@@ -90,7 +90,7 @@ |
||
90 | 90 | } |
91 | 91 | |
92 | 92 | /** |
93 | - * @return \phpseclib\Crypt\RSA |
|
93 | + * @return JoseRSA |
|
94 | 94 | */ |
95 | 95 | private function getRsaObject() |
96 | 96 | { |
@@ -50,7 +50,7 @@ |
||
50 | 50 | * |
51 | 51 | * As set by the constructor or by the setHash() method. |
52 | 52 | * |
53 | - * @return string |
|
53 | + * @return integer |
|
54 | 54 | */ |
55 | 55 | public function getHash() |
56 | 56 | { |
@@ -1187,7 +1187,7 @@ discard block |
||
1187 | 1187 | * Typical salt lengths in octets are hLen (the length of the output |
1188 | 1188 | * of the hash function Hash) and 0. |
1189 | 1189 | * |
1190 | - * @param int $format |
|
1190 | + * @param integer $sLen |
|
1191 | 1191 | */ |
1192 | 1192 | public function setSaltLength($sLen) |
1193 | 1193 | { |
@@ -1445,7 +1445,6 @@ discard block |
||
1445 | 1445 | * See {@link http://tools.ietf.org/html/rfc3447#appendix-B.2.1 RFC3447#appendix-B.2.1}. |
1446 | 1446 | * |
1447 | 1447 | * @param string $mgfSeed |
1448 | - * @param int $mgfLen |
|
1449 | 1448 | * |
1450 | 1449 | * @return string |
1451 | 1450 | */ |
@@ -1766,7 +1765,7 @@ discard block |
||
1766 | 1765 | * @param string $em |
1767 | 1766 | * @param int $emBits |
1768 | 1767 | * |
1769 | - * @return string |
|
1768 | + * @return boolean |
|
1770 | 1769 | */ |
1771 | 1770 | private function _emsa_pss_verify($m, $em, $emBits) |
1772 | 1771 | { |
@@ -1839,7 +1838,7 @@ discard block |
||
1839 | 1838 | * @param string $m |
1840 | 1839 | * @param string $s |
1841 | 1840 | * |
1842 | - * @return string |
|
1841 | + * @return boolean |
|
1843 | 1842 | */ |
1844 | 1843 | private function _rsassa_pss_verify($m, $s) |
1845 | 1844 | { |
@@ -1964,8 +1963,9 @@ discard block |
||
1964 | 1963 | * See {@link http://tools.ietf.org/html/rfc3447#section-8.2.2 RFC3447#section-8.2.2}. |
1965 | 1964 | * |
1966 | 1965 | * @param string $m |
1966 | + * @param string $s |
|
1967 | 1967 | * |
1968 | - * @return string |
|
1968 | + * @return boolean |
|
1969 | 1969 | */ |
1970 | 1970 | private function _rsassa_pkcs1_v1_5_verify($m, $s) |
1971 | 1971 | { |
@@ -2089,8 +2089,8 @@ discard block |
||
2089 | 2089 | * |
2090 | 2090 | * @see self::encrypt() |
2091 | 2091 | * |
2092 | - * @param string $plaintext |
|
2093 | 2092 | * |
2093 | + * @param string $ciphertext |
|
2094 | 2094 | * @return string |
2095 | 2095 | */ |
2096 | 2096 | public function decrypt($ciphertext) |
@@ -295,7 +295,7 @@ discard block |
||
295 | 295 | * ?> |
296 | 296 | * </code> |
297 | 297 | * |
298 | - * @param \Jose\Util\Integer $y |
|
298 | + * @param BigInteger $y |
|
299 | 299 | * |
300 | 300 | * @return \Jose\Util\BigInteger |
301 | 301 | * |
@@ -323,7 +323,7 @@ discard block |
||
323 | 323 | * ?> |
324 | 324 | * </code> |
325 | 325 | * |
326 | - * @param \Jose\Util\Integer $y |
|
326 | + * @param BigInteger $y |
|
327 | 327 | * |
328 | 328 | * @return \Jose\Util\BigInteger |
329 | 329 | * |
@@ -351,7 +351,7 @@ discard block |
||
351 | 351 | * ?> |
352 | 352 | * </code> |
353 | 353 | * |
354 | - * @param \Jose\Util\Integer $x |
|
354 | + * @param BigInteger $x |
|
355 | 355 | * |
356 | 356 | * @return \Jose\Util\BigInteger |
357 | 357 | */ |
@@ -385,9 +385,9 @@ discard block |
||
385 | 385 | * ?> |
386 | 386 | * </code> |
387 | 387 | * |
388 | - * @param \Jose\Util\Integer $y |
|
388 | + * @param BigInteger $y |
|
389 | 389 | * |
390 | - * @return array |
|
390 | + * @return BigInteger[] |
|
391 | 391 | * |
392 | 392 | */ |
393 | 393 | public function divide(BigInteger $y) |
@@ -420,8 +420,8 @@ discard block |
||
420 | 420 | * ?> |
421 | 421 | * </code> |
422 | 422 | * |
423 | - * @param \Jose\Util\Integer $e |
|
424 | - * @param \Jose\Util\Integer $n |
|
423 | + * @param BigInteger $e |
|
424 | + * @param BigInteger $n |
|
425 | 425 | * |
426 | 426 | * @return \Jose\Util\BigInteger |
427 | 427 | * |
@@ -487,9 +487,9 @@ discard block |
||
487 | 487 | * ?> |
488 | 488 | * </code> |
489 | 489 | * |
490 | - * @param \Jose\Util\Integer $n |
|
490 | + * @param BigInteger $n |
|
491 | 491 | * |
492 | - * @return \Jose\Util\eger|false |
|
492 | + * @return BigInteger |
|
493 | 493 | * |
494 | 494 | */ |
495 | 495 | public function modInverse(BigInteger $n) |
@@ -526,7 +526,7 @@ discard block |
||
526 | 526 | * |
527 | 527 | * Note how the same comparison operator is used. If you want to test for equality, use $x->equals($y). |
528 | 528 | * |
529 | - * @param \Jose\Util\Integer $y |
|
529 | + * @param BigInteger $y |
|
530 | 530 | * |
531 | 531 | * @return int < 0 if $this is less than $y; > 0 if $this is greater than $y, and 0 if they are equal. |
532 | 532 | * |
@@ -651,6 +651,7 @@ discard block |
||
651 | 651 | * Removes leading zeros and truncates (if necessary) to maintain the appropriate precision |
652 | 652 | * |
653 | 653 | * @param \Jose\Util\BigInteger |
654 | + * @param BigInteger $result |
|
654 | 655 | * |
655 | 656 | * @return \Jose\Util\BigInteger |
656 | 657 | */ |