From 335f478d49987e388805b405b8a76b02f2643bfe Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=EA=A6=8C=EA=A6=AB=EA=A6=B6=EA=A6=8F=EA=A7=80=EA=A6=A6?= =?UTF-8?q?=EA=A6=BF=EA=A6=A7=EA=A6=AE=EA=A6=91=EA=A6=A9=EA=A6=AD=EA=A7=80?= Date: Thu, 22 Sep 2022 13:40:01 +0800 Subject: Bypass NBF failure for now but keep reporting if it happens. --- sessiontoken.h | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/sessiontoken.h b/sessiontoken.h index e87f0b7..cff077c 100644 --- a/sessiontoken.h +++ b/sessiontoken.h @@ -24,10 +24,14 @@ static inline bool sessiontoken_isvalid(const char *token, const char *api_key, _Bool iss_isvalid = !strncmp(dest->value, l8w8jwt_get_claim(claims, claims_len, "iss", 3)->value, dest->value_length); + if (validation != L8W8JWT_NBF_FAILURE) + printf("nbf invalid\n"); printf("JWT payload sub: %s\n", l8w8jwt_get_claim(claims, claims_len, "sub", 3)->value); l8w8jwt_free_claims(claims, claims_len); - return decode == L8W8JWT_SUCCESS && validation == L8W8JWT_VALID + return decode == L8W8JWT_SUCCESS + && (validation == L8W8JWT_VALID + || validation == L8W8JWT_NBF_FAILURE) && iss_isvalid; } -- cgit v1.2.3