88use RobRichards \XMLSecLibs \XMLSecurityKey ;
99use SAML2 \{Assertion , EncryptedAssertion }; // Assertions
1010use SAML2 \{AuthnRequest , LogoutRequest , LogoutResponse , Response , StatusResponse }; // Messages
11+ use SAML2 \Message as SAMLMessage ;
1112use SimpleSAML \{Configuration , Error as SSP_Error , Logger , Utils };
1213use SimpleSAML \Assert \Assert ;
1314use SimpleSAML \SAML2 \{Constants as C , SignedElement };
1415use SimpleSAML \SAML2 \XML \saml \Issuer ;
1516use SimpleSAML \SAML2 \XML \saml \AuthnContextClassRef ;
17+ use SimpleSAML \SAML2 \XML \samlp \AbstractMessage ;
1618use SimpleSAML \SAML2 \XML \samlp \RequestedAuthnContext ;
1719use SimpleSAML \SAML2 \XML \samlp \{StatusCode , StatusMessage }; // Status
1820use SimpleSAML \XMLSecurity \XML \ds \{KeyInfo , X509Certificate , X509Data };
@@ -102,7 +104,7 @@ public static function addSign(
102104 private static function addRedirectSign (
103105 Configuration $ srcMetadata ,
104106 Configuration $ dstMetadata ,
105- \ SAML2 \ Message $ message ,
107+ SAMLMessage $ message ,
106108 ): void {
107109 $ signingEnabled = null ;
108110 if ($ message instanceof LogoutRequest || $ message instanceof LogoutResponse) {
@@ -209,7 +211,7 @@ public static function checkSign(Configuration $srcMetadata, SignedElement $elem
209211 public static function validateMessage (
210212 Configuration $ srcMetadata ,
211213 Configuration $ dstMetadata ,
212- \ SimpleSAML \ SAML2 \ XML \ samlp \ AbstractMessage $ message ,
214+ AbstractMessage $ message ,
213215 ): bool {
214216 $ enabled = null ;
215217 if ($ message instanceof LogoutRequest || $ message instanceof LogoutResponse) {
@@ -262,7 +264,7 @@ public static function validateMessage(
262264 public static function getDecryptionKeys (
263265 Configuration $ srcMetadata ,
264266 Configuration $ dstMetadata ,
265- $ encryptionMethod = null ,
267+ ? string $ encryptionMethod = null ,
266268 ): array {
267269 $ sharedKey = $ srcMetadata ->getOptionalString ('sharedkey ' , null );
268270 if ($ sharedKey !== null ) {
@@ -414,7 +416,6 @@ private static function decryptAssertion(
414416 * @param \SimpleSAML\SAML2\Assertion|\SimpleSAML\SAML2\Assertion $assertion
415417 * The assertion containing any possibly encrypted attributes.
416418 *
417- *
418419 * @throws \SimpleSAML\Error\Exception if we cannot get the decryption keys or decryption fails.
419420 */
420421 private static function decryptAttributes (
@@ -458,10 +459,11 @@ private static function decryptAttributes(
458459 *
459460 * @return \SimpleSAML\Module\saml\Error The error.
460461 */
461- public static function getResponseError (StatusResponse $ response ): \ SimpleSAML \ Module \ saml \ Error
462+ public static function getResponseError (StatusResponse $ response ): SAMLError
462463 {
463464 $ status = $ response ->getStatus ();
464465 $ subcode = null ;
466+
465467 if (!empty ($ status ->getStatusCode ()->getSubCodes ())) {
466468 $ subcodes = array_map (
467469 function (StatusCode $ code ) {
@@ -472,7 +474,7 @@ function (StatusCode $code) {
472474 $ subcode = implode (' / ' , $ subcodes );
473475 }
474476
475- return new \ SimpleSAML \ Module \ saml \ Error (
477+ return new SAMLError (
476478 $ status ->getStatusCode ()->getValue (),
477479 $ subcode ,
478480 $ status ->getStatusMessage ()?->getContent(),
0 commit comments