@@ -90,7 +90,7 @@ |
||
90 | 90 | } |
91 | 91 | |
92 | 92 | /** |
93 | - * @return \phpseclib\Crypt\RSA |
|
93 | + * @return JoseRSA |
|
94 | 94 | */ |
95 | 95 | private function getRsaObject() |
96 | 96 | { |
@@ -50,7 +50,7 @@ |
||
50 | 50 | * |
51 | 51 | * As set by the constructor or by the setHash() method. |
52 | 52 | * |
53 | - * @return string |
|
53 | + * @return integer |
|
54 | 54 | */ |
55 | 55 | public function getHash() |
56 | 56 | { |
@@ -1187,7 +1187,7 @@ discard block |
||
1187 | 1187 | * Typical salt lengths in octets are hLen (the length of the output |
1188 | 1188 | * of the hash function Hash) and 0. |
1189 | 1189 | * |
1190 | - * @param int $format |
|
1190 | + * @param integer $sLen |
|
1191 | 1191 | */ |
1192 | 1192 | public function setSaltLength($sLen) |
1193 | 1193 | { |
@@ -1445,7 +1445,6 @@ discard block |
||
1445 | 1445 | * See {@link http://tools.ietf.org/html/rfc3447#appendix-B.2.1 RFC3447#appendix-B.2.1}. |
1446 | 1446 | * |
1447 | 1447 | * @param string $mgfSeed |
1448 | - * @param int $mgfLen |
|
1449 | 1448 | * |
1450 | 1449 | * @return string |
1451 | 1450 | */ |
@@ -1766,7 +1765,7 @@ discard block |
||
1766 | 1765 | * @param string $em |
1767 | 1766 | * @param int $emBits |
1768 | 1767 | * |
1769 | - * @return string |
|
1768 | + * @return boolean |
|
1770 | 1769 | */ |
1771 | 1770 | private function _emsa_pss_verify($m, $em, $emBits) |
1772 | 1771 | { |
@@ -1839,7 +1838,7 @@ discard block |
||
1839 | 1838 | * @param string $m |
1840 | 1839 | * @param string $s |
1841 | 1840 | * |
1842 | - * @return string |
|
1841 | + * @return boolean |
|
1843 | 1842 | */ |
1844 | 1843 | private function _rsassa_pss_verify($m, $s) |
1845 | 1844 | { |
@@ -1964,8 +1963,9 @@ discard block |
||
1964 | 1963 | * See {@link http://tools.ietf.org/html/rfc3447#section-8.2.2 RFC3447#section-8.2.2}. |
1965 | 1964 | * |
1966 | 1965 | * @param string $m |
1966 | + * @param string $s |
|
1967 | 1967 | * |
1968 | - * @return string |
|
1968 | + * @return boolean |
|
1969 | 1969 | */ |
1970 | 1970 | private function _rsassa_pkcs1_v1_5_verify($m, $s) |
1971 | 1971 | { |
@@ -2089,8 +2089,8 @@ discard block |
||
2089 | 2089 | * |
2090 | 2090 | * @see self::encrypt() |
2091 | 2091 | * |
2092 | - * @param string $plaintext |
|
2093 | 2092 | * |
2093 | + * @param string $ciphertext |
|
2094 | 2094 | * @return string |
2095 | 2095 | */ |
2096 | 2096 | public function decrypt($ciphertext) |
@@ -301,7 +301,7 @@ discard block |
||
301 | 301 | * ?> |
302 | 302 | * </code> |
303 | 303 | * |
304 | - * @param \Jose\Util\Integer $y |
|
304 | + * @param BigInteger $y |
|
305 | 305 | * |
306 | 306 | * @return \Jose\Util\BigInteger |
307 | 307 | * |
@@ -329,7 +329,7 @@ discard block |
||
329 | 329 | * ?> |
330 | 330 | * </code> |
331 | 331 | * |
332 | - * @param \Jose\Util\Integer $y |
|
332 | + * @param BigInteger $y |
|
333 | 333 | * |
334 | 334 | * @return \Jose\Util\BigInteger |
335 | 335 | * |
@@ -357,7 +357,7 @@ discard block |
||
357 | 357 | * ?> |
358 | 358 | * </code> |
359 | 359 | * |
360 | - * @param \Jose\Util\Integer $x |
|
360 | + * @param BigInteger $x |
|
361 | 361 | * |
362 | 362 | * @return \Jose\Util\BigInteger |
363 | 363 | */ |
@@ -391,9 +391,9 @@ discard block |
||
391 | 391 | * ?> |
392 | 392 | * </code> |
393 | 393 | * |
394 | - * @param \Jose\Util\Integer $y |
|
394 | + * @param BigInteger $y |
|
395 | 395 | * |
396 | - * @return array |
|
396 | + * @return BigInteger[] |
|
397 | 397 | * |
398 | 398 | */ |
399 | 399 | public function divide(BigInteger $y) |
@@ -426,8 +426,8 @@ discard block |
||
426 | 426 | * ?> |
427 | 427 | * </code> |
428 | 428 | * |
429 | - * @param \Jose\Util\Integer $e |
|
430 | - * @param \Jose\Util\Integer $n |
|
429 | + * @param BigInteger $e |
|
430 | + * @param BigInteger $n |
|
431 | 431 | * |
432 | 432 | * @return \Jose\Util\BigInteger |
433 | 433 | * |
@@ -493,9 +493,9 @@ discard block |
||
493 | 493 | * ?> |
494 | 494 | * </code> |
495 | 495 | * |
496 | - * @param \Jose\Util\Integer $n |
|
496 | + * @param BigInteger $n |
|
497 | 497 | * |
498 | - * @return \Jose\Util\eger|false |
|
498 | + * @return BigInteger |
|
499 | 499 | * |
500 | 500 | */ |
501 | 501 | public function modInverse(BigInteger $n) |
@@ -532,7 +532,7 @@ discard block |
||
532 | 532 | * |
533 | 533 | * Note how the same comparison operator is used. If you want to test for equality, use $x->equals($y). |
534 | 534 | * |
535 | - * @param \Jose\Util\Integer $y |
|
535 | + * @param BigInteger $y |
|
536 | 536 | * |
537 | 537 | * @return int < 0 if $this is less than $y; > 0 if $this is greater than $y, and 0 if they are equal. |
538 | 538 | * |
@@ -572,8 +572,8 @@ discard block |
||
572 | 572 | * |
573 | 573 | * Byte length is equal to $length. Uses \phpseclib\Crypt\Random if it's loaded and mt_rand if it's not. |
574 | 574 | * |
575 | - * @param int $length |
|
576 | 575 | * |
576 | + * @param integer $size |
|
577 | 577 | * @return \Jose\Util\BigInteger |
578 | 578 | */ |
579 | 579 | private static function _random_number_helper($size) |
@@ -590,8 +590,6 @@ discard block |
||
590 | 590 | * BigInteger::random($min, $max) |
591 | 591 | * BigInteger::random($max, $min) |
592 | 592 | * |
593 | - * @param \Jose\Util\eger $arg1 |
|
594 | - * @param \Jose\Util\eger $arg2 |
|
595 | 593 | * |
596 | 594 | * @return \Jose\Util\BigInteger |
597 | 595 | */ |
@@ -657,6 +655,7 @@ discard block |
||
657 | 655 | * Removes leading zeros and truncates (if necessary) to maintain the appropriate precision |
658 | 656 | * |
659 | 657 | * @param \Jose\Util\BigInteger |
658 | + * @param BigInteger $result |
|
660 | 659 | * |
661 | 660 | * @return \Jose\Util\BigInteger |
662 | 661 | */ |