Trust me, Laurent suggestion is the right way to go. As a professional web developer I use this approach alot across different API's. Actually it's the most common way to secure a payment gateway from being hijacked.
Before one can crack your system, one will need to know your secret key. And for type of HASH, go with a SHA-2 hash and then you'll be good to go :-)
Web development and "binary" development are two very different things and need a completely different approach in regards to security measurements.
While some secret hash on your web server might be "okay" way to go, you forget that one can only optain the hash, by accessing the server
somehow. But when it comes down to creating a binary that holds the secret key, it's a whole different story.
The first attack angle would be, to just open the binary in a text/hex editor and go over the characters that might represent a continuous string. If the key has been saved in the source like
std::string s = "SecretKey"; then the key can in nearly all cases be found in plain text in the binary. Your "ok" method suddenly became useless.
A second way to go, if the first wasn't already successful is go and capture the network traffic. This will most likely be needed anyways, since one needs to figure out the communication protocol. Since they are simple HTTP requests, it's very, very easy to read the whole traffic. If the key is sent to the server you'll immediately get it here. - Maybe one would even start with this step, since it's a lot easier.
If that was not satisfying enough, there's always the possibility of disassembling the whole things or attaching a debugger etc. With enough skills, knowledge and time "client side" security can always be cracked.
But you can expand this approach alot. You could reverse the whole HASH and so on to make it more difficult for one to understand what you're doing in your code.
Obfuscation is a good thing and while it won't increase the actual security, it will still prevent low-skilled people from "cracking" things.
If you're further interested in that topic, you might want to talk to the guy(s) behind OpenHexagon, since they had to find a way to make it somewhat secure and unfortunate enough there was one guy that felt the need to play quite the kid and spam their highscore database with junk etc.