This makes the tests succeed when using --disable-proxy.
Closes https://github.com/curl/curl/pull/4488
<features>
!SSPI
crypto
+proxy
</features>
<name>
HTTP PUT with Digest auth, resumed upload and modified method, twice
NTLM
!SSPI
debug
+proxy
</features>
<name>
HTTP proxy CONNECT auth NTLM with chunked-encoded 407 response
NTLM
!SSPI
debug
+proxy
</features>
<name>
HTTP proxy CONNECT with any proxyauth and proxy offers NTLM and close
<client>
<features>
ftp
+proxy
</features>
<server>
http
<features>
!SSPI
crypto
+proxy
</features>
<name>
HTTP proxy CONNECT auth Digest, large headers and data
<features>
!SSPI
crypto
+proxy
</features>
<name>
HTTP proxy CONNECT auth Digest, large headers and chunked data
</server>
<features>
ftp
+proxy
</features>
<name>
FTP over HTTP proxy with downgrade to HTTP 1.0
<command>
--proxy1.0 %HOSTIP:%PROXYPORT -p http://%HOSTIP.1078:%HTTPPORT/we/want/that/page/1078 http://%HOSTIP.1078:%HTTPPORT/we/want/that/page/1078
</command>
+<features>
+proxy
+</features>
</client>
#
<command>
http://first.host.it.is/we/want/that/page/10871000 -x %HOSTIP:%HTTPPORT --user iam:myself --location --anyauth
</command>
+<features>
+proxy
+</features>
</client>
#
<command>
http://first.host.it.is/we/want/that/page/10881000 -x %HOSTIP:%HTTPPORT --user iam:myself --location-trusted --anyauth
</command>
+<features>
+proxy
+</features>
</client>
#
</server>
<features>
ftp
+proxy
</features>
<name>
FTP with type=i over HTTP proxy
<features>
http
ftp
+proxy
</features>
<name>
FTP RETR twice over proxy confirming persistent connection
<command>
http://%HOSTIP:%HTTPPORT/want/1104 -L -x %HOSTIP:%HTTPPORT -c log/cookies1104.jar
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<client>
<features>
ftp
+proxy
</features>
<server>
http
<client>
<features>
PSL
+proxy
</features>
<server>
http
<command>
%HOSTIP:%HTTPPORT/want/1141 -L -x http://%HOSTIP:%HTTPPORT
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<command>
%HOSTIP:%HTTPPORT/want/1142 -L -x http://%HOSTIP:%HTTPPORT
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<command>
--proxy http://%HOSTIP:%HTTPPORT http://test.remote.example.com.1150:150/path http://test.remote.example.com.1150:1234/path/
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<command>
-x %HOSTIP:%HTTPPORT we.want.that.site.com.1213
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<command>
-x %HOSTIP:%HTTPPORT http://we.want.that.site.com.1214?moo=foo
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
NTLM
!SSPI
debug
+proxy
</features>
<server>
http
example.fake FALSE /c FALSE 2139150993 moo2 indeed
example.fake TRUE /c FALSE 2139150993 moo3 indeed
</file>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<command>
http://example.fake/c/1218 http://example.fake/c/1218 http://bexample.fake/c/1218 -b nonexisting -x %HOSTIP:%HTTPPORT
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<command>
http://example.fake/hoge/1228 http://example.fake/hogege/ -b nonexisting -x %HOSTIP:%HTTPPORT
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<client>
<features>
ipv6
+proxy
</features>
<server>
http-proxy
<command>
--proxy http://%HOSTIP:%HTTPPORT http://test.remote.haxx.se.1232:8990/../../hej/but/who/../1232?stupid=me/../1232#soo/../1232 http://test.remote.haxx.se.1232:8990/../../hej/but/who/../12320001#/../12320001
</command>
+<features>
+proxy
+</features>
</client>
#
<command>
--path-as-is --proxy http://%HOSTIP:%HTTPPORT http://test.remote.haxx.se.1241:8990/../../hej/but/who/../1241?stupid=me/../1241#soo/../1241 http://test.remote.haxx.se.1241:8990/../../hej/but/who/../12410001#/../12410001
</command>
+<features>
+proxy
+</features>
</client>
#
<command>
--proxy http://%HOSTIP:%HTTPPORT http://test.remote.haxx.se.1246:%HTTPPORT#@127.0.0.1/tricked.html no-scheme-url.com.1246:%HTTPPORT#@127.127.127.127/again.html
</command>
+<features>
+proxy
+</features>
</client>
#
<command>
http://somewhere.example.com/1253 --proxy http://%HOSTIP:%HTTPPORT --noproxy %HOSTIP
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<command>
http://somewhere.example.com/1254 --proxy http://%HOSTIP:%HTTPPORT --noproxy ""
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<command>
http://somewhere.example.com/1256 --noproxy %HOSTIP
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<command>
http://somewhere.example.com/1257 --noproxy ""
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<command>
-v --proxytunnel -x %HOSTIP:%PROXYPORT http://test.1287:%HTTPPORT/we/want/that/page/1287
</command>
+<features>
+proxy
+</features>
</client>
#
<command>
--proxytunnel --suppress-connect-headers --dump-header - --include --write-out "\nCONNECT CODE: %{http_connect}\nRECEIVED HEADER BYTE TOTAL: %{size_header}\n" --proxy %HOSTIP:%PROXYPORT http://%HOSTIP.1288:%HTTPPORT/we/want/that/page/1288
</command>
+<features>
+proxy
+</features>
</client>
#
<command>
http://firstplace.example.com/want/1314 -L -x http://%HOSTIP:%HTTPPORT
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
</server>
<features>
http
+proxy
</features>
<name>
POP3 fetch tunneled through HTTP proxy
</server>
<features>
http
+proxy
</features>
<name>
SMTP send tunneled through HTTP proxy
</server>
<features>
http
+proxy
</features>
<name>
IMAP FETCH tunneled through HTTP proxy
<command>
http://%HOSTIP:%HTTPPORT/we/want/that/page/1329 -x "/server"
</command>
+<features>
+proxy
+</features>
</client>
#
<command>
-U myname:mypassword -x %HOSTIP:%HTTPPORT http://z.x.com/1331 --proxy-anyauth -c log/dump1331
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<command>
http://example.com/we/want/1415 -b none -c log/jar1415.txt -x %HOSTIP:%HTTPPORT
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<command>
--proxy http://%HOSTIP:%HTTPPORT http://test.remote.haxx.se.1421:8990/ http://different.remote.haxx.se.1421:8990
</command>
+<features>
+proxy
+</features>
</client>
#
<command>
http://test.1428:%HTTPPORT/we/want/that/page/1428 -p -x %HOSTIP:%PROXYPORT --user 'iam:my:;self' --header "header-type: server" --proxy-header "header-type: proxy"
</command>
+<features>
+proxy
+</features>
</client>
#
</server>
<features>
http
+proxy
</features>
<name>
Provide illegal proxy name
<command>
http://%HOSTIP:%HTTPPORT/1455 --haproxy-protocol
</command>
+<features>
+proxy
+</features>
</client>
#
<command>
-g "http://%HOST6IP:%HTTP6PORT/1456" --local-port 44444 --haproxy-protocol
</command>
+<features>
+proxy
+</features>
</client>
#
<tool>
lib1509
</tool>
-
+<features>
+proxy
+</features>
<name>
simple multi http:// through proxytunnel with authentication info
</name>
<command>
http://the.old.moo.1525:%HTTPPORT/1525 %HOSTIP:%PROXYPORT
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<command>
http://the.old.moo.1526:%HTTPPORT/1526 %HOSTIP:%PROXYPORT
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<command>
http://the.old.moo.1527:%HTTPPORT/1527 %HOSTIP:%PROXYPORT
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<command>
http://the.old.moo:%HTTPPORT/1528 %HOSTIP:%PROXYPORT
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<command>
"http://the.old.moo:%HTTPPORT/1529" %HOSTIP:%PROXYPORT
</command>
+<features>
+proxy
+</features>
</client>
# it should be detected and an error should be reported
<command>
-U fake@user:loooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooong -x %HOSTIP:%HTTPPORT http://we.want.that.site.com/16
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<features>
NTLM
!SSPI
+proxy
</features>
<server>
http
</server>
<features>
idn
+proxy
</features>
<setenv>
LC_ALL=
<features>
!SSPI
crypto
+proxy
</features>
<name>
HTTP with proxy-requiring-Basic to site-requiring-Digest
<features>
!SSPI
crypto
+proxy
</features>
<name>
HTTP with proxy-requiring-Digest to site-requiring-Digest
NTLM
!SSPI
debug
+proxy
</features>
<name>
HTTP with proxy-requiring-NTLM to site-requiring-Digest
<features>
NTLM
!SSPI
+proxy
</features>
<name>
HTTP POST with --proxy-ntlm and no SSL with no response
<command>
-c log/jar171 -x %HOSTIP:%HTTPPORT http://z.x.com/171
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
supertrooper.fake FALSE /b FALSE 0 moo1 indeed
supertrooper.fake FALSE /c FALSE 2139150993 moo2 indeed
</file>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<command>
http://deathstar.another.galaxy/183 http://a.galaxy.far.far.away/183 --proxy http://%HOSTIP:%HTTPPORT
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<command>
http://deathstar.another.galaxy/184 -L -H "Host: another.visitor.stay.a.while.stay.foreeeeeever" --proxy http://%HOSTIP:%HTTPPORT
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<command>
http://deathstar.another.galaxy/185 -L -H "Host: another.visitor.stay.a.while.stay.foreeeeeever" --proxy http://%HOSTIP:%HTTPPORT
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<command>
http://test.1904:%HTTPPORT/we/want/that/page/1904 -p --proxy %HOSTIP:%PROXYPORT
</command>
+<features>
+proxy
+</features>
</client>
#
<command>
http://www.example.com.2050/2050 --connect-to ::connect.example.com.2050:%HTTPPORT -x %HOSTIP:%PROXYPORT
</command>
+<features>
+proxy
+</features>
</client>
#
<name>
Connect to specific host via SOCKS proxy and HTTP proxy (switch to tunnel mode automatically)
</name>
-
+<features>
+proxy
+</features>
<command>
http://www.example.com.2055/2055 --connect-to ::connect.example.com.2055:%HTTPPORT -x %HOSTIP:%PROXYPORT --preproxy socks5://%HOSTIP:%SOCKSPORT
</command>
<features>
!SSPI
crypto
+proxy
</features>
<name>
HTTP POST --digest with PUT, resumed upload, modified method and SHA-256
<features>
!SSPI
crypto
+proxy
</features>
<name>
HTTP POST --digest with PUT, resumed upload, modified method, SHA-512-256 and userhash=true
<features>
!SSPI
crypto
+proxy
</features>
<name>
HTTP proxy CONNECT auth Digest
<features>
!SSPI
crypto
+proxy
</features>
<name>
HTTP POST --digest with PUT, resumed upload, modified method, SHA-512-256 and userhash=false
</server>
<features>
ftp
+proxy
</features>
<name>
HTTP PUT to a FTP URL with username+password - over HTTP proxy
NTLM
!SSPI
debug
+proxy
</features>
<name>
HTTP proxy CONNECT auth NTLM
NTLM
!SSPI
debug
+proxy
</features>
<name>
HTTP 1.0 proxy CONNECT auth NTLM and then POST
<command>
http://test.remote.example.com.217:%HTTPPORT/path/2170002 --proxy http://%HOSTIP:%HTTPPORT --proxytunnel -w "%{http_code} %{http_connect}\n"
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
</server>
<features>
http
+proxy
</features>
<name>
try using proxy with unsupported scheme
<command>
http://first.host.it.is/we/want/that/page/233 -x %HOSTIP:%HTTPPORT --user iam:myself --proxy-user testing:this --location
</command>
+<features>
+proxy
+</features>
</client>
#
<command>
http://first.host.it.is/we/want/that/page/234 -x %HOSTIP:%HTTPPORT --user iam:myself --proxy-user testing:this --location-trusted
</command>
+<features>
+proxy
+</features>
</client>
#
NTLM
!SSPI
debug
+proxy
</features>
<name>
HTTP proxy-auth NTLM and then POST
NTLM
!SSPI
debug
+proxy
</features>
<name>
HTTP POST with --proxy-anyauth, picking NTLM
This text is here to simulate a partly downloaded file to resume
download on.
</file>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<command>
http://supersite.com/want/257 -L -x http://%HOSTIP:%HTTPPORT --netrc-optional --netrc-file log/netrc257
</command>
-
+<features>
+proxy
+</features>
# netrc auth for two out of three sites:
<file name="log/netrc257">
machine supersite.com login user1 password passwd1
<features>
!SSPI
crypto
+proxy
</features>
<name>
HTTP POST multipart without Expect: header using proxy anyauth (Digest)
<features>
!SSPI
crypto
+proxy
</features>
<name>
HTTP POST multipart with Expect: header using proxy anyauth (Digest)
<client>
<features>
ipv6
+proxy
</features>
<server>
http-ipv6
<command>
http://we.want.that.site.com/264 -x http://f%61ke:user@%HOSTIP:%HTTPPORT
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
NTLM
!SSPI
debug
+proxy
</features>
<name>
HTTP proxy CONNECT auth NTLM and then POST, response-body in the 407
<command>
http://remotesite.com.275:%HTTPPORT/we/want/that/page/275 -p -x %HOSTIP:%PROXYPORT --user iam:myself --proxy-user youare:yourself http://remotesite.com.275:%HTTPPORT/we/want/that/page/275
</command>
+<features>
+proxy
+</features>
</client>
#
<command>
http://we.want.that.site.com/278 -x http://f%61ke:@%HOSTIP:%HTTPPORT
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<command>
http://we.want.that.site.com/279 -x http://f%61ke@%HOSTIP:%HTTPPORT
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<command>
http://test.remote.example.com.287:%HTTPPORT/path/287 -H "User-Agent: looser/2015" --proxy http://%HOSTIP:%HTTPPORT --proxytunnel --proxy-header "User-Agent: looser/2007"
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
</server>
<features>
ftp
+proxy
</features>
<name>
FTP over HTTP proxy with user:pass not in url
<command>
http://first.host.it.is/we/want/that/page/317 -x %HOSTIP:%HTTPPORT -H "Authorization: s3cr3t" --proxy-user testing:this --location
</command>
+<features>
+proxy
+</features>
</client>
#
<command>
http://first.host.it.is/we/want/that/page/318 -x %HOSTIP:%HTTPPORT -H "Authorization: s3cr3t" --proxy-user testing:this --location-trusted
</command>
+<features>
+proxy
+</features>
</client>
#
<command>
http://first.host.it.is/we/want/that/page/317 -x %HOSTIP:%HTTPPORT -H "Cookie: test=yes" --location
</command>
+<features>
+proxy
+</features>
</client>
#
<command>
-x http://%HOSTIP:%HTTPPORT http://moo/we/want/331 -b none http://moo/we/want/3310002
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<features>
!SSPI
crypto
+proxy
</features>
<name>
HTTP with proxy Digest and site Digest with creds in URLs
<command>
http://%HOSTIP:%HTTPPORT/want/43 -L -x %HOSTIP:%HTTPPORT
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<command>
http://%HOSTIP:%HTTPPORT/we/want/that/page/5#5 -x %HOSTIP:%HTTPPORT
</command>
+<features>
+proxy
+</features>
</client>
#
<tool>
lib503
</tool>
-
+<features>
+proxy
+</features>
<name>
simple multi http:// through proxytunnel with authentication info
</name>
</server>
<features>
http
+proxy
</features>
# tool is what to use instead of 'curl'
<tool>
<command>
http://www.example.com:999/523 http://%HOSTIP:%HTTPPORT
</command>
+<features>
+proxy
+</features>
</client>
#
<features>
!SSPI
crypto
+proxy
</features>
<name>
HTTP proxy auth Digest multi API re-using connection
NTLM
!SSPI
debug
+proxy
</features>
<name>
HTTP proxy auth NTLM with POST data from read callback
NTLM
!SSPI
debug
+proxy
</features>
<name>
HTTP proxy auth NTLM with POST data from CURLOPT_POSTFIELDS
</server>
<features>
ftp
+proxy
</features>
<tool>
lib549
</server>
<features>
ftp
+proxy
</features>
<tool>
lib549
<features>
!SSPI
crypto
+proxy
</features>
<name>
HTTP proxy auth Digest with POST data from read callback
NTLM
!SSPI
debug
+proxy
</features>
<name>
HTTP proxy auth NTLM with POST data from read callback multi-if
</server>
<features>
ftp
+proxy
</features>
<tool>
lib549
<name>
FTP type=A URL and CURLOPT_PORT set and proxy
</name>
-
+<features>
+proxy
+</features>
<setenv>
ftp_proxy=http://%HOSTIP:%HTTPPORT/
</setenv>
<command>
ftp://%HOSTIP:%FTPPORT/path/564 %HOSTIP:%SOCKSPORT
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
NTLM
!SSPI
debug
+proxy
</features>
<name>
HTTP proxy offers Negotiate+NTLM, use only NTLM
<command>
http://we.want.that.site.com/63
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<command>
http://%HOSTIP:%HTTPPORT
</command>
+<features>
+proxy
+</features>
</client>
<verify>
<command>
http://example.com/please/gimme/662 -L -x http://%HOSTIP:%HTTPPORT
</command>
+<features>
+proxy
+</features>
</client>
#
<command>
http://example.com/please/../gimme/663?foobar#hello -L -x http://%HOSTIP:%HTTPPORT
</command>
+<features>
+proxy
+</features>
</client>
#
<command>
--socks4 %HOSTIP:2 http://%HOSTIP:%HTTPPORT/704
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
<command>
--socks5 %HOSTIP:2 http://%HOSTIP:%HTTPPORT/705
</command>
+<features>
+proxy
+</features>
</client>
# Verify data after the test has been "shot"
</server>
<features>
http
+proxy
</features>
<name>
FTP fetch with --proxy set to http:// and with --connect-to
</server>
<features>
http
+proxy
</features>
<name>
FTP fetch with --preproxy, --proxy and --connect-to
</server>
<features>
http
+proxy
</features>
<name>
SOCKS5 proxy with too long user name
<command>
http://%HOSTIP:1/717 -x socks5://uz3r:p4ssworm@%HOSTIP:%SOCKSPORT
</command>
+<features>
+proxy
+</features>
</client>
#
</server>
<features>
ftp
+proxy
</features>
<name>
FTP over HTTP proxy
<command>
http://test.80:%HTTPPORT/we/want/that/page/80 -p --proxy1.0 %HOSTIP:%PROXYPORT --user iam:myself --proxy-user youare:yourself
</command>
+<features>
+proxy
+</features>
</client>
#
NTLM
!SSPI
debug
+proxy
</features>
<server>
http
# Client-side
<client>
<features>
+proxy
</features>
<server>
http
<command>
http://test.83:%HTTPPORT/we/want/that/page/83 -p -x %HOSTIP:%PROXYPORT --user 'iam:my:;self'
</command>
+<features>
+proxy
+</features>
</client>
#
<command>
http://%HOSTIP:%HTTPPORT/we/want/that/page/84 -x %HOSTIP:%HTTPPORT --user iam:myself
</command>
+<features>
+proxy
+</features>
</client>
#
<command>
http://%HOSTIP:%HTTPPORT/we/want/that/page/85 -x %HOSTIP:%HTTPPORT --user iam:myself --proxy-user testing:this
</command>
+<features>
+proxy
+</features>
</client>
#
<command>
http://%HOSTIP:%HTTPPORT/93 -x %HOSTIP:%HTTPPORT
</command>
+<features>
+proxy
+</features>
</client>
#
</server>
<features>
SSL
+proxy
</features>
<name>
HTTPS GET with failed proxy auth (CONNECT 1.0)
<command>
http://test.95:%HTTPPORT/we/want/that/page/95 -p -x %HOSTIP:%PROXYPORT -d "datatopost=ohthatsfunyesyes"
</command>
+<features>
+proxy
+</features>
</client>
#