summaryrefslogtreecommitdiffstats
path: root/src/de/fhswf/in/inf/fit/aufgabe6/LoginServletWithJpaAndJsp.java
blob: a877dc289b0c82f0626ef7c28ba9ec27c980852c (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
package de.fhswf.in.inf.fit.aufgabe6;

import java.io.IOException;
import java.security.MessageDigest;
import java.security.NoSuchAlgorithmException;
import java.util.Base64;

import javax.persistence.EntityManager;
import javax.persistence.EntityManagerFactory;
import javax.persistence.Persistence;
import javax.servlet.ServletException;
import javax.servlet.annotation.WebServlet;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;

import de.fhswf.in.inf.fit.aufgabe5.model.Account;

/**
 * Servlet implementation class LoginServletWithJpaAndJsp
 */
@WebServlet("/LoginServletWithJpaAndJsp")
public class LoginServletWithJpaAndJsp extends HttpServlet
{
   private static final long serialVersionUID = 1L;

   /**
    * @see HttpServlet#HttpServlet()
    */
   public LoginServletWithJpaAndJsp()
   {
      super();
   }

   /**
    * @see HttpServlet#doGet(HttpServletRequest request, HttpServletResponse
    *      response)
    */
   protected void doGet(HttpServletRequest request,
         HttpServletResponse response) throws ServletException, IOException
   {
      response.sendRedirect("LoginFormWithJpaAndJsp.jsp");
   }

   /**
    * @see HttpServlet#doPost(HttpServletRequest request, HttpServletResponse
    *      response)
    */
   protected void doPost(HttpServletRequest request,
         HttpServletResponse response) throws ServletException, IOException
   {
      String requestUsername = request.getParameter("username");
      String requestPassword = request.getParameter("password");

      if (requestUsername == null || requestPassword == null)
      {
         doGet(request, response);
      }

      EntityManagerFactory emf = Persistence.createEntityManagerFactory(
            getServletContext().getInitParameter("persistenceUnit"));
      EntityManager em = emf.createEntityManager();

      Account account = em.find(Account.class, requestUsername);
      emf.close();

      // This is very insecure and can be exploited via timing attacks
      if (account != null && account.getPassword().equals(
            createSaltedPasswordHash(requestPassword, account.getSalt())))
      {
         request.getSession().setAttribute("username", account.getUsername());

         response.sendRedirect("LoginSuccess.jsp");
      }
      else
      {
         doGet(request, response);
      }
   }

   /**
    * Generate a Base64 encoded SHA-1 hashed password that is salted.
    *
    * @param password
    *           The password to encode.
    * @param salt
    *           The salt for salting the password.
    * @return The salted and encoded password hash.
    */
   public static String createSaltedPasswordHash(String password, String salt)
   {
      if (password == null)
      {
         throw new IllegalArgumentException("Password can't be null");
      }

      if (salt == null)
      {
         throw new IllegalArgumentException("Salt can't be null");
      }

      try
      {
         MessageDigest md = MessageDigest.getInstance("SHA-1");
         md.update((password + salt).getBytes());
         return Base64.getEncoder().encodeToString(md.digest());
      }
      catch (NoSuchAlgorithmException e)
      {
         throw new IllegalStateException(
               "SHA-1 for some reason is not supported.", e);
      }
   }

}