HMAC-SHA512
All transactional requests (cash-in, cash-out, refund, webhooks) require an HMAC-SHA512 signature to ensure payload integrity and authenticity.
How It Works
- Serialize the request body as JSON
- Generate the HMAC-SHA512 signature using your
client_secretas the key - Send the signature in the
hmacheader in lowercase hexadecimal format
The API recalculates the hash and compares it with the received value using constant-time comparison, preventing timing attacks that attempt to discover the signature byte by byte.
HMAC-SHA512 vs Webhook SHA256
The API uses HMAC-SHA512 to authenticate requests sent by you. Webhooks sent by Owem Pay use HMAC-SHA256 for signing (header X-Owem-Signature). These are different algorithms -- each in its own context. See Webhooks for details on webhook validation.
Required Headers
| Header | Value |
|---|---|
Authorization | ApiKey {client_id}:{client_secret} |
Content-Type | application/json |
hmac | HMAC-SHA512 signature in hexadecimal |
Examples
JavaScript (Node.js)
javascript
const crypto = require('crypto');
const body = JSON.stringify({
amount: 3000,
pix_key: "12345678901",
pix_key_type: "cpf",
description: "Pagamento"
});
const hmac = crypto
.createHmac('sha512', 'sk_seu-client-secret')
.update(body)
.digest('hex');
// Send as header: hmac: {value}Python
python
import hmac
import hashlib
import json
body = json.dumps({
"amount": 3000,
"pix_key": "12345678901",
"pix_key_type": "cpf",
"description": "Pagamento"
})
signature = hmac.new(
b"sk_seu-client-secret",
body.encode("utf-8"),
hashlib.sha512
).hexdigest()PHP
php
$body = json_encode([
'amount' => 3000,
'pix_key' => '12345678901',
'pix_key_type' => 'cpf',
'description' => 'Pagamento'
]);
$hmac = hash_hmac('sha512', $body, 'sk_seu-client-secret');Java
java
import javax.crypto.Mac;
import javax.crypto.spec.SecretKeySpec;
String body = "{\"amount\":3000,\"pix_key\":\"12345678901\",\"pix_key_type\":\"cpf\",\"description\":\"Pagamento\"}";
String secret = "sk_seu-client-secret";
Mac mac = Mac.getInstance("HmacSHA512");
SecretKeySpec keySpec = new SecretKeySpec(secret.getBytes(), "HmacSHA512");
mac.init(keySpec);
byte[] hash = mac.doFinal(body.getBytes());
StringBuilder sb = new StringBuilder();
for (byte b : hash) {
sb.append(String.format("%02x", b));
}
String hmac = sb.toString();C#
csharp
using System.Security.Cryptography;
using System.Text;
var body = "{\"amount\":3000,\"pix_key\":\"12345678901\",\"pix_key_type\":\"cpf\",\"description\":\"Pagamento\"}";
var secret = Encoding.UTF8.GetBytes("sk_seu-client-secret");
using var hmacSha512 = new HMACSHA512(secret);
var hash = hmacSha512.ComputeHash(Encoding.UTF8.GetBytes(body));
var hmac = BitConverter.ToString(hash).Replace("-", "").ToLower();Bash (curl)
bash
BODY='{"amount":3000,"pix_key":"12345678901","pix_key_type":"cpf","description":"Pagamento"}'
SECRET="sk_seu-client-secret"
HMAC=$(echo -n "$BODY" | openssl dgst -sha512 -hmac "$SECRET" | awk '{print $2}')
curl -X POST https://api.owem.com.br/api/external/pix/cash-out \
-H "Authorization: ApiKey $CLIENT_ID:$CLIENT_SECRET" \
-H "Content-Type: application/json" \
-H "hmac: $HMAC" \
-d "$BODY"Validation
The API validates the received HMAC against the request body. If the signature does not match:
json
{
"worked": false,
"detail": "Invalid HMAC signature"
}Important
- Use the body exactly as sent in the request (same JSON serialization)
- The API Key
client_secretis the HMAC key - The signature must be in lowercase hexadecimal format
- Comparison is done in constant time -- the signature cannot be discovered through timing