diff --git a/lib/SimpleSAML/Auth/TimeLimitedToken.php b/lib/SimpleSAML/Auth/TimeLimitedToken.php index 3c991ce946c1a6b6391f0d5d599733f6b40fb4a0..2c48723f8a2ad649396729325623b2fe8b9717b6 100644 --- a/lib/SimpleSAML/Auth/TimeLimitedToken.php +++ b/lib/SimpleSAML/Auth/TimeLimitedToken.php @@ -14,7 +14,7 @@ class SimpleSAML_Auth_TimeLimitedToken { */ public function __construct( $lifetime = 900, $secretSalt = NULL, $skew = 1) { if ($secretSalt === NULL) { - $secretSalt = SimpleSAML_Utilities::getSecretSalt(); + $secretSalt = SimpleSAML_Utils_Config::getSecretSalt(); } $this->secretSalt = $secretSalt; diff --git a/lib/SimpleSAML/Utilities.php b/lib/SimpleSAML/Utilities.php index f130b24f819a8ca84a18534db1867f3ca45b649f..e5f814adea0bc265b35c77e343d91324bd25ce6a 100644 --- a/lib/SimpleSAML/Utilities.php +++ b/lib/SimpleSAML/Utilities.php @@ -1161,27 +1161,10 @@ class SimpleSAML_Utilities { /** - * Retrieve secret salt. - * - * This function retrieves the value which is configured as the secret salt. It will - * check that the value exists and is set to a non-default value. If it isn't, an - * exception will be thrown. - * - * The secret salt can be used as a component in hash functions, to make it difficult to - * test all possible values in order to retrieve the original value. It can also be used - * as a simple method for signing data, by hashing the data together with the salt. - * - * @return string The secret salt. + * @deprecated This function will be removed in SSP 2.0. Please use SimpleSAML_Utils_Config::getSecretSalt() instead. */ public static function getSecretSalt() { - - $secretSalt = SimpleSAML_Configuration::getInstance()->getString('secretsalt'); - if ($secretSalt === 'defaultsecretsalt') { - throw new Exception('The "secretsalt" configuration option must be set to a secret' . - ' value.'); - } - - return $secretSalt; + return SimpleSAML_Utils_Config::getSecretSalt(); } diff --git a/lib/SimpleSAML/Utils/Config.php b/lib/SimpleSAML/Utils/Config.php new file mode 100644 index 0000000000000000000000000000000000000000..43ade2aa672a63fe598f2089798fb557e3e2781f --- /dev/null +++ b/lib/SimpleSAML/Utils/Config.php @@ -0,0 +1,36 @@ +<?php + + +/** + * Utility class for SimpleSAMLphp configuration management and manipulation. + * + * @package SimpleSAMLphp + */ +class SimpleSAML_Utils_Config +{ + + /** + * Retrieve the secret salt. + * + * This function retrieves the value which is configured as the secret salt. It will check that the value exists + * and is set to a non-default value. If it isn't, an exception will be thrown. + * + * The secret salt can be used as a component in hash functions, to make it difficult to test all possible values + * in order to retrieve the original value. It can also be used as a simple method for signing data, by hashing the + * data together with the salt. + * + * @return string The secret salt. + * + * @throws SimpleSAML_Error_Exception If the secret salt hasn't been configured. + * @author Olav Morken, UNINETT AS <olav.morken@uninett.no> + */ + public static function getSecretSalt() + { + $secretSalt = SimpleSAML_Configuration::getInstance()->getString('secretsalt'); + if ($secretSalt === 'defaultsecretsalt') { + throw new SimpleSAML_Error_Exception('The "secretsalt" configuration option must be set to a secret value.'); + } + + return $secretSalt; + } +} \ No newline at end of file diff --git a/lib/SimpleSAML/Utils/Crypto.php b/lib/SimpleSAML/Utils/Crypto.php index c3090e18bc815f0bbae9f5ac21427691b70d3042..d7eee79abdd844846743153df41e02d39eea577f 100644 --- a/lib/SimpleSAML/Utils/Crypto.php +++ b/lib/SimpleSAML/Utils/Crypto.php @@ -34,7 +34,7 @@ class SimpleSAML_Utils_Crypto $ivSize = mcrypt_get_iv_size($enc, $mode); $keySize = mcrypt_get_key_size($enc, $mode); - $key = hash('sha256', SimpleSAML_Utilities::getSecretSalt(), true); + $key = hash('sha256', SimpleSAML_Utils_Config::getSecretSalt(), true); $key = substr($key, 0, $keySize); $iv = substr($ciphertext, 0, $ivSize); @@ -75,7 +75,7 @@ class SimpleSAML_Utils_Crypto $ivSize = mcrypt_get_iv_size($enc, $mode); $keySize = mcrypt_get_key_size($enc, $mode); - $key = hash('sha256', SimpleSAML_Utilities::getSecretSalt(), true); + $key = hash('sha256', SimpleSAML_Utils_Config::getSecretSalt(), true); $key = substr($key, 0, $keySize); $len = strlen($data); diff --git a/modules/consent/lib/Auth/Process/Consent.php b/modules/consent/lib/Auth/Process/Consent.php index 0cc8950733403a4808208c6a8f64a3cd3bb50157..87c954d525778624ff84412e060196e95f614f13 100644 --- a/modules/consent/lib/Auth/Process/Consent.php +++ b/modules/consent/lib/Auth/Process/Consent.php @@ -290,7 +290,7 @@ class sspmod_consent_Auth_Process_Consent extends SimpleSAML_Auth_ProcessingFilt */ public static function getHashedUserID($userid, $source) { - return hash('sha1', $userid . '|' . SimpleSAML_Utilities::getSecretSalt() . '|' . $source); + return hash('sha1', $userid . '|' . SimpleSAML_Utils_Config::getSecretSalt() . '|' . $source); } /** @@ -304,7 +304,7 @@ class sspmod_consent_Auth_Process_Consent extends SimpleSAML_Auth_ProcessingFilt */ public static function getTargetedID($userid, $source, $destination) { - return hash('sha1', $userid . '|' . SimpleSAML_Utilities::getSecretSalt() . '|' . $source . '|' . $destination); + return hash('sha1', $userid . '|' . SimpleSAML_Utils_Config::getSecretSalt() . '|' . $source . '|' . $destination); } /** diff --git a/modules/consent/lib/Consent/Store/Cookie.php b/modules/consent/lib/Consent/Store/Cookie.php index 265d36cf7391261675cf5667d6f286f6697a85c6..81ce16fbd1ed4a6ef7341a72da38a14894d22e9b 100644 --- a/modules/consent/lib/Consent/Store/Cookie.php +++ b/modules/consent/lib/Consent/Store/Cookie.php @@ -199,7 +199,7 @@ class sspmod_consent_Consent_Store_Cookie extends sspmod_consent_Store { assert('is_string($data)'); - $secretSalt = SimpleSAML_Utilities::getSecretSalt(); + $secretSalt = SimpleSAML_Utils_Config::getSecretSalt(); return sha1($secretSalt . $data . $secretSalt) . ':' . $data; } diff --git a/modules/core/lib/Auth/Process/TargetedID.php b/modules/core/lib/Auth/Process/TargetedID.php index aafdd23641fe0d5fb17aeb1b63e29160369f37a8..4cc86ff539a3f818e266f38744d5239892af6130 100644 --- a/modules/core/lib/Auth/Process/TargetedID.php +++ b/modules/core/lib/Auth/Process/TargetedID.php @@ -100,7 +100,7 @@ class sspmod_core_Auth_Process_TargetedID extends SimpleSAML_Auth_ProcessingFilt } - $secretSalt = SimpleSAML_Utilities::getSecretSalt(); + $secretSalt = SimpleSAML_Utils_Config::getSecretSalt(); if (array_key_exists('Source', $state)) { $srcID = self::getEntityId($state['Source']); diff --git a/modules/saml/lib/Auth/Process/PersistentNameID.php b/modules/saml/lib/Auth/Process/PersistentNameID.php index 511675576af0a65fc1ec32630227ec2bc6138950..3f0f478f343181d345ee1448ba201302b43eaeae 100644 --- a/modules/saml/lib/Auth/Process/PersistentNameID.php +++ b/modules/saml/lib/Auth/Process/PersistentNameID.php @@ -64,7 +64,7 @@ class sspmod_saml_Auth_Process_PersistentNameID extends sspmod_saml_BaseNameIDGe $uid = array_values($state['Attributes'][$this->attribute]); /* Just in case the first index is no longer 0. */ $uid = $uid[0]; - $secretSalt = SimpleSAML_Utilities::getSecretSalt(); + $secretSalt = SimpleSAML_Utils_Config::getSecretSalt(); $uidData = 'uidhashbase' . $secretSalt; $uidData .= strlen($idpEntityId) . ':' . $idpEntityId; diff --git a/modules/saml/lib/IdP/SAML2.php b/modules/saml/lib/IdP/SAML2.php index 934a140636d094cb4d6091564ab98aad6a61092a..82b7e90aa2c79a63fd375c4b0c6a76528813aa5c 100644 --- a/modules/saml/lib/IdP/SAML2.php +++ b/modules/saml/lib/IdP/SAML2.php @@ -628,7 +628,7 @@ class sspmod_saml_IdP_SAML2 { $idpEntityId = $idpMetadata->getString('entityid'); $spEntityId = $spMetadata->getString('entityid'); - $secretSalt = SimpleSAML_Utilities::getSecretSalt(); + $secretSalt = SimpleSAML_Utils_Config::getSecretSalt(); $uidData = 'uidhashbase' . $secretSalt; $uidData .= strlen($idpEntityId) . ':' . $idpEntityId;