Skip to content

HMAC-SHA512

All transactional requests (cash-in, cash-out, refund, webhooks) require an HMAC-SHA512 signature to ensure payload integrity and authenticity.

How It Works

  1. Serialize the request body as JSON
  2. Generate the HMAC-SHA512 signature using your client_secret as the key
  3. Send the signature in the hmac header in lowercase hexadecimal format

The API recalculates the hash and compares it with the received value using constant-time comparison, preventing timing attacks that attempt to discover the signature byte by byte.

HMAC-SHA512 vs Webhook SHA256

The API uses HMAC-SHA512 to authenticate requests sent by you. Webhooks sent by Owem Pay use HMAC-SHA256 for signing (header X-Owem-Signature). These are different algorithms -- each in its own context. See Webhooks for details on webhook validation.

Required Headers

HeaderValue
AuthorizationApiKey {client_id}:{client_secret}
Content-Typeapplication/json
hmacHMAC-SHA512 signature in hexadecimal

Examples

JavaScript (Node.js)

javascript
const crypto = require('crypto');

const body = JSON.stringify({
  amount: 3000,
  pix_key: "12345678901",
  pix_key_type: "cpf",
  description: "Pagamento"
});

const hmac = crypto
  .createHmac('sha512', 'sk_seu-client-secret')
  .update(body)
  .digest('hex');

// Send as header: hmac: {value}

Python

python
import hmac
import hashlib
import json

body = json.dumps({
    "amount": 3000,
    "pix_key": "12345678901",
    "pix_key_type": "cpf",
    "description": "Pagamento"
})

signature = hmac.new(
    b"sk_seu-client-secret",
    body.encode("utf-8"),
    hashlib.sha512
).hexdigest()

PHP

php
$body = json_encode([
    'amount' => 3000,
    'pix_key' => '12345678901',
    'pix_key_type' => 'cpf',
    'description' => 'Pagamento'
]);

$hmac = hash_hmac('sha512', $body, 'sk_seu-client-secret');

Java

java
import javax.crypto.Mac;
import javax.crypto.spec.SecretKeySpec;

String body = "{\"amount\":3000,\"pix_key\":\"12345678901\",\"pix_key_type\":\"cpf\",\"description\":\"Pagamento\"}";
String secret = "sk_seu-client-secret";

Mac mac = Mac.getInstance("HmacSHA512");
SecretKeySpec keySpec = new SecretKeySpec(secret.getBytes(), "HmacSHA512");
mac.init(keySpec);
byte[] hash = mac.doFinal(body.getBytes());

StringBuilder sb = new StringBuilder();
for (byte b : hash) {
    sb.append(String.format("%02x", b));
}
String hmac = sb.toString();

C#

csharp
using System.Security.Cryptography;
using System.Text;

var body = "{\"amount\":3000,\"pix_key\":\"12345678901\",\"pix_key_type\":\"cpf\",\"description\":\"Pagamento\"}";
var secret = Encoding.UTF8.GetBytes("sk_seu-client-secret");

using var hmacSha512 = new HMACSHA512(secret);
var hash = hmacSha512.ComputeHash(Encoding.UTF8.GetBytes(body));
var hmac = BitConverter.ToString(hash).Replace("-", "").ToLower();

Bash (curl)

bash
BODY='{"amount":3000,"pix_key":"12345678901","pix_key_type":"cpf","description":"Pagamento"}'
SECRET="sk_seu-client-secret"

HMAC=$(echo -n "$BODY" | openssl dgst -sha512 -hmac "$SECRET" | awk '{print $2}')

curl -X POST https://api.owem.com.br/api/external/pix/cash-out \
  -H "Authorization: ApiKey $CLIENT_ID:$CLIENT_SECRET" \
  -H "Content-Type: application/json" \
  -H "hmac: $HMAC" \
  -d "$BODY"

Validation

The API validates the received HMAC against the request body. If the signature does not match:

json
{
  "worked": false,
  "detail": "Invalid HMAC signature"
}

Important

  • Use the body exactly as sent in the request (same JSON serialization)
  • The API Key client_secret is the HMAC key
  • The signature must be in lowercase hexadecimal format
  • Comparison is done in constant time -- the signature cannot be discovered through timing

Owem Pay Instituição de Pagamento — ISPB 37839059