metasploit-framework/lib/rex/proto/http
James Lee 7ea5f87960 Allow proper ruby types for evasion configuration
At some point in the distant past, the datastore was all strings and the
various option types got parsed out in the appropriate places. Then, in
the somewhat more recent past, the options started getting converted to
regular ruby types (such as TrueClass for a BOOL options, etc) earlier
in their life.  Apparently, that change broke boolean http evasions.
This commit fixes them by ensuring that +true+ is just as acceptable as
"true".

Fixes #6198, thanks Ashish for the report
2012-01-06 20:05:29 -07:00
..
handler add ability to use arbitrary certs with SSL server sockets. 2011-05-20 23:12:35 +00:00
client.rb Allow proper ruby types for evasion configuration 2012-01-06 20:05:29 -07:00
client.rb.ut.rb fix this unit test 2010-08-18 22:36:13 +00:00
handler.rb Code cleanups 2008-10-19 21:03:39 +00:00
header.rb Adds a Burp Session XML parser and importer. Also includes fix to Rex's HTTP header parser to ensure that it uses only unencoded regexes. 2011-06-03 21:17:57 +00:00
header.rb.ut.rb Code cleanups 2008-10-19 21:03:39 +00:00
packet.rb Merge in recent meterpreter work. These are not the commits you are looking for (more info on what all this is later this week). 2011-06-28 21:26:43 +00:00
packet.rb.ut.rb Code cleanups 2008-10-19 21:03:39 +00:00
request.rb Replace += with << for Strings in a bunch of places. 2009-03-08 07:55:47 +00:00
request.rb.ut.rb Code cleanups 2008-10-19 21:03:39 +00:00
response.rb Store the http request in the http response object when Rex::HTTP::Client.send_recv() is used. Let Anemone store the request as well, passing it into the Page object for further analysis. 2010-11-13 05:25:39 +00:00
response.rb.ut.rb Test case update 2009-06-26 03:01:11 +00:00
server.rb Only override the server header if the caller didn't already provide one. 2011-05-25 01:51:09 +00:00
server.rb.ut.rb Code cleanups 2008-10-19 21:03:39 +00:00