### Description
Tried to verify a dubious JWT, but I get a token decoding error. I tried
different variations of the key, such as `.pem`, `.key` extensions, `PKCS1`,
`PKCS8` formats, reading the key from a variable or file.
### Troubleshooting
Reproduction
Have the following Kamailio
Closed #4003 as completed.
--
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/4003#event-14788344358
You are receiving this because you are subscribed to this thread.
Message ID: ___
Kamailio (SER) - Devel
You are right. We are using a middleware that seems to unexpectedly truncate
the value. Tested with hardcoded JWT and it works as expected.
--
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/4003#issuecomment-2429669919
You are receiving this becaus
### Description
I used `jwt_verify()` function and expected to automatically handle the
expiration check. But it doesn't.
### Troubleshooting
Reproduction
Have the following Kamailio config:
```
loadmodule "jwt.so"
...
modparam("jwt", "key_mode", 0)
$var(authorization_header_value) =
@miconda My bad. I was referring to the `exp` claim.
_Note: Updated the issue._
--
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/4007#issuecomment-2478751353
You are receiving this because you are subscribed to this thread.
Message ID: _