You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/webhooks-and-events/webhooks/securing-your-webhooks.md
+17Lines changed: 17 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -64,6 +64,23 @@ Your language and server implementations may differ from the following examples.
64
64
65
65
- Using a plain `==` operator is **not advised**. A method like [`secure_compare`][secure_compare] performs a "constant time" string comparison, which helps mitigate certain timing attacks against regular equality operators.
66
66
67
+
### Test values
68
+
69
+
Regardless of the programming language that you use to implement HMAC verification in your code, you can use the following `secret` and `payload` values to verify that your implementation is correct.
70
+
71
+
- secret: "It's a Secret to Everybody"
72
+
- payload: "Hello, World!"
73
+
74
+
If your implementation is correct and uses the SHA-256 algorithm, the signatures that you generate should match the following signature values:
0 commit comments