blob: f98b9ab6c3a914861a9669b81ac546a6d913283f (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
|
package de.fhswf.in.inf.fit.aufgabe5;
import java.io.IOException;
import java.io.PrintWriter;
import javax.persistence.EntityManager;
import javax.persistence.EntityManagerFactory;
import javax.persistence.Persistence;
import javax.servlet.ServletException;
import javax.servlet.annotation.WebServlet;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import de.fhswf.in.inf.fit.aufgabe5.model.Account;
/**
* Servlet implementation class LoginServlet
*/
@WebServlet("/LoginServletWithJpa")
public class LoginServletWithJpa extends HttpServlet
{
private static final long serialVersionUID = 1L;
/**
* @see HttpServlet#HttpServlet()
*/
public LoginServletWithJpa()
{
super();
}
/**
* @see HttpServlet#doGet(HttpServletRequest request, HttpServletResponse
* response)
*/
protected void doGet(HttpServletRequest request,
HttpServletResponse response) throws ServletException, IOException
{
response.sendRedirect("LoginFormWithJpa.jsp");
}
/**
* @see HttpServlet#doPost(HttpServletRequest request, HttpServletResponse
* response)
*/
protected void doPost(HttpServletRequest request,
HttpServletResponse response) throws ServletException, IOException
{
String requestUsername = request.getParameter("username");
String requestPassword = request.getParameter("password");
if (requestUsername == null || requestPassword == null)
{
doGet(request, response);
}
EntityManagerFactory emf = Persistence.createEntityManagerFactory(
getServletContext().getInitParameter("persistenceUnit"));
EntityManager em = emf.createEntityManager();
Account account = em.find(Account.class, requestUsername);
PrintWriter pw = response.getWriter();
pw.println("<!DOCTYPE html>");
pw.println("<html>");
pw.println("<head>");
pw.println("<meta charset=\"utf-8\" />");
pw.println("<title>Login Answer</title>");
pw.println("</head>");
pw.println("<body>");
// This is very insecure and can be exploited via timing attacks
if (account != null && account.isPasswordCorrect(requestPassword))
{
pw.println("<h1>Success</h1>");
request.getSession().setAttribute("loggedin", true);
}
else
{
pw.println("<h1>Failed</h1>");
pw.println("<a href=\"LoginFormWithJpa.jsp\">Retry</a>");
}
pw.println("</body>");
pw.println("</html>");
emf.close();
}
}
|