+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-alarm-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-alarm-disable</name>
- <tizen:application id="wrt5sed003.securityalarmdisable" package="wrt5sed003" required_version="2.1"/>
-
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-alarm-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to alarm sensitive API features without first consulting the security policy" />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("Test purpose: Check that the WRT must not allow Web Application access to alarm sensitive API features without first consulting the security policy <br>");
- try{
- var alarm = new tizen.AlarmAbsolute(new Date(2012, 10, 4, 8, 0));
- var appControl = new tizen.ApplicationControl("http://tizen.org/appcontrol/operation/view", "http://www.tizen.org");
- tizen.alarm.add(alarm, "org.tizen.browser", appControl);
- document.write("FAIL");
- }catch(e){
- if (e.name == "SecurityError") {
- document.write("PASS");
- } else {
- document.write("FAIL");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-alarm-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-alarm-enable</name>
- <tizen:application id="wrt5san005.securityalarmenable" package="wrt5san005" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/alarm" />
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-alarm-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to alarm sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("Test purpose: Check that the WRT must allow Web Application access to alarm sensitive API features with first consulting the security policy <br>");
- try{
- var alarm = new tizen.AlarmAbsolute(new Date(2012, 10, 4, 8, 0));
- var appControl = new tizen.ApplicationControl("http://tizen.org/appcontrol/operation/view", "http://www.tizen.org");
- tizen.alarm.add(alarm, "org.tizen.browser", appControl);
- document.write("PASS");
- }catch(e){
- document.write("FAIL");
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-application-certificate-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-application-certificate-disable</name>
- <tizen:application id="wrt5sar018.securityapplicationcertificatedisable" package="wrt5sar018" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-application-certificate-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to application.certificate sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to application.read sensitive API features without first consulting the security policy <br>");
-
- try{
- var appInfo = tizen.application.getAppCerts("wrt5sar018.security-application-certificate-disable");
- document.write("FAIL");
- }catch(e){
- if ("SecurityError" == e.name) {
- document.write("PASS");
- } else {
- document.write("FAIL");
- }
- }
-</script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-application-certificate-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-application-certificate-enable</name>
- <tizen:application id="wrt5sar019.securityapplicationcertificateenable" package="wrt5sar019" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/appmanager.certificate" />
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-application-certificate-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to application.certificate sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to application.read sensitive API features with first consulting the security policy <br>");
-
- try{
- var appInfo = tizen.application.getAppCerts("wrt5sar019.security-application-certificate-enable");
- document.write("PASS");
- }catch(e){
- if ("SecurityError" == e.name) {
- document.write("FAIL");
- } else {
- document.write("FAIL");
- }
- }
-</script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-application-kill-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-application-kill-disable</name>
- <tizen:application id="wrtkill001.securityapplicationkilldisable" package="wrtkill001" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-application-kill-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to application.read sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- try{
- function onRunningAppsContext(contexts) {
- try{
- if (contexts.length > 0) {
- tizen.application.kill(contexts[0].id);
- }
- }catch(e1){
- if ("SecurityError" == e1.name) {
- document.write("Pass");
- } else {
- document.write("FAIL");
- }
- }
- }
- tizen.application.getAppsContext(onRunningAppsContext);
- document.write("Fail");
- }catch(e){
- if ("SecurityError" == e.name) {
- document.write("Pass");
- } else {
- document.write("FAIL");
- }
- }
-</script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-application-read-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-application-kill-ensable</name>
- <tizen:application id="wrtkill002.securityapplicationkillensable" package="wrtkill002" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/appmanager.kill" />
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-application-kill-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to application.read sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- try{
- function onRunningAppsContext(contexts) {
- if (contexts.length > 0) {
- tizen.application.kill(contexts[0].id);
- }
- }
- tizen.application.getAppsContext(onRunningAppsContext);
- document.write("Pass");
- }catch(e){
- document.write("FAIL");
- }
-</script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-application-launch-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-application-launch-disable</name>
- <tizen:application id="wrt5sal016.securityapplicationlaunchdisable" package="wrt5sal016" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-application-launch-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to application.launch sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to application.launch sensitive API features without first consulting the security policy <br>");
-
- try{
- tizen.application.launch("wrt5sal016.security-application-launch-disable");
- document.write("Fail");
- }catch(e){
- if ("SecurityError" == e.name) {
- document.write("PASS");
- } else {
- document.write("FAIL");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-application-launch-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-application-launch-enable</name>
- <tizen:application id="wrt5sal017.securityapplicationlaunchenable" package="wrt5sal017" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/application.launch" />
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-application-launch-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to application.launch sensitive API features with first consulting the security policy" />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to application.launch sensitive API features with first consulting the security policy <br>");
- try{
- tizen.application.launch("wrt5sal017.security-application-launch-enable");
- document.write("PASS");
- }catch(e){
- document.write("FAIL");
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-bookmark-read-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-bookmark-read-disable</name>
- <tizen:application id="wrt5sbr089.securitybookmarkreaddisable" package="wrt5sbr089" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-bookmark-read-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to bookmark.read sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to bookmark.read sensitive API features without first consulting the security policy <br>");
-
- try{
- var parentFolder = tizen.bookmark.get();
- document.write("Fail");
- }catch(e){
- if (e.name == "SecurityError") {
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-bookmark-read-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-bookmark-read-enable</name>
- <tizen:application id="wrt5sbr079.securitybookmarkreadenable" package="wrt5sbr079" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/bookmark.read"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-bookmark-read-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to bookmark.read sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to bookmark.read sensitive API features with first consulting the security policy <br>");
-
- try{
- var parentFolder = tizen.bookmark.get();
- document.write("Pass");
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-bookmark-write-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-bookmark-write-disable</name>
- <tizen:application id="wrt5sbr090.securitybookmarkwritedisable" package="wrt5sbr090" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-bookmark-write-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to bookmark.write sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to bookmark.write sensitive API features without first consulting the security policy <br>");
-
- try{
- var bookmarkFolder = new tizen.BookmarkFolder("Testfolder");
- tizen.bookmark.add(bookmarkFolder);
- document.write("Fail");
- }catch(e){
- if (e.name == "SecurityError"){
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-bookmark-write-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-bookmark-write-enable</name>
- <tizen:application id="wrt5sbr080.securitybookmarkwriteenable" package="wrt5sbr080" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/bookmark.write"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-bookmark-write-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to bookmark.write sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to bookmark.write sensitive API features with first consulting the security policy <br>");
-
- try{
- var bookmarkFolder = new tizen.BookmarkFolder("Testfolder");
- tizen.bookmark.add(bookmarkFolder);
- document.write("Pass");
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-bt-admin-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-bt-admin-disable</name>
- <tizen:application id="wrt5sad022.securitybtadmindisable" package="wrt5sad022" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/bluetooth.gap"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-bt-admin-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to bluetooth.admin sensitive API features without first consulting the security policy" />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to bluetooth.admin sensitive API features without first consulting the security policy <br>");
-
- try{
- var adapter = tizen.bluetooth.getDefaultAdapter();
- adapter.setName("myDevice");
- document.write("Fail");
- }catch(e){
- if ("SecurityError" == e.name) {
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
-</script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-bt-admin-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-bt-admin-enable</name>
- <tizen:application id="wrt5sba023.securitybtadminenable" package="wrt5sba023" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/bluetooth.admin"/>
- <tizen:privilege name ="http://tizen.org/privilege/bluetooth.gap"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-bt-admin-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to bluetooth.admin sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to bluetooth.admin sensitive API features with first consulting the security policy <br>");
-
- try{
- var adapter = tizen.bluetooth.getDefaultAdapter();
- adapter.setName("myDevice");
- document.write("Pass");
- }catch(e){
- if ("SecurityError" == e.name) {
- document.write("Fail");
- } else {
- document.write("Fail");
- }
- }
-
-</script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-bt-gap-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-bt-gap-disable</name>
- <tizen:application id="wrt5sbg024.securitybtgapdisable" package="wrt5sbg024" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-bt-gap-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to bluetooth.gap sensitive API features without first consulting the security policy" />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to bluetooth.gap sensitive API features without first consulting the security policy <br>");
-
- try{
- var adapter = tizen.bluetooth.getDefaultAdapter();
- document.write("Fail");
- }catch(e){
- if ("SecurityError" == e.name) {
- document.write("Pass");
- } else {
- document.write("Pass");
- }
- }
-
-</script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-bt-gap-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-bt-gap-enable</name>
- <tizen:application id="wrt5sbg025.securitybtgapenable" package="wrt5sbg025" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/bluetooth.gap" />
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-bt-gap-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to bluetooth.gap sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to bluetooth.gap sensitive API features with first consulting the security policy <br>");
- try{
- var adapter = tizen.bluetooth.getDefaultAdapter();
- document.write("Pass");
- }catch(e){
- if ("SecurityError" == e.name) {
- document.write("Fail");
- } else {
- document.write("Fail");
- }
- }
-</script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-bt-spp-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-bt-spp-disable</name>
- <tizen:application id="wrt5sbs026.securitybtsppdisable" package="wrt5sbs026" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/bluetooth.gap" />
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-bt-spp-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to bluetooth.spp sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script>
-
- try{
- function chatServiceSuccessCb(recordHandler) {
- document.write("Fail");
- }
- function chatServiceErrorCb(recordHandler) {
- document.write("Fail");
- }
-
- var adapter = tizen.bluetooth.getDefaultAdapter();
- var CHAT_SERVICE_UUID = "5BCE9431-6C75-32AB-AFE0-2EC108A30860";
- adapter.registerRFCOMMServiceByUUID(CHAT_SERVICE_UUID, "Chat service", chatServiceSuccessCb,chatServiceErrorCb);
- document.write("Fail");
- }catch (e) {
- if ("SecurityError" == e.name) {
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
-
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-bt-spp-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-bt-spp-enable</name>
- <tizen:application id="wrt5sbs027.securitybtsppenable" package="wrt5sbs027" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/bluetooth.spp"/>
- <tizen:privilege name ="http://tizen.org/privilege/bluetooth.gap"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-bt-spp-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <script src="../testharness.js"></script>
- <script src="../testharnessreport.js"></script>
- <script src="../bluetooth_test_utils.js"></script>
- <meta name="assert" content="Check that the WRT must allow Web Application access to bluetooth.spp sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script>
- try{
- function chatServiceSuccessCb(recordHandler) {
- document.write("Pass");
- }
- function chatServiceErrorCb(recordHandler) {
- document.write("Pass");
- }
- var adapter = tizen.bluetooth.getDefaultAdapter();
- var CHAT_SERVICE_UUID = "5BCE9431-6C75-32AB-AFE0-2EC108A30860";
- adapter.registerRFCOMMServiceByUUID(CHAT_SERVICE_UUID, "Chat service", chatServiceSuccessCb,chatServiceErrorCb);
- document.write("Pass");
- }catch (e){
- document.write("Fail");
- }
- </script>
-</script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-calendar-read-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-calendar-read-disable</name>
- <tizen:application id="wrt5scr030.securitycalendarreaddisable" package="wrt5scr030" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-calendar-read-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to calendar.read sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to calendar.read sensitive API features without first consulting the security policy <br>");
- try{
- var calendar = tizen.calendar.getDefaultCalendar();
-
- var html5seminar = new tizen.CalendarEvent({startDate: new tizen.TZDate(2012, 3, 4),
- duration: new tizen.TimeDuration(3, "DAYS"),
- summary: "HTML5 Seminar"});
-
- calendar.add(html5seminar);
- var tizenseminar = html5seminar.clone();
- document.write("Fail");
- }catch(e){
- if ("SecurityError" == e.name) {
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-calendar-read-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-calendar-read-enable</name>
- <tizen:application id="wrt5scr031.securitycalendarreadenable" package="wrt5scr031" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/calendar.read" />
- <tizen:privilege name="http://tizen.org/privilege/calendar.write" />
-</widget>
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-calendar-read-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to calendar.read sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to calendar.read sensitive API features with first consulting the security policy <br>");
- try{
- var myCalendar = tizen.calendar.getDefaultCalendar("EVENT");
- document.write("Pass");
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
- </body>
-</html>
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-calendar-write-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-calendar-write-disable</name>
- <tizen:application id="wrt5scw032.securitycalendarwritedisable" package="wrt5scw032" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-calendar-write-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to calendar.write sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to calendar.write sensitive API features without first consulting the security policy <br>");
- try{
- var calendar = tizen.calendar.getDefaultCalendar("EVENT");
- var ev = new tizen.CalendarEvent({description:'HTML5 Introduction',
- summary:'HTML5 Webinar ',
- startDate: new tizen.TZDate(2011, 3, 30, 10, 0),
- duration: new tizen.TimeDuration(1, "HOURS"),
- location:'Huesca'});
-
- calendar.add(ev);
- document.write("Fail");
- }catch(e){
- if ("SecurityError" == e.name) {
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-calendar-write-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-calendar-write-enable</name>
- <tizen:application id="wrt5scw033.securitycalendarwriteenable" package="wrt5scw033" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/calendar.write"/>
- <tizen:privilege name="http://tizen.org/privilege/calendar.read"/>
-</widget>
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-calendar-write-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to calendar.write sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to calendar.write sensitive API features with first consulting the security policy <br>");
-
- try{
- var calendar = tizen.calendar.getDefaultCalendar("EVENT");
- var ev = new tizen.CalendarEvent({description:'HTML5 Introduction',
- summary:'HTML5 Webinar ',
- startDate: new tizen.TZDate(2011, 3, 30, 10, 0),
- duration: new tizen.TimeDuration(1, "HOURS"),
- location:'Huesca'});
- calendar.add(ev);
- document.write("Pass");
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-callhistory-read-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-callhistory-read-disable</name>
- <tizen:application id="wrt5sch038.securitycallhistoryreaddisable" package="wrt5sch038" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-callhistory-read-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to callhistory.read sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to callhistory.read sensitive API features without first consulting the security policy <br>");
-
- try{
- var onListenerCB = {
- onadded: function() {
- document.write("Fail");
- },
- onchanged: function() {
- document.write("Fail");
- }};
- var handle = tizen.callhistory.addChangeListener(onListenerCB);
- tizen.callhistory.removeChangeListener(handle);
- document.write("Fail");
- }catch(e){
- if ("SecurityError" == e.name) {
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-callhistory-read-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-callhistory-read-enable</name>
- <tizen:application id="wrt5sch039.securitycallhistoryreadenable" package="wrt5sch039" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/callhistory.read" />
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-callhistory-read-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to callhistory.read sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to callhistory.read sensitive API features with first consulting the security policy <br>");
-
- try{
- var onListenerCB = {
- onadded: function() {
- document.write("Pass");
- },
- onchanged: function() {
- document.write("Pass");
- }};
- var handle = tizen.callhistory.addChangeListener(onListenerCB);
- tizen.callhistory.removeChangeListener(handle);
- document.write("Pass");
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-callhistory-write-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-callhistory-write-disable</name>
- <tizen:application id="wrt5sch040.securitycallhistorywritedisable" package="wrt5sch040" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-callhistory-write-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to callhistory.write sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to callhistory.write sensitive API features without first consulting the security policy <br>");
-
- try{
- var onListenerCB = {
- onadded: function() {
- document.write("Fail");
- },
- onchanged: function() {
- document.write("Fail");
- }};
- var handle = tizen.callhistory.addChangeListener(onListenerCB);
- tizen.callhistory.removeChangeListener(handle);
- document.write("Fail");
- }catch(e){
- if ("SecurityError" == e.name) {
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-callhistory-write-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-callhistory-write-enable</name>
- <tizen:application id="wrt5sch041.securitycallhistorywriteenable" package="wrt5sch041" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/callhistory.write" />
- <tizen:privilege name="http://tizen.org/privilege/callhistory.read" />
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-callhistory-write-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to callhistory.write sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to callhistory.write sensitive API features with first consulting the security policy <br>");
-
- try{
- var onListenerCB = {
- onadded: function() {
- document.write("Pass");
- },
- onchanged: function() {
- document.write("Pass");
- }};
- var handle = tizen.callhistory.addChangeListener(onListenerCB);
- tizen.callhistory.removeChangeListener(handle);
- document.write("Pass");
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-contact-read-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-contact-read-disable</name>
- <tizen:application id="wrt5scr046.securitycontactreaddisable" package="wrt5scr046" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-contact-read-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to contact.read sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to contact.read sensitive API features without first consulting the security policy <br>");
-
- try{
- var addressbook;
- addressbook = tizen.contact.getDefaultAddressBook();
- document.write("Fail");
- }catch(e){
- if ("SecurityError" == e.name) {
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-contact-read-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-contact-read-enable</name>
- <tizen:application id="wrt5scr047.securitycontactreadenable" package="wrt5scr047" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/contact.read" />
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-contact-read-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to contact.read sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to contact.read sensitive API features without first consulting the security policy <br>");
-
- try{
- var addressbook;
- addressbook = tizen.contact.getDefaultAddressBook();
- document.write("Pass");
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-contact-write-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-contact-write-disable</name>
- <tizen:application id="wrt5scw048.securitycontactwritedisable" package="wrt5scw048" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-contact-write-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to contact.write sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to contact.write sensitive API features without first consulting the security policy <br>");
-
- try{
- var addressbook;
- addressbook = tizen.contact.getDefaultAddressBook();
- var contact = new tizen.Contact(
- "BEGIN:VCARD\n"+
- "VERSION:3.0\n"+
- "N:Gump;Forrest\n"+
- "FN:Forrest Gump\n"+
- "ORG:Bubba Gump Shrimp Co.\n"+
- "TITLE:Shrimp Man\n"+
- "TEL;WORK:(111) 555-1212\n"+
- "TEL;HOME:(404) 555-1212\n"+
- "EMAIL;WORK;PREF:forrestgump@example.com\n"+
- "END:VCARD");
- addressbook.add(contact);
-
- document.write("Fail");
- }catch(e){
- if ("SecurityError" == e.name) {
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-contact-write-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-contact-write-enable</name>
- <tizen:application id="wrt5scw049.securitycontactwriteenable" package="wrt5scw049" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/contact.write"/>
- <tizen:privilege name="http://tizen.org/privilege/contact.read"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-contact-write-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to contact.write sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to contact.write sensitive API features with first consulting the security policy <br>");
- try{
- var addressbook;
- addressbook = tizen.contact.getDefaultAddressBook();
- var contact = new tizen.Contact(
- "BEGIN:VCARD\n"+
- "VERSION:3.0\n"+
- "N:Gump;Forrest\n"+
- "FN:Forrest Gump\n"+
- "ORG:Bubba Gump Shrimp Co.\n"+
- "TITLE:Shrimp Man\n"+
- "TEL;WORK:(111) 555-1212\n"+
- "TEL;HOME:(404) 555-1212\n"+
- "EMAIL;WORK;PREF:forrestgump@example.com\n"+
- "END:VCARD");
- addressbook.add(contact);
-
- document.write("Pass");
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-content-read-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-content-read-disable</name>
- <tizen:application id="wrt5con148.securitycontentreaddisable" package="wrt5con148" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-content-read-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to content.read sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to content.read sensitive API features without first consulting the security policy <br>");
-
- try{
- tizen.content.unsetChangeListener();
- document.write("Fail");
- }catch(e){
- if ("SecurityError" == e.name) {
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-content-read-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-content-read-enable</name>
- <tizen:application id="wrt5con147.securitycontentreadenable" package="wrt5con147" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/content.read" />
-</widget>
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-content-read-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to content.read sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to content.read sensitive API features with first consulting the security policy <br>");
- try{
- tizen.content.unsetChangeListener();
- document.write("Pass")
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-content-write-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-content-write-disable</name>
- <tizen:application id="wrt5con146.securitycontentwritedisable" package="wrt5con146" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-content-write-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to content.write sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-try{
- function findCB(contents) {
- contents.forEach(printContent);
- }
- function printContent(content) {
- tizen.content.update(content);
- document.write("Fail")
- }
- tizen.content.find(findCB);
- document.write("Fail")
- }catch(e){
- if ("SecurityError" == e.name) {
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-content-write-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-content-write-enable</name>
- <tizen:application id="wrt5con145.securitycontentwriteenable" package="wrt5con145" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/content.write" />
- <tizen:privilege name="http://tizen.org/privilege/content.read" />
-</widget>
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-content-write-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to content.write sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to content.write sensitive API features with first consulting the security policy <br>");
- try{
- function findCB(contents) {
- contents.forEach(printContent);
- }
- function printContent(content) {
- tizen.content.update(content);
- document.write("Pass")
- }
- tizen.content.find(findCB);
-
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-datacontrol-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-datacontrol-disable</name>
- <tizen:application id="wrt5sbr091.securitydatacontroldisable" package="wrt5sbr091" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-datacontrol-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to datacontrol sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to datacontrol sensitive API features without first consulting the security policy <br>");
-
- try{
- var sqlConsumer = tizen.datacontrol.getDataControlConsumer("http://tizen.org/datacontrol/provider/DictionaryDataControlProvider", "Dictionary", "SQL");
- document.write("Fail");
- }catch(e){
- if (e.name == "SecurityError"){
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-datacontrol-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-datacontrol-enable</name>
- <tizen:application id="wrt5sbr081.securitydatacontrolenable" package="wrt5sbr081" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/datacontrol.consumer"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-datacontrol-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to datacontrol sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to datacontrol sensitive API features with first consulting the security policy <br>");
-
- try{
- var sqlConsumer = tizen.datacontrol.getDataControlConsumer("http://tizen.org/datacontrol/provider/DictionaryDataControlProvider", "Dictionary", "SQL");
- document.write("Pass");
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-datasync-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-datasync-disable</name>
- <tizen:application id="wrt5sbr092.securitydatasyncdisable" package="wrt5sbr092" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-datasync-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to datasync sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to datasync sensitive API features without first consulting the security policy <br>");
-
- try{
- var syncInfo = new tizen.SyncInfo("http://example.com/sync", "myId", "myPassword", "MANUAL", "TWO_WAY");
- var contactInfo = new tizen.SyncServiceInfo(true, "CONTACT", "serverContact");
- var eventInfo = new tizen.SyncServiceInfo(true, "EVENT", "serverEvent");
- var serviceInfo = [contactInfo, eventInfo];
- var profile = new tizen.SyncProfileInfo("MyProfile", syncInfo, serviceInfo);
- tizen.datasync.add(profile);
- document.write("Fail");
- }catch(e){
- if (e.name == "SecurityError"){
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-datasync-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-datasync-enable</name>
- <tizen:application id="wrt5sbr082.securitydatasyncenable" package="wrt5sbr082" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/datasync"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-datasync-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to datasync sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to datasync sensitive API features with first consulting the security policy <br>");
-
- try{
- var syncInfo = new tizen.SyncInfo("http://example.com/sync", "myId", "myPassword", "MANUAL", "TWO_WAY");
- var contactInfo = new tizen.SyncServiceInfo(true, "CONTACT", "serverContact");
- var eventInfo = new tizen.SyncServiceInfo(true, "EVENT", "serverEvent");
- var serviceInfo = [contactInfo, eventInfo];
- var profile = new tizen.SyncProfileInfo("MyProfile", syncInfo, serviceInfo);
- tizen.datasync.add(profile);
- document.write("Pass");
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-download-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-download-disable</name>
- <tizen:application id="wrt5dow144.securitydownloaddisable" package="wrt5dow144" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-download-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to download sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("Test purpose: Check that the WRT must not allow Web Application access to download sensitive API features without first consulting the security policy <br>");
- try{
- var downloadRequest = new tizen.DownloadRequest("http://download.tizen.org/tools/README.txt");
- var downloadId = tizen.download.start(downloadRequest);
- document.write("Fail");
- }catch(e){
- if ("SecurityError" == e.name) {
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-download-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-download-enable</name>
- <tizen:application id="wrt5dow143.securitydownloadenable" package="wrt5dow143" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/download" />
-</widget>
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-download-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to download sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to download sensitive API features with first consulting the security policy <br>");
-
- try{
-
- var downloadRequest = new tizen.DownloadRequest("http://download.tizen.org/tools/README.txt");
- var downloadId = tizen.download.start(downloadRequest);
- document.write("Pass");
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-filesystem-read-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-filesystem-read-disable</name>
- <tizen:application id="wrt5sfr052.securityfilesystemreaddisable" package="wrt5sfr052" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-filesystem-read-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to filesystem.read sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to filesystem.read sensitive API features without first consulting the security policy <br>");
-
- try{
- tizen.filesystem.getStorage("MMC");
- document.write("Fail");
- }catch(e){
- if ("SecurityError" == e.name) {
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-filesystem-read-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-filesystem-read-enable</name>
- <tizen:application id="wrt5sfr053.securityfilesystemreadenable" package="wrt5sfr053" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/filesystem.read" />
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-filesystem-read</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to filesystem.read sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to filesystem.read sensitive API features with first consulting the security policy <br>");
-
- try{
- function alertForCorruptedRemovableDrives(storages) {
- document.write("Pass");
- }
- tizen.filesystem.listStorages(alertForCorruptedRemovableDrives);
- document.write("Pass");
- }catch(e){
- document.write("Fail");
- }
-
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-filesystem-write-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-filesystem-write-disable</name>
- <tizen:application id="wrt5sfw054.securityfilesystemwritedisable" package="wrt5sfw054" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/filesystem.read" />
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-filesystem-write-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to filesystem.write sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to filesystem.write sensitive API features without first consulting the security policy <br>");
-
- try{
- function onsuccess(dir) {
- try{
- dir.createFile("newFilePath");
- }catch(e){
- if ("SecurityError" == e.name) {
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
- }
- function onerror(e){
- document.write("Fail");
- }
- tizen.filesystem.resolve('documents', onsuccess, onerror, "rw");
- document.write("Fail");
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-filesystem-write-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-filesystem-write-enable</name>
- <tizen:application id="wrt5sfw055.securityfilesystemwriteenable" package="wrt5sfw055" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/filesystem.write" />
- <tizen:privilege name="http://tizen.org/privilege/filesystem.read" />
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-filesystem-write-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to filesystem.write sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to filesystem.write sensitive API features with first consulting the security policy <br>");
- try{
- function onsuccess(dir) {
- dir.createFile("newFilePath");
- document.write("Pass");
- }
- function onerror(e){
- document.write("Fail--The resolve method is failed");
- }
- tizen.filesystem.resolve('documents', onsuccess, onerror, "rw");
- }catch(e){
- document.write("Fail");
- }
- </script>
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-networkbearerselection-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-networkbearerselection-disable</name>
- <tizen:application id="wrt5sbr094.securitynetworkbearerselectiondisable" package="wrt5sbr094" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-networkbearerselection-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to networkbearerselection sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to networkbearerselection sensitive API features without first consulting the security policy <br>");
-
- try{
- function successcb(id) {
- }
- function errorcb(id, error){
- }
-
- tizen.networkbearerselection.requestRouteToHost("CELLULAR", "www.google.com", successcb, errorcb);
- document.write("Fail");
- }catch(e){
- if (e.name == "SecurityError"){
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-networkbearerselection-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-networkbearerselection-enable</name>
- <tizen:application id="wrt5sbr084.securitynetworkbearerselectionenable" package="wrt5sbr084" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/networkbearerselection"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-networkbearerselection-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to networkbearerselection sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to networkbearerselection sensitive API features with first consulting the security policy <br>");
-
- try{
- function successcb(id) {
- document.write("Pass");
- }
- function errorcb(id, error){
- document.write("Pass");
- }
-
- tizen.networkbearerselection.requestRouteToHost("CELLULAR", "www.google.com", successcb, errorcb);
- document.write("Pass");
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-nfc-admin-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-nfc-admin-disable</name>
- <tizen:application id="wrt5sna074.securitynfcadmindisable" package="wrt5sna074" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/nfc.common" />
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-nfc-admin-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to nfc.admin sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to nfc.admin sensitive API features without first consulting the security policy <br>");
-
- try{
- var adapter = tizen.nfc.getDefaultAdapter();
- adapter.setPowered(true);
- document.write("Fail");
- }catch(e){
- if ("SecurityError" == e.name) {
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-nfc-admin-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-nfc-admin-enable</name>
- <tizen:application id="wrt5sna075.securitynfcadminenable" package="wrt5sna075" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/nfc.admin"/>
- <tizen:privilege name="http://tizen.org/privilege/nfc.common"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-nfc-admin-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to nfc.admin sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to nfc.admin sensitive API features with first consulting the security policy <br>");
- try{
- var adpter = tizen.nfc.getDefaultAdapter();
- adpter.setPowered(true);
- document.write("Pass");
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-nfc-common-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-nfc-common-disable</name>
- <tizen:application id="wrt5nfc140.securitynfccommondisable" package="wrt5nfc140" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-nfc-commmon-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to nfc.common sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to nfc.common sensitive API features without first consulting the security policy <br>");
-
- try{
- var adapter = tizen.nfc.getDefaultAdapter();
- document.write("Fail");
- }catch(e){
- if ("SecurityError" == e.name) {
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-nfc-common-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-nfc-common-enable</name>
- <tizen:application id="wrt5nfc139.securitynfccommonenable" package="wrt5nfc139" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/nfc.common" />
-</widget>
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-nfc-common-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to nfc.common sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to nfc.common sensitive API features with first consulting the security policy <br>");
- try{
- var adapter = tizen.nfc.getDefaultAdapter();
- document.write("Pass");
- }catch(e){
- document.write("Fail");
- }
-
- </script>
- </body>
-</html>
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-nfc-p2p-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-nfc-p2p-disable</name>
- <tizen:application id="wrt5snp078.securitynfcp2pdisable" package="wrt5snp078" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/nfc.common"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-nfc-p2p-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to nfc.p2p sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to nfc.p2p sensitive API features without first consulting the security policy <br>");
-
- try{
- var adapter = tizen.nfc.getDefaultAdapter();
- var onSuccessCB = {onattach : function(nfcPeer) {
- document.write("Fail");
- },
- ondetach : function() {
- document.write("Fail");
- }};
- adapter.setPeerListener(onSuccessCB);
- document.write("Fail");
- }catch(e){
- if ("SecurityError" == e.name) {
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-nfc-p2p-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-nfc-p2p-enable</name>
- <tizen:application id="wrt5snp079.securitynfcp2penable" package="wrt5snp079" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/nfc.p2p"/>
- <tizen:privilege name="http://tizen.org/privilege/nfc.common"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-nfc-p2p-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to nfc.p2p sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to nfc.p2p sensitive API features with first consulting the security policy <br>");
-
- try{
- var adapter = tizen.nfc.getDefaultAdapter();
- var onSuccessCB = {onattach : function(nfcPeer) {
- document.write("Pass");
- },
- ondetach : function() {
- document.write("Pass");
- }};
- adapter.setPeerListener(onSuccessCB);
- document.write("Pass");
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-nfc-tag-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-nfc-tag-disable</name>
- <tizen:application id="wrt5snt080.securitynfctagdisable" package="wrt5snt080" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/nfc.common"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-nfc-tag-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to nfc.tag sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to nfc.tag sensitive API features without first consulting the security policy <br>");
-
- try{
- var adapter = tizen.nfc.getDefaultAdapter();
- var onSuccessCB = {onattach : function(nfcTag) {
- document.write("Fail");
- }, ondetach : function() {
- document.write("Fail");
- }};
- adapter.setTagListener(onSuccessCB);
- document.write("Fail");
- }catch(e){
- if ("SecurityError" == e.name) {
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-nfc-tag-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-nfc-tag-enable</name>
- <tizen:application id="wrt5snt081.securitynfctagenable" package="wrt5snt081" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/nfc.tag"/>
- <tizen:privilege name="http://tizen.org/privilege/nfc.common"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-nfc-tag-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to nfc.tag sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to nfc.tag sensitive API features with first consulting the security policy <br>");
- try{
- var adapter = tizen.nfc.getDefaultAdapter();
- var onSuccessCB = {onattach : function(nfcTag) {
- document.write("Pass");
- }, ondetach : function() {
- document.write("Pass");
- }};
- adapter.setTagListener(onSuccessCB);
- document.write("Pass");
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-notification-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-notification-disable</name>
- <tizen:application id="wrt5not138.securitynotificationdisable" package="wrt5not138" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-notification-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to notification sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("Test purpose: Check that the WRT must not allow Web Application access to notification sensitive API features without first consulting the security policy <br>");
- try{
- tizen.notification.removeAll();
- document.write("Fail");
- }catch(e){
- if ("SecurityError" == e.name) {
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-notification-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-notification-enable</name>
- <tizen:application id="wrt5not137.securitynotificationenable" package="wrt5not137" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/notification" />
-</widget>
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-notification-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to notification sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to notification sensitive API features with first consulting the security policy <br>");
- try{
- tizen.notification.removeAll();
- document.write("Pass");
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-package-info-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-package-info-disable</name>
- <tizen:application id="wrt5sbr095.securitypackageinfodisable" package="wrt5sbr095" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-package-info-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to package.info sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to package.info sensitive API features without first consulting the security policy <br>");
-
- try{
- var packageEventCallback = {
- oninstalled: function(packageInfo) {
- },
- onupdated: function(packageInfo) {
- },
- onuninstalled: function(packageId) {
- }
- };
- tizen.package.setPackageInfoEventListener(packageEventCallback);
- document.write("Fail");
- }catch(e){
- if (e.name == "SecurityError"){
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-package-info-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-package-info-enable</name>
- <tizen:application id="wrt5sbr085.securitypackageinfoenable" package="wrt5sbr085" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/package.info"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-package-info-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to package.info sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to package.info sensitive API features with first consulting the security policy <br>");
-
- try{
- var packageEventCallback = {
- oninstalled: function(packageInfo) {
- },
- onupdated: function(packageInfo) {
- },
- onuninstalled: function(packageId) {
- }
- };
- tizen.package.setPackageInfoEventListener(packageEventCallback);
- document.write("Pass");
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-package-install-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-package-install-disable</name>
- <tizen:application id="wrt5sbr096.securitypackageinstalldisable" package="wrt5sbr096" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-package-install-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to package.install sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to package.install sensitive API features without first consulting the security policy <br>");
-
- try{
- var onInstallation = {
- onprogress: function(packageId, percentage) {
- document.write("Fail");
- },
- oncomplete: function(packageId) {
- document.write("Fail");
- }
- }
- var onError = function (err) {
- document.write("Fail");
- }
- tizen.package.install("/opt/usr/media/test.wgt", onInstallation, onError);
- document.write("Fail");
- }catch(e){
- if (e.name == "SecurityError"){
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-package-install-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-package-install-enable</name>
- <tizen:application id="wrt5sbr086.securitypackageinstallenable" package="wrt5sbr086" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/packagemanager.install"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-package-install-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to packagemanager.install sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to packagemanager.install sensitive API features with first consulting the security policy <br>");
-
- try{
- var onInstallation = {
- onprogress: function(packageId, percentage) {
- document.write("Pass");
- },
- oncomplete: function(packageId) {
- document.write("Pass");
- }
- }
- var onError = function (err) {
- document.write("Pass");
- }
- tizen.package.install("/opt/usr/media/test.wgt", onInstallation, onError);
- document.write("Pass");
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-power-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-power-disable</name>
- <tizen:application id="wrt5pow136.securitypowerdisable" package="wrt5pow136" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-power-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to power sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("Test purpose: Check that the WRT must not allow Web Application access to power sensitive API features without first consulting the security policy <br>");
- try{
- tizen.power.turnScreenOn();
- document.write("Fail");
- }catch(e){
- if ("SecurityError" == e.name) {
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-power-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-power-enable</name>
- <tizen:application id="wrt5pow135.securitypowerenable" package="wrt5pow135" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/power" />
-</widget>
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-power-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to power sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to power sensitive API features with first consulting the security policy <br>");
- try{
- tizen.power.turnScreenOn();
- document.write("Pass");
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-push-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-push-disable</name>
- <tizen:application id="wrt5sbr097.securitypushdisable" package="wrt5sbr097" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-push-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to push sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to push sensitive API features without first consulting the security policy <br>");
-
- try{
- var registrationId = tizen.push.getRegistrationId();
- document.write("Fail");
- }catch(e){
- if (e.name == "SecurityError"){
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-push-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-push-enable</name>
- <tizen:application id="wrt5sbr087.securitypushenable" package="wrt5sbr087" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/push"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-push-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to push sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to push sensitive API features with first consulting the security policy <br>");
-
- try{
- var registrationId = tizen.push.getRegistrationId();
- document.write("Pass");
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-se-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-se-disable</name>
- <tizen:application id="wrt5sbr098.securitysedisable" package="wrt5sbr098" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-se-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to se sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to se sensitive API features without first consulting the security policy <br>");
-
- try{
- function successCallback(readers) {
- }
- function ErrorCallback(){
- }
- tizen.seService.getReaders(successCallback, ErrorCallback);
- document.write("Fail");
- }catch(e){
- if (e.name == "SecurityError"){
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-se-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-se-enable</name>
- <tizen:application id="wrt5sbr088.securityseenable" package="wrt5sbr088" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/secureelement"/>
-</widget>
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-se-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to se sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
-
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to se sensitive API features with first consulting the security policy <br>");
-
- try{
- function successCallback(readers) {
- document.write("Pass");
- }
- function ErrorCallback(){
- document.write("Pass");
- }
- tizen.seService.getReaders(successCallback, ErrorCallback);
- document.write("Pass");
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-systeminfo-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-systeminfo-disable</name>
- <tizen:application id="wrt5ssd082.securitysysteminfodisable" package="wrt5ssd082" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-systeminfo-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to systeminfo sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("Test purpose: Check that the WRT must not allow Web Application access to systeminfo sensitive API features without first consulting the security policy <br>");
- try{
- var deviceCapabilities;
- deviceCapabilities = tizen.systeminfo.getCapabilities();
- if ("platformVersion" in deviceCapabilities){
- document.write("Fail");
- }else{
- document.write("Pass");
- }
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-systeminfo-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-systeminfo-enable</name>
- <tizen:application id="wrt5sse083.securitysysteminfoenable" package="wrt5sse083" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/system" />
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-systeminfo-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to systeminfo sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("Test purpose: Check that the WRT must allow Web Application access to systeminfo sensitive API features with first consulting the security policy <br>");
- try{
- var deviceCapabilities;
- deviceCapabilities = tizen.systeminfo.getCapabilities();
- if ("platformVersion" in deviceCapabilities){
- document.write("Pass");
- }else{
- document.write("Fail");
- }
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-systeminfo-manager-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-systeminfo-manager-disable</name>
- <tizen:application id="wrt5ssd089.securitysysteminfomanagerdisable" package="wrt5ssd089" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-systeminfo-manager-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to systemmanager sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("Test purpose: Check that the WRT must not allow Web Application access to systemmanager sensitive API features without first consulting the security policy <br>");
- try{
- function onSuccessCallback(cellular) {
- if ("imei" in cellular){
- document.write("Fail");
- }else{
- document.write("Pass");
- }
- }
- tizen.systeminfo.getPropertyValue("CELLULAR_NETWORK",onSuccessCallback);
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-systeminfo-manager-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-systeminfo-manager-enable</name>
- <tizen:application id="wrt5sse087.securitysysteminfomanagerenable" package="wrt5sse087" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/systemmanager" />
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-systeminfo-manager-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to systemmanager sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("Test purpose: Check that the WRT must allow Web Application access to systemmanager sensitive API features with first consulting the security policy <br>");
- try{
- function onSuccessCallback(cellular) {
- if ("imei" in cellular){
- document.write("Pass");
- }else{
- document.write("Fail");
- }
- }
- tizen.systeminfo.getPropertyValue("CELLULAR_NETWORK",onSuccessCallback);
- document.write("Pass");
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-systemsetting-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="custom.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-systemsetting-disable</name>
- <tizen:application id="wrt5sys132.securitysystemsettingdisable" package="wrt5sys132" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-sysytemsetting-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to sysytemsetting sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must not allow Web Application access to sysytemsetting sensitive API features without first consulting the security policy <br>");
- try{
- function successCallback() {
- document.write("Fail");
- }
- tizen.systemsetting.setProperty("HOME_SCREEN", "icon.png", successCallback);
- }catch(e){
- if ("SecurityError" == e.name) {
- document.write("Pass");
- } else {
- document.write("Fail");
- }
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-systemsetting-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-systemsetting-enable</name>
- <tizen:application id="wrt5sys131.securitysystemsettingenable" package="wrt5sys131" required_version="2.1"/>
- <tizen:privilege name="http://tizen.org/privilege/setting" />
-</widget>
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-sysytemsetting-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to sysytemsetting sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("<br><br><br>");
- document.write("Test purpose: Check that the WRT must allow Web Application access to sysytemsetting sensitive API features with first consulting the security policy <br>");
- try{
- function successCallback() {
- document.write("Pass");
- }
- tizen.systemsetting.setProperty("HOME_SCREEN", "icon.png", successCallback);
- document.write("Pass");
- }catch(e){
- document.write("Fail");
- }
- </script>
- </body>
-</html>
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-tizen-disable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-tizen-disable</name>
- <tizen:application id="wrt5std090.securitytizendisable" package="wrt5std090" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-tizen-disable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must not allow Web Application access to tizen sensitive API features without first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("Test purpose: Check that the WRT must not allow Web Application access to tizen sensitive API features without first consulting the security policy <br>");
- try{
- if("tizen" in window){
- try {
- var filter = new tizen.AttributeFilter("name.firstName", "CONTAINS", "Chris");
- document.write("Pass");
- } catch(e) {
- document.write("Fail");
- }
- }else{
- document.write("Fail---tizen should be in window");
- }
- }catch(e){
- document.write("FAIL--" + e.message);
- }
- </script>
- </body>
-</html>
\ No newline at end of file
+++ /dev/null
-<?xml version="1.0" encoding="UTF-8"?>
-<widget id="http://tizen.org/security-tizen-enable" xmlns="http://www.w3.org/ns/widgets" xmlns:tizen="http://tizen.org/ns/widgets">
- <access origin="*"/>
- <icon src="icon.png" height="123" width="123"/>
- <content src="index.html"/>
- <name>security-tizen-enable</name>
- <tizen:application id="wrt5ste091.securitytizenenable" package="wrt5ste091" required_version="2.1"/>
-</widget>
\ No newline at end of file
+++ /dev/null
-<!DOCTYPE html>
-<!--
-Copyright (c) 2012 Intel Corporation.
-
-Redistribution and use in source and binary forms, with or without modification,
-are permitted provided that the following conditions are met:
-
-* Redistributions of works must retain the original copyright notice, this list
- of conditions and the following disclaimer.
-* Redistributions in binary form must reproduce the original copyright notice,
- this list of conditions and the following disclaimer in the documentation
- and/or other materials provided with the distribution.
-* Neither the name of Intel Corporation nor the names of its contributors
- may be used to endorse or promote products derived from this work without
- specific prior written permission.
-
-THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION "AS IS"
-AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION BE LIABLE FOR ANY DIRECT,
-INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
-BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
-DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
-OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
-NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
-EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
-
-Authors:
- Yue, Jianhui <jianhuix.a.yue@intel.com>
-
--->
-
-<html>
- <head>
- <title>WRT Test: security-tizen-enable</title>
- <link rel="author" title="Intel" href="http://www.intel.com" />
- <link rel="help" href="" />
- <meta name="flags" content="" />
- <meta name="assert" content="Check that the WRT must allow Web Application access to tizen sensitive API features with first consulting the security policy." />
- <meta charset="utf-8">
- </head>
- <body>
- <script type="text/javascript">
- document.write("Test purpose: Check that the WRT must allow Web Application access to tizen sensitive API features with first consulting the security policy <br>");
- try{
- if("tizen" in window){
- document.write("Pass");
- }else{
- document.write("Fail");
- }
- }catch(e){
- document.write(e.message);
- }
-</script>
- </body>
-</html>
\ No newline at end of file
<test_definition>
<suite name="tct-privacy-tests">
<set name="SecurityPrivacy">
- <testcase purpose="Check that the WRT must allow Web Application access to tizen sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P0" id="security-tizen-enable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-tizen-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-tizen-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to tizen sensitive API features without first consulting the security policy" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P0" id="security-tizen-disable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-tizen-disable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-tizen-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
<testcase purpose="Check that the WRT encrypt all resources of the Application storage" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="protection-encryption-check">
<description>
<pre_condition></pre_condition>
</spec>
</specs>
</testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to alarm sensitive API features without first consulting the security policy" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-alarm-disable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-alarm-disable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-alarm-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to systeminfo sensitive API features without first consulting the security policy" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-systeminfo-disable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-systeminfo-disable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-systeminfo-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to application.launch sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-application-launch-disable">
+ <testcase purpose="Check that the WRT must not allow Web Application access to messaging.read sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-messaging-read-disable">
<description>
- <pre_condition></pre_condition>
+ <pre_condition>To ensure the existence of telephone short message information</pre_condition>
<post_condition></post_condition>
<steps>
<step order="1">
- <step_desc>Install security-application-launch-disable.wgt</step_desc>
+ <step_desc>Install security-messaging-read-disable.wgt</step_desc>
<expected>Widget application is able to install successfully</expected>
</step>
<step order="2">
- <step_desc>Launch the security-application-launch-disable application</step_desc>
+ <step_desc>Launch the security-messaging-read-disable widget application</step_desc>
<expected>The screen shows "PASS"</expected>
</step>
</steps>
</spec>
</specs>
</testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to bluetooth.admin sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-bt-admin-disable">
+ <testcase purpose="Check that the WRT must not allow Web Application access to messaging.write sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-messaging-write-disable">
<description>
- <pre_condition></pre_condition>
+ <pre_condition>Make sure connect to network, and according to README configured the email account. To ensure the existence of telephone short message information</pre_condition>
<post_condition></post_condition>
<steps>
<step order="1">
- <step_desc>Install security-bt-admin-disable.wgt</step_desc>
+ <step_desc>Install security-messaging-write-disable.wgt</step_desc>
<expected>Widget application is able to install successfully</expected>
</step>
<step order="2">
- <step_desc>Launch the security-bt-admin-disable application</step_desc>
+ <step_desc>Launch the security-messaging-write-disable widget application</step_desc>
<expected>The screen shows "PASS"</expected>
</step>
</steps>
</spec>
</specs>
</testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to bluetooth.gap sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-bt-gap-disable">
+ <testcase purpose="Check that the WRT can decrypt html resources of widget Application successfully" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="protection-decrypt-html">
<description>
<pre_condition></pre_condition>
<post_condition></post_condition>
<steps>
<step order="1">
- <step_desc>Install security-bt-gap-disable.wgt</step_desc>
+ <step_desc>Install protection-decrypt-html.wgt</step_desc>
<expected>Widget application is able to install successfully</expected>
</step>
<step order="2">
- <step_desc>Launch the security-bt-gap-disable application</step_desc>
- <expected>The screen shows "PASS"</expected>
+ <step_desc>Launch the protection-decrypt-html widget application</step_desc>
+ <expected>The screen shows a sentence</expected>
</step>
</steps>
<test_script_entry test_script_expected_result="0"></test_script_entry>
</description>
<specs>
<spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
+ <spec_assertion element_type="attribute" element_name="N/A" interface="0650" specification="Web Application Protection" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
<spec_url></spec_url>
<spec_statement></spec_statement>
</spec>
</specs>
</testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to bluetooth.spp sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-bt-spp-disable">
+ <testcase purpose="Check if WRT include mechanism disabling the security policy checks." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-policy">
<description>
- <pre_condition></pre_condition>
+ <pre_condition>Make sure the security-policy.wgt is installed</pre_condition>
<post_condition></post_condition>
<steps>
<step order="1">
- <step_desc>Install security-bt-spp-disable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
+ <step_desc>Launch the security-policy application.</step_desc>
+ <expected>The screen shows "PASS".</expected>
</step>
<step order="2">
- <step_desc>Launch the security-bt-spp-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
+ <step_desc>Get into the resources folder which is the security-policy widget storage.</step_desc>
+ <expected>Access to the widget application storage.</expected>
</step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to calendar.read sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-calendar-read-disable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-calendar-read-disable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
+ <step order="3">
+ <step_desc>Del the config.xml file.</step_desc>
+ <expected>The config.xml file is deleted.</expected>
</step>
- <step order="2">
- <step_desc>Launch the security-calendar-read-disable widget application</step_desc>
+ <step order="4">
+ <step_desc>Launch the security-policy application.</step_desc>
<expected>The screen shows "PASS"</expected>
</step>
</steps>
</description>
<specs>
<spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
+ <spec_assertion element_type="attribute" element_name="N/A" interface="0710" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
<spec_url></spec_url>
<spec_statement></spec_statement>
</spec>
</specs>
</testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to calendar.write sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-calendar-write-disable">
+ <testcase purpose="Check if WRT not allow the user to elevate permissions set by the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-permission">
<description>
<pre_condition></pre_condition>
<post_condition></post_condition>
<steps>
<step order="1">
- <step_desc>Install security-calendar-write-disable.wgt</step_desc>
+ <step_desc>Install security-permission.wgt</step_desc>
<expected>Widget application is able to install successfully</expected>
</step>
<step order="2">
- <step_desc>Launch the security-calendar-write-disable application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to contact.read sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-contact-read-disable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-contact-read-disable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
+ <step_desc>Launch the security-permission application.</step_desc>
+ <expected>The screen shows "Pass".</expected>
</step>
- <step order="2">
- <step_desc>Launch the security-contact-read-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
+ <step order="3">
+ <step_desc>Edit config.xml in the resources folder which is the security-permission widget storage.</step_desc>
+ <expected>Access to the widget application storage.</expected>
</step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to contact.write sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-contact-write-disable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-contact-write-disable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
+ <step order="4">
+ <step_desc>Del the annotation symbol in config.xml file.</step_desc>
+ <expected>The config.xml file is changed.</expected>
</step>
- <step order="2">
- <step_desc>Launch the security-contact-write-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
+ <step order="5">
+ <step_desc>Launch the security-permission application.</step_desc>
+ <expected>The screen shows "Pass"</expected>
</step>
</steps>
<test_script_entry test_script_expected_result="0"></test_script_entry>
</description>
<specs>
<spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
+ <spec_assertion element_type="attribute" element_name="N/A" interface="0720" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
<spec_url></spec_url>
<spec_statement></spec_statement>
</spec>
</specs>
</testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to filesystem.read sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-filesystem-read-disable">
+ <testcase purpose="Check that the WRT can decrypt js resources of widget Application successfully" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="protection-decrypt-js">
<description>
- <pre_condition></pre_condition>
+ <pre_condition>Make sure the protection-decrypt-js.wgt app is installed</pre_condition>
<post_condition></post_condition>
<steps>
<step order="1">
- <step_desc>Install security-filesystem-read-disable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
+ <step_desc>Launch the protection-decrypt-js widget application</step_desc>
+ <expected>The screen appeared "click" button</expected>
</step>
<step order="2">
- <step_desc>Launch the security-filesystem-read-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
+ <step_desc>Click on the button</step_desc>
+ <expected>The screen shows "js code"</expected>
</step>
</steps>
<test_script_entry test_script_expected_result="0"></test_script_entry>
</description>
<specs>
<spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
+ <spec_assertion element_type="attribute" element_name="N/A" interface="0650" specification="Web Application Protection" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
<spec_url></spec_url>
<spec_statement></spec_statement>
</spec>
</specs>
</testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to filesystem.write sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-filesystem-write-disable">
+ <testcase purpose="Check that the WRT can decrypt css resources of widget Application successfully" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="protection-decrypt-css">
<description>
<pre_condition></pre_condition>
<post_condition></post_condition>
<steps>
<step order="1">
- <step_desc>Install security-filesystem-write-disable.wgt</step_desc>
+ <step_desc>Install protection-decrypt-css.wgt</step_desc>
<expected>Widget application is able to install successfully</expected>
</step>
<step order="2">
- <step_desc>Launch the security-filesystem-write-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
+ <step_desc>Launch the protection-decrypt-css widget application</step_desc>
+ <expected>The background is blue</expected>
</step>
</steps>
<test_script_entry test_script_expected_result="0"></test_script_entry>
</description>
<specs>
<spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
+ <spec_assertion element_type="attribute" element_name="N/A" interface="0650" specification="Web Application Protection" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
<spec_url></spec_url>
<spec_statement></spec_statement>
</spec>
</specs>
</testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to messaging.read sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-messaging-read-disable">
+ <testcase purpose="Check that the WRT must allow Web Application access to messaging.read sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-messaging-read-enable">
<description>
<pre_condition>To ensure the existence of telephone short message information</pre_condition>
<post_condition></post_condition>
<steps>
<step order="1">
- <step_desc>Install security-messaging-read-disable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-messaging-read-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to systemmanager sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-systeminfo-manager-disable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-systeminfo-manager-disable.wgt</step_desc>
+ <step_desc>Install security-messaging-read-enable.wgt</step_desc>
<expected>Widget application is able to install successfully</expected>
</step>
<step order="2">
- <step_desc>Launch the security-systeminfo-manager-disable widget application</step_desc>
+ <step_desc>Launch the security-messaging-read-enable widget application</step_desc>
<expected>The screen shows "PASS"</expected>
</step>
</steps>
</description>
<specs>
<spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
+ <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
<spec_url></spec_url>
<spec_statement></spec_statement>
</spec>
</specs>
</testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to messaging.write sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-messaging-write-disable">
+ <testcase purpose="Check that the WRT must allow Web Application access to messaging.write sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-messaging-write-enable">
<description>
<pre_condition>Make sure connect to network, and according to README configured the email account. To ensure the existence of telephone short message information</pre_condition>
<post_condition></post_condition>
<steps>
<step order="1">
- <step_desc>Install security-messaging-write-disable.wgt</step_desc>
+ <step_desc>Install security-messaging-write-enable.wgt</step_desc>
<expected>Widget application is able to install successfully</expected>
</step>
<step order="2">
- <step_desc>Launch the security-messaging-write-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to nfc.admin sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-nfc-admin-disable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-nfc-admin-disable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-nfc-admin-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to nfc.p2p sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-nfc-p2p-disable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-nfc-p2p-disable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-nfc-p2p-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to nfc.tag sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-nfc-tag-disable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-nfc-tag-disable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-nfc-tag-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT can decrypt html resources of widget Application successfully" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="protection-decrypt-html">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install protection-decrypt-html.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the protection-decrypt-html widget application</step_desc>
- <expected>The screen shows a sentence</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0650" specification="Web Application Protection" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check if WRT include mechanism disabling the security policy checks." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-policy">
- <description>
- <pre_condition>Make sure the security-policy.wgt is installed</pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Launch the security-policy application.</step_desc>
- <expected>The screen shows "PASS".</expected>
- </step>
- <step order="2">
- <step_desc>Get into the resources folder which is the security-policy widget storage.</step_desc>
- <expected>Access to the widget application storage.</expected>
- </step>
- <step order="3">
- <step_desc>Del the config.xml file.</step_desc>
- <expected>The config.xml file is deleted.</expected>
- </step>
- <step order="4">
- <step_desc>Launch the security-policy application.</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0710" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check if WRT not allow the user to elevate permissions set by the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-permission">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-permission.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-permission application.</step_desc>
- <expected>The screen shows "Pass".</expected>
- </step>
- <step order="3">
- <step_desc>Edit config.xml in the resources folder which is the security-permission widget storage.</step_desc>
- <expected>Access to the widget application storage.</expected>
- </step>
- <step order="4">
- <step_desc>Del the annotation symbol in config.xml file.</step_desc>
- <expected>The config.xml file is changed.</expected>
- </step>
- <step order="5">
- <step_desc>Launch the security-permission application.</step_desc>
- <expected>The screen shows "Pass"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0720" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to alarm sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-alarm-enable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-alarm-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-alarm-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0680" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to callhistory.read sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-callhistory-read-disable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-callhistory-read-disable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-callhistory-read-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to callhistory.write sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-callhistory-write-disable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-callhistory-write-disable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-callhistory-write-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to content.read sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-content-read-disable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-content-read-disable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-content-read-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to content.write sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-content-write-disable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-content-write-disable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-content-write-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to download sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-download-disable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-download-disable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-download-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to nfc.common sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-nfc-common-disable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-nfc-common-disable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-nfc-common-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to notification sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-notification-disable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-notification-disable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-notification-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to power sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-power-disable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-power-disable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-power-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to systemsetting sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-systemsetting-disable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-systemsetting-disable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-systemsetting-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT can decrypt js resources of widget Application successfully" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="protection-decrypt-js">
- <description>
- <pre_condition>Make sure the protection-decrypt-js.wgt app is installed</pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Launch the protection-decrypt-js widget application</step_desc>
- <expected>The screen appeared "click" button</expected>
- </step>
- <step order="2">
- <step_desc>Click on the button</step_desc>
- <expected>The screen shows "js code"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0650" specification="Web Application Protection" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT can decrypt css resources of widget Application successfully" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="protection-decrypt-css">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install protection-decrypt-css.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the protection-decrypt-css widget application</step_desc>
- <expected>The background is blue</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0650" specification="Web Application Protection" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to systeminfo sensitive API features with first consulting the security policy" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-systeminfo-enable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-systeminfo-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-systeminfo-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to application.launch sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-application-launch-enable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-application-launch-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-application-launch-enable application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to bluetooth.admin sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-bt-admin-enable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-bt-admin-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-bt-admin-enable application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to bluetooth.gap sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-bt-gap-enable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-bt-gap-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-bt-gap-enable application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to bluetooth.spp sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-bt-spp-enable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-bt-spp-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-bt-spp-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to calendar.read sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-calendar-read-enable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-calendar-read-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-calendar-read-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to calendar.write sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-calendar-write-enable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-calendar-write-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-calendar-write-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to contact.read sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-contact-read-enable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-contact-read-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-contact-read-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to contact.write sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-contact-write-enable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-contact-write-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-contact-write-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to filesystem.read sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-filesystem-read-enable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-filesystem-read-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-filesystem-read-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to filesystem.write sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-filesystem-write-enable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-filesystem-write-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-filesystem-write-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to messaging.read sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-messaging-read-enable">
- <description>
- <pre_condition>To ensure the existence of telephone short message information</pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-messaging-read-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-messaging-read-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to systemmanager sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-systeminfo-manager-enable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-systeminfo-manager-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-systeminfo-manager-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to messaging.write sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-messaging-write-enable">
- <description>
- <pre_condition>Make sure connect to network, and according to README configured the email account. To ensure the existence of telephone short message information</pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-messaging-write-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-messaging-write-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to nfc.admin sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-nfc-admin-enable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-nfc-admin-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-nfc-admin-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to nfc.p2p sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-nfc-p2p-enable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-nfc-p2p-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-nfc-p2p-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to nfc.tag sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-nfc-tag-enable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-nfc-tag-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-nfc-tag-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to callhistory.read sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-callhistory-read-enable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-callhistory-read-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-callhistory-read-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to callhistory.write sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-callhistory-write-enable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-callhistory-write-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-callhistory-write-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to content.read sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-content-read-enable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-content-read-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-content-read-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to content.write sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-content-write-enable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-content-write-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-content-write-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to download sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-download-enable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-download-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-download-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to nfc.common sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-nfc-common-enable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-nfc-common-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-nfc-common-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to notification sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-notification-enable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-notification-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-notification-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to power sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-power-enable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-power-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-power-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to systemsetting sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-systemsetting-enable">
- <description>
- <pre_condition></pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Install security-systemsetting-enable.wgt</step_desc>
- <expected>Widget application is able to install successfully</expected>
- </step>
- <step order="2">
- <step_desc>Launch the security-systemsetting-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to bookmark.read sensitive API features with first consulting the security policy" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-bookmark-read-enable">
- <description>
- <pre_condition>Make sure the security-bookmark-read-enable application has been installed</pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Launch the security-bookmark-read-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to bookmark.write sensitive API features with first consulting the security policy" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-bookmark-write-enable">
- <description>
- <pre_condition>Make sure the security-bookmark-write-enable application has been installed</pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Launch the security-bookmark-write-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to datasync sensitive API features with first consulting the security policy" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-datasync-enable">
- <description>
- <pre_condition>Make sure the security-datasync-enable application has been installed</pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Launch the security-datasync-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to networkbearerselection sensitive API features with first consulting the security policy" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-networkbearerselection-enable">
- <description>
- <pre_condition>Make sure the security-networkbearerselection-enable application has been installed</pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Launch the security-networkbearerselection-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to package.info sensitive API features with first consulting the security policy" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-package-info-enable">
- <description>
- <pre_condition>Make sure the security-package-info-enable application has been installed</pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Launch the security-package-info-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to packagemanager.install sensitive API features with first consulting the security policy" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-package-install-enable">
- <description>
- <pre_condition>Make sure the security-package-install-enable application has been installed</pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Launch the security-package-install-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to push sensitive API features with first consulting the security policy" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-push-enable">
- <description>
- <pre_condition>Make sure the security-push-enable application has been installed</pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Launch the security-push-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to datacontrol sensitive API features with first consulting the security policy" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-datacontrol-enable">
- <description>
- <pre_condition>Make sure the security-datacontrol-enable application has been installed</pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Launch the security-datacontrol-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must allow Web Application access to se sensitive API features with first consulting the security policy" type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P2" id="security-se-enable">
- <description>
- <pre_condition>Make sure the security-se-enable application has been installed</pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Launch the security-se-enable widget application</step_desc>
+ <step_desc>Launch the security-messaging-write-enable widget application</step_desc>
<expected>The screen shows "PASS"</expected>
</step>
</steps>
</spec>
</specs>
</testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to networkbearerselection sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-networkbearerselection-disable">
- <description>
- <pre_condition>Make sure the security-networkbearerselection-disable application has been installed</pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Launch the security-networkbearerselection-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to package.info sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-package-info-disable">
- <description>
- <pre_condition>Make sure the security-package-info-disable application has been installed</pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Launch the security-package-info-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to package.install sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-package-install-disable">
- <description>
- <pre_condition>Make sure the security-package-install-disable application has been installed</pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Launch the security-package-install-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to push sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-push-disable">
- <description>
- <pre_condition>Make sure the security-push-disable application has been installed</pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Launch the security-push-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to bookmark.read sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-bookmark-read-disable">
- <description>
- <pre_condition>Make sure the security-bookmark-read-disable application has been installed</pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Launch the security-bookmark-read-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to bookmark.write sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-bookmark-write-disable">
- <description>
- <pre_condition>Make sure the security-bookmark-write-disable application has been installed</pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Launch the security-bookmark-write-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to datacontrol sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-datacontrol-disable">
- <description>
- <pre_condition>Make sure the security-datacontrol-disable application has been installed</pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Launch the security-datacontrol-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to datasync sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-datasync-disable">
- <description>
- <pre_condition>Make sure the security-datasync-disable application has been installed</pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Launch the security-datasync-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to se sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-se-disable">
- <description>
- <pre_condition>Make sure the security-se-disable application has been installed</pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Launch the security-se-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0700" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to application.certificate sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-application-certificate-disable">
- <description>
- <pre_condition>Make sure the security-application-certificate-disable application has been installed</pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Launch the security-application-certificate-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to application.certificate sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-application-certificate-enable">
- <description>
- <pre_condition>Make sure the security-application-certificate-enable application has been installed</pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Launch the security-application-certificate-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to application.kill sensitive API features without first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-application-kill-disable">
- <description>
- <pre_condition>Make sure the security-application-kill-disable application has been installed</pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Launch the security-application-kill-disable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
- <testcase purpose="Check that the WRT must not allow Web Application access to application.kill sensitive API features with first consulting the security policy." type="user_experience" status="approved" component="Web/Runtime/SecurityPrivacy" execution_type="manual" priority="P1" id="security-application-kill-enable">
- <description>
- <pre_condition>Make sure the security-application-kill-enable application has been installed</pre_condition>
- <post_condition></post_condition>
- <steps>
- <step order="1">
- <step_desc>Launch the security-application-kill-enable widget application</step_desc>
- <expected>The screen shows "PASS"</expected>
- </step>
- </steps>
- <test_script_entry test_script_expected_result="0"></test_script_entry>
- <notes></notes>
- </description>
- <specs>
- <spec>
- <spec_assertion element_type="attribute" element_name="N/A" interface="0690" specification="Device API Security Policy" section="Web Application Security and Privacy" category="Tizen WRT Core Specifications"></spec_assertion>
- <spec_url></spec_url>
- <spec_statement></spec_statement>
- </spec>
- </specs>
- </testcase>
</set>
</suite>
</test_definition>