@@ -76,7 +76,7 @@ |
||
| 76 | 76 | * are not configured to be used with the usage given |
| 77 | 77 | * |
| 78 | 78 | * @param array $configuredKeys |
| 79 | - * @param $usage |
|
| 79 | + * @param null|string $usage |
|
| 80 | 80 | */ |
| 81 | 81 | public function loadKeys(array $configuredKeys, $usage) |
| 82 | 82 | { |
@@ -248,7 +248,7 @@ |
||
| 248 | 248 | * |
| 249 | 249 | * @param DOMElement $node The element we should fetch the attribute from. |
| 250 | 250 | * @param string $attributeName The name of the attribute. |
| 251 | - * @param mixed $default The value that should be returned if the attribute doesn't exist. |
|
| 251 | + * @param false|null $default The value that should be returned if the attribute doesn't exist. |
|
| 252 | 252 | * @return bool|mixed The value of the attribute, or $default if the attribute doesn't exist. |
| 253 | 253 | * @throws Exception |
| 254 | 254 | */ |
@@ -569,7 +569,7 @@ |
||
| 569 | 569 | * The returned NameId is in the format used by \SAML2\Utils::addNameId(). |
| 570 | 570 | * |
| 571 | 571 | * @see \SAML2\Utils::addNameId() |
| 572 | - * @return array|null The name identifier of the assertion. |
|
| 572 | + * @return string The name identifier of the assertion. |
|
| 573 | 573 | * @throws \Exception |
| 574 | 574 | */ |
| 575 | 575 | public function getNameId() |
@@ -107,7 +107,7 @@ |
||
| 107 | 107 | /** |
| 108 | 108 | * Check whether the NameId is encrypted. |
| 109 | 109 | * |
| 110 | - * @return true if the NameId is encrypted, false if not. |
|
| 110 | + * @return boolean if the NameId is encrypted, false if not. |
|
| 111 | 111 | */ |
| 112 | 112 | public function isNameIdEncrypted() |
| 113 | 113 | { |
@@ -45,7 +45,7 @@ |
||
| 45 | 45 | /** |
| 46 | 46 | * Retrieve the assertions in this response. |
| 47 | 47 | * |
| 48 | - * @return \SAML2\Assertion[]|\SAML2\EncryptedAssertion[] |
|
| 48 | + * @return Utilities\ArrayCollection |
|
| 49 | 49 | */ |
| 50 | 50 | public function getAssertions() |
| 51 | 51 | { |
@@ -64,7 +64,7 @@ discard block |
||
| 64 | 64 | * @param \SAML2\Configuration\Destination $currentDestination |
| 65 | 65 | * @param \SAML2\Response $response |
| 66 | 66 | * |
| 67 | - * @return \SAML2\Assertion[] Collection (\SAML2\Utilities\ArrayCollection) of \SAML2\Assertion objects |
|
| 67 | + * @return \SAML2\Utilities\ArrayCollection Collection (\SAML2\Utilities\ArrayCollection) of \SAML2\Assertion objects |
|
| 68 | 68 | */ |
| 69 | 69 | public function process( |
| 70 | 70 | ServiceProvider $serviceProviderConfiguration, |
@@ -134,7 +134,7 @@ discard block |
||
| 134 | 134 | /** |
| 135 | 135 | * @param \SAML2\Response $response |
| 136 | 136 | * |
| 137 | - * @return \SAML2\Assertion[] |
|
| 137 | + * @return \SAML2\Utilities\ArrayCollection |
|
| 138 | 138 | */ |
| 139 | 139 | private function processAssertions(Response $response) |
| 140 | 140 | { |
@@ -212,6 +212,10 @@ |
||
| 212 | 212 | * @param $soapmessage Soap response needs to be type DOMDocument |
| 213 | 213 | * @return $soapfaultstring string|null |
| 214 | 214 | */ |
| 215 | + |
|
| 216 | + /** |
|
| 217 | + * @param \DOMDocument $soapMessage |
|
| 218 | + */ |
|
| 215 | 219 | private function getSOAPFault($soapMessage) |
| 216 | 220 | { |
| 217 | 221 | $soapFault = Utils::xpQuery($soapMessage->firstChild, '/soap-env:Envelope/soap-env:Body/soap-env:Fault'); |
@@ -695,7 +695,7 @@ discard block |
||
| 695 | 695 | /** |
| 696 | 696 | * Check whether the NameId is encrypted. |
| 697 | 697 | * |
| 698 | - * @return true if the NameId is encrypted, false if not. |
|
| 698 | + * @return boolean if the NameId is encrypted, false if not. |
|
| 699 | 699 | */ |
| 700 | 700 | public function isNameIdEncrypted() |
| 701 | 701 | { |
@@ -820,7 +820,7 @@ discard block |
||
| 820 | 820 | * This function returns null if there are no restrictions on how early the |
| 821 | 821 | * assertion can be used. |
| 822 | 822 | * |
| 823 | - * @return int|null The earliest timestamp this assertion is valid. |
|
| 823 | + * @return integer The earliest timestamp this assertion is valid. |
|
| 824 | 824 | */ |
| 825 | 825 | public function getNotBefore() |
| 826 | 826 | { |
@@ -847,7 +847,7 @@ discard block |
||
| 847 | 847 | * This function returns null if there are no restrictions on how |
| 848 | 848 | * late the assertion can be used. |
| 849 | 849 | * |
| 850 | - * @return int|null The latest timestamp this assertion is valid. |
|
| 850 | + * @return integer The latest timestamp this assertion is valid. |
|
| 851 | 851 | */ |
| 852 | 852 | public function getNotOnOrAfter() |
| 853 | 853 | { |
@@ -905,7 +905,7 @@ discard block |
||
| 905 | 905 | /** |
| 906 | 906 | * Retrieve the AuthnInstant of the assertion. |
| 907 | 907 | * |
| 908 | - * @return int|null The timestamp the user was authenticated, or NULL if the user isn't authenticated. |
|
| 908 | + * @return integer The timestamp the user was authenticated, or NULL if the user isn't authenticated. |
|
| 909 | 909 | */ |
| 910 | 910 | public function getAuthnInstant() |
| 911 | 911 | { |
@@ -1067,7 +1067,7 @@ discard block |
||
| 1067 | 1067 | * See: |
| 1068 | 1068 | * @url http://docs.oasis-open.org/security/saml/v2.0/saml-authn-context-2.0-os.pdf |
| 1069 | 1069 | * |
| 1070 | - * @return \SAML2\XML\Chunk|null |
|
| 1070 | + * @return Chunk |
|
| 1071 | 1071 | */ |
| 1072 | 1072 | public function getAuthnContextDecl() |
| 1073 | 1073 | { |
@@ -1097,7 +1097,7 @@ discard block |
||
| 1097 | 1097 | * |
| 1098 | 1098 | * The URI reference MAY directly resolve into an XML document containing the referenced declaration. |
| 1099 | 1099 | * |
| 1100 | - * @return string |
|
| 1100 | + * @return Chunk |
|
| 1101 | 1101 | */ |
| 1102 | 1102 | public function getAuthnContextDeclRef() |
| 1103 | 1103 | { |