
com.wallee.sdk.mdes.model.EncryptedPayloadTransact Maven / Gradle / Ivy
/*
* MDES for Merchants
* The MDES APIs are designed as RPC style stateless web services where each API endpoint represents an operation to be performed. All request and response payloads are sent in the JSON (JavaScript Object Notation) data-interchange format. Each endpoint in the API specifies the HTTP Method used to access it. All strings in request and response objects are to be UTF-8 encoded. Each API URI includes the major and minor version of API that it conforms to. This will allow multiple concurrent versions of the API to be deployed simultaneously.
__Authentication__ Mastercard uses OAuth 1.0a with body hash extension for authenticating the API clients. This requires every request that you send to Mastercard to be signed with an RSA private key. A private-public RSA key pair must be generated consisting of:
1 . A private key for the OAuth signature for API requests. It is recommended to keep the private key in a password-protected or hardware keystore.
2. A public key is shared with Mastercard during the project setup process through either a certificate signing request (CSR) or the API Key Generator. Mastercard will use the public key to verify the OAuth signature that is provided on every API call.
An OAUTH1.0a signer library is available on [GitHub](https://github.com/Mastercard/oauth1-signer-java)
__Encryption__
All communications between Issuer web service and the Mastercard gateway is encrypted using TLS.
__Additional Encryption of Sensitive Data__ In addition to the OAuth authentication, when using MDES Digital Enablement Service, any PCI sensitive and all account holder Personally Identifiable Information (PII) data must be encrypted. This requirement applies to the API fields containing encryptedData. Sensitive data is encrypted using a symmetric session (one-time-use) key. The symmetric session key is then wrapped with an RSA Public Key supplied by Mastercard during API setup phase (the Customer Encryption Key).
Java Client Encryption Library available on [GitHub](https://github.com/Mastercard/client-encryption-java)
*
* OpenAPI spec version: 1.2.10
*
*
* NOTE: This class is auto generated by the swagger code generator program.
* https://github.com/swagger-api/swagger-codegen.git
* Do not edit the class manually.
*/
package com.wallee.sdk.mdes.model;
import com.google.gson.annotations.SerializedName;
import java.util.Objects;
import com.wallee.sdk.mdes.model.TransactEncryptedData;
import io.swagger.annotations.ApiModel;
import io.swagger.annotations.ApiModelProperty;
/**
* EncryptedPayloadTransact
*/
public class EncryptedPayloadTransact {
@SerializedName("publicKeyFingerprint")
private String publicKeyFingerprint = null;
@SerializedName("encryptedKey")
private String encryptedKey = null;
@SerializedName("oaepHashingAlgorithm")
private String oaepHashingAlgorithm = null;
@SerializedName("iv")
private String iv = null;
@SerializedName("encryptedData")
private TransactEncryptedData encryptedData = null;
public EncryptedPayloadTransact publicKeyFingerprint(String publicKeyFingerprint) {
this.publicKeyFingerprint = publicKeyFingerprint;
return this;
}
/**
* The fingerprint of the public key used to encrypt the ephemeral AES key.<br> __Max Length: 64__
* @return publicKeyFingerprint
**/
public String getPublicKeyFingerprint() {
return publicKeyFingerprint;
}
public void setPublicKeyFingerprint(String publicKeyFingerprint) {
this.publicKeyFingerprint = publicKeyFingerprint;
}
public EncryptedPayloadTransact encryptedKey(String encryptedKey) {
this.encryptedKey = encryptedKey;
return this;
}
/**
* One-time use AES key encrypted by the MasterCard public key (as identified by publicKeyFingerprint) using the OAEP or PKCS#1 v1.5 scheme (depending on the value of oaepHashingAlgorithm. <br> __Max Length: 512__
* @return encryptedKey
**/
public String getEncryptedKey() {
return encryptedKey;
}
public void setEncryptedKey(String encryptedKey) {
this.encryptedKey = encryptedKey;
}
public EncryptedPayloadTransact oaepHashingAlgorithm(String oaepHashingAlgorithm) {
this.oaepHashingAlgorithm = oaepHashingAlgorithm;
return this;
}
/**
* Hashing algorithm used with the OAEP scheme. Must be either SHA256 or SHA512.
* @return oaepHashingAlgorithm
**/
public String getOaepHashingAlgorithm() {
return oaepHashingAlgorithm;
}
public void setOaepHashingAlgorithm(String oaepHashingAlgorithm) {
this.oaepHashingAlgorithm = oaepHashingAlgorithm;
}
public EncryptedPayloadTransact iv(String iv) {
this.iv = iv;
return this;
}
/**
* The initialization vector used when encrypting data using the one-time use AES key. Must be exactly 16 bytes (32 character hex string) to match the block size. If not present, an IV of zero is assumed. <br>__Length: 32__
* @return iv
**/
public String getIv() {
return iv;
}
public void setIv(String iv) {
this.iv = iv;
}
public EncryptedPayloadTransact encryptedData(TransactEncryptedData encryptedData) {
this.encryptedData = encryptedData;
return this;
}
/**
* Get encryptedData
* @return encryptedData
**/
public TransactEncryptedData getEncryptedData() {
return encryptedData;
}
public void setEncryptedData(TransactEncryptedData encryptedData) {
this.encryptedData = encryptedData;
}
@Override
public boolean equals(java.lang.Object o) {
if (this == o) {
return true;
}
if (o == null || getClass() != o.getClass()) {
return false;
}
EncryptedPayloadTransact encryptedPayloadTransact = (EncryptedPayloadTransact) o;
return Objects.equals(this.publicKeyFingerprint, encryptedPayloadTransact.publicKeyFingerprint) &&
Objects.equals(this.encryptedKey, encryptedPayloadTransact.encryptedKey) &&
Objects.equals(this.oaepHashingAlgorithm, encryptedPayloadTransact.oaepHashingAlgorithm) &&
Objects.equals(this.iv, encryptedPayloadTransact.iv) &&
Objects.equals(this.encryptedData, encryptedPayloadTransact.encryptedData);
}
@Override
public int hashCode() {
return Objects.hash(publicKeyFingerprint, encryptedKey, oaepHashingAlgorithm, iv, encryptedData);
}
@Override
public String toString() {
StringBuilder sb = new StringBuilder();
sb.append("class EncryptedPayloadTransact {\n");
sb.append(" publicKeyFingerprint: ").append(toIndentedString(publicKeyFingerprint)).append("\n");
sb.append(" encryptedKey: ").append(toIndentedString(encryptedKey)).append("\n");
sb.append(" oaepHashingAlgorithm: ").append(toIndentedString(oaepHashingAlgorithm)).append("\n");
sb.append(" iv: ").append(toIndentedString(iv)).append("\n");
sb.append(" encryptedData: ").append(toIndentedString(encryptedData)).append("\n");
sb.append("}");
return sb.toString();
}
/**
* Convert the given object to string with each line indented by 4 spaces
* (except the first line).
*/
private String toIndentedString(java.lang.Object o) {
if (o == null) {
return "null";
}
return o.toString().replace("\n", "\n ");
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy