@@ -76,7 +76,7 @@ |
||
| 76 | 76 | * are not configured to be used with the usage given |
| 77 | 77 | * |
| 78 | 78 | * @param array $configuredKeys |
| 79 | - * @param $usage |
|
| 79 | + * @param null|string $usage |
|
| 80 | 80 | */ |
| 81 | 81 | public function loadKeys(array $configuredKeys, $usage) |
| 82 | 82 | { |
@@ -248,7 +248,7 @@ |
||
| 248 | 248 | * |
| 249 | 249 | * @param DOMElement $node The element we should fetch the attribute from. |
| 250 | 250 | * @param string $attributeName The name of the attribute. |
| 251 | - * @param mixed $default The value that should be returned if the attribute doesn't exist. |
|
| 251 | + * @param false|null $default The value that should be returned if the attribute doesn't exist. |
|
| 252 | 252 | * @return bool|mixed The value of the attribute, or $default if the attribute doesn't exist. |
| 253 | 253 | * @throws Exception |
| 254 | 254 | */ |
@@ -657,7 +657,7 @@ discard block |
||
| 657 | 657 | /** |
| 658 | 658 | * Check whether the NameId is encrypted. |
| 659 | 659 | * |
| 660 | - * @return true if the NameId is encrypted, false if not. |
|
| 660 | + * @return boolean if the NameId is encrypted, false if not. |
|
| 661 | 661 | */ |
| 662 | 662 | public function isNameIdEncrypted() |
| 663 | 663 | { |
@@ -785,7 +785,7 @@ discard block |
||
| 785 | 785 | * This function returns null if there are no restrictions on how early the |
| 786 | 786 | * assertion can be used. |
| 787 | 787 | * |
| 788 | - * @return int|null The earliest timestamp this assertion is valid. |
|
| 788 | + * @return integer The earliest timestamp this assertion is valid. |
|
| 789 | 789 | */ |
| 790 | 790 | public function getNotBefore() |
| 791 | 791 | { |
@@ -812,7 +812,7 @@ discard block |
||
| 812 | 812 | * This function returns null if there are no restrictions on how |
| 813 | 813 | * late the assertion can be used. |
| 814 | 814 | * |
| 815 | - * @return int|null The latest timestamp this assertion is valid. |
|
| 815 | + * @return integer The latest timestamp this assertion is valid. |
|
| 816 | 816 | */ |
| 817 | 817 | public function getNotOnOrAfter() |
| 818 | 818 | { |
@@ -870,7 +870,7 @@ discard block |
||
| 870 | 870 | /** |
| 871 | 871 | * Retrieve the AuthnInstant of the assertion. |
| 872 | 872 | * |
| 873 | - * @return int|null The timestamp the user was authenticated, or NULL if the user isn't authenticated. |
|
| 873 | + * @return integer The timestamp the user was authenticated, or NULL if the user isn't authenticated. |
|
| 874 | 874 | */ |
| 875 | 875 | public function getAuthnInstant() |
| 876 | 876 | { |
@@ -1032,7 +1032,7 @@ discard block |
||
| 1032 | 1032 | * See: |
| 1033 | 1033 | * @url http://docs.oasis-open.org/security/saml/v2.0/saml-authn-context-2.0-os.pdf |
| 1034 | 1034 | * |
| 1035 | - * @return \SAML2\XML\Chunk|null |
|
| 1035 | + * @return Chunk |
|
| 1036 | 1036 | */ |
| 1037 | 1037 | public function getAuthnContextDecl() |
| 1038 | 1038 | { |
@@ -1062,7 +1062,7 @@ discard block |
||
| 1062 | 1062 | * |
| 1063 | 1063 | * The URI reference MAY directly resolve into an XML document containing the referenced declaration. |
| 1064 | 1064 | * |
| 1065 | - * @return string |
|
| 1065 | + * @return Chunk |
|
| 1066 | 1066 | */ |
| 1067 | 1067 | public function getAuthnContextDeclRef() |
| 1068 | 1068 | { |
@@ -1094,7 +1094,7 @@ discard block |
||
| 1094 | 1094 | /** |
| 1095 | 1095 | * Retrieve all attributes. |
| 1096 | 1096 | * |
| 1097 | - * @return array All attributes, as an associative array. |
|
| 1097 | + * @return \DOMElement[] All attributes, as an associative array. |
|
| 1098 | 1098 | */ |
| 1099 | 1099 | public function getAttributes() |
| 1100 | 1100 | { |
@@ -569,7 +569,7 @@ |
||
| 569 | 569 | * The returned NameId is in the format used by \SAML2\Utils::addNameId(). |
| 570 | 570 | * |
| 571 | 571 | * @see \SAML2\Utils::addNameId() |
| 572 | - * @return array|null The name identifier of the assertion. |
|
| 572 | + * @return string The name identifier of the assertion. |
|
| 573 | 573 | * @throws \Exception |
| 574 | 574 | */ |
| 575 | 575 | public function getNameId() |
@@ -107,7 +107,7 @@ |
||
| 107 | 107 | /** |
| 108 | 108 | * Check whether the NameId is encrypted. |
| 109 | 109 | * |
| 110 | - * @return true if the NameId is encrypted, false if not. |
|
| 110 | + * @return boolean if the NameId is encrypted, false if not. |
|
| 111 | 111 | */ |
| 112 | 112 | public function isNameIdEncrypted() |
| 113 | 113 | { |
@@ -45,7 +45,7 @@ |
||
| 45 | 45 | /** |
| 46 | 46 | * Retrieve the assertions in this response. |
| 47 | 47 | * |
| 48 | - * @return \SAML2\Assertion[]|\SAML2\EncryptedAssertion[] |
|
| 48 | + * @return Utilities\ArrayCollection |
|
| 49 | 49 | */ |
| 50 | 50 | public function getAssertions() |
| 51 | 51 | { |
@@ -64,7 +64,7 @@ discard block |
||
| 64 | 64 | * @param \SAML2\Configuration\Destination $currentDestination |
| 65 | 65 | * @param \SAML2\Response $response |
| 66 | 66 | * |
| 67 | - * @return \SAML2\Assertion[] Collection (\SAML2\Utilities\ArrayCollection) of \SAML2\Assertion objects |
|
| 67 | + * @return \SAML2\Utilities\ArrayCollection Collection (\SAML2\Utilities\ArrayCollection) of \SAML2\Assertion objects |
|
| 68 | 68 | */ |
| 69 | 69 | public function process( |
| 70 | 70 | ServiceProvider $serviceProviderConfiguration, |
@@ -134,7 +134,7 @@ discard block |
||
| 134 | 134 | /** |
| 135 | 135 | * @param \SAML2\Response $response |
| 136 | 136 | * |
| 137 | - * @return \SAML2\Assertion[] |
|
| 137 | + * @return \SAML2\Utilities\ArrayCollection |
|
| 138 | 138 | */ |
| 139 | 139 | private function processAssertions(Response $response) |
| 140 | 140 | { |
@@ -212,6 +212,10 @@ |
||
| 212 | 212 | * @param $soapmessage Soap response needs to be type DOMDocument |
| 213 | 213 | * @return $soapfaultstring string|null |
| 214 | 214 | */ |
| 215 | + |
|
| 216 | + /** |
|
| 217 | + * @param \DOMDocument $soapMessage |
|
| 218 | + */ |
|
| 215 | 219 | private function getSOAPFault($soapMessage) |
| 216 | 220 | { |
| 217 | 221 | $soapFault = Utils::xpQuery($soapMessage->firstChild, '/soap-env:Envelope/soap-env:Body/soap-env:Fault'); |