@@ -90,7 +90,7 @@ |
||
| 90 | 90 | } |
| 91 | 91 | |
| 92 | 92 | /** |
| 93 | - * @return \phpseclib\Crypt\RSA |
|
| 93 | + * @return JoseRSA |
|
| 94 | 94 | */ |
| 95 | 95 | private function getRsaObject() |
| 96 | 96 | { |
@@ -50,7 +50,7 @@ |
||
| 50 | 50 | * |
| 51 | 51 | * As set by the constructor or by the setHash() method. |
| 52 | 52 | * |
| 53 | - * @return string |
|
| 53 | + * @return integer |
|
| 54 | 54 | */ |
| 55 | 55 | public function getHash() |
| 56 | 56 | { |
@@ -1187,7 +1187,7 @@ discard block |
||
| 1187 | 1187 | * Typical salt lengths in octets are hLen (the length of the output |
| 1188 | 1188 | * of the hash function Hash) and 0. |
| 1189 | 1189 | * |
| 1190 | - * @param int $format |
|
| 1190 | + * @param integer $sLen |
|
| 1191 | 1191 | */ |
| 1192 | 1192 | public function setSaltLength($sLen) |
| 1193 | 1193 | { |
@@ -1445,7 +1445,6 @@ discard block |
||
| 1445 | 1445 | * See {@link http://tools.ietf.org/html/rfc3447#appendix-B.2.1 RFC3447#appendix-B.2.1}. |
| 1446 | 1446 | * |
| 1447 | 1447 | * @param string $mgfSeed |
| 1448 | - * @param int $mgfLen |
|
| 1449 | 1448 | * |
| 1450 | 1449 | * @return string |
| 1451 | 1450 | */ |
@@ -1766,7 +1765,7 @@ discard block |
||
| 1766 | 1765 | * @param string $em |
| 1767 | 1766 | * @param int $emBits |
| 1768 | 1767 | * |
| 1769 | - * @return string |
|
| 1768 | + * @return boolean |
|
| 1770 | 1769 | */ |
| 1771 | 1770 | private function _emsa_pss_verify($m, $em, $emBits) |
| 1772 | 1771 | { |
@@ -1839,7 +1838,7 @@ discard block |
||
| 1839 | 1838 | * @param string $m |
| 1840 | 1839 | * @param string $s |
| 1841 | 1840 | * |
| 1842 | - * @return string |
|
| 1841 | + * @return boolean |
|
| 1843 | 1842 | */ |
| 1844 | 1843 | private function _rsassa_pss_verify($m, $s) |
| 1845 | 1844 | { |
@@ -1964,8 +1963,9 @@ discard block |
||
| 1964 | 1963 | * See {@link http://tools.ietf.org/html/rfc3447#section-8.2.2 RFC3447#section-8.2.2}. |
| 1965 | 1964 | * |
| 1966 | 1965 | * @param string $m |
| 1966 | + * @param string $s |
|
| 1967 | 1967 | * |
| 1968 | - * @return string |
|
| 1968 | + * @return boolean |
|
| 1969 | 1969 | */ |
| 1970 | 1970 | private function _rsassa_pkcs1_v1_5_verify($m, $s) |
| 1971 | 1971 | { |
@@ -2089,8 +2089,8 @@ discard block |
||
| 2089 | 2089 | * |
| 2090 | 2090 | * @see self::encrypt() |
| 2091 | 2091 | * |
| 2092 | - * @param string $plaintext |
|
| 2093 | 2092 | * |
| 2093 | + * @param string $ciphertext |
|
| 2094 | 2094 | * @return string |
| 2095 | 2095 | */ |
| 2096 | 2096 | public function decrypt($ciphertext) |
@@ -295,7 +295,7 @@ discard block |
||
| 295 | 295 | * ?> |
| 296 | 296 | * </code> |
| 297 | 297 | * |
| 298 | - * @param \Jose\Util\Integer $y |
|
| 298 | + * @param BigInteger $y |
|
| 299 | 299 | * |
| 300 | 300 | * @return \Jose\Util\BigInteger |
| 301 | 301 | * |
@@ -323,7 +323,7 @@ discard block |
||
| 323 | 323 | * ?> |
| 324 | 324 | * </code> |
| 325 | 325 | * |
| 326 | - * @param \Jose\Util\Integer $y |
|
| 326 | + * @param BigInteger $y |
|
| 327 | 327 | * |
| 328 | 328 | * @return \Jose\Util\BigInteger |
| 329 | 329 | * |
@@ -351,7 +351,7 @@ discard block |
||
| 351 | 351 | * ?> |
| 352 | 352 | * </code> |
| 353 | 353 | * |
| 354 | - * @param \Jose\Util\Integer $x |
|
| 354 | + * @param BigInteger $x |
|
| 355 | 355 | * |
| 356 | 356 | * @return \Jose\Util\BigInteger |
| 357 | 357 | */ |
@@ -385,9 +385,9 @@ discard block |
||
| 385 | 385 | * ?> |
| 386 | 386 | * </code> |
| 387 | 387 | * |
| 388 | - * @param \Jose\Util\Integer $y |
|
| 388 | + * @param BigInteger $y |
|
| 389 | 389 | * |
| 390 | - * @return array |
|
| 390 | + * @return BigInteger[] |
|
| 391 | 391 | * |
| 392 | 392 | */ |
| 393 | 393 | public function divide(BigInteger $y) |
@@ -420,8 +420,8 @@ discard block |
||
| 420 | 420 | * ?> |
| 421 | 421 | * </code> |
| 422 | 422 | * |
| 423 | - * @param \Jose\Util\Integer $e |
|
| 424 | - * @param \Jose\Util\Integer $n |
|
| 423 | + * @param BigInteger $e |
|
| 424 | + * @param BigInteger $n |
|
| 425 | 425 | * |
| 426 | 426 | * @return \Jose\Util\BigInteger |
| 427 | 427 | * |
@@ -487,9 +487,9 @@ discard block |
||
| 487 | 487 | * ?> |
| 488 | 488 | * </code> |
| 489 | 489 | * |
| 490 | - * @param \Jose\Util\Integer $n |
|
| 490 | + * @param BigInteger $n |
|
| 491 | 491 | * |
| 492 | - * @return \Jose\Util\eger|false |
|
| 492 | + * @return BigInteger |
|
| 493 | 493 | * |
| 494 | 494 | */ |
| 495 | 495 | public function modInverse(BigInteger $n) |
@@ -526,7 +526,7 @@ discard block |
||
| 526 | 526 | * |
| 527 | 527 | * Note how the same comparison operator is used. If you want to test for equality, use $x->equals($y). |
| 528 | 528 | * |
| 529 | - * @param \Jose\Util\Integer $y |
|
| 529 | + * @param BigInteger $y |
|
| 530 | 530 | * |
| 531 | 531 | * @return int < 0 if $this is less than $y; > 0 if $this is greater than $y, and 0 if they are equal. |
| 532 | 532 | * |
@@ -651,6 +651,7 @@ discard block |
||
| 651 | 651 | * Removes leading zeros and truncates (if necessary) to maintain the appropriate precision |
| 652 | 652 | * |
| 653 | 653 | * @param \Jose\Util\BigInteger |
| 654 | + * @param BigInteger $result |
|
| 654 | 655 | * |
| 655 | 656 | * @return \Jose\Util\BigInteger |
| 656 | 657 | */ |