Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(C) Verify JWT Using an RSA Public Key (RS256, RS384, RS512)Demonstrates how to verify a JWT that was signed using an RSA private key. This example verifies the RSA signature. It also does the following:
#include <C_CkPublicKey.h> #include <C_CkJwt.h> #include <C_CkJsonObject.h> void ChilkatSample(void) { HCkPublicKey pubKey; BOOL success; HCkJwt jwt; const char *token; BOOL sigVerified; int leeway; BOOL bTimeValid; const char *payload; HCkJsonObject json; const char *joseHeader; // Demonstrates how to verify an JWT using an RSA public key. // This example requires the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. pubKey = CkPublicKey_Create(); success = CkPublicKey_LoadFromFile(pubKey,"qa_data/pem/rsa_public.pem"); jwt = CkJwt_Create(); token = "eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJodHRwOi8vZXhhbXBsZS5vcmciLCJzdWIiOiJKb2huIiwiYXVkIjoiaHR0cDovL2V4YW1wbGUuY29tIiwiaWF0IjoxNDYzNDQ1MjM4LCJuYmYiOjE0NjM0NDUyMzgsImV4cCI6MTQ2MzQ0ODgzOH0.XRtqed6nuJ9lrp0wbNdDX3fCkSh_d9cHAniPbNcqm7G-5N3mtI5ntQvZBDP3pHtECVqufuDwW7XgUtzAi0ZXhyiRm1iZ3wMSN5lHWv52OQJmMHPA7VPd8Q1hDG-tx-QswzJKd75OEUHP7wIXq2Mg_YVElfDvJI6TGjGyS1y-RLHlz-ldlGsEwIBkO0PtzIYTVov97x8p9KCsPNhS4lZUIqKOYoTZUV5LpuAWARl-636DfMEB_A5_IEaw_W8leh2suP2ULVZxwE-Tk1kBC9tsSGrBrPTtg7sziaV4Lbb0JRANmh98uTRu5f8ji9CVOnpbMiAzjsJSy56kz_olweXSuA"; // First verify the signature. sigVerified = CkJwt_VerifyJwtPk(jwt,token,pubKey); printf("verified: %d\n",sigVerified); // Let's see if the time constraints, if any, are valid. // The above JWT was created on the afternoon of 16-May-2016, with an expiration of 1 hour. // If the current system time is before the "nbf" time, or after the "exp" time, // then IsTimeValid will return false/0. // Also, we'll allow a leeway of 60 seconds to account for any clock skew. // Note: If the token has no "nbf" or "exp" claim fields, then IsTimeValid is always true. leeway = 60; bTimeValid = CkJwt_IsTimeValid(jwt,token,leeway); printf("time constraints valid: %d\n",bTimeValid); // Now let's recover the original claims JSON (the payload). payload = CkJwt_getPayload(jwt,token); // The payload will likely be in compact form: printf("%s\n",payload); // We can format for human viewing by loading it into Chilkat's JSON object // and emit. json = CkJsonObject_Create(); success = CkJsonObject_Load(json,payload); CkJsonObject_putEmitCompact(json,FALSE); printf("%s\n",CkJsonObject_emit(json)); // We can recover the original JOSE header in the same way: joseHeader = CkJwt_getHeader(jwt,token); // The payload will likely be in compact form: printf("%s\n",joseHeader); // We can format for human viewing by loading it into Chilkat's JSON object // and emit. success = CkJsonObject_Load(json,joseHeader); CkJsonObject_putEmitCompact(json,FALSE); printf("%s\n",CkJsonObject_emit(json)); CkPublicKey_Dispose(pubKey); CkJwt_Dispose(jwt); CkJsonObject_Dispose(json); } |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.