Delete privilege testing cases
authoryuex.ma <yuex.ma@intel.com>
Fri, 31 May 2013 09:07:43 +0000 (02:07 -0700)
committeryuex.ma <yuex.ma@intel.com>
Fri, 31 May 2013 09:07:43 +0000 (02:07 -0700)
Change-Id: Ie7ffa486d49801cb2e07b0ce61722f4877ebd12f
Signed-off-by: yuex.ma <yuex.ma@intel.com>
223 files changed:
tct-privacy-tests/security-alarm-disable/config.xml [deleted file]
tct-privacy-tests/security-alarm-disable/icon.png [deleted file]
tct-privacy-tests/security-alarm-disable/index.html [deleted file]
tct-privacy-tests/security-alarm-enable/config.xml [deleted file]
tct-privacy-tests/security-alarm-enable/icon.png [deleted file]
tct-privacy-tests/security-alarm-enable/index.html [deleted file]
tct-privacy-tests/security-application-certificate-disable/config.xml [deleted file]
tct-privacy-tests/security-application-certificate-disable/icon.png [deleted file]
tct-privacy-tests/security-application-certificate-disable/index.html [deleted file]
tct-privacy-tests/security-application-certificate-enable/config.xml [deleted file]
tct-privacy-tests/security-application-certificate-enable/icon.png [deleted file]
tct-privacy-tests/security-application-certificate-enable/index.html [deleted file]
tct-privacy-tests/security-application-kill-disable/config.xml [deleted file]
tct-privacy-tests/security-application-kill-disable/icon.png [deleted file]
tct-privacy-tests/security-application-kill-disable/index.html [deleted file]
tct-privacy-tests/security-application-kill-ensable/config.xml [deleted file]
tct-privacy-tests/security-application-kill-ensable/icon.png [deleted file]
tct-privacy-tests/security-application-kill-ensable/index.html [deleted file]
tct-privacy-tests/security-application-launch-disable/config.xml [deleted file]
tct-privacy-tests/security-application-launch-disable/icon.png [deleted file]
tct-privacy-tests/security-application-launch-disable/index.html [deleted file]
tct-privacy-tests/security-application-launch-enable/config.xml [deleted file]
tct-privacy-tests/security-application-launch-enable/icon.png [deleted file]
tct-privacy-tests/security-application-launch-enable/index.html [deleted file]
tct-privacy-tests/security-bookmark-read-disable/config.xml [deleted file]
tct-privacy-tests/security-bookmark-read-disable/icon.png [deleted file]
tct-privacy-tests/security-bookmark-read-disable/index.html [deleted file]
tct-privacy-tests/security-bookmark-read-enable/config.xml [deleted file]
tct-privacy-tests/security-bookmark-read-enable/icon.png [deleted file]
tct-privacy-tests/security-bookmark-read-enable/index.html [deleted file]
tct-privacy-tests/security-bookmark-write-disable/config.xml [deleted file]
tct-privacy-tests/security-bookmark-write-disable/icon.png [deleted file]
tct-privacy-tests/security-bookmark-write-disable/index.html [deleted file]
tct-privacy-tests/security-bookmark-write-enable/config.xml [deleted file]
tct-privacy-tests/security-bookmark-write-enable/icon.png [deleted file]
tct-privacy-tests/security-bookmark-write-enable/index.html [deleted file]
tct-privacy-tests/security-bt-admin-disable/config.xml [deleted file]
tct-privacy-tests/security-bt-admin-disable/icon.png [deleted file]
tct-privacy-tests/security-bt-admin-disable/index.html [deleted file]
tct-privacy-tests/security-bt-admin-enable/config.xml [deleted file]
tct-privacy-tests/security-bt-admin-enable/icon.png [deleted file]
tct-privacy-tests/security-bt-admin-enable/index.html [deleted file]
tct-privacy-tests/security-bt-gap-disable/config.xml [deleted file]
tct-privacy-tests/security-bt-gap-disable/icon.png [deleted file]
tct-privacy-tests/security-bt-gap-disable/index.html [deleted file]
tct-privacy-tests/security-bt-gap-enable/config.xml [deleted file]
tct-privacy-tests/security-bt-gap-enable/icon.png [deleted file]
tct-privacy-tests/security-bt-gap-enable/index.html [deleted file]
tct-privacy-tests/security-bt-spp-disable/config.xml [deleted file]
tct-privacy-tests/security-bt-spp-disable/icon.png [deleted file]
tct-privacy-tests/security-bt-spp-disable/index.html [deleted file]
tct-privacy-tests/security-bt-spp-enable/config.xml [deleted file]
tct-privacy-tests/security-bt-spp-enable/icon.png [deleted file]
tct-privacy-tests/security-bt-spp-enable/index.html [deleted file]
tct-privacy-tests/security-calendar-read-disable/config.xml [deleted file]
tct-privacy-tests/security-calendar-read-disable/icon.png [deleted file]
tct-privacy-tests/security-calendar-read-disable/index.html [deleted file]
tct-privacy-tests/security-calendar-read-enable/config.xml [deleted file]
tct-privacy-tests/security-calendar-read-enable/icon.png [deleted file]
tct-privacy-tests/security-calendar-read-enable/index.html [deleted file]
tct-privacy-tests/security-calendar-write-disable/config.xml [deleted file]
tct-privacy-tests/security-calendar-write-disable/icon.png [deleted file]
tct-privacy-tests/security-calendar-write-disable/index.html [deleted file]
tct-privacy-tests/security-calendar-write-enable/config.xml [deleted file]
tct-privacy-tests/security-calendar-write-enable/icon.png [deleted file]
tct-privacy-tests/security-calendar-write-enable/index.html [deleted file]
tct-privacy-tests/security-callhistory-read-disable/config.xml [deleted file]
tct-privacy-tests/security-callhistory-read-disable/icon.png [deleted file]
tct-privacy-tests/security-callhistory-read-disable/index.html [deleted file]
tct-privacy-tests/security-callhistory-read-enable/config.xml [deleted file]
tct-privacy-tests/security-callhistory-read-enable/icon.png [deleted file]
tct-privacy-tests/security-callhistory-read-enable/index.html [deleted file]
tct-privacy-tests/security-callhistory-write-disable/config.xml [deleted file]
tct-privacy-tests/security-callhistory-write-disable/icon.png [deleted file]
tct-privacy-tests/security-callhistory-write-disable/index.html [deleted file]
tct-privacy-tests/security-callhistory-write-enable/config.xml [deleted file]
tct-privacy-tests/security-callhistory-write-enable/icon.png [deleted file]
tct-privacy-tests/security-callhistory-write-enable/index.html [deleted file]
tct-privacy-tests/security-contact-read-disable/config.xml [deleted file]
tct-privacy-tests/security-contact-read-disable/icon.png [deleted file]
tct-privacy-tests/security-contact-read-disable/index.html [deleted file]
tct-privacy-tests/security-contact-read-enable/config.xml [deleted file]
tct-privacy-tests/security-contact-read-enable/icon.png [deleted file]
tct-privacy-tests/security-contact-read-enable/index.html [deleted file]
tct-privacy-tests/security-contact-write-disable/config.xml [deleted file]
tct-privacy-tests/security-contact-write-disable/icon.png [deleted file]
tct-privacy-tests/security-contact-write-disable/index.html [deleted file]
tct-privacy-tests/security-contact-write-enable/config.xml [deleted file]
tct-privacy-tests/security-contact-write-enable/icon.png [deleted file]
tct-privacy-tests/security-contact-write-enable/index.html [deleted file]
tct-privacy-tests/security-content-read-disable/config.xml [deleted file]
tct-privacy-tests/security-content-read-disable/icon.png [deleted file]
tct-privacy-tests/security-content-read-disable/index.html [deleted file]
tct-privacy-tests/security-content-read-enable/config.xml [deleted file]
tct-privacy-tests/security-content-read-enable/icon.png [deleted file]
tct-privacy-tests/security-content-read-enable/index.html [deleted file]
tct-privacy-tests/security-content-write-disable/config.xml [deleted file]
tct-privacy-tests/security-content-write-disable/icon.png [deleted file]
tct-privacy-tests/security-content-write-disable/index.html [deleted file]
tct-privacy-tests/security-content-write-enable/config.xml [deleted file]
tct-privacy-tests/security-content-write-enable/icon.png [deleted file]
tct-privacy-tests/security-content-write-enable/index.html [deleted file]
tct-privacy-tests/security-datacontrol-disable/config.xml [deleted file]
tct-privacy-tests/security-datacontrol-disable/icon.png [deleted file]
tct-privacy-tests/security-datacontrol-disable/index.html [deleted file]
tct-privacy-tests/security-datacontrol-enable/config.xml [deleted file]
tct-privacy-tests/security-datacontrol-enable/icon.png [deleted file]
tct-privacy-tests/security-datacontrol-enable/index.html [deleted file]
tct-privacy-tests/security-datasync-disable/config.xml [deleted file]
tct-privacy-tests/security-datasync-disable/icon.png [deleted file]
tct-privacy-tests/security-datasync-disable/index.html [deleted file]
tct-privacy-tests/security-datasync-enable/config.xml [deleted file]
tct-privacy-tests/security-datasync-enable/icon.png [deleted file]
tct-privacy-tests/security-datasync-enable/index.html [deleted file]
tct-privacy-tests/security-download-disable/config.xml [deleted file]
tct-privacy-tests/security-download-disable/icon.png [deleted file]
tct-privacy-tests/security-download-disable/index.html [deleted file]
tct-privacy-tests/security-download-enable/config.xml [deleted file]
tct-privacy-tests/security-download-enable/icon.png [deleted file]
tct-privacy-tests/security-download-enable/index.html [deleted file]
tct-privacy-tests/security-filesystem-read-disable/config.xml [deleted file]
tct-privacy-tests/security-filesystem-read-disable/icon.png [deleted file]
tct-privacy-tests/security-filesystem-read-disable/index.html [deleted file]
tct-privacy-tests/security-filesystem-read-enable/config.xml [deleted file]
tct-privacy-tests/security-filesystem-read-enable/icon.png [deleted file]
tct-privacy-tests/security-filesystem-read-enable/index.html [deleted file]
tct-privacy-tests/security-filesystem-write-disable/config.xml [deleted file]
tct-privacy-tests/security-filesystem-write-disable/icon.png [deleted file]
tct-privacy-tests/security-filesystem-write-disable/index.html [deleted file]
tct-privacy-tests/security-filesystem-write-enable/config.xml [deleted file]
tct-privacy-tests/security-filesystem-write-enable/icon.png [deleted file]
tct-privacy-tests/security-filesystem-write-enable/index.html [deleted file]
tct-privacy-tests/security-networkbearerselection-disable/config.xml [deleted file]
tct-privacy-tests/security-networkbearerselection-disable/icon.png [deleted file]
tct-privacy-tests/security-networkbearerselection-disable/index.html [deleted file]
tct-privacy-tests/security-networkbearerselection-enable/config.xml [deleted file]
tct-privacy-tests/security-networkbearerselection-enable/icon.png [deleted file]
tct-privacy-tests/security-networkbearerselection-enable/index.html [deleted file]
tct-privacy-tests/security-nfc-admin-disable/config.xml [deleted file]
tct-privacy-tests/security-nfc-admin-disable/icon.png [deleted file]
tct-privacy-tests/security-nfc-admin-disable/index.html [deleted file]
tct-privacy-tests/security-nfc-admin-enable/config.xml [deleted file]
tct-privacy-tests/security-nfc-admin-enable/icon.png [deleted file]
tct-privacy-tests/security-nfc-admin-enable/index.html [deleted file]
tct-privacy-tests/security-nfc-common-disable/config.xml [deleted file]
tct-privacy-tests/security-nfc-common-disable/icon.png [deleted file]
tct-privacy-tests/security-nfc-common-disable/index.html [deleted file]
tct-privacy-tests/security-nfc-common-enable/config.xml [deleted file]
tct-privacy-tests/security-nfc-common-enable/icon.png [deleted file]
tct-privacy-tests/security-nfc-common-enable/index.html [deleted file]
tct-privacy-tests/security-nfc-p2p-disable/config.xml [deleted file]
tct-privacy-tests/security-nfc-p2p-disable/icon.png [deleted file]
tct-privacy-tests/security-nfc-p2p-disable/index.html [deleted file]
tct-privacy-tests/security-nfc-p2p-enable/config.xml [deleted file]
tct-privacy-tests/security-nfc-p2p-enable/icon.png [deleted file]
tct-privacy-tests/security-nfc-p2p-enable/index.html [deleted file]
tct-privacy-tests/security-nfc-tag-disable/config.xml [deleted file]
tct-privacy-tests/security-nfc-tag-disable/icon.png [deleted file]
tct-privacy-tests/security-nfc-tag-disable/index.html [deleted file]
tct-privacy-tests/security-nfc-tag-enable/config.xml [deleted file]
tct-privacy-tests/security-nfc-tag-enable/icon.png [deleted file]
tct-privacy-tests/security-nfc-tag-enable/index.html [deleted file]
tct-privacy-tests/security-notification-disable/config.xml [deleted file]
tct-privacy-tests/security-notification-disable/icon.png [deleted file]
tct-privacy-tests/security-notification-disable/index.html [deleted file]
tct-privacy-tests/security-notification-enable/config.xml [deleted file]
tct-privacy-tests/security-notification-enable/icon.png [deleted file]
tct-privacy-tests/security-notification-enable/index.html [deleted file]
tct-privacy-tests/security-package-info-disable/config.xml [deleted file]
tct-privacy-tests/security-package-info-disable/icon.png [deleted file]
tct-privacy-tests/security-package-info-disable/index.html [deleted file]
tct-privacy-tests/security-package-info-enable/config.xml [deleted file]
tct-privacy-tests/security-package-info-enable/icon.png [deleted file]
tct-privacy-tests/security-package-info-enable/index.html [deleted file]
tct-privacy-tests/security-package-install-disable/config.xml [deleted file]
tct-privacy-tests/security-package-install-disable/icon.png [deleted file]
tct-privacy-tests/security-package-install-disable/index.html [deleted file]
tct-privacy-tests/security-package-install-enable/config.xml [deleted file]
tct-privacy-tests/security-package-install-enable/icon.png [deleted file]
tct-privacy-tests/security-package-install-enable/index.html [deleted file]
tct-privacy-tests/security-power-disable/config.xml [deleted file]
tct-privacy-tests/security-power-disable/icon.png [deleted file]
tct-privacy-tests/security-power-disable/index.html [deleted file]
tct-privacy-tests/security-power-enable/config.xml [deleted file]
tct-privacy-tests/security-power-enable/icon.png [deleted file]
tct-privacy-tests/security-power-enable/index.html [deleted file]
tct-privacy-tests/security-push-disable/config.xml [deleted file]
tct-privacy-tests/security-push-disable/icon.png [deleted file]
tct-privacy-tests/security-push-disable/index.html [deleted file]
tct-privacy-tests/security-push-enable/config.xml [deleted file]
tct-privacy-tests/security-push-enable/icon.png [deleted file]
tct-privacy-tests/security-push-enable/index.html [deleted file]
tct-privacy-tests/security-se-disable/config.xml [deleted file]
tct-privacy-tests/security-se-disable/icon.png [deleted file]
tct-privacy-tests/security-se-disable/index.html [deleted file]
tct-privacy-tests/security-se-enable/config.xml [deleted file]
tct-privacy-tests/security-se-enable/icon.png [deleted file]
tct-privacy-tests/security-se-enable/index.html [deleted file]
tct-privacy-tests/security-systeminfo-disable/config.xml [deleted file]
tct-privacy-tests/security-systeminfo-disable/icon.png [deleted file]
tct-privacy-tests/security-systeminfo-disable/index.html [deleted file]
tct-privacy-tests/security-systeminfo-enable/config.xml [deleted file]
tct-privacy-tests/security-systeminfo-enable/icon.png [deleted file]
tct-privacy-tests/security-systeminfo-enable/index.html [deleted file]
tct-privacy-tests/security-systeminfo-manager-disable/config.xml [deleted file]
tct-privacy-tests/security-systeminfo-manager-disable/icon.png [deleted file]
tct-privacy-tests/security-systeminfo-manager-disable/index.html [deleted file]
tct-privacy-tests/security-systeminfo-manager-enable/config.xml [deleted file]
tct-privacy-tests/security-systeminfo-manager-enable/icon.png [deleted file]
tct-privacy-tests/security-systeminfo-manager-enable/index.html [deleted file]
tct-privacy-tests/security-systemsetting-disable/config.xml [deleted file]
tct-privacy-tests/security-systemsetting-disable/icon.png [deleted file]
tct-privacy-tests/security-systemsetting-disable/index.html [deleted file]
tct-privacy-tests/security-systemsetting-enable/config.xml [deleted file]
tct-privacy-tests/security-systemsetting-enable/icon.png [deleted file]
tct-privacy-tests/security-systemsetting-enable/index.html [deleted file]
tct-privacy-tests/security-tizen-disable/config.xml [deleted file]
tct-privacy-tests/security-tizen-disable/icon.png [deleted file]
tct-privacy-tests/security-tizen-disable/index.html [deleted file]
tct-privacy-tests/security-tizen-enable/config.xml [deleted file]
tct-privacy-tests/security-tizen-enable/icon.png [deleted file]
tct-privacy-tests/security-tizen-enable/index.html [deleted file]
tct-privacy-tests/tests.xml

diff --git a/tct-privacy-tests/security-alarm-disable/config.xml b/tct-privacy-tests/security-alarm-disable/config.xml
deleted file mode 100644 (file)
index a102474..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-alarm-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-alarm-disable</name>
-  <tizen:application id="wrt5sed003.securityalarmdisable" package="wrt5sed003" required_version="2.1"/>
-  
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-alarm-disable/icon.png b/tct-privacy-tests/security-alarm-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-alarm-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-alarm-disable/index.html b/tct-privacy-tests/security-alarm-disable/index.html
deleted file mode 100644 (file)
index 3c70616..0000000
+++ /dev/null
@@ -1,59 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-alarm-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to alarm sensitive API features without first consulting the security policy" />
-    <meta charset="utf-8">
-  </head>
-  <body> 
-    <script type="text/javascript">
-        document.write("Test purpose: Check that the WRT must not allow Web Application access to alarm sensitive API features without first consulting the security policy <br>");
-        try{
-            var alarm = new tizen.AlarmAbsolute(new Date(2012, 10, 4, 8, 0));
-            var appControl = new tizen.ApplicationControl("http://tizen.org/appcontrol/operation/view", "http://www.tizen.org");
-            tizen.alarm.add(alarm, "org.tizen.browser", appControl);
-            document.write("FAIL");
-        }catch(e){
-            if (e.name == "SecurityError") {
-                document.write("PASS");
-            } else {
-                document.write("FAIL");
-            }
-        }
-    </script>  
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-alarm-enable/config.xml b/tct-privacy-tests/security-alarm-enable/config.xml
deleted file mode 100644 (file)
index e162e85..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-alarm-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-alarm-enable</name>
-  <tizen:application id="wrt5san005.securityalarmenable" package="wrt5san005" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/alarm" />
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-alarm-enable/icon.png b/tct-privacy-tests/security-alarm-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-alarm-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-alarm-enable/index.html b/tct-privacy-tests/security-alarm-enable/index.html
deleted file mode 100644 (file)
index e48fe26..0000000
+++ /dev/null
@@ -1,55 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-alarm-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to alarm sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-    <script type="text/javascript">
-        document.write("Test purpose: Check that the WRT must allow Web Application access to alarm sensitive API features with first consulting the security policy <br>");
-        try{
-            var alarm = new tizen.AlarmAbsolute(new Date(2012, 10, 4, 8, 0));
-            var appControl = new tizen.ApplicationControl("http://tizen.org/appcontrol/operation/view", "http://www.tizen.org");
-            tizen.alarm.add(alarm, "org.tizen.browser", appControl);
-            document.write("PASS");
-        }catch(e){
-            document.write("FAIL");
-        }
-    </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-application-certificate-disable/config.xml b/tct-privacy-tests/security-application-certificate-disable/config.xml
deleted file mode 100644 (file)
index 57d2b04..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-application-certificate-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-application-certificate-disable</name>
-  <tizen:application id="wrt5sar018.securityapplicationcertificatedisable" package="wrt5sar018" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-application-certificate-disable/icon.png b/tct-privacy-tests/security-application-certificate-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-application-certificate-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-application-certificate-disable/index.html b/tct-privacy-tests/security-application-certificate-disable/index.html
deleted file mode 100644 (file)
index 30ca9f3..0000000
+++ /dev/null
@@ -1,60 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-application-certificate-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to application.certificate sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
- <body>
-  <script type="text/javascript">
-
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must not allow Web Application access to application.read sensitive API features without first consulting the security policy <br>");
-
-    try{
-        var appInfo = tizen.application.getAppCerts("wrt5sar018.security-application-certificate-disable");
-        document.write("FAIL");
-    }catch(e){
-        if ("SecurityError" == e.name) {
-            document.write("PASS");
-        } else {
-            document.write("FAIL");
-        }
-    }
-</script>
- </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-application-certificate-enable/config.xml b/tct-privacy-tests/security-application-certificate-enable/config.xml
deleted file mode 100644 (file)
index de21d80..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-application-certificate-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-application-certificate-enable</name>
-  <tizen:application id="wrt5sar019.securityapplicationcertificateenable" package="wrt5sar019" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/appmanager.certificate" />
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-application-certificate-enable/icon.png b/tct-privacy-tests/security-application-certificate-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-application-certificate-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-application-certificate-enable/index.html b/tct-privacy-tests/security-application-certificate-enable/index.html
deleted file mode 100644 (file)
index 62fd7bd..0000000
+++ /dev/null
@@ -1,60 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-application-certificate-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to application.certificate sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
- <body>
-  <script type="text/javascript">
-
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must allow Web Application access to application.read sensitive API features with first consulting the security policy <br>");
-
-    try{
-        var appInfo = tizen.application.getAppCerts("wrt5sar019.security-application-certificate-enable");
-        document.write("PASS");
-    }catch(e){
-        if ("SecurityError" == e.name) {
-            document.write("FAIL");
-        } else {
-            document.write("FAIL");
-        }
-    }
-</script>
- </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-application-kill-disable/config.xml b/tct-privacy-tests/security-application-kill-disable/config.xml
deleted file mode 100644 (file)
index e121c3f..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-application-kill-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-application-kill-disable</name>
-  <tizen:application id="wrtkill001.securityapplicationkilldisable" package="wrtkill001" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-application-kill-disable/icon.png b/tct-privacy-tests/security-application-kill-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-application-kill-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-application-kill-disable/index.html b/tct-privacy-tests/security-application-kill-disable/index.html
deleted file mode 100644 (file)
index 4c2937c..0000000
+++ /dev/null
@@ -1,69 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-application-kill-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to application.read sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
- <body>
-  <script type="text/javascript">
-    try{
-        function onRunningAppsContext(contexts) {
-          try{
-              if (contexts.length > 0) {
-              tizen.application.kill(contexts[0].id);
-              }
-          }catch(e1){
-             if ("SecurityError" == e1.name) {
-            document.write("Pass");
-             } else {
-            document.write("FAIL");
-            }
-          } 
-        }
-        tizen.application.getAppsContext(onRunningAppsContext);
-        document.write("Fail");
-    }catch(e){
-        if ("SecurityError" == e.name) {
-            document.write("Pass");
-        } else {
-            document.write("FAIL");
-        }
-    }
-</script>
- </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-application-kill-ensable/config.xml b/tct-privacy-tests/security-application-kill-ensable/config.xml
deleted file mode 100644 (file)
index 5d49759..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-application-read-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-application-kill-ensable</name>
-  <tizen:application id="wrtkill002.securityapplicationkillensable" package="wrtkill002" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/appmanager.kill" />
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-application-kill-ensable/icon.png b/tct-privacy-tests/security-application-kill-ensable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-application-kill-ensable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-application-kill-ensable/index.html b/tct-privacy-tests/security-application-kill-ensable/index.html
deleted file mode 100644 (file)
index 9083b75..0000000
+++ /dev/null
@@ -1,57 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-application-kill-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to application.read sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
- <body>
-  <script type="text/javascript">
-    try{
-        function onRunningAppsContext(contexts) {
-              if (contexts.length > 0) {
-              tizen.application.kill(contexts[0].id);
-              }
-        }
-        tizen.application.getAppsContext(onRunningAppsContext);
-        document.write("Pass");
-    }catch(e){
-          document.write("FAIL");
-    }
-</script>
- </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-application-launch-disable/config.xml b/tct-privacy-tests/security-application-launch-disable/config.xml
deleted file mode 100644 (file)
index a890740..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-application-launch-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-application-launch-disable</name>
-  <tizen:application id="wrt5sal016.securityapplicationlaunchdisable" package="wrt5sal016" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-application-launch-disable/icon.png b/tct-privacy-tests/security-application-launch-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-application-launch-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-application-launch-disable/index.html b/tct-privacy-tests/security-application-launch-disable/index.html
deleted file mode 100644 (file)
index 8fd9306..0000000
+++ /dev/null
@@ -1,60 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-application-launch-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to application.launch sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-    <script type="text/javascript">
-
-        document.write("<br><br><br>");
-        document.write("Test purpose: Check that the WRT must not allow Web Application access to application.launch sensitive API features without first consulting the security policy <br>");
-
-        try{
-            tizen.application.launch("wrt5sal016.security-application-launch-disable");
-            document.write("Fail");
-        }catch(e){
-            if ("SecurityError" == e.name) {
-                document.write("PASS");
-            } else {
-                document.write("FAIL");
-            }
-        }
-    </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-application-launch-enable/config.xml b/tct-privacy-tests/security-application-launch-enable/config.xml
deleted file mode 100644 (file)
index e2f06f7..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-application-launch-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-application-launch-enable</name>
-  <tizen:application id="wrt5sal017.securityapplicationlaunchenable" package="wrt5sal017" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/application.launch" />
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-application-launch-enable/icon.png b/tct-privacy-tests/security-application-launch-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-application-launch-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-application-launch-enable/index.html b/tct-privacy-tests/security-application-launch-enable/index.html
deleted file mode 100644 (file)
index 6ddd21e..0000000
+++ /dev/null
@@ -1,55 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-application-launch-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to application.launch sensitive API features with first consulting the security policy" />
-    <meta charset="utf-8">
-  </head>
-  <body>
-    <script type="text/javascript">
-
-        document.write("<br><br><br>");
-        document.write("Test purpose: Check that the WRT must allow Web Application access to application.launch sensitive API features with first consulting the security policy <br>");
-        try{
-            tizen.application.launch("wrt5sal017.security-application-launch-enable");
-            document.write("PASS");
-        }catch(e){
-            document.write("FAIL");
-        }
-    </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-bookmark-read-disable/config.xml b/tct-privacy-tests/security-bookmark-read-disable/config.xml
deleted file mode 100644 (file)
index 5da8338..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-bookmark-read-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-bookmark-read-disable</name>
-  <tizen:application id="wrt5sbr089.securitybookmarkreaddisable" package="wrt5sbr089" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-bookmark-read-disable/icon.png b/tct-privacy-tests/security-bookmark-read-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-bookmark-read-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-bookmark-read-disable/index.html b/tct-privacy-tests/security-bookmark-read-disable/index.html
deleted file mode 100644 (file)
index 1d51228..0000000
+++ /dev/null
@@ -1,60 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-bookmark-read-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to bookmark.read sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-      document.write("<br><br><br>");
-      document.write("Test purpose: Check that the WRT must not allow Web Application access to bookmark.read sensitive API features without first consulting the security policy <br>");
-
-      try{
-          var parentFolder = tizen.bookmark.get();
-          document.write("Fail");
-      }catch(e){
-          if (e.name == "SecurityError") {
-              document.write("Pass");
-          } else {
-              document.write("Fail");
-          }
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-bookmark-read-enable/config.xml b/tct-privacy-tests/security-bookmark-read-enable/config.xml
deleted file mode 100644 (file)
index 5dd9e67..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-bookmark-read-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-bookmark-read-enable</name>
-  <tizen:application id="wrt5sbr079.securitybookmarkreadenable" package="wrt5sbr079" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/bookmark.read"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-bookmark-read-enable/icon.png b/tct-privacy-tests/security-bookmark-read-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-bookmark-read-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-bookmark-read-enable/index.html b/tct-privacy-tests/security-bookmark-read-enable/index.html
deleted file mode 100644 (file)
index 2b044f3..0000000
+++ /dev/null
@@ -1,56 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-bookmark-read-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to bookmark.read sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-      document.write("<br><br><br>");
-      document.write("Test purpose: Check that the WRT must allow Web Application access to bookmark.read sensitive API features with first consulting the security policy <br>");
-
-      try{
-          var parentFolder = tizen.bookmark.get();
-          document.write("Pass");
-      }catch(e){
-          document.write("Fail");
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-bookmark-write-disable/config.xml b/tct-privacy-tests/security-bookmark-write-disable/config.xml
deleted file mode 100644 (file)
index 1dad3ba..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-bookmark-write-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-bookmark-write-disable</name>
-  <tizen:application id="wrt5sbr090.securitybookmarkwritedisable" package="wrt5sbr090" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-bookmark-write-disable/icon.png b/tct-privacy-tests/security-bookmark-write-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-bookmark-write-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-bookmark-write-disable/index.html b/tct-privacy-tests/security-bookmark-write-disable/index.html
deleted file mode 100644 (file)
index 0217ddf..0000000
+++ /dev/null
@@ -1,61 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-bookmark-write-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to bookmark.write sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-      document.write("<br><br><br>");
-      document.write("Test purpose: Check that the WRT must not allow Web Application access to bookmark.write sensitive API features without first consulting the security policy <br>");
-
-      try{
-          var bookmarkFolder = new tizen.BookmarkFolder("Testfolder");
-          tizen.bookmark.add(bookmarkFolder);
-          document.write("Fail");
-      }catch(e){
-          if (e.name == "SecurityError"){
-              document.write("Pass");
-          } else {
-              document.write("Fail");
-          }
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-bookmark-write-enable/config.xml b/tct-privacy-tests/security-bookmark-write-enable/config.xml
deleted file mode 100644 (file)
index 1047b8d..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-bookmark-write-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-bookmark-write-enable</name>
-  <tizen:application id="wrt5sbr080.securitybookmarkwriteenable" package="wrt5sbr080" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/bookmark.write"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-bookmark-write-enable/icon.png b/tct-privacy-tests/security-bookmark-write-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-bookmark-write-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-bookmark-write-enable/index.html b/tct-privacy-tests/security-bookmark-write-enable/index.html
deleted file mode 100644 (file)
index 6551d27..0000000
+++ /dev/null
@@ -1,57 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-bookmark-write-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to bookmark.write sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-      document.write("<br><br><br>");
-      document.write("Test purpose: Check that the WRT must allow Web Application access to bookmark.write sensitive API features with first consulting the security policy <br>");
-
-      try{
-          var bookmarkFolder = new tizen.BookmarkFolder("Testfolder");
-          tizen.bookmark.add(bookmarkFolder);
-          document.write("Pass");
-      }catch(e){
-          document.write("Fail");
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-bt-admin-disable/config.xml b/tct-privacy-tests/security-bt-admin-disable/config.xml
deleted file mode 100644 (file)
index 8d78054..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-bt-admin-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-bt-admin-disable</name>
-  <tizen:application id="wrt5sad022.securitybtadmindisable" package="wrt5sad022" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/bluetooth.gap"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-bt-admin-disable/icon.png b/tct-privacy-tests/security-bt-admin-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-bt-admin-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-bt-admin-disable/index.html b/tct-privacy-tests/security-bt-admin-disable/index.html
deleted file mode 100644 (file)
index a344826..0000000
+++ /dev/null
@@ -1,61 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-bt-admin-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to bluetooth.admin sensitive API features without first consulting the security policy" />
-    <meta charset="utf-8">
-  </head>
- <body>
-  <script type="text/javascript">
-
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must not allow Web Application access to bluetooth.admin sensitive API features without first consulting the security policy <br>");
-
-    try{
-        var adapter = tizen.bluetooth.getDefaultAdapter();
-        adapter.setName("myDevice");
-        document.write("Fail");
-    }catch(e){
-        if ("SecurityError" == e.name) {
-            document.write("Pass");
-        } else {
-            document.write("Fail");
-        }
-    }
-</script>
- </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-bt-admin-enable/config.xml b/tct-privacy-tests/security-bt-admin-enable/config.xml
deleted file mode 100644 (file)
index c796765..0000000
+++ /dev/null
@@ -1,10 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-bt-admin-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-bt-admin-enable</name>
-  <tizen:application id="wrt5sba023.securitybtadminenable" package="wrt5sba023" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/bluetooth.admin"/>
-  <tizen:privilege name ="http://tizen.org/privilege/bluetooth.gap"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-bt-admin-enable/icon.png b/tct-privacy-tests/security-bt-admin-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-bt-admin-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-bt-admin-enable/index.html b/tct-privacy-tests/security-bt-admin-enable/index.html
deleted file mode 100644 (file)
index 0e9b2e0..0000000
+++ /dev/null
@@ -1,62 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-bt-admin-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to bluetooth.admin sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
- <body>
-  <script type="text/javascript">
-
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must allow Web Application access to bluetooth.admin sensitive API features with first consulting the security policy <br>");
-
-    try{
-        var adapter = tizen.bluetooth.getDefaultAdapter();
-        adapter.setName("myDevice");
-        document.write("Pass");
-    }catch(e){
-        if ("SecurityError" == e.name) {
-            document.write("Fail");
-        } else {
-            document.write("Fail");
-        }
-    }
-
-</script>
- </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-bt-gap-disable/config.xml b/tct-privacy-tests/security-bt-gap-disable/config.xml
deleted file mode 100644 (file)
index ec38f16..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-bt-gap-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-bt-gap-disable</name>
-  <tizen:application id="wrt5sbg024.securitybtgapdisable" package="wrt5sbg024" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-bt-gap-disable/icon.png b/tct-privacy-tests/security-bt-gap-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-bt-gap-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-bt-gap-disable/index.html b/tct-privacy-tests/security-bt-gap-disable/index.html
deleted file mode 100644 (file)
index ba730f0..0000000
+++ /dev/null
@@ -1,61 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-bt-gap-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to bluetooth.gap sensitive API features without first consulting the security policy" />
-    <meta charset="utf-8">
-  </head>
- <body>
-  <script type="text/javascript">
-
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must not allow Web Application access to bluetooth.gap sensitive API features without first consulting the security policy <br>");
-
-    try{
-        var adapter = tizen.bluetooth.getDefaultAdapter();
-        document.write("Fail");
-    }catch(e){
-        if ("SecurityError" == e.name) {
-            document.write("Pass");
-        } else {
-            document.write("Pass");
-        }
-    }
-
-</script>
- </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-bt-gap-enable/config.xml b/tct-privacy-tests/security-bt-gap-enable/config.xml
deleted file mode 100644 (file)
index 56cac50..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-bt-gap-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-bt-gap-enable</name>
-  <tizen:application id="wrt5sbg025.securitybtgapenable" package="wrt5sbg025" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/bluetooth.gap" />
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-bt-gap-enable/icon.png b/tct-privacy-tests/security-bt-gap-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-bt-gap-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-bt-gap-enable/index.html b/tct-privacy-tests/security-bt-gap-enable/index.html
deleted file mode 100644 (file)
index 8821787..0000000
+++ /dev/null
@@ -1,58 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-bt-gap-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to bluetooth.gap sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
- <body>
-  <script type="text/javascript">
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must allow Web Application access to bluetooth.gap sensitive API features with first consulting the security policy <br>");
-    try{
-        var adapter = tizen.bluetooth.getDefaultAdapter();
-        document.write("Pass");
-    }catch(e){
-        if ("SecurityError" == e.name) {
-            document.write("Fail");
-        } else {
-            document.write("Fail");
-        }
-    }
-</script>
- </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-bt-spp-disable/config.xml b/tct-privacy-tests/security-bt-spp-disable/config.xml
deleted file mode 100644 (file)
index 7a187f7..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-bt-spp-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-bt-spp-disable</name>
-  <tizen:application id="wrt5sbs026.securitybtsppdisable" package="wrt5sbs026" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/bluetooth.gap" />
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-bt-spp-disable/icon.png b/tct-privacy-tests/security-bt-spp-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-bt-spp-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-bt-spp-disable/index.html b/tct-privacy-tests/security-bt-spp-disable/index.html
deleted file mode 100644 (file)
index 438f7cc..0000000
+++ /dev/null
@@ -1,67 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-bt-spp-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to bluetooth.spp sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
- <body>
-      <script>
-
-         try{
-             function chatServiceSuccessCb(recordHandler) {
-                 document.write("Fail");
-             }
-             function chatServiceErrorCb(recordHandler) {
-                 document.write("Fail");
-             }
-             
-             var adapter = tizen.bluetooth.getDefaultAdapter();
-             var CHAT_SERVICE_UUID = "5BCE9431-6C75-32AB-AFE0-2EC108A30860";
-             adapter.registerRFCOMMServiceByUUID(CHAT_SERVICE_UUID, "Chat service", chatServiceSuccessCb,chatServiceErrorCb);
-             document.write("Fail");
-         }catch (e) {
-             if ("SecurityError" == e.name) {
-                 document.write("Pass");
-             } else {
-                 document.write("Fail");
-             }
-         }
-
-      </script>
- </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-bt-spp-enable/config.xml b/tct-privacy-tests/security-bt-spp-enable/config.xml
deleted file mode 100644 (file)
index f8d2580..0000000
+++ /dev/null
@@ -1,10 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-bt-spp-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-bt-spp-enable</name>
-  <tizen:application id="wrt5sbs027.securitybtsppenable" package="wrt5sbs027" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/bluetooth.spp"/>
-  <tizen:privilege name ="http://tizen.org/privilege/bluetooth.gap"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-bt-spp-enable/icon.png b/tct-privacy-tests/security-bt-spp-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-bt-spp-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-bt-spp-enable/index.html b/tct-privacy-tests/security-bt-spp-enable/index.html
deleted file mode 100644 (file)
index 10fc8ac..0000000
+++ /dev/null
@@ -1,64 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-bt-spp-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <script src="../testharness.js"></script>
-    <script src="../testharnessreport.js"></script>
-    <script src="../bluetooth_test_utils.js"></script>
-    <meta name="assert" content="Check that the WRT must allow Web Application access to bluetooth.spp sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
- <body>
-      <script>
-         try{
-             function chatServiceSuccessCb(recordHandler) {
-                 document.write("Pass");
-             }
-             function chatServiceErrorCb(recordHandler) {
-                 document.write("Pass");
-             }
-             var adapter = tizen.bluetooth.getDefaultAdapter();
-             var CHAT_SERVICE_UUID = "5BCE9431-6C75-32AB-AFE0-2EC108A30860";
-             adapter.registerRFCOMMServiceByUUID(CHAT_SERVICE_UUID, "Chat service", chatServiceSuccessCb,chatServiceErrorCb);
-             document.write("Pass");
-         }catch (e){
-            document.write("Fail");
-         }
-       </script>
-</script>
- </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-calendar-read-disable/config.xml b/tct-privacy-tests/security-calendar-read-disable/config.xml
deleted file mode 100644 (file)
index c6fb649..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-calendar-read-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-calendar-read-disable</name>
-  <tizen:application id="wrt5scr030.securitycalendarreaddisable" package="wrt5scr030" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-calendar-read-disable/icon.png b/tct-privacy-tests/security-calendar-read-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-calendar-read-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-calendar-read-disable/index.html b/tct-privacy-tests/security-calendar-read-disable/index.html
deleted file mode 100644 (file)
index da0b47c..0000000
+++ /dev/null
@@ -1,65 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-calendar-read-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to calendar.read sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-    <script type="text/javascript">
-     document.write("<br><br><br>");
-     document.write("Test purpose: Check that the WRT must not allow Web Application access to calendar.read sensitive API features without first consulting the security policy <br>");
-       try{
-           var calendar = tizen.calendar.getDefaultCalendar();
-
-           var html5seminar = new tizen.CalendarEvent({startDate: new tizen.TZDate(2012, 3, 4),
-                                              duration: new tizen.TimeDuration(3, "DAYS"),
-                                              summary: "HTML5 Seminar"});
-
-           calendar.add(html5seminar);
-           var tizenseminar = html5seminar.clone();
-           document.write("Fail");
-       }catch(e){
-           if ("SecurityError" == e.name) {
-               document.write("Pass");
-           } else {
-               document.write("Fail");
-           }
-       }
-    </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-calendar-read-enable/config.xml b/tct-privacy-tests/security-calendar-read-enable/config.xml
deleted file mode 100644 (file)
index 4fa57e9..0000000
+++ /dev/null
@@ -1,10 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-calendar-read-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-calendar-read-enable</name>
-  <tizen:application id="wrt5scr031.securitycalendarreadenable" package="wrt5scr031" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/calendar.read" />
-   <tizen:privilege name="http://tizen.org/privilege/calendar.write" />
-</widget>
diff --git a/tct-privacy-tests/security-calendar-read-enable/icon.png b/tct-privacy-tests/security-calendar-read-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-calendar-read-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-calendar-read-enable/index.html b/tct-privacy-tests/security-calendar-read-enable/index.html
deleted file mode 100644 (file)
index 7054143..0000000
+++ /dev/null
@@ -1,55 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-calendar-read-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to calendar.read sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-    <script type="text/javascript">
-     document.write("<br><br><br>");
-     document.write("Test purpose: Check that the WRT must not allow Web Application access to calendar.read sensitive API features with first consulting the security policy <br>");
-       try{
-           var myCalendar = tizen.calendar.getDefaultCalendar("EVENT");
-           document.write("Pass");
-       }catch(e){
-           document.write("Fail");
-       }
-    </script>
-  </body>
-  </body>
-</html>
diff --git a/tct-privacy-tests/security-calendar-write-disable/config.xml b/tct-privacy-tests/security-calendar-write-disable/config.xml
deleted file mode 100644 (file)
index d9cc3e9..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-calendar-write-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-calendar-write-disable</name>
-  <tizen:application id="wrt5scw032.securitycalendarwritedisable" package="wrt5scw032" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-calendar-write-disable/icon.png b/tct-privacy-tests/security-calendar-write-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-calendar-write-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-calendar-write-disable/index.html b/tct-privacy-tests/security-calendar-write-disable/index.html
deleted file mode 100644 (file)
index 5dc0fe3..0000000
+++ /dev/null
@@ -1,65 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-calendar-write-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to calendar.write sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must not allow Web Application access to calendar.write sensitive API features without first consulting the security policy <br>");
-    try{
-        var calendar = tizen.calendar.getDefaultCalendar("EVENT");
-        var ev = new tizen.CalendarEvent({description:'HTML5 Introduction',
-                                   summary:'HTML5 Webinar ',
-                                   startDate: new tizen.TZDate(2011, 3, 30, 10, 0),
-                                   duration: new tizen.TimeDuration(1, "HOURS"),
-                                   location:'Huesca'});
-
-        calendar.add(ev);
-        document.write("Fail");
-    }catch(e){
-        if ("SecurityError" == e.name) {
-            document.write("Pass");
-        } else {
-            document.write("Fail");
-        }
-    }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-calendar-write-enable/config.xml b/tct-privacy-tests/security-calendar-write-enable/config.xml
deleted file mode 100644 (file)
index 9865ffd..0000000
+++ /dev/null
@@ -1,10 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-calendar-write-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-calendar-write-enable</name>
-  <tizen:application id="wrt5scw033.securitycalendarwriteenable" package="wrt5scw033" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/calendar.write"/>
-  <tizen:privilege name="http://tizen.org/privilege/calendar.read"/>
-</widget>
diff --git a/tct-privacy-tests/security-calendar-write-enable/icon.png b/tct-privacy-tests/security-calendar-write-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-calendar-write-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-calendar-write-enable/index.html b/tct-privacy-tests/security-calendar-write-enable/index.html
deleted file mode 100644 (file)
index 6ac38ef..0000000
+++ /dev/null
@@ -1,62 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-calendar-write-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to calendar.write sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must allow Web Application access to calendar.write sensitive API features with first consulting the security policy <br>");
-
-    try{
-        var calendar = tizen.calendar.getDefaultCalendar("EVENT");
-        var ev = new tizen.CalendarEvent({description:'HTML5 Introduction',
-                                   summary:'HTML5 Webinar ',
-                                   startDate: new tizen.TZDate(2011, 3, 30, 10, 0),
-                                   duration: new tizen.TimeDuration(1, "HOURS"),
-                                   location:'Huesca'});
-        calendar.add(ev);
-        document.write("Pass");
-    }catch(e){
-        document.write("Fail");
-    }
-   </script>
-  </body>
-</html>
diff --git a/tct-privacy-tests/security-callhistory-read-disable/config.xml b/tct-privacy-tests/security-callhistory-read-disable/config.xml
deleted file mode 100644 (file)
index 80a4e64..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-callhistory-read-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-callhistory-read-disable</name>
-  <tizen:application id="wrt5sch038.securitycallhistoryreaddisable" package="wrt5sch038" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-callhistory-read-disable/icon.png b/tct-privacy-tests/security-callhistory-read-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-callhistory-read-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-callhistory-read-disable/index.html b/tct-privacy-tests/security-callhistory-read-disable/index.html
deleted file mode 100644 (file)
index 2ca69e7..0000000
+++ /dev/null
@@ -1,68 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-callhistory-read-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to callhistory.read sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must not allow Web Application access to callhistory.read sensitive API features without first consulting the security policy <br>");
-
-    try{
-       var onListenerCB = {
-       onadded: function() {
-            document.write("Fail");
-        },
-         onchanged: function() {
-            document.write("Fail");
-     }};
-     var handle = tizen.callhistory.addChangeListener(onListenerCB);
-     tizen.callhistory.removeChangeListener(handle);
-     document.write("Fail");
-    }catch(e){
-        if ("SecurityError" == e.name) {
-            document.write("Pass");
-        } else {
-            document.write("Fail");
-        }
-    }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-callhistory-read-enable/config.xml b/tct-privacy-tests/security-callhistory-read-enable/config.xml
deleted file mode 100644 (file)
index d6063f6..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-callhistory-read-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-callhistory-read-enable</name>
-  <tizen:application id="wrt5sch039.securitycallhistoryreadenable" package="wrt5sch039" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/callhistory.read" />
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-callhistory-read-enable/icon.png b/tct-privacy-tests/security-callhistory-read-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-callhistory-read-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-callhistory-read-enable/index.html b/tct-privacy-tests/security-callhistory-read-enable/index.html
deleted file mode 100644 (file)
index 61e07f9..0000000
+++ /dev/null
@@ -1,64 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-callhistory-read-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to callhistory.read sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must allow Web Application access to callhistory.read sensitive API features with first consulting the security policy <br>");
-
-    try{
-        var onListenerCB = {
-        onadded: function() {
-            document.write("Pass");
-        },
-         onchanged: function() {
-            document.write("Pass");
-     }};
-        var handle = tizen.callhistory.addChangeListener(onListenerCB);
-        tizen.callhistory.removeChangeListener(handle);
-        document.write("Pass");
-    }catch(e){
-        document.write("Fail");
-    }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-callhistory-write-disable/config.xml b/tct-privacy-tests/security-callhistory-write-disable/config.xml
deleted file mode 100644 (file)
index ad619fa..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-callhistory-write-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-callhistory-write-disable</name>
-  <tizen:application id="wrt5sch040.securitycallhistorywritedisable" package="wrt5sch040" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-callhistory-write-disable/icon.png b/tct-privacy-tests/security-callhistory-write-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-callhistory-write-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-callhistory-write-disable/index.html b/tct-privacy-tests/security-callhistory-write-disable/index.html
deleted file mode 100644 (file)
index 1d52259..0000000
+++ /dev/null
@@ -1,67 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-callhistory-write-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to callhistory.write sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must not allow Web Application access to callhistory.write sensitive API features without first consulting the security policy <br>");
-
-    try{
-        var onListenerCB = {
-        onadded: function() {
-            document.write("Fail");
-        },
-        onchanged: function() {
-            document.write("Fail");
-     }};
-        var handle = tizen.callhistory.addChangeListener(onListenerCB);
-        tizen.callhistory.removeChangeListener(handle);
-        document.write("Fail");
-    }catch(e){
-        if ("SecurityError" == e.name) {
-            document.write("Pass");
-        } else {
-            document.write("Fail");
-        }
-    }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-callhistory-write-enable/config.xml b/tct-privacy-tests/security-callhistory-write-enable/config.xml
deleted file mode 100644 (file)
index cd2b664..0000000
+++ /dev/null
@@ -1,10 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-callhistory-write-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-callhistory-write-enable</name>
-  <tizen:application id="wrt5sch041.securitycallhistorywriteenable" package="wrt5sch041" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/callhistory.write" />
-  <tizen:privilege name="http://tizen.org/privilege/callhistory.read" />
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-callhistory-write-enable/icon.png b/tct-privacy-tests/security-callhistory-write-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-callhistory-write-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-callhistory-write-enable/index.html b/tct-privacy-tests/security-callhistory-write-enable/index.html
deleted file mode 100644 (file)
index 6a02766..0000000
+++ /dev/null
@@ -1,64 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-callhistory-write-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to callhistory.write sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must allow Web Application access to callhistory.write sensitive API features with first consulting the security policy <br>");
-
-    try{
-        var onListenerCB = {
-        onadded: function() {
-            document.write("Pass");
-        },
-        onchanged: function() {
-            document.write("Pass");
-        }};
-        var handle = tizen.callhistory.addChangeListener(onListenerCB);
-        tizen.callhistory.removeChangeListener(handle);
-        document.write("Pass");
-    }catch(e){
-        document.write("Fail");
-    }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-contact-read-disable/config.xml b/tct-privacy-tests/security-contact-read-disable/config.xml
deleted file mode 100644 (file)
index ed766cb..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-contact-read-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-contact-read-disable</name>
-  <tizen:application id="wrt5scr046.securitycontactreaddisable" package="wrt5scr046" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-contact-read-disable/icon.png b/tct-privacy-tests/security-contact-read-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-contact-read-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-contact-read-disable/index.html b/tct-privacy-tests/security-contact-read-disable/index.html
deleted file mode 100644 (file)
index 431afd1..0000000
+++ /dev/null
@@ -1,60 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-contact-read-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to contact.read sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must not allow Web Application access to contact.read sensitive API features without first consulting the security policy <br>");
-
-    try{
-        var addressbook;
-        addressbook = tizen.contact.getDefaultAddressBook();
-        document.write("Fail");
-    }catch(e){
-        if ("SecurityError" == e.name) {
-            document.write("Pass");
-        } else {
-            document.write("Fail");
-        }
-    }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-contact-read-enable/config.xml b/tct-privacy-tests/security-contact-read-enable/config.xml
deleted file mode 100644 (file)
index f4a8ea6..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-contact-read-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-contact-read-enable</name>
-  <tizen:application id="wrt5scr047.securitycontactreadenable" package="wrt5scr047" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/contact.read" />
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-contact-read-enable/icon.png b/tct-privacy-tests/security-contact-read-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-contact-read-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-contact-read-enable/index.html b/tct-privacy-tests/security-contact-read-enable/index.html
deleted file mode 100644 (file)
index f2c7f1a..0000000
+++ /dev/null
@@ -1,56 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-contact-read-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to contact.read sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-    <script type="text/javascript">
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must not allow Web Application access to contact.read sensitive API features without first consulting the security policy <br>");
-
-    try{
-        var addressbook;
-        addressbook = tizen.contact.getDefaultAddressBook();
-        document.write("Pass");
-    }catch(e){
-        document.write("Fail");
-    }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-contact-write-disable/config.xml b/tct-privacy-tests/security-contact-write-disable/config.xml
deleted file mode 100644 (file)
index 419feba..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-contact-write-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-contact-write-disable</name>
-  <tizen:application id="wrt5scw048.securitycontactwritedisable" package="wrt5scw048" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-contact-write-disable/icon.png b/tct-privacy-tests/security-contact-write-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-contact-write-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-contact-write-disable/index.html b/tct-privacy-tests/security-contact-write-disable/index.html
deleted file mode 100644 (file)
index 06bf223..0000000
+++ /dev/null
@@ -1,73 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-contact-write-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to contact.write sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must not allow Web Application access to contact.write sensitive API features without first consulting the security policy <br>");
-
-        try{
-        var addressbook;
-        addressbook = tizen.contact.getDefaultAddressBook();
-          var contact = new tizen.Contact(
-                      "BEGIN:VCARD\n"+
-                      "VERSION:3.0\n"+
-                      "N:Gump;Forrest\n"+
-                      "FN:Forrest Gump\n"+
-                      "ORG:Bubba Gump Shrimp Co.\n"+
-                      "TITLE:Shrimp Man\n"+
-                      "TEL;WORK:(111) 555-1212\n"+
-                      "TEL;HOME:(404) 555-1212\n"+
-                      "EMAIL;WORK;PREF:forrestgump@example.com\n"+
-                      "END:VCARD");
-           addressbook.add(contact);
-
-        document.write("Fail");
-    }catch(e){
-        if ("SecurityError" == e.name) {
-            document.write("Pass");
-        } else {
-            document.write("Fail");
-        }
-    }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-contact-write-enable/config.xml b/tct-privacy-tests/security-contact-write-enable/config.xml
deleted file mode 100644 (file)
index 060179f..0000000
+++ /dev/null
@@ -1,10 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-contact-write-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-contact-write-enable</name>
-  <tizen:application id="wrt5scw049.securitycontactwriteenable" package="wrt5scw049" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/contact.write"/>
-  <tizen:privilege name="http://tizen.org/privilege/contact.read"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-contact-write-enable/icon.png b/tct-privacy-tests/security-contact-write-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-contact-write-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-contact-write-enable/index.html b/tct-privacy-tests/security-contact-write-enable/index.html
deleted file mode 100644 (file)
index c31839b..0000000
+++ /dev/null
@@ -1,69 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-contact-write-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to contact.write sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must allow Web Application access to contact.write sensitive API features with first consulting the security policy <br>");
-     try{
-        var addressbook;
-        addressbook = tizen.contact.getDefaultAddressBook();
-          var contact = new tizen.Contact(
-                      "BEGIN:VCARD\n"+
-                      "VERSION:3.0\n"+
-                      "N:Gump;Forrest\n"+
-                      "FN:Forrest Gump\n"+
-                      "ORG:Bubba Gump Shrimp Co.\n"+
-                      "TITLE:Shrimp Man\n"+
-                      "TEL;WORK:(111) 555-1212\n"+
-                      "TEL;HOME:(404) 555-1212\n"+
-                      "EMAIL;WORK;PREF:forrestgump@example.com\n"+
-                      "END:VCARD");
-           addressbook.add(contact);
-
-        document.write("Pass");
-    }catch(e){
-        document.write("Fail");
-    }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-content-read-disable/config.xml b/tct-privacy-tests/security-content-read-disable/config.xml
deleted file mode 100644 (file)
index 8374590..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-content-read-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-content-read-disable</name>
-  <tizen:application id="wrt5con148.securitycontentreaddisable" package="wrt5con148" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-content-read-disable/icon.png b/tct-privacy-tests/security-content-read-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-content-read-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-content-read-disable/index.html b/tct-privacy-tests/security-content-read-disable/index.html
deleted file mode 100644 (file)
index 1d2d4c4..0000000
+++ /dev/null
@@ -1,60 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-content-read-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to content.read sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must not allow Web Application access to content.read sensitive API features without first consulting the security policy <br>");
-
-    try{
-       tizen.content.unsetChangeListener();
-       document.write("Fail");
-    }catch(e){
-        if ("SecurityError" == e.name) {
-            document.write("Pass");
-        } else {
-            document.write("Fail");
-        }
-    }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-content-read-enable/config.xml b/tct-privacy-tests/security-content-read-enable/config.xml
deleted file mode 100644 (file)
index 10d11d7..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-content-read-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-content-read-enable</name>
-  <tizen:application id="wrt5con147.securitycontentreadenable" package="wrt5con147" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/content.read" />
-</widget>
diff --git a/tct-privacy-tests/security-content-read-enable/icon.png b/tct-privacy-tests/security-content-read-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-content-read-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-content-read-enable/index.html b/tct-privacy-tests/security-content-read-enable/index.html
deleted file mode 100644 (file)
index 4f1126f..0000000
+++ /dev/null
@@ -1,55 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-content-read-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to content.read sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-     document.write("<br><br><br>");
-     document.write("Test purpose: Check that the WRT must not allow Web Application access to content.read sensitive API features with first consulting the security policy <br>");
-    try{
-       tizen.content.unsetChangeListener();
-       document.write("Pass")
-    }catch(e){
-        document.write("Fail");
-    }
-   </script>
-  </body>
-</html>
diff --git a/tct-privacy-tests/security-content-write-disable/config.xml b/tct-privacy-tests/security-content-write-disable/config.xml
deleted file mode 100644 (file)
index 86fbcaa..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-content-write-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-content-write-disable</name>
-  <tizen:application id="wrt5con146.securitycontentwritedisable" package="wrt5con146" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-content-write-disable/icon.png b/tct-privacy-tests/security-content-write-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-content-write-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-content-write-disable/index.html b/tct-privacy-tests/security-content-write-disable/index.html
deleted file mode 100644 (file)
index f7fd68e..0000000
+++ /dev/null
@@ -1,63 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-content-write-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to content.write sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-try{
-       function findCB(contents) {
-           contents.forEach(printContent);
-       }
-       function printContent(content) {
-           tizen.content.update(content);
-           document.write("Fail")
-       }
-       tizen.content.find(findCB);
-       document.write("Fail")
-    }catch(e){
-        if ("SecurityError" == e.name) {
-            document.write("Pass");
-        } else {
-            document.write("Fail");
-        }
-    }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-content-write-enable/config.xml b/tct-privacy-tests/security-content-write-enable/config.xml
deleted file mode 100644 (file)
index bd81c9c..0000000
+++ /dev/null
@@ -1,10 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-content-write-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-content-write-enable</name>
-  <tizen:application id="wrt5con145.securitycontentwriteenable" package="wrt5con145" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/content.write" />
-  <tizen:privilege name="http://tizen.org/privilege/content.read" />
-</widget>
diff --git a/tct-privacy-tests/security-content-write-enable/icon.png b/tct-privacy-tests/security-content-write-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-content-write-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-content-write-enable/index.html b/tct-privacy-tests/security-content-write-enable/index.html
deleted file mode 100644 (file)
index 5a23377..0000000
+++ /dev/null
@@ -1,62 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-content-write-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to content.write sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must allow Web Application access to content.write sensitive API features with first consulting the security policy <br>");
-    try{
-       function findCB(contents) {
-           contents.forEach(printContent);
-       }
-       function printContent(content) {
-           tizen.content.update(content);
-           document.write("Pass")
-       }
-       tizen.content.find(findCB);
-
-    }catch(e){
-        document.write("Fail");
-    }
-   </script>
-  </body>
-</html>
diff --git a/tct-privacy-tests/security-datacontrol-disable/config.xml b/tct-privacy-tests/security-datacontrol-disable/config.xml
deleted file mode 100644 (file)
index 1c0be8e..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-datacontrol-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-datacontrol-disable</name>
-  <tizen:application id="wrt5sbr091.securitydatacontroldisable" package="wrt5sbr091" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-datacontrol-disable/icon.png b/tct-privacy-tests/security-datacontrol-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-datacontrol-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-datacontrol-disable/index.html b/tct-privacy-tests/security-datacontrol-disable/index.html
deleted file mode 100644 (file)
index 6f9805a..0000000
+++ /dev/null
@@ -1,60 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-datacontrol-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to datacontrol sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-      document.write("<br><br><br>");
-      document.write("Test purpose: Check that the WRT must not allow Web Application access to datacontrol sensitive API features without first consulting the security policy <br>");
-
-      try{
-          var sqlConsumer = tizen.datacontrol.getDataControlConsumer("http://tizen.org/datacontrol/provider/DictionaryDataControlProvider", "Dictionary", "SQL");
-          document.write("Fail");
-      }catch(e){
-          if (e.name == "SecurityError"){
-              document.write("Pass");
-          } else {
-              document.write("Fail");
-          }
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-datacontrol-enable/config.xml b/tct-privacy-tests/security-datacontrol-enable/config.xml
deleted file mode 100644 (file)
index fb81cfd..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-datacontrol-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-datacontrol-enable</name>
-  <tizen:application id="wrt5sbr081.securitydatacontrolenable" package="wrt5sbr081" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/datacontrol.consumer"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-datacontrol-enable/icon.png b/tct-privacy-tests/security-datacontrol-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-datacontrol-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-datacontrol-enable/index.html b/tct-privacy-tests/security-datacontrol-enable/index.html
deleted file mode 100644 (file)
index fdc0218..0000000
+++ /dev/null
@@ -1,56 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-datacontrol-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to datacontrol sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-      document.write("<br><br><br>");
-      document.write("Test purpose: Check that the WRT must allow Web Application access to datacontrol sensitive API features with first consulting the security policy <br>");
-
-      try{
-          var sqlConsumer = tizen.datacontrol.getDataControlConsumer("http://tizen.org/datacontrol/provider/DictionaryDataControlProvider", "Dictionary", "SQL");
-          document.write("Pass");
-      }catch(e){
-          document.write("Fail");
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-datasync-disable/config.xml b/tct-privacy-tests/security-datasync-disable/config.xml
deleted file mode 100644 (file)
index 6dbbaf0..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-datasync-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-datasync-disable</name>
-  <tizen:application id="wrt5sbr092.securitydatasyncdisable" package="wrt5sbr092" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-datasync-disable/icon.png b/tct-privacy-tests/security-datasync-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-datasync-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-datasync-disable/index.html b/tct-privacy-tests/security-datasync-disable/index.html
deleted file mode 100644 (file)
index 6a1d9ce..0000000
+++ /dev/null
@@ -1,65 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-datasync-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to datasync sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-      document.write("<br><br><br>");
-      document.write("Test purpose: Check that the WRT must not allow Web Application access to datasync sensitive API features without first consulting the security policy <br>");
-
-      try{
-          var syncInfo = new tizen.SyncInfo("http://example.com/sync", "myId", "myPassword", "MANUAL", "TWO_WAY");
-          var contactInfo = new tizen.SyncServiceInfo(true, "CONTACT", "serverContact");
-          var eventInfo = new tizen.SyncServiceInfo(true, "EVENT", "serverEvent");
-          var serviceInfo = [contactInfo, eventInfo];
-          var profile = new tizen.SyncProfileInfo("MyProfile", syncInfo, serviceInfo);
-          tizen.datasync.add(profile);
-          document.write("Fail");
-      }catch(e){
-          if (e.name == "SecurityError"){
-              document.write("Pass");
-          } else {
-              document.write("Fail");
-          }
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-datasync-enable/config.xml b/tct-privacy-tests/security-datasync-enable/config.xml
deleted file mode 100644 (file)
index 7392be5..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-datasync-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-datasync-enable</name>
-  <tizen:application id="wrt5sbr082.securitydatasyncenable" package="wrt5sbr082" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/datasync"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-datasync-enable/icon.png b/tct-privacy-tests/security-datasync-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-datasync-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-datasync-enable/index.html b/tct-privacy-tests/security-datasync-enable/index.html
deleted file mode 100644 (file)
index 348f529..0000000
+++ /dev/null
@@ -1,61 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-datasync-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to datasync sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-      document.write("<br><br><br>");
-      document.write("Test purpose: Check that the WRT must allow Web Application access to datasync sensitive API features with first consulting the security policy <br>");
-
-      try{
-          var syncInfo = new tizen.SyncInfo("http://example.com/sync", "myId", "myPassword", "MANUAL", "TWO_WAY");
-          var contactInfo = new tizen.SyncServiceInfo(true, "CONTACT", "serverContact");
-          var eventInfo = new tizen.SyncServiceInfo(true, "EVENT", "serverEvent");
-          var serviceInfo = [contactInfo, eventInfo];
-          var profile = new tizen.SyncProfileInfo("MyProfile", syncInfo, serviceInfo);
-          tizen.datasync.add(profile);
-          document.write("Pass");
-      }catch(e){
-          document.write("Fail");
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-download-disable/config.xml b/tct-privacy-tests/security-download-disable/config.xml
deleted file mode 100644 (file)
index 7c5aa61..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-download-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-download-disable</name>
-  <tizen:application id="wrt5dow144.securitydownloaddisable" package="wrt5dow144" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-download-disable/icon.png b/tct-privacy-tests/security-download-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-download-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-download-disable/index.html b/tct-privacy-tests/security-download-disable/index.html
deleted file mode 100644 (file)
index 71ac689..0000000
+++ /dev/null
@@ -1,58 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-download-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to download sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-      document.write("Test purpose: Check that the WRT must not allow Web Application access to download sensitive API features without first consulting the security policy <br>");
-      try{
-           var downloadRequest = new tizen.DownloadRequest("http://download.tizen.org/tools/README.txt");
-           var downloadId = tizen.download.start(downloadRequest);
-           document.write("Fail");
-      }catch(e){
-          if ("SecurityError" == e.name) {
-              document.write("Pass");
-          } else {
-              document.write("Fail");
-          }
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-download-enable/config.xml b/tct-privacy-tests/security-download-enable/config.xml
deleted file mode 100644 (file)
index ec6ef00..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-download-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-download-enable</name>
-  <tizen:application id="wrt5dow143.securitydownloadenable" package="wrt5dow143" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/download" />
-</widget>
diff --git a/tct-privacy-tests/security-download-enable/icon.png b/tct-privacy-tests/security-download-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-download-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-download-enable/index.html b/tct-privacy-tests/security-download-enable/index.html
deleted file mode 100644 (file)
index b55e244..0000000
+++ /dev/null
@@ -1,58 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-download-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to download sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must allow Web Application access to download sensitive API features with first consulting the security policy <br>");
-
-    try{
-
-        var downloadRequest = new tizen.DownloadRequest("http://download.tizen.org/tools/README.txt");
-        var downloadId = tizen.download.start(downloadRequest);
-        document.write("Pass");
-    }catch(e){
-        document.write("Fail");
-    }
-   </script>
-  </body>
-</html>
diff --git a/tct-privacy-tests/security-filesystem-read-disable/config.xml b/tct-privacy-tests/security-filesystem-read-disable/config.xml
deleted file mode 100644 (file)
index 0bfd07b..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-filesystem-read-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-filesystem-read-disable</name>
-  <tizen:application id="wrt5sfr052.securityfilesystemreaddisable" package="wrt5sfr052" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-filesystem-read-disable/icon.png b/tct-privacy-tests/security-filesystem-read-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-filesystem-read-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-filesystem-read-disable/index.html b/tct-privacy-tests/security-filesystem-read-disable/index.html
deleted file mode 100644 (file)
index 860b298..0000000
+++ /dev/null
@@ -1,60 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-filesystem-read-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to filesystem.read sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must not allow Web Application access to filesystem.read sensitive API features without first consulting the security policy <br>");
-
-    try{
-        tizen.filesystem.getStorage("MMC");
-        document.write("Fail");
-    }catch(e){
-        if ("SecurityError" == e.name) {
-            document.write("Pass");
-        } else {
-            document.write("Fail");
-        }
-    }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-filesystem-read-enable/config.xml b/tct-privacy-tests/security-filesystem-read-enable/config.xml
deleted file mode 100644 (file)
index 4558ad6..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-filesystem-read-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-filesystem-read-enable</name>
-  <tizen:application id="wrt5sfr053.securityfilesystemreadenable" package="wrt5sfr053" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/filesystem.read" />
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-filesystem-read-enable/icon.png b/tct-privacy-tests/security-filesystem-read-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-filesystem-read-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-filesystem-read-enable/index.html b/tct-privacy-tests/security-filesystem-read-enable/index.html
deleted file mode 100644 (file)
index 49debae..0000000
+++ /dev/null
@@ -1,60 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-filesystem-read</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to filesystem.read sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must allow Web Application access to filesystem.read sensitive API features with first consulting the security policy <br>");
-
-    try{
-        function alertForCorruptedRemovableDrives(storages) {
-            document.write("Pass");
-        }
-        tizen.filesystem.listStorages(alertForCorruptedRemovableDrives);
-        document.write("Pass");
-    }catch(e){
-        document.write("Fail");
-    }
-
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-filesystem-write-disable/config.xml b/tct-privacy-tests/security-filesystem-write-disable/config.xml
deleted file mode 100644 (file)
index 197c0a1..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-filesystem-write-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-filesystem-write-disable</name>
-  <tizen:application id="wrt5sfw054.securityfilesystemwritedisable" package="wrt5sfw054" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/filesystem.read" />
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-filesystem-write-disable/icon.png b/tct-privacy-tests/security-filesystem-write-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-filesystem-write-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-filesystem-write-disable/index.html b/tct-privacy-tests/security-filesystem-write-disable/index.html
deleted file mode 100644 (file)
index 5aa029a..0000000
+++ /dev/null
@@ -1,70 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-filesystem-write-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to filesystem.write sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must not allow Web Application access to filesystem.write sensitive API features without first consulting the security policy <br>");
-
-    try{
-        function onsuccess(dir) {
-            try{
-                dir.createFile("newFilePath");
-            }catch(e){
-                if ("SecurityError" == e.name) {
-                    document.write("Pass");
-                } else {
-                    document.write("Fail");
-                }
-            }
-        }
-        function onerror(e){
-            document.write("Fail");
-        }
-        tizen.filesystem.resolve('documents', onsuccess, onerror, "rw");
-       document.write("Fail");
-    }catch(e){
-       document.write("Fail");
-    }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-filesystem-write-enable/config.xml b/tct-privacy-tests/security-filesystem-write-enable/config.xml
deleted file mode 100644 (file)
index 58cddfe..0000000
+++ /dev/null
@@ -1,10 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-filesystem-write-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-filesystem-write-enable</name>
-  <tizen:application id="wrt5sfw055.securityfilesystemwriteenable" package="wrt5sfw055" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/filesystem.write" />
-  <tizen:privilege name="http://tizen.org/privilege/filesystem.read" />
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-filesystem-write-enable/icon.png b/tct-privacy-tests/security-filesystem-write-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-filesystem-write-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-filesystem-write-enable/index.html b/tct-privacy-tests/security-filesystem-write-enable/index.html
deleted file mode 100644 (file)
index 419aca4..0000000
+++ /dev/null
@@ -1,61 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-filesystem-write-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to filesystem.write sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must allow Web Application access to filesystem.write sensitive API features with first consulting the security policy <br>");
-    try{
-        function onsuccess(dir) {
-            dir.createFile("newFilePath");
-            document.write("Pass");
-        }
-        function onerror(e){
-            document.write("Fail--The resolve method is failed");
-        }
-        tizen.filesystem.resolve('documents', onsuccess, onerror, "rw");
-    }catch(e){
-        document.write("Fail");
-    }
-   </script>
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-networkbearerselection-disable/config.xml b/tct-privacy-tests/security-networkbearerselection-disable/config.xml
deleted file mode 100644 (file)
index c529b78..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-networkbearerselection-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-networkbearerselection-disable</name>
-  <tizen:application id="wrt5sbr094.securitynetworkbearerselectiondisable" package="wrt5sbr094" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-networkbearerselection-disable/icon.png b/tct-privacy-tests/security-networkbearerselection-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-networkbearerselection-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-networkbearerselection-disable/index.html b/tct-privacy-tests/security-networkbearerselection-disable/index.html
deleted file mode 100644 (file)
index c9b71c8..0000000
+++ /dev/null
@@ -1,65 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-networkbearerselection-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to networkbearerselection sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-      document.write("<br><br><br>");
-      document.write("Test purpose: Check that the WRT must not allow Web Application access to networkbearerselection sensitive API features without first consulting the security policy <br>");
-
-      try{
-          function successcb(id) {
-          }
-          function errorcb(id, error){
-          }
-
-          tizen.networkbearerselection.requestRouteToHost("CELLULAR", "www.google.com", successcb, errorcb);
-          document.write("Fail");
-      }catch(e){
-          if (e.name == "SecurityError"){
-              document.write("Pass");
-          } else {
-              document.write("Fail");
-          }
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-networkbearerselection-enable/config.xml b/tct-privacy-tests/security-networkbearerselection-enable/config.xml
deleted file mode 100644 (file)
index 076507d..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-networkbearerselection-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-networkbearerselection-enable</name>
-  <tizen:application id="wrt5sbr084.securitynetworkbearerselectionenable" package="wrt5sbr084" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/networkbearerselection"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-networkbearerselection-enable/icon.png b/tct-privacy-tests/security-networkbearerselection-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-networkbearerselection-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-networkbearerselection-enable/index.html b/tct-privacy-tests/security-networkbearerselection-enable/index.html
deleted file mode 100644 (file)
index a0d2a8a..0000000
+++ /dev/null
@@ -1,63 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-networkbearerselection-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to networkbearerselection sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-      document.write("<br><br><br>");
-      document.write("Test purpose: Check that the WRT must allow Web Application access to networkbearerselection sensitive API features with first consulting the security policy <br>");
-
-      try{
-          function successcb(id) {
-              document.write("Pass");
-          }
-          function errorcb(id, error){
-              document.write("Pass");
-          }
-
-          tizen.networkbearerselection.requestRouteToHost("CELLULAR", "www.google.com", successcb, errorcb);
-          document.write("Pass");
-      }catch(e){
-          document.write("Fail");
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-nfc-admin-disable/config.xml b/tct-privacy-tests/security-nfc-admin-disable/config.xml
deleted file mode 100644 (file)
index d4ad900..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-nfc-admin-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-nfc-admin-disable</name>
-  <tizen:application id="wrt5sna074.securitynfcadmindisable" package="wrt5sna074" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/nfc.common" />
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-nfc-admin-disable/icon.png b/tct-privacy-tests/security-nfc-admin-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-nfc-admin-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-nfc-admin-disable/index.html b/tct-privacy-tests/security-nfc-admin-disable/index.html
deleted file mode 100644 (file)
index 4f083f1..0000000
+++ /dev/null
@@ -1,61 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-nfc-admin-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to nfc.admin sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must not allow Web Application access to nfc.admin sensitive API features without first consulting the security policy <br>");
-
-     try{
-         var adapter = tizen.nfc.getDefaultAdapter();
-         adapter.setPowered(true);
-         document.write("Fail");
-      }catch(e){
-          if ("SecurityError" == e.name) {
-              document.write("Pass");
-          } else {
-              document.write("Fail");
-          }
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-nfc-admin-enable/config.xml b/tct-privacy-tests/security-nfc-admin-enable/config.xml
deleted file mode 100644 (file)
index e314100..0000000
+++ /dev/null
@@ -1,10 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-nfc-admin-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-nfc-admin-enable</name>
-  <tizen:application id="wrt5sna075.securitynfcadminenable" package="wrt5sna075" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/nfc.admin"/>
-  <tizen:privilege name="http://tizen.org/privilege/nfc.common"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-nfc-admin-enable/icon.png b/tct-privacy-tests/security-nfc-admin-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-nfc-admin-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-nfc-admin-enable/index.html b/tct-privacy-tests/security-nfc-admin-enable/index.html
deleted file mode 100644 (file)
index db9565a..0000000
+++ /dev/null
@@ -1,55 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-nfc-admin-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to nfc.admin sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-      document.write("<br><br><br>");
-      document.write("Test purpose: Check that the WRT must allow Web Application access to nfc.admin sensitive API features with first consulting the security policy <br>");
-      try{
-        var adpter = tizen.nfc.getDefaultAdapter();
-        adpter.setPowered(true);
-        document.write("Pass");
-      }catch(e){
-          document.write("Fail");
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-nfc-common-disable/config.xml b/tct-privacy-tests/security-nfc-common-disable/config.xml
deleted file mode 100644 (file)
index 1c6e407..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-nfc-common-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-nfc-common-disable</name>
-  <tizen:application id="wrt5nfc140.securitynfccommondisable" package="wrt5nfc140" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-nfc-common-disable/icon.png b/tct-privacy-tests/security-nfc-common-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-nfc-common-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-nfc-common-disable/index.html b/tct-privacy-tests/security-nfc-common-disable/index.html
deleted file mode 100644 (file)
index 5f767f3..0000000
+++ /dev/null
@@ -1,59 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-nfc-commmon-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to nfc.common sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must not allow Web Application access to nfc.common sensitive API features without first consulting the security policy <br>");
-
-    try{
-        var adapter = tizen.nfc.getDefaultAdapter();
-        document.write("Fail");
-    }catch(e){
-        if ("SecurityError" == e.name) {
-            document.write("Pass");
-        } else {
-            document.write("Fail");
-        }
-    }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-nfc-common-enable/config.xml b/tct-privacy-tests/security-nfc-common-enable/config.xml
deleted file mode 100644 (file)
index 0f4d5ba..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-nfc-common-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-nfc-common-enable</name>
-  <tizen:application id="wrt5nfc139.securitynfccommonenable" package="wrt5nfc139" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/nfc.common" />
-</widget>
diff --git a/tct-privacy-tests/security-nfc-common-enable/icon.png b/tct-privacy-tests/security-nfc-common-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-nfc-common-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-nfc-common-enable/index.html b/tct-privacy-tests/security-nfc-common-enable/index.html
deleted file mode 100644 (file)
index fd96a48..0000000
+++ /dev/null
@@ -1,55 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-nfc-common-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to nfc.common sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must allow Web Application access to nfc.common sensitive API features with first consulting the security policy <br>");
-      try{
-        var adapter = tizen.nfc.getDefaultAdapter();
-        document.write("Pass");
-      }catch(e){
-          document.write("Fail");
-      }
-
-   </script>
-  </body>
-</html>
diff --git a/tct-privacy-tests/security-nfc-p2p-disable/config.xml b/tct-privacy-tests/security-nfc-p2p-disable/config.xml
deleted file mode 100644 (file)
index 89a264d..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-nfc-p2p-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-nfc-p2p-disable</name>
-  <tizen:application id="wrt5snp078.securitynfcp2pdisable" package="wrt5snp078" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/nfc.common"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-nfc-p2p-disable/icon.png b/tct-privacy-tests/security-nfc-p2p-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-nfc-p2p-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-nfc-p2p-disable/index.html b/tct-privacy-tests/security-nfc-p2p-disable/index.html
deleted file mode 100644 (file)
index 118623b..0000000
+++ /dev/null
@@ -1,67 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-nfc-p2p-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to nfc.p2p sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must not allow Web Application access to nfc.p2p sensitive API features without first consulting the security policy <br>");
-
-    try{
-        var adapter = tizen.nfc.getDefaultAdapter();
-        var onSuccessCB = {onattach : function(nfcPeer) {
-                                          document.write("Fail");
-                           }, 
-                           ondetach : function() {
-                                          document.write("Fail");
-                          }};
-        adapter.setPeerListener(onSuccessCB);
-        document.write("Fail");
-    }catch(e){
-        if ("SecurityError" == e.name) {
-            document.write("Pass");
-        } else {
-            document.write("Fail");
-        }
-    }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-nfc-p2p-enable/config.xml b/tct-privacy-tests/security-nfc-p2p-enable/config.xml
deleted file mode 100644 (file)
index 0ca4c8d..0000000
+++ /dev/null
@@ -1,10 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-nfc-p2p-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-nfc-p2p-enable</name>
-  <tizen:application id="wrt5snp079.securitynfcp2penable" package="wrt5snp079" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/nfc.p2p"/>
-  <tizen:privilege name="http://tizen.org/privilege/nfc.common"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-nfc-p2p-enable/icon.png b/tct-privacy-tests/security-nfc-p2p-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-nfc-p2p-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-nfc-p2p-enable/index.html b/tct-privacy-tests/security-nfc-p2p-enable/index.html
deleted file mode 100644 (file)
index 58a8aae..0000000
+++ /dev/null
@@ -1,63 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-nfc-p2p-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to nfc.p2p sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-      document.write("<br><br><br>");
-      document.write("Test purpose: Check that the WRT must allow Web Application access to nfc.p2p sensitive API features with first consulting the security policy <br>");
-
-      try{
-          var adapter = tizen.nfc.getDefaultAdapter();
-          var onSuccessCB = {onattach : function(nfcPeer) {
-                                             document.write("Pass");
-                            },
-                            ondetach : function() {
-                                             document.write("Pass");
-                            }};
-          adapter.setPeerListener(onSuccessCB);
-          document.write("Pass");
-      }catch(e){
-          document.write("Fail");
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-nfc-tag-disable/config.xml b/tct-privacy-tests/security-nfc-tag-disable/config.xml
deleted file mode 100644 (file)
index 5fd3dc9..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-nfc-tag-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-nfc-tag-disable</name>
-  <tizen:application id="wrt5snt080.securitynfctagdisable" package="wrt5snt080" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/nfc.common"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-nfc-tag-disable/icon.png b/tct-privacy-tests/security-nfc-tag-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-nfc-tag-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-nfc-tag-disable/index.html b/tct-privacy-tests/security-nfc-tag-disable/index.html
deleted file mode 100644 (file)
index 96f800c..0000000
+++ /dev/null
@@ -1,66 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-nfc-tag-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to nfc.tag sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must not allow Web Application access to nfc.tag sensitive API features without first consulting the security policy <br>");
-
-    try{
-        var adapter = tizen.nfc.getDefaultAdapter();
-        var onSuccessCB = {onattach : function(nfcTag) {
-                              document.write("Fail");
-                          }, ondetach : function() {
-                              document.write("Fail");
-        }};
-        adapter.setTagListener(onSuccessCB);
-        document.write("Fail");
-    }catch(e){
-        if ("SecurityError" == e.name) {
-            document.write("Pass");
-        } else {
-            document.write("Fail");
-        }
-    }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-nfc-tag-enable/config.xml b/tct-privacy-tests/security-nfc-tag-enable/config.xml
deleted file mode 100644 (file)
index 0bf1367..0000000
+++ /dev/null
@@ -1,10 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-nfc-tag-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-nfc-tag-enable</name>
-  <tizen:application id="wrt5snt081.securitynfctagenable" package="wrt5snt081" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/nfc.tag"/>
-  <tizen:privilege name="http://tizen.org/privilege/nfc.common"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-nfc-tag-enable/icon.png b/tct-privacy-tests/security-nfc-tag-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-nfc-tag-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-nfc-tag-enable/index.html b/tct-privacy-tests/security-nfc-tag-enable/index.html
deleted file mode 100644 (file)
index 9f2f5e8..0000000
+++ /dev/null
@@ -1,60 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-nfc-tag-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to nfc.tag sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-      document.write("<br><br><br>");
-      document.write("Test purpose: Check that the WRT must allow Web Application access to nfc.tag sensitive API features with first consulting the security policy <br>");
-    try{
-        var adapter = tizen.nfc.getDefaultAdapter();
-        var onSuccessCB = {onattach : function(nfcTag) {
-                              document.write("Pass");
-                          }, ondetach : function() {
-                              document.write("Pass");
-        }};
-        adapter.setTagListener(onSuccessCB);
-        document.write("Pass");
-    }catch(e){
-        document.write("Fail");
-    }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-notification-disable/config.xml b/tct-privacy-tests/security-notification-disable/config.xml
deleted file mode 100644 (file)
index facd41b..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-notification-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-notification-disable</name>
-  <tizen:application id="wrt5not138.securitynotificationdisable" package="wrt5not138" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-notification-disable/icon.png b/tct-privacy-tests/security-notification-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-notification-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-notification-disable/index.html b/tct-privacy-tests/security-notification-disable/index.html
deleted file mode 100644 (file)
index a576852..0000000
+++ /dev/null
@@ -1,57 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification, 
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list 
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice, 
-  this list of conditions and the following disclaimer in the documentation 
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors 
-  may be used to endorse or promote products derived from this work without 
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS" 
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT, 
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, 
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY 
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, 
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.  
-  
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-notification-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to notification sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-      document.write("Test purpose: Check that the WRT must not allow Web Application access to notification sensitive API features without first consulting the security policy <br>");
-      try{
-          tizen.notification.removeAll();
-          document.write("Fail");
-      }catch(e){
-          if ("SecurityError" == e.name) {
-              document.write("Pass");
-          } else {
-              document.write("Fail");
-          }
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-notification-enable/config.xml b/tct-privacy-tests/security-notification-enable/config.xml
deleted file mode 100644 (file)
index b9048a2..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-notification-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-notification-enable</name>
-  <tizen:application id="wrt5not137.securitynotificationenable" package="wrt5not137" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/notification" />
-</widget>
diff --git a/tct-privacy-tests/security-notification-enable/icon.png b/tct-privacy-tests/security-notification-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-notification-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-notification-enable/index.html b/tct-privacy-tests/security-notification-enable/index.html
deleted file mode 100644 (file)
index 13159fe..0000000
+++ /dev/null
@@ -1,54 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-notification-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to notification sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must allow Web Application access to notification sensitive API features with first consulting the security policy <br>");
-    try{
-        tizen.notification.removeAll();
-        document.write("Pass");
-    }catch(e){
-        document.write("Fail");
-    }
-   </script>
-  </body>
-</html>
diff --git a/tct-privacy-tests/security-package-info-disable/config.xml b/tct-privacy-tests/security-package-info-disable/config.xml
deleted file mode 100644 (file)
index f7e334e..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-package-info-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-package-info-disable</name>
-  <tizen:application id="wrt5sbr095.securitypackageinfodisable" package="wrt5sbr095" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-package-info-disable/icon.png b/tct-privacy-tests/security-package-info-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-package-info-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-package-info-disable/index.html b/tct-privacy-tests/security-package-info-disable/index.html
deleted file mode 100644 (file)
index 3400619..0000000
+++ /dev/null
@@ -1,68 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-package-info-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to package.info sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-      document.write("<br><br><br>");
-      document.write("Test purpose: Check that the WRT must not allow Web Application access to package.info sensitive API features without first consulting the security policy <br>");
-
-      try{
-          var packageEventCallback = {
-              oninstalled: function(packageInfo) {
-              },
-              onupdated: function(packageInfo) {
-              },
-              onuninstalled: function(packageId) {
-              }
-          };
-          tizen.package.setPackageInfoEventListener(packageEventCallback);
-          document.write("Fail");
-      }catch(e){
-          if (e.name == "SecurityError"){
-              document.write("Pass");
-          } else {
-              document.write("Fail");
-          }
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-package-info-enable/config.xml b/tct-privacy-tests/security-package-info-enable/config.xml
deleted file mode 100644 (file)
index 66c20a6..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-package-info-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-package-info-enable</name>
-  <tizen:application id="wrt5sbr085.securitypackageinfoenable" package="wrt5sbr085" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/package.info"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-package-info-enable/icon.png b/tct-privacy-tests/security-package-info-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-package-info-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-package-info-enable/index.html b/tct-privacy-tests/security-package-info-enable/index.html
deleted file mode 100644 (file)
index 02a9db5..0000000
+++ /dev/null
@@ -1,64 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-package-info-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to package.info sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-      document.write("<br><br><br>");
-      document.write("Test purpose: Check that the WRT must allow Web Application access to package.info sensitive API features with first consulting the security policy <br>");
-
-      try{
-          var packageEventCallback = {
-              oninstalled: function(packageInfo) {
-              },
-              onupdated: function(packageInfo) {
-              },
-              onuninstalled: function(packageId) {
-              }
-          };
-          tizen.package.setPackageInfoEventListener(packageEventCallback);
-          document.write("Pass");
-      }catch(e){
-          document.write("Fail");
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-package-install-disable/config.xml b/tct-privacy-tests/security-package-install-disable/config.xml
deleted file mode 100644 (file)
index e1e1a78..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-package-install-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-package-install-disable</name>
-  <tizen:application id="wrt5sbr096.securitypackageinstalldisable" package="wrt5sbr096" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-package-install-disable/icon.png b/tct-privacy-tests/security-package-install-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-package-install-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-package-install-disable/index.html b/tct-privacy-tests/security-package-install-disable/index.html
deleted file mode 100644 (file)
index 2bf8e61..0000000
+++ /dev/null
@@ -1,71 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-package-install-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to package.install sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-      document.write("<br><br><br>");
-      document.write("Test purpose: Check that the WRT must not allow Web Application access to package.install sensitive API features without first consulting the security policy <br>");
-
-      try{
-          var onInstallation = {
-              onprogress: function(packageId, percentage) {
-                  document.write("Fail");
-              },
-              oncomplete: function(packageId) {
-                  document.write("Fail");
-              }
-         }
-         var onError = function (err) {
-             document.write("Fail");
-         }
-         tizen.package.install("/opt/usr/media/test.wgt", onInstallation, onError);
-         document.write("Fail");
-      }catch(e){
-          if (e.name == "SecurityError"){
-              document.write("Pass");
-          } else {
-              document.write("Fail");
-          }
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-package-install-enable/config.xml b/tct-privacy-tests/security-package-install-enable/config.xml
deleted file mode 100644 (file)
index 4b35edb..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-package-install-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-package-install-enable</name>
-  <tizen:application id="wrt5sbr086.securitypackageinstallenable" package="wrt5sbr086" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/packagemanager.install"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-package-install-enable/icon.png b/tct-privacy-tests/security-package-install-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-package-install-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-package-install-enable/index.html b/tct-privacy-tests/security-package-install-enable/index.html
deleted file mode 100644 (file)
index c6479fa..0000000
+++ /dev/null
@@ -1,67 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-package-install-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to packagemanager.install sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-      document.write("<br><br><br>");
-      document.write("Test purpose: Check that the WRT must allow Web Application access to packagemanager.install sensitive API features with first consulting the security policy <br>");
-
-      try{
-          var onInstallation = {
-              onprogress: function(packageId, percentage) {
-                  document.write("Pass");
-              },
-              oncomplete: function(packageId) {
-                  document.write("Pass");
-              }
-          }
-          var onError = function (err) {
-              document.write("Pass");
-          }
-          tizen.package.install("/opt/usr/media/test.wgt", onInstallation, onError);
-          document.write("Pass");
-      }catch(e){
-          document.write("Fail");
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-power-disable/config.xml b/tct-privacy-tests/security-power-disable/config.xml
deleted file mode 100644 (file)
index a8831a0..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-power-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-power-disable</name>
-  <tizen:application id="wrt5pow136.securitypowerdisable" package="wrt5pow136" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-power-disable/icon.png b/tct-privacy-tests/security-power-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-power-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-power-disable/index.html b/tct-privacy-tests/security-power-disable/index.html
deleted file mode 100644 (file)
index 1f433db..0000000
+++ /dev/null
@@ -1,57 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-power-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to power sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-      document.write("Test purpose: Check that the WRT must not allow Web Application access to power sensitive API features without first consulting the security policy <br>");
-      try{
-          tizen.power.turnScreenOn();
-          document.write("Fail");
-      }catch(e){
-          if ("SecurityError" == e.name) {
-              document.write("Pass");
-          } else {
-              document.write("Fail");
-          }
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-power-enable/config.xml b/tct-privacy-tests/security-power-enable/config.xml
deleted file mode 100644 (file)
index bebb57f..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-power-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-power-enable</name>
-  <tizen:application id="wrt5pow135.securitypowerenable" package="wrt5pow135" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/power" />
-</widget>
diff --git a/tct-privacy-tests/security-power-enable/icon.png b/tct-privacy-tests/security-power-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-power-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-power-enable/index.html b/tct-privacy-tests/security-power-enable/index.html
deleted file mode 100644 (file)
index 057ad77..0000000
+++ /dev/null
@@ -1,54 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-power-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to power sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-    document.write("<br><br><br>");
-    document.write("Test purpose: Check that the WRT must allow Web Application access to power sensitive API features with first consulting the security policy <br>");
-    try{
-        tizen.power.turnScreenOn();
-        document.write("Pass");
-    }catch(e){
-        document.write("Fail");
-    }
-   </script>
-  </body>
-</html>
diff --git a/tct-privacy-tests/security-push-disable/config.xml b/tct-privacy-tests/security-push-disable/config.xml
deleted file mode 100644 (file)
index d4a7115..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-push-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-push-disable</name>
-  <tizen:application id="wrt5sbr097.securitypushdisable" package="wrt5sbr097" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-push-disable/icon.png b/tct-privacy-tests/security-push-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-push-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-push-disable/index.html b/tct-privacy-tests/security-push-disable/index.html
deleted file mode 100644 (file)
index 6c988b2..0000000
+++ /dev/null
@@ -1,60 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-push-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to push sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-      document.write("<br><br><br>");
-      document.write("Test purpose: Check that the WRT must not allow Web Application access to push sensitive API features without first consulting the security policy <br>");
-
-      try{
-          var registrationId = tizen.push.getRegistrationId();
-          document.write("Fail");
-      }catch(e){
-          if (e.name == "SecurityError"){
-              document.write("Pass");
-          } else {
-              document.write("Fail");
-          }
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-push-enable/config.xml b/tct-privacy-tests/security-push-enable/config.xml
deleted file mode 100644 (file)
index 03958b8..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-push-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-push-enable</name>
-  <tizen:application id="wrt5sbr087.securitypushenable" package="wrt5sbr087" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/push"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-push-enable/icon.png b/tct-privacy-tests/security-push-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-push-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-push-enable/index.html b/tct-privacy-tests/security-push-enable/index.html
deleted file mode 100644 (file)
index efc9b14..0000000
+++ /dev/null
@@ -1,56 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-push-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to push sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-      document.write("<br><br><br>");
-      document.write("Test purpose: Check that the WRT must allow Web Application access to push sensitive API features with first consulting the security policy <br>");
-
-      try{
-          var registrationId = tizen.push.getRegistrationId();
-          document.write("Pass");
-      }catch(e){
-          document.write("Fail");
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-se-disable/config.xml b/tct-privacy-tests/security-se-disable/config.xml
deleted file mode 100644 (file)
index c410f5a..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-se-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-se-disable</name>
-  <tizen:application id="wrt5sbr098.securitysedisable" package="wrt5sbr098" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-se-disable/icon.png b/tct-privacy-tests/security-se-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-se-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-se-disable/index.html b/tct-privacy-tests/security-se-disable/index.html
deleted file mode 100644 (file)
index 6e9a2c4..0000000
+++ /dev/null
@@ -1,64 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-se-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to se sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-      document.write("<br><br><br>");
-      document.write("Test purpose: Check that the WRT must not allow Web Application access to se sensitive API features without first consulting the security policy <br>");
-
-      try{
-          function successCallback(readers) {
-          }
-          function ErrorCallback(){
-          }
-          tizen.seService.getReaders(successCallback, ErrorCallback);
-          document.write("Fail");
-      }catch(e){
-          if (e.name == "SecurityError"){
-              document.write("Pass");
-          } else {
-              document.write("Fail");
-          }
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-se-enable/config.xml b/tct-privacy-tests/security-se-enable/config.xml
deleted file mode 100644 (file)
index 6b314d4..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-se-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-se-enable</name>
-  <tizen:application id="wrt5sbr088.securityseenable" package="wrt5sbr088" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/secureelement"/>
-</widget>
diff --git a/tct-privacy-tests/security-se-enable/icon.png b/tct-privacy-tests/security-se-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-se-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-se-enable/index.html b/tct-privacy-tests/security-se-enable/index.html
deleted file mode 100644 (file)
index d6aa9eb..0000000
+++ /dev/null
@@ -1,62 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-se-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to se sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-
-      document.write("<br><br><br>");
-      document.write("Test purpose: Check that the WRT must allow Web Application access to se sensitive API features with first consulting the security policy <br>");
-
-      try{
-          function successCallback(readers) {
-              document.write("Pass");
-          }
-          function ErrorCallback(){
-              document.write("Pass");
-          }
-          tizen.seService.getReaders(successCallback, ErrorCallback);
-          document.write("Pass");
-      }catch(e){
-          document.write("Fail");
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-systeminfo-disable/config.xml b/tct-privacy-tests/security-systeminfo-disable/config.xml
deleted file mode 100644 (file)
index c3e705b..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-systeminfo-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-systeminfo-disable</name>
-  <tizen:application id="wrt5ssd082.securitysysteminfodisable" package="wrt5ssd082" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-systeminfo-disable/icon.png b/tct-privacy-tests/security-systeminfo-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-systeminfo-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-systeminfo-disable/index.html b/tct-privacy-tests/security-systeminfo-disable/index.html
deleted file mode 100644 (file)
index 0db647d..0000000
+++ /dev/null
@@ -1,58 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-systeminfo-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to systeminfo sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-      document.write("Test purpose: Check that the WRT must not allow Web Application access to systeminfo sensitive API features without first consulting the security policy <br>");
-      try{
-          var deviceCapabilities;
-          deviceCapabilities = tizen.systeminfo.getCapabilities();
-          if ("platformVersion" in deviceCapabilities){
-              document.write("Fail");
-          }else{
-              document.write("Pass");
-          }
-      }catch(e){
-          document.write("Fail");
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-systeminfo-enable/config.xml b/tct-privacy-tests/security-systeminfo-enable/config.xml
deleted file mode 100644 (file)
index 6feae3e..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-systeminfo-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-systeminfo-enable</name>
-  <tizen:application id="wrt5sse083.securitysysteminfoenable" package="wrt5sse083" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/system" />
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-systeminfo-enable/icon.png b/tct-privacy-tests/security-systeminfo-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-systeminfo-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-systeminfo-enable/index.html b/tct-privacy-tests/security-systeminfo-enable/index.html
deleted file mode 100644 (file)
index 77879b6..0000000
+++ /dev/null
@@ -1,58 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-systeminfo-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to systeminfo sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-      document.write("Test purpose: Check that the WRT must allow Web Application access to systeminfo sensitive API features with first consulting the security policy <br>");
-      try{
-          var deviceCapabilities;
-          deviceCapabilities = tizen.systeminfo.getCapabilities();
-          if ("platformVersion" in deviceCapabilities){
-              document.write("Pass");
-          }else{
-              document.write("Fail");
-          }
-      }catch(e){
-          document.write("Fail");
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-systeminfo-manager-disable/config.xml b/tct-privacy-tests/security-systeminfo-manager-disable/config.xml
deleted file mode 100644 (file)
index 30784e7..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-systeminfo-manager-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-systeminfo-manager-disable</name>
-  <tizen:application id="wrt5ssd089.securitysysteminfomanagerdisable" package="wrt5ssd089" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-systeminfo-manager-disable/icon.png b/tct-privacy-tests/security-systeminfo-manager-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-systeminfo-manager-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-systeminfo-manager-disable/index.html b/tct-privacy-tests/security-systeminfo-manager-disable/index.html
deleted file mode 100644 (file)
index be21067..0000000
+++ /dev/null
@@ -1,59 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-systeminfo-manager-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to systemmanager sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-      document.write("Test purpose: Check that the WRT must not allow Web Application access to systemmanager sensitive API features without first consulting the security policy <br>");
-      try{
-          function onSuccessCallback(cellular) {
-              if ("imei" in cellular){
-                  document.write("Fail");
-              }else{
-                  document.write("Pass");
-              }
-          }
-          tizen.systeminfo.getPropertyValue("CELLULAR_NETWORK",onSuccessCallback);
-      }catch(e){
-          document.write("Fail");
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-systeminfo-manager-enable/config.xml b/tct-privacy-tests/security-systeminfo-manager-enable/config.xml
deleted file mode 100644 (file)
index b1c2144..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-systeminfo-manager-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-systeminfo-manager-enable</name>
-  <tizen:application id="wrt5sse087.securitysysteminfomanagerenable" package="wrt5sse087" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/systemmanager" />
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-systeminfo-manager-enable/icon.png b/tct-privacy-tests/security-systeminfo-manager-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-systeminfo-manager-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-systeminfo-manager-enable/index.html b/tct-privacy-tests/security-systeminfo-manager-enable/index.html
deleted file mode 100644 (file)
index 32bb8f1..0000000
+++ /dev/null
@@ -1,60 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-systeminfo-manager-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to systemmanager sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-   <script type="text/javascript">
-      document.write("Test purpose: Check that the WRT must allow Web Application access to systemmanager sensitive API features with first consulting the security policy <br>");
-      try{
-          function onSuccessCallback(cellular) {
-              if ("imei" in cellular){
-                  document.write("Pass");
-              }else{
-                  document.write("Fail");
-              }
-          }
-          tizen.systeminfo.getPropertyValue("CELLULAR_NETWORK",onSuccessCallback);
-          document.write("Pass");
-      }catch(e){
-          document.write("Fail");
-      }
-   </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-systemsetting-disable/config.xml b/tct-privacy-tests/security-systemsetting-disable/config.xml
deleted file mode 100644 (file)
index fdc4077..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-systemsetting-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="custom.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-systemsetting-disable</name>
-  <tizen:application id="wrt5sys132.securitysystemsettingdisable" package="wrt5sys132" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-systemsetting-disable/icon.png b/tct-privacy-tests/security-systemsetting-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-systemsetting-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-systemsetting-disable/index.html b/tct-privacy-tests/security-systemsetting-disable/index.html
deleted file mode 100644 (file)
index 75c7c2f..0000000
+++ /dev/null
@@ -1,60 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-sysytemsetting-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to sysytemsetting sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-    <script type="text/javascript">
-      document.write("<br><br><br>");
-      document.write("Test purpose: Check that the WRT must not allow Web Application access to sysytemsetting sensitive API features without first consulting the security policy <br>");
-      try{
-          function successCallback() {
-              document.write("Fail");
-          }
-          tizen.systemsetting.setProperty("HOME_SCREEN", "icon.png", successCallback);
-      }catch(e){
-          if ("SecurityError" == e.name) {
-              document.write("Pass");
-          } else {
-              document.write("Fail");
-          }
-      }
-    </script>
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-systemsetting-enable/config.xml b/tct-privacy-tests/security-systemsetting-enable/config.xml
deleted file mode 100644 (file)
index 6440398..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-systemsetting-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-systemsetting-enable</name>
-  <tizen:application id="wrt5sys131.securitysystemsettingenable" package="wrt5sys131" required_version="2.1"/>
-  <tizen:privilege name="http://tizen.org/privilege/setting" />
-</widget>
diff --git a/tct-privacy-tests/security-systemsetting-enable/icon.png b/tct-privacy-tests/security-systemsetting-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-systemsetting-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-systemsetting-enable/index.html b/tct-privacy-tests/security-systemsetting-enable/index.html
deleted file mode 100644 (file)
index 7c2b43c..0000000
+++ /dev/null
@@ -1,57 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
-  this list of conditions and the following disclaimer in the documentation
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
-  may be used to endorse or promote products derived from this work without
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-sysytemsetting-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to sysytemsetting sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body>
-    <script type="text/javascript">
-        document.write("<br><br><br>");
-        document.write("Test purpose: Check that the WRT must allow Web Application access to sysytemsetting sensitive API features with first consulting the security policy <br>");
-        try{
-            function successCallback() {
-                document.write("Pass");
-            }
-            tizen.systemsetting.setProperty("HOME_SCREEN", "icon.png", successCallback);
-            document.write("Pass");
-        }catch(e){
-            document.write("Fail");
-        }
-    </script>
-  </body>
-</html>
diff --git a/tct-privacy-tests/security-tizen-disable/config.xml b/tct-privacy-tests/security-tizen-disable/config.xml
deleted file mode 100644 (file)
index cdad0dc..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-tizen-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets"> 
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-tizen-disable</name>
-  <tizen:application id="wrt5std090.securitytizendisable" package="wrt5std090" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-tizen-disable/icon.png b/tct-privacy-tests/security-tizen-disable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-tizen-disable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-tizen-disable/index.html b/tct-privacy-tests/security-tizen-disable/index.html
deleted file mode 100644 (file)
index 5b777d6..0000000
+++ /dev/null
@@ -1,61 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification, 
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list 
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice, 
-  this list of conditions and the following disclaimer in the documentation 
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors 
-  may be used to endorse or promote products derived from this work without 
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS" 
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT, 
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, 
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY 
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, 
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.  
-  
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-tizen-disable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must not allow Web Application access to tizen sensitive API features without first consulting the security policy." />
-    <meta charset="utf-8">
-  </head>
-  <body> 
-    <script type="text/javascript">
-      document.write("Test purpose: Check that the WRT must not allow Web Application access to tizen sensitive API features without first consulting the security policy <br>");
-      try{
-          if("tizen" in window){
-              try {
-                  var filter = new tizen.AttributeFilter("name.firstName", "CONTAINS", "Chris");
-                  document.write("Pass");
-              } catch(e) {
-                  document.write("Fail");
-              }
-          }else{
-              document.write("Fail---tizen should be in window");
-          }
-      }catch(e){
-          document.write("FAIL--" + e.message);
-      }
-    </script>  
-  </body>
-</html>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-tizen-enable/config.xml b/tct-privacy-tests/security-tizen-enable/config.xml
deleted file mode 100644 (file)
index ff76e90..0000000
+++ /dev/null
@@ -1,8 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-tizen-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets"> 
-  <access origin="*"/>
-  <icon src="icon.png" height="123" width="123"/>
-  <content src="index.html"/>
-  <name>security-tizen-enable</name>
-  <tizen:application id="wrt5ste091.securitytizenenable" package="wrt5ste091" required_version="2.1"/>
-</widget>
\ No newline at end of file
diff --git a/tct-privacy-tests/security-tizen-enable/icon.png b/tct-privacy-tests/security-tizen-enable/icon.png
deleted file mode 100644 (file)
index 6bdebd1..0000000
Binary files a/tct-privacy-tests/security-tizen-enable/icon.png and /dev/null differ
diff --git a/tct-privacy-tests/security-tizen-enable/index.html b/tct-privacy-tests/security-tizen-enable/index.html
deleted file mode 100644 (file)
index bc91129..0000000
+++ /dev/null
@@ -1,56 +0,0 @@
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification, 
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list 
-  of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice, 
-  this list of conditions and the following disclaimer in the documentation 
-  and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors 
-  may be used to endorse or promote products derived from this work without 
-  specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS" 
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT, 
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, 
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY 
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, 
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.  
-  
-Authors:
-        Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
-  <head>
-    <title>WRT Test: security-tizen-enable</title>
-    <link rel="author" title="Intel" href="http://www.intel.com" />
-    <link rel="help" href="" />
-    <meta name="flags" content="" />
-    <meta name="assert" content="Check that the WRT must allow Web Application access to tizen sensitive API features with first consulting the security policy." />
-    <meta charset="utf-8">
-  </head> 
- <body> 
-  <script type="text/javascript">
-    document.write("Test purpose: Check that the WRT must allow Web Application access to tizen sensitive API features with first consulting the security policy <br>");
-    try{
-        if("tizen" in window){
-            document.write("Pass");
-        }else{
-            document.write("Fail");
-        }
-    }catch(e){
-        document.write(e.message);
-    }
-</script>  
- </body>
-</html>
\ No newline at end of file
index 95419b6..896c58d 100644 (file)
@@ -3,56 +3,6 @@
 <test_definition>
 <suite name="tct-privacy-tests">
   <set name="SecurityPrivacy">
-    <testcase purpose="Check that the WRT must allow Web Application access to tizen sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P0" id="security-tizen-enable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-tizen-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-tizen-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to tizen sensitive API features without first consulting the security policy" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P0" id="security-tizen-disable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-tizen-disable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-tizen-disable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
     <testcase purpose="Check that the WRT encrypt all resources of the Application storage" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="protection-encryption-check">
       <description>
         <pre_condition></pre_condition>
         </spec>
       </specs>
     </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to alarm sensitive API features without first consulting the security policy" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-alarm-disable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-alarm-disable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-alarm-disable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to systeminfo sensitive API features without first consulting the security policy" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-systeminfo-disable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-systeminfo-disable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-systeminfo-disable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to application.launch sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-application-launch-disable">
+    <testcase purpose="Check that the WRT must not allow Web Application access to messaging.read sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-messaging-read-disable">
       <description>
-        <pre_condition></pre_condition>
+        <pre_condition>To ensure the existence of telephone short message information</pre_condition>
         <post_condition></post_condition>
         <steps>
           <step order="1">
-            <step_desc>Install security-application-launch-disable.wgt</step_desc>
+            <step_desc>Install security-messaging-read-disable.wgt</step_desc>
             <expected>Widget application is able to install successfully</expected>
           </step>
           <step order="2">
-            <step_desc>Launch the security-application-launch-disable application</step_desc>
+            <step_desc>Launch the security-messaging-read-disable widget application</step_desc>
             <expected>The screen shows "PASS"</expected>
           </step>
         </steps>
         </spec>
       </specs>
     </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to bluetooth.admin sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-bt-admin-disable">
+    <testcase purpose="Check that the WRT must not allow Web Application access to messaging.write sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-messaging-write-disable">
       <description>
-        <pre_condition></pre_condition>
+        <pre_condition>Make sure connect to network, and according to README configured the email account. To ensure the existence of telephone short message information</pre_condition>
         <post_condition></post_condition>
         <steps>
           <step order="1">
-            <step_desc>Install security-bt-admin-disable.wgt</step_desc>
+            <step_desc>Install security-messaging-write-disable.wgt</step_desc>
             <expected>Widget application is able to install successfully</expected>
           </step>
           <step order="2">
-            <step_desc>Launch the security-bt-admin-disable application</step_desc>
+            <step_desc>Launch the security-messaging-write-disable widget application</step_desc>
             <expected>The screen shows "PASS"</expected>
           </step>
         </steps>
         </spec>
       </specs>
     </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to bluetooth.gap sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-bt-gap-disable">
+    <testcase purpose="Check that the WRT can decrypt html resources of widget Application successfully" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="protection-decrypt-html">
       <description>
         <pre_condition></pre_condition>
         <post_condition></post_condition>
         <steps>
           <step order="1">
-            <step_desc>Install security-bt-gap-disable.wgt</step_desc>
+            <step_desc>Install protection-decrypt-html.wgt</step_desc>
             <expected>Widget application is able to install successfully</expected>
           </step>
           <step order="2">
-            <step_desc>Launch the security-bt-gap-disable application</step_desc>
-            <expected>The screen shows "PASS"</expected>
+            <step_desc>Launch the protection-decrypt-html widget application</step_desc>
+            <expected>The screen shows a sentence</expected>
           </step>
         </steps>
         <test_script_entry test_script_expected_result="0"></test_script_entry>
       </description>
       <specs>
         <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
+          <spec_assertion element_type="attribute" element_name="N/A" interface="0650" specification="Web Application Protection" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
           <spec_url></spec_url>
           <spec_statement></spec_statement>
         </spec>
       </specs>
     </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to bluetooth.spp sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-bt-spp-disable">
+    <testcase purpose="Check if WRT include mechanism disabling the security policy checks." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-policy">
       <description>
-        <pre_condition></pre_condition>
+        <pre_condition>Make sure the security-policy.wgt is installed</pre_condition>
         <post_condition></post_condition>
         <steps>
           <step order="1">
-            <step_desc>Install security-bt-spp-disable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
+            <step_desc>Launch the security-policy application.</step_desc>
+            <expected>The screen shows "PASS".</expected>
           </step>
           <step order="2">
-            <step_desc>Launch the security-bt-spp-disable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
+            <step_desc>Get into the resources folder which is the security-policy widget storage.</step_desc>
+            <expected>Access to the widget application storage.</expected>
           </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to calendar.read sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-calendar-read-disable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-calendar-read-disable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
+          <step order="3">
+            <step_desc>Del the config.xml file.</step_desc>
+            <expected>The config.xml file is deleted.</expected>
           </step>
-          <step order="2">
-            <step_desc>Launch the security-calendar-read-disable widget application</step_desc>
+          <step order="4">
+            <step_desc>Launch the security-policy application.</step_desc>
             <expected>The screen shows "PASS"</expected>
           </step>
         </steps>
       </description>
       <specs>
         <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
+          <spec_assertion element_type="attribute" element_name="N/A" interface="0710" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
           <spec_url></spec_url>
           <spec_statement></spec_statement>
         </spec>
       </specs>
     </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to calendar.write sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-calendar-write-disable">
+    <testcase purpose="Check if WRT not allow the user to elevate permissions set by the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-permission">
       <description>
         <pre_condition></pre_condition>
         <post_condition></post_condition>
         <steps>
           <step order="1">
-            <step_desc>Install security-calendar-write-disable.wgt</step_desc>
+            <step_desc>Install security-permission.wgt</step_desc>
             <expected>Widget application is able to install successfully</expected>
           </step>
           <step order="2">
-            <step_desc>Launch the security-calendar-write-disable application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to contact.read sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-contact-read-disable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-contact-read-disable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
+            <step_desc>Launch the security-permission application.</step_desc>
+            <expected>The screen shows "Pass".</expected>
           </step>
-          <step order="2">
-            <step_desc>Launch the security-contact-read-disable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
+          <step order="3">
+            <step_desc>Edit config.xml in the resources folder which is the security-permission widget storage.</step_desc>
+            <expected>Access to the widget application storage.</expected>
           </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to contact.write sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-contact-write-disable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-contact-write-disable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
+          <step order="4">
+            <step_desc>Del the annotation symbol in config.xml file.</step_desc>
+            <expected>The config.xml file is changed.</expected>
           </step>
-          <step order="2">
-            <step_desc>Launch the security-contact-write-disable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
+          <step order="5">
+            <step_desc>Launch the security-permission application.</step_desc>
+            <expected>The screen shows "Pass"</expected>
           </step>
         </steps>
         <test_script_entry test_script_expected_result="0"></test_script_entry>
       </description>
       <specs>
         <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
+          <spec_assertion element_type="attribute" element_name="N/A" interface="0720" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
           <spec_url></spec_url>
           <spec_statement></spec_statement>
         </spec>
       </specs>
     </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to filesystem.read sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-filesystem-read-disable">
+    <testcase purpose="Check that the WRT can decrypt js resources of widget Application successfully" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="protection-decrypt-js">
       <description>
-        <pre_condition></pre_condition>
+        <pre_condition>Make sure the protection-decrypt-js.wgt app is installed</pre_condition>
         <post_condition></post_condition>
         <steps>
           <step order="1">
-            <step_desc>Install security-filesystem-read-disable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
+            <step_desc>Launch the protection-decrypt-js widget application</step_desc>
+            <expected>The screen appeared "click" button</expected>
           </step>
           <step order="2">
-            <step_desc>Launch the security-filesystem-read-disable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
+            <step_desc>Click on the button</step_desc>
+            <expected>The screen shows "js code"</expected>
           </step>
         </steps>
         <test_script_entry test_script_expected_result="0"></test_script_entry>
       </description>
       <specs>
         <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
+          <spec_assertion element_type="attribute" element_name="N/A" interface="0650" specification="Web Application Protection" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
           <spec_url></spec_url>
           <spec_statement></spec_statement>
         </spec>
       </specs>
     </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to filesystem.write sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-filesystem-write-disable">
+    <testcase purpose="Check that the WRT can decrypt css resources of widget Application successfully" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="protection-decrypt-css">
       <description>
         <pre_condition></pre_condition>
         <post_condition></post_condition>
         <steps>
           <step order="1">
-            <step_desc>Install security-filesystem-write-disable.wgt</step_desc>
+            <step_desc>Install protection-decrypt-css.wgt</step_desc>
             <expected>Widget application is able to install successfully</expected>
           </step>
           <step order="2">
-            <step_desc>Launch the security-filesystem-write-disable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
+            <step_desc>Launch the protection-decrypt-css widget application</step_desc>
+            <expected>The background is blue</expected>
           </step>
         </steps>
         <test_script_entry test_script_expected_result="0"></test_script_entry>
       </description>
       <specs>
         <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
+          <spec_assertion element_type="attribute" element_name="N/A" interface="0650" specification="Web Application Protection" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
           <spec_url></spec_url>
           <spec_statement></spec_statement>
         </spec>
       </specs>
     </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to messaging.read sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-messaging-read-disable">
+    <testcase purpose="Check that the WRT must allow Web Application access to messaging.read sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-messaging-read-enable">
       <description>
         <pre_condition>To ensure the existence of telephone short message information</pre_condition>
         <post_condition></post_condition>
         <steps>
           <step order="1">
-            <step_desc>Install security-messaging-read-disable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-messaging-read-disable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to systemmanager sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-systeminfo-manager-disable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-systeminfo-manager-disable.wgt</step_desc>
+            <step_desc>Install security-messaging-read-enable.wgt</step_desc>
             <expected>Widget application is able to install successfully</expected>
           </step>
           <step order="2">
-            <step_desc>Launch the security-systeminfo-manager-disable widget application</step_desc>
+            <step_desc>Launch the security-messaging-read-enable widget application</step_desc>
             <expected>The screen shows "PASS"</expected>
           </step>
         </steps>
       </description>
       <specs>
         <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
+          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
           <spec_url></spec_url>
           <spec_statement></spec_statement>
         </spec>
       </specs>
     </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to messaging.write sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-messaging-write-disable">
+    <testcase purpose="Check that the WRT must allow Web Application access to messaging.write sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-messaging-write-enable">
       <description>
         <pre_condition>Make sure connect to network, and according to README configured the email account. To ensure the existence of telephone short message information</pre_condition>
         <post_condition></post_condition>
         <steps>
           <step order="1">
-            <step_desc>Install security-messaging-write-disable.wgt</step_desc>
+            <step_desc>Install security-messaging-write-enable.wgt</step_desc>
             <expected>Widget application is able to install successfully</expected>
           </step>
           <step order="2">
-            <step_desc>Launch the security-messaging-write-disable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to nfc.admin sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-nfc-admin-disable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-nfc-admin-disable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-nfc-admin-disable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to nfc.p2p sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-nfc-p2p-disable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-nfc-p2p-disable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-nfc-p2p-disable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to nfc.tag sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-nfc-tag-disable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-nfc-tag-disable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-nfc-tag-disable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT can decrypt html resources of widget Application successfully" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="protection-decrypt-html">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install protection-decrypt-html.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the protection-decrypt-html widget application</step_desc>
-            <expected>The screen shows a sentence</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0650" specification="Web Application Protection" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check if WRT include mechanism disabling the security policy checks." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-policy">
-      <description>
-        <pre_condition>Make sure the security-policy.wgt is installed</pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Launch the security-policy application.</step_desc>
-            <expected>The screen shows "PASS".</expected>
-          </step>
-          <step order="2">
-            <step_desc>Get into the resources folder which is the security-policy widget storage.</step_desc>
-            <expected>Access to the widget application storage.</expected>
-          </step>
-          <step order="3">
-            <step_desc>Del the config.xml file.</step_desc>
-            <expected>The config.xml file is deleted.</expected>
-          </step>
-          <step order="4">
-            <step_desc>Launch the security-policy application.</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0710" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check if WRT not allow the user to elevate permissions set by the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-permission">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-permission.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-permission application.</step_desc>
-            <expected>The screen shows "Pass".</expected>
-          </step>
-          <step order="3">
-            <step_desc>Edit config.xml in the resources folder which is the security-permission widget storage.</step_desc>
-            <expected>Access to the widget application storage.</expected>
-          </step>
-          <step order="4">
-            <step_desc>Del the annotation symbol in config.xml file.</step_desc>
-            <expected>The config.xml file is changed.</expected>
-          </step>
-          <step order="5">
-            <step_desc>Launch the security-permission application.</step_desc>
-            <expected>The screen shows "Pass"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0720" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to alarm sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-alarm-enable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-alarm-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-alarm-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0680" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to callhistory.read sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-callhistory-read-disable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-callhistory-read-disable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-callhistory-read-disable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to callhistory.write sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-callhistory-write-disable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-callhistory-write-disable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-callhistory-write-disable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to content.read sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-content-read-disable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-content-read-disable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-content-read-disable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to content.write sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-content-write-disable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-content-write-disable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-content-write-disable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to download sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-download-disable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-download-disable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-download-disable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to nfc.common sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-nfc-common-disable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-nfc-common-disable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-nfc-common-disable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to notification sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-notification-disable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-notification-disable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-notification-disable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to power sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-power-disable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-power-disable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-power-disable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to systemsetting sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-systemsetting-disable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-systemsetting-disable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-systemsetting-disable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT can decrypt js resources of widget Application successfully" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="protection-decrypt-js">
-      <description>
-        <pre_condition>Make sure the protection-decrypt-js.wgt app is installed</pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Launch the protection-decrypt-js widget application</step_desc>
-            <expected>The screen appeared "click" button</expected>
-          </step>
-          <step order="2">
-            <step_desc>Click on the button</step_desc>
-            <expected>The screen shows "js code"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0650" specification="Web Application Protection" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT can decrypt css resources of widget Application successfully" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="protection-decrypt-css">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install protection-decrypt-css.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the protection-decrypt-css widget application</step_desc>
-            <expected>The background is blue</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0650" specification="Web Application Protection" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to systeminfo sensitive API features with first consulting the security policy" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-systeminfo-enable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-systeminfo-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-systeminfo-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to application.launch sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-application-launch-enable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-application-launch-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-application-launch-enable application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to bluetooth.admin sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-bt-admin-enable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-bt-admin-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-bt-admin-enable application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to bluetooth.gap sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-bt-gap-enable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-bt-gap-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-bt-gap-enable application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to bluetooth.spp sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-bt-spp-enable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-bt-spp-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-bt-spp-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to calendar.read sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-calendar-read-enable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-calendar-read-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-calendar-read-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to calendar.write sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-calendar-write-enable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-calendar-write-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-calendar-write-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to contact.read sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-contact-read-enable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-contact-read-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-contact-read-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to contact.write sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-contact-write-enable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-contact-write-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-contact-write-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to filesystem.read sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-filesystem-read-enable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-filesystem-read-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-filesystem-read-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to filesystem.write sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-filesystem-write-enable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-filesystem-write-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-filesystem-write-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to messaging.read sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-messaging-read-enable">
-      <description>
-        <pre_condition>To ensure the existence of telephone short message information</pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-messaging-read-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-messaging-read-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to systemmanager sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-systeminfo-manager-enable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-systeminfo-manager-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-systeminfo-manager-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to messaging.write sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-messaging-write-enable">
-      <description>
-        <pre_condition>Make sure connect to network, and according to README configured the email account. To ensure the existence of telephone short message information</pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-messaging-write-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-messaging-write-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to nfc.admin sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-nfc-admin-enable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-nfc-admin-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-nfc-admin-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to nfc.p2p sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-nfc-p2p-enable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-nfc-p2p-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-nfc-p2p-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to nfc.tag sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-nfc-tag-enable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-nfc-tag-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-nfc-tag-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to callhistory.read sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-callhistory-read-enable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-callhistory-read-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-callhistory-read-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to callhistory.write sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-callhistory-write-enable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-callhistory-write-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-callhistory-write-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to content.read sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-content-read-enable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-content-read-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-content-read-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to content.write sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-content-write-enable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-content-write-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-content-write-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to download sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-download-enable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-download-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-download-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to nfc.common sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-nfc-common-enable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-nfc-common-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-nfc-common-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to notification sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-notification-enable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-notification-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-notification-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to power sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-power-enable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-power-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-power-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to systemsetting sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-systemsetting-enable">
-      <description>
-        <pre_condition></pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Install security-systemsetting-enable.wgt</step_desc>
-            <expected>Widget application is able to install successfully</expected>
-          </step>
-          <step order="2">
-            <step_desc>Launch the security-systemsetting-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to bookmark.read sensitive API features with first consulting the security policy" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-bookmark-read-enable">
-      <description>
-        <pre_condition>Make sure the security-bookmark-read-enable application has been installed</pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Launch the security-bookmark-read-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to bookmark.write sensitive API features with first consulting the security policy" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-bookmark-write-enable">
-      <description>
-        <pre_condition>Make sure the security-bookmark-write-enable application has been installed</pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Launch the security-bookmark-write-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to datasync sensitive API features with first consulting the security policy" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-datasync-enable">
-      <description>
-        <pre_condition>Make sure the security-datasync-enable application has been installed</pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Launch the security-datasync-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to networkbearerselection sensitive API features with first consulting the security policy" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-networkbearerselection-enable">
-      <description>
-        <pre_condition>Make sure the security-networkbearerselection-enable application has been installed</pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Launch the security-networkbearerselection-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to package.info sensitive API features with first consulting the security policy" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-package-info-enable">
-      <description>
-        <pre_condition>Make sure the security-package-info-enable application has been installed</pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Launch the security-package-info-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to packagemanager.install sensitive API features with first consulting the security policy" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-package-install-enable">
-      <description>
-        <pre_condition>Make sure the security-package-install-enable application has been installed</pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Launch the security-package-install-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to push sensitive API features with first consulting the security policy" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-push-enable">
-      <description>
-        <pre_condition>Make sure the security-push-enable application has been installed</pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Launch the security-push-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to datacontrol sensitive API features with first consulting the security policy" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-datacontrol-enable">
-      <description>
-        <pre_condition>Make sure the security-datacontrol-enable application has been installed</pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Launch the security-datacontrol-enable widget application</step_desc>
-            <expected>The screen shows "PASS"</expected>
-          </step>
-        </steps>
-        <test_script_entry test_script_expected_result="0"></test_script_entry>
-        <notes></notes>
-      </description>
-      <specs>
-        <spec>
-          <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-          <spec_url></spec_url>
-          <spec_statement></spec_statement>
-        </spec>
-      </specs>
-    </testcase>
-    <testcase purpose="Check that the WRT must allow Web Application access to se sensitive API features with first consulting the security policy" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-se-enable">
-      <description>
-        <pre_condition>Make sure the security-se-enable application has been installed</pre_condition>
-        <post_condition></post_condition>
-        <steps>
-          <step order="1">
-            <step_desc>Launch the security-se-enable widget application</step_desc>
+            <step_desc>Launch the security-messaging-write-enable widget application</step_desc>
             <expected>The screen shows "PASS"</expected>
           </step>
         </steps>
         </spec>
       </specs>
     </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to networkbearerselection sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-networkbearerselection-disable">
-       <description>
-         <pre_condition>Make sure the security-networkbearerselection-disable application has been installed</pre_condition>
-         <post_condition></post_condition>
-         <steps>
-           <step order="1">
-             <step_desc>Launch the security-networkbearerselection-disable widget application</step_desc>
-             <expected>The screen shows "PASS"</expected>
-           </step>
-         </steps>
-         <test_script_entry test_script_expected_result="0"></test_script_entry>
-         <notes></notes>
-       </description>
-       <specs>
-         <spec>
-           <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-           <spec_url></spec_url>
-           <spec_statement></spec_statement>
-         </spec>
-       </specs>
-     </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to package.info sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-package-info-disable">
-       <description>
-         <pre_condition>Make sure the security-package-info-disable application has been installed</pre_condition>
-         <post_condition></post_condition>
-         <steps>
-           <step order="1">
-             <step_desc>Launch the security-package-info-disable widget application</step_desc>
-             <expected>The screen shows "PASS"</expected>
-           </step>
-         </steps>
-         <test_script_entry test_script_expected_result="0"></test_script_entry>
-         <notes></notes>
-       </description>
-       <specs>
-         <spec>
-           <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-           <spec_url></spec_url>
-           <spec_statement></spec_statement>
-         </spec>
-       </specs>
-     </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to package.install sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-package-install-disable">
-       <description>
-         <pre_condition>Make sure the security-package-install-disable application has been installed</pre_condition>
-         <post_condition></post_condition>
-         <steps>
-           <step order="1">
-             <step_desc>Launch the security-package-install-disable widget application</step_desc>
-             <expected>The screen shows "PASS"</expected>
-           </step>
-         </steps>
-         <test_script_entry test_script_expected_result="0"></test_script_entry>
-         <notes></notes>
-       </description>
-       <specs>
-         <spec>
-           <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-           <spec_url></spec_url>
-           <spec_statement></spec_statement>
-         </spec>
-       </specs>
-     </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to push sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-push-disable">
-       <description>
-         <pre_condition>Make sure the security-push-disable application has been installed</pre_condition>
-         <post_condition></post_condition>
-         <steps>
-           <step order="1">
-             <step_desc>Launch the security-push-disable widget application</step_desc>
-             <expected>The screen shows "PASS"</expected>
-           </step>
-         </steps>
-         <test_script_entry test_script_expected_result="0"></test_script_entry>
-         <notes></notes>
-       </description>
-       <specs>
-         <spec>
-           <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-           <spec_url></spec_url>
-           <spec_statement></spec_statement>
-         </spec>
-       </specs>
-     </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to bookmark.read sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-bookmark-read-disable">
-       <description>
-         <pre_condition>Make sure the security-bookmark-read-disable application has been installed</pre_condition>
-         <post_condition></post_condition>
-         <steps>
-           <step order="1">
-             <step_desc>Launch the security-bookmark-read-disable widget application</step_desc>
-             <expected>The screen shows "PASS"</expected>
-           </step>
-         </steps>
-         <test_script_entry test_script_expected_result="0"></test_script_entry>
-         <notes></notes>
-       </description>
-       <specs>
-         <spec>
-           <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-           <spec_url></spec_url>
-           <spec_statement></spec_statement>
-         </spec>
-       </specs>
-     </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to bookmark.write sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-bookmark-write-disable">
-       <description>
-         <pre_condition>Make sure the security-bookmark-write-disable application has been installed</pre_condition>
-         <post_condition></post_condition>
-         <steps>
-           <step order="1">
-             <step_desc>Launch the security-bookmark-write-disable widget application</step_desc>
-             <expected>The screen shows "PASS"</expected>
-           </step>
-         </steps>
-         <test_script_entry test_script_expected_result="0"></test_script_entry>
-         <notes></notes>
-       </description>
-       <specs>
-         <spec>
-           <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-           <spec_url></spec_url>
-           <spec_statement></spec_statement>
-         </spec>
-       </specs>
-     </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to datacontrol sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-datacontrol-disable">
-       <description>
-         <pre_condition>Make sure the security-datacontrol-disable application has been installed</pre_condition>
-         <post_condition></post_condition>
-         <steps>
-           <step order="1">
-             <step_desc>Launch the security-datacontrol-disable widget application</step_desc>
-             <expected>The screen shows "PASS"</expected>
-           </step>
-         </steps>
-         <test_script_entry test_script_expected_result="0"></test_script_entry>
-         <notes></notes>
-       </description>
-       <specs>
-         <spec>
-           <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-           <spec_url></spec_url>
-           <spec_statement></spec_statement>
-         </spec>
-       </specs>
-     </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to datasync sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-datasync-disable">
-       <description>
-         <pre_condition>Make sure the security-datasync-disable application has been installed</pre_condition>
-         <post_condition></post_condition>
-         <steps>
-           <step order="1">
-             <step_desc>Launch the security-datasync-disable widget application</step_desc>
-             <expected>The screen shows "PASS"</expected>
-           </step>
-         </steps>
-         <test_script_entry test_script_expected_result="0"></test_script_entry>
-         <notes></notes>
-       </description>
-       <specs>
-         <spec>
-           <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-           <spec_url></spec_url>
-           <spec_statement></spec_statement>
-         </spec>
-       </specs>
-     </testcase>
-    <testcase purpose="Check that the WRT must not allow Web Application access to se sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-se-disable">
-       <description>
-         <pre_condition>Make sure the security-se-disable application has been installed</pre_condition>
-         <post_condition></post_condition>
-         <steps>
-           <step order="1">
-             <step_desc>Launch the security-se-disable widget application</step_desc>
-             <expected>The screen shows "PASS"</expected>
-           </step>
-         </steps>
-         <test_script_entry test_script_expected_result="0"></test_script_entry>
-         <notes></notes>
-       </description>
-       <specs>
-         <spec>
-           <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-           <spec_url></spec_url>
-           <spec_statement></spec_statement>
-         </spec>
-       </specs>
-     </testcase>
-     <testcase purpose="Check that the WRT must not allow Web Application access to application.certificate sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-application-certificate-disable">
-       <description>
-         <pre_condition>Make sure the security-application-certificate-disable application has been installed</pre_condition>
-         <post_condition></post_condition>
-         <steps>
-           <step order="1">
-             <step_desc>Launch the security-application-certificate-disable widget application</step_desc>
-             <expected>The screen shows "PASS"</expected>
-           </step>
-         </steps>
-         <test_script_entry test_script_expected_result="0"></test_script_entry>
-         <notes></notes>
-       </description>
-       <specs>
-         <spec>
-           <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-           <spec_url></spec_url>
-           <spec_statement></spec_statement>
-         </spec>
-       </specs>
-     </testcase>
-     <testcase purpose="Check that the WRT must not allow Web Application access to application.certificate sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-application-certificate-enable">
-       <description>
-         <pre_condition>Make sure the security-application-certificate-enable application has been installed</pre_condition>
-         <post_condition></post_condition>
-         <steps>
-           <step order="1">
-             <step_desc>Launch the security-application-certificate-enable widget application</step_desc>
-             <expected>The screen shows "PASS"</expected>
-           </step>
-         </steps>
-         <test_script_entry test_script_expected_result="0"></test_script_entry>
-         <notes></notes>
-       </description>
-       <specs>
-         <spec>
-           <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-           <spec_url></spec_url>
-           <spec_statement></spec_statement>
-         </spec>
-       </specs>
-     </testcase>
-     <testcase purpose="Check that the WRT must not allow Web Application access to application.kill sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-application-kill-disable">
-       <description>
-         <pre_condition>Make sure the security-application-kill-disable application has been installed</pre_condition>
-         <post_condition></post_condition>
-         <steps>
-           <step order="1">
-             <step_desc>Launch the security-application-kill-disable widget application</step_desc>
-             <expected>The screen shows "PASS"</expected>
-           </step>
-         </steps>
-         <test_script_entry test_script_expected_result="0"></test_script_entry>
-         <notes></notes>
-       </description>
-       <specs>
-         <spec>
-           <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-           <spec_url></spec_url>
-           <spec_statement></spec_statement>
-         </spec>
-       </specs>
-     </testcase>
-     <testcase purpose="Check that the WRT must not allow Web Application access to application.kill sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-application-kill-enable">
-       <description>
-         <pre_condition>Make sure the security-application-kill-enable application has been installed</pre_condition>
-         <post_condition></post_condition>
-         <steps>
-           <step order="1">
-             <step_desc>Launch the security-application-kill-enable widget application</step_desc>
-             <expected>The screen shows "PASS"</expected>
-           </step>
-         </steps>
-         <test_script_entry test_script_expected_result="0"></test_script_entry>
-         <notes></notes>
-       </description>
-       <specs>
-         <spec>
-           <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
-           <spec_url></spec_url>
-           <spec_statement></spec_statement>
-         </spec>
-       </specs>
-     </testcase>
    </set>
 </suite>
 </test_definition>