</specs>
</testcase>
</set>
+ <set name="sandbox_IOT" type="js">
+ <capabilities>
+ <capability name="http://tizen.org/feature/profile">
+ <value>COMMON</value>
+ </capability>
+ </capabilities>
+ <testcase purpose="Check if inline function works well when sandbox is allow-same-origin allow-scripts." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P1" id="csp_sandbox_allow-same-origin_allow-scripts-inline">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_sandbox_allow-same-origin_allow-scripts.php?total_num=4&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="sandbox" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#sandbox-optional</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if internal function works well when sandbox is allow-same-origin allow-scripts." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P1" id="csp_sandbox_allow-same-origin_allow-scripts_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_sandbox_allow-same-origin_allow-scripts.php?total_num=4&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="sandbox" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#sandbox-optional</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if external function works well when sandbox is allow-same-origin allow-scripts." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P1" id="csp_sandbox_allow-same-origin_allow-scripts_external">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_sandbox_allow-same-origin_allow-scripts.php?total_num=4&amp;locator_key=id&amp;value=3</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="sandbox" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#sandbox-optional</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if event handler function works well when sandbox is allow-same-origin allow-scripts." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P1" id="csp_sandbox_allow-same-origin_allow-scripts_event">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_sandbox_allow-same-origin_allow-scripts.php?total_num=4&amp;locator_key=id&amp;value=4</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="sandbox" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#sandbox-optional</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use javascript internal when sandbox is empty." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_sandbox_empty_int">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_sandbox_empty_int</step_desc>
+ <expected>To pass, if there is no text 'FAIL' below.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_sandbox_empty_int.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="sandbox" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#sandbox-optional</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use javascript in external when sandbox is empty." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_sandbox_empty_ext">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_sandbox_empty_ext</step_desc>
+ <expected>To pass, if there is no text 'FAIL' below.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_sandbox_empty_ext.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="sandbox" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#sandbox-optional</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use javascript in event handler when sandbox is empty." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_sandbox_empty_event">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_sandbox_empty_event</step_desc>
+ <expected>To pass, if there is no text 'FAIL' below.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_sandbox_empty_event.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="sandbox" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#sandbox-optional</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use javascript inline when sandbox is empty." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_sandbox_empty_inline">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_sandbox_empty_inline</step_desc>
+ <expected>To pass, if there is no text 'FAIL' below.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_sandbox_empty_inline.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="sandbox" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#sandbox-optional</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ </set>
+ <set name="connect-src_IOT" type="js">
+ <capabilities>
+ <capability name="http://tizen.org/feature/profile">
+ <value>COMMON</value>
+ </capability>
+ </capabilities>
+ <testcase purpose="Check if user agent is able to open internal resource by xhr when connect-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_connect-src_asterisk_allowed">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_connect-src_asterisk.php?total_num=2&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="connect-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#connect-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to open external resource by xhr when connect-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_connect-src_asterisk_allowed_ext">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_connect-src_asterisk.php?total_num=2&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="connect-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#connect-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to open external resource by xhr when connect-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_connect-src_cross-origin_xmlhttprequest_allowed">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_connect-src_cross-origin.php?total_num=3&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="connect-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#connect-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to open not-allowed external resource by xhr when connect-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_connect-src_cross-origin_xmlhttprequest_blocked">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_connect-src_cross-origin.php?total_num=3&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="connect-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#connect-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to open internal resource by xhr when connect-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_connect-src_cross-origin_xmlhttprequest_blocked_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_connect-src_cross-origin.php?total_num=3&amp;locator_key=id&amp;value=3</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="connect-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#connect-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to open first allowed external resource by xhr when connect-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_connect-src_cross-origin_multi_xmlhttprequest_allowed_one">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_connect-src_cross-origin_multi.php?total_num=4&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="connect-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#connect-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to open second allowed external resource by xhr when connect-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_connect-src_cross-origin_multi_xmlhttprequest_allowed_two">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_connect-src_cross-origin_multi.php?total_num=4&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="connect-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#connect-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to open not-allowed external resource by xhr when connect-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_connect-src_cross-origin_multi_xmlhttprequest_blocked">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_connect-src_cross-origin_multi.php?total_num=4&amp;locator_key=id&amp;value=3</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="connect-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#connect-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to open internal resource by xhr when connect-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_connect-src_cross-origin_multi_xmlhttprequest_blocked_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_connect-src_cross-origin_multi.php?total_num=4&amp;locator_key=id&amp;value=4</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="connect-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#connect-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to open internal resource by xhr when connect-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_connect-src_none_xmlhttprequest_blocked">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_connect-src_none.php?total_num=2&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="connect-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#connect-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to open external resource by xhr when connect-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_connect-src_none_xmlhttprequest_blocked_ext">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_connect-src_none.php?total_num=2&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="connect-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#connect-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to open internal resource by xhr when connect-src is 'self'." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_connect-src_self_xmlhttprequest_allowed">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_connect-src_self.php?total_num=2&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="connect-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#connect-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to open external resource by xhr when connect-src is 'self'." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_connect-src_self_xmlhttprequest_blocked">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_connect-src_self.php?total_num=2&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="connect-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#connect-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to open internal resource by xhr when connect-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_connect-src_asterisk_allowed">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_connect-src_asterisk.php?total_num=2&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to open external resource by xhr when connect-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_connect-src_asterisk_allowed_ext">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_connect-src_asterisk.php?total_num=2&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to open external resource by xhr when connect-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_connect-src_cross-origin_xmlhttprequest_allowed">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_connect-src_cross-origin.php?total_num=3&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to open not-allowed external resource by xhr when connect-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_connect-src_cross-origin_xmlhttprequest_blocked">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_connect-src_cross-origin.php?total_num=3&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to open internal resource by xhr when connect-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_connect-src_cross-origin_xmlhttprequest_blocked_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_connect-src_cross-origin.php?total_num=3&amp;locator_key=id&amp;value=3</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to open first allowed external resource by xhr when connect-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_connect-src_cross-origin_multi_xmlhttprequest_allowed_one">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_connect-src_cross-origin_multi.php?total_num=4&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to open second allowed external resource by xhr when connect-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_connect-src_cross-origin_multi_xmlhttprequest_allowed_two">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_connect-src_cross-origin_multi.php?total_num=4&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to open not-allowed external resource by xhr when connect-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_connect-src_cross-origin_multi_xmlhttprequest_blocked">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_connect-src_cross-origin_multi.php?total_num=4&amp;locator_key=id&amp;value=3</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to open internal resource by xhr when connect-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_connect-src_cross-origin_multi_xmlhttprequest_blocked_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_connect-src_cross-origin_multi.php?total_num=4&amp;locator_key=id&amp;value=4</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to open internal resource by xhr when connect-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_connect-src_none_xmlhttprequest_blocked">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_connect-src_none.php?total_num=2&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to open external resource by xhr when connect-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_connect-src_none_xmlhttprequest_blocked_ext">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_connect-src_none.php?total_num=2&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to open internal resource by xhr when connect-src is 'self'." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_connect-src_self_xmlhttprequest_allowed">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_connect-src_self.php?total_num=2&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to open external resource by xhr when connect-src is 'self'." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_connect-src_self_xmlhttprequest_blocked">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_connect-src_self.php?total_num=2&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ </testcase>
+ </set>
+ <set name="default-src_IOT" type="js">
+ <capabilities>
+ <capability name="http://tizen.org/feature/profile">
+ <value>COMMON</value>
+ </capability>
+ </capabilities>
+ <testcase purpose="Check if default-src is '*' that inline script won't be executed" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P1" id="csp_default-src_asterisk">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/w3c/CSP_001.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if default-src is 'self' and about is 'unsafe-inline, that inline script will be executed" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_default-src_self_about_unsafe-inline_script">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/w3c/CSP_default-src-inline-allowed.php?total_num=3&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if default-src is 'self' and about is 'unsafe-inline, that inline script in iframe will be executed" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_default-src_self_about_unsafe-inline_iframe">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/w3c/CSP_default-src-inline-allowed.php?total_num=3&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if default-src is 'self' and about is 'unsafe-inline, that inline script in img will be executed" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_default-src_self_about_unsafe-inline_img">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/w3c/CSP_default-src-inline-allowed.php?total_num=3&amp;locator_key=id&amp;value=3</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if default-src is 'self' that inline script won't be executed" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P1" id="csp_default-src_self">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/w3c/CSP_002.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to open internal resource by xhr when default-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_default-src_cross-origin_connect_xmlhttprequest_allowed">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_cross-origin_connect.php?total_num=3&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to open not-allowed external resource by xhr when default-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_default-src_cross-origin_connect_xmlhttprequest_blocked">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_cross-origin_connect.php?total_num=3&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to open internal resource by xhr when default-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_default-src_cross-origin_connect_xmlhttprequest_blocked_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_cross-origin_connect.php?total_num=3&amp;locator_key=id&amp;value=3</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to open first allowed resource by xhr when default-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_default-src_cross-origin_connect_multi_xmlhttprequest_allowed_one">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_cross-origin_connect_multi.php?total_num=4&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to open second allowed resource by xhr when default-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_default-src_cross-origin_connect_multi_xmlhttprequest_allowed_two">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_cross-origin_connect_multi.php?total_num=4&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to open not-allowed external resource by xhr when default-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_default-src_cross-origin_connect_multi_xmlhttprequest_blocked">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_cross-origin_connect_multi.php?total_num=4&amp;locator_key=id&amp;value=3</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to open internal resource by xhr when default-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_default-src_cross-origin_connect_multi_xmlhttprequest_blocked_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_cross-origin_connect_multi.php?total_num=4&amp;locator_key=id&amp;value=4</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to open internal resource by xhr when default-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_default-src_none_connect_xmlhttprequest_blocked">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_none_connect.php?total_num=2&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to open external resource by xhr when default-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_default-src_none_connect_xmlhttprequest_blocked_ext">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_none_connect.php?total_num=2&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to open internal resource by xhr when default-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P1" id="csp_default-src_self_connect_xmlhttprequest_allowed">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_self_connect.php?total_num=2&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to open external resource by xhr when default-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P1" id="csp_default-src_self_connect_xmlhttprequest_blocked">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_self_connect.php?total_num=2&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use internal image resource when default-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_default-src_self_img_allowed">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_default-src_self_img_allowed</step_desc>
+ <expected>To pass, if a filled blue square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_self_img_allowed.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use external image resource when default-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_default-src_self_img_blocked">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_default-src_self_img_blocked</step_desc>
+ <expected>To pass, if no red square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_self_img_blocked.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use internal object resource when default-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_default-src_self_object_allowed">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_default-src_self_object_allowed</step_desc>
+ <expected>To pass, if a filled blue square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_self_object_allowed.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use external object resource when default-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_default-src_self_object_blocked">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_default-src_self_object_blocked</step_desc>
+ <expected>To pass, if no red square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_self_object_blocked.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use external font resource when default-src is cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_default-src_cross-origin_font_allowed">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_default-src_cross-origin_font_allowed.</step_desc>
+ <expected>To pass, if two lines are different in font</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_cross-origin_font_allowed.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use internal font resource when default-src is cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_default-src_cross-origin_font_blocked">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_default-src_cross-origin_font_blocked.</step_desc>
+ <expected>To pass, if two lines have the same font</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_cross-origin_font_blocked.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use external font resource when default-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_default-src_none_font_blocked_ext">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_default-src_none_font_blocked_ext.</step_desc>
+ <expected>To pass, if two lines have the same font</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_none_font_blocked_ext.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use internal font resource when default-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_default-src_none_font_blocked_int">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_default-src_none_font_blocked_int.</step_desc>
+ <expected>To pass, if two lines have the same font.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_none_font_blocked_int.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use internal font resource when default-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_default-src_self_font_allowed">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_default-src_self_font_allowed.</step_desc>
+ <expected>To pass, if two lines are different in font</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_self_font_allowed.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use external font resource when default-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_default-src_self_font_blocked">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_default-src_self_font_blocked.</step_desc>
+ <expected>To pass, if two lines have the same font</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_self_font_blocked.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the first allowed external font resource when default-src is multi cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_default-src_cross-origin_multi_font_allowed_one">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_default-src_cross-origin_multi_font_allowed_one.</step_desc>
+ <expected>To pass, if two lines are different in font</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_cross-origin_multi_font_allowed_one.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the second allowed external font resource when default-src is multi cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_default-src_cross-origin_multi_font_allowed_two">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_default-src_cross-origin_multi_font_allowed_two.</step_desc>
+ <expected>To pass, if two lines are different in font</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_cross-origin_multi_font_allowed_two.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use the not allowed external font resource when default-src is multi cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_default-src_cross-origin_multi_font_blocked">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_default-src_cross-origin_multi_font_blocked.</step_desc>
+ <expected>To pass, if two lines have the same font</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_cross-origin_multi_font_blocked.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use the internal font resource when default-src is multi cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_default-src_cross-origin_multi_font_blocked_int">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_default-src_cross-origin_multi_font_blocked_int.</step_desc>
+ <expected>To pass, if two lines have the same font</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_cross-origin_multi_font_blocked_int.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use internal frame resource when default-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_default-src_self_frame_allowed">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_default-src_self_frame_allowed.</step_desc>
+ <expected>To pass, if a filled blue square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_self_frame_allowed.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use external default resource when default-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_default-src_self_frame_blocked">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_default-src_self_frame_blocked.</step_desc>
+ <expected>To pass, if no red square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_default-src_self_frame_blocked.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ </set>
+ <set name="font-src_IOT" type="js">
+ <capabilities>
+ <capability name="http://tizen.org/feature/profile">
+ <value>COMMON</value>
+ </capability>
+ </capabilities>
+ <testcase purpose="Check if user agent is able to use external font resource when font-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_font-src_asterisk_allowed_ext">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_font-src_asterisk_allowed_ext.</step_desc>
+ <expected>To pass, if two lines are different in font</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_font-src_asterisk_allowed_ext.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use internal font resource when font-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_font-src_asterisk_allowed_int">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_font-src_asterisk_allowed_int.</step_desc>
+ <expected>To pass, if two lines are different in font</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_font-src_asterisk_allowed_int.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use external font resource when font-src is cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_font-src_cross-origin_allowed">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_font-src_cross-origin_allowed.</step_desc>
+ <expected>To pass, if two lines are different in font</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_font-src_cross-origin_allowed.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use internal font resource when font-src is cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_font-src_cross-origin_blocked">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_font-src_cross-origin_blocked.</step_desc>
+ <expected>To pass, if two lines have the same font</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_font-src_cross-origin_blocked.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use external font resource when font-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_font-src_none_blocked_ext">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_font-src_none_blocked_ext.</step_desc>
+ <expected>To pass, if two lines have the same font</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_font-src_none_blocked_ext.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use internal font resource when font-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_font-src_none_blocked_int">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_font-src_none_blocked_int.</step_desc>
+ <expected>To pass, if two lines have the same font</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_font-src_none_blocked_int.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use internal font resource when font-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_font-src_self_allowed">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_font-src_self_allowed.</step_desc>
+ <expected>To pass, if two lines are different in font</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_font-src_self_allowed.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use external font resource when font-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_font-src_self_blocked">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_font-src_self_blocked.</step_desc>
+ <expected>To pass, if two lines have the same font</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_font-src_self_blocked.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the first allowed external font resource when font-src is multi cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_font-src_cross-origin_multi_allowed_one">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_font-src_cross-origin_multi_allowed_one.</step_desc>
+ <expected>To pass, if two lines are different in font</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_font-src_cross-origin_multi_allowed_one.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the second allowed external font resource when font-src is multi cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_font-src_cross-origin_multi_allowed_two">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_font-src_cross-origin_multi_allowed_two.</step_desc>
+ <expected>To pass, if two lines are different in font</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_font-src_cross-origin_multi_allowed_two.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use the not allowed external font resource when font-src is multi cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_font-src_cross-origin_multi_blocked">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_font-src_cross-origin_multi_blocked.</step_desc>
+ <expected>To pass, if two lines have the same font</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_font-src_cross-origin_multi_blocked.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use the internal font resource when font-src is multi cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_font-src_cross-origin_multi_blocked_int">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_font-src_cross-origin_multi_blocked_int.</step_desc>
+ <expected>To pass, if two lines have the same font</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_font-src_cross-origin_multi_blocked_int.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use external font resource when font-src is self in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_ro_font-src_self_allowed_ext">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_ro_font-src_self_allowed_ext.</step_desc>
+ <expected>To pass, if two lines are defferent in font</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_font-src_self_allowed_ext.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use internal font resource when font-src is self in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P1" id="csp_ro_font-src_self_allowed_int">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_ro_font-src_self_allowed_int.</step_desc>
+ <expected>To pass, if two lines are defferent in font</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_font-src_self_allowed_int.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="font-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#font-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ </set>
+ <set name="frame-src_IOT" type="js">
+ <capabilities>
+ <capability name="http://tizen.org/feature/profile">
+ <value>COMMON</value>
+ </capability>
+ </capabilities>
+ <testcase purpose="Check if user agent is able to use external frame resource when frame-src is asterisk." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-src_asterisk_allowed_ext">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_frame-src_asterisk_allowed_ext.</step_desc>
+ <expected>To pass, if a filled green square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-src_asterisk_allowed_ext.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="frame-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#frame-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use internal frame resource when frame-src is asterisk." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-src_asterisk_allowed_int">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_frame-src_asterisk_allowed_int.</step_desc>
+ <expected>To pass, if a filled blue square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-src_asterisk_allowed_int.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="frame-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#frame-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use external frame resource when frame-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-src_cross-origin_allowed">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_frame-src_cross-origin_allowed.</step_desc>
+ <expected>To pass, if a filled green square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-src_cross-origin_allowed.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="frame-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#frame-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use not allowed eternal frame resource when frame-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-src_cross-origin_blocked">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_frame-src_cross-origin_blocked.</step_desc>
+ <expected>To pass, if no red square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-src_cross-origin_blocked.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="frame-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#frame-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use internal frame resource when frame-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-src_cross-origin_blocked_int">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_frame-src_cross-origin_blocked_int.</step_desc>
+ <expected>To pass, if no red square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-src_cross-origin_blocked_int.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="frame-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#frame-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the first external frame resource when frame-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-src_cross-origin_multi_allowed_one">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_frame-src_cross-origin_multi_allowed_one.</step_desc>
+ <expected>To pass, if a filled green square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-src_cross-origin_multi_allowed_one.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="frame-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#frame-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the second external frame resource when frame-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-src_cross-origin_multi_allowed_two">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_frame-src_cross-origin_multi_allowed_two.</step_desc>
+ <expected>To pass, if a filled green square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-src_cross-origin_multi_allowed_two.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="frame-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#frame-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use the not allowed external frame resource when frame-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-src_cross-origin_multi_blocked">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_frame-src_cross-origin_multi_blocked.</step_desc>
+ <expected>To pass, if no red square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-src_cross-origin_multi_blocked.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="frame-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#frame-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use the internal frame resource when frame-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-src_cross-origin_multi_blocked_int">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_frame-src_cross-origin_multi_blocked_int.</step_desc>
+ <expected>To pass, if no red square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-src_cross-origin_multi_blocked_int.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="frame-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#frame-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use external frame resource when frame-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-src_none_blocked_ext">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_frame-src_none_blocked_ext.</step_desc>
+ <expected>To pass, if no red square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-src_none_blocked_ext.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="frame-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#frame-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use internal frame resource when frame-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-src_none_blocked_int">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_frame-src_none_blocked_int.</step_desc>
+ <expected>To pass, if no red square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-src_none_blocked_int.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="frame-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#frame-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use internal frame resource when frame-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-src_self_allowed">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_frame-src_self_allowed.</step_desc>
+ <expected>To pass, if a filled blue square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-src_self_allowed.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="frame-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#frame-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use external frame resource when frame-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-src_self_blocked">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_frame-src_self_blocked.</step_desc>
+ <expected>To pass, if no red square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-src_self_blocked.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="frame-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#frame-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ </set>
+ <set name="img-src_IOT" type="js">
+ <capabilities>
+ <capability name="http://tizen.org/feature/profile">
+ <value>COMMON</value>
+ </capability>
+ </capabilities>
+ <testcase purpose="Check if user agent is able to use external image resource when img-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_img-src_asterisk_allowed_ext">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_img-src_asterisk_allowed_ext</step_desc>
+ <expected>To pass, if a filled green square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_img-src_asterisk_allowed_ext.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use internal image resource when img-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_img-src_asterisk_allowed_int">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_img-src_asterisk_allowed_int</step_desc>
+ <expected>To pass, if a filled blue square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_img-src_asterisk_allowed_int.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use external image resource when img-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_img-src_cross-origin_allowed">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_img-src_cross-origin_allowed</step_desc>
+ <expected>To pass, if a filled green square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_img-src_cross-origin_allowed.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use not-allowed external image resource when img-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_img-src_cross-origin_blocked">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_img-src_cross-origin_blocked</step_desc>
+ <expected>To pass, if no red square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_img-src_cross-origin_blocked.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use internal image resource when img-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_img-src_cross-origin_blocked_int">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_img-src_cross-origin_blocked_int</step_desc>
+ <expected>To pass, if no red square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_img-src_cross-origin_blocked_int.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the first allowed external image resource when img-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_img-src_cross-origin_multi_allowed_one">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_img-src_cross-origin_multi_allowed_one</step_desc>
+ <expected>To pass, if a filled green square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_img-src_cross-origin_multi_allowed_one.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the second allowed external image resource when img-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_img-src_cross-two">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_img-src_cross-origin_multi_allowed_two</step_desc>
+ <expected>To pass, if a filled green square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_img-src_cross-origin_multi_allowed_two.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use the not-allowed external image resource when img-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_img-src_cross-origin_multi_blocked">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_img-src_cross-origin_multi_blocked</step_desc>
+ <expected>To pass, if no red square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_img-src_cross-origin_multi_blocked.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use the internal image resource when img-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_img-src_cross-origin_multi_blocked_int">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_img-src_cross-origin_multi_blocked_int</step_desc>
+ <expected>To pass, if no red square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_img-src_cross-origin_multi_blocked_int.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use the external image resource when img-src is 'none'." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_img-src_none_blocked_ext">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_img-src_none_blocked_ext</step_desc>
+ <expected>To pass, if no red square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_img-src_none_blocked_ext.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use the internal image resource when img-src is 'none'." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_img-src_none_blocked_int">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_img-src_none_blocked_int</step_desc>
+ <expected>To pass, if no red square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_img-src_none_blocked_int.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the internal image resource when img-src is 'self'." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_img-src_self_allowed">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_img-src_self_allowed</step_desc>
+ <expected>To pass, if a filled blue square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_img-src_self_allowed.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use the external image resource when img-src is 'self'." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_img-src_self_blocked">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_img-src_self_blocked</step_desc>
+ <expected>To pass, if no red square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_img-src_self_blocked.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the external image resource when img-src is 'self' in report-only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_ro_img-src_self_allowed_ext">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_ro_img-src_self_allowed_ext</step_desc>
+ <expected>To pass, if a filled green square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_img-src_self_allowed_ext.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the internal image resource when img-src is 'self' in report-only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_ro_img-src_self_allowed_int">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_ro_img-src_self_allowed_int</step_desc>
+ <expected>To pass, if a filled blue square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_img-src_self_allowed_int.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="img-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#img-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ </set>
+ <set name="object-src_IOT" type="js">
+ <capabilities>
+ <capability name="http://tizen.org/feature/profile">
+ <value>COMMON</value>
+ </capability>
+ </capabilities>
+ <testcase purpose="Check if user agent is able to use external image resource when object-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_object-src_asterisk_allowed_ext">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_object-src_asterisk_allowed_ext</step_desc>
+ <expected>To pass, if a filled green square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_object-src_asterisk_allowed_ext.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="object-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#object-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use internal image resource when object-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_object-src_asterisk_allowed_int">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_object-src_asterisk_allowed_int</step_desc>
+ <expected>To pass, if a filled blue square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_object-src_asterisk_allowed_int.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="object-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#object-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use external image resource when object-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_object-src_cross-origin_allowed">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_object-src_cross-origin_allowed</step_desc>
+ <expected>To pass, if a filled green square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_object-src_cross-origin_allowed.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="object-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#object-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the first allowed external image resource when object-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_object-src_cross-origin_multi_allowed_one">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_object-src_cross-origin_multi_allowed_one</step_desc>
+ <expected>To pass, if a filled green square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_object-src_cross-origin_multi_allowed_one.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="object-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#object-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the second allowed external image resource when object-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_object-src_cross-two">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_object-src_cross-origin_multi_allowed_two</step_desc>
+ <expected>To pass, if a filled green square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_object-src_cross-origin_multi_allowed_two.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="object-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#object-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the internal image resource when object-src is 'self'." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_object-src_self_allowed">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_object-src_self_allowed</step_desc>
+ <expected>To pass, if a filled blue square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_object-src_self_allowed.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="object-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#object-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the external image resource when object-src is 'self' in report-only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_ro_object-src_self_allowed_ext">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_ro_object-src_self_allowed_ext</step_desc>
+ <expected>To pass, if a filled green square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_object-src_self_allowed_ext.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="object-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#object-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the internal image resource when object-src is 'self' in report-only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_ro_object-src_self_allowed_int">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual case: csp_ro_object-src_self_allowed_int</step_desc>
+ <expected>To pass, if a filled blue square is displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_object-src_self_allowed_int.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="object-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#object-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ </set>
+ <set name="media-src_IOT" type="js">
+ <capabilities>
+ <capability name="http://tizen.org/feature/profile">
+ <value>COMMON</value>
+ </capability>
+ </capabilities>
+ <testcase purpose="Check if video current src is null by default when media-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_self_video_default">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_self_video.php?total_num=3&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check that video current src is empty if the source is cross origin when media-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_self_video_external">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_self_video.php?total_num=3&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check that video current src is not empty if the source is origin when media-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_self_video_internal">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_self_video.php?total_num=3&amp;locator_key=id&amp;value=3</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if audio current src is null by default when media-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_self_audio_default">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_self_audio.php?total_num=3&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check that audio current src is empty if the source is cross origin when media-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_self_audio_external">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_self_audio.php?total_num=3&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check that audio current src is not empty if the source is origin when media-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_self_audio_internal">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_self_audio.php?total_num=3&amp;locator_key=id&amp;value=3</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the external audio resource when media-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_asterisk_audio_allowed_ext">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_asterisk_audio_allowed_ext.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the internal audio resource when media-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_asterisk_audio_allowed_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_asterisk_audio_allowed_int.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the external video resource when media-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_asterisk_video_allowed_ext">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_asterisk_video_allowed_ext.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the internal video resource when media-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_asterisk_video_allowed_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_asterisk_video_allowed_int.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the external audio resource when media-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_corss-origin_audio_allowed_ext">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_corss-origin_audio_allowed_ext.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use the not allowed external audio resource when media-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_corss-origin_audio_blocked_ext">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_corss-origin_audio_blocked_ext.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use the internal audio resource when media-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_corss-origin_audio_blocked_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_corss-origin_audio_blocked_int.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the external video resource when media-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_corss-origin_video_allowed_ext">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_corss-origin_video_allowed_ext.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use the not allowed external video resource when media-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_corss-origin_video_blocked_ext">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_corss-origin_video_blocked_ext.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use the internal video resource when media-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_corss-origin_video_blocked_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_corss-origin_video_blocked_int.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use the external audio resource when media-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_none_audio_blocked_ext">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_none_audio_blocked_ext.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use the internal audio resource when media-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_none_audio_blocked_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_none_audio_blocked_int.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use the external video resource when media-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_none_video_blocked_ext">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_none_video_blocked_ext.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use the internal video resource when media-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_media-src_none_video_blocked_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_media-src_none_video_blocked_int.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="media-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#media-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the not allowed external audio resource when media-src is cross-origin in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_media-src_corss-origin_audio_blocked_ext">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_media-src_corss-origin_audio_blocked_ext.php</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the internal audio resource when media-src is cross-origin in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_media-src_corss-origin_audio_blocked_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_media-src_corss-origin_audio_blocked_int.php</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the not allowed external video resource when media-src is cross-origin in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_media-src_corss-origin_video_blocked_ext">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_media-src_corss-origin_video_blocked_ext.php</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the internal video resource when media-src is cross-origin in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_media-src_corss-origin_video_blocked_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_media-src_corss-origin_video_blocked_int.php</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the external audio resource when media-src is none in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_media-src_none_audio_blocked_ext">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_media-src_none_audio_blocked_ext.php</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the internal audio resource when media-src is none in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_media-src_none_audio_blocked_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_media-src_none_audio_blocked_int.php</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the external video resource when media-src is none in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_media-src_none_video_blocked_ext">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_media-src_none_video_blocked_ext.php</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the internal video resource when media-src is none in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_media-src_none_video_blocked_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_media-src_none_video_blocked_int.php</test_script_entry>
+ </description>
+ </testcase>
+ </set>
+ <set name="style-src_IOT" type="js">
+ <capabilities>
+ <capability name="http://tizen.org/feature/profile">
+ <value>COMMON</value>
+ </capability>
+ </capabilities>
+ <testcase purpose="Check if user agent is able to use external style resource when style-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_asterisk_allowed_ext">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_asterisk.php?total_num=3&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use internal style resource when style-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_asterisk_allowed_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_asterisk.php?total_num=3&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use inline style resource when style-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_asterisk_blocked_inline">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_asterisk.php?total_num=3&amp;locator_key=id&amp;value=3</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use external style resource when style-src is cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_cross-origin_allowed">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_cross-origin.php?total_num=4&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use not allowed external style resource when style-src is cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_cross-origin_blocked">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_cross-origin.php?total_num=4&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use internal style resource when style-src is cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_cross-origin_blocked_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_cross-origin.php?total_num=4&amp;locator_key=id&amp;value=3</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use inline style resource when style-src is cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_cross-origin_blocked_inline">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_cross-origin.php?total_num=4&amp;locator_key=id&amp;value=4</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the first allowed external style resource when style-src is multi cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_cross-origin_multi_allowed_one">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_cross-origin_multi.php?total_num=5&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the second allowed external style resource when style-src is multi cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_cross-origin_multi_allowed_two">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_cross-origin_multi.php?total_num=5&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use not allowed external style resource when style-src is multi cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_cross-origin_multi_blocked">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_cross-origin_multi.php?total_num=5&amp;locator_key=id&amp;value=3</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use internal style resource when style-src is multi cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_cross-origin_multi_blocked_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_cross-origin_multi.php?total_num=5&amp;locator_key=id&amp;value=4</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use inline style resource when style-src is multi cross origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_cross-origin_multi_blocked_inline">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_cross-origin_multi.php?total_num=5&amp;locator_key=id&amp;value=5</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use external style resource when style-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_none_blocked_ext">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_none.php?total_num=3&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use internal style resource when style-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_none_blocked_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_none.php?total_num=3&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use inline style resource when style-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_none_blocked_inline">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_none.php?total_num=3&amp;locator_key=id&amp;value=3</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use external style resource when style-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P1" id="csp_style-src_self_blocked">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_self.php?total_num=3&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use internal style resource when style-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P1" id="csp_style-src_self_allowed">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_self.php?total_num=3&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use inline style resource when style-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P1" id="csp_style-src_self_blocked_inline">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_self.php?total_num=3&amp;locator_key=id&amp;value=3</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use external style resource when style-src is unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_unsafe-inline_blocked_ext">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_unsafe-inline.php?total_num=3&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use internal style resource when style-src is unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_unsafe-inline_blocked_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_unsafe-inline.php?total_num=3&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use inline style resource when style-src is unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_style-src_unsafe-inline_allowed">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_style-src_unsafe-inline.php?total_num=3&amp;locator_key=id&amp;value=3</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="style-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#style-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use inline style resource when style-src is * in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_asterisk_blocked_inline">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_asterisk.php</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use not allowed external style resource when style-src is cross origin in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_cross-origin_blocked">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_cross-origin.php?total_num=3&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use internal style resource when style-src is cross origin in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_cross-origin_blocked_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_cross-origin.php?total_num=3&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use inline style resource when style-src is cross origin in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_cross-origin_blocked_inline">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_cross-origin.php?total_num=3&amp;locator_key=id&amp;value=3</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use not allowed external style resource when style-src is multi cross origin in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_cross-origin_multi_blocked">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_cross-origin_multi.php?total_num=3&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use internal style resource when style-src is multi cross origin in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_cross-origin_multi_blocked_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_cross-origin_multi.php?total_num=3&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use inline style resource when style-src is multi cross origin in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_cross-origin_multi_blocked_inline">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_cross-origin_multi.php?total_num=3&amp;locator_key=id&amp;value=3</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use external style resource when style-src is none in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_none_blocked_ext">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_none.php?total_num=3&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use internal style resource when style-src is none in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_none_blocked_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_none.php?total_num=3&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use inline style resource when style-src is none in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_none_blocked_inline">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_none.php?total_num=3&amp;locator_key=id&amp;value=3</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use external style resource when style-src is self in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_self_blocked">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_self.php?total_num=2&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use inline style resource when style-src is self in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_self_blocked_inline">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_self.php?total_num=2&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use external style resource when style-src is unsafe-inline in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_unsafe-inline_blocked_ext">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_unsafe-inline.php?total_num=2&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use internal style resource when style-src is unsafe-inline in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_style-src_unsafe-inline_blocked_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_style-src_unsafe-inline.php?total_num=2&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ </testcase>
+ </set>
+ <set name="script-src_IOT" type="js">
+ <capabilities>
+ <capability name="http://tizen.org/feature/profile">
+ <value>COMMON</value>
+ </capability>
+ </capabilities>
+ <testcase purpose="Check if internal script works well when script-src is self, unsafe-inline in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_script-src_self_unsafe-inline">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_script-src_self_unsafe-inline.php?total_num=3&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if inline script works well when script-src is self, unsafe-inline in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_script-src_self_unsafe-inline_internal">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_script-src_self_unsafe-inline.php?total_num=3&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if cross origin script is unable to work when script-src is self, unsafe-inline in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_script-src_self_unsafe-inline_external">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_script-src_self_unsafe-inline.php?total_num=3&amp;locator_key=id&amp;value=3</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if inline function eval works well when script-src is self, unsafe-inline, unsafe-eval in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_script-src_self_unsafe-inline_unsafe-eval">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_script-src_self_unsafe-inline_unsafe-eval.php?total_num=3&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if internal script works well when script-src is self, unsafe-inline, unsafe-eval in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_script-src_self_unsafe-inline_unsafe-eval_internal">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_script-src_self_unsafe-inline_unsafe-eval.php?total_num=3&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if cross origin eval function is unable to work when script-src is self, unsafe-inline, unsafe-eval in report only mode." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_ro_script-src_self_unsafe-inline_unsafe-eval_external">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_ro_script-src_self_unsafe-inline_unsafe-eval.php?total_num=3&amp;locator_key=id&amp;value=3</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if internal script works well when script-src is self, unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_self_unsafe-inline">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_self_unsafe-inline.php?total_num=3&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if inline script works well when script-src is self, unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_self_unsafe-inline_internal">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_self_unsafe-inline.php?total_num=3&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if cross origin script is unable to work when script-src is self, unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_self_unsafe-inline_external">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_self_unsafe-inline.php?total_num=3&amp;locator_key=id&amp;value=3</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if inline function eval works well when script-src is self, unsafe-inline, unsafe-eval." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_self_unsafe-inline_unsafe-eval">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_self_unsafe-inline_unsafe-eval.php?total_num=3&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if internal script works well when script-src is self, unsafe-inline, unsafe-eval." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_self_unsafe-inline_unsafe-eval_internal">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_self_unsafe-inline_unsafe-eval.php?total_num=3&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if cross origin eval function is unable to work when script-src is self, unsafe-inline, unsafe-eval." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_self_unsafe-inline_unsafe-eval_external">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_self_unsafe-inline_unsafe-eval.php?total_num=3&amp;locator_key=id&amp;value=3</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the internal script resource when script-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_asterisk_allowed_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_asterisk.php?total_num=2&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the external script resource when script-src is *." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_asterisk_allowed_ext">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_asterisk.php?total_num=2&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use the internal script resource when script-src is multi cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_cross-origin_multi_blocked">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_cross-origin_multi.php?total_num=3&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the first external script resource when script-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_cross-origin_multi_allowed_one">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_cross-origin_multi.php?total_num=3&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the second external script resource when script-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_cross-origin_multi_allowed_two">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_cross-origin_multi.php?total_num=3&amp;locator_key=id&amp;value=3</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use the internal script resource when script-src is cross-origin unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_cross-origin_unsafe-inline_blocked">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_cross-origin_unsafe-inline.php?total_num=3&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the external script resource when script-src is cross-origin unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_cross-origin_unsafe-inline_allowed">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_cross-origin_unsafe-inline.php?total_num=3&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use the not allowed external script resource when script-src is cross-origin unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_cross-origin_unsafe-inline_blocked_ext">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_cross-origin_unsafe-inline.php?total_num=3&amp;locator_key=id&amp;value=3</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the allowed external script resource when default-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_self_unsafe-line_allowed">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_self_unsafe-line.php?total_num=2&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use the internal script resource when script-src is self." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_self_unsafe-line_blocked">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_self_unsafe-line.php?total_num=2&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="default-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#default-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the eval script resource when default-src is unsafe-eval." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_unsafe-inline_unsafe-eval_allowed_int">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_unsafe-inline_unsafe-eval.php?total_num=2&amp;locator_key=id&amp;value=1</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the inline script resource when script-src is unsafe-eval." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="auto" priority="P2" id="csp_script-src_unsafe-inline_unsafe-eval_allowed_inline">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_unsafe-inline_unsafe-eval.php?total_num=2&amp;locator_key=id&amp;value=2</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use script resource when script-src is none." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_script-src_none">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual testcase: csp_script-src_none</step_desc>
+ <expected>To pass, if text 'PASS' appears below.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_none.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use the inline script resource when script-src is cross-origin." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_script-src_cross-origin">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual testcase: csp_script-src_cross-origin.</step_desc>
+ <expected>To pass, if text 'PASS' appears below.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_cross-origin.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the inline script resource when script-src is only unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_script-src_unsafe-inline_allowed">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual testcase: csp_script-src_unsafe-inline_allowed.</step_desc>
+ <expected>To pass, if text 'PASS' appears below.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_unsafe-inline_allowed.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use the inline script resource when there is no 'unsafe-inline' in script-src." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_script-src_cross-origin_block_inline">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual testcase: csp_script-src_cross-origin_block_inline.</step_desc>
+ <expected>To pass, if text 'PASS' appears below.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_cross-origin_block_inline.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the inline script called by event resource when script-src is only unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_script-src_unsafe-inline_allowed_event">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual testcase: csp_script-src_unsafe-inline_allowed_event.</step_desc>
+ <expected>To pass, if text 'PASS' appears below.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_unsafe-inline_allowed_event.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is able to use the inline script in iframe resource when script-src is only unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_script-src_unsafe-inline_allowed_iframe">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual testcase: csp_script-src_unsafe-inline_allowed_iframe.</step_desc>
+ <expected>To pass, if text 'PASS' appears below.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_unsafe-inline_allowed_iframe.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use the external script resource when script-src is only unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_script-src_unsafe-inline_blocked_ext">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual testcase: csp_script-src_unsafe-inline_blocked_ext.</step_desc>
+ <expected>To pass, if text 'PASS' appears below.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_unsafe-inline_blocked_ext.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if user agent is unable to use the internal script resource when script-src is only unsafe-inline." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 1.0 (Partial)" execution_type="manual" priority="P2" id="csp_script-src_unsafe-inline_blocked_int">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual testcase: csp_script-src_unsafe-inline_blocked_int.</step_desc>
+ <expected>To pass, if text 'PASS' appears below.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_script-src_unsafe-inline_blocked_int.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="script-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2012/CR-CSP-20121115/#script-src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ </set>
+ <set name="frame-ancestors_IOT" type="js">
+ <capabilities>
+ <capability name="http://tizen.org/feature/profile">
+ <value>COMMON</value>
+ </capability>
+ </capabilities>
+ <testcase purpose="Check user agent is able to use the sources that can embed the current page with embed tag" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-ancestors_embed_allowed">
+ <description>
+ <pre_condition>Connect to internet</pre_condition>
+ <steps>
+ <step order="1">
+ <step_desc>Click Run button, wait a few minutes</step_desc>
+ <expected>Test passes if there is a video can be displayed.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-ancestors_embed_allowed.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="frame-ancestors" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#directive-frame-ancestors</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check user agent is not able to use the sources that can embed the current page with embed tag" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="auto" priority="P2" id="csp_frame-ancestors_embed_blocked">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-ancestors_embed_blocked.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="frame-ancestors" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#directive-frame-ancestors</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check user agent is not able to use the sources that can embed the current page with applet tag" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="auto" priority="P2" id="csp_frame-ancestors_applet_blocked">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-ancestors_applet_blocked.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="frame-ancestors" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#directive-frame-ancestors</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check user agent is able to use the sources that can embed the current page with applet tag" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="auto" priority="P2" id="csp_frame-ancestors_applet_allowed">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-ancestors_applet_allowed.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="frame-ancestors" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#directive-frame-ancestors</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check user agent is able to use the sources that can embed the current page with frame tag." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-ancestors_frame_allowed">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual testcase: csp_frame-ancestors_frame_allowed.</step_desc>
+ <expected>Test passes if there is a filled green square.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-ancestors_frame_allowed.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="frame-ancestors" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#directive-frame-ancestors</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check user agent is not able to use the sources that can embed the current page with frame tag." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-ancestors_frame_blocked">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual testcase: csp_frame-ancestors_frame_blocked.</step_desc>
+ <expected>Test passes if there is no red.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-ancestors_frame_blocked.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="frame-ancestors" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#directive-frame-ancestors</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check user agent is able to use the sources that can embed the current page with iframe tag." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-ancestors_iframe_allowed">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual testcase: csp_frame-ancestors_iframe_allowed.</step_desc>
+ <expected>Test passes if there is a filled green square.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-ancestors_iframe_allowed.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="frame-ancestors" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#directive-frame-ancestors</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check user agent is not able to use the sources that can embed the current page with iframe tag." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="manual" priority="P2" id="csp_frame-ancestors_iframe_blocked">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Click Run button</step_desc>
+ <expected>Nothing should happen, since iframe is blocked</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_frame-ancestors_iframe_blocked.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="frame-ancestors" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#directive-frame-ancestors</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ </set>
+ <set name="base-uri_IOT" type="js">
+ <capabilities>
+ <capability name="http://tizen.org/feature/profile">
+ <value>COMMON</value>
+ </capability>
+ </capabilities>
+ <testcase purpose="Check user agent is able to use the URLs that can appear in a page's base element." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="manual" priority="P2" id="csp_base-uri_allowed">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual testcase: csp_base-uri_allowed.</step_desc>
+ <expected>Test passes if there is a filled blue square.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_base-uri_allowed.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="base-uri" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#directive-base-uri</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check user agent is not able to use the URLs that can appear in a page's base element." type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="manual" priority="P2" id="csp_base-uri_blocked">
+ <description>
+ <pre_condition>Connect to PHP server</pre_condition>
+ <post_condition/>
+ <steps>
+ <step order="1">
+ <step_desc>Run the manual testcase: csp_base-uri_blocked.</step_desc>
+ <expected>Test passes if there is no red.</expected>
+ </step>
+ </steps>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_base-uri_blocked.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="base-uri" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#directive-base-uri</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ </set>
+ <set name="form-action_IOT" type="js">
+ <capabilities>
+ <capability name="http://tizen.org/feature/profile">
+ <value>COMMON</value>
+ </capability>
+ </capabilities>
+ <testcase purpose="Check user agent is not able to submit from form tags" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="auto" priority="P2" id="csp_form-action_blocked">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_form-action_blocked.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="form-action" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#directive-form-action</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check user agent is able to submit from form tags" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="auto" priority="P2" id="csp_form-action_allowed">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_form-action_allowed.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="form-action" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#directive-form-action</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ </set>
+ <set name="child-src_IOT" type="js">
+ <capabilities>
+ <capability name="http://tizen.org/feature/profile">
+ <value>COMMON</value>
+ </capability>
+ </capabilities>
+ <testcase purpose="Check user agent is not able to enable embedding source" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="auto" priority="P2" id="csp_child-src_blocked">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_child-src_blocked.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="child-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#child_src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check user agent is able to enable embedding source" type="compliance" status="approved" component="W3C_HTML5 APIs/Security/Content Security Policy 2.0 (Partial)" execution_type="auto" priority="P2" id="csp_child-src_allowed">
+ <description>
+ <test_script_entry test_script_expected_result="0">http://127.0.0.1:8080/opt/tct-csp-w3c-tests/csp/csp_child-src_allowed.php</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion element_type="attribute" element_name="child-src" interface="Content-Security-Policy" specification="Content Security Policy" section="TBD" category="Tizen W3C API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/CR-CSP2-20150721/#child_src</spec_url>
+ </spec>
+ </specs>
+ </testcase>
+ </set>
</suite>
-</test_definition>
+</test_definition>
\ No newline at end of file
</spec>
</specs>
</testcase>
- <!--<testcase purpose="Check if focus method of WindowClient exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="WindowClient_focus_exist">
+ <testcase purpose="check if caches attribute of Window exist ,has CacheStorage type and readonly." type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Window_caches_attribute">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Window_caches_attribute.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Window" element_type="attribute" element_name="caches" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if get method of Clients work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Clients_get">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Clients_get.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Clients" element_type="method" element_name="get" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if get method of Clients work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/" execution_type="auto" priority="P0" id="Clients_get_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Clients_get_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Clients" element_type="method" element_name="get" specification="" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ </set>
+ <set name="ServiceWorkers_IOT" type="js">
+ <capabilities>
+ <capability name="http://tizen.org/feature/profile">
+ <value>COMMON</value>
+ </capability>
+ </capabilities>
+ <testcase purpose="check if delete method of CacheStorage work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="CacheStorage_delete">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_delete.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="CacheStorage" element_type="method" element_name="delete" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if delete method of CacheStorage exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="CacheStorage_delete_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_delete_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="CacheStorage" element_type="method" element_name="delete" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check delete mehtod should throw exception without mandatory argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P2" id="CacheStorage_delete_misarg">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_delete_misarg.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="CacheStorage" element_type="method" element_name="delete" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if CacheStorage exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="CacheStorage_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="CacheStorage" usage="true" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if has method of CacheStorage work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="CacheStorage_has">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_has.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="CacheStorage" element_type="method" element_name="has" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if has method of CacheStorage exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="CacheStorage_has_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_has_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="CacheStorage" element_type="method" element_name="has" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check has mehtod should throw exception without mandatory argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P2" id="CacheStorage_has_misarg">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_has_misarg.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="CacheStorage" element_type="method" element_name="has" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if keys method of CacheStorage work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/" execution_type="auto" priority="P1" id="CacheStorage_keys">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_keys.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="CacheStorage" element_type="method" element_name="keys" specification="" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if keys method of CacheStorage exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="CacheStorage_keys_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_keys_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="CacheStorage" element_type="method" element_name="keys" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if match method of CacheStorage work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="CacheStorage_match">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_match.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="CacheStorage" element_type="method" element_name="match" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if match method of CacheStorage exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="CacheStorage_match_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_match_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="CacheStorage" element_type="method" element_name="match" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check match mehtod should throw exception without mandatory argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P2" id="CacheStorage_match_misarg">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_match_misarg.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="CacheStorage" element_type="method" element_name="match" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if match method of CacheStorage work properly with optional argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="CacheStorage_match_with_options">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_match_with_options.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="CacheStorage" element_type="method" element_name="match" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if open method of CacheStorage work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="CacheStorage_open">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_open.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="CacheStorage" element_type="method" element_name="open" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if open method of CacheStorage exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="CacheStorage_open_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_open_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="CacheStorage" element_type="method" element_name="open" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check open mehtod should throw exception without mandatory argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P2" id="CacheStorage_open_misarg">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/CacheStorage_open_misarg.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="CacheStorage" element_type="method" element_name="open" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if add method work propery" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Cache_add">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_add.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Cache" element_type="method" element_name="add" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if addAll method work propery" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Cache_addAll">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_addAll.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Cache" element_type="method" element_name="addAll" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if addAll method exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="Cache_addAll_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_addAll_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Cache" element_type="method" element_name="addAll" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check addAll method should throw exception without mandatory argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/" execution_type="auto" priority="P2" id="Cache_addAll_misarg">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_addAll_misarg.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Cache" element_type="method" element_name="addAll" specification="" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if add method of Cache exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="Cache_add_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_add_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Cache" element_type="method" element_name="add" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check add method should throw exception without mandatory argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P2" id="Cache_add_misarg">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_add_misarg.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Cache" element_type="method" element_name="add" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if delete method work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Cache_delete">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_delete.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Cache" element_type="method" element_name="delete" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if delete method exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="Cache_delete_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_delete_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Cache" element_type="method" element_name="delete" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if delete method work properly without mandtory argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Cache_delete_misarg">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_delete_misarg.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Cache" element_type="method" element_name="delete" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if delete method of Cache work properly with optional argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Cache_delete_with_options">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_delete_with_options.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Cache" element_type="method" element_name="delete" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if Cache exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Cache_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Cache" element_type="constructor" element_name="Cache" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if keys method of Cache work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Cache_keys">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_keys.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Cache" element_type="method" element_name="keys" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if keys method of Cache exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="Cache_keys_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_keys_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Cache" element_type="method" element_name="keys" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if keys method of Cache work properly with optional argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Cache_keys_with_options">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_keys_with_options.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Cache" element_type="method" element_name="keys" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if match work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Cache_match">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_match.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Cache" element_type="method" element_name="match" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if matchAll method work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Cache_matchAll">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_matchAll.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Cache" element_type="method" element_name="matchAll" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if matchAll exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="Cache_matchAll_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_matchAll_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Cache" element_type="method" element_name="matchAll" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if matchAll method work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Cache_matchAll_with_options">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_matchAll_with_options.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Cache" element_type="method" element_name="matchAll" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if match method of Cache exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="Cache_match_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_match_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Cache" element_type="method" element_name="match" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if match work properly with optional argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Cache_match_with_options">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_match_with_options.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Cache" element_type="method" element_name="match" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if put method work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Cache_put">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_put.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Cache" element_type="method" element_name="put" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if put method exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="Cache_put_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_put_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Cache" element_type="method" element_name="put" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if put method throw exception without mandatory argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P2" id="Cache_put_misarg">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_put_misarg.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Cache" element_type="method" element_name="put" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if put method throw exception with invalid request" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P2" id="Cache_put_request_invalid">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_put_request_invalid.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Cache" element_type="method" element_name="put" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if put method throw exception with invalid response" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P2" id="Cache_put_response_invalid">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Cache_put_response_invalid.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Cache" element_type="method" element_name="put" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="checki if Client exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Client_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Client_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Client" usage="true" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check frameType attribute of Client" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Client_frameType_attribute">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Client_frameType_attribute.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Client" element_type="attribute" element_name="frameType" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check id attribute of Client" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Client_id_attribute">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Client_id_attribute.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Client" element_type="attribute" element_name="id" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if postMessage method of Client work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Client_postMessage">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Client_postMessage.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Client" element_type="method" element_name="postMessage" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if postMessage method of Client exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="Client_postMessage_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Client_postMessage_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Client" element_type="method" element_name="postMessage" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check Client attribute of Client" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Client_url_attribute">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Client_url_attribute.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Client" element_type="attribute" element_name="url" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if claim method of Clients work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Clients_claim">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Clients_claim.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Clients" element_type="method" element_name="claim" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if claim method of Clients exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="Clients_claim_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Clients_claim_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Clients" element_type="method" element_name="claim" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if matchAll method of Clients work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Clients_matchAll">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Clients_matchAll.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Clients" element_type="method" element_name="matchAll" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if matchAll method of Clients work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/" execution_type="auto" priority="P0" id="Clients_matchAll_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Clients_matchAll_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Clients" element_type="method" element_name="matchAll" specification="" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if openWindow method of Clients exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="Clients_openWindow_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Clients_openWindow_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Clients" element_type="method" element_name="openWindow" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if the constructor of ExtendableEvent work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ExtendableEvent_constructor">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ExtendableEvent_constructor.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ExtendableEvent" element_type="constructor" element_name="ExtendableEvent" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if waitUntil method of ExtendableEvent work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorker" execution_type="auto" priority="P1" id="ExtendableEvent_waitUntil">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ExtendableEvent_waitUntil.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ExtendableEvent" element_type="method" element_name="waitUntil" specification="ServiceWorker" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if waitUntil of ExtendableEvent throw exception" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorker" execution_type="auto" priority="P2" id="ExtendableEvent_waitUntil_InvalidStateError">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ExtendableEvent_waitUntil_InvalidStateError.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ExtendableEvent" element_type="method" element_name="waitUntil" specification="ServiceWorker" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if waitUntil method of ExtendableEvent exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="ExtendableEvent_waitUntil_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ExtendableEvent_waitUntil_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ExtendableEvent" element_type="method" element_name="waitUntil" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if the constructor of FetchEvent work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="FetchEvent_constructor">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/FetchEvent_constructor.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="FetchEvent" element_type="constructor" element_name="FetchEvent" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check isReload attribute of FetchEvent" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="FetchEvent_isReload_attribute">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/FetchEvent_isReload_attribute.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="FetchEvent" element_type="attribute" element_name="isReload" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check request attribute of FetchEvent" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="FetchEvent_request_attribute">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/FetchEvent_request_attribute.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="FetchEvent" element_type="attribute" element_name="request" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if respondWith of FetchEvent work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/" execution_type="auto" priority="P1" id="FetchEvent_respondWith">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/FetchEvent_respondWith.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="FetchEvent" element_type="method" element_name="respondWith" specification="" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if respondWith method FetchEvent exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="FetchEvent_respondWith_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/FetchEvent_respondWith_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="FetchEvent" element_type="method" element_name="respondWith" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if Navigator exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Navigator_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Navigator_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Navigator" usage="true" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if attribute serviceWorker of navigator exists, has type ServiceWorkerContainer and is readonly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Navigator_serviceWorker_attribute">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Navigator_serviceWorker_attribute.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="Navigator" element_type="attribute" element_name="serviceWorker" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if attribute controller of ServiceWorkerContainer exists, has type ServiceWorker and is readonly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerContainer_controller_attribute">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerContainer_controller_attribute.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerContainer" element_type="attribute" element_name="controller" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if ServiceWorkerContainer exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="ServiceWorkerContainer_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerContainer_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerContainer" usage="true" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if getRegistration method work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerContainer_getRegistration">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerContainer_getRegistration.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerContainer" element_type="method" element_name="getRegistration" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if getRegistration exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="ServiceWorkerContainer_getRegistration_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerContainer_getRegistration_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerContainer" element_type="method" element_name="getRegistration" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if getRegistration method work properly with optional argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerContainer_getRegistration_with_documentURL">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerContainer_getRegistration_with_documentURL.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerContainer" element_type="method" element_name="getRegistration" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if getRegistrations method work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerContainer_getRegistrations">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerContainer_getRegistrations.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerContainer" element_type="method" element_name="getRegistrations" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="checkn if getRegistrations exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="ServiceWorkerContainer_getRegistrations_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerContainer_getRegistrations_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerContainer" element_type="method" element_name="getRegistrations" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if attribute oncontrollerchange of ServiceWorkerContainer exists, has type function and is writeable" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerContainer_oncontrollerchange_attribute">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerContainer_oncontrollerchange_attribute.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerContainer" element_type="attribute" element_name="oncontrollerchange" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if attribute onmessage of ServiceWorkerContainer exists, has type function and is writeable" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerContainer_onmessage_attribute">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerContainer_onmessage_attribute.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerContainer" element_type="attribute" element_name="onmessage" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if attribute ready of ServiceWorkerContainer exists, has type object and is readonly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerContainer_ready_attribute">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerContainer_ready_attribute.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerContainer" element_type="attribute" element_name="ready" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if register method work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerContainer_register">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerContainer_register.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerContainer" element_type="method" element_name="register" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if register exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="ServiceWorkerContainer_register_exist">
<description>
- <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/WindowClient_focus_exist.html</test_script_entry>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerContainer_register_exist.html</test_script_entry>
</description>
<specs>
<spec>
- <spec_assertion interface="WindowClient" element_type="method" element_name="focus" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_assertion interface="ServiceWorkerContainer" element_type="method" element_name="register" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
<spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
<spec_statement>TBD</spec_statement>
</spec>
</specs>
</testcase>
- <testcase purpose="check if focused attribute of WindowClient exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="WindowClient_focused_attribute">
+ <testcase purpose="check if register method work properly with optional argument" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerContainer_register_with_options">
<description>
- <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/WindowClient_focused_attribute.html</test_script_entry>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerContainer_register_with_options.html</test_script_entry>
</description>
<specs>
<spec>
- <spec_assertion interface="WindowClient" element_type="attribute" element_name="focused" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_assertion interface="ServiceWorkerContainer" element_type="method" element_name="register" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
<spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
<spec_statement>TBD</spec_statement>
</spec>
</specs>
</testcase>
- <testcase purpose="check if navigate method of WindowClient exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/" execution_type="auto" priority="P0" id="WindowClient_navigate_exist">
+ <testcase purpose="check if attribute clients of ServiceWorkerGlobalScope exists, has type Clients and is readonly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerGlobalScope_clients_attribute">
<description>
- <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/WindowClient_navigate_exist.html</test_script_entry>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerGlobalScope_clients_attribute.html</test_script_entry>
</description>
<specs>
<spec>
- <spec_assertion interface="WindowClient" element_type="method" element_name="navigate" specification="" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_assertion interface="ServiceWorkerGlobalScope" element_type="attribute" element_name="clients" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
<spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
<spec_statement>TBD</spec_statement>
</spec>
</specs>
</testcase>
- <testcase purpose="check if visibilityState attribute of WindowClient exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="WindowClient_visibilityState_attribute">
+ <testcase purpose="check if ServiceWorkerGlobalScope exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerGlobalScope_exist">
<description>
- <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/WindowClient_visibilityState_attribute.html</test_script_entry>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerGlobalScope_exist.html</test_script_entry>
</description>
<specs>
<spec>
- <spec_assertion interface="WindowClient" element_type="attribute" element_name="visibilityState" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_assertion interface="ServiceWorkerGlobalScope" usage="true" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
<spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
<spec_statement>TBD</spec_statement>
</spec>
</specs>
- </testcase>-->
+ </testcase>
+ <testcase purpose="check if fetch method of ServiceWorkerGlobalScope exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/" execution_type="auto" priority="P0" id="ServiceWorkerGlobalScope_fetch_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerGlobalScope_fetch_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerGlobalScope" element_type="method" element_name="fetch" specification="" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if attribute onactivate of ServiceWorkerGlobalScope exists, has type object and is writeable" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerGlobalScope_onactivate_attribute">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerGlobalScope_onactivate_attribute.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerGlobalScope" element_type="attribute" element_name="onactivate" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if attribute onfetch of ServiceWorkerGlobalScope exists, has type object and is writeable" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerGlobalScope_onfetch_attribute">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerGlobalScope_onfetch_attribute.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerGlobalScope" element_type="attribute" element_name="onfetch" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if attribute oninstall of ServiceWorkerGlobalScope exists, has type object and is writeable" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerGlobalScope_oninstall_attribute">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerGlobalScope_oninstall_attribute.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerGlobalScope" element_type="attribute" element_name="oninstall" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if attribute onmessage of ServiceWorkerGlobalScope exists, has type object and is writeable" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/" execution_type="auto" priority="P1" id="ServiceWorkerGlobalScope_onmessage_attribute">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerGlobalScope_onmessage_attribute.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerGlobalScope" element_type="attribute" element_name="onmessage" specification="" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if attribute registration of ServiceWorkerGlobalScope exists, has type ServiceWorkerRegistration and is readonly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerGlobalScope_registration_attribute">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerGlobalScope_registration_attribute.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerGlobalScope" element_type="attribute" element_name="registration" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if skipWaiting method of ServiceWorkerGlobalScope work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerGlobalScope_skipWaiting">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerGlobalScope_skipWaiting.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerGlobalScope" element_type="method" element_name="skipWaiting" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if skipWaiting method of ServiceWorkerGlobalScope exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="ServiceWorkerGlobalScope_skipWaiting_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerGlobalScope_skipWaiting_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerGlobalScope" element_type="method" element_name="skipWaiting" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if attribute active of ServiceWorkerRegistration exists, has type ServiceWorker and is readonly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerRegistration_active_attribute">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerRegistration_active_attribute.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerRegistration" element_type="attribute" element_name="active" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if ServiceWorkerRegistration exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerRegistration_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerRegistration_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerRegistration" usage="true" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if attribute installing of ServiceWorkerRegistration exists, has type ServiceWorker and is readonly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerRegistration_installing_attribute">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerRegistration_installing_attribute.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerRegistration" element_type="attribute" element_name="installing" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if attribute onupdatefound of ServiceWorkerRegistration exists, has type function and is writeable" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerRegistration_onupdatefound_attribute">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerRegistration_onupdatefound_attribute.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerRegistration" element_type="attribute" element_name="onupdatefound" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if attribute scope of ServiceWorkerRegistration exists, has type ServiceWorker and is readonly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerRegistration_scope_attribute">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerRegistration_scope_attribute.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerRegistration" element_type="attribute" element_name="scope" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if unregister method work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerRegistration_unregister">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerRegistration_unregister.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerRegistration" element_type="method" element_name="unregister" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if unregister exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="ServiceWorkerRegistration_unregister_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerRegistration_unregister_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerRegistration" element_type="method" element_name="unregister" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if update work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerRegistration_update">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerRegistration_update.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerRegistration" element_type="method" element_name="update" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if update exist" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P0" id="ServiceWorkerRegistration_update_exist">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerRegistration_update_exist.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerRegistration" element_type="method" element_name="update" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="Check if attribute waiting of ServiceWorkerRegistration exists, has type ServiceWorker and is readonly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="ServiceWorkerRegistration_waiting_attribute">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/ServiceWorkerRegistration_waiting_attribute.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="ServiceWorkerRegistration" element_type="attribute" element_name="waiting" specification="ServiceWorkers" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
+ <testcase purpose="check if focus method of WindowClient work properly" type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorker" execution_type="auto" priority="P1" id="WindowClient_focus">
+ <description>
+ <test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/WindowClient_focus.html</test_script_entry>
+ </description>
+ <specs>
+ <spec>
+ <spec_assertion interface="WindowClient" element_type="method" element_name="focus" specification="ServiceWorker" section="TBD" category="Tizen Device API Specifications"/>
+ <spec_url>http://www.w3.org/TR/2015/WD-service-workers-20150625/</spec_url>
+ <spec_statement>TBD</spec_statement>
+ </spec>
+ </specs>
+ </testcase>
<testcase purpose="check if caches attribute of Window exist ,has CacheStorage type and readonly." type="compliance" status="approved" component="W3C_HTML5 APIs/TBD/ServiceWorkers" execution_type="auto" priority="P1" id="Window_caches_attribute">
<description>
<test_script_entry>/opt/tct-serviceworkers-w3c-tests/serviceworkers/Window_caches_attribute.html</test_script_entry>