@@ -695,7 +695,7 @@ discard block |
||
| 695 | 695 | /** |
| 696 | 696 | * Check whether the NameId is encrypted. |
| 697 | 697 | * |
| 698 | - * @return true if the NameId is encrypted, false if not. |
|
| 698 | + * @return boolean if the NameId is encrypted, false if not. |
|
| 699 | 699 | */ |
| 700 | 700 | public function isNameIdEncrypted() |
| 701 | 701 | { |
@@ -820,7 +820,7 @@ discard block |
||
| 820 | 820 | * This function returns null if there are no restrictions on how early the |
| 821 | 821 | * assertion can be used. |
| 822 | 822 | * |
| 823 | - * @return int|null The earliest timestamp this assertion is valid. |
|
| 823 | + * @return integer The earliest timestamp this assertion is valid. |
|
| 824 | 824 | */ |
| 825 | 825 | public function getNotBefore() |
| 826 | 826 | { |
@@ -847,7 +847,7 @@ discard block |
||
| 847 | 847 | * This function returns null if there are no restrictions on how |
| 848 | 848 | * late the assertion can be used. |
| 849 | 849 | * |
| 850 | - * @return int|null The latest timestamp this assertion is valid. |
|
| 850 | + * @return integer The latest timestamp this assertion is valid. |
|
| 851 | 851 | */ |
| 852 | 852 | public function getNotOnOrAfter() |
| 853 | 853 | { |
@@ -905,7 +905,7 @@ discard block |
||
| 905 | 905 | /** |
| 906 | 906 | * Retrieve the AuthnInstant of the assertion. |
| 907 | 907 | * |
| 908 | - * @return int|null The timestamp the user was authenticated, or NULL if the user isn't authenticated. |
|
| 908 | + * @return integer The timestamp the user was authenticated, or NULL if the user isn't authenticated. |
|
| 909 | 909 | */ |
| 910 | 910 | public function getAuthnInstant() |
| 911 | 911 | { |
@@ -1067,7 +1067,7 @@ discard block |
||
| 1067 | 1067 | * See: |
| 1068 | 1068 | * @url http://docs.oasis-open.org/security/saml/v2.0/saml-authn-context-2.0-os.pdf |
| 1069 | 1069 | * |
| 1070 | - * @return \SAML2\XML\Chunk|null |
|
| 1070 | + * @return Chunk |
|
| 1071 | 1071 | */ |
| 1072 | 1072 | public function getAuthnContextDecl() |
| 1073 | 1073 | { |
@@ -1097,7 +1097,7 @@ discard block |
||
| 1097 | 1097 | * |
| 1098 | 1098 | * The URI reference MAY directly resolve into an XML document containing the referenced declaration. |
| 1099 | 1099 | * |
| 1100 | - * @return string |
|
| 1100 | + * @return Chunk |
|
| 1101 | 1101 | */ |
| 1102 | 1102 | public function getAuthnContextDeclRef() |
| 1103 | 1103 | { |
@@ -246,7 +246,7 @@ discard block |
||
| 246 | 246 | |
| 247 | 247 | if ($xml->getAttribute('Version') !== '2.0') { |
| 248 | 248 | /* Currently a very strict check. */ |
| 249 | - throw new \Exception('Unsupported version: ' . $xml->getAttribute('Version')); |
|
| 249 | + throw new \Exception('Unsupported version: '.$xml->getAttribute('Version')); |
|
| 250 | 250 | } |
| 251 | 251 | |
| 252 | 252 | $this->issueInstant = Utils::xsDateTimeToTimestamp($xml->getAttribute('IssueInstant')); |
@@ -346,7 +346,7 @@ discard block |
||
| 346 | 346 | continue; |
| 347 | 347 | } |
| 348 | 348 | if ($node->namespaceURI !== Constants::NS_SAML) { |
| 349 | - throw new \Exception('Unknown namespace of condition: ' . var_export($node->namespaceURI, true)); |
|
| 349 | + throw new \Exception('Unknown namespace of condition: '.var_export($node->namespaceURI, true)); |
|
| 350 | 350 | } |
| 351 | 351 | switch ($node->localName) { |
| 352 | 352 | case 'AudienceRestriction': |
@@ -369,7 +369,7 @@ discard block |
||
| 369 | 369 | /* Currently ignored. */ |
| 370 | 370 | break; |
| 371 | 371 | default: |
| 372 | - throw new \Exception('Unknown condition: ' . var_export($node->localName, true)); |
|
| 372 | + throw new \Exception('Unknown condition: '.var_export($node->localName, true)); |
|
| 373 | 373 | } |
| 374 | 374 | } |
| 375 | 375 | } |
@@ -530,7 +530,7 @@ discard block |
||
| 530 | 530 | |
| 531 | 531 | $type = $value->getAttribute('xsi:type'); |
| 532 | 532 | if ($type === 'xs:integer') { |
| 533 | - $this->attributes[$attributeName][] = (int)$value->textContent; |
|
| 533 | + $this->attributes[$attributeName][] = (int) $value->textContent; |
|
| 534 | 534 | } else { |
| 535 | 535 | $this->attributes[$attributeName][] = trim($value->textContent); |
| 536 | 536 | } |
@@ -1287,7 +1287,7 @@ discard block |
||
| 1287 | 1287 | $document = $parentElement->ownerDocument; |
| 1288 | 1288 | } |
| 1289 | 1289 | |
| 1290 | - $root = $document->createElementNS(Constants::NS_SAML, 'saml:' . 'Assertion'); |
|
| 1290 | + $root = $document->createElementNS(Constants::NS_SAML, 'saml:'.'Assertion'); |
|
| 1291 | 1291 | $parentElement->appendChild($root); |
| 1292 | 1292 | |
| 1293 | 1293 | /* Ugly hack to add another namespace declaration to the root element. */ |
@@ -1339,7 +1339,7 @@ discard block |
||
| 1339 | 1339 | if ($this->encryptedNameId === null) { |
| 1340 | 1340 | Utils::addNameId($subject, $this->nameId); |
| 1341 | 1341 | } else { |
| 1342 | - $eid = $subject->ownerDocument->createElementNS(Constants::NS_SAML, 'saml:' . 'EncryptedID'); |
|
| 1342 | + $eid = $subject->ownerDocument->createElementNS(Constants::NS_SAML, 'saml:'.'EncryptedID'); |
|
| 1343 | 1343 | $subject->appendChild($eid); |
| 1344 | 1344 | $eid->appendChild($subject->ownerDocument->importNode($this->encryptedNameId, true)); |
| 1345 | 1345 | } |