];
index 0b0a552e603247ad2293d802108c24cde503064c..a426d85ae8eccded57e540eaceb4b87068a789a2 100644 (file)
@@ -25,20 +25,19 @@ Authors:
 <head>
 <title>MessageService_syncFolder_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: MessageService_syncFolder_check_privilege
-//==== LABEL: Check if method MessageService::syncFolder() is forbidden without proper privilege
+//==== LABEL Check if method MessageService::syncFolder() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Messaging:MessageService:syncFolder M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/messaging.html
 
-var t = async_test("MessageService_syncFolder");
+var t = async_test(document.title), service, onService, onServiceError;
 t.step(function () {
-    var service, onService, onServiceError;
     onService = t.step_func(function (services) {
         assert_true(services.length > 0, "services list is empty");
         service = services[0];
index 9775d1d1d4a4cc7e2f166b55c4120b2a36f72bb0..2abd892811d7e1aef28ffe3e1f71ac3a6e8240cf 100644 (file)
@@ -25,20 +25,19 @@ Authors:
 <head>
 <title>MessageStorage_addConversationsChangeListener_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: MessageStorage_addConversationsChangeListener_check_privilege
-//==== LABEL: Check if method MessageStorage::addConversationsChangeListener() is forbidden without proper privilege
+//==== LABEL Check if method MessageStorage::addConversationsChangeListener() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Messaging:MessageStorage:addConversationsChangeListener M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/messaging.html
 
-var t = async_test("MessageStorage_addConversationsChangeListener");
+var t = async_test(document.title), service, storage, onService, onServiceError;
 t.step(function () {
-    var service, storage, onService, onServiceError;
     onService = t.step_func(function (services) {
         assert_true(services.length > 0, "services list is empty");
         service = services[0];
index d308846a0e64fbe69841336d61dd8b114981438d..018dfca34f2e395f9e0484edebde319175ae0bb8 100644 (file)
@@ -25,21 +25,19 @@ Authors:
 <head>
 <title>MessageStorage_addDraftMessage_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: MessageStorage_addDraftMessage_check_privilege
-//==== LABEL: Check if method MessageStorage::addDraftMessage() is forbidden without proper privilege
+//==== LABEL Check if method MessageStorage::addDraftMessage() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Messaging:MessageStorage:addDraftMessage M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/messaging.html
 
-var t = async_test("MessageStorage_addDraftMessage");
+var t = async_test(document.title), service, storage, onService, onServiceError, message = new tizen.Message("messaging.sms");
 t.step(function () {
-    var service, storage, onService, onServiceError,
-        message = new tizen.Message("messaging.sms");
     onService = t.step_func(function (services) {
         assert_true(services.length > 0, "services list is empty");
         service = services[0];
index aec6ca7d44bddab876c703bae0ccd49fcae1111a..b3e4243e81753eed690af869928adc346d956658 100644 (file)
@@ -25,20 +25,19 @@ Authors:
 <head>
 <title>MessageStorage_addFoldersChangeListener_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: MessageStorage_addFoldersChangeListener_check_privilege
-//==== LABEL: Check if method MessageStorage::addFoldersChangeListener() is forbidden without proper privilege
+//==== LABEL Check if method MessageStorage::addFoldersChangeListener() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Messaging:MessageStorage:addFoldersChangeListener M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/messaging.html
 
-var t = async_test("MessageStorage_addFoldersChangeListener");
+var t = async_test(document.title), service, storage, onService, onServiceError;
 t.step(function () {
-    var service, storage, onService, onServiceError;
     onService = t.step_func(function (services) {
         assert_true(services.length > 0, "services list is empty");
         service = services[0];
index 89d07a0720f55fc66268730943f52d979501277c..0d32fbc180dd7c8357be7e6e5ab9c66cd28a2d95 100644 (file)
@@ -25,20 +25,19 @@ Authors:
 <head>
 <title>MessageStorage_addMessagesChangeListener_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: MessageStorage_addMessagesChangeListener_check_privilege
-//==== LABEL: Check if method MessageStorage::addMessagesChangeListener() is forbidden without proper privilege
+//==== LABEL Check if method MessageStorage::addMessagesChangeListener() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Messaging:MessageStorage:addMessagesChangeListener M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/messaging.html
 
-var t = async_test("MessageStorage_addMessagesChangeListener");
+var t = async_test(document.title), service, storage, onService, onServiceError;
 t.step(function () {
-    var service, storage, onService, onServiceError;
     onService = t.step_func(function (services) {
         assert_true(services.length > 0, "services list is empty");
         service = services[0];
index 9e98e33dfcd4e87afcd6d94cfe52512836b16b8c..66b26d22241362bb16204303a17c83c0ee683d6f 100644 (file)
@@ -25,21 +25,19 @@ Authors:
 <head>
 <title>MessageStorage_findConversations_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: MessageStorage_findConversations_check_privilege
-//==== LABEL: Check if method MessageStorage::findConversations() is forbidden without proper privilege
+//==== LABEL Check if method MessageStorage::findConversations() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Messaging:MessageStorage:findConversations M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/messaging.html
 
-var t = async_test("MessageStorage_findConversations");
+var t = async_test(document.title), service, storage, onService, onServiceError, filter = new tizen.AttributeFilter("attr");
 t.step(function () {
-    var service, storage, onService, onServiceError,
-        filter = new tizen.AttributeFilter("attr");
     onService = t.step_func(function (services) {
         assert_true(services.length > 0, "services list is empty");
         service = services[0];
index 6004db8d66fd61a75692b5e94ff59b7d097b2fc1..70dbcb3130cbbca3d21f71f774214a8fa5d3e60b 100644 (file)
@@ -25,21 +25,19 @@ Authors:
 <head>
 <title>MessageStorage_findFolders_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: MessageStorage_findFolders_check_privilege
-//==== LABEL: Check if method MessageStorage::findFolders() is forbidden without proper privilege
+//==== LABEL Check if method MessageStorage::findFolders() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Messaging:MessageStorage:findFolders M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/messaging.html
 
-var t = async_test("MessageStorage_findFolders");
+var t = async_test(document.title), service, storage, onService, onServiceError, filter = new tizen.AttributeFilter("attr");
 t.step(function () {
-    var service, storage, onService, onServiceError,
-        filter = new tizen.AttributeFilter("attr");
     onService = t.step_func(function (services) {
         assert_true(services.length > 0, "services list is empty");
         service = services[0];
index 70e7a8f72804b87c9dddc66c78ee3494d07859f3..ddff10f3c46f2b47804f7a664f59fff6da344ba3 100644 (file)
@@ -25,21 +25,19 @@ Authors:
 <head>
 <title>MessageStorage_findMessages_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: MessageStorage_findMessages_check_privilege
-//==== LABEL: Check if method MessageStorage::findMessages() is forbidden without proper privilege
+//==== LABEL Check if method MessageStorage::findMessages() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Messaging:MessageStorage:findMessages M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/messaging.html
 
-var t = async_test("MessageStorage_findMessages");
+var t = async_test(document.title), service, storage, onService, onServiceError, filter = new tizen.AttributeFilter("attr");
 t.step(function () {
-    var service, storage, onService, onServiceError,
-        filter = new tizen.AttributeFilter("attr");
     onService = t.step_func(function (services) {
         assert_true(services.length > 0, "services list is empty");
         service = services[0];
index b95549d2f0088c139449a5afe3d7584e9ab0504f..a4db3344168be754206682b79576bb6bc22b508e 100644 (file)
@@ -25,20 +25,19 @@ Authors:
 <head>
 <title>MessageStorage_removeChangeListener_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: MessageStorage_removeChangeListener_check_privilege
-//==== LABEL: Check if method MessageStorage::removeChangeListener() is forbidden without proper privilege
+//==== LABEL Check if method MessageStorage::removeChangeListener() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Messaging:MessageStorage:removeChangeListener M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/messaging.html
 
-var t = async_test("MessageStorage_removeChangeListener");
+var t = async_test(document.title), service, storage, onService, onServiceError;
 t.step(function () {
-    var service, storage, onService, onServiceError;
     onService = t.step_func(function (services) {
         assert_true(services.length > 0, "services list is empty");
         service = services[0];
index aae5c050e92049f58be28eadee23290b95665201..d7bf6a4e57f695f3be404809e859faf924313b99 100644 (file)
@@ -25,20 +25,19 @@ Authors:
 <head>
 <title>MessageStorage_removeConversations_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: MessageStorage_removeConversations_check_privilege
-//==== LABEL: Check if method MessageStorage::removeConversations() is forbidden without proper privilege
+//==== LABEL Check if method MessageStorage::removeConversations() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Messaging:MessageStorage:removeConversations M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/messaging.html
 
-var t = async_test("MessageStorage_removeConversations");
+var t = async_test(document.title), service, storage, onService, onServiceError;
 t.step(function () {
-    var service, storage, onService, onServiceError;
     onService = t.step_func(function (services) {
         assert_true(services.length > 0, "services list is empty");
         service = services[0];
index 4a7535acd79a5904a187aa0783799bef0060ce5e..badee82a07b679567f0bc8481875cdc76b949137 100644 (file)
@@ -25,20 +25,19 @@ Authors:
 <head>
 <title>MessageStorage_removeMessages_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: MessageStorage_removeMessages_check_privilege
-//==== LABEL: Check if method MessageStorage::removeMessages() is forbidden without proper privilege
+//==== LABEL Check if method MessageStorage::removeMessages() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Messaging:MessageStorage:removeMessages M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/messaging.html
 
-var t = async_test("MessageStorage_removeMessages");
+var t = async_test(document.title), service, storage, onService, onServiceError;
 t.step(function () {
-    var service, storage, onService, onServiceError;
     onService = t.step_func(function (services) {
         assert_true(services.length > 0, "services list is empty");
         service = services[0];
index 14f339ec25a05468ba790e5d0caa75cd0f40d837..193cf94bb95228499df8b511f18219543a0dc82e 100644 (file)
@@ -25,20 +25,19 @@ Authors:
 <head>
 <title>MessageStorage_updateMessages_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: MessageStorage_updateMessages_check_privilege
-//==== LABEL: Check if method MessageStorage::updateMessages() is forbidden without proper privilege
+//==== LABEL Check if method MessageStorage::updateMessages() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Messaging:MessageStorage:updateMessages M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/messaging.html
 
-var t = async_test("MessageStorage_updateMessages");
+var t = async_test(document.title), service, storage, onService, onServiceError;
 t.step(function () {
-    var service, storage, onService, onServiceError;
     onService = t.step_func(function (services) {
         assert_true(services.length > 0, "services list is empty");
         service = services[0];
index 2a3e9149d5739c42a9d3dcbc00a2a8aa1b6d9673..3a1a5e4be41294986d9a85ef197c37b2bcfeb7a2 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>NFCManager_getDefaultAdapter_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: NFCManager_getDefaultAdapter_check_privilege
-//==== LABEL: Check if method NFCManager::getDefaultAdapter() is forbidden without proper privilege
+//==== LABEL Check if method NFCManager::getDefaultAdapter() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:NFC:NFCManager:getDefaultAdapter M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/nfc.html
 
@@ -48,7 +48,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.nfc.getDefaultAdapter();
     });
-}, "NFCManager_getDefaultAdapter");
+}, document.title);
 
 </script>
 </body>
index 620d4f83a8935e178aaacafae3684c18e36b70c3..9fd8dade2234a3a5cf7726501e41a1ac7fa56d59 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>NFCManager_setExclusiveMode_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: NFCManager_setExclusiveMode_check_privilege
-//==== LABEL: Check if method NFCManager::setExclusiveMode() is forbidden without proper privilege
+//==== LABEL Check if method NFCManager::setExclusiveMode() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:NFC:NFCManager:setExclusiveMode M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/nfc.html
 
@@ -48,7 +48,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.nfc.setExclusiveMode(true);
     });
-}, "NFCManager_setExclusiveMode");
+}, document.title);
 
 </script>
 </body>
index bba78d121923812a9da0c2815958f740e1995612..1922426099520c42ea70dfb74065844d3c54d129 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>NetworkBearerSelection_releaseRouteToHost_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: NetworkBearerSelection_releaseRouteToHost_check_privilege
-//==== LABEL: Check if method NetworkBearerSelection::releaseRouteToHost() is forbidden without proper privilege
+//==== LABEL Check if method NetworkBearerSelection::releaseRouteToHost() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:NBS:NetworkBearerSelection:releaseRouteToHost M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/networkbearerselection.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.networkbearerselection.releaseRouteToHost("CELLULAR", "tizen.org", function () {});
     });
-}, "NetworkBearerSelection_releaseRouteToHost");
+}, document.title);
 
 </script>
 </body>
index 2c6495ce9dc7daa034a402bba8d8d73fc762e888..d49345309c6eda245a8f3c02a79ce4eebb438bc3 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>NetworkBearerSelection_requestRouteToHost_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: NetworkBearerSelection_requestRouteToHost_check_privilege
-//==== LABEL: Check if method NetworkBearerSelection::requestRouteToHost() is forbidden without proper privilege
+//==== LABEL Check if method NetworkBearerSelection::requestRouteToHost() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:NBS:NetworkBearerSelection:requestRouteToHost M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/networkbearerselection.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.networkbearerselection.requestRouteToHost("CELLULAR", "tizen.org", {onsuccess: function () {}});
     });
-}, "NetworkBearerSelection_requestRouteToHost");
+}, document.title);
 
 </script>
 </body>
index b1b64fc94d574ab708c73ebf8f8d803f69964dc9..a56ad44a257902ea8773c4766bf0bdab10da32ec 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>NotificationManager_post_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: NotificationManager_post_check_privilege
-//==== LABEL: Check if method NotificationManager::post() is forbidden without proper privilege
+//==== LABEL Check if method NotificationManager::post() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Notification:NotificationManager:post M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/notification.html
 
@@ -41,7 +41,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.notification.post(notification);
     });
-}, "NotificationManager_post");
+}, document.title);
 
 </script>
 </body>
index d5cd9b858fbd8bc7513e962738fe38b6ac223437..b8aadc7e569736aff0ad8e6537327cb2322fb2db 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>NotificationManager_remove_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: NotificationManager_remove_check_privilege
-//==== LABEL: Check if method NotificationManager::remove() is forbidden without proper privilege
+//==== LABEL Check if method NotificationManager::remove() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Notification:NotificationManager:remove M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/notification.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.notification.remove("notificationId");
     });
-}, "NotificationManager_remove");
+}, document.title);
 
 </script>
 </body>
index 521f357d60af924ec00f315319439dda892eb457..398d95b7ff63a0d4709e5ae6161c3e683924c105 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>NotificationManager_removeAll_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: NotificationManager_removeAll_check_privilege
-//==== LABEL: Check if method NotificationManager::removeAll() is forbidden without proper privilege
+//==== LABEL Check if method NotificationManager::removeAll() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Notification:NotificationManager:removeAll M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/notification.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.notification.removeAll();
     });
-}, "NotificationManager_removeAll");
+}, document.title);
 
 </script>
 </body>
index 36d5262ef44077ba92c64920df5c6596636a258b..2cdc1760bc852e80a1f0df066f6e2428ff913249 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>NotificationManager_update_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: NotificationManager_update_check_privilege
-//==== LABEL: Check if method NotificationManager::update() is forbidden without proper privilege
+//==== LABEL Check if method NotificationManager::update() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Notification:NotificationManager:update M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/notification.html
 
@@ -41,7 +41,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.notification.update(notification);
     });
-}, "NotificationManager_update");
+}, document.title);
 
 </script>
 </body>
index 1a9263b76d9e47be0f2c64f77f0be89c19b2dc14..8983c3a1b27256bb103feb4f8c483ea622400700 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>PackageManager_getPackageInfo_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: PackageManager_getPackageInfo_check_privilege
-//==== LABEL: Check if method PackageManager::getPackageInfo() is forbidden without proper privilege
+//==== LABEL Check if method PackageManager::getPackageInfo() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Package:PackageManager:getPackageInfo M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/package.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.package.getPackageInfo();
     });
-}, "PackageManager_getPackageInfo");
+}, document.title);
 
 </script>
 </body>
index fd4ab1651d5046a84586f7fe5dc1e459c0f6bec4..a153cb93c6b121f8c0403a6ef443bffae65a9cf9 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>PackageManager_getPackagesInfo_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: PackageManager_getPackagesInfo_check_privilege
-//==== LABEL: Check if method PackageManager::getPackagesInfo() is forbidden without proper privilege
+//==== LABEL Check if method PackageManager::getPackagesInfo() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Package:PackageManager:getPackagesInfo M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/package.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.package.getPackagesInfo(function () {});
     });
-}, "PackageManager_getPackagesInfo");
+}, document.title);
 
 </script>
 </body>
index ce9c90c90bd458c52ff39cfc67bab94d38e51c5e..1ab7505dde43ae0233bf652242ecda722651524b 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>PackageManager_install_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: PackageManager_install_check_privilege
-//==== LABEL: Check if method PackageManager::install() is forbidden without proper privilege
+//==== LABEL Check if method PackageManager::install() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Package:PackageManager:install M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/package.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.package.install("/path/package.wgt", function () {});
     });
-}, "PackageManager_install");
+}, document.title);
 
 </script>
 </body>
index dcc4ef307390888a79425717f9112b4bd362f5d8..8f0bd05cb078f449eaad9a9cb3b8d42964384ce4 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>PackageManager_setPackageInfoEventListener_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: PackageManager_setPackageInfoEventListener_check_privilege
-//==== LABEL: Check if method PackageManager::setPackageInfoEventListener() is forbidden without proper privilege
+//==== LABEL Check if method PackageManager::setPackageInfoEventListener() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Package:PackageManager:setPackageInfoEventListener M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/package.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.package.setPackageInfoEventListener({});
     });
-}, "PackageManager_setPackageInfoEventListener");
+}, document.title);
 
 </script>
 </body>
index 52aa4981d090c9a45925dea252dc45e7ed0abe3e..c5338db8a0464cd40437fbcd4581a021b1ff7b99 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>PackageManager_uninstall_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: PackageManager_uninstall_check_privilege
-//==== LABEL: Check if method PackageManager::uninstall() is forbidden without proper privilege
+//==== LABEL Check if method PackageManager::uninstall() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Package:PackageManager:uninstall M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/package.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.package.uninstall("uninstall1", function () {});
     });
-}, "PackageManager_uninstall");
+}, document.title);
 
 </script>
 </body>
index c7b3848626e6383e4409f4fea13a5fe97438d41f..d7bdf395739d1d921cd2feb85095752cea49055e 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>PackageManager_unsetPackageInfoEventListener_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: PackageManager_unsetPackageInfoEventListener_check_privilege
-//==== LABEL: Check if method PackageManager::unsetPackageInfoEventListener() is forbidden without proper privilege
+//==== LABEL Check if method PackageManager::unsetPackageInfoEventListener() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Package:PackageManager:unsetPackageInfoEventListener M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/package.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.package.unsetPackageInfoEventListener();
     });
-}, "PackageManager_unsetPackageInfoEventListener");
+}, document.title);
 
 </script>
 </body>
index a379016f90ad608cb0690ddebc67ab3a81355e6c..656acf48b453e8bbecdd83180a570e6b15f5fc91 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>PowerManager_request_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: PowerManager_request_check_privilege
-//==== LABEL: Check if method PowerManager::request() is forbidden without proper privilege
+//==== LABEL Check if method PowerManager::request() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Power:PowerManager:request M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/power.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.power.request("SCREEN", "SCREEN_NORMAL");
     });
-}, "PowerManager_request");
+}, document.title);
 
 </script>
 </body>
index 0c7d0cdce0527648a542cfcb68e4a8abdac8f2d4..f3f792dd3446e089edb1d1ea0effb174854e6a52 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>PowerManager_setScreenBrightness_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: PowerManager_setScreenBrightness_check_privilege
-//==== LABEL: Check if method PowerManager::setScreenBrightness() is forbidden without proper privilege
+//==== LABEL Check if method PowerManager::setScreenBrightness() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Power:PowerManager:setScreenBrightness M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/power.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.power.setScreenBrightness(-1);
     });
-}, "PowerManager_setScreenBrightness");
+}, document.title);
 
 </script>
 </body>
index bf727168242affd488ed8ee9678ad9abc3fcbe94..ef341f90967d178bda0b76ad430e1bd95f550311 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>PowerManager_turnScreenOff_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: PowerManager_turnScreenOff_check_privilege
-//==== LABEL: Check if method PowerManager::turnScreenOff() is forbidden without proper privilege
+//==== LABEL Check if method PowerManager::turnScreenOff() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Power:PowerManager:turnScreenOff M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/power.html
 
@@ -43,7 +43,7 @@ test(function () {
     try {
         tizen.power.turnScreenOn();
     } catch(err) {}
-}, "PowerManager_turnScreenOff");
+}, document.title);
 
 </script>
 </body>
index 3efe7e92f1f883665e62bdb78c0c9c18830a6ae2..6c4f8fa3da8436d217f5fe9e910fa422b5cf9942 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>PowerManager_turnScreenOn_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: PowerManager_turnScreenOn_check_privilege
-//==== LABEL: Check if method PowerManager::turnScreenOn() is forbidden without proper privilege
+//==== LABEL Check if method PowerManager::turnScreenOn() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Power:PowerManager:turnScreenOn M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/power.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.power.turnScreenOn();
     });
-}, "PowerManager_turnScreenOn");
+}, document.title);
 
 </script>
 </body>
index 4a485eaf41bac4859fa631cacaa96ee222ba172f..9c7ee87ac61bfecfa0b3303c8ccaabd94d9e1c73 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>PushManager_connectService_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: PushManager_connectService_check_privilege
-//==== LABEL: Check if method PushManager::connectService() is forbidden without proper privilege
+//==== LABEL Check if method PushManager::connectService() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Push:PushManager:connectService M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/push.html
 
@@ -48,7 +48,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.push.connectService(function () {});
     });
-}, "PushManager_connectService");
+}, document.title);
 
 </script>
 </body>
index 609af147cf9d1a0e9f6e72048db681988f272a5b..f64060ce85a1fc94337b0b9d78a170ebdf7e6b85 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>PushManager_disconnectService_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: PushManager_disconnectService_check_privilege
-//==== LABEL: Check if method PushManager::disconnectService() is forbidden without proper privilege
+//==== LABEL Check if method PushManager::disconnectService() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Push:PushManager:disconnectService M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/push.html
 
@@ -48,7 +48,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.push.disconnectService();
     });
-}, "PushManager_disconnectService");
+}, document.title);
 
 </script>
 </body>
index 10d077ae52bf77b575fcc8194d6409f78cef7889..7a448f10a3735a767eee8d718c9819bc30e60f12 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>PushManager_getRegistrationId_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: PushManager_getRegistrationId_check_privilege
-//==== LABEL: Check if method PushManager::getRegistrationId() is forbidden without proper privilege
+//==== LABEL Check if method PushManager::getRegistrationId() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Push:PushManager:getRegistrationId M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/push.html
 
@@ -48,7 +48,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.push.getRegistrationId();
     });
-}, "PushManager_getRegistrationId");
+}, document.title);
 
 </script>
 </body>
index a0a5702669fa291e93c7d25aef6c898cd84944fa..7f0e17b3585a6c4a824b327b3eeb68ac4f008d1f 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>PushManager_registerService_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: PushManager_registerService_check_privilege
-//==== LABEL: Check if method PushManager::registerService() is forbidden without proper privilege
+//==== LABEL Check if method PushManager::registerService() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Push:PushManager:registerService M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/push.html
 
@@ -49,7 +49,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.push.registerService(service, function () {});
     });
-}, "PushManager_registerService");
+}, document.title);
 
 </script>
 </body>
index f3890f79346df5d6f3b1f3d9dc50442129655d8b..414401b70a790021c39e65aa214e8e12594989e7 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>PushManager_unregisterService_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: PushManager_unregisterService_check_privilege
-//==== LABEL: Check if method PushManager::unregisterService() is forbidden without proper privilege
+//==== LABEL Check if method PushManager::unregisterService() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:Push:PushManager:unregisterService M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/push.html
 
@@ -48,7 +48,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.push.unregisterService();
     });
-}, "PushManager_unregisterService");
+}, document.title);
 
 </script>
 </body>
index 7e08ff27f43e0b193a9ce56a2be9b44578eea81e..f18a45471a0de5e46e380a18eab49b1a6551343a 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>SEService_getReaders_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: SEService_getReaders_check_privilege
-//==== LABEL: Check if method SEService::getReaders() is forbidden without proper privilege
+//==== LABEL Check if method SEService::getReaders() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:SE:SEService:getReaders M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/se.html
 
@@ -48,7 +48,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.seService.getReaders(function () {});
     });
-}, "SEService_getReaders");
+}, document.title);
 
 </script>
 </body>
index 926b975bcb172daf48dc630802e72b2be5c0845d..f5cb9418efea91fae58b0119d9d0e912a9eba591 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>SEService_registerSEListener_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: SEService_registerSEListener_check_privilege
-//==== LABEL: Check if method SEService::registerSEListener() is forbidden without proper privilege
+//==== LABEL Check if method SEService::registerSEListener() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:SE:SEService:registerSEListener M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/se.html
 
@@ -51,7 +51,7 @@ test(function () {
             "onSENotReady": function () {}
         });
     });
-}, "SEService_registerSEListener");
+}, document.title);
 
 </script>
 </body>
index cc8f0d4479b22b4d7c6b487f62a1fd1b64f6ec20..be28929a89d5615be6eab61c7726b2cb0e694367 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>SEService_shutdown_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: SEService_shutdown_check_privilege
-//==== LABEL: Check if method SEService::shutdown() is forbidden without proper privilege
+//==== LABEL Check if method SEService::shutdown() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:SE:SEService:shutdown M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/se.html
 
@@ -48,7 +48,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.seService.shutdown();
     });
-}, "SEService_shutdown");
+}, document.title);
 
 </script>
 </body>
index 0e0b1ff96e30695561d6c94c85ecd1a65ff6dfd4..bc74e580268ccf34e160312d717f8d315e218b55 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>SEService_unregisterSEListener_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: SEService_unregisterSEListener_check_privilege
-//==== LABEL: Check if method SEService::unregisterSEListener() is forbidden without proper privilege
+//==== LABEL Check if method SEService::unregisterSEListener() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:SE:SEService:unregisterSEListener M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/se.html
 
@@ -48,7 +48,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.seService.unregisterSEListener(1);
     });
-}, "SEService_unregisterSEListener");
+}, document.title);
 
 </script>
 </body>
index 653d928f678cdf89380c58c491061fd1777093eb..30a6a65b0904260a91f6d57bb25e9fd9884e6d13 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>SystemInfoCellularNetwork_imei_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: SystemInfoCellularNetwork_imei_check_privilege
-//==== LABEL: Check if access to attribute SystemInfoCellularNetwork::imei is forbidden without proper privilege
+//==== LABEL Check if access to attribute SystemInfoCellularNetwork::imei is forbidden without proper privilege
 //==== SPEC: Tizen Web API:System:SystemInfo:SystemInfoCellularNetwork:imei A
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/systeminfo.html
 
@@ -47,7 +47,7 @@ t.step(function () {
     });
 
     onErrorCallback = t.step_func(function (e) {
-        assert_unreached("Exception : " + e.message);
+        assert_unreached("Exception: " + e.message);
     });
 
     tizen.systeminfo.getPropertyValue("CELLULAR_NETWORK", onSuccessCallback, onErrorCallback);
index 9c975f6d1296e582bc8776de6172d1b4a3650fea..a0c9ea03efac6a61dd061c31a489737181086fb7 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>SystemInfoDeviceCapability_nativeApiVersion_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: SystemInfoDeviceCapability_nativeApiVersion_check_privilege
-//==== LABEL: Check if access to attribute SystemInfoDeviceCapability::nativeApiVersion is forbidden without proper privilege
+//==== LABEL Check if access to attribute SystemInfoDeviceCapability::nativeApiVersion is forbidden without proper privilege
 //==== SPEC: Tizen Web API:System:SystemInfo:SystemInfoDeviceCapability:nativeApiVersion A
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/systeminfo.html
 
@@ -43,7 +43,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         assert_not_equals(capabilities.nativeApiVersion, null);
     });
-}, "SystemInfoDeviceCapability_nativeApiVersion");
+}, document.title);
 
 </script>
 </body>
index cb3c84ddb5b1171103435c7f33f431eef92b22f7..82585af9bb1e87d8e97004882e4212a665de92a4 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>SystemInfoDeviceCapability_platformVersion_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: SystemInfoDeviceCapability_platformVersion_check_privilege
-//==== LABEL: Check if access to attribute SystemInfoDeviceCapability::platformVersion is forbidden without proper privilege
+//==== LABEL Check if access to attribute SystemInfoDeviceCapability::platformVersion is forbidden without proper privilege
 //==== SPEC: Tizen Web API:System:SystemInfo:SystemInfoDeviceCapability:platformVersion A
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/systeminfo.html
 
@@ -43,7 +43,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         assert_not_equals(capabilities.platformVersion, null);
     });
-}, "SystemInfoDeviceCapability_platformVersion");
+}, document.title);
 
 </script>
 </body>
index ed132a8d184df7a35eb7b5818829238b792e44c1..7d2b7134cd2d441f1e6ea83ee366d86e52ce3455 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>SystemInfoDeviceCapability_webApiVersion_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: SystemInfoDeviceCapability_webApiVersion_check_privilege
-//==== LABEL: Check if access to attribute SystemInfoDeviceCapability::webApiVersion is forbidden without proper privilege
+//==== LABEL Check if access to attribute SystemInfoDeviceCapability::webApiVersion is forbidden without proper privilege
 //==== SPEC: Tizen Web API:System:SystemInfo:SystemInfoDeviceCapability:webApiVersion A
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/systeminfo.html
 
@@ -43,7 +43,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         assert_not_equals(capabilities.webApiVersion, null);
     });
-}, "SystemInfoDeviceCapability_webApiVersion");
+}, document.title);
 
 </script>
 </body>
index 97de3d4793be68bbd649a0d07d2c2c1614ad3564..1e1a1b95e19b042cf22efb32d17c7886b9771827 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>SystemSettingManager_setProperty_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: SystemSettingManager_setProperty_check_privilege
-//==== LABEL: Check if method SystemSettingManager::setProperty() is forbidden without proper privilege
+//==== LABEL Check if method SystemSettingManager::setProperty() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:SystemSetting:SystemSettingManager:setProperty M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/systemsetting.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.systemsetting.setProperty("LOCK_SCREEN", "", function () {});
     });
-}, "SystemSettingManager_setProperty");
+}, document.title);
 
 </script>
 </body>
index b660117a17b1bfc0e5ecc3c3a8350baec8df595b..4c5fb7c00c53fd9a4a998877f4b699846565e051 100644 (file)
@@ -25,14 +25,14 @@ Authors:
 <head>
 <title>WebSettingManager_removeAllCookies_check_privilege</title>
 <meta charset="utf-8">
-<script type="text/javascript" src="../resources/unitcommon.js"></script>
+<script type="text/javascript" src="support/unitcommon.js"></script>
 </head>
 
 <body>
 <div id="log"></div>
 <script>
 //==== TEST: WebSettingManager_removeAllCookies_check_privilege
-//==== LABEL: Check if method WebSettingManager::removeAllCookies() is forbidden without proper privilege
+//==== LABEL Check if method WebSettingManager::removeAllCookies() is forbidden without proper privilege
 //==== SPEC: Tizen Web API:Tizen Specification:WebSetting:WebSettingManager:removeAllCookies M
 //==== SPEC_URL https://developer.tizen.org/help/topic/org.tizen.web.device.apireference/tizen/websetting.html
 
@@ -40,7 +40,7 @@ test(function () {
     assert_throws({"name": "SecurityError"}, function () {
         tizen.websetting.removeAllCookies();
     });
-}, "WebSettingManager_removeAllCookies");
+}, document.title);
 
 </script>
 </body>
diff --git a/tct-privilege-tizen-tests/privilege/support/Makefile.am b/tct-privilege-tizen-tests/privilege/support/Makefile.am
new file mode 100644 (file)
index 0000000..b0bc0f4
--- /dev/null
@@ -0,0 +1,3 @@
+supportdir = /opt/tct-privilege-tizen-tests/privilege/support
+support_DATA = *.js
+EXTRA_DIST = $(support_DATA)
diff --git a/tct-privilege-tizen-tests/privilege/support/unitcommon.js b/tct-privilege-tizen-tests/privilege/support/unitcommon.js
new file mode 100644 (file)
index 0000000..9f972c1
--- /dev/null
@@ -0,0 +1,559 @@
+/*
+
+Copyright (c) 2013 Samsung Electronics Co., Ltd.
+
+Licensed under the Apache License, Version 2.0 (the License);
+you may not use this file except in compliance with the License.
+You may obtain a copy of the License at
+
+    http://www.apache.org/licenses/LICENSE-2.0
+
+Unless required by applicable law or agreed to in writing, software
+distributed under the License is distributed on an "AS IS" BASIS,
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+See the License for the specific language governing permissions and
+limitations under the License.
+
+
+
+Authors:
+
+ */
+
+
+MIN_BYTE = -128;
+MAX_BYTE = 127;
+MIN_OCTET = 0;
+MAX_OCTET = 255;
+MIN_SHORT = -32768;
+MAX_SHORT = 32767;
+MIN_UNSIGNED_SHORT = 0;
+MAX_UNSIGNED_SHORT = 65535;
+MIN_LONG = -2147483648;
+MAX_LONG = 2147483647;
+MIN_UNSIGNED_LONG = 0;
+MAX_UNSIGNED_LONG = 4294967295;
+MIN_LONG_LONG = -9223372036854775808;
+MAX_LONG_LONG = 9223372036854775807;
+MIN_UNSIGNED_LONG_LONG = 0;
+MAX_UNSIGNED_LONG_LONG = 18446744073709551615;
+
+TYPE_MISMATCH_EXCEPTION = {name: 'TypeMismatchError'};
+NOT_FOUND_EXCEPTION = {name: 'NotFoundError'};
+INVALID_VALUES_EXCEPTION = {name: 'InvalidValuesError'};
+IO_EXCEPTION = {name: 'IOError'};
+SECURITY_EXCEPTION = {name: 'SecurityError'};
+
+
+(function () {
+   var head_src = document.head.innerHTML;
+   if (head_src.search(/\/testharness.js\W/) === -1) {
+       document.write('<script language="javascript" src="../resources/testharness.js"></script>\n');
+   }
+   if (head_src.search(/\/testharnessreport.js\W/) === -1) {
+       document.write('<script language="javascript" src="../resources/testharnessreport.js"></script>\n');
+   }
+})();
+
+var _registered_types = {};
+
+function _resolve_registered_type(type) {
+    while (type in _registered_types) {
+        type = _registered_types[type];
+    }
+    return type;
+}
+
+/**
+ * Method checks extra argument for none argument method.
+ * The only check is that method will not throw an exception.
+ * Example usage:
+ * checkExtraArgument(tizen.notification, "removeAll");
+ *
+ * @param object object
+ * @param methodName string - name of the method
+ */
+function checkExtraArgument(object, methodName) {
+    var extraArgument = [
+        null,
+        undefined,
+        "Tizen",
+        1,
+        false,
+        ["one", "two"],
+        {argument: 1},
+        function () {}
+    ], i;
+
+    for (i = 0; i < extraArgument.length; i++) {
+        object[methodName](extraArgument[i]);
+    }
+}
+
+/**
+ * Method to validate conversion.
+ * Example usage:
+ *   conversionTable = getTypeConversionExceptions("functionObject", true);
+ *   for(i = 0; i < conversionTable.length; i++) {
+ *       errorCallback = conversionTable[i][0];
+ *       exceptionName = conversionTable[i][1];
+ *
+ *       assert_throws({name : exceptionName},
+ *       function () {
+ *           tizen.systemsetting.setProperty("HOME_SCREEN",
+ *               propertyValue, successCallback, errorCallback);
+ *       }, exceptionName + " should be thrown - given incorrect errorCallback.");
+ *   }
+ *
+ * @param conversionType
+ * @param isOptional
+ * @returns table of tables which contain value (index 0) and exceptionName (index 1)
+ *
+ */
+function getTypeConversionExceptions(conversionType, isOptional) {
+    var exceptionName = "TypeMismatchError",
+        conversionTable;
+    switch (conversionType) {
+        case "enum":
+            conversionTable = [
+                [undefined, exceptionName],
+                [null, exceptionName],
+                [0, exceptionName],
+                [true, exceptionName],
+                ["dummyInvalidEnumValue", exceptionName],
+                [{ }, exceptionName]
+            ];
+            break;
+        case "double":
+            conversionTable = [
+                [undefined, exceptionName],
+                [NaN, exceptionName],
+                [Number.POSITIVE_INFINITY, exceptionName],
+                [Number.NEGATIVE_INFINITY, exceptionName],
+                ["TIZEN", exceptionName],
+                [{ name : "TIZEN" }, exceptionName],
+                [function () { }, exceptionName]
+            ];
+            break;
+        case "object":
+            conversionTable = [
+                [true, exceptionName],
+                [false, exceptionName],
+                [NaN, exceptionName],
+                [0, exceptionName],
+                ["", exceptionName],
+                ["TIZEN", exceptionName],
+                [undefined, exceptionName]
+            ];
+            if (!isOptional) {
+                conversionTable.push([null, exceptionName]);
+            }
+            break;
+        case "functionObject":
+            conversionTable = [
+                [true, exceptionName],
+                [false, exceptionName],
+                [NaN, exceptionName],
+                [0, exceptionName],
+                ["", exceptionName],
+                ["TIZEN", exceptionName],
+                [[], exceptionName],
+                [{ }, exceptionName],
+                [undefined, exceptionName]
+            ];
+            if (!isOptional) {
+                conversionTable.push([null, exceptionName]);
+            }
+            break;
+        case "array":
+            conversionTable = [
+                [true, exceptionName],
+                [false, exceptionName],
+                [NaN, exceptionName],
+                [0, exceptionName],
+                ["", exceptionName],
+                ["TIZEN", exceptionName],
+                [{ }, exceptionName],
+                [function () { }, exceptionName],
+                [undefined, exceptionName]
+            ];
+            if (!isOptional) {
+                conversionTable.push([null, exceptionName]);
+            }
+            break;
+        case "dictionary":
+            conversionTable = [
+                [true, exceptionName],
+                [false, exceptionName],
+                [NaN, exceptionName],
+                [0, exceptionName],
+                ["", exceptionName],
+                ["TIZEN", exceptionName],
+                [undefined, exceptionName]
+            ];
+            if (!isOptional) {
+                conversionTable.push([null, exceptionName]);
+            }
+            break;
+        default:
+            assert_unreached("Fix your test. Wrong conversionType '" + conversionType + "'.");
+    };
+
+    return conversionTable;
+}
+
+
+function assert_type(obj, type, description) {
+    var org_type = type, prop_name, prop_type, prop_value;
+
+    type = _resolve_registered_type(type);
+
+    if (typeof (type) === 'string') {
+        type = type.toLowerCase();
+        switch (type) {
+            case 'object':
+            case 'string':
+            case 'number':
+            case 'function':
+            case 'boolean':
+            case 'undefined':
+            case 'xml':
+                assert_equals(typeof (obj), type, description);
+                break;
+            case 'null':
+                assert_true(obj === null, description);
+                break;
+            case 'array':
+                assert_true(Array.isArray(obj), description);
+                break;
+            case 'date':
+                assert_true(obj instanceof Date, description);
+                break;
+            case 'byte':
+                assert_equals(typeof (obj), 'number', description);
+                assert_greater_than_equal(obj, MIN_BYTE, description + " - value too low.");
+                assert_less_than_equal(obj, MAX_BYTE, description + " - value too high.");
+                assert_equals(Math.abs(obj % 1), 0, description + " - value is not an integer.");
+                break;
+            case 'octet':
+                assert_equals(typeof (obj), 'number', description);
+                assert_greater_than_equal(obj, MIN_OCTET, description + " - value too low.");
+                assert_less_than_equal(obj, MAX_OCTET, description + " - value too high.");
+                assert_equals(obj % 1, 0, description + " - value is not an integer.");
+                break;
+            case 'short':
+                assert_equals(typeof (obj), 'number', description);
+                assert_greater_than_equal(obj, MIN_SHORT, description + " - value too low.");
+                assert_less_than_equal(obj, MAX_SHORT, description + " - value too high.");
+                assert_equals(Math.abs(obj % 1), 0, description + " - value is not an integer.");
+                break;
+            case 'unsigned short':
+                assert_equals(typeof (obj), 'number', description);
+                assert_greater_than_equal(obj, MIN_UNSIGNED_SHORT, description + " - value too low.");
+                assert_less_than_equal(obj, MAX_UNSIGNED_SHORT, description + " - value too high.");
+                assert_equals(obj % 1, 0, description + " - value is not an integer.");
+                break;
+            case 'long':
+                assert_equals(typeof (obj), 'number', description);
+                assert_greater_than_equal(obj, MIN_LONG, description + " - value too low.");
+                assert_less_than_equal(obj, MAX_LONG, description + " - value too high.");
+                assert_equals(Math.abs(obj % 1), 0, description + " - value is not an integer.");
+                break;
+            case 'unsigned long':
+                assert_equals(typeof (obj), 'number', description);
+                assert_greater_than_equal(obj, MIN_UNSIGNED_LONG, description + " - value too low.");
+                assert_less_than_equal(obj, MAX_UNSIGNED_LONG, description + " - value too high.");
+                assert_equals(obj % 1, 0, description + " - value is not an integer.");
+                break;
+            case 'long long':
+                assert_equals(typeof (obj), 'number', description);
+                assert_greater_than_equal(obj, MIN_LONG_LONG, description + " - value too low.");
+                assert_less_than_equal(obj, MAX_LONG_LONG, description + " - value too high.");
+                assert_equals(Math.abs(obj % 1), 0, description + " - value is not an integer.");
+                break;
+            case 'unsigned long long':
+                assert_equals(typeof (obj), 'number', description);
+                assert_greater_than_equal(obj, MIN_UNSIGNED_LONG_LONG, description + " - value too low.");
+                assert_less_than_equal(obj, MAX_UNSIGNED_LONG_LONG, description + " - value too high.");
+                assert_equals(obj % 1, 0, description + " - value is not an integer.");
+                break;
+            default:
+                assert_unreached('Fix your test. Wrong type \'' + org_type + '\'');
+        }
+    } else if (typeof (type) === 'function') {
+        assert_true(obj instanceof type, description);
+    } else if (typeof (type) === 'object') {
+        for (prop_name in type) {
+            prop_type = type[prop_name];
+            if (prop_type === 'function') {
+                assert_inherits(obj, prop_name);
+                assert_equals(typeof obj[prop_name], prop_type, 'Object should have method ' + prop_name);
+            } else {
+                assert_own_property(obj, prop_name);
+            }
+        }
+    } else {
+        assert_unreached('Fix your test. Wrong type ' + org_type);
+    }
+}
+
+function register_type(alias, type_spec) {
+    _registered_types[alias] = type_spec;
+}
+
+/**
+ * Method to check if attribute is const.
+ * Example usage:
+ * check_const(tizen.bluetooth.deviceMinor, 'TOY_DOLL', 0x03, 'number', 0x29B);
+ *
+ * @param obj  object to test which  has const attribute
+ * @param attributeName attribute name.
+ * @param expectedValue expected value of provided attribute name
+ * @param expectedType expected type of provided attribute name
+ * @param valueToAssign value to assign in order to check if attribute value can be modified
+ */
+function check_const(obj, attributeName, expectedValue, expectedType, valueToAssign) {
+    var tmp;
+    if (expectedValue === valueToAssign) {
+        assert_unreached("Fix your test. The same values given for "  + attributeName +
+            " in 'value' and 'valueToSet' arguments.");
+    }
+    if (typeof (attributeName) === "string") {
+        assert_true(attributeName in obj, "Name " + attributeName + " doesn't exist in provided object.");
+        assert_equals(obj[attributeName], expectedValue, "Value of " + attributeName + " is diffrent.");
+        if (typeof (expectedType) !== "undefined") {
+            if (expectedValue === null) {
+                assert_type(obj[attributeName], "object", "Type of " + attributeName + " is different.");
+            } else {
+                assert_type(obj[attributeName], expectedType, "Type of " + attributeName + " is different.");
+            }
+        } else {
+            assert_unreached("Fix your test. Wrong type " + expectedType);
+        }
+        tmp = obj[attributeName];
+        obj[attributeName] = valueToAssign;
+        assert_equals(obj[attributeName], tmp, attributeName + " can be modified.");
+    } else {
+        assert_unreached("Fix your test. Wrong type of name " + typeof (attributeName));
+    }
+}
+
+/**
+ * Method to check if attribute is readonly.
+ * Example usage:
+ * check_readonly(statusNotification, "postedTime", null, 'object', new Date());
+ *
+ * @param obj  object to test which  has readonly attribute
+ * @param attributeName attribute name.
+ * @param expectedValue expected value of provided attribute name
+ * @param expectedType expected type of provided attribute name
+ * @param valueToAssign value to assign in order to check if attribute value can be modified
+ */
+function check_readonly(obj, attributeName, expectedValue, expectedType, valueToAssign) {
+    check_const(obj, attributeName, expectedValue, expectedType, valueToAssign);
+}
+
+/**
+ * Method to check if attribute can be set to null.
+ * Example usage:
+ * check_not_nullable(syncInfo, "mode");
+ *
+ * @param obj object to test which has not nullable attribute
+ * @param attributeName attribute name.
+ */
+function check_not_nullable(obj, attributeName)
+{   var old_value = obj[attributeName];
+    obj[attributeName] = null;
+    assert_not_equals(obj[attributeName], null, "Attribute " + attributeName + " can be set to null.");
+    obj[attributeName] = old_value;
+}
+
+/**
+ * Method to check NoInterfaceObject
+ * Example usage:
+ * check_no_interface_object("BluetoothAdapter")
+ *
+ * @param interfaceName interface name
+ */
+function check_no_interface_object(interfaceName) {
+    assert_throws({name: "TypeError"}, function () {
+        tizen[interfaceName]();
+    },"Wrong call as a function");
+    assert_throws({name: "TypeError"}, function () {
+        new tizen[interfaceName]();
+    },"Wrong call as a new function");
+    assert_throws({name: "TypeError"}, function () {
+        ({}) instanceof tizen[interfaceName];
+    },"instanceof exception");
+    assert_equals(tizen[interfaceName], undefined, interfaceName + " is not undefined.");
+}
+
+
+/**
+ * Method to check Constructors
+ * Example usage:
+ * check_constructor("BluetoothAdapter")
+ *
+ * @param constructorName constructor name
+ */
+
+function check_constructor(constructorName) {
+    assert_true(constructorName in tizen, "No " + constructorName + " in tizen.");
+    assert_false({} instanceof tizen[constructorName],"Custom object is not instance of " + constructorName);
+    assert_throws({
+        name: "TypeError"
+    }, function () {
+        tizen[constructorName]();
+    }, "Constructor called as function.");
+}
+
+/**
+ * Method to check if given method can be overridden in a given object - (TEMPORARY REMOVED).
+ * That method also checks if given method exists in a given object.
+ * Example usage:
+ * check_method_exists(tizen.notification, "get");
+ *
+ * @param obj object with method
+ * @param methodName name of the method to check.
+ */
+function check_method_exists(obj, methodName) {
+    assert_type(obj[methodName], 'function', "Method does not exist.");
+}
+
+/**
+ * Method to check extensibility of given object.
+ * Method checks if new attribute and method can be added.
+ * Example usage:
+ * check_extensibility(tizen.notification);
+ *
+ * @param obj object to check
+ */
+function check_extensibility(obj) {
+    var dummyAttribute = "dummyAttributeValue", dummyMethodResult = "dummyMethodResultValue";
+    obj.newDummyMethod = function() {
+        return dummyMethodResult;
+    }
+    assert_equals(obj.newDummyMethod(), dummyMethodResult, "Incorrect result from added method.");
+
+    obj.newDummyAttribute = dummyAttribute;
+    assert_equals(obj.newDummyAttribute, dummyAttribute, "Incorrect result from added attribute.");
+}
+
+/**
+ * Method to check if attribute can be modify.
+ * Example usage:
+ * check_attr(downloadRequest, "fileName", default_val, "string", "file_name.html");
+ *
+ * @param obj  object to test which has not readonly attribute
+ * @param attributeName attribute name.
+ * @param expectedValue expected value of provided attribute name
+ * @param expectedType expected type of provided attribute name
+ * @param valueToAssign value to assign in order to check if attribute value can be modified
+ */
+function check_attribute(obj, attributeName, expectedValue, expectedType, valueToAssign) {
+    if (expectedValue === valueToAssign) {
+        assert_unreached("Fix your test. The same values given for "  + attributeName +
+            " in 'value' and 'valueToSet' arguments.");
+    }
+    if (typeof (attributeName) === "string") {
+        assert_true(attributeName in obj, "Name " + attributeName + " doesn't exist in provided object.");
+        assert_equals(obj[attributeName], expectedValue, "Value of " + attributeName + " is diffrent.");
+        if (typeof (expectedType) !== "undefined") {
+            if (expectedValue === null) {
+                assert_type(obj[attributeName], "object", "Type of " + attributeName + " is different.");
+            } else {
+                assert_type(obj[attributeName], expectedType, "Type of " + attributeName + " is different.");
+            }
+        } else {
+            assert_unreached("Fix your test. Wrong type " + expectedType);
+        }
+        obj[attributeName] = valueToAssign;
+        assert_equals(obj[attributeName], valueToAssign, attributeName + " can be modified.");
+    } else {
+        assert_unreached("Fix your test. Wrong type of name " + typeof (attributeName));
+    }
+}
+
+/**
+ * Method to check if whole array can be overwritten with an invalid value.
+ * Sample usage:
+ * check_invalid_array_assignments(message, "to", false);
+ *
+ * @param obj object which has the array as its property
+ * @param array name of the array to check
+ * @param isNullable indicates if the array can be null
+ */
+function check_invalid_array_assignments(obj, array, isNullable) {
+    var args = [undefined, true, false, NaN, 0, "TIZEN", {}, function () {}],
+        val = obj[array], i;
+
+    if (!isNullable) {
+        obj[array] = null;
+        assert_not_equals(obj[array], null, "Non-nullable array was set to null");
+        assert_type(obj[array], "array", "Non-nullable array type changed after assigning null");
+        assert_equals(obj[array].toString(), val.toString(), "Non-nullable array contents changed after assigning null");
+    }
+
+    for (i = 0 ; i < args.length ; i++) {
+        obj[array] = args[i];
+        assert_type(obj[array], "array", "Array type changed after assigning an invalid value");
+        assert_equals(obj[array].toString(), val.toString(), "Array contents changed after assigning an invalid value");
+    }
+}
+
+/**
+ * Method to check if an object can be overwritten with an invalid value.
+ * Sample usage:
+ * check_invalid_object_assignments(message, "body", false);
+ *
+ * @param parentObj object which has the 'obj' object as its property
+ * @param obj name of the object to check
+ * @param isNullable indicates if the object can be null
+ */
+function check_invalid_obj_assignments(parentObj, obj, isNullable) {
+    var args = [undefined, true, false, NaN, 0, "TIZEN", function () {}],
+        val = parentObj[obj], i;
+
+    if (!isNullable) {
+        parentObj[obj] = null;
+        assert_equals(parentObj[obj], val, "Non-nullable obj was modified after assigning null");
+    }
+
+    for (i = 0 ; i < args.length ; i++) {
+        parentObj[obj] = args[i];
+        assert_equals(parentObj[obj], val, "The object was set to " + args[i]);
+    }
+}
+
+/**
+ * Method to validate conversion for listeners.
+ * Example usage:
+ * incorrectListeners = getListenerConversionExceptions(["oninstalled", "onupdated", "onuninstalled"]);
+ * for(i = 0; i < incorrectListeners.length; i++) {
+ *     packageInformationEventCallback  = incorrectListeners[i][0];
+ *     exceptionName = incorrectListeners[i][1];
+ *     assert_throws({name : exceptionName},
+ *        function () {
+ *             tizen.package.setPackageInfoEventListener(packageInformationEventCallback);
+ *         }, exceptionName + " should be thrown - given incorrect successCallback.");
+ * }
+ *
+ *
+ * @param callbackNames Array with names
+ * @returns {Array} table of tables which contain incorrect listener (index 0) and exceptionName (index 1)
+ *
+ */
+function getListenerConversionExceptions(callbackNames) {
+    var result = [], conversionTable, i, j, listenerName;
+    conversionTable = getTypeConversionExceptions("functionObject", false);
+
+    for (i = 0; i < callbackNames.length; i++) {
+        for (j = 0; j < conversionTable.length; j++) {
+            listenerName = {};
+            listenerName[callbackNames[i]] = conversionTable[j][0];
+            result.push([listenerName, conversionTable[j][1]]);
+        }
+    }
+
+    return result;
+}