diff --git a/core/core.services.yml b/core/core.services.yml
index 246f75bfedce573cee0b1ef8e70498cfbd4c648b..e8b6464e8bc916505f6e420425b984446f3eca59 100644
--- a/core/core.services.yml
+++ b/core/core.services.yml
@@ -460,9 +460,9 @@ services:
     arguments: ['@state']
   csrf_token:
     class: Drupal\Core\Access\CsrfTokenGenerator
-    arguments: ['@private_key', '@settings']
+    arguments: ['@private_key']
     calls:
-      - [setCurrentUser, ['@?current_user=']]
+      - [setCurrentUser, ['@?current_user']]
   access_manager:
     class: Drupal\Core\Access\AccessManager
     arguments: ['@router.route_provider', '@url_generator', '@paramconverter_manager']
diff --git a/core/lib/Drupal/Core/Access/CsrfTokenGenerator.php b/core/lib/Drupal/Core/Access/CsrfTokenGenerator.php
index b7441b9295b58b006db5a71a42bfcc38aad92415..527fffda38c71074266ee89dfef82aae5057f37f 100644
--- a/core/lib/Drupal/Core/Access/CsrfTokenGenerator.php
+++ b/core/lib/Drupal/Core/Access/CsrfTokenGenerator.php
@@ -8,7 +8,6 @@
 namespace Drupal\Core\Access;
 
 use Drupal\Component\Utility\Crypt;
-use Drupal\Component\Utility\Settings;
 use Drupal\Core\PrivateKey;
 use Drupal\Core\Session\AccountInterface;
 
@@ -33,24 +32,14 @@ class CsrfTokenGenerator {
    */
   protected $currentUser;
 
-  /**
-   * The settings instance.
-   *
-   * @var \Drupal\Component\Utility\Settings
-   */
-  protected $settings;
-
   /**
    * Constructs the token generator.
    *
    * @param \Drupal\Core\PrivateKey $private_key
    *   The private key service.
-   * @param \Drupal\Component\Utility\Settings $settings
-   *   The settings instance.
    */
-  public function __construct(PrivateKey $private_key, Settings $settings) {
+  public function __construct(PrivateKey $private_key) {
     $this->privateKey = $private_key;
-    $this->settings = $settings;
   }
 
   /**
@@ -83,7 +72,7 @@ public function setCurrentUser(AccountInterface $current_user = NULL) {
    * @see drupal_session_start()
    */
   public function get($value = '') {
-    return Crypt::hmacBase64($value, session_id() . $this->privateKey->get() . $this->settings->get('hash_salt'));
+    return Crypt::hmacBase64($value, session_id() . $this->privateKey->get() . drupal_get_hash_salt());
   }
 
   /**
diff --git a/core/tests/Drupal/Tests/Core/Access/CsrfTokenGeneratorTest.php b/core/tests/Drupal/Tests/Core/Access/CsrfTokenGeneratorTest.php
index 26428dc91f465b53a0860564a0ed0414fcc89412..766d6413275513e4d59756b78dd1d71383c17b45 100644
--- a/core/tests/Drupal/Tests/Core/Access/CsrfTokenGeneratorTest.php
+++ b/core/tests/Drupal/Tests/Core/Access/CsrfTokenGeneratorTest.php
@@ -5,12 +5,12 @@
  * Contains \Drupal\Tests\Core\Access\CsrfTokenGeneratorTest.
  */
 
-namespace Drupal\Tests\Core\Access;
+namespace Drupal\Tests\Core\Access {
 
 use Drupal\Tests\UnitTestCase;
 use Drupal\Core\Access\CsrfTokenGenerator;
 use Drupal\Component\Utility\Crypt;
-use Drupal\Component\Utility\Settings;
+use Symfony\Component\HttpFoundation\Request;
 
 /**
  * Tests the CSRF token generator.
@@ -48,7 +48,7 @@ function setUp() {
       ->method('get')
       ->will($this->returnValue($this->key));
 
-    $this->generator = new CsrfTokenGenerator($private_key, new Settings(array('hash_salt' => 'test')));
+    $this->generator = new CsrfTokenGenerator($private_key);
   }
 
   /**
@@ -153,3 +153,16 @@ public function providerTestInvalidParameterTypes() {
   }
 
 }
+
+}
+
+/**
+ * @todo Remove this when https://drupal.org/node/2036259 is resolved.
+ */
+namespace {
+  if (!function_exists('drupal_get_hash_salt')) {
+    function drupal_get_hash_salt() {
+      return hash('sha256', 'test_hash_salt');
+    }
+  }
+}