--TEST-- radius_put_string() with tag --INI-- display_errors=1 error_reporting=22527 --SKIPIF-- --FILE-- getAuthResource(); $request = \RADIUS\FakeServer\Request::expect(RADIUS_ACCESS_REQUEST, array( \RADIUS\FakeServer\Attribute\expect(RADIUS_USER_NAME, 'foo', 10), \RADIUS\FakeServer\Attribute\expect(RADIUS_LOGIN_IP_HOST, 'abcdefghijklmnopqrstuvwxyz', 10, true), )); $response = new \RADIUS\FakeServer\RadiusResponse; $response->code = RADIUS_ACCESS_REJECT; $response->attributes = array( \RADIUS\FakeServer\Attribute\expect(RADIUS_REPLY_MESSAGE, 'Go away'), ); $server->addTransaction($request, $response); $server->handle(); var_dump(radius_put_string($res, RADIUS_USER_NAME, 'foo', RADIUS_OPTION_TAGGED, -1)); var_dump(radius_put_string($res, RADIUS_USER_NAME, 'foo', RADIUS_OPTION_TAGGED, 256)); var_dump(radius_put_string($res, RADIUS_USER_NAME, 'foo', RADIUS_OPTION_TAGGED, 10)); var_dump(radius_put_string($res, RADIUS_LOGIN_IP_HOST, 'abcdefghijklmnopqrstuvwxyz', RADIUS_OPTION_SALT | RADIUS_OPTION_TAGGED, 10)); radius_create_request($res, RADIUS_ACCESS_REQUEST); var_dump(radius_put_string($res, RADIUS_USER_NAME, 'foo', RADIUS_OPTION_TAGGED, 10)); var_dump(radius_put_string($res, RADIUS_LOGIN_IP_HOST, 'abcdefghijklmnopqrstuvwxyz', RADIUS_OPTION_SALT | RADIUS_OPTION_TAGGED, 10)); radius_put_string($res, RADIUS_USER_PASSWORD, 'bar'); radius_send_request($res); var_dump($server->wait()); ?> --EXPECTF-- Notice: Tag must be between 0 and 255 in %s on line %d bool(false) Notice: Tag must be between 0 and 255 in %s on line %d bool(false) bool(false) bool(false) bool(true) bool(true) int(0)