[common][csp,file-transfer-cordova,mse,sanbox,serviceworkers][modify tests.xml and... 44/251944/1
authorzhaofeng <feng.zhao@samsung.com>
Thu, 21 Jan 2021 05:59:25 +0000 (13:59 +0800)
committerzhaofeng <feng.zhao@samsung.com>
Thu, 21 Jan 2021 05:59:35 +0000 (13:59 +0800)
Change-Id: If63f1eec99229a0090b4c5e39c981f1f18f5aef2
Signed-off-by: zhaofeng <feng.zhao@samsung.com>
common/tct-csp-w3c-tests/tests.full.xml
common/tct-file-transfer-cordova-tests/tests.full.xml
common/tct-mse-w3c-tests/tests.full.xml
common/tct-sandbox-html5-tests/tests.full.xml
common/tct-serviceworkers-w3c-tests/tests.full.xml

index f494071b0109e73507ed6c5dbe7526cb20d043ec..6168a62af6b347e8913e8934bee4512e6d74ba3e 100755 (executable)
         </specs>
       </testcase>
     </set>
+    <set name="sandbox_IOT" type="js">
+      <capabilities>
+        <capability name="http://tizen.org/feature/profile">
+          <value>COMMON</value>
+        </capability>
+      </capabilities>
+      <testcase purpose="Check if inline function works well when sandbox is allow-same-origin allow-scripts." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P1" id="csp_sandbox_allow-same-origin_allow-scripts-inline">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_sandbox_allow-same-origin_allow-scripts.php?total_num=4&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="sandbox" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#sandbox-optional</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if internal function works well when sandbox is allow-same-origin allow-scripts." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P1" id="csp_sandbox_allow-same-origin_allow-scripts_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_sandbox_allow-same-origin_allow-scripts.php?total_num=4&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="sandbox" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#sandbox-optional</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if external function works well when sandbox is allow-same-origin allow-scripts." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P1" id="csp_sandbox_allow-same-origin_allow-scripts_external">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_sandbox_allow-same-origin_allow-scripts.php?total_num=4&amp;amp;locator_key=id&amp;amp;value=3</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="sandbox" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#sandbox-optional</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if event handler function works well when sandbox is allow-same-origin allow-scripts." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P1" id="csp_sandbox_allow-same-origin_allow-scripts_event">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_sandbox_allow-same-origin_allow-scripts.php?total_num=4&amp;amp;locator_key=id&amp;amp;value=4</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="sandbox" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#sandbox-optional</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use javascript internal when sandbox is empty." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_sandbox_empty_int">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_sandbox_empty_int</step_desc>
+              <expected>To pass, if there is no text 'FAIL' below.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_sandbox_empty_int.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="sandbox" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#sandbox-optional</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use javascript in external when sandbox is empty." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_sandbox_empty_ext">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_sandbox_empty_ext</step_desc>
+              <expected>To pass, if there is no text 'FAIL' below.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_sandbox_empty_ext.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="sandbox" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#sandbox-optional</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use javascript in event handler when sandbox is empty." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_sandbox_empty_event">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_sandbox_empty_event</step_desc>
+              <expected>To pass, if there is no text 'FAIL' below.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_sandbox_empty_event.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="sandbox" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#sandbox-optional</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use javascript inline when sandbox is empty." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_sandbox_empty_inline">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_sandbox_empty_inline</step_desc>
+              <expected>To pass, if there is no text 'FAIL' below.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_sandbox_empty_inline.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="sandbox" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#sandbox-optional</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+    </set>
+    <set name="connect-src_IOT" type="js">
+      <capabilities>
+        <capability name="http://tizen.org/feature/profile">
+          <value>COMMON</value>
+        </capability>
+      </capabilities>
+      <testcase purpose="Check if user agent is able to open internal resource by xhr when connect-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_connect-src_asterisk_allowed">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_connect-src_asterisk.php?total_num=2&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="connect-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#connect-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to open external resource by xhr when connect-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_connect-src_asterisk_allowed_ext">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_connect-src_asterisk.php?total_num=2&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="connect-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#connect-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to open external resource by xhr when connect-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_connect-src_cross-origin_xmlhttprequest_allowed">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_connect-src_cross-origin.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="connect-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#connect-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to open not-allowed external resource by xhr when connect-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_connect-src_cross-origin_xmlhttprequest_blocked">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_connect-src_cross-origin.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="connect-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#connect-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to open internal resource by xhr when connect-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_connect-src_cross-origin_xmlhttprequest_blocked_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_connect-src_cross-origin.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=3</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="connect-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#connect-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to open first allowed external resource by xhr when connect-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_connect-src_cross-origin_multi_xmlhttprequest_allowed_one">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_connect-src_cross-origin_multi.php?total_num=4&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="connect-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#connect-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to open second allowed external resource by xhr when connect-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_connect-src_cross-origin_multi_xmlhttprequest_allowed_two">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_connect-src_cross-origin_multi.php?total_num=4&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="connect-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#connect-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to open not-allowed external resource by xhr when connect-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_connect-src_cross-origin_multi_xmlhttprequest_blocked">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_connect-src_cross-origin_multi.php?total_num=4&amp;amp;locator_key=id&amp;amp;value=3</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="connect-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#connect-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to open internal resource by xhr when connect-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_connect-src_cross-origin_multi_xmlhttprequest_blocked_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_connect-src_cross-origin_multi.php?total_num=4&amp;amp;locator_key=id&amp;amp;value=4</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="connect-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#connect-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to open internal resource by xhr when connect-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_connect-src_none_xmlhttprequest_blocked">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_connect-src_none.php?total_num=2&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="connect-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#connect-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to open external resource by xhr when connect-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_connect-src_none_xmlhttprequest_blocked_ext">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_connect-src_none.php?total_num=2&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="connect-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#connect-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to open internal resource by xhr when connect-src is 'self'." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_connect-src_self_xmlhttprequest_allowed">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_connect-src_self.php?total_num=2&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="connect-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#connect-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to open external resource by xhr when connect-src is 'self'." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_connect-src_self_xmlhttprequest_blocked">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_connect-src_self.php?total_num=2&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="connect-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#connect-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to open internal resource by xhr when connect-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_connect-src_asterisk_allowed">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_connect-src_asterisk.php?total_num=2&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to open external resource by xhr when connect-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_connect-src_asterisk_allowed_ext">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_connect-src_asterisk.php?total_num=2&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to open external resource by xhr when connect-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_connect-src_cross-origin_xmlhttprequest_allowed">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_connect-src_cross-origin.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to open not-allowed external resource by xhr when connect-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_connect-src_cross-origin_xmlhttprequest_blocked">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_connect-src_cross-origin.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to open internal resource by xhr when connect-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_connect-src_cross-origin_xmlhttprequest_blocked_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_connect-src_cross-origin.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=3</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to open first allowed external resource by xhr when connect-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_connect-src_cross-origin_multi_xmlhttprequest_allowed_one">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_connect-src_cross-origin_multi.php?total_num=4&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to open second allowed external resource by xhr when connect-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_connect-src_cross-origin_multi_xmlhttprequest_allowed_two">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_connect-src_cross-origin_multi.php?total_num=4&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to open not-allowed external resource by xhr when connect-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_connect-src_cross-origin_multi_xmlhttprequest_blocked">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_connect-src_cross-origin_multi.php?total_num=4&amp;amp;locator_key=id&amp;amp;value=3</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to open internal resource by xhr when connect-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_connect-src_cross-origin_multi_xmlhttprequest_blocked_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_connect-src_cross-origin_multi.php?total_num=4&amp;amp;locator_key=id&amp;amp;value=4</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to open internal resource by xhr when connect-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_connect-src_none_xmlhttprequest_blocked">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_connect-src_none.php?total_num=2&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to open external resource by xhr when connect-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_connect-src_none_xmlhttprequest_blocked_ext">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_connect-src_none.php?total_num=2&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to open internal resource by xhr when connect-src is 'self'." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_connect-src_self_xmlhttprequest_allowed">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_connect-src_self.php?total_num=2&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to open external resource by xhr when connect-src is 'self'." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_connect-src_self_xmlhttprequest_blocked">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_connect-src_self.php?total_num=2&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+      </testcase>
+    </set>
+    <set name="default-src_IOT" type="js">
+      <capabilities>
+        <capability name="http://tizen.org/feature/profile">
+          <value>COMMON</value>
+        </capability>
+      </capabilities>
+      <testcase purpose="Check if default-src is '*' that inline script won't be executed" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P1" id="csp_default-src_asterisk">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/w3c/CSP_001.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if default-src is 'self' and about is 'unsafe-inline, that inline script will be executed" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_default-src_self_about_unsafe-inline_script">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/w3c/CSP_default-src-inline-allowed.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if default-src is 'self' and about is 'unsafe-inline, that inline script in iframe will be executed" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_default-src_self_about_unsafe-inline_iframe">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/w3c/CSP_default-src-inline-allowed.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if default-src is 'self' and about is 'unsafe-inline, that inline script in img will be executed" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_default-src_self_about_unsafe-inline_img">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/w3c/CSP_default-src-inline-allowed.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=3</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if default-src is 'self' that inline script won't be executed" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P1" id="csp_default-src_self">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/w3c/CSP_002.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to open internal resource by xhr when default-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_default-src_cross-origin_connect_xmlhttprequest_allowed">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_cross-origin_connect.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to open not-allowed external resource by xhr when default-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_default-src_cross-origin_connect_xmlhttprequest_blocked">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_cross-origin_connect.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to open internal resource by xhr when default-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_default-src_cross-origin_connect_xmlhttprequest_blocked_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_cross-origin_connect.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=3</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to open first allowed resource by xhr when default-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_default-src_cross-origin_connect_multi_xmlhttprequest_allowed_one">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_cross-origin_connect_multi.php?total_num=4&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to open second allowed resource by xhr when default-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_default-src_cross-origin_connect_multi_xmlhttprequest_allowed_two">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_cross-origin_connect_multi.php?total_num=4&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to open not-allowed external resource by xhr when default-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_default-src_cross-origin_connect_multi_xmlhttprequest_blocked">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_cross-origin_connect_multi.php?total_num=4&amp;amp;locator_key=id&amp;amp;value=3</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to open internal resource by xhr when default-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_default-src_cross-origin_connect_multi_xmlhttprequest_blocked_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_cross-origin_connect_multi.php?total_num=4&amp;amp;locator_key=id&amp;amp;value=4</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to open internal resource by xhr when default-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_default-src_none_connect_xmlhttprequest_blocked">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_none_connect.php?total_num=2&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to open external resource by xhr when default-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_default-src_none_connect_xmlhttprequest_blocked_ext">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_none_connect.php?total_num=2&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to open internal resource by xhr when default-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P1" id="csp_default-src_self_connect_xmlhttprequest_allowed">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_self_connect.php?total_num=2&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to open external resource by xhr when default-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P1" id="csp_default-src_self_connect_xmlhttprequest_blocked">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_self_connect.php?total_num=2&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use internal image resource when default-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_default-src_self_img_allowed">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_default-src_self_img_allowed</step_desc>
+              <expected>To pass, if a filled blue square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_self_img_allowed.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use external image resource when default-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_default-src_self_img_blocked">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_default-src_self_img_blocked</step_desc>
+              <expected>To pass, if no red square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_self_img_blocked.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use internal object resource when default-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_default-src_self_object_allowed">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_default-src_self_object_allowed</step_desc>
+              <expected>To pass, if a filled blue square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_self_object_allowed.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use external object resource when default-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_default-src_self_object_blocked">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_default-src_self_object_blocked</step_desc>
+              <expected>To pass, if no red square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_self_object_blocked.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use external font resource when default-src is cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_default-src_cross-origin_font_allowed">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_default-src_cross-origin_font_allowed.</step_desc>
+              <expected>To pass, if two lines are different in font</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_cross-origin_font_allowed.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use internal font resource when default-src is cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_default-src_cross-origin_font_blocked">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_default-src_cross-origin_font_blocked.</step_desc>
+              <expected>To pass, if two lines have the same font</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_cross-origin_font_blocked.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use external font resource when default-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_default-src_none_font_blocked_ext">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_default-src_none_font_blocked_ext.</step_desc>
+              <expected>To pass, if two lines have the same font</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_none_font_blocked_ext.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use internal font resource when default-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_default-src_none_font_blocked_int">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_default-src_none_font_blocked_int.</step_desc>
+              <expected>To pass, if two lines have the same font.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_none_font_blocked_int.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use internal font resource when default-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_default-src_self_font_allowed">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_default-src_self_font_allowed.</step_desc>
+              <expected>To pass, if two lines are different in font</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_self_font_allowed.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use external font resource when default-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_default-src_self_font_blocked">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_default-src_self_font_blocked.</step_desc>
+              <expected>To pass, if two lines have the same font</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_self_font_blocked.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the first allowed external font resource when default-src is multi cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_default-src_cross-origin_multi_font_allowed_one">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_default-src_cross-origin_multi_font_allowed_one.</step_desc>
+              <expected>To pass, if two lines are different in font</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_cross-origin_multi_font_allowed_one.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the second allowed external font resource when default-src is multi cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_default-src_cross-origin_multi_font_allowed_two">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_default-src_cross-origin_multi_font_allowed_two.</step_desc>
+              <expected>To pass, if two lines are different in font</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_cross-origin_multi_font_allowed_two.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use the not allowed external font resource when default-src is multi cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_default-src_cross-origin_multi_font_blocked">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_default-src_cross-origin_multi_font_blocked.</step_desc>
+              <expected>To pass, if two lines have the same font</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_cross-origin_multi_font_blocked.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use the internal font resource when default-src is multi cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_default-src_cross-origin_multi_font_blocked_int">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_default-src_cross-origin_multi_font_blocked_int.</step_desc>
+              <expected>To pass, if two lines have the same font</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_cross-origin_multi_font_blocked_int.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use internal frame resource when default-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_default-src_self_frame_allowed">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_default-src_self_frame_allowed.</step_desc>
+              <expected>To pass, if a filled blue square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_self_frame_allowed.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use external default resource when default-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_default-src_self_frame_blocked">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_default-src_self_frame_blocked.</step_desc>
+              <expected>To pass, if no red square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_self_frame_blocked.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+    </set>
+    <set name="font-src_IOT" type="js">
+      <capabilities>
+        <capability name="http://tizen.org/feature/profile">
+          <value>COMMON</value>
+        </capability>
+      </capabilities>
+      <testcase purpose="Check if user agent is able to use external font resource when font-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_font-src_asterisk_allowed_ext">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_font-src_asterisk_allowed_ext.</step_desc>
+              <expected>To pass, if two lines are different in font</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_font-src_asterisk_allowed_ext.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use internal font resource when font-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_font-src_asterisk_allowed_int">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_font-src_asterisk_allowed_int.</step_desc>
+              <expected>To pass, if two lines are different in font</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_font-src_asterisk_allowed_int.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use external font resource when font-src is cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_font-src_cross-origin_allowed">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_font-src_cross-origin_allowed.</step_desc>
+              <expected>To pass, if two lines are different in font</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_font-src_cross-origin_allowed.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use internal font resource when font-src is cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_font-src_cross-origin_blocked">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_font-src_cross-origin_blocked.</step_desc>
+              <expected>To pass, if two lines have the same font</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_font-src_cross-origin_blocked.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use external font resource when font-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_font-src_none_blocked_ext">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_font-src_none_blocked_ext.</step_desc>
+              <expected>To pass, if two lines have the same font</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_font-src_none_blocked_ext.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use internal font resource when font-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_font-src_none_blocked_int">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_font-src_none_blocked_int.</step_desc>
+              <expected>To pass, if two lines have the same font</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_font-src_none_blocked_int.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use internal font resource when font-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_font-src_self_allowed">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_font-src_self_allowed.</step_desc>
+              <expected>To pass, if two lines are different in font</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_font-src_self_allowed.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use external font resource when font-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_font-src_self_blocked">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_font-src_self_blocked.</step_desc>
+              <expected>To pass, if two lines have the same font</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_font-src_self_blocked.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the first allowed external font resource when font-src is multi cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_font-src_cross-origin_multi_allowed_one">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_font-src_cross-origin_multi_allowed_one.</step_desc>
+              <expected>To pass, if two lines are different in font</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_font-src_cross-origin_multi_allowed_one.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the second allowed external font resource when font-src is multi cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_font-src_cross-origin_multi_allowed_two">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_font-src_cross-origin_multi_allowed_two.</step_desc>
+              <expected>To pass, if two lines are different in font</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_font-src_cross-origin_multi_allowed_two.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use the not allowed external font resource when font-src is multi cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_font-src_cross-origin_multi_blocked">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_font-src_cross-origin_multi_blocked.</step_desc>
+              <expected>To pass, if two lines have the same font</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_font-src_cross-origin_multi_blocked.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use the internal font resource when font-src is multi cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_font-src_cross-origin_multi_blocked_int">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_font-src_cross-origin_multi_blocked_int.</step_desc>
+              <expected>To pass, if two lines have the same font</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_font-src_cross-origin_multi_blocked_int.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use external font resource when font-src is self in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_ro_font-src_self_allowed_ext">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_ro_font-src_self_allowed_ext.</step_desc>
+              <expected>To pass, if two lines are defferent in font</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_font-src_self_allowed_ext.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use internal font resource when font-src is self in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_ro_font-src_self_allowed_int">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_ro_font-src_self_allowed_int.</step_desc>
+              <expected>To pass, if two lines are defferent in font</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_font-src_self_allowed_int.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+    </set>
+    <set name="frame-src_IOT" type="js">
+      <capabilities>
+        <capability name="http://tizen.org/feature/profile">
+          <value>COMMON</value>
+        </capability>
+      </capabilities>
+      <testcase purpose="Check if user agent is able to use external frame resource when frame-src is asterisk." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-src_asterisk_allowed_ext">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_frame-src_asterisk_allowed_ext.</step_desc>
+              <expected>To pass, if a filled green square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-src_asterisk_allowed_ext.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="frame-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#frame-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use internal frame resource when frame-src is asterisk." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-src_asterisk_allowed_int">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_frame-src_asterisk_allowed_int.</step_desc>
+              <expected>To pass, if a filled blue square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-src_asterisk_allowed_int.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="frame-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#frame-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use external frame resource when frame-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-src_cross-origin_allowed">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_frame-src_cross-origin_allowed.</step_desc>
+              <expected>To pass, if a filled green square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-src_cross-origin_allowed.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="frame-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#frame-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use not allowed eternal frame resource when frame-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-src_cross-origin_blocked">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_frame-src_cross-origin_blocked.</step_desc>
+              <expected>To pass, if no red square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-src_cross-origin_blocked.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="frame-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#frame-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use internal frame resource when frame-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-src_cross-origin_blocked_int">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_frame-src_cross-origin_blocked_int.</step_desc>
+              <expected>To pass, if no red square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-src_cross-origin_blocked_int.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="frame-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#frame-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the first external frame resource when frame-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-src_cross-origin_multi_allowed_one">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_frame-src_cross-origin_multi_allowed_one.</step_desc>
+              <expected>To pass, if a filled green square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-src_cross-origin_multi_allowed_one.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="frame-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#frame-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the second external frame resource when frame-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-src_cross-origin_multi_allowed_two">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_frame-src_cross-origin_multi_allowed_two.</step_desc>
+              <expected>To pass, if a filled green square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-src_cross-origin_multi_allowed_two.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="frame-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#frame-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use the not allowed external frame resource when frame-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-src_cross-origin_multi_blocked">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_frame-src_cross-origin_multi_blocked.</step_desc>
+              <expected>To pass, if no red square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-src_cross-origin_multi_blocked.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="frame-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#frame-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use the internal frame resource when frame-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-src_cross-origin_multi_blocked_int">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_frame-src_cross-origin_multi_blocked_int.</step_desc>
+              <expected>To pass, if no red square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-src_cross-origin_multi_blocked_int.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="frame-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#frame-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use external frame resource when frame-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-src_none_blocked_ext">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_frame-src_none_blocked_ext.</step_desc>
+              <expected>To pass, if no red square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-src_none_blocked_ext.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="frame-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#frame-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use internal frame resource when frame-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-src_none_blocked_int">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_frame-src_none_blocked_int.</step_desc>
+              <expected>To pass, if no red square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-src_none_blocked_int.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="frame-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#frame-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use internal frame resource when frame-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-src_self_allowed">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_frame-src_self_allowed.</step_desc>
+              <expected>To pass, if a filled blue square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-src_self_allowed.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="frame-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#frame-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use external frame resource when frame-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-src_self_blocked">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_frame-src_self_blocked.</step_desc>
+              <expected>To pass, if no red square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-src_self_blocked.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="frame-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#frame-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+    </set>
+    <set name="img-src_IOT" type="js">
+      <capabilities>
+        <capability name="http://tizen.org/feature/profile">
+          <value>COMMON</value>
+        </capability>
+      </capabilities>
+      <testcase purpose="Check if user agent is able to use external image resource when img-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_img-src_asterisk_allowed_ext">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_img-src_asterisk_allowed_ext</step_desc>
+              <expected>To pass, if a filled green square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_img-src_asterisk_allowed_ext.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use internal image resource when img-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_img-src_asterisk_allowed_int">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_img-src_asterisk_allowed_int</step_desc>
+              <expected>To pass, if a filled blue square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_img-src_asterisk_allowed_int.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use external image resource when img-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_img-src_cross-origin_allowed">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_img-src_cross-origin_allowed</step_desc>
+              <expected>To pass, if a filled green square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_img-src_cross-origin_allowed.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use not-allowed external image resource when img-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_img-src_cross-origin_blocked">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_img-src_cross-origin_blocked</step_desc>
+              <expected>To pass, if no red square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_img-src_cross-origin_blocked.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use internal image resource when img-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_img-src_cross-origin_blocked_int">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_img-src_cross-origin_blocked_int</step_desc>
+              <expected>To pass, if no red square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_img-src_cross-origin_blocked_int.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the first allowed external image resource when img-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_img-src_cross-origin_multi_allowed_one">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_img-src_cross-origin_multi_allowed_one</step_desc>
+              <expected>To pass, if a filled green square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_img-src_cross-origin_multi_allowed_one.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the second allowed external image resource when img-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_img-src_cross-two">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_img-src_cross-origin_multi_allowed_two</step_desc>
+              <expected>To pass, if a filled green square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_img-src_cross-origin_multi_allowed_two.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use the not-allowed external image resource when img-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_img-src_cross-origin_multi_blocked">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_img-src_cross-origin_multi_blocked</step_desc>
+              <expected>To pass, if no red square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_img-src_cross-origin_multi_blocked.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use the internal image resource when img-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_img-src_cross-origin_multi_blocked_int">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_img-src_cross-origin_multi_blocked_int</step_desc>
+              <expected>To pass, if no red square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_img-src_cross-origin_multi_blocked_int.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use the external image resource when img-src is 'none'." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_img-src_none_blocked_ext">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_img-src_none_blocked_ext</step_desc>
+              <expected>To pass, if no red square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_img-src_none_blocked_ext.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use the internal image resource when img-src is 'none'." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_img-src_none_blocked_int">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_img-src_none_blocked_int</step_desc>
+              <expected>To pass, if no red square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_img-src_none_blocked_int.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the internal image resource when img-src is 'self'." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_img-src_self_allowed">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_img-src_self_allowed</step_desc>
+              <expected>To pass, if a filled blue square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_img-src_self_allowed.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use the external image resource when img-src is 'self'." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_img-src_self_blocked">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_img-src_self_blocked</step_desc>
+              <expected>To pass, if no red square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_img-src_self_blocked.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the external image resource when img-src is 'self' in report-only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_ro_img-src_self_allowed_ext">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_ro_img-src_self_allowed_ext</step_desc>
+              <expected>To pass, if a filled green square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_img-src_self_allowed_ext.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the internal image resource when img-src is 'self' in report-only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_ro_img-src_self_allowed_int">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_ro_img-src_self_allowed_int</step_desc>
+              <expected>To pass, if a filled blue square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_img-src_self_allowed_int.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+    </set>
+    <set name="object-src_IOT" type="js">
+      <capabilities>
+        <capability name="http://tizen.org/feature/profile">
+          <value>COMMON</value>
+        </capability>
+      </capabilities>
+      <testcase purpose="Check if user agent is able to use external image resource when object-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_object-src_asterisk_allowed_ext">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_object-src_asterisk_allowed_ext</step_desc>
+              <expected>To pass, if a filled green square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_object-src_asterisk_allowed_ext.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="object-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#object-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use internal image resource when object-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_object-src_asterisk_allowed_int">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_object-src_asterisk_allowed_int</step_desc>
+              <expected>To pass, if a filled blue square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_object-src_asterisk_allowed_int.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="object-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#object-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use external image resource when object-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_object-src_cross-origin_allowed">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_object-src_cross-origin_allowed</step_desc>
+              <expected>To pass, if a filled green square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_object-src_cross-origin_allowed.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="object-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#object-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the first allowed external image resource when object-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_object-src_cross-origin_multi_allowed_one">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_object-src_cross-origin_multi_allowed_one</step_desc>
+              <expected>To pass, if a filled green square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_object-src_cross-origin_multi_allowed_one.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="object-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#object-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the second allowed external image resource when object-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_object-src_cross-two">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_object-src_cross-origin_multi_allowed_two</step_desc>
+              <expected>To pass, if a filled green square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_object-src_cross-origin_multi_allowed_two.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="object-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#object-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the internal image resource when object-src is 'self'." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_object-src_self_allowed">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_object-src_self_allowed</step_desc>
+              <expected>To pass, if a filled blue square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_object-src_self_allowed.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="object-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#object-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the external image resource when object-src is 'self' in report-only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_ro_object-src_self_allowed_ext">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_ro_object-src_self_allowed_ext</step_desc>
+              <expected>To pass, if a filled green square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_object-src_self_allowed_ext.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="object-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#object-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the internal image resource when object-src is 'self' in report-only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_ro_object-src_self_allowed_int">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual case: csp_ro_object-src_self_allowed_int</step_desc>
+              <expected>To pass, if a filled blue square is displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_object-src_self_allowed_int.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="object-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#object-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+    </set>
+    <set name="media-src_IOT" type="js">
+      <capabilities>
+        <capability name="http://tizen.org/feature/profile">
+          <value>COMMON</value>
+        </capability>
+      </capabilities>
+      <testcase purpose="Check if video current src is null by default when media-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_self_video_default">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_self_video.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check that video current src is empty if the source is cross origin when media-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_self_video_external">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_self_video.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check that video current src is not empty if the source is origin when media-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_self_video_internal">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_self_video.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=3</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if audio current src is null by default when media-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_self_audio_default">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_self_audio.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check that audio current src is empty if the source is cross origin when media-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_self_audio_external">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_self_audio.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check that audio current src is not empty if the source is origin when media-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_self_audio_internal">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_self_audio.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=3</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the external audio resource when media-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_asterisk_audio_allowed_ext">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_asterisk_audio_allowed_ext.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the internal audio resource when media-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_asterisk_audio_allowed_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_asterisk_audio_allowed_int.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the external video resource when media-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_asterisk_video_allowed_ext">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_asterisk_video_allowed_ext.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the internal video resource when media-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_asterisk_video_allowed_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_asterisk_video_allowed_int.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the external audio resource when media-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_corss-origin_audio_allowed_ext">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_corss-origin_audio_allowed_ext.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use the not allowed external audio resource when media-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_corss-origin_audio_blocked_ext">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_corss-origin_audio_blocked_ext.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use the internal audio resource when media-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_corss-origin_audio_blocked_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_corss-origin_audio_blocked_int.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the external video resource when media-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_corss-origin_video_allowed_ext">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_corss-origin_video_allowed_ext.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use the not allowed external video resource when media-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_corss-origin_video_blocked_ext">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_corss-origin_video_blocked_ext.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use the internal video resource when media-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_corss-origin_video_blocked_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_corss-origin_video_blocked_int.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use the external audio resource when media-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_none_audio_blocked_ext">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_none_audio_blocked_ext.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use the internal audio resource when media-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_none_audio_blocked_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_none_audio_blocked_int.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use the external video resource when media-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_none_video_blocked_ext">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_none_video_blocked_ext.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use the internal video resource when media-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_none_video_blocked_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_none_video_blocked_int.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the not allowed external audio resource when media-src is cross-origin in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_media-src_corss-origin_audio_blocked_ext">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_media-src_corss-origin_audio_blocked_ext.php</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the internal audio resource when media-src is cross-origin in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_media-src_corss-origin_audio_blocked_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_media-src_corss-origin_audio_blocked_int.php</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the not allowed external video resource when media-src is cross-origin in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_media-src_corss-origin_video_blocked_ext">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_media-src_corss-origin_video_blocked_ext.php</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the internal video resource when media-src is cross-origin in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_media-src_corss-origin_video_blocked_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_media-src_corss-origin_video_blocked_int.php</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the external audio resource when media-src is none in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_media-src_none_audio_blocked_ext">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_media-src_none_audio_blocked_ext.php</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the internal audio resource when media-src is none in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_media-src_none_audio_blocked_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_media-src_none_audio_blocked_int.php</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the external video resource when media-src is none in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_media-src_none_video_blocked_ext">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_media-src_none_video_blocked_ext.php</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the internal video resource when media-src is none in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_media-src_none_video_blocked_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_media-src_none_video_blocked_int.php</test_script_entry>
+        </description>
+      </testcase>
+    </set>
+    <set name="style-src_IOT" type="js">
+      <capabilities>
+        <capability name="http://tizen.org/feature/profile">
+          <value>COMMON</value>
+        </capability>
+      </capabilities>
+      <testcase purpose="Check if user agent is able to use external style resource when style-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_asterisk_allowed_ext">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_asterisk.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use internal style resource when style-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_asterisk_allowed_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_asterisk.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use inline style resource when style-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_asterisk_blocked_inline">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_asterisk.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=3</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use external style resource when style-src is cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_cross-origin_allowed">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_cross-origin.php?total_num=4&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use not allowed external style resource when style-src is cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_cross-origin_blocked">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_cross-origin.php?total_num=4&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use internal style resource when style-src is cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_cross-origin_blocked_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_cross-origin.php?total_num=4&amp;amp;locator_key=id&amp;amp;value=3</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use inline style resource when style-src is cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_cross-origin_blocked_inline">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_cross-origin.php?total_num=4&amp;amp;locator_key=id&amp;amp;value=4</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the first allowed external style resource when style-src is multi cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_cross-origin_multi_allowed_one">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_cross-origin_multi.php?total_num=5&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the second allowed external style resource when style-src is multi cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_cross-origin_multi_allowed_two">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_cross-origin_multi.php?total_num=5&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use not allowed external style resource when style-src is multi cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_cross-origin_multi_blocked">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_cross-origin_multi.php?total_num=5&amp;amp;locator_key=id&amp;amp;value=3</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use internal style resource when style-src is multi cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_cross-origin_multi_blocked_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_cross-origin_multi.php?total_num=5&amp;amp;locator_key=id&amp;amp;value=4</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use inline style resource when style-src is multi cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_cross-origin_multi_blocked_inline">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_cross-origin_multi.php?total_num=5&amp;amp;locator_key=id&amp;amp;value=5</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use external style resource when style-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_none_blocked_ext">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_none.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use internal style resource when style-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_none_blocked_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_none.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use inline style resource when style-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_none_blocked_inline">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_none.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=3</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use external style resource when style-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P1" id="csp_style-src_self_blocked">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_self.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use internal style resource when style-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P1" id="csp_style-src_self_allowed">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_self.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use inline style resource when style-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P1" id="csp_style-src_self_blocked_inline">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_self.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=3</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use external style resource when style-src is unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_unsafe-inline_blocked_ext">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_unsafe-inline.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use internal style resource when style-src is unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_unsafe-inline_blocked_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_unsafe-inline.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use inline style resource when style-src is unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_unsafe-inline_allowed">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_unsafe-inline.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=3</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use inline style resource when style-src is * in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_asterisk_blocked_inline">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_asterisk.php</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use not allowed external style resource when style-src is cross origin in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_cross-origin_blocked">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_cross-origin.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use internal style resource when style-src is cross origin in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_cross-origin_blocked_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_cross-origin.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use inline style resource when style-src is cross origin in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_cross-origin_blocked_inline">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_cross-origin.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=3</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use not allowed external style resource when style-src is multi cross origin in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_cross-origin_multi_blocked">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_cross-origin_multi.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use internal style resource when style-src is multi cross origin in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_cross-origin_multi_blocked_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_cross-origin_multi.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use inline style resource when style-src is multi cross origin in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_cross-origin_multi_blocked_inline">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_cross-origin_multi.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=3</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use external style resource when style-src is none in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_none_blocked_ext">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_none.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use internal style resource when style-src is none in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_none_blocked_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_none.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use inline style resource when style-src is none in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_none_blocked_inline">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_none.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=3</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use external style resource when style-src is self in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_self_blocked">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_self.php?total_num=2&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use inline style resource when style-src is self in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_self_blocked_inline">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_self.php?total_num=2&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use external style resource when style-src is unsafe-inline in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_unsafe-inline_blocked_ext">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_unsafe-inline.php?total_num=2&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use internal style resource when style-src is unsafe-inline in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_unsafe-inline_blocked_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_unsafe-inline.php?total_num=2&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+      </testcase>
+    </set>
+    <set name="script-src_IOT" type="js">
+      <capabilities>
+        <capability name="http://tizen.org/feature/profile">
+          <value>COMMON</value>
+        </capability>
+      </capabilities>
+      <testcase purpose="Check if internal script works well when script-src is self, unsafe-inline in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_script-src_self_unsafe-inline">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_script-src_self_unsafe-inline.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if inline script works well when script-src is self, unsafe-inline in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_script-src_self_unsafe-inline_internal">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_script-src_self_unsafe-inline.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if cross origin script is unable to work when script-src is self, unsafe-inline in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_script-src_self_unsafe-inline_external">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_script-src_self_unsafe-inline.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=3</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if inline function eval works well when script-src is self, unsafe-inline, unsafe-eval in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_script-src_self_unsafe-inline_unsafe-eval">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_script-src_self_unsafe-inline_unsafe-eval.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if internal script works well when script-src is self, unsafe-inline, unsafe-eval in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_script-src_self_unsafe-inline_unsafe-eval_internal">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_script-src_self_unsafe-inline_unsafe-eval.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if cross origin eval function is unable to work when script-src is self, unsafe-inline, unsafe-eval in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_script-src_self_unsafe-inline_unsafe-eval_external">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_script-src_self_unsafe-inline_unsafe-eval.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=3</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if internal script works well when script-src is self, unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_self_unsafe-inline">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_self_unsafe-inline.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if inline script works well when script-src is self, unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_self_unsafe-inline_internal">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_self_unsafe-inline.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if cross origin script is unable to work when script-src is self, unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_self_unsafe-inline_external">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_self_unsafe-inline.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=3</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if inline function eval works well when script-src is self, unsafe-inline, unsafe-eval." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_self_unsafe-inline_unsafe-eval">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_self_unsafe-inline_unsafe-eval.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if internal script works well when script-src is self, unsafe-inline, unsafe-eval." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_self_unsafe-inline_unsafe-eval_internal">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_self_unsafe-inline_unsafe-eval.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if cross origin eval function is unable to work when script-src is self, unsafe-inline, unsafe-eval." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_self_unsafe-inline_unsafe-eval_external">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_self_unsafe-inline_unsafe-eval.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=3</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the internal script resource when script-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_asterisk_allowed_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_asterisk.php?total_num=2&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the external script resource when script-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_asterisk_allowed_ext">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_asterisk.php?total_num=2&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use the internal script resource when script-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_cross-origin_multi_blocked">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_cross-origin_multi.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the first external script resource when script-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_cross-origin_multi_allowed_one">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_cross-origin_multi.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the second external script resource when script-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_cross-origin_multi_allowed_two">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_cross-origin_multi.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=3</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use the internal script resource when script-src is cross-origin unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_cross-origin_unsafe-inline_blocked">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_cross-origin_unsafe-inline.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the external script resource when script-src is cross-origin unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_cross-origin_unsafe-inline_allowed">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_cross-origin_unsafe-inline.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use the not allowed external script resource when script-src is cross-origin unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_cross-origin_unsafe-inline_blocked_ext">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_cross-origin_unsafe-inline.php?total_num=3&amp;amp;locator_key=id&amp;amp;value=3</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the allowed external script resource when default-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_self_unsafe-line_allowed">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_self_unsafe-line.php?total_num=2&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use the internal script resource when script-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_self_unsafe-line_blocked">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_self_unsafe-line.php?total_num=2&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the eval script resource when default-src is unsafe-eval." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_unsafe-inline_unsafe-eval_allowed_int">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_unsafe-inline_unsafe-eval.php?total_num=2&amp;amp;locator_key=id&amp;amp;value=1</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the inline script resource when script-src is unsafe-eval." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_unsafe-inline_unsafe-eval_allowed_inline">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_unsafe-inline_unsafe-eval.php?total_num=2&amp;amp;locator_key=id&amp;amp;value=2</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use script resource when script-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_script-src_none">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual testcase: csp_script-src_none</step_desc>
+              <expected>To pass, if text 'PASS' appears below.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_none.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use the inline script resource when script-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_script-src_cross-origin">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual testcase: csp_script-src_cross-origin.</step_desc>
+              <expected>To pass, if text 'PASS' appears below.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_cross-origin.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the inline script resource when script-src is only unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_script-src_unsafe-inline_allowed">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual testcase: csp_script-src_unsafe-inline_allowed.</step_desc>
+              <expected>To pass, if text 'PASS' appears below.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_unsafe-inline_allowed.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use the inline script resource when there is no 'unsafe-inline' in script-src." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_script-src_cross-origin_block_inline">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual testcase: csp_script-src_cross-origin_block_inline.</step_desc>
+              <expected>To pass, if text 'PASS' appears below.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_cross-origin_block_inline.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the inline script called by event resource when script-src is only unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_script-src_unsafe-inline_allowed_event">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual testcase: csp_script-src_unsafe-inline_allowed_event.</step_desc>
+              <expected>To pass, if text 'PASS' appears below.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_unsafe-inline_allowed_event.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is able to use the inline script in iframe resource when script-src is only unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_script-src_unsafe-inline_allowed_iframe">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual testcase: csp_script-src_unsafe-inline_allowed_iframe.</step_desc>
+              <expected>To pass, if text 'PASS' appears below.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_unsafe-inline_allowed_iframe.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use the external script resource when script-src is only unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_script-src_unsafe-inline_blocked_ext">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual testcase: csp_script-src_unsafe-inline_blocked_ext.</step_desc>
+              <expected>To pass, if text 'PASS' appears below.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_unsafe-inline_blocked_ext.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if user agent is unable to use the internal script resource when script-src is only unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_script-src_unsafe-inline_blocked_int">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual testcase: csp_script-src_unsafe-inline_blocked_int.</step_desc>
+              <expected>To pass, if text 'PASS' appears below.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_unsafe-inline_blocked_int.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+    </set>
+    <set name="frame-ancestors_IOT" type="js">
+      <capabilities>
+        <capability name="http://tizen.org/feature/profile">
+          <value>COMMON</value>
+        </capability>
+      </capabilities>
+      <testcase purpose="Check user agent is able to use the sources that can embed the current page with embed tag" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-ancestors_embed_allowed">
+        <description>
+          <pre_condition>Connect to internet</pre_condition>
+          <steps>
+            <step order="1">
+              <step_desc>Click Run button, wait a few minutes</step_desc>
+              <expected>Test passes if there is a video can be displayed.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-ancestors_embed_allowed.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="frame-ancestors" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#directive-frame-ancestors</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check user agent is not able to use the sources that can embed the current page with embed tag" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="auto" priority="P2" id="csp_frame-ancestors_embed_blocked">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-ancestors_embed_blocked.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="frame-ancestors" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#directive-frame-ancestors</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check user agent is not able to use the sources that can embed the current page with applet tag" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="auto" priority="P2" id="csp_frame-ancestors_applet_blocked">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-ancestors_applet_blocked.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="frame-ancestors" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#directive-frame-ancestors</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check user agent is able to use the sources that can embed the current page with applet tag" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="auto" priority="P2" id="csp_frame-ancestors_applet_allowed">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-ancestors_applet_allowed.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="frame-ancestors" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#directive-frame-ancestors</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check user agent is able to use the sources that can embed the current page with frame tag." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-ancestors_frame_allowed">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual testcase: csp_frame-ancestors_frame_allowed.</step_desc>
+              <expected>Test passes if there is a filled green square.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-ancestors_frame_allowed.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="frame-ancestors" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#directive-frame-ancestors</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check user agent is not able to use the sources that can embed the current page with frame tag." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-ancestors_frame_blocked">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual testcase: csp_frame-ancestors_frame_blocked.</step_desc>
+              <expected>Test passes if there is no red.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-ancestors_frame_blocked.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="frame-ancestors" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#directive-frame-ancestors</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check user agent is able to use the sources that can embed the current page with iframe tag." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-ancestors_iframe_allowed">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual testcase: csp_frame-ancestors_iframe_allowed.</step_desc>
+              <expected>Test passes if there is a filled green square.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-ancestors_iframe_allowed.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="frame-ancestors" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#directive-frame-ancestors</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check user agent is not able to use the sources that can embed the current page with iframe tag." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-ancestors_iframe_blocked">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Click Run button</step_desc>
+              <expected>Nothing should happen, since iframe is blocked</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-ancestors_iframe_blocked.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="frame-ancestors" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#directive-frame-ancestors</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+    </set>
+    <set name="base-uri_IOT" type="js">
+      <capabilities>
+        <capability name="http://tizen.org/feature/profile">
+          <value>COMMON</value>
+        </capability>
+      </capabilities>
+      <testcase purpose="Check user agent is able to use the URLs that can appear in a page's base element." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="manual" priority="P2" id="csp_base-uri_allowed">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual testcase: csp_base-uri_allowed.</step_desc>
+              <expected>Test passes if there is a filled blue square.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_base-uri_allowed.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="base-uri" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#directive-base-uri</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check user agent is not able to use the URLs that can appear in a page's base element." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="manual" priority="P2" id="csp_base-uri_blocked">
+        <description>
+          <pre_condition>Connect to PHP server</pre_condition>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Run the manual testcase: csp_base-uri_blocked.</step_desc>
+              <expected>Test passes if there is no red.</expected>
+            </step>
+          </steps>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_base-uri_blocked.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="base-uri" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#directive-base-uri</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+    </set>
+    <set name="form-action_IOT" type="js">
+      <capabilities>
+        <capability name="http://tizen.org/feature/profile">
+          <value>COMMON</value>
+        </capability>
+      </capabilities>
+      <testcase purpose="Check user agent is not able to submit from form tags" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="auto" priority="P2" id="csp_form-action_blocked">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_form-action_blocked.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="form-action" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#directive-form-action</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check user agent is able to submit from form tags" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="auto" priority="P2" id="csp_form-action_allowed">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_form-action_allowed.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="form-action" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#directive-form-action</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+    </set>
+    <set name="child-src_IOT" type="js">
+      <capabilities>
+        <capability name="http://tizen.org/feature/profile">
+          <value>COMMON</value>
+        </capability>
+      </capabilities>
+      <testcase purpose="Check user agent is not able to enable embedding source" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="auto" priority="P2" id="csp_child-src_blocked">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_child-src_blocked.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="child-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#child_src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check user agent is able to enable embedding source" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="auto" priority="P2" id="csp_child-src_allowed">
+        <description>
+          <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_child-src_allowed.php</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="child-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#child_src</spec_url>
+          </spec>
+        </specs>
+      </testcase>
+    </set>
   </suite>
-</test_definition>
+</test_definition>
\ No newline at end of file
index fa24578eb17da4aa9f1cbc1f1c02d088492f0eaf..47a625b597e405f5d69d084b2ea11e394c67f400 100755 (executable)
     </set>
     <set name="FileTransfer_wearable" type="js">
       <capabilities>
-        <capability name="http://tizen.org/feature/profile"><value>WEARABLE</value></capability>
+        <capability name="http://tizen.org/feature/profile">
+          <value>WEARABLE</value>
+        </capability>
+      </capabilities>
+      <testcase purpose="Check if FileUploadResult onchanged is called and if its arguments have proper type" type="compliance" status="approved" component="TizenAPI/Cordova/Filetransfer" execution_type="auto" priority="P1" id="cordova_FileUploadResult_onprogress">
+        <description>
+          <test_script_entry>/opt/tct-file-transfer-cordova-tests/file-transfer/cordova_FileUploadResult_onprogress.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+    </set>
+    <set name="FileTransfer_IOT" type="js">
+      <capabilities>
+        <capability name="http://tizen.org/feature/profile">
+          <value>COMMON</value>
+        </capability>
       </capabilities>
       <testcase purpose="Check if FileUploadResult onchanged is called and if its arguments have proper type" type="compliance" status="approved" component="TizenAPI/Cordova/Filetransfer" execution_type="auto" priority="P1" id="cordova_FileUploadResult_onprogress">
         <description>
index e8e6c36810699475db314047e044698a2b15f450..411fa9d668a4254eded64bc07f56756c3bca7887 100755 (executable)
       </description>
       <specs>
       </specs>
-    </testcase></set>
+      </testcase>
+    </set>
+    <set name="MSE_IOT" type="js">
+      <capabilities>
+        <capability name="http://tizen.org/feature/profile">
+          <value>COMMON</value>
+        </capability>
+      </capabilities>
+      <testcase purpose="Check API::HTMLVideoElement::getVideoPlaybackQuality method exist." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P0" id="HTMLVideoElement_getVideoPlaybackQuality_exist">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/HTMLVideoElement_getVideoPlaybackQuality_exist.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check API::HTMLVideoElement::getVideoPlaybackQuality method." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="HTMLVideoElement_getVideoPlaybackQuality_type">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/HTMLVideoElement_getVideoPlaybackQuality_type.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:MediaSource:activeSourceBuffers exist." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P0" id="MediaSource_activeSourceBuffers_exist">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_activeSourceBuffers_exist.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:MediaSource:activeSourceBuffers readonly." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource_activeSourceBuffers_readonly">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_activeSourceBuffers_readonly.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check API:MediaSource:activeSourceBuffers type." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource_activeSourceBuffers_type">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_activeSourceBuffers_type.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:MediaSource:addSourceBuffer exist." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P0" id="MediaSource_addSourceBuffer_exist">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_addSourceBuffer_exist.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check API:MediaSource:addSourceBuffer type." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource_addSourceBuffer_type">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_addSourceBuffer_type.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:MediaSource:duration exist." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P0" id="MediaSource_duration_exist">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_duration_exist.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check API:MediaSource:duration type." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource_duration_type">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_duration_type.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:MediaSource:endOfStream exist." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P0" id="MediaSource_endOfStream_exist">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_endOfStream_exist.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check API:MediaSource:endOfStream type." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource_endOfStream_type">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_endOfStream_type.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:MediaSource:isTypeSupported exist." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P0" id="MediaSource_isTypeSupported_exist">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_isTypeSupported_exist.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check API:MediaSource:isTypeSupported type." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource_isTypeSupported_type">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_isTypeSupported_type.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:MediaSource:readyState exist." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P0" id="MediaSource_readyState_exist">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_readyState_exist.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:MediaSource:readyState readonly." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource_readyState_readonly">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_readyState_readonly.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check API:MediaSource:readyState type." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource_readyState_type">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_readyState_type.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:MediaSource:removeSourceBuffer exist." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P0" id="MediaSource_removeSourceBuffer_exist">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_removeSourceBuffer_exist.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check API:MediaSource:removeSourceBuffer type." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource_removeSourceBuffer_type">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_removeSourceBuffer_type.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:MediaSource: sourceBuffers exist." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource_sourceBuffers_exist">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_sourceBuffers_exist.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:MediaSource:sourceBuffers readonly." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource_sourceBuffers_readonly">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_sourceBuffers_readonly.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check API:MediaSource:sourceBuffers type." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource_sourceBuffers_type">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_sourceBuffers_type.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:MediaSource: sourceBuffers exist." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P0" id="MediaSource_sourceBuffers_exist">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_sourceBuffers_exist.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API::SourceBufferList::SourceBuffer type." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs//SourceBufferList" execution_type="auto" priority="P1" id="SourceBufferList_SourceBuffer_type">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/SourceBufferList_SourceBuffer_type.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="" element_type="method" element_name="SourceBuffer" specification="SourceBufferList" section="" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2013/WD-media-source-20130905/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if API::SourceBufferList::length exist." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs//SourceBufferList" execution_type="auto" priority="P0" id="SourceBufferList_length_exist">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/SourceBufferList_length_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="" element_type="attribute" element_name="length" specification="SourceBufferList" section="" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2013/WD-media-source-20130905/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if API:SourceBufferList:length readonly." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs//SourceBufferList" execution_type="auto" priority="P1" id="SourceBufferList_length_readonly">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/SourceBufferList_length_readonly.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="" element_type="attribute" element_name="length" specification="SourceBufferList" section="" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2013/WD-media-source-20130905/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if API::SourceBufferList::length type." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs//SourceBufferList" execution_type="auto" priority="P1" id="SourceBufferList_length_type">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/SourceBufferList_length_type.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="" element_type="attribute" element_name="length" specification="SourceBufferList" section="" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2013/WD-media-source-20130905/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if API:SourceBuffer:abort exist." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P0" id="SourceBuffer_abort_exist">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/SourceBuffer_abort_exist.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check API:SourceBuffer:abort type." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="SourceBuffer_abort_type">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/SourceBuffer_abort_type.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:SourceBuffer:appendBuffer exist." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P0" id="SourceBuffer_appendBuffer_exist">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/SourceBuffer_appendBuffer_exist.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check API:SourceBuffer:appendBuffer type." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="SourceBuffer_appendBuffer_type">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/SourceBuffer_appendBuffer_type.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:SourceBuffer:appendWindowEnd exist." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P0" id="SourceBuffer_appendWindowEnd_exist">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/SourceBuffer_appendWindowEnd_exist.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check API:SourceBuffer:appendWindowEnd type." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="SourceBuffer_appendWindowEnd_type">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/SourceBuffer_appendWindowEnd_type.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:SourceBuffer:appendWindowStart exist." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P0" id="SourceBuffer_appendWindowStart_exist">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/SourceBuffer_appendWindowStart_exist.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check API:SourceBuffer:appendWindowStart type." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="SourceBuffer_appendWindowStart_type">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/SourceBuffer_appendWindowStart_type.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:SourceBuffer:buffered exist." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P0" id="SourceBuffer_buffered_exist">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/SourceBuffer_buffered_exist.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:SourceBuffer:buffered readonly." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="SourceBuffer_buffered_readonly">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/SourceBuffer_buffered_readonly.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check API:SourceBuffer:buffered type." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="SourceBuffer_buffered_type">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/SourceBuffer_buffered_type.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:SourceBuffer:remove exist." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P0" id="SourceBuffer_remove_exist">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/SourceBuffer_remove_exist.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check API:SourceBuffer:remove type." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="SourceBuffer_remove_type">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/SourceBuffer_remove_type.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:SourceBuffer:timestampOffset exist." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P0" id="SourceBuffer_timestampOffset_exist">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/SourceBuffer_timestampOffset_exist.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check API:SourceBuffer:timestampOffset type." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="SourceBuffer_timestampOffset_type">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/SourceBuffer_timestampOffset_type.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:SourceBuffer:updating exist." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P0" id="SourceBuffer_updating_exist">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/SourceBuffer_updating_exist.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:SourceBuffer:updating readonly." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="SourceBuffer_updating_readonly">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/SourceBuffer_updating_readonly.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check API:SourceBuffer:updating type." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="SourceBuffer_updating_type">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/SourceBuffer_updating_type.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if URL::createObjectURL() method exists" type="compliance" status="approved" component="W3C_HTML5 APIs//W3C" execution_type="auto" priority="P0" id="URL_createObjectURL_exist">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/URL_createObjectURL_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="" element_type="method" element_name="createObjectURL" specification="W3C" section="" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2013/WD-media-source-20130905/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check API::URL::createObjectURL type." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs//W3C" execution_type="auto" priority="P1" id="URL_createObjectURL_type">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/URL_createObjectURL_type.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="" element_type="method" element_name="createObjectURL" specification="W3C" section="" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2013/WD-media-source-20130905/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if API:VideoPlaybackQuality:creationTime exist." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P0" id="VideoPlaybackQuality_creationTime_exist">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/VideoPlaybackQuality_creationTime_exist.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:VideoPlaybackQuality:creationTime readonly." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="VideoPlaybackQuality_creationTime_readonly">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/VideoPlaybackQuality_creationTime_readonly.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check API:VideoPlaybackQuality:creationTime type." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="VideoPlaybackQuality_creationTime_type">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/VideoPlaybackQuality_creationTime_type.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:VideoPlaybackQuality:totalVideoFrames exist." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P0" id="VideoPlaybackQuality_totalVideoFrames_exist">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/VideoPlaybackQuality_totalVideoFrames_exist.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:VideoPlaybackQuality:totalVideoFrames readonly." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="VideoPlaybackQuality_totalVideoFrames_readonly">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/VideoPlaybackQuality_totalVideoFrames_readonly.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check API:VideoPlaybackQuality:totalVideoFrames type." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="VideoPlaybackQuality_totalVideoFrames_type">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/VideoPlaybackQuality_totalVideoFrames_type.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:VideoPlaybackQuality:corruptedVideoFrames exist." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P0" id="VideoPlaybackQuality_corruptedVideoFrames_exist">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/VideoPlaybackQuality_corruptedVideoFrames_exist.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:VideoPlaybackQuality:corruptedVideoFrames readonly." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="VideoPlaybackQuality_corruptedVideoFrames_readonly">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/VideoPlaybackQuality_corruptedVideoFrames_readonly.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check API:VideoPlaybackQuality:corruptedVideoFrames type." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="VideoPlaybackQuality_corruptedVideoFrames_type">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/VideoPlaybackQuality_corruptedVideoFrames_type.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:VideoPlaybackQuality:droppedVideoFrames exist." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P0" id="VideoPlaybackQuality_droppedVideoFrames_exist">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/VideoPlaybackQuality_droppedVideoFrames_exist.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check if API:VideoPlaybackQuality:droppedVideoFrames readonly." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="VideoPlaybackQuality_droppedVideoFrames_readonly">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/VideoPlaybackQuality_droppedVideoFrames_readonly.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check API:VideoPlaybackQuality:droppedVideoFrames type." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="VideoPlaybackQuality_droppedVideoFrames_type">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/VideoPlaybackQuality_droppedVideoFrames_type.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check the API:MediaSource." type="compliance" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check the API MediaSource AppendAudioOffset:Test if we can append audio data with an explicit offset." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource_AppendAudioOffset">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_AppendAudioOffset.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check the API MediaSource ElementEvents:Test if the events on MediaSource are correct." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource_ElementEvents">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_ElementEvents.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check the API MediaSource Events:Test if the events on MediaSource are correct." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource_Events">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_Events.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check the API MediaSource IncrementalAudio:Test if we can append audio not in the unit of segment." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource_IncrementalAudio">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_IncrementalAudio.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check the API MediaSource PlayPartialSegment:Test if we can play a partially appended video segment." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource_PlayPartialSegment">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_PlayPartialSegment.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check the API::MediaSource::addEventListener success callback." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource_addEventListener_succCallback">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_addEventListener_succCallback.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check the API::MediaSource::addSourceBuffer success." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource_addSourceBuffer">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_addSourceBuffer.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check the API::MediaSource::addSourceBuffer with missmatch parameter." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource_addSourceBuffer_paramMismatch">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_addSourceBuffer_paramMismatch.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check the API:MediaSource:duration." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource_duration">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_duration.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check the API::MediaSource::duration writeable and readable with audio buffer." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource_duration_audioBuffer">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_duration_audioBuffer.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check the API::MediaSource::duration writeable and readable with video buffer." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource_duration_videoBuffer">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_duration_videoBuffer.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check the API:MediaSource:readyState." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource_readyState">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_readyState.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check the API::MediaSource::removeSourceBuffer." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource_removeSourceBuffer">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_removeSourceBuffer.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check the API MediaSource video ChangeRate:Test if we can change the format of video on the fly." type="compliance" onload_delay="30" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource_video_ChangeRate">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_video_ChangeRate.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Compare the API:MediaSource:duration with video duration." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="MediaSource_video_duration">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/MediaSource_video_duration.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check the API::SourceBuffer::abort audio sourceBuffer." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="SourceBuffer_abort_audioBuffer">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/SourceBuffer_abort_audioBuffer.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check the API::SourceBuffer::abort with video sourceBuffer." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="SourceBuffer_abort_videoBuffer">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/SourceBuffer_abort_videoBuffer.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check the API::SourceBuffer::append with audio buffer." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="SourceBuffer_append_audioBuffer">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/SourceBuffer_append_audioBuffer.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check the API::SourceBuffer::append with video buffer." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="SourceBuffer_append_videoBuffer">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/SourceBuffer_append_videoBuffer.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check the API:video:currentSrc." type="compliance" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="video_currentSrc">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/video_currentSrc.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check the API:video:duration." type="compliance" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="video_duration">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/video_duration.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check the API:video:paused status when appendBuffer is called." type="compliance" onload_delay="180" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="video_paused_audioBuffer">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/video_paused_audioBuffer.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check the API:video:readyState." type="compliance" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="video_readyState">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/video_readyState.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check the API:video:src." type="compliance" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="video_src">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/video_src.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check the API:video:videoHeight." type="compliance" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="video_videoHeight">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/video_videoHeight.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+      <testcase purpose="Check the API:video:videoWidth." type="compliance" status="approved" component="W3C_HTML5 APIs/W3C/MSE" execution_type="auto" priority="P1" id="video_videoWidth">
+        <description>
+          <test_script_entry>/opt/tct-mse-w3c-tests/mse/video_videoWidth.html</test_script_entry>
+        </description>
+        <specs>
+      </specs>
+      </testcase>
+    </set>
   </suite>
 </test_definition>
index e284403924e095fd4458050c9c390b18c4daf56d..a84998da08362c6c8ef8aff4124024ff8e13ad2e 100755 (executable)
         </specs>
       </testcase>
     </set>
+    <set name="IframeSandbox_IOT" type="js">
+      <capabilities>
+        <capability name="http://tizen.org/feature/profile">
+          <value>COMMON</value>
+        </capability>
+      </capabilities>
+      <testcase purpose="Check that block the parent content to access the child iframe content of sandbox if sandbox attribute exists" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P0" id="attri_default_block_child_contents">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/w3c/sandbox_030.htm</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="sandbox" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check that allow script to exec inside iframe with sandbox attribute if sandbox='allow-scripts'" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P0" id="attri_allow-script_script_exec">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/w3c/sandbox_001.htm</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="sandbox" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check that allow to auto play HTML5 Video inside iframe with sandbox attribute if sandbox='allow-scripts'" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P1" id="attri_allow-script_video_play" onload_delay="15">
+        <description>
+          <test_script_entry>http://127.0.0.1:8080/opt/tct-sandbox-html5-tests/sandbox/w3c/sandbox_002.htm</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="sandbox" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check that allow sandbox iframe to access other content from the same origin if sandbox='allow-same-origin'" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P0" id="attri_allow-same-origin_content">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/w3c/sandbox_023.htm</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="sandbox" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the value of sandbox attribute must be an unordered set of unique space-separated tokens" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P0" id="attri_format_space_4tab">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/w3c/sandbox_012.htm</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="sandbox" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.contentWindow attribute exists" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P1" id="iframe_contentWindow_attribute_exists">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_contentWindow_attribute_exists.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="contentWindow" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.height attribute exists" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P1" id="iframe_height_attribute_exists">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_height_attribute_exists.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="height" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.name attribute exists" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P1" id="iframe_name_attribute_exists">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_name_attribute_exists.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="name" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.sandbox attribute exists" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P1" id="iframe_sandbox_attribute_exists">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_sandbox_attribute_exists.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="sandbox" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.srcdoc attribute exists" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P1" id="iframe_srcdoc_attribute_exists">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_srcdoc_attribute_exists.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="srcdoc" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.src attribute exists" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P1" id="iframe_src_attribute_exists">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_src_attribute_exists.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="src" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.width attribute exists" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P1" id="iframe_width_attribute_exists">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_width_attribute_exists.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="width" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Block form submission inside iframe with sandbox attribute" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="manual" priority="P2" id="attri_default_block_submit">
+        <description>
+          <pre_condition/>
+          <post_condition/>
+          <steps>
+            <step order="1">
+              <step_desc>Steps:
+1. Click button "Submit Form".</step_desc>
+              <expected>Test passes if there is no red on the page and there is no navigation in the below iframe after following the above steps</expected>
+            </step>
+          </steps>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/w3c/sandbox_007.htm</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="sandbox" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.contentWindow attribute is of type object" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_contentWindow_attribute_type">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_contentWindow_attribute_type.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="contentWindow" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.contentWindow attribute must return the WindowProxy object of the object element's nested browsing context, if it has one" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_contentWindow_return_window">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_contentWindow_return_window.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="contentWindow" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.contentDocument attribute exists" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_contentDocument_attribute_exsits">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_contentDocument_attribute_exsits.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="contentDocument" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.contentDocument attribute is of type object" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_contentDocument_attribute_type">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_contentDocument_attribute_type.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="contentDocument" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.contentDocument attribute must return the Document object of the active document of the iframe element's nested browsing context" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_contentDocument_return_document">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_contentDocument_return_document.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="contentDocument" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.height attribute is not readonly" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_height_attribute_not_readonly">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_height_attribute_not_readonly.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="height" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.height attribute is of type DOMString" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_height_attribute_type">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_height_attribute_type.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="height" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.height attribute must reflect the respective content attributes of the same name" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_height_basic">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_height_basic.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="height" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.height attribute return empty string that it been set empty string" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_height_value_empty_string">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_height_value_empty_string.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="height" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.name attribute is not readonly" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_name_attribute_not_readonly">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_name_attribute_not_readonly.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="name" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.name attribute is of type DOMString" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_name_attribute_type">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_name_attribute_type.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="name" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.name attribute must reflect the respective content attributes of the same name,the value is empty string" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_name_value_empty_string">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_name_value_empty_string.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="name" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if iframe.name default value is empty string" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_name_default_value">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_name_default_value.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="name" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.name attribute must reflect the respective content attributes of the same name" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_name_value_string">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_name_value_string.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="name" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.src attribute is not readonly" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_src_attribute_not_readonly">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_src_attribute_not_readonly.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="src" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.src attribute must be a valid non-empty URL potentially surrounded by spaces if the attribute present" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_src_attribute_present">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_src_attribute_present.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="src" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.src attribute is of type DOMString" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_src_attribute_type">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_src_attribute_type.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="src" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.srcdoc attribute is not readonly" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_srcdoc_attribute_not_readonly">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_srcdoc_attribute_not_readonly.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="srcdoc" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.srcdoc attribute is of type DOMString" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_srcdoc_attribute_type">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_srcdoc_attribute_type.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="srcdoc" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the srcdoc attribute default value is empty string" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_srcdoc_default_value">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_srcdoc_default_value.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="srcdoc" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.srcdoc attribute return empty string if it been set empty string" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_srcdoc_value_empty_string">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_srcdoc_value_empty_string.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="srcdoc" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.srcdoc attribute must reflect the respective content attributes of the same name" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_srcdoc_value_string">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_srcdoc_value_string.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="srcdoc" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.width attribute is not readonly" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_width_attribute_not_readonly">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_width_attribute_not_readonly.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="width" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.width attribute is of type DOMString" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_width_attribute_type">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_width_attribute_type.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="width" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if iframe.width attribute set null,then compare iframe.width is empty string" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_width_null">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_width_null.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="width" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.width attribute return null if it been set empty string" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_width_value_empty_string">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_width_value_empty_string.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="width" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.width attribute must reflect the respective content attributes of the same name" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_width_value_string">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_width_value_string.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="width" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.sandbox attribute default value is empty string" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_sandbox_example_default_value">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_sandbox_example_default_value.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="sandbox" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.sandbox attribute value is type of string" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_sandbox_attribute_type">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_sandbox_attribute_type.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="sandbox" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.sandbox attribute value is readonly" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_sandbox_attribute_readonly">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_sandbox_attribute_readonly.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="sandbox" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.contentDocument attribute value is readonly" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_contentDocument_attribute_readonly">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_contentDocument_attribute_readonly.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="contentDocument" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if the iframe.contentWindow attribute value is readonly" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P2" id="iframe_contentWindow_attribute_readonly">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/iframe_contentWindow_attribute_readonly.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="contentWindow" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2012/WD-html5-20121025/the-iframe-element.html?path=5_2_8#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if attribute allowFullscreen of HTMLIFrameElement exists, has type boolean and is not nullable" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/HTML5 The iframe element" execution_type="auto" priority="P1" id="HTMLIFrameElement_allowFullscreen_attribute">
+        <description>
+          <test_script_entry>/opt/tct-sandbox-html5-tests/sandbox/HTMLIFrameElement_allowFullscreen_attribute.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion element_type="attribute" element_name="allowFullscreen" interface="HTMLIFrameElement" specification="HTML5 The iframe element" section="Security" category="Tizen W3C API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2014/REC-html5-20141028/embedded-content-0.html#the-iframe-element</spec_url>
+            <spec_statement/>
+          </spec>
+        </specs>
+      </testcase>
+    </set>
   </suite>
 </test_definition>
index f1e11f4feb83748fa4e2e67bc97eb2cf6167ef81..e6d49687aec8ff3ce1254aa1a9db219204e3bb12 100755 (executable)
           </spec>
         </specs>
       </testcase>
-      <!--<testcase purpose="Check if focus method of WindowClient exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="WindowClient_focus_exist">
+      <testcase purpose="check if caches attribute of Window exist ,has CacheStorage type and readonly." type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Window_caches_attribute">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Window_caches_attribute.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Window" element_type="attribute" element_name="caches" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if get method of Clients work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Clients_get">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Clients_get.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Clients" element_type="method" element_name="get" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if get method of Clients work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/" execution_type="auto" priority="P0" id="Clients_get_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Clients_get_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Clients" element_type="method" element_name="get" specification="" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+    </set>
+    <set name="ServiceWorkers_IOT" type="js">
+      <capabilities>
+        <capability name="http://tizen.org/feature/profile">
+          <value>COMMON</value>
+        </capability>
+      </capabilities>
+      <testcase purpose="check if delete method of CacheStorage work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="CacheStorage_delete">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_delete.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="CacheStorage" element_type="method" element_name="delete" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if delete method of CacheStorage exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="CacheStorage_delete_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_delete_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="CacheStorage" element_type="method" element_name="delete" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check delete mehtod should throw exception without mandatory argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P2" id="CacheStorage_delete_misarg">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_delete_misarg.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="CacheStorage" element_type="method" element_name="delete" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if CacheStorage exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="CacheStorage_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="CacheStorage" usage="true" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if has method of CacheStorage work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="CacheStorage_has">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_has.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="CacheStorage" element_type="method" element_name="has" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if has method of CacheStorage exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="CacheStorage_has_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_has_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="CacheStorage" element_type="method" element_name="has" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check has mehtod should throw exception without mandatory argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P2" id="CacheStorage_has_misarg">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_has_misarg.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="CacheStorage" element_type="method" element_name="has" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if keys method of CacheStorage work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/" execution_type="auto" priority="P1" id="CacheStorage_keys">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_keys.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="CacheStorage" element_type="method" element_name="keys" specification="" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if keys method of CacheStorage exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="CacheStorage_keys_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_keys_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="CacheStorage" element_type="method" element_name="keys" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if match method of CacheStorage work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="CacheStorage_match">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_match.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="CacheStorage" element_type="method" element_name="match" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if match method of CacheStorage exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="CacheStorage_match_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_match_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="CacheStorage" element_type="method" element_name="match" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check match mehtod should throw exception without mandatory argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P2" id="CacheStorage_match_misarg">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_match_misarg.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="CacheStorage" element_type="method" element_name="match" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if match method of CacheStorage work properly with optional argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="CacheStorage_match_with_options">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_match_with_options.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="CacheStorage" element_type="method" element_name="match" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if open method of CacheStorage work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="CacheStorage_open">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_open.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="CacheStorage" element_type="method" element_name="open" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if open method of CacheStorage exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="CacheStorage_open_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_open_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="CacheStorage" element_type="method" element_name="open" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check open mehtod should throw exception without mandatory argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P2" id="CacheStorage_open_misarg">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_open_misarg.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="CacheStorage" element_type="method" element_name="open" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if add method work propery" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Cache_add">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_add.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Cache" element_type="method" element_name="add" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if addAll method work propery" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Cache_addAll">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_addAll.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Cache" element_type="method" element_name="addAll" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if addAll method exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="Cache_addAll_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_addAll_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Cache" element_type="method" element_name="addAll" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check addAll method should throw exception without mandatory argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/" execution_type="auto" priority="P2" id="Cache_addAll_misarg">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_addAll_misarg.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Cache" element_type="method" element_name="addAll" specification="" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if add method of Cache exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="Cache_add_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_add_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Cache" element_type="method" element_name="add" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check add method should throw exception without mandatory argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P2" id="Cache_add_misarg">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_add_misarg.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Cache" element_type="method" element_name="add" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if delete method work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Cache_delete">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_delete.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Cache" element_type="method" element_name="delete" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if delete method exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="Cache_delete_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_delete_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Cache" element_type="method" element_name="delete" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if delete method work properly without mandtory argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Cache_delete_misarg">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_delete_misarg.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Cache" element_type="method" element_name="delete" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if delete method of Cache work properly with optional argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Cache_delete_with_options">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_delete_with_options.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Cache" element_type="method" element_name="delete" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if Cache exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Cache_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Cache" element_type="constructor" element_name="Cache" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if keys method of Cache work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Cache_keys">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_keys.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Cache" element_type="method" element_name="keys" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if keys method of Cache exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="Cache_keys_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_keys_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Cache" element_type="method" element_name="keys" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if keys method of Cache work properly with optional argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Cache_keys_with_options">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_keys_with_options.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Cache" element_type="method" element_name="keys" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if match work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Cache_match">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_match.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Cache" element_type="method" element_name="match" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if matchAll method work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Cache_matchAll">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_matchAll.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Cache" element_type="method" element_name="matchAll" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if matchAll exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="Cache_matchAll_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_matchAll_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Cache" element_type="method" element_name="matchAll" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if matchAll method work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Cache_matchAll_with_options">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_matchAll_with_options.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Cache" element_type="method" element_name="matchAll" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if match method of Cache exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="Cache_match_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_match_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Cache" element_type="method" element_name="match" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if match work properly with optional argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Cache_match_with_options">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_match_with_options.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Cache" element_type="method" element_name="match" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if put method work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Cache_put">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_put.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Cache" element_type="method" element_name="put" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if put method exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="Cache_put_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_put_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Cache" element_type="method" element_name="put" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if put method throw exception without mandatory argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P2" id="Cache_put_misarg">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_put_misarg.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Cache" element_type="method" element_name="put" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if put method throw exception with invalid request" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P2" id="Cache_put_request_invalid">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_put_request_invalid.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Cache" element_type="method" element_name="put" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if put method throw exception with invalid response" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P2" id="Cache_put_response_invalid">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_put_response_invalid.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Cache" element_type="method" element_name="put" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="checki if Client exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Client_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Client_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Client" usage="true" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check frameType attribute of Client" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Client_frameType_attribute">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Client_frameType_attribute.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Client" element_type="attribute" element_name="frameType" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check id attribute of Client" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Client_id_attribute">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Client_id_attribute.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Client" element_type="attribute" element_name="id" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if postMessage method of Client work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Client_postMessage">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Client_postMessage.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Client" element_type="method" element_name="postMessage" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if postMessage method of Client exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="Client_postMessage_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Client_postMessage_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Client" element_type="method" element_name="postMessage" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check Client attribute of Client" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Client_url_attribute">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Client_url_attribute.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Client" element_type="attribute" element_name="url" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if claim method of Clients work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Clients_claim">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Clients_claim.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Clients" element_type="method" element_name="claim" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if claim method of Clients exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="Clients_claim_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Clients_claim_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Clients" element_type="method" element_name="claim" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if matchAll method of Clients work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Clients_matchAll">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Clients_matchAll.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Clients" element_type="method" element_name="matchAll" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if matchAll method of Clients work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/" execution_type="auto" priority="P0" id="Clients_matchAll_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Clients_matchAll_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Clients" element_type="method" element_name="matchAll" specification="" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if openWindow method of Clients exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="Clients_openWindow_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Clients_openWindow_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Clients" element_type="method" element_name="openWindow" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if the constructor of ExtendableEvent work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ExtendableEvent_constructor">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ExtendableEvent_constructor.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ExtendableEvent" element_type="constructor" element_name="ExtendableEvent" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if waitUntil method of ExtendableEvent work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorker" execution_type="auto" priority="P1" id="ExtendableEvent_waitUntil">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ExtendableEvent_waitUntil.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ExtendableEvent" element_type="method" element_name="waitUntil" specification="ServiceWorker" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if waitUntil of ExtendableEvent throw exception" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorker" execution_type="auto" priority="P2" id="ExtendableEvent_waitUntil_InvalidStateError">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ExtendableEvent_waitUntil_InvalidStateError.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ExtendableEvent" element_type="method" element_name="waitUntil" specification="ServiceWorker" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if waitUntil method of ExtendableEvent exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="ExtendableEvent_waitUntil_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ExtendableEvent_waitUntil_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ExtendableEvent" element_type="method" element_name="waitUntil" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if the constructor of FetchEvent work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="FetchEvent_constructor">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/FetchEvent_constructor.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="FetchEvent" element_type="constructor" element_name="FetchEvent" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check isReload attribute of FetchEvent" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="FetchEvent_isReload_attribute">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/FetchEvent_isReload_attribute.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="FetchEvent" element_type="attribute" element_name="isReload" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check request attribute of FetchEvent" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="FetchEvent_request_attribute">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/FetchEvent_request_attribute.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="FetchEvent" element_type="attribute" element_name="request" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if respondWith of FetchEvent work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/" execution_type="auto" priority="P1" id="FetchEvent_respondWith">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/FetchEvent_respondWith.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="FetchEvent" element_type="method" element_name="respondWith" specification="" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if respondWith method FetchEvent exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="FetchEvent_respondWith_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/FetchEvent_respondWith_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="FetchEvent" element_type="method" element_name="respondWith" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if Navigator exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Navigator_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Navigator_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Navigator" usage="true" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if attribute serviceWorker of navigator exists, has type ServiceWorkerContainer and is readonly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Navigator_serviceWorker_attribute">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Navigator_serviceWorker_attribute.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="Navigator" element_type="attribute" element_name="serviceWorker" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if attribute controller of ServiceWorkerContainer exists, has type ServiceWorker and is readonly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerContainer_controller_attribute">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerContainer_controller_attribute.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerContainer" element_type="attribute" element_name="controller" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if ServiceWorkerContainer exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="ServiceWorkerContainer_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerContainer_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerContainer" usage="true" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if getRegistration method work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerContainer_getRegistration">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerContainer_getRegistration.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerContainer" element_type="method" element_name="getRegistration" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if getRegistration exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="ServiceWorkerContainer_getRegistration_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerContainer_getRegistration_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerContainer" element_type="method" element_name="getRegistration" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if getRegistration method work properly with optional argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerContainer_getRegistration_with_documentURL">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerContainer_getRegistration_with_documentURL.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerContainer" element_type="method" element_name="getRegistration" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if getRegistrations method work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerContainer_getRegistrations">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerContainer_getRegistrations.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerContainer" element_type="method" element_name="getRegistrations" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="checkn if getRegistrations exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="ServiceWorkerContainer_getRegistrations_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerContainer_getRegistrations_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerContainer" element_type="method" element_name="getRegistrations" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if attribute oncontrollerchange of ServiceWorkerContainer exists, has type function and is writeable" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerContainer_oncontrollerchange_attribute">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerContainer_oncontrollerchange_attribute.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerContainer" element_type="attribute" element_name="oncontrollerchange" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if attribute onmessage of ServiceWorkerContainer exists, has type function and is writeable" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerContainer_onmessage_attribute">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerContainer_onmessage_attribute.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerContainer" element_type="attribute" element_name="onmessage" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if attribute ready of ServiceWorkerContainer exists, has type object and is readonly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerContainer_ready_attribute">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerContainer_ready_attribute.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerContainer" element_type="attribute" element_name="ready" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if register method work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerContainer_register">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerContainer_register.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerContainer" element_type="method" element_name="register" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if register exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="ServiceWorkerContainer_register_exist">
         <description>
-          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/WindowClient_focus_exist.html</test_script_entry>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerContainer_register_exist.html</test_script_entry>
         </description>
         <specs>
           <spec>
-            <spec_assertion interface="WindowClient" element_type="method" element_name="focus" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_assertion interface="ServiceWorkerContainer" element_type="method" element_name="register" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
             <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
             <spec_statement>TBD</spec_statement>
           </spec>
         </specs>
       </testcase>
-      <testcase purpose="check if focused attribute of WindowClient exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="WindowClient_focused_attribute">
+      <testcase purpose="check if register method work properly with optional argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerContainer_register_with_options">
         <description>
-          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/WindowClient_focused_attribute.html</test_script_entry>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerContainer_register_with_options.html</test_script_entry>
         </description>
         <specs>
           <spec>
-            <spec_assertion interface="WindowClient" element_type="attribute" element_name="focused" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_assertion interface="ServiceWorkerContainer" element_type="method" element_name="register" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
             <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
             <spec_statement>TBD</spec_statement>
           </spec>
         </specs>
       </testcase>
-      <testcase purpose="check if navigate method of WindowClient exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/" execution_type="auto" priority="P0" id="WindowClient_navigate_exist">
+      <testcase purpose="check if attribute clients of ServiceWorkerGlobalScope exists, has type Clients and is readonly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerGlobalScope_clients_attribute">
         <description>
-          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/WindowClient_navigate_exist.html</test_script_entry>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerGlobalScope_clients_attribute.html</test_script_entry>
         </description>
         <specs>
           <spec>
-            <spec_assertion interface="WindowClient" element_type="method" element_name="navigate" specification="" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_assertion interface="ServiceWorkerGlobalScope" element_type="attribute" element_name="clients" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
             <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
             <spec_statement>TBD</spec_statement>
           </spec>
         </specs>
       </testcase>
-      <testcase purpose="check if visibilityState attribute of WindowClient exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="WindowClient_visibilityState_attribute">
+      <testcase purpose="check if ServiceWorkerGlobalScope exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerGlobalScope_exist">
         <description>
-          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/WindowClient_visibilityState_attribute.html</test_script_entry>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerGlobalScope_exist.html</test_script_entry>
         </description>
         <specs>
           <spec>
-            <spec_assertion interface="WindowClient" element_type="attribute" element_name="visibilityState" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_assertion interface="ServiceWorkerGlobalScope" usage="true" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
             <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
             <spec_statement>TBD</spec_statement>
           </spec>
         </specs>
-      </testcase>-->
+      </testcase>
+      <testcase purpose="check if fetch method of ServiceWorkerGlobalScope exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/" execution_type="auto" priority="P0" id="ServiceWorkerGlobalScope_fetch_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerGlobalScope_fetch_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerGlobalScope" element_type="method" element_name="fetch" specification="" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if attribute onactivate of ServiceWorkerGlobalScope exists, has type object and is writeable" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerGlobalScope_onactivate_attribute">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerGlobalScope_onactivate_attribute.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerGlobalScope" element_type="attribute" element_name="onactivate" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if attribute onfetch of ServiceWorkerGlobalScope exists, has type object and is writeable" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerGlobalScope_onfetch_attribute">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerGlobalScope_onfetch_attribute.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerGlobalScope" element_type="attribute" element_name="onfetch" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if attribute oninstall of ServiceWorkerGlobalScope exists, has type object and is writeable" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerGlobalScope_oninstall_attribute">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerGlobalScope_oninstall_attribute.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerGlobalScope" element_type="attribute" element_name="oninstall" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if attribute onmessage of ServiceWorkerGlobalScope exists, has type object and is writeable" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/" execution_type="auto" priority="P1" id="ServiceWorkerGlobalScope_onmessage_attribute">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerGlobalScope_onmessage_attribute.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerGlobalScope" element_type="attribute" element_name="onmessage" specification="" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if attribute registration of ServiceWorkerGlobalScope exists, has type ServiceWorkerRegistration and is readonly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerGlobalScope_registration_attribute">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerGlobalScope_registration_attribute.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerGlobalScope" element_type="attribute" element_name="registration" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if skipWaiting method of ServiceWorkerGlobalScope work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerGlobalScope_skipWaiting">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerGlobalScope_skipWaiting.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerGlobalScope" element_type="method" element_name="skipWaiting" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if skipWaiting method of ServiceWorkerGlobalScope exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="ServiceWorkerGlobalScope_skipWaiting_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerGlobalScope_skipWaiting_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerGlobalScope" element_type="method" element_name="skipWaiting" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if attribute active of ServiceWorkerRegistration exists, has type ServiceWorker and is readonly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerRegistration_active_attribute">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerRegistration_active_attribute.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerRegistration" element_type="attribute" element_name="active" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if ServiceWorkerRegistration exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerRegistration_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerRegistration_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerRegistration" usage="true" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if attribute installing of ServiceWorkerRegistration exists, has type ServiceWorker and is readonly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerRegistration_installing_attribute">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerRegistration_installing_attribute.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerRegistration" element_type="attribute" element_name="installing" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if attribute onupdatefound of ServiceWorkerRegistration exists, has type function and is writeable" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerRegistration_onupdatefound_attribute">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerRegistration_onupdatefound_attribute.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerRegistration" element_type="attribute" element_name="onupdatefound" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if attribute scope of ServiceWorkerRegistration exists, has type ServiceWorker and is readonly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerRegistration_scope_attribute">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerRegistration_scope_attribute.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerRegistration" element_type="attribute" element_name="scope" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if unregister method work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerRegistration_unregister">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerRegistration_unregister.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerRegistration" element_type="method" element_name="unregister" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if unregister exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="ServiceWorkerRegistration_unregister_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerRegistration_unregister_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerRegistration" element_type="method" element_name="unregister" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if update work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerRegistration_update">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerRegistration_update.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerRegistration" element_type="method" element_name="update" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if update exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="ServiceWorkerRegistration_update_exist">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerRegistration_update_exist.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerRegistration" element_type="method" element_name="update" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="Check if attribute waiting of ServiceWorkerRegistration exists, has type ServiceWorker and is readonly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerRegistration_waiting_attribute">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerRegistration_waiting_attribute.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="ServiceWorkerRegistration" element_type="attribute" element_name="waiting" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
+      <testcase purpose="check if focus method of WindowClient work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorker" execution_type="auto" priority="P1" id="WindowClient_focus">
+        <description>
+          <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/WindowClient_focus.html</test_script_entry>
+        </description>
+        <specs>
+          <spec>
+            <spec_assertion interface="WindowClient" element_type="method" element_name="focus" specification="ServiceWorker" section="TBD" category="Tizen Device API Specifications"/>
+            <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+            <spec_statement>TBD</spec_statement>
+          </spec>
+        </specs>
+      </testcase>
       <testcase purpose="check if caches attribute of Window exist ,has CacheStorage type and readonly." type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Window_caches_attribute">
         <description>
           <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Window_caches_attribute.html</test_script_entry>