Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Unicode C++) Verify JWT Using HS256, HS384, or HS512Demonstrates how to verify a JWT that was signed using HS256, HS384, or HS512. (HS256 is JWT's acronym for HMAC-SHA256.) This example verifies the signature. It also does the following:
#include <CkJwtW.h> #include <CkJsonObjectW.h> void ChilkatSample(void) { // Demonstrates how to verify an HMAC JWT using a shared secret (password). // This example requires the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. CkJwtW jwt; const wchar_t *token = L"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJodHRwOi8vZXhhbXBsZS5vcmciLCJzdWIiOiJKb2huIiwiYXVkIjoiaHR0cDovL2V4YW1wbGUuY29tIiwiaWF0IjoxNDYzNDMxODEyLCJuYmYiOjE0NjM0MzE4MTIsImV4cCI6MTQ2MzQzNTQxMn0.SHnMJ11qJH5pbp22YchT_9fL2HIx0koHiUHLG67_foU"; // First verify the signature. // The password used to create this JWT was "secret". bool sigVerified = jwt.VerifyJwt(token,L"secret"); wprintf(L"with correct password: %d\n",sigVerified); // Now try with a different password: sigVerified = jwt.VerifyJwt(token,L"secret2"); wprintf(L"with incorrect password %d\n",sigVerified); // Let's see if the time constraints, if any, are valid. // The above JWT was created on the afternoon of 16-May-2016, with an expiration of 1 hour. // If the current system time is before the "nbf" time, or after the "exp" time, // then IsTimeValid will return false/0. // Also, we'll allow a leeway of 60 seconds to account for any clock skew. // Note: If the token has no "nbf" or "exp" claim fields, then IsTimeValid is always true. int leeway = 60; bool bTimeValid = jwt.IsTimeValid(token,leeway); wprintf(L"time constraints valid: %d\n",bTimeValid); // Now let's recover the original claims JSON (the payload). const wchar_t *payload = jwt.getPayload(token); // The payload will likely be in compact form: wprintf(L"%s\n",payload); // We can format for human viewing by loading it into Chilkat's JSON object // and emit. CkJsonObjectW json; bool success = json.Load(payload); json.put_EmitCompact(false); wprintf(L"%s\n",json.emit()); // We can recover the original JOSE header in the same way: const wchar_t *joseHeader = jwt.getHeader(token); // The payload will likely be in compact form: wprintf(L"%s\n",joseHeader); // We can format for human viewing by loading it into Chilkat's JSON object // and emit. success = json.Load(joseHeader); json.put_EmitCompact(false); wprintf(L"%s\n",json.emit()); } |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.