Download the PHP package simplesamlphp/xml-security without Composer

On this page you can find all versions of the php package simplesamlphp/xml-security. It is possible to download/install these versions without Composer. Possible dependencies are resolved automatically.

FAQ

After the download, you have to make one include require_once('vendor/autoload.php');. After that you have to import the classes with use statements.

Example:
If you use only one package a project is not needed. But if you use more then one package, without a project it is not possible to import the classes with use statements.

In general, it is recommended to use always a project to download your libraries. In an application normally there is more than one library needed.
Some PHP packages are not free to download and because of that hosted in private repositories. In this case some credentials are needed to access such packages. Please use the auth.json textarea to insert credentials, if a package is coming from a private repository. You can look here for more information.

  • Some hosting areas are not accessible by a terminal or SSH. Then it is not possible to use Composer.
  • To use Composer is sometimes complicated. Especially for beginners.
  • Composer needs much resources. Sometimes they are not available on a simple webspace.
  • If you are using private repositories you don't need to share your credentials. You can set up everything on our site and then you provide a simple download link to your team member.
  • Simplify your Composer build process. Use our own command line tool to download the vendor folder as binary. This makes your build process faster and you don't need to expose your credentials for private repositories.
Please rate this library. Is it a good library?

Informations about the package xml-security

xml-security

Build Status Scrutinizer Code Quality Coverage Status PHPStan Enabled

This library implements XML signatures and encryption. It provides an extensible interface that allows you to use your own signature and encryption implementations, and deals with everything else to sign, verify, encrypt and decrypt your XML objects. It is built on top of the xml-common library, which provides you with a standard API to create PHP objects from their XML representation, as well as producing XML from your objects. The aim of the library is to provide a secure, yet flexible implementation of the xmldsig and xmlenc standards in PHP.

The library provides two main ways to use it, one API for signed XML documents, and another for encrypted ones. Additionally, the lower level APIs are available to implement those operations yourself if needed, although we highly recommend using the main interfaces.

Signature API

The XML signature API consists mainly of two interfaces:

In general, both should be used together. The former signals that an object can be signed (and as such mandates the implementation of a sign() method in the object), while the latter indicates that an object is already signed and allows the verification of its signature by means of verify() method.

Since the signature API is provided via PHP interfaces, your objects need to implement those interfaces. For your convenience, each interface is accompanied by two traits with the actual implementation for the PHP interfaces:

Both declare an abstract getId() method that you will have to implement, since only you know what attribute is declared in your XML objects to act as an xml:id.

The two interfaces mentioned extend from a third one, SimpleSAML\XMLSecurity\XML\CanonicalizableElementInterface. This interface ensures that your XML objects can be properly canonicalized, so that if they were created from an actual XML document, it will be possible to restore that original XML document from your object. Again, a SimpleSAML\XMLSecurity\XML\CanonicalizableElementTrait is provided for your convenience. This trait implements the canonicalization for you, and ensures that your object can be serialized and later unserialized, but in exchange requires you to implement a getOriginalXML() method. This means you will have to keep the original XML that created your object, if any.

In general, your code should implement both main interfaces and use the traits. The bare minimum you will need to do to add XML signature capabilities to your objects will look like the following:

However, we strongly recommend your XML objects to build on top of the API provided by xml-common. That way, you should probably have an abstract class to declare your namespace and namespace prefix:

Then your object can extend from that:

Have a look at the CustomSignable class provided with the tests in this repository to get an idea of how a working implementation could look like.

When dealing with XML signatures, you typically need to provide two things: the signature algorithm you want to use and a key. Depending on the algorithm, one type of key or another would be suitable. For that reason, this library introduces the concept of a SignatureAlgorithm, which is a given instance of an algorithm with a key associated. SignatureAlgorithms can be used then as signers (when signing an object) and verifiers (when used to verify a signature). This interface, together with the ones provided for key material and signature backends, will allow you to sign and verify signatures without much effort.

Signing

If you want to sign an object representing an XML document, the SignableElementTrait provides you with a doSign() method that you can use for your convenience. This method takes the XML document you want to sign, and returns another document result of applying all signature transforms to the input. The signer implementation to use will be obtained from the $signer property of the trait, which in turn will be set by the sign() method it provides as well. After the XML is signed successfully, doSign() will not only return the signed version of it, but also populate the $signature property with a Signature object.

If you are using the API provided by xml-common, you would typically implement support for signing your objects like this:

Note that you will need to implement a mechanism to obtain the actual DOMElement to sign. It could be a method itself, as depicted in this example, or it could be stored in a class property.

At this point, your object is ready to be signed. You just need to create a signer, pass it to sign(), and create the XML representation (which will do the actual signing) by calling toXML():

That's it, you have signed your first object!

Now, you can customize your signatures as much as you want. For example, you can add the X509 certificate corresponding your private key to it, and specify the canonicalization algorithm to use:

If you are planning on embedding your signed object inside a larger XML document, make sure to give it an unique identifier. Your object will need to generate an XML with an ID attribute (of type xml:id) holding the identifier of the element, and the getId() method must return that very same identifier.

Verifying

In order to verify signed objects, the SignedElementInterface provides you with the following methods:

If your class has implemented support for signing its objects, and you are implementing the SignedElementInterface and using the SignedElementTrait, support for verifying the signatures comes out of the box.

The process for verifying a signature is similar to the one of creating one. You will need to instantiate a signature verifier with some key material and a signature algorithm, and use it to verify the signature itself:

:warning: WARNING

Note the $verified variable returned by verify(). The method does not return a boolean value to tell you if the signature was verified or not. Instead, if it fails to verify, an exception will be thrown. Its return value then is an object of the same class of your original object ($myObject), only that it is built based on the XML document whose signature has been verified. It is very important that you use only objects built based on a verified signature. Otherwise, any possible issue during the signature process could leave you with a tampered object whose signature doesn't really verify.

There is one alternative way to verify signatures. If the signature itself contains the key we can use to verify it (namely, an X509 certificate), then we can call verify() without passing a verifier to it, and check that the key used to verify the signature matches the one we expect:

This last usage pattern is more convenient since you don't have to create a verifier, although it forces you to remember that you need to check the key used to verify the signature.

Encryption API

The XML encryption API is similar to its signature counterpart, and also consists of two main interfaces:

Just like in the signature API, the former signals that an object can be encrypted (and as such requires the implementation of an encrypt() method), while the latter means an object is already encrypted (and therefore requires a decrypt() method to be implemented). There is a substantial difference with the signature API though: you need to implement two different classes, one for your objects themselves, and another for your encrypted objects. The former will then implement EncryptableElementInterface, while the latter will be the one implementing EncryptedElementInterface.

Again, the library provides a couple of traits for your convenience, in order to minimise the amount of code you have to write. Those traits are:

Both traits are somewhat asymmetrical, in the sense that while EncryptableElementTrait does implement the encrypt() method, the EncryptedElementTrait does not implement its decrypt() counterpart. This is because the way objects are encrypted may vary a lot, and the application itself will be the only one that knows exactly how that should be done. A basic default implementation that should cover most use cases is provided, though.

As with digital signatures, we provide classes that demonstrate the encryption functionality. You may have a look at the CustomSignable class provided with the tests in order to see how encryption can be added to your objects, and the EncryptedCustom class will then demonstrate how to deal with objects that are already encrypted.

Decrypting objects

In XML encryption, when you have an encrypted object, you typically wrap that inside a specific element that signals that the object represents an encrypted version of another object. You may have your own elements and logic in that encrypted object, but the absolute minimum would be an xenc:EncryptedData element inside. This means you will have to create classes for your encrypted objects, and they will have to implement the EncryptedElementInterface.

The simplest approach is then to take advantage of EncryptedElementTrait and again, we recommend taking advantage of the XML object framework provided by simplesamlphp/xml-common. The only thing you will then have to implement is the decrypt() method, and a couple of getters required by the trait:

Note that the value returned by decrypt() here is your own MyObject class. This means MyObject needs to extend SimpleSAML\XML\ElementInterface, but it is also one of the reasons why the implementation of decrypt() is left to the application.

Now, the aim of this library is of course to make your life easier so that you don't actually have to implement decryption yourself. The following implementation of decrypt() will be suitable for most use cases:

So what did just happen here? MyObject is supposed to implement ElementInterface, right? That means it must implement a fromXML() static method that creates a new instance of the class based on what's passed to it as a DOMElement object. The DOMElement itself was created with help from the DOMDocumentFactory class, which in turn took the string result of calling the decryptData() method provided by the trait. And that's it, that might be all you need to decrypt your encrypted objects!

Bear in mind though that this is the most basic use case. Your encrypted objects will need to look like this:

If you need any more elements inside, attributes in the root element or anything else, you will have to adjust the implementation for that. In that case, you may need a different constructor for your encrypted objects than the one provided by the trait. You can define your own constructor while taking advantage of the one in the trait by renaming the latter:

Similarly, if your encryption scheme does not fit with any of the two supported by default, you will also need to implement it yourself. The two encryption schemes supported are:

The SimpleSAML\XMLSecurity\XML\EncryptedElementTrait::decryptData() method is capable of handling both encryption schemes. If your application uses any of those, you can just use the method by passing the appropriate decryptor as explained earlier. If you are using shared key encryption, you can then just do the following:

:warning: WARNING

Always make sure that the algorithm specified in the <xenc:EncryptionMethod> element is a block cipher algorithm. Only in that case the library will attempt to decrypt using the shared secret encryption scheme. The SimpleSAML\XMLSecurity\Constants::$BLOCK_CIPHER_ALGORITHMS associative array contains as keys all the identifiers of block ciphers supported by this library.

Alternatively, if your application uses asymmetric encryption, you will have to use an appropriate decryptor instantiated with your private key in order to decrypt your objects:

One last note: you may have noticed the getBlacklistedAlgorithms() and getEncryptionBackend() methods that you are required to implement when using EncryptedElementTrait. These methods are needed because of asymmetric encryption support. Since the library will have to create a block cipher decryptor with the session key, the user does not control that decryptor and therefore won't be able to specify directly neither the algorithms to forbid nor the encryption backend to use. Hence the need of these two methods, which will allow the trait to modify any of those parameters for the decryptor it will build. If you just want to use the default values, just implement them to return null. However, if you want to customise the algorithms you accept and/or the backend to use, then you will have to return the desired values in those methods.

Encrypting objects

If you want to support decrypting objects, it is likely that you also want to encrypt them in the first place. Doing so is as simple as implementing the SimpleSAML\XMLSecurity\XML\EncryptableElementInterface:

That's it. Easy, isn't it? In this case, the encrypt() method is provided directly by SimpleSAML\XMLSecurity\XML\EncryptableElementTrait, since its return value will always be a SimpleSAML\XMLSecurity\XML\xenc\EncryptedData object. Again, you have to implement a couple of abstract methods required by the trait in order to tell it what algorithms are supported and what backend it should use in case of asymmetric encryption.

Now, we just need to actually encrypt our objects. If our application uses shared key encryption, we just need to create an appropriate encryptor with a symmetric key:

If, on the contrary, we want to use an asymmetric encryption scheme, our encryptor will need to implement a key transport algorithm, and use a public key:

That will cover most needs. In general, asymmetric encryption will be preferred for most applications, as secret management is a difficult problem to tackle. If you need to implement a different encryption scheme than the two supported here, you will have to implement the encrypt() method yourself.

Extending the library

Not available yet.

Keys for testing purposes

All encrypted keys use '1234' as passphrase.

The following keys are available:


All versions of xml-security with dependencies

PHP Build Version
Package Version
Requires php Version ^8.1
ext-dom Version *
ext-hash Version *
ext-mbstring Version *
ext-openssl Version *
ext-pcre Version *
ext-spl Version *
simplesamlphp/assert Version ^1.1
simplesamlphp/xml-common Version ^1.15
Composer command for our command line client (download client) This client runs in each environment. You don't need a specific PHP version etc. The first 20 API calls are free. Standard composer command

The package simplesamlphp/xml-security contains the following files

Loading the files please wait ....