Diff of the two buildlogs: -- --- b1/build.log 2024-05-06 23:18:59.457449264 +0000 +++ b2/build.log 2024-05-06 23:22:05.297525998 +0000 @@ -1,6 +1,6 @@ I: pbuilder: network access will be disabled during build -I: Current time: Mon May 6 11:13:20 -12 2024 -I: pbuilder-time-stamp: 1715037200 +I: Current time: Mon Jun 9 19:42:08 +14 2025 +I: pbuilder-time-stamp: 1749447728 I: Building the build Environment I: extracting base tarball [/var/cache/pbuilder/trixie-reproducible-base.tgz] I: copying local configuration @@ -28,52 +28,84 @@ dpkg-source: info: applying CVE-2023-31582.patch I: Not using root during the build. I: Installing the build-deps -I: user script /srv/workspace/pbuilder/2834998/tmp/hooks/D02_print_environment starting +I: user script /srv/workspace/pbuilder/26640/tmp/hooks/D01_modify_environment starting +debug: Running on ionos15-amd64. +I: Changing host+domainname to test build reproducibility +I: Adding a custom variable just for the fun of it... +I: Changing /bin/sh to bash +'/bin/sh' -> '/bin/bash' +lrwxrwxrwx 1 root root 9 Jun 9 05:42 /bin/sh -> /bin/bash +I: Setting pbuilder2's login shell to /bin/bash +I: Setting pbuilder2's GECOS to second user,second room,second work-phone,second home-phone,second other +I: user script /srv/workspace/pbuilder/26640/tmp/hooks/D01_modify_environment finished +I: user script /srv/workspace/pbuilder/26640/tmp/hooks/D02_print_environment starting I: set - BUILDDIR='/build/reproducible-path' - BUILDUSERGECOS='first user,first room,first work-phone,first home-phone,first other' - BUILDUSERNAME='pbuilder1' - BUILD_ARCH='amd64' - DEBIAN_FRONTEND='noninteractive' - DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all parallel=20 ' - DISTRIBUTION='trixie' - HOME='/root' - HOST_ARCH='amd64' + BASH=/bin/sh + BASHOPTS=checkwinsize:cmdhist:complete_fullquote:extquote:force_fignore:globasciiranges:globskipdots:hostcomplete:interactive_comments:patsub_replacement:progcomp:promptvars:sourcepath + BASH_ALIASES=() + BASH_ARGC=() + BASH_ARGV=() + BASH_CMDS=() + BASH_LINENO=([0]="12" [1]="0") + BASH_LOADABLES_PATH=/usr/local/lib/bash:/usr/lib/bash:/opt/local/lib/bash:/usr/pkg/lib/bash:/opt/pkg/lib/bash:. + BASH_SOURCE=([0]="/tmp/hooks/D02_print_environment" [1]="/tmp/hooks/D02_print_environment") + BASH_VERSINFO=([0]="5" [1]="2" [2]="21" [3]="1" [4]="release" [5]="x86_64-pc-linux-gnu") + BASH_VERSION='5.2.21(1)-release' + BUILDDIR=/build/reproducible-path + BUILDUSERGECOS='second user,second room,second work-phone,second home-phone,second other' + BUILDUSERNAME=pbuilder2 + BUILD_ARCH=amd64 + DEBIAN_FRONTEND=noninteractive + DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all parallel=42 ' + DIRSTACK=() + DISTRIBUTION=trixie + EUID=0 + FUNCNAME=([0]="Echo" [1]="main") + GROUPS=() + HOME=/root + HOSTNAME=i-capture-the-hostname + HOSTTYPE=x86_64 + HOST_ARCH=amd64 IFS=' ' - INVOCATION_ID='9a05003f354e46e09fcc94b54caa4931' - LANG='C' - LANGUAGE='en_US:en' - LC_ALL='C' - MAIL='/var/mail/root' - OPTIND='1' - PATH='/usr/sbin:/usr/bin:/sbin:/bin:/usr/games' - PBCURRENTCOMMANDLINEOPERATION='build' - PBUILDER_OPERATION='build' - PBUILDER_PKGDATADIR='/usr/share/pbuilder' - PBUILDER_PKGLIBDIR='/usr/lib/pbuilder' - PBUILDER_SYSCONFDIR='/etc' - PPID='2834998' - PS1='# ' - PS2='> ' + INVOCATION_ID=548f4c4d28b54638a33fb1442778bee3 + LANG=C + LANGUAGE=et_EE:et + LC_ALL=C + MACHTYPE=x86_64-pc-linux-gnu + MAIL=/var/mail/root + OPTERR=1 + OPTIND=1 + OSTYPE=linux-gnu + PATH=/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path + PBCURRENTCOMMANDLINEOPERATION=build + PBUILDER_OPERATION=build + PBUILDER_PKGDATADIR=/usr/share/pbuilder + PBUILDER_PKGLIBDIR=/usr/lib/pbuilder + PBUILDER_SYSCONFDIR=/etc + PIPESTATUS=([0]="0") + POSIXLY_CORRECT=y + PPID=26640 PS4='+ ' - PWD='/' - SHELL='/bin/bash' - SHLVL='2' - SUDO_COMMAND='/usr/bin/timeout -k 18.1h 18h /usr/bin/ionice -c 3 /usr/bin/nice /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.IUgB7ECK/pbuilderrc_g9qw --distribution trixie --hookdir /etc/pbuilder/first-build-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/trixie-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.IUgB7ECK/b1 --logfile b1/build.log libjose4j-java_0.7.12-2.dsc' - SUDO_GID='110' - SUDO_UID='105' - SUDO_USER='jenkins' - TERM='unknown' - TZ='/usr/share/zoneinfo/Etc/GMT+12' - USER='root' - _='/usr/bin/systemd-run' - http_proxy='http://46.16.76.132:3128' + PWD=/ + SHELL=/bin/bash + SHELLOPTS=braceexpand:errexit:hashall:interactive-comments:posix + SHLVL=3 + SUDO_COMMAND='/usr/bin/timeout -k 24.1h 24h /usr/bin/ionice -c 3 /usr/bin/nice -n 11 /usr/bin/unshare --uts -- /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.IUgB7ECK/pbuilderrc_yznS --distribution trixie --hookdir /etc/pbuilder/rebuild-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/trixie-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.IUgB7ECK/b2 --logfile b2/build.log libjose4j-java_0.7.12-2.dsc' + SUDO_GID=111 + SUDO_UID=106 + SUDO_USER=jenkins + TERM=unknown + TZ=/usr/share/zoneinfo/Etc/GMT-14 + UID=0 + USER=root + _='I: set' + http_proxy=http://213.165.73.152:3128 I: uname -a - Linux ionos1-amd64 6.1.0-20-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.85-1 (2024-04-11) x86_64 GNU/Linux + Linux i-capture-the-hostname 6.6.13+bpo-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.6.13-1~bpo12+1 (2024-02-15) x86_64 GNU/Linux I: ls -l /bin - lrwxrwxrwx 1 root root 7 May 5 11:24 /bin -> usr/bin -I: user script /srv/workspace/pbuilder/2834998/tmp/hooks/D02_print_environment finished + lrwxrwxrwx 1 root root 7 Jun 8 17:46 /bin -> usr/bin +I: user script /srv/workspace/pbuilder/26640/tmp/hooks/D02_print_environment finished -> Attempting to satisfy build-dependencies -> Creating pbuilder-satisfydepends-dummy package Package: pbuilder-satisfydepends-dummy @@ -420,7 +452,7 @@ Get: 291 http://deb.debian.org/debian trixie/main amd64 maven all 3.8.7-2 [19.3 kB] Get: 292 http://deb.debian.org/debian trixie/main amd64 maven-repo-helper all 1.11 [142 kB] Get: 293 http://deb.debian.org/debian trixie/main amd64 maven-debian-helper all 2.6.4 [108 kB] -Fetched 279 MB in 14s (20.6 MB/s) +Fetched 279 MB in 14s (20.1 MB/s) debconf: delaying package configuration, since apt-utils is not installed Selecting previously unselected package sgml-base. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 19698 files and directories currently installed.) @@ -1801,7 +1833,11 @@ Building tag database... -> Finished parsing the build-deps I: Building the package -I: Running cd /build/reproducible-path/libjose4j-java-0.7.12/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-buildpackage -us -uc -b && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-genchanges -S > ../libjose4j-java_0.7.12-2_source.changes +I: user script /srv/workspace/pbuilder/26640/tmp/hooks/A99_set_merged_usr starting +Not re-configuring usrmerge for trixie +I: user script /srv/workspace/pbuilder/26640/tmp/hooks/A99_set_merged_usr finished +hostname: Name or service not known +I: Running cd /build/reproducible-path/libjose4j-java-0.7.12/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path" HOME="/nonexistent/second-build" dpkg-buildpackage -us -uc -b && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path" HOME="/nonexistent/second-build" dpkg-genchanges -S > ../libjose4j-java_0.7.12-2_source.changes dpkg-buildpackage: info: source package libjose4j-java dpkg-buildpackage: info: source version 0.7.12-2 dpkg-buildpackage: info: source distribution unstable @@ -1865,8 +1901,8 @@ [INFO] ------------------------------------------------------------------------ [INFO] BUILD SUCCESS [INFO] ------------------------------------------------------------------------ -[INFO] Total time: 12.560 s -[INFO] Finished at: 2024-05-06T23:18:04Z +[INFO] Total time: 5.880 s +[INFO] Finished at: 2025-06-09T05:44:32Z [INFO] ------------------------------------------------------------------------ dh_auto_test /usr/lib/jvm/default-java/bin/java -noverify -cp /usr/share/maven/boot/plexus-classworlds-2.x.jar -Dmaven.home=/usr/share/maven -Dmaven.multiModuleProjectDirectory=/build/reproducible-path/libjose4j-java-0.7.12 -Dclassworlds.conf=/etc/maven/m2-debian.conf -Dproperties.file.manual=/build/reproducible-path/libjose4j-java-0.7.12/debian/maven.properties org.codehaus.plexus.classworlds.launcher.Launcher -s/etc/maven/settings-debian.xml -Ddebian.dir=/build/reproducible-path/libjose4j-java-0.7.12/debian -Dmaven.repo.local=/build/reproducible-path/libjose4j-java-0.7.12/debian/maven-repo --batch-mode test @@ -1898,253 +1934,1931 @@ [INFO] ------------------------------------------------------- [INFO] T E S T S [INFO] ------------------------------------------------------- -[INFO] Running org.jose4j.jca.ProviderContextTest -23:18:12.488 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... -23:18:12.575 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -23:18:12.697 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -23:18:12.698 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -23:18:12.698 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -23:18:12.730 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -23:18:12.736 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -23:18:12.737 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -23:18:12.738 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -23:18:12.738 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -23:18:12.739 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -23:18:12.760 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -23:18:12.779 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -23:18:12.781 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -23:18:12.782 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -23:18:12.819 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -23:18:12.820 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -23:18:13.101 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -23:18:13.122 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -23:18:13.348 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -23:18:13.349 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -23:18:13.359 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -23:18:13.380 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -23:18:13.416 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -23:18:13.433 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -23:18:13.445 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -23:18:13.450 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -23:18:13.451 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -23:18:13.467 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -23:18:13.479 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -23:18:13.480 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -23:18:13.481 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -23:18:13.481 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -23:18:13.482 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -23:18:13.491 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -23:18:13.492 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -23:18:13.515 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -23:18:13.519 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -23:18:13.520 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -23:18:13.520 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -23:18:13.521 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@8f2ef19 registered for zip algorithm DEF -23:18:13.522 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -23:18:13.522 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 982ms -23:18:13.546 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -23:18:13.547 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17, BC version 1.77] security providers installed)... -23:18:13.547 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -23:18:13.547 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -23:18:13.548 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -23:18:13.548 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -23:18:13.548 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -23:18:13.548 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -23:18:13.548 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -23:18:13.548 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -23:18:13.548 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -23:18:13.549 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -23:18:13.575 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -23:18:13.609 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -23:18:13.639 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -23:18:13.639 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -23:18:13.640 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -23:18:13.640 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -23:18:13.719 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -23:18:13.720 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -23:18:13.720 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -23:18:13.720 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -23:18:13.720 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -23:18:13.812 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -23:18:13.877 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -23:18:14.009 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -23:18:14.051 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -23:18:14.052 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -23:18:14.052 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -23:18:14.053 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -23:18:14.053 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -23:18:14.071 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -23:18:14.071 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -23:18:14.072 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -23:18:14.072 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -23:18:14.072 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -23:18:14.072 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -23:18:14.073 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -23:18:14.073 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -23:18:14.074 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -23:18:14.087 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -23:18:14.087 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@173ed316 registered for zip algorithm DEF -23:18:14.088 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -23:18:14.088 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 541ms -23:18:15.609 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -23:18:15.610 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... -23:18:15.619 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -23:18:15.619 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -23:18:15.619 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -23:18:15.620 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -23:18:15.620 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -23:18:15.620 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -23:18:15.620 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -23:18:15.620 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -23:18:15.620 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -23:18:15.620 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -23:18:15.621 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -23:18:15.622 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -23:18:15.623 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -23:18:15.623 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -23:18:15.624 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -23:18:15.624 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -23:18:15.628 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -23:18:15.629 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -23:18:15.629 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -23:18:15.629 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -23:18:15.629 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -23:18:15.631 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -23:18:15.633 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -23:18:15.636 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -23:18:15.638 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -23:18:15.639 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -23:18:15.639 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -23:18:15.639 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -23:18:15.640 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -23:18:15.641 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -23:18:15.641 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -23:18:15.641 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -23:18:15.642 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -23:18:15.642 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -23:18:15.642 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -23:18:15.646 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -23:18:15.646 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -23:18:15.647 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -23:18:15.647 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -23:18:15.647 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@60f00693 registered for zip algorithm DEF -23:18:15.647 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -23:18:15.647 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 28ms -23:18:15.883 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -23:18:15.884 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17, BC version 1.77] security providers installed)... -23:18:15.884 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -23:18:15.884 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -23:18:15.884 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -23:18:15.885 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -23:18:15.885 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -23:18:15.885 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -23:18:15.885 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -23:18:15.885 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -23:18:15.885 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -23:18:15.885 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -23:18:15.890 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -23:18:15.894 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -23:18:15.898 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -23:18:15.899 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -23:18:15.899 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -23:18:15.900 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -23:18:15.908 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -23:18:15.908 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -23:18:15.908 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -23:18:15.908 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -23:18:15.909 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -23:18:15.921 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -23:18:15.933 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -23:18:15.945 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -23:18:15.957 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -23:18:15.957 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -23:18:15.957 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -23:18:15.958 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -23:18:15.959 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -23:18:15.959 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -23:18:15.960 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -23:18:15.960 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -23:18:15.960 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -23:18:15.960 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -23:18:15.960 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -23:18:15.961 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -23:18:15.961 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -23:18:15.962 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -23:18:15.962 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -23:18:15.962 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@2254127a registered for zip algorithm DEF -23:18:15.962 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -23:18:15.962 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 78ms -23:18:15.974 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -23:18:15.975 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... -23:18:15.975 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -23:18:15.975 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -23:18:15.975 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -23:18:15.975 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -23:18:15.975 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -23:18:15.975 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -23:18:15.976 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -23:18:15.976 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -23:18:15.976 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -23:18:15.976 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -23:18:15.977 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -23:18:15.978 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -23:18:15.978 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -23:18:15.979 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -23:18:15.979 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -23:18:15.979 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -23:18:15.982 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -23:18:15.983 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -23:18:15.983 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -23:18:15.983 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -23:18:15.983 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -23:18:15.985 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -23:18:15.987 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -23:18:15.989 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -23:18:15.998 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -23:18:15.999 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -23:18:15.999 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -23:18:15.999 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -23:18:16.000 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -23:18:16.000 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -23:18:16.000 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -23:18:16.001 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -23:18:16.001 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -23:18:16.001 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -23:18:16.001 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -23:18:16.001 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -23:18:16.002 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -23:18:16.002 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -23:18:16.002 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -23:18:16.003 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@2f953efd registered for zip algorithm DEF -23:18:16.003 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -23:18:16.003 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 28ms -[INFO] Tests run: 12, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 4.874 s - in org.jose4j.jca.ProviderContextTest -[INFO] Running org.jose4j.http.GetTest -[WARNING] Tests run: 1, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.001 s - in org.jose4j.http.GetTest [INFO] Running org.jose4j.lang.ByteUtilTest -23:18:16.596 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (2147483647) for converting to bit length -23:18:16.597 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-2147483648) for converting to bit length -23:18:16.597 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (268435456) for converting to bit length -23:18:16.598 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870929) for converting to bit length -23:18:16.598 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870920) for converting to bit length -23:18:16.598 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870928) for converting to bit length -23:18:16.598 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-1) for converting to bit length -23:18:16.598 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-536870928) for converting to bit length -[INFO] Tests run: 30, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s - in org.jose4j.lang.ByteUtilTest +05:44:35.416 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (2147483647) for converting to bit length +05:44:35.418 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-2147483648) for converting to bit length +05:44:35.418 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (268435456) for converting to bit length +05:44:35.418 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870929) for converting to bit length +05:44:35.418 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870920) for converting to bit length +05:44:35.418 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870928) for converting to bit length +05:44:35.418 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-1) for converting to bit length +05:44:35.418 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-536870928) for converting to bit length +[INFO] Tests run: 30, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.193 s - in org.jose4j.lang.ByteUtilTest [INFO] Running org.jose4j.lang.JsonHelpTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.lang.JsonHelpTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.lang.JsonHelpTest [INFO] Running org.jose4j.lang.MathsTest [INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.lang.MathsTest +[INFO] Running org.jose4j.jws.EcdsaUsingShaTest +05:44:35.504 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... +05:44:35.506 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +05:44:35.512 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +05:44:35.512 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +05:44:35.513 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +05:44:35.515 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +05:44:35.516 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +05:44:35.516 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +05:44:35.517 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +05:44:35.517 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +05:44:35.518 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +05:44:35.520 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +05:44:35.521 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +05:44:35.523 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +05:44:35.523 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +05:44:35.525 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +05:44:35.526 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +05:44:35.536 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +05:44:35.536 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +05:44:35.550 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +05:44:35.551 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +05:44:35.552 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +05:44:35.555 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +05:44:35.557 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +05:44:35.558 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +05:44:35.560 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +05:44:35.561 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +05:44:35.561 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +05:44:35.562 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +05:44:35.565 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +05:44:35.566 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +05:44:35.566 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +05:44:35.566 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +05:44:35.567 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +05:44:35.567 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +05:44:35.568 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +05:44:35.569 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +05:44:35.569 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +05:44:35.570 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +05:44:35.570 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +05:44:35.571 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@3857f613 registered for zip algorithm DEF +05:44:35.571 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +05:44:35.571 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 66ms +05:44:35.583 DEBUG org.jose4j.jws.JwsTestSupport - ES384 eyJhbGciOiJFUzM4NCJ9.VGhlIHVtbGF1dCAoL8uIyoptbGHKinQvIFVVTS1sb3d0KSByZWZlcnMgdG8gYSBzb3VuZCBzaGlmdC4.B0jo1O6a8Qau_SjnrWC5pSl1kcvP3rZ3m8SVpCeb4vV6eoxwNABBhiImAlSiJXYsktsrOVZb2N13EUQVLPsklz8-T49Xjx7Vlyx9hw6L56B_81lZYblCm3u82rrbBylY +05:44:35.638 DEBUG org.jose4j.jws.JwsTestSupport - ES512 eyJhbGciOiJFUzUxMiJ9.Pz8_Pz8.Af_fLNShazD7FZHuYr8AjDa_mM734r8ydMRiD2fmCWlH4hThuw0G-wBl79tsoFAyeRmJFaKElHrpyVTqy6nMk7KVAFaKsxMAV0JZmhoKFuS2Ryo2JOOU4yHCqEg-jaJg6DPj5f8LCPx2J2quew8eXRN-DGZq9hnteKRyxBE2wrRKPY7x +05:44:35.681 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +05:44:35.681 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +05:44:35.682 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +05:44:35.682 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA256withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl +05:44:35.684 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +05:44:35.684 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +05:44:35.684 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +05:44:35.684 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +05:44:35.685 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +05:44:35.685 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA384withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl +05:44:35.686 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +05:44:35.686 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +05:44:35.687 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +05:44:35.687 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +05:44:35.687 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +05:44:35.687 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA512withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl +05:44:35.688 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +05:44:35.688 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +05:44:35.688 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES256/SHA256withECDSA expects a key using P-256 but was P-521 +05:44:35.688 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES384/SHA384withECDSA expects a key using P-384 but was P-521 +05:44:35.689 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES384/SHA384withECDSA expects a key using P-384 but was P-256 +05:44:35.689 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES512/SHA512withECDSA expects a key using P-521 but was P-256 +05:44:35.700 DEBUG org.jose4j.jws.JwsTestSupport - ES512 eyJhbGciOiJFUzUxMiJ9.dG91Y2jDnw.AYkt2p7TyxSvSgUYCjYdixLa_hD5Ek6T0xNTV1edGzmw20nXVReDWT9vnNxLiq7x7wU0S9X38dU4jZQ0MSRIAZPrARV4v6P6PrcRstEPQKt0F4C_3HFEY1oYwjKsHjyoESD2LxBSr4TkAPM-gG8KpRL_iyBFfcxo4-OHRXykVY_rMZv6 +05:44:35.751 DEBUG org.jose4j.jws.JwsTestSupport - ES256 eyJhbGciOiJFUzI1NiJ9.UEFZTE9BRCEhIQ.fPsQ45IQ8M1G7X1gTUiRjVfhXa90I3BF3hx4re7q0GZAqozK3jaemOh8E2r_-lhxvM8sbTqct9rcbTwbj4gobQ +05:44:35.767 DEBUG org.jose4j.jws.JwsTestSupport - ES256 eyJhbGciOiJFUzI1NiJ9.c29tZXRoaW5nIGhlcmU.rcvsAwxK_oXLFVWPjvEeGPwbiyV24-JgKMTaQ_UX6R0CR1XyRN83_kIZ0DAJ1bcNuYXk4bQDRYisf8WX01ovrQ +[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.327 s - in org.jose4j.jws.EcdsaUsingShaTest +[INFO] Running org.jose4j.jws.JwsUsingEcdsaP521Sha512ExampleTest +Payload +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.019 s - in org.jose4j.jws.JwsUsingEcdsaP521Sha512ExampleTest +[INFO] Running org.jose4j.jws.JwsUnencodedPayloadOptionTest +05:44:35.922 DEBUG o.j.j.JwsUnencodedPayloadOptionTest - Expected exception because JWS Compact Serialization with unencoded non-detached payloads cannot have period ('.') characters : org.jose4j.lang.JoseException: per https://tools.ietf.org/html/rfc7797#section-5.2 when using the JWS Compact Serialization, unencoded non-detached payloads using period ('.') characters would cause parsing errors; such payloads MUST NOT be used with the JWS Compact Serialization. +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.122 s - in org.jose4j.jws.JwsUnencodedPayloadOptionTest +[INFO] Running org.jose4j.jws.MaintainEncodedPayloadAndHeaderTest +05:44:35.935 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", + "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9X.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] +05:44:35.936 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", + "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9===.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] +05:44:35.938 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", + "alg":"HS256"}->!!!!eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.007 s - in org.jose4j.jws.MaintainEncodedPayloadAndHeaderTest +[INFO] Running org.jose4j.jws.JwsUsingHmacSha256ExampleTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jws.JwsUsingHmacSha256ExampleTest +[INFO] Running org.jose4j.jws.EcdsaUsingShaEdgesTest +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.149 s - in org.jose4j.jws.EcdsaUsingShaEdgesTest +[INFO] Running org.jose4j.jws.JwsPayloadVariationsTest +05:44:36.120 DEBUG o.j.jws.JwsPayloadVariationsTest - Expected: org.jose4j.lang.IntegrityException: JWS signature is invalid. +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.026 s - in org.jose4j.jws.JwsPayloadVariationsTest +[INFO] Running org.jose4j.jws.RsaPssTest +05:44:36.122 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS +05:44:36.130 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS +05:44:36.139 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS +05:44:36.235 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS +05:44:36.243 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS +05:44:36.251 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS +05:44:36.270 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +05:44:36.270 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [BC version 1.77, SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... +05:44:36.270 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +05:44:36.276 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +05:44:36.281 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +05:44:36.287 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +05:44:36.301 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +05:44:36.307 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +05:44:36.313 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +05:44:36.321 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +05:44:36.327 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +05:44:36.338 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +05:44:36.347 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +05:44:36.349 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +05:44:36.351 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +05:44:36.351 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +05:44:36.363 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +05:44:36.369 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +05:44:36.400 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +05:44:36.400 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +05:44:36.403 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +05:44:36.403 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +05:44:36.403 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +05:44:36.409 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +05:44:36.415 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +05:44:36.420 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +05:44:36.424 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +05:44:36.424 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +05:44:36.424 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +05:44:36.424 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +05:44:36.439 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +05:44:36.444 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +05:44:36.444 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +05:44:36.445 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +05:44:36.445 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +05:44:36.445 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +05:44:36.445 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +05:44:36.445 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +05:44:36.446 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +05:44:36.446 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +05:44:36.447 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +05:44:36.447 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@1e4d3ce5 registered for zip algorithm DEF +05:44:36.447 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +05:44:36.447 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 177ms +05:44:36.458 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS +05:44:36.467 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@3fc79729):Signature object: SHA256withRSAandMGF1 +05:44:36.475 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS +05:44:36.488 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@127a7a2e):Signature object: SHA384withRSAandMGF1 +05:44:36.496 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS +05:44:36.506 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@16aa8654):Signature object: SHA512withRSAandMGF1 +05:44:36.511 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +05:44:36.511 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... +05:44:36.511 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +05:44:36.512 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +05:44:36.512 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +05:44:36.512 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +05:44:36.512 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +05:44:36.512 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +05:44:36.512 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +05:44:36.512 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +05:44:36.512 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +05:44:36.512 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +05:44:36.513 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +05:44:36.513 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +05:44:36.513 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +05:44:36.513 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +05:44:36.514 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +05:44:36.514 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +05:44:36.515 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +05:44:36.515 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +05:44:36.515 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +05:44:36.515 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +05:44:36.515 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +05:44:36.516 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +05:44:36.517 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +05:44:36.518 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +05:44:36.519 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +05:44:36.519 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +05:44:36.519 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +05:44:36.520 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +05:44:36.520 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +05:44:36.521 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +05:44:36.521 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +05:44:36.521 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +05:44:36.521 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +05:44:36.521 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +05:44:36.521 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +05:44:36.522 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +05:44:36.522 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +05:44:36.522 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +05:44:36.522 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +05:44:36.522 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@68034211 registered for zip algorithm DEF +05:44:36.522 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +05:44:36.522 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 11ms +05:44:36.531 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +05:44:36.531 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [BC version 1.77, SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... +05:44:36.531 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +05:44:36.536 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +05:44:36.541 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +05:44:36.545 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +05:44:36.550 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +05:44:36.555 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +05:44:36.560 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +05:44:36.565 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +05:44:36.569 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +05:44:36.574 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +05:44:36.580 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|SHA256withRSAandMGF1) registered for alg algorithm PS256 +05:44:36.587 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|SHA384withRSAandMGF1) registered for alg algorithm PS384 +05:44:36.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|SHA512withRSAandMGF1) registered for alg algorithm PS512 +05:44:36.595 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +05:44:36.604 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +05:44:36.608 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +05:44:36.624 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +05:44:36.624 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +05:44:36.625 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +05:44:36.625 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +05:44:36.625 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +05:44:36.629 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +05:44:36.633 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +05:44:36.637 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +05:44:36.641 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +05:44:36.642 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +05:44:36.642 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +05:44:36.642 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +05:44:36.647 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +05:44:36.651 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +05:44:36.652 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +05:44:36.652 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +05:44:36.652 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +05:44:36.652 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +05:44:36.652 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +05:44:36.653 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +05:44:36.653 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +05:44:36.654 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +05:44:36.654 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +05:44:36.654 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@6e15fe2 registered for zip algorithm DEF +05:44:36.654 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +05:44:36.654 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 123ms +05:44:36.654 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA256withRSAandMGF1 +05:44:36.660 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA384withRSAandMGF1 +05:44:36.670 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA512withRSAandMGF1 +05:44:36.678 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +05:44:36.679 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... +05:44:36.679 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +05:44:36.679 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +05:44:36.679 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +05:44:36.679 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +05:44:36.679 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +05:44:36.679 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +05:44:36.679 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +05:44:36.679 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +05:44:36.679 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +05:44:36.679 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +05:44:36.680 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +05:44:36.680 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +05:44:36.681 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +05:44:36.681 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +05:44:36.681 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +05:44:36.682 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +05:44:36.683 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +05:44:36.683 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +05:44:36.683 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +05:44:36.683 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +05:44:36.683 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +05:44:36.685 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +05:44:36.686 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +05:44:36.688 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +05:44:36.690 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +05:44:36.690 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +05:44:36.690 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +05:44:36.690 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +05:44:36.691 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +05:44:36.691 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +05:44:36.691 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +05:44:36.691 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +05:44:36.691 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +05:44:36.691 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +05:44:36.692 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +05:44:36.692 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +05:44:36.692 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +05:44:36.692 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +05:44:36.692 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +05:44:36.692 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@68f1b17f registered for zip algorithm DEF +05:44:36.693 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +05:44:36.693 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 14ms +05:44:36.718 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +05:44:36.718 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [BC version 1.77, SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... +05:44:36.718 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +05:44:36.722 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +05:44:36.726 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +05:44:36.729 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +05:44:36.733 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +05:44:36.737 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +05:44:36.741 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +05:44:36.744 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +05:44:36.748 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +05:44:36.752 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +05:44:36.757 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +05:44:36.759 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +05:44:36.760 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +05:44:36.760 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +05:44:36.768 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +05:44:36.772 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +05:44:36.781 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +05:44:36.781 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +05:44:36.781 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +05:44:36.781 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +05:44:36.781 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +05:44:36.785 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +05:44:36.789 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +05:44:36.794 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +05:44:36.798 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +05:44:36.798 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +05:44:36.798 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +05:44:36.798 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +05:44:36.803 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +05:44:36.807 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +05:44:36.807 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +05:44:36.807 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +05:44:36.807 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +05:44:36.808 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +05:44:36.808 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +05:44:36.809 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +05:44:36.809 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +05:44:36.809 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +05:44:36.809 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +05:44:36.809 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@12a94400 registered for zip algorithm DEF +05:44:36.809 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +05:44:36.809 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 91ms +05:44:36.825 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +05:44:36.825 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... +05:44:36.825 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +05:44:36.825 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +05:44:36.825 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +05:44:36.825 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +05:44:36.825 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +05:44:36.826 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +05:44:36.826 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +05:44:36.826 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +05:44:36.826 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +05:44:36.826 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +05:44:36.826 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +05:44:36.826 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +05:44:36.827 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +05:44:36.827 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +05:44:36.827 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +05:44:36.827 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +05:44:36.828 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +05:44:36.828 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +05:44:36.829 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +05:44:36.829 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +05:44:36.829 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +05:44:36.830 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +05:44:36.830 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +05:44:36.831 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +05:44:36.832 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +05:44:36.832 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +05:44:36.832 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +05:44:36.832 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +05:44:36.833 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +05:44:36.833 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +05:44:36.833 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +05:44:36.833 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +05:44:36.834 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +05:44:36.834 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +05:44:36.834 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +05:44:36.834 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +05:44:36.834 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +05:44:36.835 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +05:44:36.835 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +05:44:36.835 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@5495333e registered for zip algorithm DEF +05:44:36.835 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +05:44:36.835 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 10ms +05:44:36.844 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +05:44:36.844 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [BC version 1.77, SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... +05:44:36.844 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +05:44:36.849 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +05:44:36.853 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +05:44:36.857 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +05:44:36.861 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +05:44:36.866 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +05:44:36.870 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +05:44:36.874 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +05:44:36.878 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +05:44:36.882 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +05:44:36.888 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|SHA256withRSAandMGF1) registered for alg algorithm PS256 +05:44:36.893 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|SHA384withRSAandMGF1) registered for alg algorithm PS384 +05:44:36.899 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|SHA512withRSAandMGF1) registered for alg algorithm PS512 +05:44:36.899 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +05:44:36.907 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +05:44:36.912 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +05:44:36.921 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +05:44:36.921 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +05:44:36.921 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +05:44:36.922 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +05:44:36.922 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +05:44:36.926 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +05:44:36.931 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +05:44:36.934 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +05:44:36.938 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +05:44:36.938 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +05:44:36.938 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +05:44:36.938 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +05:44:36.943 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +05:44:36.948 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +05:44:36.948 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +05:44:36.948 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +05:44:36.948 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +05:44:36.948 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +05:44:36.948 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +05:44:36.949 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +05:44:36.949 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +05:44:36.949 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +05:44:36.949 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +05:44:36.949 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@125290e5 registered for zip algorithm DEF +05:44:36.949 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +05:44:36.949 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 105ms +05:44:36.957 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +05:44:36.957 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... +05:44:36.957 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +05:44:36.957 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +05:44:36.957 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +05:44:36.957 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +05:44:36.957 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +05:44:36.957 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +05:44:36.957 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +05:44:36.957 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +05:44:36.957 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +05:44:36.957 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +05:44:36.957 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +05:44:36.958 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +05:44:36.958 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +05:44:36.958 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +05:44:36.958 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +05:44:36.958 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +05:44:36.959 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +05:44:36.959 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +05:44:36.959 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +05:44:36.959 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +05:44:36.959 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +05:44:36.960 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +05:44:36.961 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +05:44:36.962 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +05:44:36.963 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +05:44:36.963 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +05:44:36.963 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +05:44:36.963 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +05:44:36.963 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +05:44:36.964 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +05:44:36.964 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +05:44:36.964 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +05:44:36.964 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +05:44:36.964 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +05:44:36.964 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +05:44:36.964 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +05:44:36.965 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +05:44:36.965 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +05:44:36.965 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +05:44:36.965 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@490caf5f registered for zip algorithm DEF +05:44:36.965 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +05:44:36.965 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 8ms +05:44:36.986 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +05:44:36.986 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [BC version 1.77, SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... +05:44:36.986 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +05:44:36.991 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +05:44:36.996 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +05:44:37.000 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +05:44:37.004 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +05:44:37.009 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +05:44:37.013 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +05:44:37.018 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +05:44:37.022 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +05:44:37.026 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +05:44:37.033 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +05:44:37.035 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +05:44:37.036 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +05:44:37.036 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +05:44:37.046 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +05:44:37.051 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +05:44:37.060 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +05:44:37.060 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +05:44:37.061 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +05:44:37.061 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +05:44:37.061 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +05:44:37.065 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +05:44:37.069 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +05:44:37.073 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +05:44:37.077 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +05:44:37.077 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +05:44:37.078 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +05:44:37.078 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +05:44:37.083 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +05:44:37.088 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +05:44:37.089 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +05:44:37.089 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +05:44:37.089 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +05:44:37.089 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +05:44:37.089 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +05:44:37.089 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +05:44:37.089 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +05:44:37.090 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +05:44:37.090 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +05:44:37.090 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@1d483de4 registered for zip algorithm DEF +05:44:37.090 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +05:44:37.090 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 104ms +05:44:37.092 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +05:44:37.092 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... +05:44:37.092 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +05:44:37.092 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +05:44:37.092 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +05:44:37.092 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +05:44:37.092 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +05:44:37.092 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +05:44:37.092 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +05:44:37.092 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +05:44:37.092 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +05:44:37.092 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +05:44:37.093 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +05:44:37.093 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +05:44:37.094 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +05:44:37.094 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +05:44:37.094 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +05:44:37.095 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +05:44:37.095 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +05:44:37.095 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +05:44:37.095 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +05:44:37.096 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +05:44:37.096 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +05:44:37.097 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +05:44:37.097 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +05:44:37.098 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +05:44:37.099 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +05:44:37.099 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +05:44:37.099 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +05:44:37.099 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +05:44:37.100 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +05:44:37.100 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +05:44:37.100 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +05:44:37.100 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +05:44:37.100 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +05:44:37.100 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +05:44:37.100 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +05:44:37.101 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +05:44:37.101 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +05:44:37.101 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +05:44:37.101 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +05:44:37.101 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@4032d386 registered for zip algorithm DEF +05:44:37.101 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +05:44:37.101 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 9ms +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.979 s - in org.jose4j.jws.RsaPssTest +[INFO] Running org.jose4j.jws.JwsUsingEcdsaP256Sha256ExampleTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.jws.JwsUsingEcdsaP256Sha256ExampleTest +[INFO] Running org.jose4j.jws.RsaUsingShaTest +05:44:37.179 DEBUG org.jose4j.jws.JwsTestSupport - RS256 eyJhbGciOiJSUzI1NiJ9.UEFZTE9BRCEhIQ.B7VJ8wKOvfNfzPqwd7_eCO7FztJIXEWp4MbdtdVeVn8x3HRRA8lHQHBtzzxl-cTtXNr0snHQ_rrL6-5HFE57mHXRvaBaZy_lVBy6WLynSEsL1pnnMrzPm0ec8Hx19zFPl9sY0W5gRSuMyfSgx3qAUvVhOZGxcP63SnT65U5J86v3c8cOQKgHec_2rnJBnqRqrsjfFRJVJN26X_-9tBG3uXudnPRPnjkMnxSzwteMmFyVZzvyJ_QNwmTZ1mlBfv02FfcOJy1CMlixa795JnY8b8ixwxPk6-lwLUanzBWgVpqy9RKca-fg_QOGNdiQSnR5iKwtg1ubUPG8gMBx1tNbTA +05:44:37.187 DEBUG org.jose4j.jws.JwsTestSupport - RS384 eyJhbGciOiJSUzM4NCJ9.UEFZTE9BRCEh.QcebNm0BsCxX8taNEhKPKaVVGyXjjgXWHO-qUkNOY7l56YgUncVr1kDSOeqRh2uWaukpZLArjDWNs4HccIR1uN-sC6B1NmOXgh_F4KGdyf3N8xREy1usN7kPIgT4KebiqTaOSlmPxlIppKr8fzJnAeMhVk2fqKOi8DQAUtXDiRZGyNMjqhJ1046ph-3R3qWFNkpjavYwZel8YgL9B_uWzhjSpkNNTjq6HmaWYVZVpEWBGqO8lbcNntp_Ax_xvfS6k3Hk2OgRsgS0VXBuWyZTWc4fCE8pixNnbs67PHk8IEe6ek_GzHWrahua3zAnuBUTDZXm489aZuKsSChvMPQhig +05:44:37.194 DEBUG org.jose4j.jws.JwsTestSupport - RS512 eyJhbGciOiJSUzUxMiJ9.UEFZTE9BRCE.L8NsjVwAKj71FbSNuk-s9hyiY-INMwnP4nfE5xxNPg6853M6hzZG-nyI-b1ULo0AV2hjRn3RmBRjXR6G2_lwbEz2Sb_Yp55iFS1eDx8UOD5vxrR0lxy6EZM_xKWV7ZXeJcQKv_m-wMxvZkm9tZXeS0UJSD9XbnFE8aCypyLwjdpQ2niKBvoIf_lxFUvEkiIKGx7G1Hcehu-HWG2ziGaTXfgSwTMFTNgEBDQtg62urIwo7-9k2sZYNEbD-5sepO7jNWiGjowtg4JDIyiAloHX7OCeNQXIetk6iEME_TaHBp5MC9H6CUqNnLomTCX6aT60uSY8pkflQN-3neMIF-tWuQ +05:44:37.218 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +05:44:37.218 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +05:44:37.218 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +05:44:37.218 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +05:44:37.218 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +05:44:37.218 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +05:44:37.218 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +05:44:37.219 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +05:44:37.219 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +05:44:37.219 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +05:44:37.219 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +05:44:37.219 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +05:44:37.220 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +05:44:37.220 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +05:44:37.220 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA384withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +05:44:37.220 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA384withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +05:44:37.220 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +05:44:37.220 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +05:44:37.221 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +05:44:37.221 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +05:44:37.221 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +05:44:37.221 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +05:44:37.221 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +05:44:37.221 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA512withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +05:44:37.221 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA512withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +05:44:37.221 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +05:44:37.221 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.112 s - in org.jose4j.jws.RsaUsingShaTest +[INFO] Running org.jose4j.jws.EcdsaUsingShaAlgorithmTest +[0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 2] +[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.028 s - in org.jose4j.jws.EcdsaUsingShaAlgorithmTest +[INFO] Running org.jose4j.jws.HmacShaTest +05:44:37.254 DEBUG org.jose4j.jws.JwsTestSupport - HS256 eyJhbGciOiJIUzI1NiJ9.c29tZSBjb250ZW50IHRoYXQgaXMgdGhlIHBheWxvYWQ.qGO7O7W2ECVl6uO7lfsXDgEF-EUEti0i-a_AimulIRA +05:44:37.256 DEBUG org.jose4j.jws.JwsTestSupport - HS256 eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJodHRwczovL2p3dC1pZHAuZXhhbXBsZS5jb20iLAogICAgInBybiI6Im1haWx0bzptaWtlQGV4YW1wbGUuY29tIiwKICAgICJhdWQiOiJodHRwczovL2p3dC1ycC5leGFtcGxlLm5ldCIsCiAgICAiaWF0IjoxMzAwODE1NzgwLAogICAgImV4cCI6MTMwMDgxOTM4MCwKICAgICJodHRwOi8vY2xhaW1zLmV4YW1wbGUuY29tL21lbWJlciI6dHJ1ZX0.ZhkLsRIwT5xHXNgOpdFJ_7q5kqLd6sMiOOEV6kxTNCo +05:44:37.257 DEBUG org.jose4j.jws.JwsTestSupport - HS384 eyJhbGciOiJIUzM4NCJ9.eyJtZWgiOiJtZWgifQ.fptKQJmGN3fBP_FiQzdAGdmx-Q5iWjQvJrLfdmFnebxbQuzOmzejBrzYh4MyS01a +05:44:37.257 DEBUG org.jose4j.jws.JwsTestSupport - HS384 eyJhbGciOiJIUzM4NCJ9.TG9va2luZyBnb29kLCBCaWxseSBSYXkh.wtlqZW8_eLF3hjMZT9c_kzg133b2b_JsR44bHGshc4w_BEUJApKerwEw9cltL8w9 +05:44:37.258 DEBUG org.jose4j.jws.JwsTestSupport - HS512 eyJhbGciOiJIUzUxMiJ9.RmVlbGluZyBnb29kLCBMb3VpcyE.i4SAIaVYY4gxhqJxMvw3FKsar5RBCxzadaK2YT3HeeguWgJMLpDMu9cK1WxetjYmce49ZQmTxmB5nTbE_IgKHQ +05:44:37.259 DEBUG org.jose4j.jws.JwsTestSupport - HS512 eyJhbGciOiJIUzUxMiJ9.eyJtZWgiOiJtZWh2YWx1ZSJ9.NeB669dYkPmqgLqgd_sVqwIfCvb4XN-K67gpMJR93wfw_DylpxB1ell2opHM-E5P9jNKE2GYxTxwcI68Z2CTxw +05:44:37.261 DEBUG org.jose4j.jws.HmacShaTest - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 72 bits +05:44:37.261 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 384 bits for HS384) or larger MUST be used with the HMAC SHA algorithms but this key is only 376 bits +05:44:37.262 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 384 bits for HS384) or larger MUST be used with the HMAC SHA algorithms but this key is only 376 bits +05:44:37.262 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 512 bits for HS512) or larger MUST be used with the HMAC SHA algorithms but this key is only 504 bits +05:44:37.263 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 512 bits for HS512) or larger MUST be used with the HMAC SHA algorithms but this key is only 504 bits +05:44:37.263 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 8 bits +05:44:37.263 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 248 bits +05:44:37.263 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 248 bits +[INFO] Tests run: 16, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.009 s - in org.jose4j.jws.HmacShaTest +[INFO] Running org.jose4j.jws.JwsUsingRsaSha256ExampleTest +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s - in org.jose4j.jws.JwsUsingRsaSha256ExampleTest +[INFO] Running org.jose4j.jws.DetachedContentTest +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.025 s - in org.jose4j.jws.DetachedContentTest +[INFO] Running org.jose4j.jws.PublicKeyAsHmacKeyTest +05:44:37.308 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +05:44:37.308 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [BC version 1.77, SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... +05:44:37.308 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +05:44:37.313 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +05:44:37.317 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +05:44:37.321 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +05:44:37.325 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +05:44:37.329 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +05:44:37.333 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +05:44:37.338 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +05:44:37.342 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +05:44:37.346 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +05:44:37.352 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +05:44:37.353 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +05:44:37.354 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +05:44:37.354 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +05:44:37.363 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +05:44:37.368 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +05:44:37.377 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +05:44:37.377 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +05:44:37.377 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +05:44:37.377 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +05:44:37.377 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +05:44:37.381 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +05:44:37.385 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +05:44:37.389 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +05:44:37.392 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +05:44:37.392 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +05:44:37.392 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +05:44:37.393 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +05:44:37.397 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +05:44:37.401 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +05:44:37.402 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +05:44:37.402 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +05:44:37.402 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +05:44:37.402 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +05:44:37.402 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +05:44:37.402 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +05:44:37.402 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +05:44:37.402 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +05:44:37.402 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +05:44:37.402 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@6853425f registered for zip algorithm DEF +05:44:37.402 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +05:44:37.402 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 94ms +05:44:37.404 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. +05:44:37.404 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +05:44:37.404 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... +05:44:37.404 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +05:44:37.404 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +05:44:37.404 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +05:44:37.404 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +05:44:37.404 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +05:44:37.404 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +05:44:37.404 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +05:44:37.404 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +05:44:37.404 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +05:44:37.404 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +05:44:37.404 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +05:44:37.404 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +05:44:37.405 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +05:44:37.405 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +05:44:37.405 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +05:44:37.405 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +05:44:37.405 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +05:44:37.405 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +05:44:37.405 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +05:44:37.406 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +05:44:37.406 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +05:44:37.406 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +05:44:37.407 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +05:44:37.408 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +05:44:37.409 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +05:44:37.409 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +05:44:37.409 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +05:44:37.409 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +05:44:37.409 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +05:44:37.409 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +05:44:37.409 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +05:44:37.409 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +05:44:37.410 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +05:44:37.410 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +05:44:37.410 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +05:44:37.410 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +05:44:37.410 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +05:44:37.410 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +05:44:37.410 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +05:44:37.410 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@68d279ec registered for zip algorithm DEF +05:44:37.410 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +05:44:37.410 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 6ms +05:44:37.418 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +05:44:37.418 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [BC version 1.77, SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... +05:44:37.418 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +05:44:37.422 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +05:44:37.426 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +05:44:37.430 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +05:44:37.435 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +05:44:37.440 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +05:44:37.448 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +05:44:37.456 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +05:44:37.461 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +05:44:37.468 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +05:44:37.479 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +05:44:37.482 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +05:44:37.485 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +05:44:37.485 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +05:44:37.502 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +05:44:37.511 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +05:44:37.530 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +05:44:37.530 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +05:44:37.530 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +05:44:37.530 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +05:44:37.530 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +05:44:37.537 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +05:44:37.545 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +05:44:37.552 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +05:44:37.560 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +05:44:37.561 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +05:44:37.562 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +05:44:37.562 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +05:44:37.571 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +05:44:37.580 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +05:44:37.581 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +05:44:37.581 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +05:44:37.581 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +05:44:37.582 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +05:44:37.582 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +05:44:37.582 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +05:44:37.588 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +05:44:37.589 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +05:44:37.589 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +05:44:37.589 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@6c0d7c83 registered for zip algorithm DEF +05:44:37.589 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +05:44:37.589 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 171ms +05:44:37.590 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. +05:44:37.590 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +05:44:37.590 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... +05:44:37.590 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +05:44:37.590 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +05:44:37.590 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +05:44:37.590 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +05:44:37.590 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +05:44:37.590 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +05:44:37.590 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +05:44:37.590 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +05:44:37.590 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +05:44:37.590 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +05:44:37.590 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +05:44:37.591 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +05:44:37.601 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +05:44:37.601 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +05:44:37.601 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +05:44:37.601 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +05:44:37.602 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +05:44:37.603 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +05:44:37.603 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +05:44:37.603 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +05:44:37.603 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +05:44:37.604 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +05:44:37.616 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +05:44:37.618 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +05:44:37.620 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +05:44:37.620 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +05:44:37.620 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +05:44:37.621 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +05:44:37.622 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +05:44:37.622 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +05:44:37.623 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +05:44:37.623 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +05:44:37.623 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +05:44:37.624 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +05:44:37.624 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +05:44:37.624 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +05:44:37.625 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +05:44:37.625 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +05:44:37.625 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +05:44:37.626 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@176b75f7 registered for zip algorithm DEF +05:44:37.626 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +05:44:37.626 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 36ms +05:44:37.644 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +05:44:37.645 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [BC version 1.77, SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... +05:44:37.645 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +05:44:37.653 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +05:44:37.661 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +05:44:37.670 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +05:44:37.677 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +05:44:37.686 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +05:44:37.694 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +05:44:37.702 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +05:44:37.711 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +05:44:37.718 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +05:44:37.729 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +05:44:37.732 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +05:44:37.734 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +05:44:37.734 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +05:44:37.750 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +05:44:37.759 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +05:44:37.776 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +05:44:37.776 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +05:44:37.776 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +05:44:37.776 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +05:44:37.776 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +05:44:37.783 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +05:44:37.790 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +05:44:37.796 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +05:44:37.803 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +05:44:37.803 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +05:44:37.803 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +05:44:37.803 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +05:44:37.812 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +05:44:37.821 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +05:44:37.821 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +05:44:37.821 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +05:44:37.821 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +05:44:37.821 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +05:44:37.821 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +05:44:37.822 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +05:44:37.822 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +05:44:37.828 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +05:44:37.828 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +05:44:37.829 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@3e74829 registered for zip algorithm DEF +05:44:37.829 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +05:44:37.829 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 184ms +05:44:37.829 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. +05:44:37.829 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +05:44:37.829 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... +05:44:37.829 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +05:44:37.829 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +05:44:37.829 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +05:44:37.829 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +05:44:37.829 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +05:44:37.829 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +05:44:37.829 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +05:44:37.829 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +05:44:37.830 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +05:44:37.830 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +05:44:37.830 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +05:44:37.831 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +05:44:37.831 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +05:44:37.831 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +05:44:37.831 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +05:44:37.831 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +05:44:37.836 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +05:44:37.840 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +05:44:37.840 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +05:44:37.840 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +05:44:37.840 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +05:44:37.842 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +05:44:37.843 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +05:44:37.849 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +05:44:37.850 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +05:44:37.856 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +05:44:37.856 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +05:44:37.856 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +05:44:37.857 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +05:44:37.857 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +05:44:37.857 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +05:44:37.857 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +05:44:37.857 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +05:44:37.857 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +05:44:37.857 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +05:44:37.859 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +05:44:37.859 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +05:44:37.859 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +05:44:37.859 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +05:44:37.859 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@4f6f416f registered for zip algorithm DEF +05:44:37.859 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +05:44:37.859 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 30ms +05:44:37.891 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +05:44:37.896 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [BC version 1.77, SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... +05:44:37.896 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +05:44:37.913 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +05:44:37.936 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +05:44:37.953 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +05:44:37.974 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +05:44:37.997 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +05:44:38.014 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +05:44:38.036 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +05:44:38.049 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +05:44:38.058 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +05:44:38.070 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +05:44:38.073 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +05:44:38.077 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +05:44:38.077 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +05:44:38.094 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +05:44:38.103 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +05:44:38.143 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +05:44:38.148 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +05:44:38.148 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +05:44:38.149 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +05:44:38.149 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +05:44:38.165 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +05:44:38.185 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +05:44:38.200 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +05:44:38.224 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +05:44:38.225 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +05:44:38.225 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +05:44:38.225 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +05:44:38.246 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +05:44:38.263 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +05:44:38.263 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +05:44:38.263 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +05:44:38.263 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +05:44:38.263 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +05:44:38.263 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +05:44:38.264 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +05:44:38.264 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +05:44:38.268 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +05:44:38.268 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +05:44:38.268 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@3eb77ea8 registered for zip algorithm DEF +05:44:38.268 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +05:44:38.268 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 372ms +05:44:38.269 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. +05:44:38.269 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +05:44:38.270 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... +05:44:38.270 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +05:44:38.270 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +05:44:38.270 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +05:44:38.270 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +05:44:38.270 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +05:44:38.270 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +05:44:38.270 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +05:44:38.270 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +05:44:38.270 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +05:44:38.270 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +05:44:38.271 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +05:44:38.271 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +05:44:38.271 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +05:44:38.272 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +05:44:38.272 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +05:44:38.272 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +05:44:38.281 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +05:44:38.282 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +05:44:38.282 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +05:44:38.282 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +05:44:38.282 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +05:44:38.283 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +05:44:38.288 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +05:44:38.290 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +05:44:38.291 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +05:44:38.291 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +05:44:38.291 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +05:44:38.292 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +05:44:38.292 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +05:44:38.296 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +05:44:38.297 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +05:44:38.297 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +05:44:38.297 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +05:44:38.297 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +05:44:38.297 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +05:44:38.297 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +05:44:38.297 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +05:44:38.297 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +05:44:38.297 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +05:44:38.297 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@44c73c26 registered for zip algorithm DEF +05:44:38.297 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +05:44:38.297 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 27ms +05:44:38.319 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. +05:44:38.320 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. +05:44:38.334 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. +05:44:38.335 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.036 s - in org.jose4j.jws.PublicKeyAsHmacKeyTest +[INFO] Running org.jose4j.jws.CritHeaderTest +05:44:38.357 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'nope' marked as critical. +05:44:38.365 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: crit header value not an array (class java.lang.String). +05:44:38.366 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: crit header value not an array (class java.lang.Boolean). +05:44:38.366 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'http://example.com/UNDEFINED' marked as critical. +05:44:38.366 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'urn:example.com:nope' marked as critical. +05:44:38.370 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'urn:example.com:nope' marked as critical. +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.048 s - in org.jose4j.jws.CritHeaderTest +[INFO] Running org.jose4j.jws.JwsCryptoPrimitiveTest +05:44:38.394 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getSignature(): Signature object: SHA256withECDSA +05:44:38.412 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getSignature(): Signature object: SHA256withRSA +05:44:38.430 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getMac(): javax.crypto.Mac@41005828 +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.033 s - in org.jose4j.jws.JwsCryptoPrimitiveTest +[INFO] Running org.jose4j.jws.ChangingKeyTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s - in org.jose4j.jws.ChangingKeyTest +[INFO] Running org.jose4j.jws.JwsPlaintextTest +05:44:38.460 DEBUG org.jose4j.jws.JwsPlaintextTest - {"auth_time":1339613248,"exp":1339613548,"iss":"https:\/\/example.com","aud":"a","jti":"jIA8qa35AroV6iP2q4wRAl","user_id":"john","iat":1339613248,"acr":3} +[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.017 s - in org.jose4j.jws.JwsPlaintextTest +[INFO] Running org.jose4j.jws.GetPayloadTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.jws.GetPayloadTest +[INFO] Running org.jose4j.jwx.JsonWebStructureTest +[INFO] Tests run: 12, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.062 s - in org.jose4j.jwx.JsonWebStructureTest +[INFO] Running org.jose4j.jwx.CompactSerializerTest +[INFO] Tests run: 11, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.jwx.CompactSerializerTest +[INFO] Running org.jose4j.jwx.HeadersTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwx.HeadersTest +[INFO] Running org.jose4j.jca.ProviderContextTest +05:44:38.602 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +05:44:38.608 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17, BC version 1.77] security providers installed)... +05:44:38.608 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +05:44:38.610 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +05:44:38.610 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +05:44:38.610 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +05:44:38.610 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +05:44:38.610 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +05:44:38.610 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +05:44:38.610 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +05:44:38.610 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +05:44:38.610 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +05:44:38.613 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +05:44:38.619 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +05:44:38.627 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +05:44:38.632 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +05:44:38.633 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +05:44:38.633 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +05:44:38.634 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +05:44:38.634 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +05:44:38.634 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +05:44:38.634 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +05:44:38.634 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +05:44:38.650 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +05:44:38.672 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +05:44:38.693 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +05:44:38.709 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +05:44:38.716 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +05:44:38.716 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +05:44:38.716 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +05:44:38.717 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +05:44:38.717 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +05:44:38.717 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +05:44:38.717 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +05:44:38.717 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +05:44:38.717 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +05:44:38.717 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +05:44:38.718 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +05:44:38.718 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +05:44:38.718 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +05:44:38.718 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +05:44:38.718 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@56c4278e registered for zip algorithm DEF +05:44:38.718 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +05:44:38.718 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 110ms +05:44:38.803 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +05:44:38.803 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... +05:44:38.803 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +05:44:38.803 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +05:44:38.803 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +05:44:38.803 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +05:44:38.803 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +05:44:38.803 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +05:44:38.803 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +05:44:38.803 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +05:44:38.803 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +05:44:38.803 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +05:44:38.812 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +05:44:38.813 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +05:44:38.813 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +05:44:38.813 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +05:44:38.813 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +05:44:38.814 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +05:44:38.815 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +05:44:38.815 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +05:44:38.815 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +05:44:38.815 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +05:44:38.815 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +05:44:38.821 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +05:44:38.822 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +05:44:38.823 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +05:44:38.828 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +05:44:38.829 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +05:44:38.829 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +05:44:38.829 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +05:44:38.829 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +05:44:38.829 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +05:44:38.829 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +05:44:38.829 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +05:44:38.830 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +05:44:38.830 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +05:44:38.830 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +05:44:38.836 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +05:44:38.837 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +05:44:38.837 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +05:44:38.845 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +05:44:38.845 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@1e8b7643 registered for zip algorithm DEF +05:44:38.845 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +05:44:38.845 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 42ms +05:44:38.932 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +05:44:38.932 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17, BC version 1.77] security providers installed)... +05:44:38.932 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +05:44:38.933 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +05:44:38.933 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +05:44:38.933 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +05:44:38.933 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +05:44:38.933 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +05:44:38.933 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +05:44:38.933 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +05:44:38.933 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +05:44:38.933 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +05:44:38.935 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +05:44:38.947 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +05:44:38.954 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +05:44:38.954 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +05:44:38.954 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +05:44:38.954 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +05:44:38.955 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +05:44:38.955 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +05:44:38.955 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +05:44:38.955 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +05:44:38.955 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +05:44:38.967 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +05:44:38.974 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +05:44:38.981 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +05:44:38.988 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +05:44:38.989 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +05:44:38.989 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +05:44:38.989 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +05:44:38.989 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +05:44:38.989 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +05:44:38.989 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +05:44:38.989 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +05:44:38.989 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +05:44:38.989 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +05:44:38.989 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +05:44:38.990 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +05:44:38.990 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +05:44:38.990 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +05:44:38.990 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +05:44:38.990 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@35645047 registered for zip algorithm DEF +05:44:38.990 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +05:44:38.990 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 58ms +05:44:39.002 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +05:44:39.002 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... +05:44:39.002 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +05:44:39.002 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +05:44:39.002 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +05:44:39.002 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +05:44:39.002 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +05:44:39.002 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +05:44:39.002 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +05:44:39.002 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +05:44:39.002 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +05:44:39.002 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +05:44:39.003 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +05:44:39.003 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +05:44:39.009 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +05:44:39.009 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +05:44:39.009 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +05:44:39.009 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +05:44:39.010 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +05:44:39.010 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +05:44:39.010 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +05:44:39.010 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +05:44:39.010 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +05:44:39.011 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +05:44:39.016 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +05:44:39.018 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +05:44:39.019 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +05:44:39.019 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +05:44:39.019 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +05:44:39.019 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +05:44:39.019 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +05:44:39.020 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +05:44:39.020 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +05:44:39.020 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +05:44:39.020 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +05:44:39.020 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +05:44:39.020 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +05:44:39.024 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +05:44:39.025 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +05:44:39.025 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +05:44:39.025 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +05:44:39.025 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@6bc407fd registered for zip algorithm DEF +05:44:39.025 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +05:44:39.025 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 23ms +[INFO] Tests run: 12, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.898 s - in org.jose4j.jca.ProviderContextTest +[INFO] Running org.jose4j.jwa.AlgorithmFactoryTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwa.AlgorithmFactoryTest +[INFO] Running org.jose4j.jwa.AlgorithmConstraintsTest +[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.jwa.AlgorithmConstraintsTest +[INFO] Running org.jose4j.base64url.internal.apache.commons.codec.binary.Base64Test +[INFO] Tests run: 47, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.111 s - in org.jose4j.base64url.internal.apache.commons.codec.binary.Base64Test +[INFO] Running org.jose4j.jwe.Aes128CbcHmacSha256ContentEncryptionAlgorithmTest +[WARNING] Tests run: 4, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.001 s - in org.jose4j.jwe.Aes128CbcHmacSha256ContentEncryptionAlgorithmTest +[INFO] Running org.jose4j.jwe.Aes256GcmContentEncryptionAlgorithmTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.084 s - in org.jose4j.jwe.Aes256GcmContentEncryptionAlgorithmTest +[INFO] Running org.jose4j.jwe.NegativeJweWrappingTest +05:44:39.737 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:487); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:389); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... +05:44:39.738 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ +05:44:39.746 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:487); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:389); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... +05:44:39.746 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ +05:44:39.759 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:487); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:389); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... +05:44:39.765 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ +05:44:39.772 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:487); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:389); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... +05:44:39.773 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ +05:44:39.781 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=FlleGhb7Jp-VlWS1wonqsA +05:44:39.788 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ +05:44:39.803 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.InvalidKeyException: 256 bit content encryption key is not the correct size for the A192CBC-HS384 content encryption algorithm (384). +eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.AE5gPh5HdmMZBIE-Nay4wxEWl4MAz1qUA88XpeIGbksGD4PVBzyB94qyISliJMlL1MUQLeJz7P6afKbq70gUikvQA7etbKCuFGOTSFrFj0U4r5-5eU4JTVfUIAeWCePftS77QvybPG9Gst1T_p04IbIqF6nJLcYEOfD4b5zerprCjg1GCFQIxc6UCD3LjpsoNLFl3SzxauQEEp4ONSxQzwS3LVQfxEBG91jSkmvXDpDYGOd_yDrJtjf9JmcD3MFkaw4PJv9F0c1BqCvt9SdTbn8c79sZ23bmkS4vG1i9IzLS1CdzF9bjwSmw0r5p4tlaAZKxYWnB8Q-QDd893nhuNg.fQfX67WlTVLO231f87rkxA.ptCsmFTCzjl2j-PHIQpnnZkbVA1Ig_5UK2CEWH2BuG1NmNZE0hfQbs0O3Oa4URSgfPoT2wWztFDLdufXT5GvIV-FEVJXQ0X1of4QHRD41V0.L3PUlEHhZ-GFHzPt0psRHw +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.088 s - in org.jose4j.jwe.NegativeJweWrappingTest +[INFO] Running org.jose4j.jwe.NegativeJweKeyTest +05:44:39.820 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: 256 bit content encryption key is not the correct size for the A128GCM content encryption algorithm (128). +05:44:39.825 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided. +05:44:39.825 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided. +05:44:39.825 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided. +05:44:39.825 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided. +05:44:39.826 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided. +05:44:39.826 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided. +05:44:39.826 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 192 bit key was provided. +05:44:39.827 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 256 bit key was provided. +05:44:39.827 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 128 bit key was provided. +05:44:39.827 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 256 bit key was provided. +05:44:39.827 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 128 bit key was provided. +05:44:39.828 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 192 bit key was provided. +05:44:39.828 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided. +05:44:39.833 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided. +05:44:39.833 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided. +05:44:39.833 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +05:44:39.833 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +05:44:39.834 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +05:44:39.834 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 8 bit key was provided. +05:44:39.834 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 56 bit key was provided. +05:44:39.834 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 64 bit key was provided. +05:44:39.834 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 128 bit key was provided. +05:44:39.834 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 192 bit key was provided. +05:44:39.834 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 248 bit key was provided. +05:44:39.834 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided. +05:44:39.834 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided. +05:44:39.834 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided. +05:44:39.835 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 9744 bit key was provided. +05:44:39.835 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 2352 bit key was provided. +05:44:39.835 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 784 bit key was provided. +05:44:39.835 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 1264 bit key was provided. +05:44:39.835 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 8 bit key was provided. +05:44:39.835 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 56 bit key was provided. +05:44:39.835 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 64 bit key was provided. +05:44:39.835 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 128 bit key was provided. +05:44:39.835 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 192 bit key was provided. +05:44:39.835 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided. +05:44:39.835 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 376 bit key was provided. +05:44:39.835 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided. +05:44:39.835 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided. +05:44:39.836 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 9744 bit key was provided. +05:44:39.836 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 2352 bit key was provided. +05:44:39.836 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 784 bit key was provided. +05:44:39.836 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 1264 bit key was provided. +05:44:39.836 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 8 bit key was provided. +05:44:39.836 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 56 bit key was provided. +05:44:39.836 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 64 bit key was provided. +05:44:39.836 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 128 bit key was provided. +05:44:39.836 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 192 bit key was provided. +05:44:39.836 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided. +05:44:39.840 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided. +05:44:39.840 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 504 bit key was provided. +05:44:39.840 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided. +05:44:39.841 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 9744 bit key was provided. +05:44:39.841 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 2352 bit key was provided. +05:44:39.841 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 784 bit key was provided. +05:44:39.841 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 1264 bit key was provided. +05:44:39.842 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.PublicKey +05:44:39.849 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.PrivateKey +05:44:39.850 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. +05:44:39.850 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. +05:44:39.850 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. +05:44:39.850 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. +05:44:39.850 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An empty octet sequence is to be used as the JWE Encrypted Key value when utilizing direct encryption but this JWE has 40 octets in the encrypted key part. +05:44:39.850 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.interfaces.ECPublicKey +05:44:39.850 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.interfaces.ECPublicKey +05:44:39.851 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.interfaces.ECPublicKey +05:44:39.851 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.ec.ECPrivateKeyImpl to java.security.interfaces.ECPublicKey +05:44:39.851 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. +05:44:39.851 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.interfaces.ECPublicKey +05:44:39.851 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.interfaces.ECPublicKey +05:44:39.851 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.interfaces.ECPublicKey +05:44:39.851 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.ec.ECPrivateKeyImpl to java.security.interfaces.ECPublicKey +05:44:39.851 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. +05:44:39.851 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.interfaces.ECPublicKey +05:44:39.851 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.interfaces.ECPublicKey +05:44:39.851 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.interfaces.ECPublicKey +05:44:39.851 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.ec.ECPrivateKeyImpl to java.security.interfaces.ECPublicKey +05:44:39.851 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. +05:44:39.851 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.interfaces.ECPublicKey +05:44:39.852 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.interfaces.ECPublicKey +05:44:39.852 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.interfaces.ECPublicKey +05:44:39.852 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.ec.ECPrivateKeyImpl to java.security.interfaces.ECPublicKey +05:44:39.852 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. +05:44:39.852 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.interfaces.ECPrivateKey +05:44:39.852 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.interfaces.ECPrivateKey +05:44:39.852 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.interfaces.ECPrivateKey +05:44:39.852 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.ec.ECPublicKeyImpl to java.security.interfaces.ECPrivateKey +05:44:39.852 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.interfaces.ECPrivateKey +05:44:39.852 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.interfaces.ECPrivateKey +05:44:39.852 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.interfaces.ECPrivateKey +05:44:39.853 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.ec.ECPublicKeyImpl to java.security.interfaces.ECPrivateKey +05:44:39.853 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.PublicKey +05:44:39.853 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Unable to encrypt (RSA/ECB/OAEPWithSHA-1AndMGF1Padding) the Content Encryption Key: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +05:44:39.854 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.ec.ECPrivateKeyImpl to java.security.PublicKey +05:44:39.854 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 8 bit key was provided. +05:44:39.854 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 40 bit key was provided. +05:44:39.854 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 136 bit key was provided. +05:44:39.854 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 192 bit key was provided. +05:44:39.854 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 256 bit key was provided. +05:44:39.854 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an RSA key was provided. +05:44:39.854 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an RSA key was provided. +05:44:39.854 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an EC key was provided. +05:44:39.854 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an EC key was provided. +05:44:39.854 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 8 bit key was provided. +05:44:39.854 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 40 bit key was provided. +05:44:39.854 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 128 bit key was provided. +05:44:39.854 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 184 bit key was provided. +05:44:39.854 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 256 bit key was provided. +05:44:39.854 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an RSA key was provided. +05:44:39.855 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an RSA key was provided. +05:44:39.855 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an EC key was provided. +05:44:39.855 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an EC key was provided. +05:44:39.855 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 8 bit key was provided. +05:44:39.855 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 40 bit key was provided. +05:44:39.855 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 128 bit key was provided. +05:44:39.855 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 192 bit key was provided. +05:44:39.855 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 248 bit key was provided. +05:44:39.855 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 264 bit key was provided. +05:44:39.855 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an RSA key was provided. +05:44:39.855 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an RSA key was provided. +05:44:39.855 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an EC key was provided. +05:44:39.855 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an EC key was provided. +[INFO] Tests run: 29, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.048 s - in org.jose4j.jwe.NegativeJweKeyTest +[INFO] Running org.jose4j.jwe.Pbes2ExampleEncryptedRSAPrivateKeyJwkAppendixCTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.101 s - in org.jose4j.jwe.Pbes2ExampleEncryptedRSAPrivateKeyJwkAppendixCTest +[INFO] Running org.jose4j.jwe.kdf.Rfc6070Pbkdf2TestVectorsTest +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.097 s - in org.jose4j.jwe.kdf.Rfc6070Pbkdf2TestVectorsTest +[INFO] Running org.jose4j.jwe.kdf.ConcatKeyDerivationFunctionTest +Sq8rGLm4rEtzScmnSsY5r1n-AqBl_iBU8FxN80Uc0S0 +LfkHot2nGTVlmfxbgxQfMg +[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.006 s - in org.jose4j.jwe.kdf.ConcatKeyDerivationFunctionTest +[INFO] Running org.jose4j.jwe.kdf.Pbkdf2MoreTest +[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.025 s - in org.jose4j.jwe.kdf.Pbkdf2MoreTest +[INFO] Running org.jose4j.jwe.kdf.Pbkdf2JwkExampleTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.033 s - in org.jose4j.jwe.kdf.Pbkdf2JwkExampleTest +[INFO] Running org.jose4j.jwe.kdf.Pbkdf2CompareToJavaSecretKeyFactorySha1Test +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.071 s - in org.jose4j.jwe.kdf.Pbkdf2CompareToJavaSecretKeyFactorySha1Test +[INFO] Running org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest +05:44:40.264 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4Ijoid3RMeTRKeGJNZGZpZ2dXZGxsZ0I3Z1U0LWVOWFc3eXBrNHpPTHU0OXY3NCIsInkiOiJ6Q2x6MnozRzJ3SGVua1RxQ2VZamtIdDdFUGwyLXVqUmdXbmx1dTZsUVhRIiwiY3J2IjoiUC0yNTYifX0.66C81zuGWK8mx4IRFaNi_7YQcWp5-FzcFiQd1cRcKUCOkSbTTLVo5g.xqX2O9E5h7AVZ2hG8TXZlg.DFtp8i53RHPQZXYiXQYSRLbrPlQ91mfL5kSZVz51kGbeUwFQAsErU6XT7xcdDcZ-x-amSqU9bZxG62l3IATnBg.2_d_EDd3it6Gbz1uRE6L6A +05:44:40.286 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiN3BpcklGUk9nOUZ0Y2RwQ055cmdLZV9KVWZiQ0JMSF9Hdmx3cHBDaXdCMCIsInkiOiJOWmZ1R2F2VXM4UGVnYkQxQkM2YUE4TGdERzBTR21WMFJ6WS0teVB0NkE0IiwiY3J2IjoiUC0yNTYifX0.ZagxUtc5tU90CQCAtvuouvmUv5t76TktHdUFhbTo1rRNL99Snw8vE2012tJZvEvo058Jl8qUugM.t9mDO12SGiAlXHRQvvftlQ.f8w4g0uq2P5wz2hLsEaIhZTwbEku7fYrc4jg6lKPdeZvRGdlYW_rlcLnGFGDnp5Q9VE_Ps4xdgVmg7XOYv1nVw.poj3ffh8Fz4qjWgaqJxb8hKqPRWdnIrK +05:44:40.315 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiTDQ4VXpaYnZWVm1DM3BRSkdjZ3JLYXU1WVZtVzlUZTR4NTNldWVuY2FpUSIsInkiOiJXNDlvaWh5aEhQX2JOX25ma2FKbUtGZ0pYNWlxRnZNdGxRcmpqcEZteXBrIiwiY3J2IjoiUC0yNTYifX0.8bLBdXSFZSICnVDxIfwjObQz-n9UcjvVwry4M6dQv0qG8XBQcJl7GtcrA3ADKJLh5UYBryenndcu8plPaeqEa3uVOLVQWKpL.KUusZVuwuyTsz8BqtQmtnw.7JRPj2Tyjm2mjKuAgYhRKyPzrcEcfksRIo8_wCHmbPTXjq01ps-SWCDrplwHRK10yMkJOwKDHVAErkcs0Pa2hw.IG_nwR7sJbq1GOVQRgZ-eXrPX6XBxiicgJZCRRjaojw +05:44:40.337 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiU3hQaHNCZ2pXZmNaNzZNREFOUVU2dU83b1pySmFkWVVtbU9vMkh2T21aQSIsInkiOiJDRlpWNGluRDJLY3BqQ1ZXeFVYbmE2SVExcThWNFBncHBqQlFwUl9DNVJBIiwiY3J2IjoiUC0yNTYifX0.mEfH1Rs5oCqxyRu7VdJSumYmgdNg6WwO18UjewPFEZhBZc6VegcKcA.qGp1pfXhZgfUjaJgNRxJeQ.Xx6ReMl-roDWiwd2RVqNIDocobgls9dOJxfRecj_U7aXXkTpXnIWQa7ciXbtxtJZfl37aEuD2lBiavDnB5EPgQ.47iMcUPYBTjxEys6jtbMww +05:44:40.359 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiMlFydWtXRGVQS21LVVFueGFvQUVpV2FidzA2UDFXa3hrY2tQT1doWHM0cyIsInkiOiJCaVZDeFgzN3VYYW52aGVhSHU4QThPSldGMS1Md3pGQUdUZmRXS1JSZ040IiwiY3J2IjoiUC0yNTYifX0.BzVumxX-tmZSh37pz7VHc3dGSGsIdEfVKI6npSLvn3WAMW4A5ZNLbVAglwehz9BwYYDDawtH2kU.-0zrMtwpUgyCsbFXMvjV-Q.xWVjdF52XrgXyRkvGOWkPs-23clRZXfiFTaxMwev2Ug8l2ph_ajR54l74jVSWRwbMcaenF4iXhmyP6l0z9IQ_g.Eazp-tf12PNT0c-zA8AcD4gEPtx0pqyL +05:44:40.373 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiRGpkWW9Jd1pya0lqNFVuTkkycXZfRUVWOWhkaDhhUGliUnBwVUVfdlREbyIsInkiOiI4azU0bER3b1U2Zm0zX1h4ZXZfRXRXQ3B3c3hSVmoyQS1wWkxxUWNoY2YwIiwiY3J2IjoiUC0yNTYifX0.JNj46zH24n_36yDbSbjDol7gC29i6_Py1M46mYhI_wJlkpVIBDdGLFSVuuJoN8Zte9-sbXJqxeeqF5W2Uy7R4NiMbZSFa1PC.-awq3dBM4wn6E-HZj1GJXw.Byusdtn1T3Sdo-Wu7WQT-IkbW7jf-bRHIBDoRKYhS2paREFG3QBu13F2y1eeC2KTQNPbiOShb7V9uh23I8rYKA.EeRVSE8dFfK_qEAL9bf8Uz4Vo9tl0HVpRp1V0c2T9ms +05:44:40.393 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiUmVvODVURHBRUUdZejJDTzNkMnZWMWZNTFhsU25UTWJSRVdNVmpOTDBQbyIsInkiOiJibWxsY1RFb1Y3RDRwNXA2M3dlRGdLYWdENmhpU2xuaDNtVU9QcllkUWY0IiwiY3J2IjoiUC0yNTYifX0.zNzr7E5TAPm2R8blEnbKr_ngjDp3Yg6Y3oA4K0-BD15RgEdpTB6XrQ.e8oGNv4my5Q2zqKUvWbWFg.f7y5_LdMjhJk-nUSdRo_U3F2T8bCVbMor3rA1B-RCh3Vua4fy3VYFac79QlsLaJklgoAa7VwAIT3PsclnGHKrg.Wi1wXXMyLER3vQVrr-Emiw +05:44:40.411 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoieVAydFZwZkJBU3lUWHFjZ1NKNVRpUlFySjdjRE04TTh6T1k4V0QzLXBVRSIsInkiOiJ3aGVTYWdsb0J0b0tRZmkzb09NLS0zcGNCVGFSUi1JRm42MjM5ZG5ZTDBFIiwiY3J2IjoiUC0yNTYifX0.MBj9oOKwDHsQ6eOMb8Ma-arYsc1mYWZwiOu2QKcrMwlvOANKPyhdrXjbvEOTNf1BEHmVuGTodfQ.j5j8sIq8x6yx-RMfd2njOQ.CFYbbnvr7QT3yy6d0xbW-SD089QKUVYxhh9FlxPG6a-ZBsIupHfDEdQ1qE5bEut-MCwVsifeM0EzXxt2wEkIKw.0NYL74QMzWa626ftI8jg6UrCHyKHbL-M +05:44:40.437 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiV3VUa2Nkb1lBV1RLb3VTc3pNYXljY25xOXRjYmE1Q3ZiZXpyVnYzWUJXVSIsInkiOiJjd296d2VPRlZTQnV2NGVJaVljcU1iSF92eVlMYWhobVlHS29EQkNUZ0hBIiwiY3J2IjoiUC0yNTYifX0.cRKu3Y_qYEn9OtFkiMUQ8roAM4QO7JDX6sFob8apP77S_1BpR1WtAtsvMbC6QM1BDYIv6EIA35xUPpQTavhBPc5VnpYdOVL8.TQzSwYfUKAoc4etHnuNNvg.XyCkoGFbISbPGBawXfd0YZVjIPfcfFr1c77o-jAfQ-Nh75K4hqZu9n3JAmaxJNTpubhBt5onih0hfRQ2BLG5bg.PKFgRnw4jov42GzuY4CXn29IRGrC7HDagLhegN9GSNY +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.201 s - in org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest +[INFO] Running org.jose4j.jwe.Aes128KeyWrapManagementAlgorithmTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.Aes128KeyWrapManagementAlgorithmTest +[INFO] Running org.jose4j.jwe.JweCryptoPrimitiveTest +05:44:40.459 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getCipher(): Cipher.RSA/ECB/OAEPWithSHA-1AndMGF1Padding, mode: key unwrapping, algorithm from: SunJCE +05:44:40.499 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@2f62ea70 +05:44:40.524 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@24ba9639 +05:44:40.542 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@38aa816f +05:44:40.553 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKey(): 256 bit AES key +05:44:40.554 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getCipher(): Cipher.AESWrap, mode: key unwrapping, algorithm from: SunJCE +05:44:40.985 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKey(): javax.crypto.spec.SecretKeySpec@fffe9488 +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.531 s - in org.jose4j.jwe.JweCryptoPrimitiveTest +[INFO] Running org.jose4j.jwe.CritHeaderTest +05:44:40.987 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'so.crit' marked as critical. +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.CritHeaderTest +[INFO] Running org.jose4j.jwe.ZipTest +eyJ6aXAiOiJERUYiLCJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..7TdGkSKSRhpvqK-3NPkLow.o7Obh9g7I_URIikIzTiAjxsgwjFAufdg8Q8pxkv3sB-3e_CKcIvBexA5EcSGe9MfI-l2YewD3_YrvcwkGD1hxg.YnXpzZ49HtjF7LwDyyGRhw +eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..F_FBHfXftMqWVS-X1mXlIg.7bWyLRGjJnjQYFGi1S0K1e42rXYhbfwsIlpODmUibXv6u_-3KA_ch3UB9sBR2YuC0dOs_hq-RTmkQ-9jCSsMJUQgDixpeRiVvEBLSAFQwPqZHMxCkM90e5l-8lCzp5domIJzPpPYV3907BJYHcIgCJ4ZQz2bckioVjIMaq-b4nFYeywIrYrYEVfCiJh0WnE_fd07HH3hft462CteanDjCE0fYXL4kk4MszVIsiv-bLFi1B8dnUlrkZVHmILaOQloTNvrn7tlM_FofjqfORUwKdSgXT7paw_sPEy0E_PQisP_CTDeZQoi8UstnpVf_iZyGh8bA6qduWIk_tVC3no_BX7WksJJeemUxGGeXL8QfiOU5f_58IqsRcXtBO3qKxFY.ANgT9yGBhM_NH7yQnIZggw +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.012 s - in org.jose4j.jwe.ZipTest +[INFO] Running org.jose4j.jwe.InvalidCurveTest +05:44:41.012 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key is equal to 26 mod 113 +05:44:41.012 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w +05:44:41.016 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as expected: org.jose4j.lang.JoseException: epk is invalid for P-256 +05:44:41.017 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key is equal to 2446 mod 2447 +05:44:41.017 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w +05:44:41.017 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as expected: org.jose4j.lang.JoseException: epk is invalid for P-256 +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.InvalidCurveTest +[INFO] Running org.jose4j.jwe.Rsa1_5KeyManagementAlgorithmTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.018 s - in org.jose4j.jwe.Rsa1_5KeyManagementAlgorithmTest +[INFO] Running org.jose4j.jwe.EcdhKeyAgreementAlgorithmTest +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.079 s - in org.jose4j.jwe.EcdhKeyAgreementAlgorithmTest +[INFO] Running org.jose4j.jwe.GeneralJweTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.01 s - in org.jose4j.jwe.GeneralJweTest +[INFO] Running org.jose4j.jwe.RsaOaepKeyManagementAlgorithmTest +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.106 s - in org.jose4j.jwe.RsaOaepKeyManagementAlgorithmTest +[INFO] Running org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithmTest +eyJhbGciOiJQQkVTMi1IUzI1NitBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwicDJjIjo2NTUzNiwicDJzIjoiTGdfQ1NEM3pWRkIzRGl3TyJ9.yN08I-xn7pjBPlI2dkEyCyMW_hpqDXkBDnIglrCUS_qFtYH_7d2FAw.ujtJd-oGONfYZAszz-GJQw.1Wr5VsENHgVrEgLP4vPr-w.aCGD9RHD6r6ey_tFiJ0-Gg +[INFO] Tests run: 7, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 3.686 s - in org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithmTest +[INFO] Running org.jose4j.jwe.JsonWebEncryptionTest +[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.034 s - in org.jose4j.jwe.JsonWebEncryptionTest +[INFO] Running org.jose4j.zip.DeflateRFC1951CompressionAlgorithmTest +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.008 s - in org.jose4j.zip.DeflateRFC1951CompressionAlgorithmTest +[INFO] Running org.jose4j.jwt.JwtClaimsTest +[INFO] Tests run: 38, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.007 s - in org.jose4j.jwt.JwtClaimsTest +[INFO] Running org.jose4j.jwt.consumer.JwtConsumerTest +05:44:45.049 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322039,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40 PM GMT} iat NumericDate{1571322039 -> Oct 17, 2019, 2:20:39 PM GMT} is more than 60 second(s) in the past.] +05:44:45.058 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1570321001,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40 PM GMT} iat NumericDate{1570321001 -> Oct 6, 2019, 12:16:41 AM GMT} is more than 60 second(s) in the past.] +05:44:45.065 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":12345,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40 PM GMT} iat NumericDate{12345 -> Jan 1, 1970, 3:25:45 AM GMT} is more than 60 second(s) in the past.] +05:44:45.071 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":0,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40 PM GMT} iat NumericDate{0 -> Jan 1, 1970, 12:00:00 AM GMT} is more than 60 second(s) in the past.] +05:44:45.077 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-938763,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40 PM GMT} iat NumericDate{-938763 -> Dec 21, 1969, 3:13:57 AM GMT} is more than 60 second(s) in the past.] +05:44:45.084 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-2147483736,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40 PM GMT} iat NumericDate{-2147483736 -> Dec 13, 1901, 8:44:24 PM GMT} is more than 60 second(s) in the past.] +05:44:45.091 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322101,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322101 -> Oct 17, 2019, 2:21:41 PM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40 PM GMT}.] +05:44:45.097 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322177,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322177 -> Oct 17, 2019, 2:22:57 PM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40 PM GMT}.] +05:44:45.105 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":2147483647,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{2147483647 -> Jan 19, 2038, 3:14:07 AM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40 PM GMT}.] +05:44:45.112 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":7700000007,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{7700000007 -> Jan 2, 2214, 8:53:27 AM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40 PM GMT}.] +05:44:45.130 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571321979,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40 PM GMT} iat NumericDate{1571321979 -> Oct 17, 2019, 2:19:39 PM GMT} is more than 120 second(s) in the past.] +05:44:45.154 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322111,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322111 -> Oct 17, 2019, 2:21:51 PM GMT} is more than 10 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40 PM GMT}.] +05:44:45.167 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"issuer.example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (issuer.example.com) doesn't match expected value of nope.example.com] +05:44:45.167 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] +05:44:45.168 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":["issuer1", "other.one", "meh"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'iss' claim is not the expected type ([issuer1, other.one, meh] - Cannot cast java.util.ArrayList to java.lang.String)] +05:44:45.169 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":["issuer1", "nope.not"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'iss' claim is not the expected type ([issuer1, nope.not] - Cannot cast java.util.ArrayList to java.lang.String)] +05:44:45.170 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https://accounts.google.com"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (https://accounts.google.com) doesn't match expected value of one of [nope.google.com, https://fake.google.com]] +05:44:45.170 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"x"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (x) doesn't match expected value of one of [a, b, c, d, e]] +05:44:45.170 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] +05:44:45.171 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] +05:44:45.171 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] +05:44:45.171 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] +05:44:45.172 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] +05:44:45.173 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] +05:44:45.173 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] +05:44:45.173 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] +05:44:45.173 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: JWS Plaintext (alg=none) must not use a key.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] +05:44:45.173 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: JWS Plaintext (alg=none) must not use a key.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] +05:44:45.173 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] +05:44:45.173 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] +05:44:45.548 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiU2QzRTdndDFiQjhBaWJsMktSU1JOXzhEUVRJZG1hZUZzUzBMZ0plSFVVOCIsInkiOiJwTWI4aTFCMUVVT01sZTkzdXFvZUdZUXh3UVdyWC10dlhheEZHTEluYUdVIiwiY3J2IjoiUC0yNTYifX0.Nel3aDlYStKtyMLdEYG7giogHI00z15ykgb7c4M2zhP4RT82aix4Cw.5cbqOagQKv-EBlXGgy-0JA.QWHilH8GvDZcajtNPHVnlSriiFfcT5YUYRM-HubeFBBpYdN691g_iIPv8ZHP5_ZkMAYfYEs9_7UM2XZvB7axUg.sqXdVc8Wmu_oPQn88Qjs9w Additional details: [[20] Missing Integrity Protection] +05:44:45.557 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImtpZCI6ImVjMiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiI1V0MyM2VKYmxvTW9NMUxKaXJKdGoyRkMwbmdVZERKbDZadHpLaVZZUkl3IiwieSI6Im4zVW93RXMzdjRCQ0p0ZTdmb0NuYUVCWFRDekhfbV8yYkJ6WHhhXzNNSk0iLCJjcnYiOiJQLTI1NiJ9fQ..0iLwaVcyeJ3Q7oMHFytyjQ.iCoa1ICrg0zAV30zyCSeH-uUgBuZcZphO59N4h0pT2matEXSNC2KWaBccR4NYpLcIiviPzXzVE4vb-g4Lk1a-Q.yvWTXqm2E9F2d9-U-Adp_w Additional details: [[20] Missing Integrity Protection] +05:44:45.568 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiQnc3NVR4MzViUkR2WG9sXzZheW9XZmwwNkdKcWRfX3JMaVgtLVQ5WFJrNCIsInkiOiJQaHNpZ0d0QzVWNmVDa01pODY1WHFzcUFQLW40X1F4bGNKcDQ5R3pjQ3RnIiwiY3J2IjoiUC0yNTYifX0.xJtafwiUr1Gp-hHy5LkM9EXeXL5vOTFP0uly9ywQ0a0ZiGz3BPoIlqBvDFVQoG2KbDFghWCtxhQi6qqZT_F29z4iecH8s0O3.Br16Ccz3-hRYRaKZSdu4uw.K258Zy0_tbuujcp7Et6dG92YJFayEJLznh-t4b4k9dh1r-neefLFgX6CWJg9RN_jb4MwmUWDiS02maeRmqHUyA.QOHs0TUfv69QBFhzwsega1lH2iGIJcIc89arVurfxCU Additional details: [[20] Missing Integrity Protection] +05:44:45.578 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoicWUtWVh5RF81TGFfTjEzbFB1U2FwRlAxMERjNGNVVktHYlFaejhsOTV3ZyIsInkiOiJERTBiNzRCb1FYTU0yeDJHeHl2MC1mU29DM3p0M0ZDcm41TzF0dVd3M1kwIiwiY3J2IjoiUC0yNTYifX0.hgv0oWf9WK7lLqmRKPcXb7WyS8ALJkJui3W3jlLV5UkZonWYC_xITNKNUO2inG83Rthtg7bLI5Q.pmeI2gjtvzwAvSD1HIsqIg.60lz5XYkspfLyJAJ1xIKhdbewhi7-MdPxTvsmxcVle1ne5kdH6EzWBcKHSjWw6Ls7VNVTU2KmLd6FB4_ObVnBw.RZNv2smksGDD5CwFe3_rKcHV3c_1xjS7 Additional details: [[20] Missing Integrity Protection] +05:44:45.592 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJyMi1iIn0.SMfQSlXjFuDdarADXc3QvR0w-do0Imb7gNnU-d9ui5xfZOvdVJpb8AqgxWdo8YgOPsWUdsQs6MR6UrYb6pIbFtZl32z0MXbu2cQVwkVwvkj-yoX7dVUctXhus-Qv9CKBJLix1NcvgsxEDNFCFJqi0xDxlAjueXIKMbTR3HJgFq827KmzjidjNGm2iTQOJQVMJ7hJGeF8E828zi4U8XwAVHF1qaMH8kQqPHGzo4Ccjj8a9bc8hM-sAwg_McOSEXCO61loGL0NrCWHXt-5fGsn0jYLu1xzvOimqoRouOKmFNoYzonmL5hjyx4Un8Cs7G7Gmu5IBkDcycWrTgfnJJLu9g.YaRNS__bJ4UpN7oxTQTGeA.bkYQReUq16mKFj8FvE1CJitXq1IPzfYGX_yLFYw_bpVpJEaBm8R3AXNKEWQoiTqX9xU7kK0jLK7CFglGYAQ9KA.1XSoFnGjjviKQm9vnJtMww Additional details: [[20] Missing Integrity Protection] +05:44:45.596 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJraWQiOiJyMi1iIn0.nrmunnPYvPRBcUE6NS9fULWF9payiRr42a68Mc6i4Ts5GMWVgQ0hxAg7sD5REdXPOXzmrjPqVo2WzF_FNr8aSSmjyTzOz6QAN1GMZ_mUiAZdxho67m0a_0Qc-1zjmNPOkinq2XepnZssRKwiEpfsDTrCN1hRn9igO0bmKXPcdkQaRcv0MHY-KM5SVd-zCpz9rhdj2ogLLOyQIasQOA4XVZ-AWBBFVAoKaLiusy7HOnehC_Dvr-CQsS99AT9Y2e0rUMBNIEX_f4YCJnHJAda6qwSJ2L1fgGq3Cu_D4xJ5CgU_Lvvj_MKwwgwLx0xC23UzffRN-ym4YBly4pSAR-ztIQ.w0nZdau58LbzCng8AVJsyA.S6iimywcFOLyRKSS5TKkMYbL-R7kmMr5ugCly1MCWtX4qPu6ASxJHiSe1Z8F_9ME14ZJrINY-EIO7e-uEwVtWQ.MdHxH8EuInHfXd0HXJlLoBXzOEmiyahY Additional details: [[20] Missing Integrity Protection] +05:44:45.601 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJraWQiOiJyMi1iIn0.i7mBIeAsnrEbNcP0YP5d5nc7mapxeN0NSuZSeNS09_XCPQ3EF--xo5BwvfG605_Tw2XJ3JUvg07-Q4apbWacVCUujF6xHy-Fy-zCiyTjObWfTHpofBp_O1zwp4cbrV8ObIeVKJWyEgKK0PSylDHoMgb6SEC3y1jIHrhZIFK_9jlnCPWvMneBKVHGLbWdw4NeoqVwKGcU3oA8AWevheMHLEBLieCWXCDJEC2n2MTut8oIbJq_iRurlifdPbktzqkA-9eUyOPP9T6s7Vvp7Y6sPRIChTNcV-r6z4sBHhDs-zVn-goG26KaKOyiTmuQDEteaXwTMTq6wszH8EAFtqZaEw.cpRt-Wk1DTEmR0R-Tgn-hA.oqSe-kjLCoMUrKhnLHurWiHqx_0Mh5hyVoj-IF6IY-bE1rLFSpe6OYqS1WNG95awR7s8thUCcAHCLJM97-px4w.sLikDBuMtVls4OalU6jEx6-OLJXGPY9IBR0869i-Eug Additional details: [[20] Missing Integrity Protection] +05:44:45.602 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"HS256","kid":"r2"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec5, x=AdjvepE-CSgn25rd5twdcg7ZYWfZg6pcnM9c0v5Mk3YXqC1K6W4aeBBTl3Jv2MXb1RnjkRpIG51k788H69cMpSPq, y=AdLDQw0N52lXNPFkbnq2FksFfNivHSXoU4lT0Sd3xB5vMDhA2ZZ8PmLWxDcUoCyxwqAtUZ8NMCT5_IvDmRJRfdT3, crv=P-521}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=512bits}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec2, x=N_Ve0CQ2xuJ58pfvpRVZywZwY3dU8HhBbt8riWsdFl4, y=4vQ-ZfGv1vxyH4coLapJQVWYeA538YXaw2rcHsYrfBM, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, n=z6FJvVtmtZm_USQhOSCW-FekYglmLQVcyw0hgkyaFO6hCLJtjD-9TBNpzVw3lFWQuK8w52_l-rR2qBjFmwH1yn9lvKJWDMLM7fREtrASYo1iHDnBU-_WK7tZEFqhLa6cra3aU2FBuahTYx3vuo9DW87HNSKepHaf98NevuU1iCDymakny5ieIMMZWW8yUXxEIuL7UaK8L0MUBoi12RjBId9Bx-qIXpmQPkbX1bdfzWt6e5ubvIpB-XgFPh145XPvzsRj2XZD_TPv1S64hBM1aGO3IubL6JBAA7EYYdyInWavih1Ai5ccRCqxmOo1zwMfgV2A6D1UxtlGykrCVmA3rw, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec3, x=N5DwxMbx8dvTqVKg-aGu908vJTstXTyFWBKi7rDQ1Y3HUSq_Kusj6IAoS5fPzptE, y=IegaOXkkSx_l8NdKn46iuzU86VQ6-U-lCau5uCNSBDP6YTrZfauikwNfCE1lrrQm, crv=P-384}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=128bits}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2-b, n=tFoCJt8LTjQu2fM2CcLmnN1bmPc_7GFUCU1KXRJIgbKtmHgNk8HbDIX6Hq3lbyoGewxiEyjahrm3kM8GFOf45ByvoynyJIniP3W1BASeuf9kGJm5aHEpnlmC4-a0rJTkVwZzS6Gg2YFylKvkIMLwA0ohcZeVtaP0zAxoj-uyoeFgM-HF9cqppw5rpV21M1_TDw_zrq3EIbSve4ahCU5O_amd2RJ9p5NVNxbk07DHG9l0GfBTzF6cFbeILxanIzHEzoQVSOzRIdU-mfiD8N3YMqtm5aB_Sn08s9_mCwyCgYiPpclNnwSxRErq2pb2CB6xj7R4fuoO9Jh5_N3DyxaIIw, e=AQAB}]): JsonWebSignature{"alg":"HS256","kid":"r2"}->eyJhbGciOiJIUzI1NiIsImtpZCI6InIyIn0.eyJhdWQiOiJhIiwiaXNzIjoiaSIsImV4cCI6MTc0OTQ0ODQ4NSwic3ViIjoicyJ9.n706WJDU9pzuiOvW6LnEQPNCC3hTF2KY5EzMrDXuUvI] +05:44:45.603 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoicjItYiJ9.nxsvautZesCoTBXJmI139FoVVvKKz5xXvxXzeFwchWiAH8cbSYB0veEj4uzjX6SDuCYtqgZFUwrPNtiXX5rX0kfBExwn65odYPrsvKwhmf8xMo7odbEk9YPJDRN0PjZkaLUNYkqtVOs8iV9LlyowrYjWgegCHvO_xQyLR46p1MQn8Jv84PjNO3cN7FQQ0kaR4gEokh4twGhHuJndYdpU-UTI61SQ5refzp91IO_6PTQq-n9H5YaNegmvOxSGCat6DMXr0tsHS4jhm5pAcHQb1TmJXswGv0_kfhtBB94oOVUBmNQ0J9-i-xakv_0T4JArUP1wcqNN6yZQneZa0SucUA.zr_s3o0Lcm1GNJqrhVr8iA.rjLzE9Yi6A0NMBBsk7ZAMOWh50X_mRyz1F4HQCemeQKyr_aiAY5e1KyZMQruyZgpGIg_uG76H4w4mkD4XyBVgg.5DHoteNh_KtbkmBUMlJBtw] +05:44:45.606 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoicjItYiJ9.nxsvautZesCoTBXJmI139FoVVvKKz5xXvxXzeFwchWiAH8cbSYB0veEj4uzjX6SDuCYtqgZFUwrPNtiXX5rX0kfBExwn65odYPrsvKwhmf8xMo7odbEk9YPJDRN0PjZkaLUNYkqtVOs8iV9LlyowrYjWgegCHvO_xQyLR46p1MQn8Jv84PjNO3cN7FQQ0kaR4gEokh4twGhHuJndYdpU-UTI61SQ5refzp91IO_6PTQq-n9H5YaNegmvOxSGCat6DMXr0tsHS4jhm5pAcHQb1TmJXswGv0_kfhtBB94oOVUBmNQ0J9-i-xakv_0T4JArUP1wcqNN6yZQneZa0SucUA.zr_s3o0Lcm1GNJqrhVr8iA.rjLzE9Yi6A0NMBBsk7ZAMOWh50X_mRyz1F4HQCemeQKyr_aiAY5e1KyZMQruyZgpGIg_uG76H4w4mkD4XyBVgg.5DHoteNh_KtbkmBUMlJBtw Additional details: [[20] Missing Integrity Protection] +05:44:45.613 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no encryption but the JWT Consumer is configured to require it: eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk Additional details: [[19] No encryption.] +05:44:45.613 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no encryption but the JWT Consumer is configured to require it: eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk Additional details: [[19] No encryption.] +05:44:45.614 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value.] +05:44:45.614 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] doesn't contain an acceptable identifier. Expected example.org as an aud value.] +05:44:45.614 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] doesn't contain an acceptable identifier. Expected one of [example.org, nada, nope] as an aud value.] +05:44:45.614 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[7] No Audience (aud) claim present.] +05:44:45.614 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[7] No Audience (aud) claim present.] +05:44:45.614 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", "usa.org", "ca.ca"]}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com, usa.org, ca.ca] doesn't contain an acceptable identifier. Expected example.org as an aud value.] +05:44:45.614 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", "usa.org", "ca.ca"]}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com, usa.org, ca.ca] doesn't contain an acceptable identifier. Expected one of [example.org, some.other.junk] as an aud value.] +05:44:45.615 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", 47, false]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The array value of the 'aud' claim contains non string values (47 - class java.lang.Long cannot be cast to class java.lang.String (java.lang.Long and java.lang.String are in module java.base of loader 'bootstrap'))] +05:44:45.615 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":20475}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'aud' claim is not an array of strings or a single string value.] +05:44:45.615 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":{"aud":"example.org"}}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'aud' claim is not an array of strings or a single string value.] +05:44:45.617 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.JwtConsumerTest$4: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:911); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4310); org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:905); ...omitted...] +05:44:45.617 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.JwtConsumerTest$4: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:911); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4310); org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:905); ...omitted...] +05:44:45.618 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"name":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[14] No Subject (sub) claim is present.] +05:44:45.618 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":724729}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'sub' claim is not the expected type (724729 - Cannot cast java.lang.Long to java.lang.String)] +05:44:45.619 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":{"values":["one", "2"]}}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'sub' claim is not the expected type ({values=[one, 2]} - Cannot cast org.jose4j.json.JsonUtil$DupeKeyDisallowingLinkedHashMap to java.lang.String)] +05:44:45.625 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits).): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJhY2MiLCJjdHkiOiJKV1QifQ.KrukndaF2sHb3Y0r311rrYmCrXco-99ZIQ3iLjvCVbbow5MppRTK4DPJUShcndfcIVIFXMYSLGvIJwf39yZRJJ_EvBFnqhOUeCAsUHLGO1yxoQ619jmSh4bCaIicLYeivKaVSQN4Ezc5fvg-Nnv6TBIIgHuWMDU2Ztd96DJRokc.wMg2Eb8izCOUnACqdrcPQA.quFKSN7xQoMJzaYFBVwykQZ8zB3hpW8HtK7pm-4Ggzorno_K-eBQ7fXjRmJ1Jw-kCcmUa8flpnQqpL9jurtlz7DC1ABe0vm2ZkHoJluB6QeSr60Y9rP7kyy_rd3blXT_7t6Wgowo8MumXrrUUxxEQJgXvCmKbd-Rw9sK5jAHEug3zztLXHOX0O0QoxDzTJOsSRtodsu7bTJa-ADvPmK9e0Xp06NRqvx7WuJGKlq3cwQ.DL6yaCdiOUcViN-eZVIwOA] +05:44:45.689 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1749447825,"sub":"s","nbf":1749447705}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1749447885 -> Jun 9, 2025, 5:44:45 AM GMT} is on or after the Expiration Time (exp=NumericDate{1749447825 -> Jun 9, 2025, 5:43:45 AM GMT}) claim value.] +05:44:45.690 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1749447825,"sub":"s"}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1749447885 -> Jun 9, 2025, 5:44:45 AM GMT} is on or after the Expiration Time (exp=NumericDate{1749447825 -> Jun 9, 2025, 5:43:45 AM GMT}) claim value.] +05:44:45.691 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1749449085,"sub":"s","nbf":1749448125}) rejected due to invalid claims or other invalid content. Additional details: [[6] The JWT is not yet valid as the evaluation time NumericDate{1749447885 -> Jun 9, 2025, 5:44:45 AM GMT} is before the Not Before (nbf=NumericDate{1749448125 -> Jun 9, 2025, 5:48:45 AM GMT}) claim time.] +05:44:45.692 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 128 bits): JsonWebSignature{"kid":"esc","alg":"HS256"}->eyJraWQiOiJlc2MiLCJhbGciOiJIUzI1NiJ9.eyJhdWQiOiJhIiwiaXNzIjoiaSIsImV4cCI6MTQzMjMyNTQ5Niwic3ViIjoicyIsIm5iZiI6MTQzMjMyNDgzNn0.16LpzAZyBcokZ4aUaXHn5yN0xQ1zpmLyJVFHu6nH1zY] +05:44:45.698 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] 9223372036854775808 is unreasonable for a NumericDate] +05:44:45.704 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":25113002000004770000,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] 25113002000004770000 is unreasonable for a NumericDate] +05:44:45.710 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775809,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] -9223372036854775809 is unreasonable for a NumericDate] +05:44:45.716 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-77261600013501300000000,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] -77261600013501300000000 is unreasonable for a NumericDate] +05:44:45.722 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{9223372036854775807} is more than 2147483647 second(s) ahead of now NumericDate{9223372036854775 -> Aug 17, 292278994, 7:12:55 AM GMT}.] +05:44:45.734 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775 = 9214148664817921033 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] +05:44:45.745 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775807 = 1 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] +05:44:45.756 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775807 = 1 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] +05:44:45.763 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{9223372036854775807} is more than 10 second(s) ahead of now NumericDate{0 -> Jan 1, 1970, 12:00:00 AM GMT} (even when providing 2147483647 seconds of leeway to account for clock skew).] +05:44:45.770 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 2147483647 = 9223372034707292161 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] +05:44:45.832 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[-76717] You can go blind issuing tokens to yourself...] +05:44:45.833 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[-76717] You can go blind issuing tokens to yourself...] +05:44:45.843 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1749447825,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1749447885 -> Jun 9, 2025, 5:44:45 AM GMT} is on or after the Expiration Time (exp=NumericDate{1749447825 -> Jun 9, 2025, 5:43:45 AM GMT}) claim value.] +05:44:45.846 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[15] Subject (sub) claim value (d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea) doesn't match expected value of NOOOOOOOOOOOOOOOOPE] +05:44:45.847 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [R-RufjSDVGCGfdTmIobf2Q] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value.] +05:44:45.848 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [R-RufjSDVGCGfdTmIobf2Q] doesn't contain an acceptable identifier. Expected one of [no, nope, no way jose] as an aud value.] +05:44:45.849 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject", "iss":"issuer", "aud":"audience"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [audience] doesn't contain an acceptable identifier. Expected nope as an aud value., [12] Issuer (iss) claim value (issuer) doesn't match expected value of no way, [13] The JWT ID (jti) claim is not present.] +05:44:45.857 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1749448485,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [AUD] doesn't contain an acceptable identifier. Expected nope as an aud value.] +05:44:45.858 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1749448485,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (ISS) doesn't match expected value of no way] +05:44:45.859 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1749448485,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [AUD] doesn't contain an acceptable identifier. Expected nope as an aud value., [12] Issuer (iss) claim value (ISS) doesn't match expected value of no way, [5] The Expiration Time (exp=NumericDate{1749448485 -> Jun 9, 2025, 5:54:45 AM GMT}) claim value cannot be more than 5 minutes in the future relative to the evaluation time NumericDate{1749447885 -> Jun 9, 2025, 5:44:45 AM GMT}.] +05:44:45.860 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJleHAiOjE3NDk0NDg0ODUsImlzcyI6IklTUyIsImF1ZCI6IkFVRCIsInN1YiI6IlNVQiJ9.NGns23fwIfHwxj0tDsFcFuzrlZYopHMWm5gaUzZyNdAwfLU3n_idriThNBjcA2Y68-3cw6IJs9sGmPlNVmXOtEG5n5DrjjmMLCpoeBvLmKW_sCPM35Dx62ZCoi4_QlfZvOVoSfzR9i7_9QwAmpRiPYBFLC3SVH2exH3Cr3FKIKqADeOf3yo86w22JaftSRcpA0I1wVOGvCvrw2EfO1nFuhl5g7Wp1Jl1aRnmYPo9v656Dq_zfmdNY8W9yGeuNXnpPTx4gXeQ2GbXS95vBzansM769TPtNaEC_kaQxzYMdPmc1MkAwqFcw6RQ6Qfv4JUwKs19XGwAuWLN8vT6djTODw] +05:44:45.869 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.X51GhtnU4u4_1alqWDhWKfs64Sb1t0PYHlDeLcT-pGQk3h6Q6Ve8aom-9p7mHNtV3_a968nw0MEUWP-zN1nmWXuKc0xVMl0vSBc0mK8ynzJpb6_AYH8y9DKqXqQs82Qw7BbaHzEoJTS2YO4auzmEZ4kdjPqaGD96nWZg9GBmuqv1bmBK96KtW5wwRAPBR-WZQwS1NYbIa1ycQSlu30rN4gLhGkqjJ0fHK3_Sz2mwPy5ZA-_dHcqTv_NsFiUsEUPyRsJocQJYS4w-OF7pT6sIZlexYKLYWrAWgZIy7U_3ikuKACn1QusKn3STArYp8NYjw8EtME8Llm3J82lRcDnRXQ.GFvm0dCvMdXa2yA0pFoH0Q.LtHWZbev5gXkx4OLGadIZP304buUG0zch0eO42nr1IW8AWYwHW2vzYT63rb6U64-vsm0NPXcMjDqJ9SL4sVLwA.KbJbgjSOW8fmnaE7fH6cmg Additional details: [[10] Missing signature.] +05:44:45.871 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[17] You can go blind issuing tokens to yourself...] +05:44:45.871 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[17] You can go blind issuing tokens to yourself...] +05:44:45.883 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":-1239223372036854775808,"iat":1571322100,"exp":9223372036854775807,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] -1239223372036854775808 is unreasonable for a NumericDate] +05:44:45.888 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":1571322100,"iat":12345678900000000000,"exp":12345678900000000009,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] 12345678900000000009 is unreasonable for a NumericDate] +05:44:45.895 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":1571322100,"iat":1571322111,"exp":157132210009188371766311111,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] 157132210009188371766311111 is unreasonable for a NumericDate] +05:44:45.900 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{9223372036854775807}) claim value cannot be more than 2147483647 minutes in the future relative to the evaluation time NumericDate{9223371903710789693} (even when providing 2147483647 seconds of leeway to account for clock skew).] +05:44:45.906 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":-1,"exp":9223372036854775802,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow adding: 9223372036854775792 + 30 = -9223372036854775794 at org.jose4j.lang.Maths.add(Maths.java:13); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:143); ...omitted...] +05:44:45.911 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1572322100,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854774808 - 6000 = 9223372036854770808 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:113); ...omitted...] +05:44:45.917 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":-9223372036854775798,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775798 - 65 = 9223372036854775753 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:131); ...omitted...] +05:44:45.923 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: 9223372036854775807 - -10 = -9223372036854775799 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:131); ...omitted...] +05:44:45.924 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=QsGX3JhHP1Pwy4zQ8Ha9FQ): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..zWNzKpA-QA0BboVl02nz-A.eyJpc3MiOiJtZSIsImF1ZCI6Im1lIiwiZXhwIjoxNDIwMjMxNjA2LCJuYW1lIjoidmFsdWUifQ.QsGX3JhHP1Pwy4zQ8Ha9FQ] +05:44:45.924 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=QsGX3JhHP1Pwy4zQ8Ha9FQ): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..zWNzKpA-QA0BboVl02nz-A.u1D7JCpDFeRl69G1L-h3IRrmcOXiWLnhr23ugO2kkDqKVNcO1YQ4Xvl9Sag4aYOnkqUbqe6Wdz8KK3d9q178tA.QsGX3JhHP1Pwy4zQ8Ha9FQ] +05:44:45.932 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: The key must not be null.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.g_hEwksO1Ax8Qn7HoN-BVeBoa8FXe0kpyk_XdcSmxvcM5_P296JXXtoHISr_DD_MqewaQSH4dZOQHoUgKLeFly-9RI11TG-_Ge1bZFazBPwKC5lJ6OLANLMd0QSL4fYEb9ERe-epKYE3xb2jfY1AltHqBO-PM6j23Guj2yDKnFv6WO72tteVzm_2n17SBFvhDuR9a2nHTE67pe0XGBUS_TK7ecA-iVq5COeVdJR4U4VZGGlxRGPLRHvolVLEHx6DYyLpw30Ay9R6d68YCLi9FYTq3hIXPK_-dmPlOUlKvPr1GgJzRoeC9G5qCvdcHWsqJGTO_z3Wfo5zsqwkxruxwA.UmVkbW9uZCBXQSA5ODA1Mg.VwHERHPvCNcHHpTjkoigx3_ExK0Qc71RMEParpatm0X_qpg-w8kozSjfNIPPXiTBBLXR65CIPkFqz4l1Ae9w_uowKiwyi9acgVztAi-pSL8GQSXnaamh9kX1mdh3M_TT-FZGQFQsFhu0Z72gJKGdfGE-OE7hS1zuBD5oEUfk0Dmb0VzWEzpxxiSSBbBAzP10l56pPfAtrjEYw-7ygeMkwBl6Z_mLS6w6xUgKlvW6ULmkV-uLC4FUiyKECK4e3WZYKw1bpgIqGYsw2v_grHjszJZ-_I5uM-9RA8ycX9KqPRp9gc6pXmoU_-27ATs9XCvrZXUtK2902AUzqpeEUJYjWWxSNsS-r1TJ1I-FMJ4XyAiGrfmo9hQPcNBYxPz3GQb28Y5CLSQfNgKSGt0A4isp1hBUXBHAndgtcslt7ZoQJaKe_nNJgNliWtWpJ_ebuOpEl8jdhehdccnRMIwAmU1n7SPkmhIl1HlSOpvcvDfhUN5wuqU955vOBvfkBOh5A11UzBuo2WlgZ6hYi9-e3w29bR0C2-pp3jbqxEDw3iWaf2dc5b-LnR0FEYXvI_tYk5rd_J9N0mg0tQ6RbpxNEMNoA9QWk5lgdPvbh9BaO195abQ.AVO9iT5AV4CzvDJCdhSFlQ] +05:44:45.936 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidKeyException: Key cannot be null): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.cC4hiUPoj9Eetdgtv3hF80EGrhuB__dzERat0XF9g2VtQgr9PJbu3XOiZj5RZmh7AAuHIm4Bh-0Qc_lF5YKt_O8W2Fp5jujGbds9uJdbF9CUAr7t1dnZcAcQjbKBYNX4BAynRFdiuB--f_nZLgrnbyTyWzO75vRK5h6xBArLIARNPvkSjtQBMHlb1L07Qe7K0GarZRmB_eSN9383LcOLn6_dO--xi12jzDwusC-eOkHWEsqtFZESc6BfI7noOPqvhJ1phCnvWh6IeYI2w9QOYEUipUTI8np6LbgGY9Fs98rqVt5AXLIhWkWywlVmtVrBp0igcN_IoypGlUPQGe77Rw] +05:44:45.936 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidKeyException: Key cannot be null): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.cC4hiUPoj9Eetdgtv3hF80EGrhuB__dzERat0XF9g2VtQgr9PJbu3XOiZj5RZmh7AAuHIm4Bh-0Qc_lF5YKt_O8W2Fp5jujGbds9uJdbF9CUAr7t1dnZcAcQjbKBYNX4BAynRFdiuB--f_nZLgrnbyTyWzO75vRK5h6xBArLIARNPvkSjtQBMHlb1L07Qe7K0GarZRmB_eSN9383LcOLn6_dO--xi12jzDwusC-eOkHWEsqtFZESc6BfI7noOPqvhJ1phCnvWh6IeYI2w9QOYEUipUTI8np6LbgGY9Fs98rqVt5AXLIhWkWywlVmtVrBp0igcN_IoypGlUPQGe77Rw] +05:44:45.940 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.cC4hiUPoj9Eetdgtv3hF80EGrhuB__dzERat0XF9g2VtQgr9PJbu3XOiZj5RZmh7AAuHIm4Bh-0Qc_lF5YKt_O8W2Fp5jujGbds9uJdbF9CUAr7t1dnZcAcQjbKBYNX4BAynRFdiuB--f_nZLgrnbyTyWzO75vRK5h6xBArLIARNPvkSjtQBMHlb1L07Qe7K0GarZRmB_eSN9383LcOLn6_dO--xi12jzDwusC-eOkHWEsqtFZESc6BfI7noOPqvhJ1phCnvWh6IeYI2w9QOYEUipUTI8np6LbgGY9Fs98rqVt5AXLIhWkWywlVmtVrBp0igcN_IoypGlUPQGe77Rw] +05:44:45.940 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.cC4hiUPoj9Eetdgtv3hF80EGrhuB__dzERat0XF9g2VtQgr9PJbu3XOiZj5RZmh7AAuHIm4Bh-0Qc_lF5YKt_O8W2Fp5jujGbds9uJdbF9CUAr7t1dnZcAcQjbKBYNX4BAynRFdiuB--f_nZLgrnbyTyWzO75vRK5h6xBArLIARNPvkSjtQBMHlb1L07Qe7K0GarZRmB_eSN9383LcOLn6_dO--xi12jzDwusC-eOkHWEsqtFZESc6BfI7noOPqvhJ1phCnvWh6IeYI2w9QOYEUipUTI8np6LbgGY9Fs98rqVt5AXLIhWkWywlVmtVrBp0igcN_IoypGlUPQGe77Rw] +JWT Claims Set:{exp=1749448185, sub=subject, iss=issuer} +05:44:45.942 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[2] No Expiration Time (exp) claim present.] +05:44:45.942 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[3] No Issued At (iat) claim present.] +05:44:45.942 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[4] No Not Before (nbf) claim present.] +05:44:45.943 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602000 -> May 2, 2015, 9:26:40 PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40 PM GMT}) claim value.] +05:44:45.944 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42 PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40 PM GMT}) claim value.] +05:44:45.944 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42 PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40 PM GMT}) claim value (even when providing 1 seconds of leeway to account for clock skew).] +05:44:45.945 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42 PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40 PM GMT}) claim value (even when providing 2 seconds of leeway to account for clock skew).] +05:44:45.945 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602065 -> May 2, 2015, 9:27:45 PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40 PM GMT}) claim value.] +05:44:45.946 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602065 -> May 2, 2015, 9:27:45 PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40 PM GMT}) claim value (even when providing 60 seconds of leeway to account for clock skew).] +05:44:45.947 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[6] The JWT is not yet valid as the evaluation time NumericDate{1430601999 -> May 2, 2015, 9:26:39 PM GMT} is before the Not Before (nbf=NumericDate{1430602000 -> May 2, 2015, 9:26:40 PM GMT}) claim time.] +05:44:45.947 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430603000, "iat":1430602060, "exp":1430602600 }) rejected due to invalid claims or other invalid content. Additional details: [[17] The Expiration Time (exp=NumericDate{1430602600 -> May 2, 2015, 9:36:40 PM GMT}) claim value cannot be before the Not Before (nbf=NumericDate{1430603000 -> May 2, 2015, 9:43:20 PM GMT}) claim value.] +05:44:45.948 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430602000, "iat":1430602660, "exp":1430602600 }) rejected due to invalid claims or other invalid content. Additional details: [[17] The Expiration Time (exp=NumericDate{1430602600 -> May 2, 2015, 9:36:40 PM GMT}) claim value cannot be before the Issued At (iat=NumericDate{1430602660 -> May 2, 2015, 9:37:40 PM GMT}) claim value.] +05:44:45.948 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430607201}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{1430607201 -> May 2, 2015, 10:53:21 PM GMT}) claim value cannot be more than 90 minutes in the future relative to the evaluation time NumericDate{1430600000 -> May 2, 2015, 8:53:20 PM GMT}.] +05:44:45.949 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430607201}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{1430607201 -> May 2, 2015, 10:53:21 PM GMT}) claim value cannot be more than 120 minutes in the future relative to the evaluation time NumericDate{1430600000 -> May 2, 2015, 8:53:20 PM GMT}.] +05:44:45.950 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: This VerificationKeyResolver always throws this exception.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJzdWIiOiJtZSIsImV4cCI6MTc0OTQ0ODE4NSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.] +05:44:45.950 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJzdWIiOiJtZSIsImV4cCI6MTc0OTQ0ODE4NSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.] +05:44:45.973 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Can't do it!): JsonWebSignature{"typ":"JWT", + "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] +05:44:45.973 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Can't do it!): JsonWebSignature{"typ":"JWT", + "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] +05:44:45.974 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unexpected exception encountered while processing JOSE object (java.lang.IllegalArgumentException: Stuff happens...): JsonWebSignature{"typ":"JWT", + "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] +05:44:45.974 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unexpected exception encountered while processing JOSE object (java.lang.IllegalArgumentException: Stuff happens...): JsonWebSignature{"typ":"JWT", + "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] +05:44:45.975 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:854); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4310); org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:848); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...] +05:44:45.975 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:854); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4310); org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:848); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...] +05:44:45.984 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[10] Missing signature.] +05:44:45.984 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[10] Missing signature.] +05:44:45.992 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[20] Missing Integrity Protection] +05:44:45.992 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[20] Missing Integrity Protection] +05:44:46.011 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +05:44:46.012 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +05:44:46.012 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +05:44:46.012 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +05:44:46.012 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +05:44:46.012 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +05:44:46.012 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +05:44:46.012 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +05:44:46.013 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +05:44:46.013 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +05:44:46.013 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +05:44:46.013 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +05:44:46.013 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +05:44:46.013 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +05:44:46.029 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: Unable to parse what was expected to be the JWT Claim Set JSON: "eyJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MjAyMTkwOTcsIm1lc3NhZ2UiOiJlaCJ9.ADXjpouiqbRqymN-NJ84HjU0ZZUmAajlb43Vzb6yTolFU9dTAcL6XhBAy5cwlPaS_3VT4Ce2CMpgruihmaftHA" Additional details: [[16] Invalid JSON.] +JWT Claims Set:{sub=me, aud=a, iss=i, exp=1749448486} +eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJjdHkiOiJqd3QiLCJjcml0IjpbImZha2UuYmxhaCJdfQ.Qux1tnVhQGh9XO1m4hau92p4qvNnYucAvJ14MLSq2Ie5Tigd_TiD3q-plWOF_8Jvi2Tanj42IWpboTH4dvtqQWhbZPj1HlLFDXSOrrW3aOn44WgDwg96a9O1QT2ThhX8PTUJYq_6gdBXtmY9ycLcHF1Cux3KcbwpngLw7141kgOMbez9TZ84uXQ0Euun0Phy3dhAK3lWWrl0D4ZQjqmy9DrJs4gdu0YCPKSLPq2AI6xswASPDKf91uyfd-20f2lP_VwxgM39wsQ69sGHmG1z8WOUzOGfmy-vmNGuode5_-xRos6cZlVZOpHE9ianP4lcRlnOg72UmXm1zIQX6gaIDg.gaDeckzLNpARas6dPhZuog.fVFdTfeyrsBPjJn8bN2mzhlYOVwV8jcmLFdzVLQPG9pU4pKpiLZ6YpbxZa_tUr_2joBTSE0o5uEf-YENw2350nq0aICN4jWMhaOfGlSdpMMrm2Cj02W5nTv7eca-RUvdm_WDkrNbqkcN5b4oDpvO3Ho-ZCCyp12JmY0PXbhL9JPQbgp4D4yR_7lcOLsLxVSyzWZ8chHBPX_jCfxh2nWfuPtS-RnnQrQPFFnXV56OIYVnIIELGAsMPd9qEXWRKPpwKModiwlk9ytpi930GttLcQ.absgbhqOf0LBBFHdnSn8bQ +05:44:46.044 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: Unrecognized header 'fake.blah' marked as critical.): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJjdHkiOiJqd3QiLCJjcml0IjpbImZha2UuYmxhaCJdfQ.Qux1tnVhQGh9XO1m4hau92p4qvNnYucAvJ14MLSq2Ie5Tigd_TiD3q-plWOF_8Jvi2Tanj42IWpboTH4dvtqQWhbZPj1HlLFDXSOrrW3aOn44WgDwg96a9O1QT2ThhX8PTUJYq_6gdBXtmY9ycLcHF1Cux3KcbwpngLw7141kgOMbez9TZ84uXQ0Euun0Phy3dhAK3lWWrl0D4ZQjqmy9DrJs4gdu0YCPKSLPq2AI6xswASPDKf91uyfd-20f2lP_VwxgM39wsQ69sGHmG1z8WOUzOGfmy-vmNGuode5_-xRos6cZlVZOpHE9ianP4lcRlnOg72UmXm1zIQX6gaIDg.gaDeckzLNpARas6dPhZuog.fVFdTfeyrsBPjJn8bN2mzhlYOVwV8jcmLFdzVLQPG9pU4pKpiLZ6YpbxZa_tUr_2joBTSE0o5uEf-YENw2350nq0aICN4jWMhaOfGlSdpMMrm2Cj02W5nTv7eca-RUvdm_WDkrNbqkcN5b4oDpvO3Ho-ZCCyp12JmY0PXbhL9JPQbgp4D4yR_7lcOLsLxVSyzWZ8chHBPX_jCfxh2nWfuPtS-RnnQrQPFFnXV56OIYVnIIELGAsMPd9qEXWRKPpwKModiwlk9ytpi930GttLcQ.absgbhqOf0LBBFHdnSn8bQ] +05:44:46.061 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1432327195,"sub":"s","nbf":1432326535}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [a] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value., [1] The JWT is no longer valid - the evaluation time NumericDate{1749447886 -> Jun 9, 2025, 5:44:46 AM GMT} is on or after the Expiration Time (exp=NumericDate{1432327195 -> May 22, 2015, 8:39:55 PM GMT}) claim value.] +05:44:46.062 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1432327195,"sub":"s","nbf":1432326535}) rejected due to invalid claims or other invalid content. Additional details: [[17] i isn't okay as an issuer] +05:44:46.063 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notjti":"lbZ_mLS6w3xBSlvW6ULmkV-uLCk"}) rejected due to invalid claims or other invalid content. Additional details: [[13] The JWT ID (jti) claim is not present.] +05:44:46.063 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"jti":55581529751992}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'jti' claim is not the expected type (55581529751992 - Cannot cast java.lang.Long to java.lang.String)] +05:44:46.063 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"jti":["S0w3XbslvW6ULmk0", "5iLSQfNgcSGt7A4is"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'jti' claim is not the expected type ([S0w3XbslvW6ULmk0, 5iLSQfNgcSGt7A4is] - Cannot cast java.util.ArrayList to java.lang.String)] +05:44:46.082 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1749448486,"nbf":1749447586,"jti":"AgO7beDlujF7l_6a2CGr7g"}) rejected due to invalid claims or other invalid content. Additional details: [[21] No typ header parameter present in the innermost JWS/JWE] +05:44:46.099 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1749448486,"nbf":1749447586,"jti":"AgO7beDlujF7l_6a2CGr7g"}) rejected due to invalid claims or other invalid content. Additional details: [[21] No typ header parameter present in the innermost JWS/JWE] +05:44:46.123 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1749448486,"nbf":1749447586,"jti":"AgO7beDlujF7l_6a2CGr7g"}) rejected due to invalid claims or other invalid content. Additional details: [[22] Invalid typ header parameter value 'at+jwt'. Expecting 'application/secevent+jwt' or just 'secevent+jwt'.] +05:44:46.137 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1749448486,"nbf":1749447586,"jti":"AgO7beDlujF7l_6a2CGr7g"}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.TypeValidator: java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.lang.String (java.util.ArrayList and java.lang.String are in module java.base of loader 'bootstrap') at org.jose4j.lang.JsonHelp.getString(JsonHelp.java:31); org.jose4j.jwx.Headers.getStringHeaderValue(Headers.java:78); org.jose4j.jwx.JsonWebStructure.getHeader(JsonWebStructure.java:148); org.jose4j.jwt.consumer.TypeValidator.validate(TypeValidator.java:37); ...omitted...] +05:44:46.142 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1749448486,"nbf":1749447586,"jti":"AgO7beDlujF7l_6a2CGr7g"}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.TypeValidator: java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.lang.String (java.util.ArrayList and java.lang.String are in module java.base of loader 'bootstrap') at org.jose4j.lang.JsonHelp.getString(JsonHelp.java:31); org.jose4j.jwx.Headers.getStringHeaderValue(Headers.java:78); org.jose4j.jwx.JsonWebStructure.getHeader(JsonWebStructure.java:148); org.jose4j.jwt.consumer.TypeValidator.validate(TypeValidator.java:37); ...omitted...] +05:44:46.155 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1749448486,"nbf":1749447586,"jti":"AgO7beDlujF7l_6a2CGr7g"}) rejected due to invalid claims or other invalid content. Additional details: [[22] typ header parameter value '' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: cannot have empty part] +05:44:46.159 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1749448486,"nbf":1749447586,"jti":"AgO7beDlujF7l_6a2CGr7g"}) rejected due to invalid claims or other invalid content. Additional details: [[22] typ header parameter value '' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: cannot have empty part] +[INFO] Tests run: 48, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.164 s - in org.jose4j.jwt.consumer.JwtConsumerTest +[INFO] Running org.jose4j.jwt.consumer.TypeValidatorTest +05:44:46.161 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.161 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.161 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.161 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.161 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.161 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.161 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.162 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.162 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.162 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.162 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.162 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.162 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.162 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.162 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.162 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.162 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.162 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.162 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.162 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.162 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.162 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.162 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.162 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.162 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.162 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.162 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.162 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.162 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.162 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.162 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.163 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.163 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.163 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.163 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.163 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.163 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.163 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.163 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.163 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.163 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.163 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.165 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.165 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.165 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.165 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.165 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.165 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.165 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.165 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.165 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.165 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.165 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.165 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.165 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.165 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +05:44:46.165 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type 'application/noway)' isn't a valid media type in this context. +05:44:46.165 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '/' isn't a valid media type in this context. +05:44:46.165 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '/dpop+jwt' isn't a valid media type in this context. +05:44:46.165 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '' isn't a valid media type in this context. +05:44:46.165 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type +05:44:46.166 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type +05:44:46.166 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type +05:44:46.166 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.166 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.166 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.166 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.166 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.166 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.166 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.166 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.166 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +05:44:46.166 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +05:44:46.166 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE +05:44:46.166 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.166 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.166 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.166 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.166 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.166 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.166 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.166 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.166 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +05:44:46.166 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +05:44:46.166 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.166 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.166 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.168 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.168 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +05:44:46.168 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +05:44:46.168 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.168 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.168 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.172 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.172 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.172 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.172 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.176 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.176 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +05:44:46.176 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +05:44:46.176 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE +05:44:46.176 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.176 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.176 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.176 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.177 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.177 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.177 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.177 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +05:44:46.177 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +05:44:46.177 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.017 s - in org.jose4j.jwt.consumer.TypeValidatorTest +[INFO] Running org.jose4j.jwt.consumer.JwksVerificationKeyResolverUsingJwtConsumerTest +05:44:46.179 DEBUG o.j.j.c.JwksVerificationKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"HS512","kid":"nope"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=uno}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=two}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=trois}]): JsonWebSignature{"alg":"HS512","kid":"nope"}->eyJhbGciOiJIUzUxMiIsImtpZCI6Im5vcGUifQ.eyJpc3MiOiJGUk9NIiwiYXVkIjoiVE8iLCJleHAiOjE0MjQyMTg2NzksInN1YiI6IkFCT1VUIn0.lZOnt-l4wIUl667laxBjZgyTZsebfitsKT1yBrEQ-DognQiqEafQaVrFTaV3dJrZDvgDqAKL9FzxOHfdBg8NXw] +05:44:46.189 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.uIRIFrhftV39qJNOdaL8LwrK1prIJIHsP7Gn6jJAVbE2Mx4IkwGzBXDLKMulM1IvKElmSyK_KBg8afywcxoApA] +05:44:46.196 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.21eYfC_ZNf1FQ1Dtvj4rUiM9jYPgf1zJfeE_b2fclgu36KAN141ICqVjNxQqlK_7Wbct_FDxgyHvej_LEigb2Q] +05:44:46.203 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTEyNywiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.UE4B0IVPRip-3TDKhNAadCuj_Bf5PlEAn9K94Zd7mP25WNZwxDbQpDElZTZSp-3ngPqQyPGj27emYRHhOnFSAQ] +05:44:46.204 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES384"}->eyJhbGciOiJFUzM4NCJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTIzMSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.NyRtG_eFmMLQ0XkW5kvdSpzYsm6P5M3U8EBFKIhD-jw8E7FOYw9PZ3_o1PWuLWH3XeArZMW7-bAIVxo2bHqJsSUtB6Tf0NWPtCpUF2c1vbuRXEXkGrCUmc4sKyOBjimC] +05:44:46.205 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.pgBu9S8g7MC2BN9YNlWD9JhjzWbQVjqpmErW4hMFncKD8bUidIbMBJSI3URXvnMJrLrAC5eB2gb6DccF_txQaqX1X81JbTSdQ44_P1W-1uIIkfIXUvM6OXv48W-CPm8xGuetQ1ayHgU_1ljtdkbdUHZ6irgaeIrFMgZX0Jdb9Eydnfhwvno2oGk3y6ruq2KgKABIdzgvJXfwdOFGn1z0CxwQSVDkFRLsMsBljTwfTd0v3G8OXT8WRMZMGVyAgtKVu3XJyrPNntVqrzdgQQma6S06Y9J9V9t0AlgEAn2B4TqMxYcu1Tjr7bBL_v83zEXhbdcFBYLfJg-LY5wE6rA-dA] +05:44:46.238 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTEyNywiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.UE4B0IVPRip-3TDKhNAadCuj_Bf5PlEAn9K94Zd7mP25WNZwxDbQpDElZTZSp-3ngPqQyPGj27emYRHhOnFSAQ] +05:44:46.239 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES384"}->eyJhbGciOiJFUzM4NCJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTIzMSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.NyRtG_eFmMLQ0XkW5kvdSpzYsm6P5M3U8EBFKIhD-jw8E7FOYw9PZ3_o1PWuLWH3XeArZMW7-bAIVxo2bHqJsSUtB6Tf0NWPtCpUF2c1vbuRXEXkGrCUmc4sKyOBjimC] +05:44:46.245 DEBUG o.j.j.c.JwksVerificationKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"8a10l"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00r, use=sig, x=AZkOsR09YQeFcD6rhINHWAaAr8DMx9ndFzum50o5KLLUjqF7opKI7TxR5LP_4uUvG2jojF57xxWVwWi2otdETeI-, y=AadJxOSpjf_4VxRjTT_FdAtFX8Pw-CBpaoX-OQPPQ8o0kOrj5nzIltwnEORDldLFIkQQzgTXMzBnWyQurVHU5pUF, crv=P-521}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00q, use=sig, x=3n74sKXRbaBNw9qOGslnl-WcNCdC75cWo_UquiGUFKdDM3hudthywE5y0R6d2Li8, y=YbZ_0lregvTboKmUX7VE7eknQC1yETKUdHzt_YMX4zbTyOxgZL6A38AVfY8Q8HWd, crv=P-384}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00p, use=sig, x=S-EbFKVG-7pXjdgM9SPPw8rN3V8-2uX4bNg4y8R7EhA, y=KTtyNGz9B9_QrkFf7mP90YiH6F40fAYfqpzQh8HG7tc, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=8a00o, use=sig, n=kM-83p_Qaq-1FuxLHH6Y7jQeBT5MK9iHGB75Blnit8rMIcsns72Ls1uhEYiyB3_icK7ibLr2_AHiIl7MnJBY2cCquuwiTccDM5AYUccdypliSlVeAL0MBa_0xfpvBJw8fB45wX6kJKftbQI8xjvFhqSIuGNyQOzFXnJ_mCBOLv-6Nzn79qWxh47mQ7NJk2wSYdFDsz0NNGjBA2VQ9U6weqL1viZ1sbzXr-bJWCjjEYmKC5k0sjGGXJuvMPEqBY2q68kFXD3kiuslQ3tNS1j4d-IraadxpNVtedQ44-xM7MC-WFm2f5eO0LmJRzyipGNPkTer66q6MSEESguyhsoLNQ, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00n, use=sig, x=ADoTal4nAvVCgicprEBBFOzNKUKVJl1Ph8sISl3Z3tz7TJZlQB485LJ3xil-EmWvqW1-sKFl7dY2YtrGUZvjGp0O, y=AXVB58hIK7buMZmRgDU4hrGvcVQLXa-77_F755OKIkuWP5IJ6GdjFvaRHfIbbHMp-whqjmRrlwfYPN1xmyCGSzpT, crv=P-521}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00m, use=sig, x=5Y4xK9IBGJq5-E6QAVdpiqZb9Z-_tro_rX9TAUdWD3jiVS5N-blEnu5zWzoUoiJk, y=ZDFGBLBbiuvHLMOJ3DoOSRLU94uu5y3s03__HaaaLU04Efc4nGdY3vhTQ4kxEqVj, crv=P-384}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00l, use=sig, x=CWzKLukg4yQzi4oM-2m9M-ClxbU4e6P9G_HRn9A0edI, y=UB1OL_eziV6lA5J0PiAuzoKQU_YbXojbjh0sfxtVlOU, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=8a00k, use=sig, n=ux8LdF-7g3X1BlqglZUw36mqjd9P0JWfWxJYvR6pCFSyqLrETc-fL9_lTG3orohkGnEPe7G-BO65ldF44pYEe3eZzcEuEFtiO5W4_Jap1Z430vdYgC_nZtENIJDWlsGM9ev-cOld7By-8l3-wAyuspOKZijWtx6K57VLajyUHBSmbUtaeCwHQOGyMOV1V-cskbTO2u_HrLOLLkSv9oZrznAwpx_paFHy-aAsdFhb7EiBzwqqHQButo3aT3DsR69gbW_Nmrf6tfkril6B3ePKV4od_5jowa6V3765K6v2L4NER7fuZ2hJVbIc0eJXY8tL3NlkBnjnmQ8DBWQR81Ayhw, e=AQAB}]): JsonWebSignature{"alg":"ES256","kid":"8a10l"}->eyJhbGciOiJFUzI1NiIsImtpZCI6IjhhMTBsIn0.eyJzdWIiOiJoYWlsaWUiLCJhdWQiOiJhIiwianRpIjoiRmUwZ1h1UGpmcHoxSHEzdzRaaUZIQiIsImlzcyI6Imh0dHBzOlwvXC9sb2NhbGhvc3Q6OTAzMSIsImlhdCI6MTQyMTA5Mzg1OSwiZXhwIjoxNDIxMDk0NDU5LCJub25jZSI6ImZmcyIsImFjciI6InVybjpvYXNpczpuYW1lczp0YzpTQU1MOjIuMDphYzpjbGFzc2VzOlBhc3N3b3JkIiwiYXV0aF90aW1lIjoxNDIxMDkzMzc2fQ.gzJQZRErEHI_v6z6dZboTPzL7p9_wXrMJIWnYZFEENgq3E1InbrZuQM3wB-mJ5r33kwMibJY7Qi4y-jvk0IYqQ] +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.063 s - in org.jose4j.jwt.consumer.JwksVerificationKeyResolverUsingJwtConsumerTest +[INFO] Running org.jose4j.jwt.consumer.GoogsTooSmallKeyJwtConsumerTest +05:44:46.256 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits).): JsonWebSignature{"alg":"RS256","kid":"76fd32aec7e0f8c190dda8b9dd85e7cf5ad33c43"}->eyJhbGciOiJSUzI1NiIsImtpZCI6Ijc2ZmQzMmFlYzdlMGY4YzE5MGRkYThiOWRkODVlN2NmNWFkMzNjNDMifQ.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_aWQ9QUl0T2F3bGIxSEhFZFJJZW00d2Z1MXFNY1BUdWZvUDZzTi11ZVVrIiwiaWF0IjoxNDMxNjEyMjM4LCJleHAiOjE0MzE2MTU4Mzh9.RRMVpR9WJrkddegS4uKNT7rTov-LvRQ9sCtGo_SXrqkNbLZgArSJcmmHHxoQDsVWUjl2ZNG-7ZjDRuMu-POJLR4GHpwmQ8gttAEeywkiW4in5pUOb21AdgH29HDwG2mY6iVavsASHRutK747gURRlpt3wUJOJk00T9W2N0fVsTE] +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.008 s - in org.jose4j.jwt.consumer.GoogsTooSmallKeyJwtConsumerTest +[INFO] Running org.jose4j.jwt.consumer.JwksDecryptionKeyResolverUsingJwtConsumerTest +05:44:46.261 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=ZzPqPwbnaONKJtq1ftAl0g). +05:44:46.261 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=GkifB-BfSlVpFv-XZEODZQ). +05:44:46.262 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=GkifB-BfSlVpFv-XZEODZQ). +05:44:46.262 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=7EWW9Zi315LquVTKuoPAOQ). +05:44:46.262 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=7EWW9Zi315LquVTKuoPAOQ). +05:44:46.262 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=7EWW9Zi315LquVTKuoPAOQ). +05:44:46.263 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=Owjh2uZxY_Mm2ZYp2_SIJg). +05:44:46.263 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=Owjh2uZxY_Mm2ZYp2_SIJg). +05:44:46.263 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=Owjh2uZxY_Mm2ZYp2_SIJg). +05:44:46.263 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=Owjh2uZxY_Mm2ZYp2_SIJg). +05:44:46.263 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=jqZAKjJTwujBZkO3dpDEiw). +05:44:46.263 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=jqZAKjJTwujBZkO3dpDEiw). +05:44:46.263 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=jqZAKjJTwujBZkO3dpDEiw). +05:44:46.264 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=jqZAKjJTwujBZkO3dpDEiw). +05:44:46.264 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=5) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=jqZAKjJTwujBZkO3dpDEiw). +05:44:46.264 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=FeEJZei3tbSWyJmS_VaB5g). +05:44:46.264 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=FeEJZei3tbSWyJmS_VaB5g). +05:44:46.264 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=FeEJZei3tbSWyJmS_VaB5g). +05:44:46.265 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=FeEJZei3tbSWyJmS_VaB5g). +05:44:46.265 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=5) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=FeEJZei3tbSWyJmS_VaB5g). +05:44:46.265 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=6) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=FeEJZei3tbSWyJmS_VaB5g). +05:44:46.265 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256"} using attempted decryption to disambiguate from filtered candidate JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=1}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=2}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=3}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=4}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=5}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=6}]) selecting from keys: [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=1}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=2}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=3}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=4}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=5}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=6}]): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..ZNm21tFNAbGBZ6abjPBTrQ.Z1eFZfNb6m_DnooBHLWy3liSXcM8Rixee6AN14pRI8Y.FeEJZei3tbSWyJmS_VaB5g] +05:44:46.289 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=e1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch!; caused by: javax.crypto.AEADBadTagException: Tag mismatch!). +05:44:46.338 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:487); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:389); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... +05:44:46.338 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch!; caused by: javax.crypto.AEADBadTagException: Tag mismatch!). +05:44:46.350 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:487); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:389); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... +05:44:46.350 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch!; caused by: javax.crypto.AEADBadTagException: Tag mismatch!). +05:44:46.355 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:487); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:389); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... +05:44:46.355 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch!; caused by: javax.crypto.AEADBadTagException: Tag mismatch!). +05:44:46.378 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:487); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:389); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... +05:44:46.378 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch!; caused by: javax.crypto.AEADBadTagException: Tag mismatch!). +05:44:46.404 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:487); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:389); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... +05:44:46.405 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch!; caused by: javax.crypto.AEADBadTagException: Tag mismatch!). +05:44:46.413 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:487); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:389); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... +05:44:46.414 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch!; caused by: javax.crypto.AEADBadTagException: Tag mismatch!). +05:44:46.434 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:487); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:389); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... +05:44:46.435 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch!; caused by: javax.crypto.AEADBadTagException: Tag mismatch!). +05:44:46.443 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:487); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:389); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... +05:44:46.444 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch!; caused by: javax.crypto.AEADBadTagException: Tag mismatch!). +05:44:46.444 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Key is too long for unwrapping at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:472); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... +05:44:46.445 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch!; caused by: javax.crypto.AEADBadTagException: Tag mismatch!). +05:44:46.445 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Key is too long for unwrapping at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:472); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... +05:44:46.445 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch!; caused by: javax.crypto.AEADBadTagException: Tag mismatch!). +05:44:46.446 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"RSA-OAEP","enc":"A128GCM"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"RSA-OAEP","enc":"A128GCM"} using attempted decryption to disambiguate from filtered candidate JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e1, use=enc, x=zw4_6TARtwAsHFDw4Q1gr65t6BMl6lXOmmOMA3R0q58, y=O0Gb45b83A8FRe-DH_xJ4H0dsaQVskZMT_RBIKaSGOc, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r3, use=enc, n=pkTznDIyNrI9wvfoFqv3yZpHv5PBeSXxdvOIKtsrKTSXxgDqjfn3jS4CiZidUjW1TzwwkYRZYU3Ei-M7qecudUs1QFdoBUNyd7V_X-ueToD1K-JvQCCrb74bzQWHVfsb2bRfuLw3Tyw3JwnWU3Q-P7OP08INyitwFw9Oz5DvKovtuOyAh3-CT8eSXcPMy2LQTt7WW8h2YeMq1EvndAc67ohiz-q3u2Qqwbbyv-p237mL_90JLE4xMBnLNey4FDjtXbXIq8T8QbvGyn4Dc67ZxH4-izAxi_siA_3z0H7oTYRaeNL4JuNqhoB0R4CgThfofdGVGZVWPyyowzSI-7nxbMHYNNse96wDnbTTKC8pP-qDjExRYjzm4iNueaMzzcq3wAIpR5z2tZp1oULOo43R0kcXC51sKrenJWnqIaIj_WsENRAWWHsrh5IycgySWyytaGVgQHaeBagYJHzRcrhWk10e81M8oMtdPPL1MLS0bbU3CTpDcacr4KyAKAL8sVi7-M2UVqvtWkEZCJ9q1cgOFwcp0t8ZKOpw9OgVeyo-P8HoDpfeXM_WecqNuHSRBlJGbAIfKErBiAUAKFmdEKyHtuUi-Ni6cEwDgjrSxX3apxG_41POrZjZBuuV6FYBcR1wqnTr8k-_z49Kv8ZGF3yszgcV3IQ4qK3-M_qqypnEai8, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r4, use=enc, n=srRMqzPSg5CoMyaY5YErUQBRJkn0QhkzSiIIPA6dow3MnhR2_1S-D4aNHdet29Yc6qs9Qh6HIirMWcp2FPaKfaIZaJ-Q_-9gVyPDWlKHp9jSTeSetDCxm401e8XxNMjluGqb-3uQWE9W0Ka7IlDXXW1KhLYZ75xDaP5Y1c2n84uMRMKwylNCKQv0KlHIRDhsPfHx82khTGUb1XMqom7FWO8Ii4whRr7Glw0JiXj8ANHGozVTP-EVkZqFRJmwLG-ndyvsJOclEwwrXYqklFloU7WUwZQ5M08F-g-6XlSNHtaDcFagUUQKXG8zSb6GqXtEfhrs0mwI1D66b3txAf_76w9phkwlHp0Ab_lLuJLAr0j_ACtXbyxUQvHOV8QXmBuSwl7dVqAXFXGBQNGRtdewjPYgzmS4l_SzjgvC8jRTd-xzSof_gIIbSrKEtMnIoKhMCexyYGXkEzfv7aZH92_ZDGa9Cszlyqd3TJrDjj75zrkztc3coMOgbIVHoet_Ptmx, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, use=enc, n=yzFYB2Nqp5Wb34XQUBGRR33tp1jPVds46D3xwmTXPqjsbr4LMQqPWghtN_qE2bHldPJ9RJUk-i3UxnTAwR1bKLaCj6Aip_blZ4z_wK6IUIkJZk2nPD75YyhTpE9CqoI26lL2KBjMj3gn3cIxHi22BdGshppUbaf-ogH18LQ1bStM63uiflX44ud7GT4JVGaBczoad_cr-R1hs4kWZNdJrzBh7aPxebYnbAVd2CTeyXGYr_GIiq_sgtaBBISGoggruY5r-fva3R4YnhoTnmNeFOLDb99bzDPHbWhyjJ5nqBx7yaw1mT9uBnWno-h423bAT81TvXOJ2ogZ-jsYigx6xw, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e2, use=enc, x=A47oP1eLgWo7NsiKGV2Q983D3oNxLnRDlgtEi7HCtSI, y=4CjFGXRHDmm3g_cSB2YZPYsnxorc4tAEJRD35wBu0ys, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r1, use=enc, n=lFZ04QwtWu_hHgqlry40DuIhVZyl6ci6FzyLfkeHLH8xfCDLR-rvslxX-Ub3teVnPjZYdUFlZztuDo5kOFsF7TvUQMJhx00VZ6qugm-4LDSJ93ioGuo37vNDjMYBs0dEw_xV38e_m_Jo-oTJZN8xfZFroiR0cRNzac2e98lPa-TCxtOCuVp8Q8ro1Y6nC_1g51iY3nZXHfELX4vUxSh-4z7I0VkzCREQNYx-iKWw6MqEl2qG2mohiwlRexphf-1--8RuJ7FgubewzFv6dP_vCO9cYGi2qB0Gw6b9u8Jb60JYM7xLT3wGTQNfepiXQWESbVorxYiwZODP7d0tteD-eQ, e=AQAB}]) selecting from keys: [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e1, use=enc, x=zw4_6TARtwAsHFDw4Q1gr65t6BMl6lXOmmOMA3R0q58, y=O0Gb45b83A8FRe-DH_xJ4H0dsaQVskZMT_RBIKaSGOc, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r3, use=enc, n=pkTznDIyNrI9wvfoFqv3yZpHv5PBeSXxdvOIKtsrKTSXxgDqjfn3jS4CiZidUjW1TzwwkYRZYU3Ei-M7qecudUs1QFdoBUNyd7V_X-ueToD1K-JvQCCrb74bzQWHVfsb2bRfuLw3Tyw3JwnWU3Q-P7OP08INyitwFw9Oz5DvKovtuOyAh3-CT8eSXcPMy2LQTt7WW8h2YeMq1EvndAc67ohiz-q3u2Qqwbbyv-p237mL_90JLE4xMBnLNey4FDjtXbXIq8T8QbvGyn4Dc67ZxH4-izAxi_siA_3z0H7oTYRaeNL4JuNqhoB0R4CgThfofdGVGZVWPyyowzSI-7nxbMHYNNse96wDnbTTKC8pP-qDjExRYjzm4iNueaMzzcq3wAIpR5z2tZp1oULOo43R0kcXC51sKrenJWnqIaIj_WsENRAWWHsrh5IycgySWyytaGVgQHaeBagYJHzRcrhWk10e81M8oMtdPPL1MLS0bbU3CTpDcacr4KyAKAL8sVi7-M2UVqvtWkEZCJ9q1cgOFwcp0t8ZKOpw9OgVeyo-P8HoDpfeXM_WecqNuHSRBlJGbAIfKErBiAUAKFmdEKyHtuUi-Ni6cEwDgjrSxX3apxG_41POrZjZBuuV6FYBcR1wqnTr8k-_z49Kv8ZGF3yszgcV3IQ4qK3-M_qqypnEai8, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r4, use=enc, n=srRMqzPSg5CoMyaY5YErUQBRJkn0QhkzSiIIPA6dow3MnhR2_1S-D4aNHdet29Yc6qs9Qh6HIirMWcp2FPaKfaIZaJ-Q_-9gVyPDWlKHp9jSTeSetDCxm401e8XxNMjluGqb-3uQWE9W0Ka7IlDXXW1KhLYZ75xDaP5Y1c2n84uMRMKwylNCKQv0KlHIRDhsPfHx82khTGUb1XMqom7FWO8Ii4whRr7Glw0JiXj8ANHGozVTP-EVkZqFRJmwLG-ndyvsJOclEwwrXYqklFloU7WUwZQ5M08F-g-6XlSNHtaDcFagUUQKXG8zSb6GqXtEfhrs0mwI1D66b3txAf_76w9phkwlHp0Ab_lLuJLAr0j_ACtXbyxUQvHOV8QXmBuSwl7dVqAXFXGBQNGRtdewjPYgzmS4l_SzjgvC8jRTd-xzSof_gIIbSrKEtMnIoKhMCexyYGXkEzfv7aZH92_ZDGa9Cszlyqd3TJrDjj75zrkztc3coMOgbIVHoet_Ptmx, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, use=enc, n=yzFYB2Nqp5Wb34XQUBGRR33tp1jPVds46D3xwmTXPqjsbr4LMQqPWghtN_qE2bHldPJ9RJUk-i3UxnTAwR1bKLaCj6Aip_blZ4z_wK6IUIkJZk2nPD75YyhTpE9CqoI26lL2KBjMj3gn3cIxHi22BdGshppUbaf-ogH18LQ1bStM63uiflX44ud7GT4JVGaBczoad_cr-R1hs4kWZNdJrzBh7aPxebYnbAVd2CTeyXGYr_GIiq_sgtaBBISGoggruY5r-fva3R4YnhoTnmNeFOLDb99bzDPHbWhyjJ5nqBx7yaw1mT9uBnWno-h423bAT81TvXOJ2ogZ-jsYigx6xw, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e2, use=enc, x=A47oP1eLgWo7NsiKGV2Q983D3oNxLnRDlgtEi7HCtSI, y=4CjFGXRHDmm3g_cSB2YZPYsnxorc4tAEJRD35wBu0ys, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r1, use=enc, n=lFZ04QwtWu_hHgqlry40DuIhVZyl6ci6FzyLfkeHLH8xfCDLR-rvslxX-Ub3teVnPjZYdUFlZztuDo5kOFsF7TvUQMJhx00VZ6qugm-4LDSJ93ioGuo37vNDjMYBs0dEw_xV38e_m_Jo-oTJZN8xfZFroiR0cRNzac2e98lPa-TCxtOCuVp8Q8ro1Y6nC_1g51iY3nZXHfELX4vUxSh-4z7I0VkzCREQNYx-iKWw6MqEl2qG2mohiwlRexphf-1--8RuJ7FgubewzFv6dP_vCO9cYGi2qB0Gw6b9u8Jb60JYM7xLT3wGTQNfepiXQWESbVorxYiwZODP7d0tteD-eQ, e=AQAB}]): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhHQ00ifQ.Ac5pGgt-UTQYOQBO4Z-sABTVhrSr70xjotF0FMXWFqUB4iyoihdLRBTnrpjTb6o-orOqA6EMsv6oDZZelSn3J5Ul-cJSPibXuehlX9VQkZv4NDhP38sUeuXNp0IDtNcJeX2tFI2t6W2uFrCYwIkvh8f8bKHR_yUZslFBWAXRwLX9H2PjyQLXhir3hM1SAOKrQQVjaoPOum1n-3F6p_fh8gZYaxVJiJ2Yq9kdqVwY1wjsEq5sq8JN3j8szfE1GBVYHQhdn2I96bpX9OI97ma-XDIZwmQRgHT1mMByhbTG1SzQiIOc4CXGp5b5zER8j55MVZYB0L3iPYVEELY5YjWULc8XTUeSkejvH3ENuckqBoMijx3vb3N3XUFvY1IW6l0DecXEbv87ead-qSRoCNWKsZKtNX457jhtl9xXO0lrjT5kB_D9z_0SbT2X7ffsZ4vMGBbzsII-Ip_cWwl8xYXxwy9OGVsiRt1F0q1JgtNS35lNP9hZvDJksWPo77ebqXEw.ocPwwRIpGacR3VO1.-XXqFCYM6zkOTl3j.hOTzs7STvZrH3Agtm4DoNg] +05:44:46.452 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=Hzbvc__4g2nqIaYoYkc__w): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoiZGV1eCJ9..JruwzL7TaQ1Fub8Hw6yYmQ.b4B9F3kerVHvyGB5zb40lkTqxulLbMhwFi-qvPfFwwbuyPVPf5s7TeT3i3MLRs0-l_1hP5bPxIEEnOEOBbqTGwO1TWuBn_lQsR8XpQRp6t4H0eaXZsnBqOa3MeEtmGpo.Hzbvc__4g2nqIaYoYkc___] +05:44:46.452 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256","kid":"deux"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=one}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=two}]): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoiZGV1eCJ9..JruwzL7TaQ1Fub8Hw6yYmQ.b4B9F3kerVHvyGB5zb40lkTqxulLbMhwFi-qvPfFwwbuyPVPf5s7TeT3i3MLRs0-l_1hP5bPxIEEnOEOBbqTGwO1TWuBn_lQsR8XpQRp6t4H0eaXZsnBqOa3MeEtmGpo.Hzbvc--4g2nqIaYoYkc2pQ] +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.193 s - in org.jose4j.jwt.consumer.JwksDecryptionKeyResolverUsingJwtConsumerTest +[INFO] Running org.jose4j.jwt.consumer.ExamplesFromOpenIdConnectTest +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.012 s - in org.jose4j.jwt.consumer.ExamplesFromOpenIdConnectTest +[INFO] Running org.jose4j.jwt.consumer.X509VerificationKeyResolverInJwtConsumerTest +05:44:46.481 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=iHQKuSGeWUGYZCg4_RGJSIC0NDQ vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, Zb1HT7ryCRAAj2wcQ8hWbzaqX1s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, W8aO-BD2jx9KMzQjhZ85ukJA5Zg] x5t#S256=qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE].): JsonWebSignature{"x5t#S256":"qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE","x5t":"iHQKuSGeWUGYZCg4_RGJSIC0NDQ","alg":"ES256"}->eyJ4NXQjUzI1NiI6InFTX2JYTlNfSklYQ3JuUmdha2I2b3RFS3Utd0xlb3R6N0tBWjN4UVVPcUUiLCJ4NXQiOiJpSFFLdVNHZVdVR1laQ2c0X1JHSlNJQzBORFEiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTc2MSwic3ViIjoiYWJvdXQifQ.04qPYooLJN2G0q0LYVepaydszTuhY7jKjqi5IGkNBAWZ-IBlW_pWzkurR1MkO48SbJQK2swmy7Ogfihi1ClAlA] +05:44:46.481 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=iHQKuSGeWUGYZCg4_RGJSIC0NDQ vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, Zb1HT7ryCRAAj2wcQ8hWbzaqX1s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, W8aO-BD2jx9KMzQjhZ85ukJA5Zg] x5t#S256=qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE].): JsonWebSignature{"x5t#S256":"qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE","x5t":"iHQKuSGeWUGYZCg4_RGJSIC0NDQ","alg":"ES256"}->eyJ4NXQjUzI1NiI6InFTX2JYTlNfSklYQ3JuUmdha2I2b3RFS3Utd0xlb3R6N0tBWjN4UVVPcUUiLCJ4NXQiOiJpSFFLdVNHZVdVR1laQ2c0X1JHSlNJQzBORFEiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTc2MSwic3ViIjoiYWJvdXQifQ.04qPYooLJN2G0q0LYVepaydszTuhY7jKjqi5IGkNBAWZ-IBlW_pWzkurR1MkO48SbJQK2swmy7Ogfihi1ClAlA] +05:44:46.482 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Neither the x5t header nor the x5t#S256 header are present in the JWS.): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] +05:44:46.482 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Neither the x5t header nor the x5t#S256 header are present in the JWS.): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] +05:44:46.483 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +05:44:46.483 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +05:44:46.483 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +05:44:46.483 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +05:44:46.487 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +05:44:46.487 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +05:44:46.488 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to verify the signature with any of the provided keys - SHA-1 thumbs of provided certificates: [ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y].): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] +05:44:46.488 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to verify the signature with any of the provided keys - SHA-1 thumbs of provided certificates: [ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y].): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] +05:44:46.496 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t#S256=FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE].): JsonWebSignature{"x5t#S256":"FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE","alg":"ES256"}->eyJ4NXQjUzI1NiI6IkZTcU90QjV2UHFaNGtqWXAwOUZqQnBrbVhIMFZxRURtLXdFY1Rjb3g2RUUiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTUzOSwic3ViIjoiYWJvdXQifQ.9Nj3UG8N9u7Eyu0wupR-eVS4Mf0ItwwHBZzwLcY2KUCJeWoPRPT7zC4MqMbHfLj6PzFi09iC3q3PniSJwmWJTA] +05:44:46.496 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t#S256=FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE].): JsonWebSignature{"x5t#S256":"FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE","alg":"ES256"}->eyJ4NXQjUzI1NiI6IkZTcU90QjV2UHFaNGtqWXAwOUZqQnBrbVhIMFZxRURtLXdFY1Rjb3g2RUUiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTUzOSwic3ViIjoiYWJvdXQifQ.9Nj3UG8N9u7Eyu0wupR-eVS4Mf0ItwwHBZzwLcY2KUCJeWoPRPT7zC4MqMbHfLj6PzFi09iC3q3PniSJwmWJTA] +05:44:46.499 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=Zb1HT7ryCRAAj2wcQ8hWbzaqX1s vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, iHQKuSGeWUGYZCg4_RGJSIC0NDQ, W8aO-BD2jx9KMzQjhZ85ukJA5Zg].): JsonWebSignature{"x5t":"Zb1HT7ryCRAAj2wcQ8hWbzaqX1s","alg":"RS256"}->eyJ4NXQiOiJaYjFIVDdyeUNSQUFqMndjUThoV2J6YXFYMXMiLCJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5NjI1Nywic3ViIjoiYWJvdXQifQ.RidDM9z0OJkfV2mwxABtEh2Gr_BCFbTuetOTV_dmnFofarBK7VDPPdsdAhtIs3u7WQq9guoo6H3AUGfj4mTFKX3axi2TsaYRKM9wSoRjxFO7ednGcRGx8bnSerqqrbBuM9ZUUt93sIXuneJHYRKlh0Tt9mCXISv1H4OMEueXOJhck-JPgLPfLDqIPa8t93SULKTQtLvs8KEby2uJOL8vIy-a-lFp9irCWwTnd0QRidpuLAPLr428LPNPycEVqD2TpY7y_xaQJh49oqoq_AmQCmIn3CpZLDLqD1wpEPxLQyd1vbvgQ583y2XJ95_QufjbRd2Oshv3Z3JxpIm9Yie6yQ] +05:44:46.500 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=Zb1HT7ryCRAAj2wcQ8hWbzaqX1s vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, iHQKuSGeWUGYZCg4_RGJSIC0NDQ, W8aO-BD2jx9KMzQjhZ85ukJA5Zg].): JsonWebSignature{"x5t":"Zb1HT7ryCRAAj2wcQ8hWbzaqX1s","alg":"RS256"}->eyJ4NXQiOiJaYjFIVDdyeUNSQUFqMndjUThoV2J6YXFYMXMiLCJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5NjI1Nywic3ViIjoiYWJvdXQifQ.RidDM9z0OJkfV2mwxABtEh2Gr_BCFbTuetOTV_dmnFofarBK7VDPPdsdAhtIs3u7WQq9guoo6H3AUGfj4mTFKX3axi2TsaYRKM9wSoRjxFO7ednGcRGx8bnSerqqrbBuM9ZUUt93sIXuneJHYRKlh0Tt9mCXISv1H4OMEueXOJhck-JPgLPfLDqIPa8t93SULKTQtLvs8KEby2uJOL8vIy-a-lFp9irCWwTnd0QRidpuLAPLr428LPNPycEVqD2TpY7y_xaQJh49oqoq_AmQCmIn3CpZLDLqD1wpEPxLQyd1vbvgQ583y2XJ95_QufjbRd2Oshv3Z3JxpIm9Yie6yQ] +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.029 s - in org.jose4j.jwt.consumer.X509VerificationKeyResolverInJwtConsumerTest +[INFO] Running org.jose4j.jwt.NumericDateTest +05:44:46.501 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854775807} +05:44:46.501 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372034707292160} +05:44:46.501 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223371822106411107} +05:44:46.502 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{4611686018427387903} +05:44:46.502 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{2305843009213693951} +05:44:46.502 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{144115188075855871} +05:44:46.502 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9232604641496272} +05:44:46.502 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854776} +05:44:46.502 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854775 -> Aug 17, 292278994, 7:12:55 AM GMT} +05:44:46.502 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854774 -> Aug 17, 292278994, 7:12:54 AM GMT} +05:44:46.502 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854775808} +05:44:46.502 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372034707292161} +05:44:46.502 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-4611686018427387904} +05:44:46.502 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-184467440737095516} +05:44:46.502 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9232604641496272} +05:44:46.502 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854776} +05:44:46.506 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854775 -> Dec 2, 292269055, 4:47:05 PM GMT} +05:44:46.506 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854774 -> Dec 2, 292269055, 4:47:06 PM GMT} +05:44:46.506 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 1 = -9223372036854775808 +05:44:46.506 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 60 = -9223372036854775749 +05:44:46.506 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 2147483647 = -9223372034707292162 +05:44:46.506 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 9223372036854775807 = -2 +05:44:46.506 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 2147483647 + 9223372036854775807 = -9223372034707292162 +05:44:46.507 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 60 + 9223372036854775807 = -9223372036854775749 +05:44:46.507 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 1 + 9223372036854775807 = -9223372036854775808 +05:44:46.507 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -1 = 9223372036854775807 +05:44:46.507 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -100 = 9223372036854775708 +05:44:46.507 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -2147483648 = 9223372034707292160 +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s - in org.jose4j.jwt.NumericDateTest +[INFO] Running org.jose4j.http.GetTest +[WARNING] Tests run: 1, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.001 s - in org.jose4j.http.GetTest +[INFO] Running org.jose4j.examples.ExamplesTest +eyJhbGciOiJFUzI1NiJ9.VGhpcyBpcyBzb21lIHRleHQgdGhhdCBpcyB0byBiZSBzaWduZWQu.HSrYLeINqmjwlq-_n8CmZKDmEuRESwixEYo98Qm3aErD9MWKZoNEqUMMjoo2s9QtStRsAprfuVvLeXXiLc8XxQ +JWS Signature is valid: true +JWS payload: PAYLOAD! +Serialized Encrypted JWE: eyJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.N7R0RSzverWZ7Gh_9Qh_fy41ZpO1jRjNdAtf1LvqPbepqBOumZ4jpQ.3L59VCEpxjAvwcJ5fEEXnw.Z15V7M4cv1auBHbmEl480A.wcy5M53lsfHgEJswo7meew +Payload: Hello World! +JWS Signature is valid: true +JWS payload: This is some text that is to be signed. +JWT: eyJraWQiOiJrMSIsImFsZyI6IlJTMjU2In0.eyJpc3MiOiJJc3N1ZXIiLCJhdWQiOiJBdWRpZW5jZSIsImV4cCI6MTc0OTQ0ODQ4NiwianRpIjoiYmstMXo4R0VtRHZEZ25FOUtSVVJmdyIsImlhdCI6MTc0OTQ0Nzg4NiwibmJmIjoxNzQ5NDQ3NzY2LCJzdWIiOiJzdWJqZWN0IiwiZW1haWwiOiJtYWlsQGV4YW1wbGUuY29tIiwiZ3JvdXBzIjpbImdyb3VwLW9uZSIsIm90aGVyLWdyb3VwIiwiZ3JvdXAtdGhyZWUiXX0.D5HBOxgZlt3V0xKejhgTdLf7oWyRVK87x8U2g588vH-QK3imNDYBIDWqmXfkhjE5HqULCYlHY3w1ZM1mjjypw01HIlbH6emYxn1jNFtvXrlFcfwF0gxbFxtkQfiBdOnxLq4iIBtZ83FS3RYDugEvtq6zGXXIPnb9IPr3vfOpMp20oR25oC8MElCQ1PxF93I9YbS42fzndUHzLJebSNzaXdUJwScKY0xNNQWx4sX32cPJ8iYf31Bm10p7kZ9aPZ2VYK-iCqQHM0dmsDnHjlZ5Nz5_Gozv3x5HNZUvDP08-3hvmiEWPSMpY419FlCf_DWOSd697EolUrBhwndbOOhpyw +JWT validation succeeded! JWT Claims Set:{iss=Issuer, aud=Audience, exp=1749448486, jti=bk-1z8GEmDvDgnE9KRURfw, iat=1749447886, nbf=1749447766, sub=subject, email=mail@example.com, groups=[group-one, other-group, group-three]} +JWT: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJyZWNlaXZlcidzIGtleSIsImN0eSI6IkpXVCIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJINW9TVy1CWHFWUExPai1FYUM3Mklxdm5YVWp0R3N0LUlPdGxsUVRySkM0IiwieSI6InV2enhrZ2I4V3A1M3NMNHl5SVp1X0RjZ2swbFRDcnFxQ3pqQkowVXlGeVEiLCJjcnYiOiJQLTI1NiJ9fQ.FpPvA-b0TYklC9f__TpljnV9z3s-VoLyi4yq6EL4wzLBnv7af04jqQ.unmslLkXV8GnKra7udvYPA.lB56UMC5dPWfyoE7tUpC-bYFxhPfXD7agQRP_PyKf6Mmf5MntNZ3SfDcIrQQ938rYuMN72yETJ_MXp1eoWseblPxYw59J6gk5yvmk3c9bCK9ve5f2hk9oCOAO8lqQtsQ_lzsBeNwg1pk3LHTxOVxKPozpjqBsIvCwrF5jEWm31QkWHKte1Iw01qnF9DcoXudj_Y026uRQwiQVDT7vGzLdPvlilcZJgW_USTzkycPanc21riE4IgcVuEp3bGUKzZr574nPMq-emZ30-w-9nAW6jJSaNs-102xRwRWQt-4L0Xu_D3TF7xLaGa07UZZGPBf89n-RJ8YhW4Qo3nRMwnHLb64x3KzCCvJ983sJurxD74Iw65G3GHaSRIBN3E-bZDSS3GFxu1uAqYfP-CiWTKdttHRlB5N-j7aXtcgZlUCaO_swp5Pu4aYcY000ToTY2Kwzf5yRdylBgV97HkQzE4ju38ozfGbm2Hv6u9c8fk2idQmhxkWXaunwbwpz90V4IEbDwHY_20WRLBUJa3WQCKaDaVb_nDie8IKssnK8bx1qi8.CL9cjRDw6itBuug5xdp6FA +JWT validation succeeded! JWT Claims Set:{iss=sender, aud=receiver, exp=1749448486, jti=1LC4w2SBtKF1l0zwggiDrQ, iat=1749447886, nbf=1749447766, sub=subject, email=mail@example.com, groups=[group-1, other-group, group-3]} +JWE compact serialization: eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..PJfmYbE65oYFUjW7TAJ0Wg.Nyr3O17jI9HxcOlGXAKzbKamGKCB1YkhPmxVAdhvc5o9KYeYQzE0SRFws7sHePudxCC7d9B_Du22UX-Q63xVaQ.cVFSiRxDvR5fxd5I6pLGHg +plaintext: Well, as of this moment, they're on DOUBLE SECRET PROBATION! +eyJhbGciOiJFUzI1NiIsImtpZCI6ImV4YW1wbGUiLCJiNjQiOmZhbHNlLCJjcml0IjpbImI2NCJdfQ..yn_P6oQLA-8YcysS3KkINsdt7LAYnx9TRQ9uhXLvUBenK0kzI2hDB5oWto6a0EEkE3-0jI4AvX2D7-MAaJaTdw +this is the content that will be signed +JWS Signature is valid: true +[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.291 s - in org.jose4j.examples.ExamplesTest +[INFO] Running org.jose4j.keys.KeyPairUtilTest +05:44:46.812 DEBUG org.jose4j.keys.KeyPairUtilTest - The following JWT and public key should be (and were on 11/11/15) usable and produce a valid result at jwt.io (related to http://stackoverflow.com/questions/32744172): +eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJtZWgiLCJleHAiOjE3NDk0NDkwODYsImp0aSI6IndPZi1DbmRhallpN2NWQ1RRMGJ1c2ciLCJhdWQiOiJ5b3UiLCJpc3MiOiJtZSJ9.j1MuBkh5UEA6LhQmUCBeEnwvxZFzB-jPZ_BLyZtJzaBDngf0SR-xRAKrQJvM5QdK6N0LM3aI4FLMmUzz7JUZhB-Z3_Ez9iVAjy4wmkwUkFT-VSlxACaszl-U3VcsV4k9UvtC3HA2haiOOlBo07UqVF4QYRgfb1t8x976IbhvZ7rPdqwH1uBMG7n_JIQuZjm6Dk7vVaOL-JE_PsuQs-TqgHQnouSLuktFi3yog3_MR_I7dTC7PCsUju147QQIMd4l4A3HybNE3IxDwzZUQPtLcVqJMU84jG8Xllj1J6tg_wTecuONghJbV4buRHqxdFQeTHFzwIdXNeRdrno6faejhg +-----BEGIN PUBLIC KEY----- +MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAoahUIoWw0K0usKNuOR6H +4wkf4oBUXHTxRvgb48E+BVvxkeDNjbC4he8rUWcJoZmds2h7M70imEVhRU5djINX +tqllXI4DFqcI1DgjT9LewND8MW2Krf3Spsk/ZkoFnilakGygTwpZ3uesH+PFABNI +UYpOiN15dsQRkgr0vEhxN92i2asbOenSZeyaxziK72UwxrrKoExv6kc5twXTq4h+ +QChLOln0/mtUZwfsRaMStPs6mS6XrgxnxbWhojf663tuEQueGC+FCMfra36C9knD +FGzKsNa7LZK2djYgyD3JR/MB/4NUJW/TqOQtwHYbxevoJArm+L5StowjzGy+/bq6 +GwIDAQAB +-----END PUBLIC KEY----- +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s - in org.jose4j.keys.KeyPairUtilTest +[INFO] Running org.jose4j.keys.resolvers.HttpsJwksVerificationKeyResolverTest +05:44:47.405 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +05:44:47.407 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} due to an unexpected exception (java.io.IOException: https://www.example.org/says 'no GET for you!') while obtaining or using keys from JWKS endpoint at https://www.example.org/ +05:44:47.410 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +05:44:47.410 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +05:44:47.410 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jun 09 06:44:47 GMT 2025 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] +05:44:47.420 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] +05:44:47.420 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +05:44:47.421 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +05:44:47.421 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jun 09 06:44:47 GMT 2025 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] +05:44:47.434 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] +05:44:47.434 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +05:44:47.435 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +05:44:47.435 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jun 09 06:44:47 GMT 2025 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] +05:44:47.441 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] obtained from https://www.example.org/ +05:44:47.441 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES384"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] +05:44:47.441 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +05:44:47.442 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +05:44:47.442 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jun 09 06:44:47 GMT 2025 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] +05:44:47.442 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] obtained from https://www.example.org/ +05:44:47.443 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +05:44:47.443 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +05:44:47.443 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jun 09 06:44:47 GMT 2025 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k1, x=1u9oeAkLQJcAnrv_m4fupf-lF43yFqmNjMsrukKDhEE, y=RG0cyWzinUl8NpfVVw2DqfH6zRqU_yF6aL1swssNv4E, crv=P-256}] +05:44:47.443 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256","kid":"k2"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k1, x=1u9oeAkLQJcAnrv_m4fupf-lF43yFqmNjMsrukKDhEE, y=RG0cyWzinUl8NpfVVw2DqfH6zRqU_yF6aL1swssNv4E, crv=P-256}] +05:44:47.443 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +05:44:47.443 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +05:44:47.443 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jun 09 06:44:47 GMT 2025 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] +05:44:47.443 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] +05:44:47.444 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +05:44:47.444 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +05:44:47.444 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jun 09 06:44:47 GMT 2025 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] +05:44:47.444 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] obtained from https://www.example.org/ +05:44:47.445 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://abc.bfe.xyz/ +05:44:47.445 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://abc.bfe.xyz/ +05:44:47.445 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://abc.bfe.xyz/ will be cached for 3600 seconds until about Mon Jun 09 06:44:47 GMT 2025 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] +05:44:47.450 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - We expected an exception out of the CustomHttpsJwksVerificationKeyResolver: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: There are multiple keys in the referenced JWK Set document, but the kid value was not provided in the JOSE Header.) while obtaining or using keys from JWKS endpoint at https://abc.bfe.xyz/ +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.634 s - in org.jose4j.keys.resolvers.HttpsJwksVerificationKeyResolverTest +[INFO] Running org.jose4j.keys.resolvers.EmbeddedJwkVerificationKeyResolverTest +05:44:47.454 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: No jwk in JWS header): JsonWebSignature{"typ":"dpop+jwt","alg":"ES256"}->eyJ0eXAiOiJkcG9wK2p3dCIsImFsZyI6IkVTMjU2In0.eyJqdGkiOiItQndDM3lFU2MwNGFjYzc3bFRjMjZ4IiwiaHRtIjoiUE9TVCIsImh0dSI6Imh0dHBzOi8vc2VydmVyLmV4YW1wbGUuY29tL3Rva2VuIiwiaWF0IjoxNTYyMjYyNjE2fQ.DlWrKDQE15d6lN14J525P877gT_pmYYKFwpFmUvs3uQ96wTHV-4ZdnozfXVmlHmpgF5DA_3Ld8x5iyS7MrOjhw] +05:44:47.454 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Problem processing jwk from JWS header (jwk header contains a private key, which it most definitely should not.)): JsonWebSignature{"alg":"ES256","typ":"dpop+jwt","jwk":{"kty":"EC","x":"76nY8PkSVA80iOPq3UEGnocuOGhQjGOkcPpbyWpsWmg","y":"00LZB2IcOxErkNZwcQX_dmudk-atORMKjDBTsUeMvoU","crv":"P-256","d":"IIbXpUbIHemOAreeQ_LM2akq7y66DcYluvgydOritJU"}}->eyJhbGciOiJFUzI1NiIsInR5cCI6ImRwb3Arand0IiwiandrIjp7Imt0eSI6IkVDIiwieCI6Ijc2blk4UGtTVkE4MGlPUHEzVUVHbm9jdU9HaFFqR09rY1BwYnlXcHNXbWciLCJ5IjoiMDBMWkIySWNPeEVya05ad2NRWF9kbXVkay1hdE9STUtqREJUc1VlTXZvVSIsImNydiI6IlAtMjU2IiwiZCI6IklJYlhwVWJJSGVtT0FyZWVRX0xNMmFrcTd5NjZEY1lsdXZneWRPcml0SlUifX0.eyJqdGkiOiJiYzc4OSIsImh0bSI6IkdFVCIsImh0dSI6Imh0dHBzOi8vYXBpLmV4YW1wbGUuY29tIiwiaWF0IjoxNjQ3OTU5MTMyfQ.-GKT4h58oZzS4LGk8b44Dh4GoJ9Y2extHUOr_LzbFIibO_XXfanPZ8ePZkXd8s7cuQyFKagePUVCdu1T2UKbTQ] +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.006 s - in org.jose4j.keys.resolvers.EmbeddedJwkVerificationKeyResolverTest +[INFO] Running org.jose4j.keys.X509UtilTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.keys.X509UtilTest +[INFO] Running org.jose4j.keys.BigEndianBigIntegerTest +[INFO] Tests run: 19, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.107 s - in org.jose4j.keys.BigEndianBigIntegerTest +[INFO] Running org.jose4j.keys.EllipticCurvesTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.011 s - in org.jose4j.keys.EllipticCurvesTest +[INFO] Running org.jose4j.jwk.OctJwkGeneratorTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.OctJwkGeneratorTest +[INFO] Running org.jose4j.jwk.JsonWebKeyTest +[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.JsonWebKeyTest +[INFO] Running org.jose4j.jwk.EllipticCurveJsonWebKeyTest +org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=AekpBQ8ST8a8VcfVOTNl353vSrDCLLJXmPk06wTjxrrjcBpXp5EOnYG_NjFZ6OvLFV1jSfS9tsz4qUxcWceqwQGk, y=ADSmRA43Z1DSNx_RvcLI87cdL07l6jQyyBXMoxVg_l2Th-x3S1WDhjDly79ajL4Kkd0AZMaZmh9ubmf63e3kyMj2, crv=P-521} +[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.EllipticCurveJsonWebKeyTest +[INFO] Running org.jose4j.jwk.DecryptionJwkSelectorTest +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.jwk.DecryptionJwkSelectorTest [INFO] Running org.jose4j.jwk.JwkGlitchesInDeploymentTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.jwk.JwkGlitchesInDeploymentTest -[INFO] Running org.jose4j.jwk.Rfc7638JwkThumbprintTest -[INFO] Tests run: 7, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.jwk.Rfc7638JwkThumbprintTest -[INFO] Running org.jose4j.jwk.OctetSequenceJsonWebKeyTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.OctetSequenceJsonWebKeyTest -[INFO] Running org.jose4j.jwk.RsaJsonWebKeyTest -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.RsaJsonWebKeyTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.JwkGlitchesInDeploymentTest +[INFO] Running org.jose4j.jwk.ExtraJwkParametersTest +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.ExtraJwkParametersTest [INFO] Running org.jose4j.jwk.VerificationJwkSelectorTest -23:18:16.741 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {alg=RSA, mod=4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w, exp=AQAB, user=sig} and the full JWKS content: {"keys":[{"alg":"RSA","mod":"4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w","exp":"AQAB","user":"sig"}]}. {} +05:44:47.613 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {alg=RSA, mod=4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w, exp=AQAB, user=sig} and the full JWKS content: {"keys":[{"alg":"RSA","mod":"4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w","exp":"AQAB","user":"sig"}]}. {} org.jose4j.lang.JoseException: Missing required 'kty' parameter. at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:228) at org.jose4j.jwk.JsonWebKey.getStringRequired(JsonWebKey.java:220) @@ -2179,23 +3893,31 @@ at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345) at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126) at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418) -23:18:16.831 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying signature: java.security.SignatureException: Bad signature length: got 512 but was expecting 256 -23:18:16.835 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying signature: java.security.SignatureException: Bad signature length: got 256 but was expecting 512 -[INFO] Tests run: 22, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.113 s - in org.jose4j.jwk.VerificationJwkSelectorTest +05:44:47.651 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying signature: java.security.SignatureException: Bad signature length: got 512 but was expecting 256 +05:44:47.652 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying signature: java.security.SignatureException: Bad signature length: got 256 but was expecting 512 +[INFO] Tests run: 22, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.057 s - in org.jose4j.jwk.VerificationJwkSelectorTest +[INFO] Running org.jose4j.jwk.OctetSequenceJsonWebKeyTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.OctetSequenceJsonWebKeyTest +[INFO] Running org.jose4j.jwk.RsaJsonWebKeyTest +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s - in org.jose4j.jwk.RsaJsonWebKeyTest [INFO] Running org.jose4j.jwk.HttpsJwksTest -[WARNING] Tests run: 3, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.001 s - in org.jose4j.jwk.HttpsJwksTest -[INFO] Running org.jose4j.jwk.EcJwkGeneratorTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.064 s - in org.jose4j.jwk.EcJwkGeneratorTest -[INFO] Running org.jose4j.jwk.JsonWebKeySetTest -23:18:16.971 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty=false, x=GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY, y=Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. {} -org.jose4j.lang.JoseException: 'kty' parameter was Boolean type but is required to be a String. - at org.jose4j.lang.JsonHelp.getStringChecked(JsonHelp.java:43) - at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:215) - at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:225) - at org.jose4j.jwk.JsonWebKey.getStringRequired(JsonWebKey.java:220) - at org.jose4j.jwk.JsonWebKey$Factory.newJwk(JsonWebKey.java:238) +[WARNING] Tests run: 3, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.002 s - in org.jose4j.jwk.HttpsJwksTest +[INFO] Running org.jose4j.jwk.RsaJwkGeneratorTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.141 s - in org.jose4j.jwk.RsaJwkGeneratorTest +[INFO] Running org.jose4j.jwk.X5cTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.X5cTest +[INFO] Running org.jose4j.jwk.Rfc7638JwkThumbprintTest +[INFO] Tests run: 7, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.007 s - in org.jose4j.jwk.Rfc7638JwkThumbprintTest +[INFO] Running org.jose4j.jwk.JsonWebKeySetAnotherTest +05:44:47.835 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty=EC, kid=this one shouldn't work 'cause there's no y, x=msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY, crv=P-256} and the full JWKS content: { "keys": [ { "kty": "EC", "kid": "96", "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg", "y": "y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4", "crv": "P-256" }, { "kty": "EC", "kid": "a9", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ", "crv": "P-256" }, { "kty": "EC", "kid": "this one shouldn't work 'cause there's no y", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "crv": "P-256" }, { "kty": "EC", "kid": "2d", "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw", "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4", "crv": "P-256" } ]}. {} +org.jose4j.lang.JoseException: Missing required 'y' parameter. + at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:228) + at org.jose4j.jwk.PublicJsonWebKey.getBigIntFromBase64UrlEncodedParam(PublicJsonWebKey.java:245) + at org.jose4j.jwk.EllipticCurveJsonWebKey.(EllipticCurveJsonWebKey.java:69) + at org.jose4j.jwk.EllipticCurveJsonWebKey.(EllipticCurveJsonWebKey.java:57) + at org.jose4j.jwk.JsonWebKey$Factory.newJwk(JsonWebKey.java:245) at org.jose4j.jwk.JsonWebKeySet.(JsonWebKeySet.java:51) - at org.jose4j.jwk.JsonWebKeySetTest.testParseSetContainingInvalid(JsonWebKeySetTest.java:327) + at org.jose4j.jwk.JsonWebKeySetAnotherTest.oneBadApple(JsonWebKeySetAnotherTest.java:51) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) @@ -2224,17 +3946,11 @@ at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345) at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126) at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418) -23:18:16.972 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty=EC, x=[IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, huh], y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. {} -org.jose4j.lang.JoseException: 'x' parameter was Array type but is required to be a String. - at org.jose4j.lang.JsonHelp.getStringChecked(JsonHelp.java:43) - at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:215) - at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:225) - at org.jose4j.jwk.PublicJsonWebKey.getBigIntFromBase64UrlEncodedParam(PublicJsonWebKey.java:245) - at org.jose4j.jwk.EllipticCurveJsonWebKey.(EllipticCurveJsonWebKey.java:67) - at org.jose4j.jwk.EllipticCurveJsonWebKey.(EllipticCurveJsonWebKey.java:57) - at org.jose4j.jwk.JsonWebKey$Factory.newJwk(JsonWebKey.java:245) +05:44:47.836 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty=UNKNOWN, crv=whatever, x=11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo} and the full JWKS content: { "keys": [ { "kty": "EC", "kid": "96", "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg", "y": "y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4", "crv": "P-256" }, { "kty": "EC", "kid": "a9", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ", "crv": "P-256" }, { "kty":"UNKNOWN", "crv":"whatever", "x":"11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo" } { "kty": "EC", "kid": "2d", "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw", "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4", "crv": "P-256" } ]}. {} +org.jose4j.lang.JoseException: Unknown key type algorithm: 'UNKNOWN' + at org.jose4j.jwk.JsonWebKey$Factory.newJwk(JsonWebKey.java:249) at org.jose4j.jwk.JsonWebKeySet.(JsonWebKeySet.java:51) - at org.jose4j.jwk.JsonWebKeySetTest.testParseSetContainingInvalid(JsonWebKeySetTest.java:327) + at org.jose4j.jwk.JsonWebKeySetAnotherTest.oneUnknownKTY(JsonWebKeySetAnotherTest.java:91) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) @@ -2263,8 +3979,10 @@ at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345) at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126) at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418) -23:18:16.973 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty=1, x=IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. {} -org.jose4j.lang.JoseException: 'kty' parameter was Number type but is required to be a String. +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.JsonWebKeySetAnotherTest +[INFO] Running org.jose4j.jwk.JsonWebKeySetTest +05:44:47.840 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty=false, x=GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY, y=Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. {} +org.jose4j.lang.JoseException: 'kty' parameter was Boolean type but is required to be a String. at org.jose4j.lang.JsonHelp.getStringChecked(JsonHelp.java:43) at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:215) at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:225) @@ -2300,13 +4018,15 @@ at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345) at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126) at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418) -23:18:16.974 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty=885584955514411149933357445595595145885566661, x=IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. {} -org.jose4j.lang.JoseException: 'kty' parameter was Number type but is required to be a String. +05:44:47.841 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty=EC, x=[IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, huh], y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. {} +org.jose4j.lang.JoseException: 'x' parameter was Array type but is required to be a String. at org.jose4j.lang.JsonHelp.getStringChecked(JsonHelp.java:43) at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:215) at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:225) - at org.jose4j.jwk.JsonWebKey.getStringRequired(JsonWebKey.java:220) - at org.jose4j.jwk.JsonWebKey$Factory.newJwk(JsonWebKey.java:238) + at org.jose4j.jwk.PublicJsonWebKey.getBigIntFromBase64UrlEncodedParam(PublicJsonWebKey.java:245) + at org.jose4j.jwk.EllipticCurveJsonWebKey.(EllipticCurveJsonWebKey.java:67) + at org.jose4j.jwk.EllipticCurveJsonWebKey.(EllipticCurveJsonWebKey.java:57) + at org.jose4j.jwk.JsonWebKey$Factory.newJwk(JsonWebKey.java:245) at org.jose4j.jwk.JsonWebKeySet.(JsonWebKeySet.java:51) at org.jose4j.jwk.JsonWebKeySetTest.testParseSetContainingInvalid(JsonWebKeySetTest.java:327) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) @@ -2337,8 +4057,8 @@ at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345) at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126) at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418) -23:18:16.978 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty={EC=EC}, x=riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM, y=izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. {} -org.jose4j.lang.JoseException: 'kty' parameter was Object type but is required to be a String. +05:44:47.841 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty=1, x=IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. {} +org.jose4j.lang.JoseException: 'kty' parameter was Number type but is required to be a String. at org.jose4j.lang.JsonHelp.getStringChecked(JsonHelp.java:43) at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:215) at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:225) @@ -2374,9 +4094,11 @@ at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345) at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126) at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418) -23:18:16.980 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty=null, x=riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM, y=izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. {} -org.jose4j.lang.JoseException: Missing required 'kty' parameter. - at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:228) +05:44:47.842 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty=885584955514411149933357445595595145885566661, x=IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. {} +org.jose4j.lang.JoseException: 'kty' parameter was Number type but is required to be a String. + at org.jose4j.lang.JsonHelp.getStringChecked(JsonHelp.java:43) + at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:215) + at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:225) at org.jose4j.jwk.JsonWebKey.getStringRequired(JsonWebKey.java:220) at org.jose4j.jwk.JsonWebKey$Factory.newJwk(JsonWebKey.java:238) at org.jose4j.jwk.JsonWebKeySet.(JsonWebKeySet.java:51) @@ -2409,22 +4131,15 @@ at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345) at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126) at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418) -[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.026 s - in org.jose4j.jwk.JsonWebKeySetTest -[INFO] Running org.jose4j.jwk.JsonWebKeyTest -[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.009 s - in org.jose4j.jwk.JsonWebKeyTest -[INFO] Running org.jose4j.jwk.EllipticCurveJsonWebKeyTest -org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=AekpBQ8ST8a8VcfVOTNl353vSrDCLLJXmPk06wTjxrrjcBpXp5EOnYG_NjFZ6OvLFV1jSfS9tsz4qUxcWceqwQGk, y=ADSmRA43Z1DSNx_RvcLI87cdL07l6jQyyBXMoxVg_l2Th-x3S1WDhjDly79ajL4Kkd0AZMaZmh9ubmf63e3kyMj2, crv=P-521} -[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s - in org.jose4j.jwk.EllipticCurveJsonWebKeyTest -[INFO] Running org.jose4j.jwk.JsonWebKeySetAnotherTest -23:18:17.023 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty=EC, kid=this one shouldn't work 'cause there's no y, x=msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY, crv=P-256} and the full JWKS content: { "keys": [ { "kty": "EC", "kid": "96", "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg", "y": "y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4", "crv": "P-256" }, { "kty": "EC", "kid": "a9", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ", "crv": "P-256" }, { "kty": "EC", "kid": "this one shouldn't work 'cause there's no y", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "crv": "P-256" }, { "kty": "EC", "kid": "2d", "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw", "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4", "crv": "P-256" } ]}. {} -org.jose4j.lang.JoseException: Missing required 'y' parameter. - at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:228) - at org.jose4j.jwk.PublicJsonWebKey.getBigIntFromBase64UrlEncodedParam(PublicJsonWebKey.java:245) - at org.jose4j.jwk.EllipticCurveJsonWebKey.(EllipticCurveJsonWebKey.java:69) - at org.jose4j.jwk.EllipticCurveJsonWebKey.(EllipticCurveJsonWebKey.java:57) - at org.jose4j.jwk.JsonWebKey$Factory.newJwk(JsonWebKey.java:245) +05:44:47.842 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty={EC=EC}, x=riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM, y=izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. {} +org.jose4j.lang.JoseException: 'kty' parameter was Object type but is required to be a String. + at org.jose4j.lang.JsonHelp.getStringChecked(JsonHelp.java:43) + at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:215) + at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:225) + at org.jose4j.jwk.JsonWebKey.getStringRequired(JsonWebKey.java:220) + at org.jose4j.jwk.JsonWebKey$Factory.newJwk(JsonWebKey.java:238) at org.jose4j.jwk.JsonWebKeySet.(JsonWebKeySet.java:51) - at org.jose4j.jwk.JsonWebKeySetAnotherTest.oneBadApple(JsonWebKeySetAnotherTest.java:51) + at org.jose4j.jwk.JsonWebKeySetTest.testParseSetContainingInvalid(JsonWebKeySetTest.java:327) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) @@ -2453,11 +4168,13 @@ at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345) at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126) at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418) -23:18:17.025 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty=UNKNOWN, crv=whatever, x=11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo} and the full JWKS content: { "keys": [ { "kty": "EC", "kid": "96", "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg", "y": "y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4", "crv": "P-256" }, { "kty": "EC", "kid": "a9", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ", "crv": "P-256" }, { "kty":"UNKNOWN", "crv":"whatever", "x":"11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo" } { "kty": "EC", "kid": "2d", "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw", "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4", "crv": "P-256" } ]}. {} -org.jose4j.lang.JoseException: Unknown key type algorithm: 'UNKNOWN' - at org.jose4j.jwk.JsonWebKey$Factory.newJwk(JsonWebKey.java:249) +05:44:47.846 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty=null, x=riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM, y=izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. {} +org.jose4j.lang.JoseException: Missing required 'kty' parameter. + at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:228) + at org.jose4j.jwk.JsonWebKey.getStringRequired(JsonWebKey.java:220) + at org.jose4j.jwk.JsonWebKey$Factory.newJwk(JsonWebKey.java:238) at org.jose4j.jwk.JsonWebKeySet.(JsonWebKeySet.java:51) - at org.jose4j.jwk.JsonWebKeySetAnotherTest.oneUnknownKTY(JsonWebKeySetAnotherTest.java:91) + at org.jose4j.jwk.JsonWebKeySetTest.testParseSetContainingInvalid(JsonWebKeySetTest.java:327) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) @@ -2486,1700 +4203,19 @@ at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345) at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126) at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418) -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.009 s - in org.jose4j.jwk.JsonWebKeySetAnotherTest -[INFO] Running org.jose4j.jwk.RsaJwkGeneratorTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.034 s - in org.jose4j.jwk.RsaJwkGeneratorTest -[INFO] Running org.jose4j.jwk.ExtraJwkParametersTest -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.006 s - in org.jose4j.jwk.ExtraJwkParametersTest -[INFO] Running org.jose4j.jwk.DecryptionJwkSelectorTest -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s - in org.jose4j.jwk.DecryptionJwkSelectorTest -[INFO] Running org.jose4j.jwk.X5cTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.006 s - in org.jose4j.jwk.X5cTest -[INFO] Running org.jose4j.jwk.OctJwkGeneratorTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.OctJwkGeneratorTest -[INFO] Running org.jose4j.jwx.CompactSerializerTest -[INFO] Tests run: 11, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwx.CompactSerializerTest -[INFO] Running org.jose4j.jwx.HeadersTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwx.HeadersTest -[INFO] Running org.jose4j.jwx.JsonWebStructureTest -[INFO] Tests run: 12, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.014 s - in org.jose4j.jwx.JsonWebStructureTest -[INFO] Running org.jose4j.base64url.internal.apache.commons.codec.binary.Base64Test -[INFO] Tests run: 47, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.046 s - in org.jose4j.base64url.internal.apache.commons.codec.binary.Base64Test -[INFO] Running org.jose4j.jwe.JsonWebEncryptionTest -[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.038 s - in org.jose4j.jwe.JsonWebEncryptionTest -[INFO] Running org.jose4j.jwe.EcdhKeyAgreementAlgorithmTest -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.037 s - in org.jose4j.jwe.EcdhKeyAgreementAlgorithmTest -[INFO] Running org.jose4j.jwe.CritHeaderTest -23:18:18.358 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'so.crit' marked as critical. -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.CritHeaderTest -[INFO] Running org.jose4j.jwe.ZipTest -eyJ6aXAiOiJERUYiLCJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..WUseZVQ5ZgFtRT9FlbiYog.P6z3Qu8Y3SmHJygWqn9-5I_1EV4Ri5HGCT24N-KUhKwppQc73d3BqgT2gtxrpvuGCheyeXck9d6dtlnZDKe7fQ.iCHb9LOTDzKz760tyDBASA -eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..3byQpjc93sOm4HmZHJLLfw.wyIWn3JXzP5TdrklV1OoBUz6GHCvHNAKd5ub_yaOCQyVACKczCVSUwyoweswZpJsRD4HuJKx-AyYlW8xuHQS282Wb3KZMsPP9GJi3Oohcbzr9Gzqc0UQhIzz-ECEOE6EkA2fJ21D2BB8QD4jxEp3HOayDFy2Xhkzoywli85kxH4CTvK83ygE69lUIYAv_2zWphva0gwD2_D76keeAANq5EJo5NDQD90w_rKM6U5y0NjtbX-NfvERHTRH4mjeWFmomS2R6uJ25b10_IwWuR2USXLpuhaprv2FDzqSe4eIAKVVq3gEybNzsDoBgvMthjennUZELqRgOb-FTQo-5gBQAMjEePLbkdZ1GGgYspFNRu5GFxVJnYg3dGx8kX5K-IkM.aj1R17qLdLPrOUCCpPHT4g -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s - in org.jose4j.jwe.ZipTest -[INFO] Running org.jose4j.jwe.GeneralJweTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s - in org.jose4j.jwe.GeneralJweTest -[INFO] Running org.jose4j.jwe.Aes128CbcHmacSha256ContentEncryptionAlgorithmTest -[WARNING] Tests run: 4, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.001 s - in org.jose4j.jwe.Aes128CbcHmacSha256ContentEncryptionAlgorithmTest -[INFO] Running org.jose4j.jwe.kdf.Pbkdf2MoreTest -[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.022 s - in org.jose4j.jwe.kdf.Pbkdf2MoreTest -[INFO] Running org.jose4j.jwe.kdf.Rfc6070Pbkdf2TestVectorsTest -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.064 s - in org.jose4j.jwe.kdf.Rfc6070Pbkdf2TestVectorsTest -[INFO] Running org.jose4j.jwe.kdf.ConcatKeyDerivationFunctionTest -Sq8rGLm4rEtzScmnSsY5r1n-AqBl_iBU8FxN80Uc0S0 -LfkHot2nGTVlmfxbgxQfMg -[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwe.kdf.ConcatKeyDerivationFunctionTest -[INFO] Running org.jose4j.jwe.kdf.Pbkdf2CompareToJavaSecretKeyFactorySha1Test -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.036 s - in org.jose4j.jwe.kdf.Pbkdf2CompareToJavaSecretKeyFactorySha1Test -[INFO] Running org.jose4j.jwe.kdf.Pbkdf2JwkExampleTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.024 s - in org.jose4j.jwe.kdf.Pbkdf2JwkExampleTest -[INFO] Running org.jose4j.jwe.NegativeJweWrappingTest -23:18:18.576 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:487); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:389); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... -23:18:18.577 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ -23:18:18.581 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:487); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:389); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... -23:18:18.582 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ -23:18:18.587 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:487); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:389); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... -23:18:18.588 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ -23:18:18.593 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:487); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:389); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... -23:18:18.593 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ -23:18:18.597 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=FlleGhb7Jp-VlWS1wonqsA -23:18:18.601 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ -23:18:18.609 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.InvalidKeyException: 256 bit content encryption key is not the correct size for the A192CBC-HS384 content encryption algorithm (384). -eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.d85R1ySkMiWljx32_gX4HYpdEx5qdWBd81nQA5CAgQQ8Hosox1-WGFMDDa-vV35TnB-sWM1k20zlvhidPwiHeTVqShtvq7gOabhQqIFDG8OGXgSjRvD-eHnMHzGKgsTmqUFl_dwPYhsH6VuXW4jaQLabpKa6VDRFSk6OunAMSlJR9S-QVXMl2t0ZEBOfo3asXYjvoptk9-_3Kq4zFzMY8mxPi0NwJZmJlvVj3QpwWE8xin_L_lVFmQxBLPWn_R87c0hnt-pR0ZRYsVvm_ZWJuVXDo_Uedx2SPHSr6tAzH24sop2HXjFMoNn2uwxYUzfLoTRIFPotYmqjumaqlCbj0w.-0avEu-hcBrIdS6Mp_XDfw.zEIQvMcSkvuCUYje4yFXbH21BJQtngFAfAZPu-3rxm3VL-gmNEcKp-SNQSVKcIQfktCpT2FRksvEt32BaXZVh95RhHnpISttLtG2EZZu4ZM.AmVCY3LwtgtVoRJxf4wUnQ -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.045 s - in org.jose4j.jwe.NegativeJweWrappingTest -[INFO] Running org.jose4j.jwe.Pbes2ExampleEncryptedRSAPrivateKeyJwkAppendixCTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.026 s - in org.jose4j.jwe.Pbes2ExampleEncryptedRSAPrivateKeyJwkAppendixCTest -[INFO] Running org.jose4j.jwe.Aes128KeyWrapManagementAlgorithmTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.jwe.Aes128KeyWrapManagementAlgorithmTest -[INFO] Running org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithmTest -eyJhbGciOiJQQkVTMi1IUzI1NitBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwicDJjIjo2NTUzNiwicDJzIjoiMnk3NDdpcjdEMW92akx2UiJ9.4Vedaa2nOrrSeoYZnyJ0AS_Otkm2si309vHdj9PA-DHYVkMdji2vww.HaHC7Df6mpZhS8qKEXIBig.wfFv5XmHg9JU4zAT_PBFGQ.P0oQkfJv_6-xgLs3FMONOQ -[INFO] Tests run: 7, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 5.855 s - in org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithmTest -[INFO] Running org.jose4j.jwe.RsaOaepKeyManagementAlgorithmTest -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.072 s - in org.jose4j.jwe.RsaOaepKeyManagementAlgorithmTest -[INFO] Running org.jose4j.jwe.JweCryptoPrimitiveTest -23:18:24.707 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getCipher(): Cipher.RSA/ECB/OAEPWithSHA-1AndMGF1Padding, mode: key unwrapping, algorithm from: SunJCE -23:18:24.743 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@7354b8c5 -23:18:24.756 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@20d7d6fb -23:18:24.769 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@4ef782af -23:18:24.773 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKey(): 256 bit AES key -23:18:24.773 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getCipher(): Cipher.AESWrap, mode: key unwrapping, algorithm from: SunJCE -23:18:25.210 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKey(): javax.crypto.spec.SecretKeySpec@fffe86dc -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.502 s - in org.jose4j.jwe.JweCryptoPrimitiveTest -[INFO] Running org.jose4j.jwe.Rsa1_5KeyManagementAlgorithmTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwe.Rsa1_5KeyManagementAlgorithmTest -[INFO] Running org.jose4j.jwe.Aes256GcmContentEncryptionAlgorithmTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.Aes256GcmContentEncryptionAlgorithmTest -[INFO] Running org.jose4j.jwe.InvalidCurveTest -23:18:25.243 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key is equal to 26 mod 113 -23:18:25.243 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w -23:18:25.244 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as expected: org.jose4j.lang.JoseException: epk is invalid for P-256 -23:18:25.244 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key is equal to 2446 mod 2447 -23:18:25.244 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w -23:18:25.244 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as expected: org.jose4j.lang.JoseException: epk is invalid for P-256 -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.InvalidCurveTest -[INFO] Running org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest -23:18:25.253 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ0ZWdmQycGJEcl9yUElFVDZmU1hoeHBJTm50WDZILTF1N3cwc21pM2YwRSIsInkiOiJKNUN2M0hhZTYxOWVyRkhPZjE1Y3NDeXlLUEpqdTB3VHp2WElBQWVHQUtvIiwiY3J2IjoiUC0yNTYifX0.cx2n11crFKCZ2OoB0eHOOmAUl9kfwWd3apV3a229R7a2GlpCiIGbvA.bTxKF_nCy_NaHoIR3-lWDw.tfqrXE_EWSlNk64zDxqhFKSOKW4CoFKUpl9khWziQfxI0QTL3ZVwnXqTOPKrFSycb3H4ZphMPYQHiV6ywulHDg.x_kJK_tkPo8pQDB6akY1uQ -23:18:25.268 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiTXBxdW9QczlhN1Y1eFFVMEVkMFBEb2MwUWMtT29LZnRndkRXQjdoa1p5SSIsInkiOiJObm9td1JkNDVYOExpQUJsaDdJUE9ONmNjSnRKZk5wQkxJdWkzUGJnS0lzIiwiY3J2IjoiUC0yNTYifX0.7Gm2iuKzZBeCom2jHQSGge2sGr-ERpxZrbBsMf6z4ueOWxBIT3mg74COK8Ngyo828ItCalyHmrc.ElPD2aGMqXiavn6IYyRLsA.ZnjweLN2E606l_jRbn0SNN2UHzDSb8Hgz5ji8DWt9VZyP08CkNl_SGz9DLFyF7OdpPURVthni_362_BRNf9PXg.buSFBR7H6cp-99aesKtTwNRvdM2V9EBo -23:18:25.281 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ3pKNDlRc0w3RjBTOU9vMExkUEw0OXplcnpMT0dsNW50WUw0MUhQOElSMCIsInkiOiJXUng1VE5WMXpIb2R3Zl82TGpkaFhxUjVYRWFMVTZ3M3JNeGVhZWhrbmpRIiwiY3J2IjoiUC0yNTYifX0.rin4KbYBhhJsYA_qC798BJB4G7BLXXCYnBje_fWWFX8uyYtt7guYHz3pLa_qTpGXIXalTF1V8NhIyXdkRv4c9ivK51paQ6i5.0sWx1S1L8nduoLJqzECd9A.fe7OJtdrDJWj-Qo7HuSshdUxddHGZUH_ZDVVGC8_XC0itEy0ht37tAwFCpqcEpkmQ74vvGqNrOYDZM1mztSNpg.KZRUji0aaG-7SkbsKV5EY082mb83py7sEjhMWSjFsWM -23:18:25.293 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoicldmZnhVZTZSWk0tVEJURGlxVmNuR3B1elJNLXpEZTU3U0JwMWNGYzNJYyIsInkiOiJSNFpVQk1PcE4xWWtQcy1XOE9hYzhxLVdCU3pvU0E4YW1MYmVBNUE0TmxFIiwiY3J2IjoiUC0yNTYifX0.BmveWR-qqU81jdqw7zASjZ4YYY4THq3OYV_VherPfWO626nUerofJw.y6nIrB80M9zGYe6ZMxLB_A.yRqNIIFmFg2A5EqmygtbcwAOSPf5-CyP_kP34O9JUj0Snr2kBjmo2cuaOhujtl0u8yKm_8wHEBrNkphrin63wg.pcuSI2C81uP98sKBNOJj5A -23:18:25.313 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiTjUyWldlTlpVMmFjVmx2ZTZ6UVRLem9qUFh1dHl0d0xNZlJOVEtmXzlNYyIsInkiOiItbWxBTDh3YkFVWnc3amljQU1oRVJmM1E3cEtOU0J6Vkl4NTUwVW9LdGE4IiwiY3J2IjoiUC0yNTYifX0.Vwn1Hq7Q4oGbcekvkZ8ye9DSC3xkg9hNkx36SdKiC68C8C5G9teDywJS_XeDJpnpRFNaJnNzx6E.NrOUfF2Ibp4G0FHk9zp3Cw.Tvaxasm-SufVOPWng0bXWfp7b7IeZVZ3LnWlm8L1ANZljBg8WKPJyoJhMsvLnsiOUU52fShzkK5RsGME2T6gWw.avfRl1aESQaHMGbSkpUZKiob2QtDFzg8 -23:18:25.337 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiV1ZKNURWa0xuVldTVU9pbm1CaTF0UGRmRzNjTXJhd2ZianVBN0lUWU9rSSIsInkiOiJKVXVrS21WQUtpVHZTVEdlTHlKSlBhOThmc2ctSHkzRUYyd3U5dW1pY1RRIiwiY3J2IjoiUC0yNTYifX0.HdTHQpUBmiUvkssX_IqlamOYH9HrNePRQGP5eVP8SIueecIhQzy2GT_nmLNS5phwW6uQRiiRUQEa1nT4bL5y4Bd2kVD4eBT_.zf8dc3qXTxXRyYOXvzgdtg.Q6EZ9dF9iXTP-ENA9fB12g9R5n2GSWJ8GZhYiP5rtZIFqIbEmLig0pAQs2jTy6jcSvtIleqpURleYj9C4zWpyg.ekpCN-FwjEoFkMoHAaoC_yVPLFrLaxqnAJXUWX3G4Gk -23:18:25.367 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoibzV2RXVhZVhQekJxR0x1WXFadjlaVVdXTnExMHA4UEI1a2QtelpLWk53OCIsInkiOiI2dkZkMjBKZWE4MGszdEkwem1WZzU5TjBiTGdkc3FHd3JXUHY0dkRPTklRIiwiY3J2IjoiUC0yNTYifX0.xG4uCjMMTvNlK2FSy05hR08CC4DwQcIk0aGNV7aZTG4gj-D5NT_Z3A.vFFqnQQC2jLx0-NLewO5EA.rxnSao3Hxy7Z23rm_zxlewsigv2cGAaEYoBB5D9bjTvgvlmbA9EFV8NYRy85PrNcckZNumN0rUW9U7RdyZhn8w.D-rYE4ndVfLzkCBdnqOFlA -23:18:25.392 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiUEotMThOUHViSUxFR2hFWkFDRDFRTlpVTVFpZW9VSk03RmROQUFXeGVsWSIsInkiOiIzOU1VTVFBZnNGSzJla2x5c0tNR3FuNGZ3SFhTMkFTeFQ0dnVCdUpKaTVFIiwiY3J2IjoiUC0yNTYifX0.SKrj0F3h6l7ev_B18EGtmSnv2xUQbORbNcqFGPbnD-aGVwYh-zHyWK6cm06Ks5-4qwa2fKCt82U.txPQrnEIRrdf97ucH5sI6Q.2GwHWdSriD_z3ewb2q6cA6dKi7eid-1RwaB_nG8HOq7KG5mlV50dmT_fnHyXcHqJJssJ9Urn0cvADSu1KVOQZQ.MVivEfNgw__fBsgIGKRrVl_-6xbyh7K7 -23:18:25.416 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiVHN0b09XRU9CSGJQdk9fSzg5ZFBiYVlZZmg0c2xkNlQ3Tm9zeDdVZ0owQSIsInkiOiJueldYaGN1ZjFmQl9KbU4yYjRSbmdOMzY3Zlh3QUxxX0ltRVFIRzVUV3VFIiwiY3J2IjoiUC0yNTYifX0.DQLZJ9fg_gglBcBAxMmRHHkCHODLBDM8v--1qX7N1scnCruoWayFuveEf3FfQ3XSL2gnNqmtQYcJS2qyNgvz4JfhEUyw06m9.Zmq2Se0cYVxjj9TyphgljQ.IN2rsYX9fDqFF1V05GbIZW2CbfWOnno8C-7Hr_4gmu8mB5IIN0y_Pn4KA8pN0MQ76HlBXLqg67UJHs2lemLk_Q.cjSPmM_b1RnKA0aCMCi6xJ4uFxVcez02dmOUZyIgYC4 -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.169 s - in org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest -[INFO] Running org.jose4j.jwe.NegativeJweKeyTest -23:18:25.439 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: 256 bit content encryption key is not the correct size for the A128GCM content encryption algorithm (128). -23:18:25.439 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided. -23:18:25.439 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided. -23:18:25.440 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided. -23:18:25.440 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided. -23:18:25.440 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided. -23:18:25.441 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided. -23:18:25.442 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 192 bit key was provided. -23:18:25.442 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 256 bit key was provided. -23:18:25.442 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 128 bit key was provided. -23:18:25.445 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 256 bit key was provided. -23:18:25.446 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 128 bit key was provided. -23:18:25.446 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 192 bit key was provided. -23:18:25.446 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided. -23:18:25.446 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided. -23:18:25.447 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided. -23:18:25.447 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -23:18:25.447 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -23:18:25.447 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -23:18:25.447 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 8 bit key was provided. -23:18:25.448 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 56 bit key was provided. -23:18:25.448 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 64 bit key was provided. -23:18:25.448 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 128 bit key was provided. -23:18:25.448 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 192 bit key was provided. -23:18:25.448 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 248 bit key was provided. -23:18:25.448 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided. -23:18:25.448 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided. -23:18:25.448 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided. -23:18:25.448 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 9744 bit key was provided. -23:18:25.448 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 2352 bit key was provided. -23:18:25.448 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 784 bit key was provided. -23:18:25.448 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 1264 bit key was provided. -23:18:25.449 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 8 bit key was provided. -23:18:25.449 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 56 bit key was provided. -23:18:25.449 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 64 bit key was provided. -23:18:25.449 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 128 bit key was provided. -23:18:25.449 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 192 bit key was provided. -23:18:25.449 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided. -23:18:25.449 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 376 bit key was provided. -23:18:25.449 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided. -23:18:25.449 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided. -23:18:25.449 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 9744 bit key was provided. -23:18:25.449 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 2352 bit key was provided. -23:18:25.449 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 784 bit key was provided. -23:18:25.449 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 1264 bit key was provided. -23:18:25.449 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 8 bit key was provided. -23:18:25.450 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 56 bit key was provided. -23:18:25.450 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 64 bit key was provided. -23:18:25.450 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 128 bit key was provided. -23:18:25.450 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 192 bit key was provided. -23:18:25.450 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided. -23:18:25.450 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided. -23:18:25.450 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 504 bit key was provided. -23:18:25.450 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided. -23:18:25.458 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 9744 bit key was provided. -23:18:25.459 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 2352 bit key was provided. -23:18:25.459 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 784 bit key was provided. -23:18:25.459 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 1264 bit key was provided. -23:18:25.459 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.PublicKey -23:18:25.459 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.PrivateKey -23:18:25.460 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. -23:18:25.460 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. -23:18:25.460 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. -23:18:25.460 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. -23:18:25.460 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An empty octet sequence is to be used as the JWE Encrypted Key value when utilizing direct encryption but this JWE has 40 octets in the encrypted key part. -23:18:25.460 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.interfaces.ECPublicKey -23:18:25.460 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.interfaces.ECPublicKey -23:18:25.461 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.interfaces.ECPublicKey -23:18:25.461 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.ec.ECPrivateKeyImpl to java.security.interfaces.ECPublicKey -23:18:25.461 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. -23:18:25.461 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.interfaces.ECPublicKey -23:18:25.461 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.interfaces.ECPublicKey -23:18:25.461 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.interfaces.ECPublicKey -23:18:25.461 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.ec.ECPrivateKeyImpl to java.security.interfaces.ECPublicKey -23:18:25.461 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. -23:18:25.461 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.interfaces.ECPublicKey -23:18:25.461 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.interfaces.ECPublicKey -23:18:25.461 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.interfaces.ECPublicKey -23:18:25.461 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.ec.ECPrivateKeyImpl to java.security.interfaces.ECPublicKey -23:18:25.461 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. -23:18:25.461 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.interfaces.ECPublicKey -23:18:25.461 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.interfaces.ECPublicKey -23:18:25.462 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.interfaces.ECPublicKey -23:18:25.462 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.ec.ECPrivateKeyImpl to java.security.interfaces.ECPublicKey -23:18:25.462 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. -23:18:25.462 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.interfaces.ECPrivateKey -23:18:25.462 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.interfaces.ECPrivateKey -23:18:25.462 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.interfaces.ECPrivateKey -23:18:25.462 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.ec.ECPublicKeyImpl to java.security.interfaces.ECPrivateKey -23:18:25.462 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.interfaces.ECPrivateKey -23:18:25.463 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.interfaces.ECPrivateKey -23:18:25.464 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.interfaces.ECPrivateKey -23:18:25.464 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.ec.ECPublicKeyImpl to java.security.interfaces.ECPrivateKey -23:18:25.464 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.PublicKey -23:18:25.465 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Unable to encrypt (RSA/ECB/OAEPWithSHA-1AndMGF1Padding) the Content Encryption Key: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -23:18:25.465 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.ec.ECPrivateKeyImpl to java.security.PublicKey -23:18:25.465 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 8 bit key was provided. -23:18:25.465 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 40 bit key was provided. -23:18:25.465 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 136 bit key was provided. -23:18:25.465 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 192 bit key was provided. -23:18:25.465 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 256 bit key was provided. -23:18:25.465 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an RSA key was provided. -23:18:25.465 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an RSA key was provided. -23:18:25.465 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an EC key was provided. -23:18:25.465 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an EC key was provided. -23:18:25.466 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 8 bit key was provided. -23:18:25.466 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 40 bit key was provided. -23:18:25.466 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 128 bit key was provided. -23:18:25.466 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 184 bit key was provided. -23:18:25.466 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 256 bit key was provided. -23:18:25.466 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an RSA key was provided. -23:18:25.474 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an RSA key was provided. -23:18:25.474 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an EC key was provided. -23:18:25.474 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an EC key was provided. -23:18:25.475 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 8 bit key was provided. -23:18:25.475 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 40 bit key was provided. -23:18:25.475 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 128 bit key was provided. -23:18:25.475 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 192 bit key was provided. -23:18:25.475 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 248 bit key was provided. -23:18:25.475 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 264 bit key was provided. -23:18:25.475 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an RSA key was provided. -23:18:25.475 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an RSA key was provided. -23:18:25.475 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an EC key was provided. -23:18:25.475 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an EC key was provided. -[INFO] Tests run: 29, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.051 s - in org.jose4j.jwe.NegativeJweKeyTest -[INFO] Running org.jose4j.keys.EllipticCurvesTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.027 s - in org.jose4j.keys.EllipticCurvesTest -[INFO] Running org.jose4j.keys.resolvers.EmbeddedJwkVerificationKeyResolverTest -23:18:25.559 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: No jwk in JWS header): JsonWebSignature{"typ":"dpop+jwt","alg":"ES256"}->eyJ0eXAiOiJkcG9wK2p3dCIsImFsZyI6IkVTMjU2In0.eyJqdGkiOiItQndDM3lFU2MwNGFjYzc3bFRjMjZ4IiwiaHRtIjoiUE9TVCIsImh0dSI6Imh0dHBzOi8vc2VydmVyLmV4YW1wbGUuY29tL3Rva2VuIiwiaWF0IjoxNTYyMjYyNjE2fQ.DlWrKDQE15d6lN14J525P877gT_pmYYKFwpFmUvs3uQ96wTHV-4ZdnozfXVmlHmpgF5DA_3Ld8x5iyS7MrOjhw] -23:18:25.560 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Problem processing jwk from JWS header (jwk header contains a private key, which it most definitely should not.)): JsonWebSignature{"alg":"ES256","typ":"dpop+jwt","jwk":{"kty":"EC","x":"76nY8PkSVA80iOPq3UEGnocuOGhQjGOkcPpbyWpsWmg","y":"00LZB2IcOxErkNZwcQX_dmudk-atORMKjDBTsUeMvoU","crv":"P-256","d":"IIbXpUbIHemOAreeQ_LM2akq7y66DcYluvgydOritJU"}}->eyJhbGciOiJFUzI1NiIsInR5cCI6ImRwb3Arand0IiwiandrIjp7Imt0eSI6IkVDIiwieCI6Ijc2blk4UGtTVkE4MGlPUHEzVUVHbm9jdU9HaFFqR09rY1BwYnlXcHNXbWciLCJ5IjoiMDBMWkIySWNPeEVya05ad2NRWF9kbXVkay1hdE9STUtqREJUc1VlTXZvVSIsImNydiI6IlAtMjU2IiwiZCI6IklJYlhwVWJJSGVtT0FyZWVRX0xNMmFrcTd5NjZEY1lsdXZneWRPcml0SlUifX0.eyJqdGkiOiJiYzc4OSIsImh0bSI6IkdFVCIsImh0dSI6Imh0dHBzOi8vYXBpLmV4YW1wbGUuY29tIiwiaWF0IjoxNjQ3OTU5MTMyfQ.-GKT4h58oZzS4LGk8b44Dh4GoJ9Y2extHUOr_LzbFIibO_XXfanPZ8ePZkXd8s7cuQyFKagePUVCdu1T2UKbTQ] -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.049 s - in org.jose4j.keys.resolvers.EmbeddedJwkVerificationKeyResolverTest -[INFO] Running org.jose4j.keys.resolvers.HttpsJwksVerificationKeyResolverTest -23:18:26.801 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -23:18:26.806 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} due to an unexpected exception (java.io.IOException: https://www.example.org/says 'no GET for you!') while obtaining or using keys from JWKS endpoint at https://www.example.org/ -23:18:26.812 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -23:18:26.814 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -23:18:26.814 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Tue May 07 00:18:26 GMT 2024 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] -23:18:26.872 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] -23:18:26.873 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -23:18:26.875 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -23:18:26.875 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Tue May 07 00:18:26 GMT 2024 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] -23:18:26.907 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] -23:18:26.907 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -23:18:26.908 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -23:18:26.908 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Tue May 07 00:18:26 GMT 2024 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] -23:18:26.923 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] obtained from https://www.example.org/ -23:18:26.923 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES384"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] -23:18:26.925 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -23:18:26.926 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -23:18:26.926 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Tue May 07 00:18:26 GMT 2024 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] -23:18:26.927 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] obtained from https://www.example.org/ -23:18:26.928 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -23:18:26.929 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -23:18:26.929 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Tue May 07 00:18:26 GMT 2024 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k1, x=1u9oeAkLQJcAnrv_m4fupf-lF43yFqmNjMsrukKDhEE, y=RG0cyWzinUl8NpfVVw2DqfH6zRqU_yF6aL1swssNv4E, crv=P-256}] -23:18:26.929 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256","kid":"k2"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k1, x=1u9oeAkLQJcAnrv_m4fupf-lF43yFqmNjMsrukKDhEE, y=RG0cyWzinUl8NpfVVw2DqfH6zRqU_yF6aL1swssNv4E, crv=P-256}] -23:18:26.929 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -23:18:26.930 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -23:18:26.930 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Tue May 07 00:18:26 GMT 2024 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] -23:18:26.930 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] -23:18:26.930 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -23:18:26.931 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -23:18:26.931 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Tue May 07 00:18:26 GMT 2024 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] -23:18:26.931 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] obtained from https://www.example.org/ -23:18:26.932 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://abc.bfe.xyz/ -23:18:26.932 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://abc.bfe.xyz/ -23:18:26.933 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://abc.bfe.xyz/ will be cached for 3600 seconds until about Tue May 07 00:18:26 GMT 2024 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] -23:18:26.943 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - We expected an exception out of the CustomHttpsJwksVerificationKeyResolver: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: There are multiple keys in the referenced JWK Set document, but the kid value was not provided in the JOSE Header.) while obtaining or using keys from JWKS endpoint at https://abc.bfe.xyz/ -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.345 s - in org.jose4j.keys.resolvers.HttpsJwksVerificationKeyResolverTest -[INFO] Running org.jose4j.keys.BigEndianBigIntegerTest -[INFO] Tests run: 19, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.275 s - in org.jose4j.keys.BigEndianBigIntegerTest -[INFO] Running org.jose4j.keys.KeyPairUtilTest -23:18:27.231 DEBUG org.jose4j.keys.KeyPairUtilTest - The following JWT and public key should be (and were on 11/11/15) usable and produce a valid result at jwt.io (related to http://stackoverflow.com/questions/32744172): -eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJtZWgiLCJleHAiOjE3MTUwMzg3MDcsImp0aSI6ImhMUGRKWmF2UDFiUDNDM3Q5UDVQS3ciLCJhdWQiOiJ5b3UiLCJpc3MiOiJtZSJ9.hmE7RhH9CiQ3paYXfjWIaux70C0Z_oAFbmHdvVVDQDJZ_jffTYhVYiPi-YCHThEHmCCD3c41bgBIvewdzeY1C-5uREIAKG2xkDrxq5lTmAC_dPszurx6OamCC6pTNCo4h94Gmt_Fr6Cfnp-ReWaIyuEShHh5mhL47JBS2i2DdfCwq4dzJX6Sswml0ZWbdRcOWXWI1420iaMcFCQU2Je89aEic3qWUYmYK8NHnhk7Z2brM3q4vF8j9RQTxSmNBC8VrLIqcuYIf0FsSb4v65QIs4Is8MKck8JZpBjbTb_UemjISVObHOakQj5arcaYsm_rrAuMx-Li3Fv57kP6ChtuJw ------BEGIN PUBLIC KEY----- -MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAoahUIoWw0K0usKNuOR6H -4wkf4oBUXHTxRvgb48E+BVvxkeDNjbC4he8rUWcJoZmds2h7M70imEVhRU5djINX -tqllXI4DFqcI1DgjT9LewND8MW2Krf3Spsk/ZkoFnilakGygTwpZ3uesH+PFABNI -UYpOiN15dsQRkgr0vEhxN92i2asbOenSZeyaxziK72UwxrrKoExv6kc5twXTq4h+ -QChLOln0/mtUZwfsRaMStPs6mS6XrgxnxbWhojf663tuEQueGC+FCMfra36C9knD -FGzKsNa7LZK2djYgyD3JR/MB/4NUJW/TqOQtwHYbxevoJArm+L5StowjzGy+/bq6 -GwIDAQAB ------END PUBLIC KEY----- -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s - in org.jose4j.keys.KeyPairUtilTest -[INFO] Running org.jose4j.keys.X509UtilTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.02 s - in org.jose4j.keys.X509UtilTest -[INFO] Running org.jose4j.jws.EcdsaUsingShaTest -23:18:27.279 DEBUG org.jose4j.jws.JwsTestSupport - ES384 eyJhbGciOiJFUzM4NCJ9.VGhlIHVtbGF1dCAoL8uIyoptbGHKinQvIFVVTS1sb3d0KSByZWZlcnMgdG8gYSBzb3VuZCBzaGlmdC4.Hqcm5JGIxmlfjZLs0Vz3beTmDMtYw4Fq4A98XJcbYgR3Lz56bg9GZmJVXvig9P_egOsqwjwzNaNoRE1416GQT68z5NzeaOTVCkrnUPMoYHnJ4KGCGp1nmnFKdEH-6awA -23:18:27.399 DEBUG org.jose4j.jws.JwsTestSupport - ES512 eyJhbGciOiJFUzUxMiJ9.Pz8_Pz8.Afn3-eh3iiAYQCr9w366aqR6LYfb3lmSkIU3V2sZoJNmWogMh21oNIZHcLabTuHsvCJuJg7PRdM3dtMIwZWFj_T3ABAkxG6xvTuLadUrPb4-OYRQDhSL94dQXlDRL0rAQPdTHskS20myTzuOPhqI-EiU9cZR7QrkRJCAmidYDYGK7cyQ -23:18:27.508 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -23:18:27.509 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -23:18:27.509 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -23:18:27.509 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA256withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl -23:18:27.509 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -23:18:27.510 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -23:18:27.510 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -23:18:27.510 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -23:18:27.510 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -23:18:27.512 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA384withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl -23:18:27.513 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -23:18:27.513 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -23:18:27.514 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -23:18:27.514 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -23:18:27.514 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -23:18:27.514 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA512withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl -23:18:27.514 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -23:18:27.515 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -23:18:27.515 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES256/SHA256withECDSA expects a key using P-256 but was P-521 -23:18:27.515 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES384/SHA384withECDSA expects a key using P-384 but was P-521 -23:18:27.516 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES384/SHA384withECDSA expects a key using P-384 but was P-256 -23:18:27.516 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES512/SHA512withECDSA expects a key using P-521 but was P-256 -23:18:27.545 DEBUG org.jose4j.jws.JwsTestSupport - ES512 eyJhbGciOiJFUzUxMiJ9.dG91Y2jDnw.AS2RnUkXYTldgnMdCmNFjyAm5wiqmOM0eOkJw5fp-OcrZ3FRkTuoEbenJc1WH18z_fB6VDdEhDd9GEReRDkaGbqCAOFmF99Kqol5789c_3xNGUMV8xqjuoSKZytDbBxUyXK6RGCRfaAAGUhu7nIXWWHmXeCvFE64dSiwJtuv0P0dSl7D -23:18:27.674 DEBUG org.jose4j.jws.JwsTestSupport - ES256 eyJhbGciOiJFUzI1NiJ9.UEFZTE9BRCEhIQ.A_erOmZw0elCgTp_Yn1KvNOZnpNWCLOyhz_GcsbbS-zb9rxXcxUm--llyH7DH-Amn9Xk7UamOIzM1wfXaNzxMw -23:18:27.709 DEBUG org.jose4j.jws.JwsTestSupport - ES256 eyJhbGciOiJFUzI1NiJ9.c29tZXRoaW5nIGhlcmU.X0JSUNtSUB0LhAMk-V0zKGAo-O-kyLVGHO6Xx-XwjGbPkDA9CyCV1Ms12IabyfZWxsDaHU52NlZAO1euMTuvmQ -[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.47 s - in org.jose4j.jws.EcdsaUsingShaTest -[INFO] Running org.jose4j.jws.JwsUnencodedPayloadOptionTest -23:18:27.763 DEBUG o.j.j.JwsUnencodedPayloadOptionTest - Expected exception because JWS Compact Serialization with unencoded non-detached payloads cannot have period ('.') characters : org.jose4j.lang.JoseException: per https://tools.ietf.org/html/rfc7797#section-5.2 when using the JWS Compact Serialization, unencoded non-detached payloads using period ('.') characters would cause parsing errors; such payloads MUST NOT be used with the JWS Compact Serialization. -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.028 s - in org.jose4j.jws.JwsUnencodedPayloadOptionTest -[INFO] Running org.jose4j.jws.DetachedContentTest -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.06 s - in org.jose4j.jws.DetachedContentTest -[INFO] Running org.jose4j.jws.HmacShaTest -23:18:27.840 DEBUG org.jose4j.jws.JwsTestSupport - HS256 eyJhbGciOiJIUzI1NiJ9.c29tZSBjb250ZW50IHRoYXQgaXMgdGhlIHBheWxvYWQ.qGO7O7W2ECVl6uO7lfsXDgEF-EUEti0i-a_AimulIRA -23:18:27.843 DEBUG org.jose4j.jws.JwsTestSupport - HS256 eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJodHRwczovL2p3dC1pZHAuZXhhbXBsZS5jb20iLAogICAgInBybiI6Im1haWx0bzptaWtlQGV4YW1wbGUuY29tIiwKICAgICJhdWQiOiJodHRwczovL2p3dC1ycC5leGFtcGxlLm5ldCIsCiAgICAiaWF0IjoxMzAwODE1NzgwLAogICAgImV4cCI6MTMwMDgxOTM4MCwKICAgICJodHRwOi8vY2xhaW1zLmV4YW1wbGUuY29tL21lbWJlciI6dHJ1ZX0.ZhkLsRIwT5xHXNgOpdFJ_7q5kqLd6sMiOOEV6kxTNCo -23:18:27.845 DEBUG org.jose4j.jws.JwsTestSupport - HS384 eyJhbGciOiJIUzM4NCJ9.eyJtZWgiOiJtZWgifQ.fptKQJmGN3fBP_FiQzdAGdmx-Q5iWjQvJrLfdmFnebxbQuzOmzejBrzYh4MyS01a -23:18:27.847 DEBUG org.jose4j.jws.JwsTestSupport - HS384 eyJhbGciOiJIUzM4NCJ9.TG9va2luZyBnb29kLCBCaWxseSBSYXkh.wtlqZW8_eLF3hjMZT9c_kzg133b2b_JsR44bHGshc4w_BEUJApKerwEw9cltL8w9 -23:18:27.853 DEBUG org.jose4j.jws.JwsTestSupport - HS512 eyJhbGciOiJIUzUxMiJ9.RmVlbGluZyBnb29kLCBMb3VpcyE.i4SAIaVYY4gxhqJxMvw3FKsar5RBCxzadaK2YT3HeeguWgJMLpDMu9cK1WxetjYmce49ZQmTxmB5nTbE_IgKHQ -23:18:27.857 DEBUG org.jose4j.jws.JwsTestSupport - HS512 eyJhbGciOiJIUzUxMiJ9.eyJtZWgiOiJtZWh2YWx1ZSJ9.NeB669dYkPmqgLqgd_sVqwIfCvb4XN-K67gpMJR93wfw_DylpxB1ell2opHM-E5P9jNKE2GYxTxwcI68Z2CTxw -23:18:27.860 DEBUG org.jose4j.jws.HmacShaTest - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 72 bits -23:18:27.860 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 384 bits for HS384) or larger MUST be used with the HMAC SHA algorithms but this key is only 376 bits -23:18:27.860 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 384 bits for HS384) or larger MUST be used with the HMAC SHA algorithms but this key is only 376 bits -23:18:27.860 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 512 bits for HS512) or larger MUST be used with the HMAC SHA algorithms but this key is only 504 bits -23:18:27.861 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 512 bits for HS512) or larger MUST be used with the HMAC SHA algorithms but this key is only 504 bits -23:18:27.861 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 8 bits -23:18:27.861 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 248 bits -23:18:27.861 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 248 bits -[INFO] Tests run: 16, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.027 s - in org.jose4j.jws.HmacShaTest -[INFO] Running org.jose4j.jws.CritHeaderTest -23:18:27.867 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'nope' marked as critical. -23:18:27.872 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: crit header value not an array (class java.lang.String). -23:18:27.872 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: crit header value not an array (class java.lang.Boolean). -23:18:27.872 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'http://example.com/UNDEFINED' marked as critical. -23:18:27.872 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'urn:example.com:nope' marked as critical. -23:18:27.877 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'urn:example.com:nope' marked as critical. -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.011 s - in org.jose4j.jws.CritHeaderTest -[INFO] Running org.jose4j.jws.RsaPssTest -23:18:27.885 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS -23:18:27.896 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS -23:18:27.908 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS -23:18:27.951 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS -23:18:27.962 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS -23:18:27.974 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS -23:18:28.010 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -23:18:28.010 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [BC version 1.77, SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... -23:18:28.010 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -23:18:28.023 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -23:18:28.035 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -23:18:28.047 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -23:18:28.063 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -23:18:28.077 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -23:18:28.090 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -23:18:28.102 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -23:18:28.126 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -23:18:28.142 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -23:18:28.169 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -23:18:28.173 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -23:18:28.177 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -23:18:28.178 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -23:18:28.212 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -23:18:28.226 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -23:18:28.287 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -23:18:28.287 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -23:18:28.291 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -23:18:28.292 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -23:18:28.292 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -23:18:28.300 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -23:18:28.309 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -23:18:28.316 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -23:18:28.323 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -23:18:28.331 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -23:18:28.331 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -23:18:28.331 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -23:18:28.362 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -23:18:28.372 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -23:18:28.374 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -23:18:28.374 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -23:18:28.374 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -23:18:28.374 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -23:18:28.374 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -23:18:28.375 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -23:18:28.376 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -23:18:28.376 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -23:18:28.376 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -23:18:28.376 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@53093491 registered for zip algorithm DEF -23:18:28.376 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -23:18:28.376 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 366ms -23:18:28.390 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS -23:18:28.405 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@2ca6546f):Signature object: SHA256withRSAandMGF1 -23:18:28.419 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS -23:18:28.440 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@7578e06a):Signature object: SHA384withRSAandMGF1 -23:18:28.450 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS -23:18:28.471 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@11a7ba62):Signature object: SHA512withRSAandMGF1 -23:18:28.482 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -23:18:28.482 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... -23:18:28.482 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -23:18:28.482 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -23:18:28.482 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -23:18:28.482 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -23:18:28.482 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -23:18:28.482 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -23:18:28.482 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -23:18:28.483 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -23:18:28.483 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -23:18:28.483 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -23:18:28.483 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -23:18:28.484 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -23:18:28.484 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -23:18:28.484 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -23:18:28.484 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -23:18:28.484 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -23:18:28.485 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -23:18:28.485 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -23:18:28.485 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -23:18:28.485 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -23:18:28.486 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -23:18:28.487 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -23:18:28.489 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -23:18:28.491 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -23:18:28.492 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -23:18:28.492 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -23:18:28.492 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -23:18:28.492 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -23:18:28.493 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -23:18:28.493 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -23:18:28.493 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -23:18:28.493 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -23:18:28.493 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -23:18:28.493 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -23:18:28.493 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -23:18:28.495 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -23:18:28.495 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -23:18:28.495 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -23:18:28.495 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -23:18:28.495 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@340b7ef6 registered for zip algorithm DEF -23:18:28.495 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -23:18:28.495 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 13ms -23:18:28.513 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -23:18:28.513 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [BC version 1.77, SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... -23:18:28.513 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -23:18:28.521 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -23:18:28.532 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -23:18:28.541 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -23:18:28.550 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -23:18:28.558 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -23:18:28.568 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -23:18:28.578 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -23:18:28.587 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -23:18:28.596 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -23:18:28.608 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|SHA256withRSAandMGF1) registered for alg algorithm PS256 -23:18:28.623 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|SHA384withRSAandMGF1) registered for alg algorithm PS384 -23:18:28.636 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|SHA512withRSAandMGF1) registered for alg algorithm PS512 -23:18:28.636 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -23:18:28.654 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -23:18:28.664 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -23:18:28.686 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -23:18:28.686 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -23:18:28.687 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -23:18:28.687 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -23:18:28.687 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -23:18:28.693 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -23:18:28.700 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -23:18:28.705 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -23:18:28.711 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -23:18:28.712 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -23:18:28.712 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -23:18:28.712 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -23:18:28.722 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -23:18:28.733 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -23:18:28.734 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -23:18:28.734 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -23:18:28.734 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -23:18:28.734 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -23:18:28.734 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -23:18:28.734 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -23:18:28.735 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -23:18:28.735 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -23:18:28.735 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -23:18:28.736 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@7b208b45 registered for zip algorithm DEF -23:18:28.736 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -23:18:28.736 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 223ms -23:18:28.736 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA256withRSAandMGF1 -23:18:28.747 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA384withRSAandMGF1 -23:18:28.758 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA512withRSAandMGF1 -23:18:28.768 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -23:18:28.769 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... -23:18:28.769 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -23:18:28.769 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -23:18:28.769 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -23:18:28.769 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -23:18:28.769 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -23:18:28.769 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -23:18:28.769 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -23:18:28.769 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -23:18:28.769 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -23:18:28.769 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -23:18:28.769 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -23:18:28.770 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -23:18:28.770 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -23:18:28.770 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -23:18:28.771 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -23:18:28.771 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -23:18:28.771 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -23:18:28.771 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -23:18:28.771 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -23:18:28.771 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -23:18:28.772 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -23:18:28.773 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -23:18:28.775 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -23:18:28.776 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -23:18:28.777 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -23:18:28.777 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -23:18:28.777 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -23:18:28.777 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -23:18:28.777 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -23:18:28.777 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -23:18:28.777 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -23:18:28.777 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -23:18:28.777 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -23:18:28.777 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -23:18:28.777 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -23:18:28.778 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -23:18:28.778 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -23:18:28.778 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -23:18:28.778 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -23:18:28.778 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@5bfc257 registered for zip algorithm DEF -23:18:28.778 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -23:18:28.778 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 9ms -23:18:28.832 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -23:18:28.832 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [BC version 1.77, SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... -23:18:28.832 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -23:18:28.840 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -23:18:28.849 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -23:18:28.858 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -23:18:28.867 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -23:18:28.875 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -23:18:28.884 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -23:18:28.894 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -23:18:28.903 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -23:18:28.911 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -23:18:28.922 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -23:18:28.926 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -23:18:28.928 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -23:18:28.928 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -23:18:28.947 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -23:18:28.957 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -23:18:28.977 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -23:18:28.977 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -23:18:28.977 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -23:18:28.977 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -23:18:28.977 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -23:18:28.983 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -23:18:28.990 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -23:18:28.996 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -23:18:29.003 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -23:18:29.003 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -23:18:29.004 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -23:18:29.004 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -23:18:29.014 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -23:18:29.023 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -23:18:29.023 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -23:18:29.023 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -23:18:29.023 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -23:18:29.023 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -23:18:29.023 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -23:18:29.027 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -23:18:29.027 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -23:18:29.027 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -23:18:29.027 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -23:18:29.027 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@3af356f registered for zip algorithm DEF -23:18:29.027 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -23:18:29.027 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 195ms -23:18:29.063 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -23:18:29.063 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... -23:18:29.063 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -23:18:29.063 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -23:18:29.063 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -23:18:29.063 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -23:18:29.063 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -23:18:29.063 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -23:18:29.063 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -23:18:29.063 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -23:18:29.063 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -23:18:29.063 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -23:18:29.064 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -23:18:29.064 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -23:18:29.065 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -23:18:29.065 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -23:18:29.065 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -23:18:29.065 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -23:18:29.065 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -23:18:29.065 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -23:18:29.066 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -23:18:29.066 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -23:18:29.066 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -23:18:29.067 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -23:18:29.068 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -23:18:29.069 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -23:18:29.071 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -23:18:29.071 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -23:18:29.071 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -23:18:29.071 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -23:18:29.071 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -23:18:29.071 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -23:18:29.071 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -23:18:29.072 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -23:18:29.072 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -23:18:29.072 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -23:18:29.072 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -23:18:29.072 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -23:18:29.072 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -23:18:29.072 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -23:18:29.072 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -23:18:29.072 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@51751e5f registered for zip algorithm DEF -23:18:29.072 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -23:18:29.072 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 9ms -23:18:29.090 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -23:18:29.091 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [BC version 1.77, SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... -23:18:29.091 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -23:18:29.100 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -23:18:29.109 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -23:18:29.122 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -23:18:29.135 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -23:18:29.148 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -23:18:29.159 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -23:18:29.169 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -23:18:29.178 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -23:18:29.188 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -23:18:29.199 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|SHA256withRSAandMGF1) registered for alg algorithm PS256 -23:18:29.212 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|SHA384withRSAandMGF1) registered for alg algorithm PS384 -23:18:29.224 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|SHA512withRSAandMGF1) registered for alg algorithm PS512 -23:18:29.225 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -23:18:29.243 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -23:18:29.253 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -23:18:29.273 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -23:18:29.273 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -23:18:29.273 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -23:18:29.273 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -23:18:29.274 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -23:18:29.280 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -23:18:29.286 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -23:18:29.292 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -23:18:29.298 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -23:18:29.298 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -23:18:29.298 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -23:18:29.298 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -23:18:29.308 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -23:18:29.317 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -23:18:29.317 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -23:18:29.318 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -23:18:29.318 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -23:18:29.318 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -23:18:29.318 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -23:18:29.318 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -23:18:29.318 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -23:18:29.318 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -23:18:29.319 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -23:18:29.319 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@38548b19 registered for zip algorithm DEF -23:18:29.319 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -23:18:29.319 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 228ms -23:18:29.342 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -23:18:29.342 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... -23:18:29.342 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -23:18:29.342 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -23:18:29.342 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -23:18:29.342 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -23:18:29.342 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -23:18:29.342 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -23:18:29.342 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -23:18:29.342 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -23:18:29.342 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -23:18:29.342 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -23:18:29.343 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -23:18:29.343 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -23:18:29.343 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -23:18:29.343 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -23:18:29.344 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -23:18:29.344 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -23:18:29.344 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -23:18:29.344 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -23:18:29.344 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -23:18:29.344 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -23:18:29.344 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -23:18:29.346 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -23:18:29.347 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -23:18:29.348 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -23:18:29.350 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -23:18:29.350 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -23:18:29.350 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -23:18:29.350 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -23:18:29.350 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -23:18:29.350 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -23:18:29.350 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -23:18:29.351 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -23:18:29.351 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -23:18:29.351 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -23:18:29.351 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -23:18:29.351 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -23:18:29.354 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -23:18:29.355 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -23:18:29.355 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -23:18:29.355 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@31fc71ab registered for zip algorithm DEF -23:18:29.355 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -23:18:29.355 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 13ms -23:18:29.398 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -23:18:29.398 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [BC version 1.77, SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... -23:18:29.398 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -23:18:29.408 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -23:18:29.419 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -23:18:29.428 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -23:18:29.438 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -23:18:29.448 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -23:18:29.457 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -23:18:29.465 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -23:18:29.475 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -23:18:29.484 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -23:18:29.496 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -23:18:29.499 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -23:18:29.501 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -23:18:29.501 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -23:18:29.520 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -23:18:29.529 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -23:18:29.549 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -23:18:29.549 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -23:18:29.549 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -23:18:29.549 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -23:18:29.550 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -23:18:29.555 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -23:18:29.561 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -23:18:29.568 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -23:18:29.574 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -23:18:29.574 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -23:18:29.574 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -23:18:29.574 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -23:18:29.583 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -23:18:29.593 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -23:18:29.593 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -23:18:29.598 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -23:18:29.598 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -23:18:29.598 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -23:18:29.598 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -23:18:29.599 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -23:18:29.599 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -23:18:29.599 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -23:18:29.603 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -23:18:29.603 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@4078695f registered for zip algorithm DEF -23:18:29.603 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -23:18:29.603 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 205ms -23:18:29.606 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -23:18:29.606 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... -23:18:29.606 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -23:18:29.606 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -23:18:29.606 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -23:18:29.606 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -23:18:29.606 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -23:18:29.606 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -23:18:29.606 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -23:18:29.606 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -23:18:29.606 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -23:18:29.606 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -23:18:29.607 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -23:18:29.608 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -23:18:29.608 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -23:18:29.608 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -23:18:29.608 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -23:18:29.608 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -23:18:29.609 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -23:18:29.609 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -23:18:29.609 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -23:18:29.609 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -23:18:29.609 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -23:18:29.610 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -23:18:29.611 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -23:18:29.612 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -23:18:29.613 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -23:18:29.613 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -23:18:29.613 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -23:18:29.613 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -23:18:29.613 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -23:18:29.614 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -23:18:29.614 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -23:18:29.614 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -23:18:29.615 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -23:18:29.615 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -23:18:29.615 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -23:18:29.615 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -23:18:29.615 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -23:18:29.615 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -23:18:29.615 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -23:18:29.615 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@79a1728c registered for zip algorithm DEF -23:18:29.615 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -23:18:29.615 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 9ms -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.73 s - in org.jose4j.jws.RsaPssTest -[INFO] Running org.jose4j.jws.JwsUsingEcdsaP256Sha256ExampleTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.006 s - in org.jose4j.jws.JwsUsingEcdsaP256Sha256ExampleTest -[INFO] Running org.jose4j.jws.PublicKeyAsHmacKeyTest -23:18:29.667 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -23:18:29.667 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [BC version 1.77, SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... -23:18:29.667 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -23:18:29.676 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -23:18:29.685 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -23:18:29.693 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -23:18:29.702 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -23:18:29.711 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -23:18:29.719 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -23:18:29.728 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -23:18:29.738 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -23:18:29.747 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -23:18:29.759 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -23:18:29.761 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -23:18:29.763 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -23:18:29.763 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -23:18:29.783 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -23:18:29.794 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -23:18:29.812 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -23:18:29.812 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -23:18:29.813 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -23:18:29.813 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -23:18:29.813 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -23:18:29.819 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -23:18:29.825 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -23:18:29.832 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -23:18:29.838 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -23:18:29.838 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -23:18:29.838 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -23:18:29.838 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -23:18:29.849 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -23:18:29.859 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -23:18:29.859 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -23:18:29.859 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -23:18:29.859 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -23:18:29.859 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -23:18:29.859 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -23:18:29.860 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -23:18:29.860 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -23:18:29.860 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -23:18:29.860 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -23:18:29.860 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@57c88764 registered for zip algorithm DEF -23:18:29.860 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -23:18:29.860 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 193ms -23:18:29.863 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. -23:18:29.863 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -23:18:29.863 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... -23:18:29.863 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -23:18:29.863 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -23:18:29.863 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -23:18:29.863 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -23:18:29.864 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -23:18:29.864 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -23:18:29.864 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -23:18:29.864 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -23:18:29.864 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -23:18:29.864 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -23:18:29.864 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -23:18:29.864 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -23:18:29.865 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -23:18:29.865 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -23:18:29.865 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -23:18:29.865 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -23:18:29.865 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -23:18:29.866 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -23:18:29.866 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -23:18:29.866 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -23:18:29.866 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -23:18:29.867 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -23:18:29.868 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -23:18:29.869 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -23:18:29.870 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -23:18:29.870 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -23:18:29.870 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -23:18:29.870 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -23:18:29.871 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -23:18:29.871 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -23:18:29.871 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -23:18:29.871 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -23:18:29.871 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -23:18:29.871 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -23:18:29.871 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -23:18:29.871 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -23:18:29.871 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -23:18:29.871 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -23:18:29.871 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -23:18:29.872 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@78c1a023 registered for zip algorithm DEF -23:18:29.872 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -23:18:29.872 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 9ms -23:18:29.888 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -23:18:29.888 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [BC version 1.77, SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... -23:18:29.888 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -23:18:29.898 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -23:18:29.907 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -23:18:29.917 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -23:18:29.926 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -23:18:29.934 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -23:18:29.944 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -23:18:29.953 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -23:18:29.961 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -23:18:29.970 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -23:18:29.982 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -23:18:29.985 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -23:18:29.987 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -23:18:29.988 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -23:18:30.006 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -23:18:30.017 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -23:18:30.038 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -23:18:30.038 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -23:18:30.038 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -23:18:30.038 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -23:18:30.038 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -23:18:30.044 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -23:18:30.050 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -23:18:30.056 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -23:18:30.061 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -23:18:30.062 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -23:18:30.062 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -23:18:30.062 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -23:18:30.072 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -23:18:30.080 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -23:18:30.081 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -23:18:30.081 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -23:18:30.081 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -23:18:30.081 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -23:18:30.081 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -23:18:30.081 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -23:18:30.081 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -23:18:30.082 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -23:18:30.082 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -23:18:30.082 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@476ec9d0 registered for zip algorithm DEF -23:18:30.082 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -23:18:30.082 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 194ms -23:18:30.083 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. -23:18:30.083 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -23:18:30.083 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... -23:18:30.083 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -23:18:30.083 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -23:18:30.083 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -23:18:30.083 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -23:18:30.083 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -23:18:30.083 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -23:18:30.083 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -23:18:30.083 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -23:18:30.083 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -23:18:30.083 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -23:18:30.084 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -23:18:30.084 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -23:18:30.085 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -23:18:30.085 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -23:18:30.085 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -23:18:30.085 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -23:18:30.086 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -23:18:30.086 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -23:18:30.086 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -23:18:30.086 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -23:18:30.086 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -23:18:30.087 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -23:18:30.088 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -23:18:30.088 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -23:18:30.090 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -23:18:30.090 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -23:18:30.090 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -23:18:30.090 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -23:18:30.091 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -23:18:30.091 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -23:18:30.091 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -23:18:30.091 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -23:18:30.091 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -23:18:30.091 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -23:18:30.091 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -23:18:30.091 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -23:18:30.092 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -23:18:30.092 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -23:18:30.092 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -23:18:30.092 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@325bb9a6 registered for zip algorithm DEF -23:18:30.092 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -23:18:30.092 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 9ms -23:18:30.108 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -23:18:30.108 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [BC version 1.77, SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... -23:18:30.108 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -23:18:30.117 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -23:18:30.127 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -23:18:30.136 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -23:18:30.146 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -23:18:30.155 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -23:18:30.164 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -23:18:30.173 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -23:18:30.182 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -23:18:30.191 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -23:18:30.203 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -23:18:30.205 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -23:18:30.208 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -23:18:30.208 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -23:18:30.227 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -23:18:30.237 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -23:18:30.259 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -23:18:30.259 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -23:18:30.259 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -23:18:30.259 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -23:18:30.259 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -23:18:30.266 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -23:18:30.273 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -23:18:30.281 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -23:18:30.288 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -23:18:30.289 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -23:18:30.289 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -23:18:30.289 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -23:18:30.298 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -23:18:30.308 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -23:18:30.309 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -23:18:30.309 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -23:18:30.309 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -23:18:30.309 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -23:18:30.309 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -23:18:30.309 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -23:18:30.310 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -23:18:30.310 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -23:18:30.310 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -23:18:30.310 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@43effd89 registered for zip algorithm DEF -23:18:30.310 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -23:18:30.310 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 202ms -23:18:30.311 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. -23:18:30.311 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -23:18:30.311 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... -23:18:30.311 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -23:18:30.311 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -23:18:30.311 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -23:18:30.311 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -23:18:30.311 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -23:18:30.312 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -23:18:30.312 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -23:18:30.312 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -23:18:30.312 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -23:18:30.312 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -23:18:30.313 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -23:18:30.313 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -23:18:30.314 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -23:18:30.314 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -23:18:30.314 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -23:18:30.314 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -23:18:30.315 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -23:18:30.315 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -23:18:30.315 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -23:18:30.315 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -23:18:30.315 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -23:18:30.316 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -23:18:30.317 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -23:18:30.318 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -23:18:30.319 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -23:18:30.319 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -23:18:30.319 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -23:18:30.319 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -23:18:30.319 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -23:18:30.320 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -23:18:30.320 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -23:18:30.320 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -23:18:30.320 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -23:18:30.320 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -23:18:30.320 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -23:18:30.320 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -23:18:30.320 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -23:18:30.321 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -23:18:30.321 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -23:18:30.321 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@2c16fadb registered for zip algorithm DEF -23:18:30.321 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -23:18:30.321 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 10ms -23:18:30.337 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -23:18:30.337 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [BC version 1.77, SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... -23:18:30.337 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -23:18:30.348 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -23:18:30.359 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -23:18:30.369 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -23:18:30.378 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -23:18:30.387 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -23:18:30.396 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -23:18:30.404 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -23:18:30.414 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -23:18:30.423 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -23:18:30.434 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -23:18:30.436 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -23:18:30.438 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -23:18:30.438 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -23:18:30.458 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -23:18:30.469 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -23:18:30.494 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -23:18:30.494 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -23:18:30.494 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -23:18:30.494 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -23:18:30.494 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -23:18:30.500 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -23:18:30.508 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -23:18:30.515 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -23:18:30.521 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -23:18:30.521 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -23:18:30.521 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -23:18:30.521 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -23:18:30.533 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -23:18:30.544 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -23:18:30.544 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -23:18:30.544 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -23:18:30.544 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -23:18:30.544 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -23:18:30.544 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -23:18:30.545 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -23:18:30.545 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -23:18:30.545 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -23:18:30.545 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -23:18:30.545 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@4e628b52 registered for zip algorithm DEF -23:18:30.546 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -23:18:30.546 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 209ms -23:18:30.546 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. -23:18:30.546 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -23:18:30.546 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 17.0.11 from Debian at /usr/lib/jvm/java-17-openjdk-amd64 with [SUN version 17, SunRsaSign version 17, SunEC version 17, SunJSSE version 17, SunJCE version 17, SunJGSS version 17, SunSASL version 17, XMLDSig version 17, SunPCSC version 17, JdkLDAP version 17, JdkSASL version 17, SunPKCS11 version 17] security providers installed)... -23:18:30.546 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -23:18:30.546 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -23:18:30.546 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -23:18:30.546 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -23:18:30.546 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -23:18:30.546 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -23:18:30.546 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -23:18:30.546 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -23:18:30.546 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -23:18:30.547 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -23:18:30.547 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -23:18:30.547 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -23:18:30.548 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -23:18:30.548 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -23:18:30.548 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -23:18:30.548 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -23:18:30.549 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -23:18:30.549 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -23:18:30.549 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -23:18:30.549 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -23:18:30.549 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -23:18:30.550 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -23:18:30.551 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -23:18:30.552 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -23:18:30.553 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -23:18:30.553 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -23:18:30.554 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -23:18:30.554 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -23:18:30.554 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -23:18:30.554 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -23:18:30.554 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -23:18:30.554 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -23:18:30.554 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -23:18:30.554 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -23:18:30.554 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -23:18:30.555 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -23:18:30.555 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -23:18:30.555 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -23:18:30.555 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -23:18:30.555 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@51ec2df1 registered for zip algorithm DEF -23:18:30.555 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -23:18:30.555 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 9ms -23:18:30.567 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. -23:18:30.567 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. -23:18:30.573 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. -23:18:30.574 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.944 s - in org.jose4j.jws.PublicKeyAsHmacKeyTest -[INFO] Running org.jose4j.jws.JwsCryptoPrimitiveTest -23:18:30.575 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getSignature(): Signature object: SHA256withECDSA -23:18:30.582 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getSignature(): Signature object: SHA256withRSA -23:18:30.593 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getMac(): javax.crypto.Mac@f8f56b9 -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.016 s - in org.jose4j.jws.JwsCryptoPrimitiveTest -[INFO] Running org.jose4j.jws.MaintainEncodedPayloadAndHeaderTest -23:18:30.597 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", - "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9X.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -23:18:30.597 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", - "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9===.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -23:18:30.600 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", - "alg":"HS256"}->!!!!eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jws.MaintainEncodedPayloadAndHeaderTest -[INFO] Running org.jose4j.jws.EcdsaUsingShaEdgesTest -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.25 s - in org.jose4j.jws.EcdsaUsingShaEdgesTest -[INFO] Running org.jose4j.jws.GetPayloadTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jws.GetPayloadTest -[INFO] Running org.jose4j.jws.JwsPlaintextTest -23:18:30.860 DEBUG org.jose4j.jws.JwsPlaintextTest - {"auth_time":1339613248,"exp":1339613548,"iss":"https:\/\/example.com","aud":"a","jti":"jIA8qa35AroV6iP2q4wRAl","user_id":"john","iat":1339613248,"acr":3} -[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jws.JwsPlaintextTest -[INFO] Running org.jose4j.jws.EcdsaUsingShaAlgorithmTest -[0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 2] -[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.05 s - in org.jose4j.jws.EcdsaUsingShaAlgorithmTest -[INFO] Running org.jose4j.jws.JwsUsingHmacSha256ExampleTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jws.JwsUsingHmacSha256ExampleTest -[INFO] Running org.jose4j.jws.JwsUsingEcdsaP521Sha512ExampleTest -Payload -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.036 s - in org.jose4j.jws.JwsUsingEcdsaP521Sha512ExampleTest -[INFO] Running org.jose4j.jws.ChangingKeyTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jws.ChangingKeyTest -[INFO] Running org.jose4j.jws.JwsUsingRsaSha256ExampleTest -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.008 s - in org.jose4j.jws.JwsUsingRsaSha256ExampleTest -[INFO] Running org.jose4j.jws.JwsPayloadVariationsTest -23:18:31.015 DEBUG o.j.jws.JwsPayloadVariationsTest - Expected: org.jose4j.lang.IntegrityException: JWS signature is invalid. -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.034 s - in org.jose4j.jws.JwsPayloadVariationsTest -[INFO] Running org.jose4j.jws.RsaUsingShaTest -23:18:31.119 DEBUG org.jose4j.jws.JwsTestSupport - RS256 eyJhbGciOiJSUzI1NiJ9.UEFZTE9BRCEhIQ.UAGakfAw_yfIyJOIh9h1KwCGm0P1dzMxJzVA32aWSOiUFXHmcd3vaq3hslPi6FEEC_E4TjqTAius33eEH_4-GRP7X3hueEqFYIpa-m_PZYochn7SD8WMRTRUfoJ8Ru94kmnoRHpbMpsjn0uz61IqoN93CgBr7rhENM2H6t2mgSbqoVy9bpStiEdsDcjOhCO9oQT385KDEUfZfXoMcY3hsI7s6m6hr4srXfkSL9AeAX8d8P6jA9H3JDZKsARuHSctX-Jh2CtydG-uBn6zwXRuMouIXzbRmRI7sq6Zy2Y76USxwG7xL6tglNfltghbsW5pIwtUFE-RSVEpzbfwbJkpcg -23:18:31.136 DEBUG org.jose4j.jws.JwsTestSupport - RS384 eyJhbGciOiJSUzM4NCJ9.UEFZTE9BRCEh.O0csc8ZslCTZkSnMx3qBn8CfLP_XVb4ZnVxTwkJOpXU90wo_CoYVhiuEUIxWGEOxi88jov7fHJLu-lQotVlcmG9UJb1fhXEuU45pbolbC9fGaPiGOrnnvGIqJZSGPZt2qb8KZqivtHg9_YCle2St9FRTgN0vniSNfX17cTWpGSuYvBhK6sWnMkahvThJudbWNAguUFfeybCU43MPFN1iWTY8Y23RZmBIQmek44tDo_qnhd1q8-BEVmu2S0AbFh7EpdELL6Nv40xYTESsS6d66YJp-oBMHDXaM1xTJ6EM34Vsw9ZQjc_p4-ax4S3dUKVwyjIXaTQZBP-0m3YK7oP19w -23:18:31.151 DEBUG org.jose4j.jws.JwsTestSupport - RS512 eyJhbGciOiJSUzUxMiJ9.UEFZTE9BRCE.mia0ntnbAUlqZAyaO4vRdBDr1RSDdG0UVW3pzsMXXbvMia6fT8u4F04Bnzb48070PFx0JtlsbMvlo3ylDeBg2v82v4o_vnQF_190y0pEl9VhnLFicBvMvlZj2IGCgSAY29SDN-8pzN56msyOt5HTP38sPmCvAhbgooJqVFAebM4-vX_WRCv0pCUMmA33LQn1PTfpx38feDB9JMUINrobfMJ5b-Bztjdr8Wb3hrYHh_-wc44uDtGEGzYeWQITyxFHEVt9X_t9v5MJIWOWqPHKwa7XVy7pwiQbVSKBnf68ne99H1D_WayQuhFmr0956t1pFPQuZ_PoDZZnIIsLHPKfWg -23:18:31.188 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -23:18:31.189 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -23:18:31.189 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -23:18:31.189 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -23:18:31.189 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -23:18:31.189 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -23:18:31.189 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -23:18:31.190 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -23:18:31.190 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -23:18:31.190 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -23:18:31.190 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -23:18:31.190 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -23:18:31.190 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -23:18:31.190 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -23:18:31.190 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA384withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -23:18:31.191 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA384withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -23:18:31.191 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -23:18:31.191 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -23:18:31.191 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -23:18:31.191 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -23:18:31.191 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -23:18:31.191 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -23:18:31.192 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -23:18:31.192 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA512withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -23:18:31.192 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA512withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -23:18:31.192 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -23:18:31.192 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.176 s - in org.jose4j.jws.RsaUsingShaTest -[INFO] Running org.jose4j.cookbook.JoseCookbookTest -[INFO] Tests run: 22, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.458 s - in org.jose4j.cookbook.JoseCookbookTest +[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.jwk.JsonWebKeySetTest +[INFO] Running org.jose4j.jwk.EcJwkGeneratorTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.014 s - in org.jose4j.jwk.EcJwkGeneratorTest [INFO] Running org.jose4j.json.JsonUtilTest -{"char array":["a","\\","\""],"some object":"java.lang.Object@6093d508","nested":{"chars":["\"","m","e","h"]},"nested also":{"obj":"java.util.Random@13047d7d"}} -23:18:31.661 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.util.Map (java.util.ArrayList and java.util.Map are in module java.base of loader 'bootstrap') -23:18:31.661 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.Boolean cannot be cast to class java.util.Map (java.lang.Boolean and java.util.Map are in module java.base of loader 'bootstrap') -23:18:31.661 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.String cannot be cast to class java.util.Map (java.lang.String and java.util.Map are in module java.base of loader 'bootstrap') -23:18:31.661 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.Long cannot be cast to class java.util.Map (java.lang.Long and java.util.Map are in module java.base of loader 'bootstrap') -23:18:31.662 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Parsing returned null +{"char array":["a","\\","\""],"some object":"java.lang.Object@215a34b4","nested":{"chars":["\"","m","e","h"]},"nested also":{"obj":"java.util.Random@77bd7fe7"}} +05:44:47.869 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.util.Map (java.util.ArrayList and java.util.Map are in module java.base of loader 'bootstrap') +05:44:47.869 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.Boolean cannot be cast to class java.util.Map (java.lang.Boolean and java.util.Map are in module java.base of loader 'bootstrap') +05:44:47.869 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.String cannot be cast to class java.util.Map (java.lang.String and java.util.Map are in module java.base of loader 'bootstrap') +05:44:47.869 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.Long cannot be cast to class java.util.Map (java.lang.Long and java.util.Map are in module java.base of loader 'bootstrap') +05:44:47.869 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Parsing returned null [INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s - in org.jose4j.json.JsonUtilTest -[INFO] Running org.jose4j.jwa.AlgorithmConstraintsTest -[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwa.AlgorithmConstraintsTest -[INFO] Running org.jose4j.jwa.AlgorithmFactoryTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwa.AlgorithmFactoryTest -[INFO] Running org.jose4j.zip.DeflateRFC1951CompressionAlgorithmTest -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.zip.DeflateRFC1951CompressionAlgorithmTest -[INFO] Running org.jose4j.examples.ExamplesTest -eyJhbGciOiJFUzI1NiJ9.VGhpcyBpcyBzb21lIHRleHQgdGhhdCBpcyB0byBiZSBzaWduZWQu.sYPiuXpYDTeBX8F2pMiBPJoFnq0Bv4ncsoR4GxH2L7CFl97CpUJXUXF5mhWGXJo56FqdrjK_fIhtnjpS_b6KYQ -JWS Signature is valid: true -JWS payload: PAYLOAD! -Serialized Encrypted JWE: eyJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.1ETA_-_rKyjLMNMSvEuWH3G3Qt-W2JsiSxgy38EnBU0uw2OD8dPgqw.ziaQlUSHQHuEyoW0O7W5ZA.nEpAJLcdHmttsikuzOMdXw.uKZoZXgXQPvRitYTug6ByQ -Payload: Hello World! -JWS Signature is valid: true -JWS payload: This is some text that is to be signed. -JWT: eyJraWQiOiJrMSIsImFsZyI6IlJTMjU2In0.eyJpc3MiOiJJc3N1ZXIiLCJhdWQiOiJBdWRpZW5jZSIsImV4cCI6MTcxNTAzODExMSwianRpIjoiUEtGWEFBVEIxTmJIOFZEYVUyWVBfUSIsImlhdCI6MTcxNTAzNzUxMSwibmJmIjoxNzE1MDM3MzkxLCJzdWIiOiJzdWJqZWN0IiwiZW1haWwiOiJtYWlsQGV4YW1wbGUuY29tIiwiZ3JvdXBzIjpbImdyb3VwLW9uZSIsIm90aGVyLWdyb3VwIiwiZ3JvdXAtdGhyZWUiXX0.UCAxs-tZYaN_GD3-UB44Ekz9RD6q8wliSGoonSv8pBbofuUOxMS_y9ea7v6sTQml-5luNlBwXqZdVx93XeV0Fo5t32hnVmlkFCNnXMOFTlLr67Vn1JW_m-m2aLphWS86fH9NK6lHFAZSOOjVVy_JCVI5QQDEmfFc3BnWxHnqMVIwTVBlCLwcEnWGqMq2GnSr0nGzMj0AEkZRWwmEAlYvg775E0NktwVipWv_0UpDvP2aj3LsTIjAmNJRyJoX9wianTWsT9z_z2Ncqtj9xvstXEu5XAUfifX6E5HGbjqUlks6i1s9Mw7QN9-z_K6vdeutAONXEiaw9Y_B0IdqEe9acw -JWT validation succeeded! JWT Claims Set:{iss=Issuer, aud=Audience, exp=1715038111, jti=PKFXAATB1NbH8VDaU2YP_Q, iat=1715037511, nbf=1715037391, sub=subject, email=mail@example.com, groups=[group-one, other-group, group-three]} -JWT: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJyZWNlaXZlcidzIGtleSIsImN0eSI6IkpXVCIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJBcUhFbXV3R0RyUDJhUFdyQkNMQnpVbXNIc1VQdEIyUGFfS1hDTlF0VmxrIiwieSI6Ik9sdnoxRnhyM2FPTnV3Q015SEd5Qm8tVjcxYmcteWJubjZzQ0IyNGFPMk0iLCJjcnYiOiJQLTI1NiJ9fQ.CfbXcQluYXPHKxjs-KAjjRet7r5k20tWIWKeCW1POstSH0ps0D_3Ug.pZLK-ddUKMsszl36ePAaxQ.Acwcmw8XYkcs3h0tal1T75ieXMePITLE9K_ub0vDU5sW-VjD9W4T_px9sxULGVtdXTieEcuVRj0EViJ376d0ErJwqTjtAuTeIZPFrSWhMuOYnPG1xGD7mB7zzdRcsFYsAKO6uTskZs5HASzxRYbHxpXm1YHftDCPsNfg1PSbnScoa7M4bU8LPXz0Iv4AQx7qfmYVF22Kw1qIDKo3D_OvSKslspYPAz5j851JdQKoewjUUngPlZMG_SZqwAj-WyLmj5L9QRAxUUztatGlOZj8Z3agUreaiMzf1igavP1_xerfZPKfa-uZfZQd1odlfxa49CXd8VE_IyJFyfoQewbp10cVvebeD9lX0gEJt_vBs8Lx-plLIxy91136hMU0t1gH75dtaDhxVp_2Kq8AsUln08o-WWLQc3rSB-fwiWvbWuVO4RwRk-dSpFl7gTfq4-LKq6mzpbHY7qwxZRDEbnmVgVyrpC3jMq7ZvCC31UKpXWRLWBhPWeHNIgEcHolroRTkOV8s8l06fVfvhOaBBOpbGevKz6DkbDzdces2YNh66_U.IO-0Pzw3uxwDGbOm7hu2wg -JWT validation succeeded! JWT Claims Set:{iss=sender, aud=receiver, exp=1715038111, jti=dIsPjzF_AyqK4OLa2NlS7Q, iat=1715037511, nbf=1715037391, sub=subject, email=mail@example.com, groups=[group-1, other-group, group-3]} -JWE compact serialization: eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..F_FH4lE6qI9lMFBAEkuR5Q.fZAavfbjfstMK6tJvCNmUtI7w8tZwa_0S6rPDhWYbmOUrznAbA-67EHNSwAhpi2t9qSSqJbpR6wcKPEYfj0u4A.S1mUrn5defBcROXRxQLL2w -plaintext: Well, as of this moment, they're on DOUBLE SECRET PROBATION! -eyJhbGciOiJFUzI1NiIsImtpZCI6ImV4YW1wbGUiLCJiNjQiOmZhbHNlLCJjcml0IjpbImI2NCJdfQ..UujuM_KKPLkaQHgzt9nM6UnokRX0Ii2YboPkDiFWONjbklZxABKkyiSbJCRHq2DdQNdofoZsNIg9S5pJGNQlkA -this is the content that will be signed -JWS Signature is valid: true -[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.22 s - in org.jose4j.examples.ExamplesTest -[INFO] Running org.jose4j.jwt.JwtClaimsTest -[INFO] Tests run: 38, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.013 s - in org.jose4j.jwt.JwtClaimsTest -[INFO] Running org.jose4j.jwt.consumer.GoogsTooSmallKeyJwtConsumerTest -23:18:31.925 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits).): JsonWebSignature{"alg":"RS256","kid":"76fd32aec7e0f8c190dda8b9dd85e7cf5ad33c43"}->eyJhbGciOiJSUzI1NiIsImtpZCI6Ijc2ZmQzMmFlYzdlMGY4YzE5MGRkYThiOWRkODVlN2NmNWFkMzNjNDMifQ.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_aWQ9QUl0T2F3bGIxSEhFZFJJZW00d2Z1MXFNY1BUdWZvUDZzTi11ZVVrIiwiaWF0IjoxNDMxNjEyMjM4LCJleHAiOjE0MzE2MTU4Mzh9.RRMVpR9WJrkddegS4uKNT7rTov-LvRQ9sCtGo_SXrqkNbLZgArSJcmmHHxoQDsVWUjl2ZNG-7ZjDRuMu-POJLR4GHpwmQ8gttAEeywkiW4in5pUOb21AdgH29HDwG2mY6iVavsASHRutK747gURRlpt3wUJOJk00T9W2N0fVsTE] -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwt.consumer.GoogsTooSmallKeyJwtConsumerTest -[INFO] Running org.jose4j.jwt.consumer.ExamplesFromOpenIdConnectTest -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwt.consumer.ExamplesFromOpenIdConnectTest -[INFO] Running org.jose4j.jwt.consumer.TypeValidatorTest -23:18:31.944 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.944 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.944 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.944 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.944 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.944 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.944 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.944 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.944 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.945 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.945 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.945 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.945 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.945 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.945 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.945 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.945 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.945 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.945 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.945 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.945 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.945 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.945 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.945 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.945 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.945 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.945 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.945 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.945 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.946 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.946 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.946 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.946 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.946 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.946 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.946 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.946 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.946 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.946 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.946 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.946 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.946 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.946 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.946 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.946 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.946 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.946 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.946 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.946 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.947 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.947 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.947 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.947 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.947 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.947 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.947 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -23:18:31.947 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type 'application/noway)' isn't a valid media type in this context. -23:18:31.947 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '/' isn't a valid media type in this context. -23:18:31.947 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '/dpop+jwt' isn't a valid media type in this context. -23:18:31.947 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '' isn't a valid media type in this context. -23:18:31.947 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type -23:18:31.947 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type -23:18:31.947 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type -23:18:31.947 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.947 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.948 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.948 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.948 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.948 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.948 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.948 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.948 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -23:18:31.948 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -23:18:31.948 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE -23:18:31.948 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.948 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.948 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.948 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.948 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.948 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.948 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.948 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.948 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -23:18:31.948 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -23:18:31.948 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.948 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.948 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.948 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.948 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.948 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.949 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.949 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.949 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -23:18:31.949 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -23:18:31.949 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE -23:18:31.949 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.949 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.949 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.949 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.949 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.949 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.949 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.949 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.949 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -23:18:31.949 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -23:18:31.949 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.949 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.949 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.949 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.949 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.949 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.949 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.950 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.950 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -23:18:31.950 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -23:18:31.950 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE -23:18:31.950 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.950 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.950 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.950 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.950 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.950 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.950 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.950 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.950 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -23:18:31.950 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -23:18:31.950 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.950 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.950 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.950 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.950 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.950 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.950 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.950 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.951 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -23:18:31.951 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -23:18:31.953 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE -23:18:31.953 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.953 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.953 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.953 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.953 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.953 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.953 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.953 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -23:18:31.953 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -23:18:31.953 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.016 s - in org.jose4j.jwt.consumer.TypeValidatorTest -[INFO] Running org.jose4j.jwt.consumer.X509VerificationKeyResolverInJwtConsumerTest -23:18:31.966 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=iHQKuSGeWUGYZCg4_RGJSIC0NDQ vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, Zb1HT7ryCRAAj2wcQ8hWbzaqX1s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, W8aO-BD2jx9KMzQjhZ85ukJA5Zg] x5t#S256=qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE].): JsonWebSignature{"x5t#S256":"qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE","x5t":"iHQKuSGeWUGYZCg4_RGJSIC0NDQ","alg":"ES256"}->eyJ4NXQjUzI1NiI6InFTX2JYTlNfSklYQ3JuUmdha2I2b3RFS3Utd0xlb3R6N0tBWjN4UVVPcUUiLCJ4NXQiOiJpSFFLdVNHZVdVR1laQ2c0X1JHSlNJQzBORFEiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTc2MSwic3ViIjoiYWJvdXQifQ.04qPYooLJN2G0q0LYVepaydszTuhY7jKjqi5IGkNBAWZ-IBlW_pWzkurR1MkO48SbJQK2swmy7Ogfihi1ClAlA] -23:18:31.967 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=iHQKuSGeWUGYZCg4_RGJSIC0NDQ vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, Zb1HT7ryCRAAj2wcQ8hWbzaqX1s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, W8aO-BD2jx9KMzQjhZ85ukJA5Zg] x5t#S256=qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE].): JsonWebSignature{"x5t#S256":"qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE","x5t":"iHQKuSGeWUGYZCg4_RGJSIC0NDQ","alg":"ES256"}->eyJ4NXQjUzI1NiI6InFTX2JYTlNfSklYQ3JuUmdha2I2b3RFS3Utd0xlb3R6N0tBWjN4UVVPcUUiLCJ4NXQiOiJpSFFLdVNHZVdVR1laQ2c0X1JHSlNJQzBORFEiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTc2MSwic3ViIjoiYWJvdXQifQ.04qPYooLJN2G0q0LYVepaydszTuhY7jKjqi5IGkNBAWZ-IBlW_pWzkurR1MkO48SbJQK2swmy7Ogfihi1ClAlA] -23:18:31.967 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Neither the x5t header nor the x5t#S256 header are present in the JWS.): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] -23:18:31.967 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Neither the x5t header nor the x5t#S256 header are present in the JWS.): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] -23:18:31.968 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -23:18:31.968 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -23:18:31.969 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -23:18:31.969 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -23:18:31.972 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -23:18:31.972 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -23:18:31.973 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to verify the signature with any of the provided keys - SHA-1 thumbs of provided certificates: [ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y].): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] -23:18:31.974 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to verify the signature with any of the provided keys - SHA-1 thumbs of provided certificates: [ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y].): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] -23:18:31.983 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t#S256=FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE].): JsonWebSignature{"x5t#S256":"FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE","alg":"ES256"}->eyJ4NXQjUzI1NiI6IkZTcU90QjV2UHFaNGtqWXAwOUZqQnBrbVhIMFZxRURtLXdFY1Rjb3g2RUUiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTUzOSwic3ViIjoiYWJvdXQifQ.9Nj3UG8N9u7Eyu0wupR-eVS4Mf0ItwwHBZzwLcY2KUCJeWoPRPT7zC4MqMbHfLj6PzFi09iC3q3PniSJwmWJTA] -23:18:31.983 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t#S256=FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE].): JsonWebSignature{"x5t#S256":"FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE","alg":"ES256"}->eyJ4NXQjUzI1NiI6IkZTcU90QjV2UHFaNGtqWXAwOUZqQnBrbVhIMFZxRURtLXdFY1Rjb3g2RUUiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTUzOSwic3ViIjoiYWJvdXQifQ.9Nj3UG8N9u7Eyu0wupR-eVS4Mf0ItwwHBZzwLcY2KUCJeWoPRPT7zC4MqMbHfLj6PzFi09iC3q3PniSJwmWJTA] -23:18:31.986 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=Zb1HT7ryCRAAj2wcQ8hWbzaqX1s vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, iHQKuSGeWUGYZCg4_RGJSIC0NDQ, W8aO-BD2jx9KMzQjhZ85ukJA5Zg].): JsonWebSignature{"x5t":"Zb1HT7ryCRAAj2wcQ8hWbzaqX1s","alg":"RS256"}->eyJ4NXQiOiJaYjFIVDdyeUNSQUFqMndjUThoV2J6YXFYMXMiLCJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5NjI1Nywic3ViIjoiYWJvdXQifQ.RidDM9z0OJkfV2mwxABtEh2Gr_BCFbTuetOTV_dmnFofarBK7VDPPdsdAhtIs3u7WQq9guoo6H3AUGfj4mTFKX3axi2TsaYRKM9wSoRjxFO7ednGcRGx8bnSerqqrbBuM9ZUUt93sIXuneJHYRKlh0Tt9mCXISv1H4OMEueXOJhck-JPgLPfLDqIPa8t93SULKTQtLvs8KEby2uJOL8vIy-a-lFp9irCWwTnd0QRidpuLAPLr428LPNPycEVqD2TpY7y_xaQJh49oqoq_AmQCmIn3CpZLDLqD1wpEPxLQyd1vbvgQ583y2XJ95_QufjbRd2Oshv3Z3JxpIm9Yie6yQ] -23:18:31.986 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=Zb1HT7ryCRAAj2wcQ8hWbzaqX1s vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, iHQKuSGeWUGYZCg4_RGJSIC0NDQ, W8aO-BD2jx9KMzQjhZ85ukJA5Zg].): JsonWebSignature{"x5t":"Zb1HT7ryCRAAj2wcQ8hWbzaqX1s","alg":"RS256"}->eyJ4NXQiOiJaYjFIVDdyeUNSQUFqMndjUThoV2J6YXFYMXMiLCJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5NjI1Nywic3ViIjoiYWJvdXQifQ.RidDM9z0OJkfV2mwxABtEh2Gr_BCFbTuetOTV_dmnFofarBK7VDPPdsdAhtIs3u7WQq9guoo6H3AUGfj4mTFKX3axi2TsaYRKM9wSoRjxFO7ednGcRGx8bnSerqqrbBuM9ZUUt93sIXuneJHYRKlh0Tt9mCXISv1H4OMEueXOJhck-JPgLPfLDqIPa8t93SULKTQtLvs8KEby2uJOL8vIy-a-lFp9irCWwTnd0QRidpuLAPLr428LPNPycEVqD2TpY7y_xaQJh49oqoq_AmQCmIn3CpZLDLqD1wpEPxLQyd1vbvgQ583y2XJ95_QufjbRd2Oshv3Z3JxpIm9Yie6yQ] -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.022 s - in org.jose4j.jwt.consumer.X509VerificationKeyResolverInJwtConsumerTest -[INFO] Running org.jose4j.jwt.consumer.JwtConsumerTest -23:18:32.026 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322039,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40 PM GMT} iat NumericDate{1571322039 -> Oct 17, 2019, 2:20:39 PM GMT} is more than 60 second(s) in the past.] -23:18:32.034 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1570321001,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40 PM GMT} iat NumericDate{1570321001 -> Oct 6, 2019, 12:16:41 AM GMT} is more than 60 second(s) in the past.] -23:18:32.043 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":12345,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40 PM GMT} iat NumericDate{12345 -> Jan 1, 1970, 3:25:45 AM GMT} is more than 60 second(s) in the past.] -23:18:32.051 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":0,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40 PM GMT} iat NumericDate{0 -> Jan 1, 1970, 12:00:00 AM GMT} is more than 60 second(s) in the past.] -23:18:32.060 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-938763,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40 PM GMT} iat NumericDate{-938763 -> Dec 21, 1969, 3:13:57 AM GMT} is more than 60 second(s) in the past.] -23:18:32.068 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-2147483736,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40 PM GMT} iat NumericDate{-2147483736 -> Dec 13, 1901, 8:44:24 PM GMT} is more than 60 second(s) in the past.] -23:18:32.076 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322101,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322101 -> Oct 17, 2019, 2:21:41 PM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40 PM GMT}.] -23:18:32.083 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322177,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322177 -> Oct 17, 2019, 2:22:57 PM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40 PM GMT}.] -23:18:32.091 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":2147483647,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{2147483647 -> Jan 19, 2038, 3:14:07 AM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40 PM GMT}.] -23:18:32.097 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":7700000007,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{7700000007 -> Jan 2, 2214, 8:53:27 AM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40 PM GMT}.] -23:18:32.115 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571321979,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40 PM GMT} iat NumericDate{1571321979 -> Oct 17, 2019, 2:19:39 PM GMT} is more than 120 second(s) in the past.] -23:18:32.139 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322111,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322111 -> Oct 17, 2019, 2:21:51 PM GMT} is more than 10 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40 PM GMT}.] -23:18:32.148 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"issuer.example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (issuer.example.com) doesn't match expected value of nope.example.com] -23:18:32.148 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] -23:18:32.149 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":["issuer1", "other.one", "meh"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'iss' claim is not the expected type ([issuer1, other.one, meh] - Cannot cast java.util.ArrayList to java.lang.String)] -23:18:32.149 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":["issuer1", "nope.not"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'iss' claim is not the expected type ([issuer1, nope.not] - Cannot cast java.util.ArrayList to java.lang.String)] -23:18:32.149 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https://accounts.google.com"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (https://accounts.google.com) doesn't match expected value of one of [nope.google.com, https://fake.google.com]] -23:18:32.149 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"x"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (x) doesn't match expected value of one of [a, b, c, d, e]] -23:18:32.149 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] -23:18:32.149 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] -23:18:32.149 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] -23:18:32.150 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] -23:18:32.150 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] -23:18:32.151 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] -23:18:32.151 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] -23:18:32.151 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] -23:18:32.151 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: JWS Plaintext (alg=none) must not use a key.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] -23:18:32.151 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: JWS Plaintext (alg=none) must not use a key.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] -23:18:32.152 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] -23:18:32.152 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] -23:18:32.674 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiS2pfSW1Pa1FXbVozQWZpNU50VXFWQ2RXYkRja3QxNkQyemlYaTl6QlM3MCIsInkiOiJEZEwzSnVUenp5UW5QalNnTEI4RFIydlNjZXJwOUp4VmFLNDI1RlAybDVNIiwiY3J2IjoiUC0yNTYifX0.3WzVdmR024ZTYWvsEHuzzg1LEKPgEd0yaOtvmbOTFow9kr3C96Iryg.ld40U8x0DL2RI8z7TSXj3A.Ek-vhAUDOfQLARfmh-OCth702ZImfsB4YKsRiYTshZYKlu-cMkTGVUeNn0LUtug9yyQD4oAZMU8HzC0GT_w9Uw.XnjB5Oe7ngq6ozXnCO6JsQ Additional details: [[20] Missing Integrity Protection] -23:18:32.684 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImtpZCI6ImVjMiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJYZV80SlZDNWNyd3p5WkluSWpZV09vOF96Yzk1OU9RcTdXUlBKdXI2WExRIiwieSI6IlI5WU10bi1qT1BEeE1hX1Q0MGoyLVY2SUd2NElQWlVUdXdIWTBCSjJOY2siLCJjcnYiOiJQLTI1NiJ9fQ..m0Lt1v59jf5gxIfJUFUYzQ.1l_yOa3__qVD2y5lXTZNtEMpr4f5g7Owt0RhC6jXQQQOF8HmkZW9Jt8gor6ABMSh_3AxC5k8jzwoKzJZCPCl1g.auym6FiSDUK-lck9omU8iQ Additional details: [[20] Missing Integrity Protection] -23:18:32.695 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiQ2JzWEZlc2p0X2ota2dvdE10a0kwZnpYUlNkNjJKajBXRExqb05BZ1lMVSIsInkiOiJZTUMzem9mOVIwcEVLUnV4aFJjZG10U1N6TUxqLXA1ZF8yMmFNUXdKNDJVIiwiY3J2IjoiUC0yNTYifX0.Evs053wfl1wAeORu9tVL-KzEnSOqswpeAVVAvWJFk7pulvaaIKhWGe9jWOV_tJoDNAmwSr8fSu4jPhhlFpS7BIBxRC0vn_5V.u5JySSsf85zHC6qWJxVRLA.yF8PE9CcJlQJqcdAkkVI05RScl5Fef6QaGzoblGphKEFYSEeYnGgrVlqc0poHIbtrmvgbAY-LJpQjbfFZrdMAA.VPbynEpK3U9BE7Ft_SCNGQV6HffvA8OPkPu0yPost5o Additional details: [[20] Missing Integrity Protection] -23:18:32.705 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiTzM1TDdNV2ZvOEV0MDZQYy1SdDRoOVd1Sk1SZXl2Y1pRNGRhN0dGVGdRWSIsInkiOiJhcldDMi1TSFJhd2tuZFRBMUw3VlVPdkhMQ2JDNVZSTThrcjk1bmlVOEhRIiwiY3J2IjoiUC0yNTYifX0.SDwCSb2VBMbHGKGEYfupB1S6VsylK1HCw2wsw7XNw6g1S-OIxhI-42bWJE-9RVkhl2hdGFzpPIc.iX_rFCWvUBhuTDe91_JFUQ.DV_-I_qpCg7-_uY9ssku8eMfaefPgAZjm7f0RCoV6XRh-6IvkTjFqyHyehpUe9vh8J5NadXpzwanyKZicjKYig.jjtJssd1nX-OV6vBjtmeYjAjrGw_N7NO Additional details: [[20] Missing Integrity Protection] -23:18:32.715 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJyMi1iIn0.w7BAKY5SzdRaRf8asNO0Suqcwy6mHSFdTl-Q24NG8rKwRIuR3PA_w5POhC2n7ceU7V16QnIreGQSD3Vtucm_JJueiVmpNSO5LcF2QioyZY48gtQcjWM9MKT1sr46cUYUZoLeOEVQC_wfJHa_-Yjxbdfi4WRMLGKHFmTaC7xp5pOyoeJOpQtfXzlcHLAwFClnDBCofGFpydPpa6TPW0Bc7qZ3UBmUEi9NCTfJNCBYVWpsljRr8EhW6e4O1y6oWhMc3BGBfkJB2crNZ2yW7aygLXj4-77r2sJnPcuy1IoHmC_uZ0Aw45YnYuN12ekxnkIYK9is7Ee0K_reBG6hCx9Rqg.Bty0eWeeZGqw2E9qkQobLQ.6GqbF1CCuzPYjOMYT-NhpTVQehweZ00nKdhi2whqfE_Y-flxQ4xRifnejeiKo-TjqbqJYtp64Eg028YzSHdaWQ.P6_r44CoYiadQSdpEKQdog Additional details: [[20] Missing Integrity Protection] -23:18:32.719 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJraWQiOiJyMi1iIn0.ihx0FM3a9hipegV5j5sWoSd-yLzpqyEnN8jO_X90pdPHiATb3y8c2rV2zCKntnDwab0VzpaG46lU_p05U3zXapM-MA_qEbx-3j5on07yZZOvxaYXrBISqSMbY8YMKF5t0HDPbTk6Yg6uOlTFMCLP8OYrXH_Vk-q1IWGCd2uRpjIz03Ok1BpWrfqwgBzc2bERCktXlG2EoxjwFEgxXZy_AWAphqXADxKbcThZ6Y8qZ8UjmdOQyaqnwnC8BaVWrGdhX4d-s6UhB2MZHK7pIv0iSsnXdG4pFFOEKyocMllNpwb7QZpzaxV_5eaFvp0vJPfgBl674CdXEfSo8d5i23fSmA.yBIAQLf6y43QCQUZbw8s1Q.zaqUOWns8ifmebLX3zbzE8bRCoCikr8BRZ0772DbWg9VNaLbMAwo2aeK_66tF9WxFTew3U39FSIk9mP74vT1Sw.k9y0XAY5dqHKYNJlPlh2hx8NtLJuhswX Additional details: [[20] Missing Integrity Protection] -23:18:32.723 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJraWQiOiJyMi1iIn0.CoJ4krJL69QJTkaKR8DerJyv5pyAI7gPCFm5i9jm826_VgtvUE9m9-pQvU_L4cjmt-NuYaZgcDxllCUp43mvG3c7YHgh6FGLUlRwOyj1zu-1TpHHrcbPo0HQpWuB5uTcDB5r5ud-HQU-fLhF5tZ39A9mka3JROdTGt6TUCbWn0t4nC9QgnVw20A5ubQVYQMu_aXSK11ueTxxphcNgWdnG_StOUnBjeHCQMhO5wPeQ-Bm9x_ZdnS2bTnOFeZDmSIT_jBLpW9HGov3gc46E-6WJdwtrWHS9NuYrBYFieRjuxUxxARAI47eOmZFMl97w_V5HeCMf4gKFu4zJwQSMRJU6g.1jXeGx54hT4aNchMxXdKuQ.fibj11qxlFmFYTP-Mks7OggSuRlZMQS9_SNJvaBBUh8Ill7WabwkhEsrmivwF987e0lETfsUJgXueYge9IKngA.HISZoGMhla6R9kPuVte4VK043_UfhofdO75v36iIeMw Additional details: [[20] Missing Integrity Protection] -23:18:32.724 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"HS256","kid":"r2"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec5, x=ADaafpl443BR-czcOB-RdgP3rY1A51nMsfAIQvVtRPokWqgWTz5duebRZeyvrCw82YjXs9jwhjFBzM48D2bC16zG, y=ABYvXq0oO6meXZINVWvBAZXOZSsBG2HQTqAPcPYSQW70prObrI5_MQCXbqw8heREHe7kdEM9ncuNNIz4sIp6EV3m, crv=P-521}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=512bits}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec2, x=a4-hajawpNxo7FQS7FcFY-SAYbyFB3zej_RdLyDFUhI, y=TNv-af4hJ1UgZMOUnbACKlsUsbTDN9URkaznEn0kxfM, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, n=uEXDJgiYhDQw6u6wdJetGNwPlY66xbENQOhDTbttWjrx1yUoklHW9m6YoOw_Xnoj-e58coWcY438ki3wSxL7tgDzM6LIXMgKIkjA37ly0KLHmQepSoiCdlK11YmhrRzHjcNo1ogVuCamtOJqUPFwxAtqryyPl33YZbbrrezjI1rUS3HsUrLjwqKGK1Zp2kU9ajm4qWcwpaG0qavprZOcRngFtgOP7v8CuzL7X9Chhx5d7twKmpbyMmrVC004CiTeEIod8nMQB8GbfpR8JfM6IH0TyP2kTcaz35_Gk1IePi4uq4LwxnC1CreJH0SBn_vP6ERg6H_8rxVuzVkAWcIOfw, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec3, x=w7yjv2dTId_Xnp4N8rX5uTFwDnjBI-ehYcmIiw0TlPb_KrP0zQ3FckgB813_HTvH, y=lOyYkZLyBZ1LgDUeBlN9vIS3jhUdbYzue9z5B5vDJfWzDzuRnL1WCYwoTh7EmpDP, crv=P-384}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=128bits}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2-b, n=ziprYjihscDpua3hlgsJbva0Y_31O6wXDwv-537cE7ENedswFxI5Mm8j4amDM0EuaJqjrtVDMvl73JPMIkbrG6A31Xi5nNCUQsfMf0bhJn000V5le2oqrfDZuyEZpeSlje2Xa0_zSvNLzEFl-6pPMNJpUf3-q2R9j69LUbk-la5JFi2vY6Xu38nP3uP5IBRqgKCEMZKsk_onKdorvTiNZXoQoUww4C2WYiyeBQN7yrWt3AwI1ez1OkbtrOAbW2jXQodHI_vZIYD8_vSIuS3FYodm1NRaGcIxYQZMMtQO3P8LtbtYWR6cAeO0lBZDSQW81Uymh4r_-MhTdt7Z0Gd9gQ, e=AQAB}]): JsonWebSignature{"alg":"HS256","kid":"r2"}->eyJhbGciOiJIUzI1NiIsImtpZCI6InIyIn0.eyJhdWQiOiJhIiwiaXNzIjoiaSIsImV4cCI6MTcxNTAzODExMiwic3ViIjoicyJ9.ahRY66c2Yw7iVzxscReD9AsiywKoN6lUMcLPUxKDWAs] -23:18:32.725 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoicjItYiJ9.MIvFzQc6SXXpd77CXV9HTmipIWOZKHvBvO0YhHCZAwl8hcf8myxZ0KFtpJ1UPnVRitLpHXV-1z9Ixi_ObdXs8mA2quYM9AaMlqjIQLtilkFhx1QbcZj4W1odQqpVWJTL_X8IAD5dsVy7LtW14l717GKOhgQ92uFcekj4sgU-_IGdnZlywfwV4TmjWEgyCdyetFqBayya5VTf1GeDGIqBx400mZ5dA3ZMsiaqDlp1awCa_IXqejQ2wfqoN6xMo57BBoANzBlEtZETQTdj9C4camPbI4eX_3Zzf5V_AadIpUEvXjMc_s7y-INrDiYWjoIjFIXkY12UKOokDsGZs2uKHg.vswnaLqDVOkFSZLGkCk6gQ.0cbG3KSYB8JsbafCLxxdUWBi2W69RMobNq2QXT693ij_1dy8vX6yc38cUiPnXgsrFct-p0x72JKloxoz-B7cXg.deyI062Q43IaAuH7CEkBPw] -23:18:32.729 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoicjItYiJ9.MIvFzQc6SXXpd77CXV9HTmipIWOZKHvBvO0YhHCZAwl8hcf8myxZ0KFtpJ1UPnVRitLpHXV-1z9Ixi_ObdXs8mA2quYM9AaMlqjIQLtilkFhx1QbcZj4W1odQqpVWJTL_X8IAD5dsVy7LtW14l717GKOhgQ92uFcekj4sgU-_IGdnZlywfwV4TmjWEgyCdyetFqBayya5VTf1GeDGIqBx400mZ5dA3ZMsiaqDlp1awCa_IXqejQ2wfqoN6xMo57BBoANzBlEtZETQTdj9C4camPbI4eX_3Zzf5V_AadIpUEvXjMc_s7y-INrDiYWjoIjFIXkY12UKOokDsGZs2uKHg.vswnaLqDVOkFSZLGkCk6gQ.0cbG3KSYB8JsbafCLxxdUWBi2W69RMobNq2QXT693ij_1dy8vX6yc38cUiPnXgsrFct-p0x72JKloxoz-B7cXg.deyI062Q43IaAuH7CEkBPw Additional details: [[20] Missing Integrity Protection] -23:18:32.736 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no encryption but the JWT Consumer is configured to require it: eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk Additional details: [[19] No encryption.] -23:18:32.736 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no encryption but the JWT Consumer is configured to require it: eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk Additional details: [[19] No encryption.] -23:18:32.736 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value.] -23:18:32.736 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] doesn't contain an acceptable identifier. Expected example.org as an aud value.] -23:18:32.736 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] doesn't contain an acceptable identifier. Expected one of [example.org, nada, nope] as an aud value.] -23:18:32.737 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[7] No Audience (aud) claim present.] -23:18:32.737 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[7] No Audience (aud) claim present.] -23:18:32.737 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", "usa.org", "ca.ca"]}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com, usa.org, ca.ca] doesn't contain an acceptable identifier. Expected example.org as an aud value.] -23:18:32.737 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", "usa.org", "ca.ca"]}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com, usa.org, ca.ca] doesn't contain an acceptable identifier. Expected one of [example.org, some.other.junk] as an aud value.] -23:18:32.737 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", 47, false]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The array value of the 'aud' claim contains non string values (47 - class java.lang.Long cannot be cast to class java.lang.String (java.lang.Long and java.lang.String are in module java.base of loader 'bootstrap'))] -23:18:32.737 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":20475}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'aud' claim is not an array of strings or a single string value.] -23:18:32.738 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":{"aud":"example.org"}}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'aud' claim is not an array of strings or a single string value.] -23:18:32.739 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.JwtConsumerTest$4: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:911); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4310); org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:905); ...omitted...] -23:18:32.739 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.JwtConsumerTest$4: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:911); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4310); org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:905); ...omitted...] -23:18:32.740 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"name":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[14] No Subject (sub) claim is present.] -23:18:32.740 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":724729}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'sub' claim is not the expected type (724729 - Cannot cast java.lang.Long to java.lang.String)] -23:18:32.740 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":{"values":["one", "2"]}}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'sub' claim is not the expected type ({values=[one, 2]} - Cannot cast org.jose4j.json.JsonUtil$DupeKeyDisallowingLinkedHashMap to java.lang.String)] -23:18:32.748 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits).): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJhY2MiLCJjdHkiOiJKV1QifQ.KrukndaF2sHb3Y0r311rrYmCrXco-99ZIQ3iLjvCVbbow5MppRTK4DPJUShcndfcIVIFXMYSLGvIJwf39yZRJJ_EvBFnqhOUeCAsUHLGO1yxoQ619jmSh4bCaIicLYeivKaVSQN4Ezc5fvg-Nnv6TBIIgHuWMDU2Ztd96DJRokc.wMg2Eb8izCOUnACqdrcPQA.quFKSN7xQoMJzaYFBVwykQZ8zB3hpW8HtK7pm-4Ggzorno_K-eBQ7fXjRmJ1Jw-kCcmUa8flpnQqpL9jurtlz7DC1ABe0vm2ZkHoJluB6QeSr60Y9rP7kyy_rd3blXT_7t6Wgowo8MumXrrUUxxEQJgXvCmKbd-Rw9sK5jAHEug3zztLXHOX0O0QoxDzTJOsSRtodsu7bTJa-ADvPmK9e0Xp06NRqvx7WuJGKlq3cwQ.DL6yaCdiOUcViN-eZVIwOA] -23:18:32.822 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1715037452,"sub":"s","nbf":1715037332}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1715037512 -> May 6, 2024, 11:18:32 PM GMT} is on or after the Expiration Time (exp=NumericDate{1715037452 -> May 6, 2024, 11:17:32 PM GMT}) claim value.] -23:18:32.823 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1715037452,"sub":"s"}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1715037512 -> May 6, 2024, 11:18:32 PM GMT} is on or after the Expiration Time (exp=NumericDate{1715037452 -> May 6, 2024, 11:17:32 PM GMT}) claim value.] -23:18:32.824 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1715038712,"sub":"s","nbf":1715037752}) rejected due to invalid claims or other invalid content. Additional details: [[6] The JWT is not yet valid as the evaluation time NumericDate{1715037512 -> May 6, 2024, 11:18:32 PM GMT} is before the Not Before (nbf=NumericDate{1715037752 -> May 6, 2024, 11:22:32 PM GMT}) claim time.] -23:18:32.825 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 128 bits): JsonWebSignature{"kid":"esc","alg":"HS256"}->eyJraWQiOiJlc2MiLCJhbGciOiJIUzI1NiJ9.eyJhdWQiOiJhIiwiaXNzIjoiaSIsImV4cCI6MTQzMjMyNTQ5Niwic3ViIjoicyIsIm5iZiI6MTQzMjMyNDgzNn0.16LpzAZyBcokZ4aUaXHn5yN0xQ1zpmLyJVFHu6nH1zY] -23:18:32.833 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] 9223372036854775808 is unreasonable for a NumericDate] -23:18:32.839 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":25113002000004770000,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] 25113002000004770000 is unreasonable for a NumericDate] -23:18:32.845 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775809,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] -9223372036854775809 is unreasonable for a NumericDate] -23:18:32.851 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-77261600013501300000000,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] -77261600013501300000000 is unreasonable for a NumericDate] -23:18:32.857 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{9223372036854775807} is more than 2147483647 second(s) ahead of now NumericDate{9223372036854775 -> Aug 17, 292278994, 7:12:55 AM GMT}.] -23:18:32.872 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775 = 9214148664817921033 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] -23:18:32.887 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775807 = 1 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] -23:18:32.898 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775807 = 1 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] -23:18:32.905 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{9223372036854775807} is more than 10 second(s) ahead of now NumericDate{0 -> Jan 1, 1970, 12:00:00 AM GMT} (even when providing 2147483647 seconds of leeway to account for clock skew).] -23:18:32.910 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 2147483647 = 9223372034707292161 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] -23:18:32.992 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[-76717] You can go blind issuing tokens to yourself...] -23:18:32.992 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[-76717] You can go blind issuing tokens to yourself...] -23:18:33.004 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1715037452,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1715037513 -> May 6, 2024, 11:18:33 PM GMT} is on or after the Expiration Time (exp=NumericDate{1715037452 -> May 6, 2024, 11:17:32 PM GMT}) claim value.] -23:18:33.009 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[15] Subject (sub) claim value (d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea) doesn't match expected value of NOOOOOOOOOOOOOOOOPE] -23:18:33.011 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [R-RufjSDVGCGfdTmIobf2Q] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value.] -23:18:33.014 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [R-RufjSDVGCGfdTmIobf2Q] doesn't contain an acceptable identifier. Expected one of [no, nope, no way jose] as an aud value.] -23:18:33.015 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject", "iss":"issuer", "aud":"audience"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [audience] doesn't contain an acceptable identifier. Expected nope as an aud value., [12] Issuer (iss) claim value (issuer) doesn't match expected value of no way, [13] The JWT ID (jti) claim is not present.] -23:18:33.026 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1715038113,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [AUD] doesn't contain an acceptable identifier. Expected nope as an aud value.] -23:18:33.027 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1715038113,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (ISS) doesn't match expected value of no way] -23:18:33.028 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1715038113,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [AUD] doesn't contain an acceptable identifier. Expected nope as an aud value., [12] Issuer (iss) claim value (ISS) doesn't match expected value of no way, [5] The Expiration Time (exp=NumericDate{1715038113 -> May 6, 2024, 11:28:33 PM GMT}) claim value cannot be more than 5 minutes in the future relative to the evaluation time NumericDate{1715037513 -> May 6, 2024, 11:18:33 PM GMT}.] -23:18:33.028 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJleHAiOjE3MTUwMzgxMTMsImlzcyI6IklTUyIsImF1ZCI6IkFVRCIsInN1YiI6IlNVQiJ9.NGns23fwIfHwxj0tDsFcFuzrlZYopHMWm5gaUzZyNdAwfLU3n_idriThNBjcA2Y68-3cw6IJs9sGmPlNVmXOtEG5n5DrjjmMLCpoeBvLmKW_sCPM35Dx62ZCoi4_QlfZvOVoSfzR9i7_9QwAmpRiPYBFLC3SVH2exH3Cr3FKIKqADeOf3yo86w22JaftSRcpA0I1wVOGvCvrw2EfO1nFuhl5g7Wp1Jl1aRnmYPo9v656Dq_zfmdNY8W9yGeuNXnpPTx4gXeQ2GbXS95vBzansM769TPtNaEC_kaQxzYMdPmc1MkAwqFcw6RQ6Qfv4JUwKs19XGwAuWLN8vT6djTODw] -23:18:33.041 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.fS2wATAZXHKGKR7NvisFX4aubouHJHEC6q11ByfLreXM8CKOPdiC8Pm_QsYrvH20L-itXlPlB9zxiZ9irKnyWlDFeLjIp_1TC_YACUTAhE7JkBIYdO1w7keondChxLpZ440bqDHzBUvflCNORlvABW_S6UWg0kC1ay_5PdQsHhnmF0YnMeIDuNM1RsPOix7OI4j9_eGkqsjwqTQGpP0jnbk-S5h4S3tQPMZXKfEsSTGup1tGNgJdr7Q_Hq3QGuVAB2bBakera3eRSSio_4C_qzQdTAn4FvoGVAjSiPz21IaDBTa1OD7dmmrxXzmBXLeQmpsPtXag2BLAeEg__J1cgQ.4o749c4iyWrVRk_vLPjKVw.weFFjaFhi8wtt2EoEGeeumtEp5p-iM-Ho6Z9dEVbpeXbRGCtutRSjy1tP9wcSpOdnz-K5-52IomyBf9CU9eFBA.t2oY13xyRg1NiMUaJ8hnRQ Additional details: [[10] Missing signature.] -23:18:33.043 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[17] You can go blind issuing tokens to yourself...] -23:18:33.043 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[17] You can go blind issuing tokens to yourself...] -23:18:33.055 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":-1239223372036854775808,"iat":1571322100,"exp":9223372036854775807,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] -1239223372036854775808 is unreasonable for a NumericDate] -23:18:33.061 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":1571322100,"iat":12345678900000000000,"exp":12345678900000000009,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] 12345678900000000009 is unreasonable for a NumericDate] -23:18:33.067 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":1571322100,"iat":1571322111,"exp":157132210009188371766311111,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] 157132210009188371766311111 is unreasonable for a NumericDate] -23:18:33.073 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{9223372036854775807}) claim value cannot be more than 2147483647 minutes in the future relative to the evaluation time NumericDate{9223371903710789693} (even when providing 2147483647 seconds of leeway to account for clock skew).] -23:18:33.079 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":-1,"exp":9223372036854775802,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow adding: 9223372036854775792 + 30 = -9223372036854775794 at org.jose4j.lang.Maths.add(Maths.java:13); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:143); ...omitted...] -23:18:33.084 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1572322100,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854774808 - 6000 = 9223372036854770808 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:113); ...omitted...] -23:18:33.091 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":-9223372036854775798,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775798 - 65 = 9223372036854775753 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:131); ...omitted...] -23:18:33.097 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: 9223372036854775807 - -10 = -9223372036854775799 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:131); ...omitted...] -23:18:33.098 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=QsGX3JhHP1Pwy4zQ8Ha9FQ): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..zWNzKpA-QA0BboVl02nz-A.eyJpc3MiOiJtZSIsImF1ZCI6Im1lIiwiZXhwIjoxNDIwMjMxNjA2LCJuYW1lIjoidmFsdWUifQ.QsGX3JhHP1Pwy4zQ8Ha9FQ] -23:18:33.098 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=QsGX3JhHP1Pwy4zQ8Ha9FQ): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..zWNzKpA-QA0BboVl02nz-A.u1D7JCpDFeRl69G1L-h3IRrmcOXiWLnhr23ugO2kkDqKVNcO1YQ4Xvl9Sag4aYOnkqUbqe6Wdz8KK3d9q178tA.QsGX3JhHP1Pwy4zQ8Ha9FQ] -23:18:33.107 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: The key must not be null.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.g_hEwksO1Ax8Qn7HoN-BVeBoa8FXe0kpyk_XdcSmxvcM5_P296JXXtoHISr_DD_MqewaQSH4dZOQHoUgKLeFly-9RI11TG-_Ge1bZFazBPwKC5lJ6OLANLMd0QSL4fYEb9ERe-epKYE3xb2jfY1AltHqBO-PM6j23Guj2yDKnFv6WO72tteVzm_2n17SBFvhDuR9a2nHTE67pe0XGBUS_TK7ecA-iVq5COeVdJR4U4VZGGlxRGPLRHvolVLEHx6DYyLpw30Ay9R6d68YCLi9FYTq3hIXPK_-dmPlOUlKvPr1GgJzRoeC9G5qCvdcHWsqJGTO_z3Wfo5zsqwkxruxwA.UmVkbW9uZCBXQSA5ODA1Mg.VwHERHPvCNcHHpTjkoigx3_ExK0Qc71RMEParpatm0X_qpg-w8kozSjfNIPPXiTBBLXR65CIPkFqz4l1Ae9w_uowKiwyi9acgVztAi-pSL8GQSXnaamh9kX1mdh3M_TT-FZGQFQsFhu0Z72gJKGdfGE-OE7hS1zuBD5oEUfk0Dmb0VzWEzpxxiSSBbBAzP10l56pPfAtrjEYw-7ygeMkwBl6Z_mLS6w6xUgKlvW6ULmkV-uLC4FUiyKECK4e3WZYKw1bpgIqGYsw2v_grHjszJZ-_I5uM-9RA8ycX9KqPRp9gc6pXmoU_-27ATs9XCvrZXUtK2902AUzqpeEUJYjWWxSNsS-r1TJ1I-FMJ4XyAiGrfmo9hQPcNBYxPz3GQb28Y5CLSQfNgKSGt0A4isp1hBUXBHAndgtcslt7ZoQJaKe_nNJgNliWtWpJ_ebuOpEl8jdhehdccnRMIwAmU1n7SPkmhIl1HlSOpvcvDfhUN5wuqU955vOBvfkBOh5A11UzBuo2WlgZ6hYi9-e3w29bR0C2-pp3jbqxEDw3iWaf2dc5b-LnR0FEYXvI_tYk5rd_J9N0mg0tQ6RbpxNEMNoA9QWk5lgdPvbh9BaO195abQ.AVO9iT5AV4CzvDJCdhSFlQ] -23:18:33.112 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidKeyException: Key cannot be null): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.cC4hiUPoj9Eetdgtv3hF80EGrhuB__dzERat0XF9g2VtQgr9PJbu3XOiZj5RZmh7AAuHIm4Bh-0Qc_lF5YKt_O8W2Fp5jujGbds9uJdbF9CUAr7t1dnZcAcQjbKBYNX4BAynRFdiuB--f_nZLgrnbyTyWzO75vRK5h6xBArLIARNPvkSjtQBMHlb1L07Qe7K0GarZRmB_eSN9383LcOLn6_dO--xi12jzDwusC-eOkHWEsqtFZESc6BfI7noOPqvhJ1phCnvWh6IeYI2w9QOYEUipUTI8np6LbgGY9Fs98rqVt5AXLIhWkWywlVmtVrBp0igcN_IoypGlUPQGe77Rw] -23:18:33.112 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidKeyException: Key cannot be null): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.cC4hiUPoj9Eetdgtv3hF80EGrhuB__dzERat0XF9g2VtQgr9PJbu3XOiZj5RZmh7AAuHIm4Bh-0Qc_lF5YKt_O8W2Fp5jujGbds9uJdbF9CUAr7t1dnZcAcQjbKBYNX4BAynRFdiuB--f_nZLgrnbyTyWzO75vRK5h6xBArLIARNPvkSjtQBMHlb1L07Qe7K0GarZRmB_eSN9383LcOLn6_dO--xi12jzDwusC-eOkHWEsqtFZESc6BfI7noOPqvhJ1phCnvWh6IeYI2w9QOYEUipUTI8np6LbgGY9Fs98rqVt5AXLIhWkWywlVmtVrBp0igcN_IoypGlUPQGe77Rw] -23:18:33.116 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.cC4hiUPoj9Eetdgtv3hF80EGrhuB__dzERat0XF9g2VtQgr9PJbu3XOiZj5RZmh7AAuHIm4Bh-0Qc_lF5YKt_O8W2Fp5jujGbds9uJdbF9CUAr7t1dnZcAcQjbKBYNX4BAynRFdiuB--f_nZLgrnbyTyWzO75vRK5h6xBArLIARNPvkSjtQBMHlb1L07Qe7K0GarZRmB_eSN9383LcOLn6_dO--xi12jzDwusC-eOkHWEsqtFZESc6BfI7noOPqvhJ1phCnvWh6IeYI2w9QOYEUipUTI8np6LbgGY9Fs98rqVt5AXLIhWkWywlVmtVrBp0igcN_IoypGlUPQGe77Rw] -23:18:33.116 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.cC4hiUPoj9Eetdgtv3hF80EGrhuB__dzERat0XF9g2VtQgr9PJbu3XOiZj5RZmh7AAuHIm4Bh-0Qc_lF5YKt_O8W2Fp5jujGbds9uJdbF9CUAr7t1dnZcAcQjbKBYNX4BAynRFdiuB--f_nZLgrnbyTyWzO75vRK5h6xBArLIARNPvkSjtQBMHlb1L07Qe7K0GarZRmB_eSN9383LcOLn6_dO--xi12jzDwusC-eOkHWEsqtFZESc6BfI7noOPqvhJ1phCnvWh6IeYI2w9QOYEUipUTI8np6LbgGY9Fs98rqVt5AXLIhWkWywlVmtVrBp0igcN_IoypGlUPQGe77Rw] -JWT Claims Set:{exp=1715037813, sub=subject, iss=issuer} -23:18:33.119 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[2] No Expiration Time (exp) claim present.] -23:18:33.119 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[3] No Issued At (iat) claim present.] -23:18:33.119 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[4] No Not Before (nbf) claim present.] -23:18:33.120 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602000 -> May 2, 2015, 9:26:40 PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40 PM GMT}) claim value.] -23:18:33.120 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42 PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40 PM GMT}) claim value.] -23:18:33.121 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42 PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40 PM GMT}) claim value (even when providing 1 seconds of leeway to account for clock skew).] -23:18:33.121 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42 PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40 PM GMT}) claim value (even when providing 2 seconds of leeway to account for clock skew).] -23:18:33.122 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602065 -> May 2, 2015, 9:27:45 PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40 PM GMT}) claim value.] -23:18:33.123 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602065 -> May 2, 2015, 9:27:45 PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40 PM GMT}) claim value (even when providing 60 seconds of leeway to account for clock skew).] -23:18:33.123 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[6] The JWT is not yet valid as the evaluation time NumericDate{1430601999 -> May 2, 2015, 9:26:39 PM GMT} is before the Not Before (nbf=NumericDate{1430602000 -> May 2, 2015, 9:26:40 PM GMT}) claim time.] -23:18:33.124 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430603000, "iat":1430602060, "exp":1430602600 }) rejected due to invalid claims or other invalid content. Additional details: [[17] The Expiration Time (exp=NumericDate{1430602600 -> May 2, 2015, 9:36:40 PM GMT}) claim value cannot be before the Not Before (nbf=NumericDate{1430603000 -> May 2, 2015, 9:43:20 PM GMT}) claim value.] -23:18:33.125 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430602000, "iat":1430602660, "exp":1430602600 }) rejected due to invalid claims or other invalid content. Additional details: [[17] The Expiration Time (exp=NumericDate{1430602600 -> May 2, 2015, 9:36:40 PM GMT}) claim value cannot be before the Issued At (iat=NumericDate{1430602660 -> May 2, 2015, 9:37:40 PM GMT}) claim value.] -23:18:33.125 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430607201}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{1430607201 -> May 2, 2015, 10:53:21 PM GMT}) claim value cannot be more than 90 minutes in the future relative to the evaluation time NumericDate{1430600000 -> May 2, 2015, 8:53:20 PM GMT}.] -23:18:33.126 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430607201}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{1430607201 -> May 2, 2015, 10:53:21 PM GMT}) claim value cannot be more than 120 minutes in the future relative to the evaluation time NumericDate{1430600000 -> May 2, 2015, 8:53:20 PM GMT}.] -23:18:33.127 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: This VerificationKeyResolver always throws this exception.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJzdWIiOiJtZSIsImV4cCI6MTcxNTAzNzgxMywiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.] -23:18:33.127 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJzdWIiOiJtZSIsImV4cCI6MTcxNTAzNzgxMywiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.] -23:18:33.149 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Can't do it!): JsonWebSignature{"typ":"JWT", - "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -23:18:33.149 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Can't do it!): JsonWebSignature{"typ":"JWT", - "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -23:18:33.149 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unexpected exception encountered while processing JOSE object (java.lang.IllegalArgumentException: Stuff happens...): JsonWebSignature{"typ":"JWT", - "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -23:18:33.149 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unexpected exception encountered while processing JOSE object (java.lang.IllegalArgumentException: Stuff happens...): JsonWebSignature{"typ":"JWT", - "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -23:18:33.151 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:854); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4310); org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:848); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...] -23:18:33.152 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:854); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4310); org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:848); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...] -23:18:33.161 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[10] Missing signature.] -23:18:33.161 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[10] Missing signature.] -23:18:33.169 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[20] Missing Integrity Protection] -23:18:33.170 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[20] Missing Integrity Protection] -23:18:33.194 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -23:18:33.194 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -23:18:33.194 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -23:18:33.194 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -23:18:33.195 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -23:18:33.195 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -23:18:33.195 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -23:18:33.195 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -23:18:33.195 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -23:18:33.195 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -23:18:33.195 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -23:18:33.195 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -23:18:33.196 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -23:18:33.196 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -23:18:33.206 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: Unable to parse what was expected to be the JWT Claim Set JSON: "eyJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MjAyMTkwOTcsIm1lc3NhZ2UiOiJlaCJ9.ADXjpouiqbRqymN-NJ84HjU0ZZUmAajlb43Vzb6yTolFU9dTAcL6XhBAy5cwlPaS_3VT4Ce2CMpgruihmaftHA" Additional details: [[16] Invalid JSON.] -JWT Claims Set:{sub=me, aud=a, iss=i, exp=1715038113} -eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJjdHkiOiJqd3QiLCJjcml0IjpbImZha2UuYmxhaCJdfQ.n1sTo7yx1TTd9DU3mE9icmMfh_et4mK55eKkyB-0DEzvMcrq2bfVO38lpIe2ZwYDlMB5akO_bnDIQP6YYDGChDR4SXCtnZ3oiS1FIsBUrBQmyqTdtS5bRaeTbeymeHvxohG1lBNRgTCwcrYANBpncLvTa6oX3D1RaiX3zMTmAlYaa4p-_11KZo-Gn7ZgBbovHCiHC4SEbzEkiA-8Mw11k88633iIWDYcyRt33ty4jRHQpQzmye8C_UfXTghQjklSWxPij2CygM2eE9dEN4MVx1SQJnOHc4mpmFDdFEikJAzMCUUsopjhgpSf2RrFwa-gjqiHGJ5wXDsyzDSSK6Ou7A.ZMJIzh5V0pG75DQzrcRXiw.4K3yl2E-A0Q3j9hi6mzIBXluVtMjnvJSeJusBJfZDjuY7C5KFpovtZznU_0NSX6ZH0YN9K4DQ04u08b0tA_prOiHQy3RiExl866RArLwwYBeT0kbTHnYRpetx-WQyLBVYdU7cK-oUNWON18k043rxTn9cjE07KlYot605lUujr9WltsAElNYcIefnXHMyjRe6DXTJC9c-Fbi51Io7GFxf7ibxq9ZwO7LnhmDFJ-rX11djfBy_m5iIp9MHo2aEb_p4wsUKqHNneFv0-pwtWKWEA.lFE6KERYHo5bZkbKsiv_sw -23:18:33.222 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: Unrecognized header 'fake.blah' marked as critical.): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJjdHkiOiJqd3QiLCJjcml0IjpbImZha2UuYmxhaCJdfQ.n1sTo7yx1TTd9DU3mE9icmMfh_et4mK55eKkyB-0DEzvMcrq2bfVO38lpIe2ZwYDlMB5akO_bnDIQP6YYDGChDR4SXCtnZ3oiS1FIsBUrBQmyqTdtS5bRaeTbeymeHvxohG1lBNRgTCwcrYANBpncLvTa6oX3D1RaiX3zMTmAlYaa4p-_11KZo-Gn7ZgBbovHCiHC4SEbzEkiA-8Mw11k88633iIWDYcyRt33ty4jRHQpQzmye8C_UfXTghQjklSWxPij2CygM2eE9dEN4MVx1SQJnOHc4mpmFDdFEikJAzMCUUsopjhgpSf2RrFwa-gjqiHGJ5wXDsyzDSSK6Ou7A.ZMJIzh5V0pG75DQzrcRXiw.4K3yl2E-A0Q3j9hi6mzIBXluVtMjnvJSeJusBJfZDjuY7C5KFpovtZznU_0NSX6ZH0YN9K4DQ04u08b0tA_prOiHQy3RiExl866RArLwwYBeT0kbTHnYRpetx-WQyLBVYdU7cK-oUNWON18k043rxTn9cjE07KlYot605lUujr9WltsAElNYcIefnXHMyjRe6DXTJC9c-Fbi51Io7GFxf7ibxq9ZwO7LnhmDFJ-rX11djfBy_m5iIp9MHo2aEb_p4wsUKqHNneFv0-pwtWKWEA.lFE6KERYHo5bZkbKsiv_sw] -23:18:33.242 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1432327195,"sub":"s","nbf":1432326535}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [a] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value., [1] The JWT is no longer valid - the evaluation time NumericDate{1715037513 -> May 6, 2024, 11:18:33 PM GMT} is on or after the Expiration Time (exp=NumericDate{1432327195 -> May 22, 2015, 8:39:55 PM GMT}) claim value.] -23:18:33.243 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1432327195,"sub":"s","nbf":1432326535}) rejected due to invalid claims or other invalid content. Additional details: [[17] i isn't okay as an issuer] -23:18:33.244 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notjti":"lbZ_mLS6w3xBSlvW6ULmkV-uLCk"}) rejected due to invalid claims or other invalid content. Additional details: [[13] The JWT ID (jti) claim is not present.] -23:18:33.244 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"jti":55581529751992}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'jti' claim is not the expected type (55581529751992 - Cannot cast java.lang.Long to java.lang.String)] -23:18:33.244 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"jti":["S0w3XbslvW6ULmk0", "5iLSQfNgcSGt7A4is"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'jti' claim is not the expected type ([S0w3XbslvW6ULmk0, 5iLSQfNgcSGt7A4is] - Cannot cast java.util.ArrayList to java.lang.String)] -23:18:33.266 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1715038113,"nbf":1715037213,"jti":"EQjSBWmrX6ZAsMNTQiAZbA"}) rejected due to invalid claims or other invalid content. Additional details: [[21] No typ header parameter present in the innermost JWS/JWE] -23:18:33.286 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1715038113,"nbf":1715037213,"jti":"EQjSBWmrX6ZAsMNTQiAZbA"}) rejected due to invalid claims or other invalid content. Additional details: [[21] No typ header parameter present in the innermost JWS/JWE] -23:18:33.311 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1715038113,"nbf":1715037213,"jti":"EQjSBWmrX6ZAsMNTQiAZbA"}) rejected due to invalid claims or other invalid content. Additional details: [[22] Invalid typ header parameter value 'at+jwt'. Expecting 'application/secevent+jwt' or just 'secevent+jwt'.] -23:18:33.327 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1715038113,"nbf":1715037213,"jti":"EQjSBWmrX6ZAsMNTQiAZbA"}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.TypeValidator: java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.lang.String (java.util.ArrayList and java.lang.String are in module java.base of loader 'bootstrap') at org.jose4j.lang.JsonHelp.getString(JsonHelp.java:31); org.jose4j.jwx.Headers.getStringHeaderValue(Headers.java:78); org.jose4j.jwx.JsonWebStructure.getHeader(JsonWebStructure.java:148); org.jose4j.jwt.consumer.TypeValidator.validate(TypeValidator.java:37); ...omitted...] -23:18:33.332 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1715038113,"nbf":1715037213,"jti":"EQjSBWmrX6ZAsMNTQiAZbA"}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.TypeValidator: java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.lang.String (java.util.ArrayList and java.lang.String are in module java.base of loader 'bootstrap') at org.jose4j.lang.JsonHelp.getString(JsonHelp.java:31); org.jose4j.jwx.Headers.getStringHeaderValue(Headers.java:78); org.jose4j.jwx.JsonWebStructure.getHeader(JsonWebStructure.java:148); org.jose4j.jwt.consumer.TypeValidator.validate(TypeValidator.java:37); ...omitted...] -23:18:33.348 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1715038113,"nbf":1715037213,"jti":"EQjSBWmrX6ZAsMNTQiAZbA"}) rejected due to invalid claims or other invalid content. Additional details: [[22] typ header parameter value '' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: cannot have empty part] -23:18:33.353 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1715038113,"nbf":1715037213,"jti":"EQjSBWmrX6ZAsMNTQiAZbA"}) rejected due to invalid claims or other invalid content. Additional details: [[22] typ header parameter value '' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: cannot have empty part] -[INFO] Tests run: 48, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.364 s - in org.jose4j.jwt.consumer.JwtConsumerTest -[INFO] Running org.jose4j.jwt.consumer.JwksDecryptionKeyResolverUsingJwtConsumerTest -23:18:33.358 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=rJ0fXPWT1xZtb3aTC57DKg). -23:18:33.358 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=QC2uFU1vVJuQgt9BPMnAJg). -23:18:33.358 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=QC2uFU1vVJuQgt9BPMnAJg). -23:18:33.359 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=7cSJy8BhL31p0ioKs6zyXA). -23:18:33.359 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=7cSJy8BhL31p0ioKs6zyXA). -23:18:33.359 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=7cSJy8BhL31p0ioKs6zyXA). -23:18:33.360 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=KXMJeL4HdQkH27CwdbOupw). -23:18:33.360 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=KXMJeL4HdQkH27CwdbOupw). -23:18:33.360 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=KXMJeL4HdQkH27CwdbOupw). -23:18:33.360 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=KXMJeL4HdQkH27CwdbOupw). -23:18:33.360 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=itORlmmIkE62x8s1bQ5bGA). -23:18:33.361 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=itORlmmIkE62x8s1bQ5bGA). -23:18:33.361 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=itORlmmIkE62x8s1bQ5bGA). -23:18:33.361 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=itORlmmIkE62x8s1bQ5bGA). -23:18:33.361 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=5) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=itORlmmIkE62x8s1bQ5bGA). -23:18:33.363 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=I89hefRZnmsleNHFtpHigw). -23:18:33.363 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=I89hefRZnmsleNHFtpHigw). -23:18:33.363 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=I89hefRZnmsleNHFtpHigw). -23:18:33.363 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=I89hefRZnmsleNHFtpHigw). -23:18:33.364 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=5) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=I89hefRZnmsleNHFtpHigw). -23:18:33.364 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=6) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=I89hefRZnmsleNHFtpHigw). -23:18:33.364 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256"} using attempted decryption to disambiguate from filtered candidate JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=1}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=2}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=3}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=4}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=5}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=6}]) selecting from keys: [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=1}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=2}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=3}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=4}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=5}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=6}]): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..Eox16Uy9h4ieOf177JtaJg.CCCaX8E5334S1bf4gI14F5sJHbDn86bLwTRYrRUOTuc.I89hefRZnmsleNHFtpHigw] -23:18:33.382 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Key is too long for unwrapping at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:472); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... -23:18:33.382 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch!; caused by: javax.crypto.AEADBadTagException: Tag mismatch!). -23:18:33.411 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Key is too long for unwrapping at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:472); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... -23:18:33.411 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch!; caused by: javax.crypto.AEADBadTagException: Tag mismatch!). -23:18:33.434 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:487); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:389); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... -23:18:33.435 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch!; caused by: javax.crypto.AEADBadTagException: Tag mismatch!). -23:18:33.435 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Key is too long for unwrapping at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:472); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... -23:18:33.435 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch!; caused by: javax.crypto.AEADBadTagException: Tag mismatch!). -23:18:33.455 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=e1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch!; caused by: javax.crypto.AEADBadTagException: Tag mismatch!). -23:18:33.460 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:487); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Message is larger than modulus at java.base/sun.security.rsa.RSACore.parseMsg(RSACore.java:222); java.base/sun.security.rsa.RSACore.crtCrypt(RSACore.java:174); java.base/sun.security.rsa.RSACore.rsa(RSACore.java:130); java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:386); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... -23:18:33.461 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch!; caused by: javax.crypto.AEADBadTagException: Tag mismatch!). -23:18:33.484 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:487); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:389); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... -23:18:33.484 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch!; caused by: javax.crypto.AEADBadTagException: Tag mismatch!). -23:18:33.504 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Key is too long for unwrapping at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:472); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... -23:18:33.504 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch!; caused by: javax.crypto.AEADBadTagException: Tag mismatch!). -23:18:33.526 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:487); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:389); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... -23:18:33.526 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch!; caused by: javax.crypto.AEADBadTagException: Tag mismatch!). -23:18:33.527 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Key is too long for unwrapping at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:472); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... -23:18:33.527 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch!; caused by: javax.crypto.AEADBadTagException: Tag mismatch!). -23:18:33.537 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:487); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:389); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... -23:18:33.537 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch!; caused by: javax.crypto.AEADBadTagException: Tag mismatch!). -23:18:33.538 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"RSA-OAEP","enc":"A128GCM"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"RSA-OAEP","enc":"A128GCM"} using attempted decryption to disambiguate from filtered candidate JWKs [org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r1, use=enc, n=lFZ04QwtWu_hHgqlry40DuIhVZyl6ci6FzyLfkeHLH8xfCDLR-rvslxX-Ub3teVnPjZYdUFlZztuDo5kOFsF7TvUQMJhx00VZ6qugm-4LDSJ93ioGuo37vNDjMYBs0dEw_xV38e_m_Jo-oTJZN8xfZFroiR0cRNzac2e98lPa-TCxtOCuVp8Q8ro1Y6nC_1g51iY3nZXHfELX4vUxSh-4z7I0VkzCREQNYx-iKWw6MqEl2qG2mohiwlRexphf-1--8RuJ7FgubewzFv6dP_vCO9cYGi2qB0Gw6b9u8Jb60JYM7xLT3wGTQNfepiXQWESbVorxYiwZODP7d0tteD-eQ, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r3, use=enc, n=pkTznDIyNrI9wvfoFqv3yZpHv5PBeSXxdvOIKtsrKTSXxgDqjfn3jS4CiZidUjW1TzwwkYRZYU3Ei-M7qecudUs1QFdoBUNyd7V_X-ueToD1K-JvQCCrb74bzQWHVfsb2bRfuLw3Tyw3JwnWU3Q-P7OP08INyitwFw9Oz5DvKovtuOyAh3-CT8eSXcPMy2LQTt7WW8h2YeMq1EvndAc67ohiz-q3u2Qqwbbyv-p237mL_90JLE4xMBnLNey4FDjtXbXIq8T8QbvGyn4Dc67ZxH4-izAxi_siA_3z0H7oTYRaeNL4JuNqhoB0R4CgThfofdGVGZVWPyyowzSI-7nxbMHYNNse96wDnbTTKC8pP-qDjExRYjzm4iNueaMzzcq3wAIpR5z2tZp1oULOo43R0kcXC51sKrenJWnqIaIj_WsENRAWWHsrh5IycgySWyytaGVgQHaeBagYJHzRcrhWk10e81M8oMtdPPL1MLS0bbU3CTpDcacr4KyAKAL8sVi7-M2UVqvtWkEZCJ9q1cgOFwcp0t8ZKOpw9OgVeyo-P8HoDpfeXM_WecqNuHSRBlJGbAIfKErBiAUAKFmdEKyHtuUi-Ni6cEwDgjrSxX3apxG_41POrZjZBuuV6FYBcR1wqnTr8k-_z49Kv8ZGF3yszgcV3IQ4qK3-M_qqypnEai8, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e1, use=enc, x=zw4_6TARtwAsHFDw4Q1gr65t6BMl6lXOmmOMA3R0q58, y=O0Gb45b83A8FRe-DH_xJ4H0dsaQVskZMT_RBIKaSGOc, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, use=enc, n=yzFYB2Nqp5Wb34XQUBGRR33tp1jPVds46D3xwmTXPqjsbr4LMQqPWghtN_qE2bHldPJ9RJUk-i3UxnTAwR1bKLaCj6Aip_blZ4z_wK6IUIkJZk2nPD75YyhTpE9CqoI26lL2KBjMj3gn3cIxHi22BdGshppUbaf-ogH18LQ1bStM63uiflX44ud7GT4JVGaBczoad_cr-R1hs4kWZNdJrzBh7aPxebYnbAVd2CTeyXGYr_GIiq_sgtaBBISGoggruY5r-fva3R4YnhoTnmNeFOLDb99bzDPHbWhyjJ5nqBx7yaw1mT9uBnWno-h423bAT81TvXOJ2ogZ-jsYigx6xw, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e2, use=enc, x=A47oP1eLgWo7NsiKGV2Q983D3oNxLnRDlgtEi7HCtSI, y=4CjFGXRHDmm3g_cSB2YZPYsnxorc4tAEJRD35wBu0ys, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r4, use=enc, n=srRMqzPSg5CoMyaY5YErUQBRJkn0QhkzSiIIPA6dow3MnhR2_1S-D4aNHdet29Yc6qs9Qh6HIirMWcp2FPaKfaIZaJ-Q_-9gVyPDWlKHp9jSTeSetDCxm401e8XxNMjluGqb-3uQWE9W0Ka7IlDXXW1KhLYZ75xDaP5Y1c2n84uMRMKwylNCKQv0KlHIRDhsPfHx82khTGUb1XMqom7FWO8Ii4whRr7Glw0JiXj8ANHGozVTP-EVkZqFRJmwLG-ndyvsJOclEwwrXYqklFloU7WUwZQ5M08F-g-6XlSNHtaDcFagUUQKXG8zSb6GqXtEfhrs0mwI1D66b3txAf_76w9phkwlHp0Ab_lLuJLAr0j_ACtXbyxUQvHOV8QXmBuSwl7dVqAXFXGBQNGRtdewjPYgzmS4l_SzjgvC8jRTd-xzSof_gIIbSrKEtMnIoKhMCexyYGXkEzfv7aZH92_ZDGa9Cszlyqd3TJrDjj75zrkztc3coMOgbIVHoet_Ptmx, e=AQAB}]) selecting from keys: [org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r1, use=enc, n=lFZ04QwtWu_hHgqlry40DuIhVZyl6ci6FzyLfkeHLH8xfCDLR-rvslxX-Ub3teVnPjZYdUFlZztuDo5kOFsF7TvUQMJhx00VZ6qugm-4LDSJ93ioGuo37vNDjMYBs0dEw_xV38e_m_Jo-oTJZN8xfZFroiR0cRNzac2e98lPa-TCxtOCuVp8Q8ro1Y6nC_1g51iY3nZXHfELX4vUxSh-4z7I0VkzCREQNYx-iKWw6MqEl2qG2mohiwlRexphf-1--8RuJ7FgubewzFv6dP_vCO9cYGi2qB0Gw6b9u8Jb60JYM7xLT3wGTQNfepiXQWESbVorxYiwZODP7d0tteD-eQ, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r3, use=enc, n=pkTznDIyNrI9wvfoFqv3yZpHv5PBeSXxdvOIKtsrKTSXxgDqjfn3jS4CiZidUjW1TzwwkYRZYU3Ei-M7qecudUs1QFdoBUNyd7V_X-ueToD1K-JvQCCrb74bzQWHVfsb2bRfuLw3Tyw3JwnWU3Q-P7OP08INyitwFw9Oz5DvKovtuOyAh3-CT8eSXcPMy2LQTt7WW8h2YeMq1EvndAc67ohiz-q3u2Qqwbbyv-p237mL_90JLE4xMBnLNey4FDjtXbXIq8T8QbvGyn4Dc67ZxH4-izAxi_siA_3z0H7oTYRaeNL4JuNqhoB0R4CgThfofdGVGZVWPyyowzSI-7nxbMHYNNse96wDnbTTKC8pP-qDjExRYjzm4iNueaMzzcq3wAIpR5z2tZp1oULOo43R0kcXC51sKrenJWnqIaIj_WsENRAWWHsrh5IycgySWyytaGVgQHaeBagYJHzRcrhWk10e81M8oMtdPPL1MLS0bbU3CTpDcacr4KyAKAL8sVi7-M2UVqvtWkEZCJ9q1cgOFwcp0t8ZKOpw9OgVeyo-P8HoDpfeXM_WecqNuHSRBlJGbAIfKErBiAUAKFmdEKyHtuUi-Ni6cEwDgjrSxX3apxG_41POrZjZBuuV6FYBcR1wqnTr8k-_z49Kv8ZGF3yszgcV3IQ4qK3-M_qqypnEai8, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e1, use=enc, x=zw4_6TARtwAsHFDw4Q1gr65t6BMl6lXOmmOMA3R0q58, y=O0Gb45b83A8FRe-DH_xJ4H0dsaQVskZMT_RBIKaSGOc, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, use=enc, n=yzFYB2Nqp5Wb34XQUBGRR33tp1jPVds46D3xwmTXPqjsbr4LMQqPWghtN_qE2bHldPJ9RJUk-i3UxnTAwR1bKLaCj6Aip_blZ4z_wK6IUIkJZk2nPD75YyhTpE9CqoI26lL2KBjMj3gn3cIxHi22BdGshppUbaf-ogH18LQ1bStM63uiflX44ud7GT4JVGaBczoad_cr-R1hs4kWZNdJrzBh7aPxebYnbAVd2CTeyXGYr_GIiq_sgtaBBISGoggruY5r-fva3R4YnhoTnmNeFOLDb99bzDPHbWhyjJ5nqBx7yaw1mT9uBnWno-h423bAT81TvXOJ2ogZ-jsYigx6xw, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e2, use=enc, x=A47oP1eLgWo7NsiKGV2Q983D3oNxLnRDlgtEi7HCtSI, y=4CjFGXRHDmm3g_cSB2YZPYsnxorc4tAEJRD35wBu0ys, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r4, use=enc, n=srRMqzPSg5CoMyaY5YErUQBRJkn0QhkzSiIIPA6dow3MnhR2_1S-D4aNHdet29Yc6qs9Qh6HIirMWcp2FPaKfaIZaJ-Q_-9gVyPDWlKHp9jSTeSetDCxm401e8XxNMjluGqb-3uQWE9W0Ka7IlDXXW1KhLYZ75xDaP5Y1c2n84uMRMKwylNCKQv0KlHIRDhsPfHx82khTGUb1XMqom7FWO8Ii4whRr7Glw0JiXj8ANHGozVTP-EVkZqFRJmwLG-ndyvsJOclEwwrXYqklFloU7WUwZQ5M08F-g-6XlSNHtaDcFagUUQKXG8zSb6GqXtEfhrs0mwI1D66b3txAf_76w9phkwlHp0Ab_lLuJLAr0j_ACtXbyxUQvHOV8QXmBuSwl7dVqAXFXGBQNGRtdewjPYgzmS4l_SzjgvC8jRTd-xzSof_gIIbSrKEtMnIoKhMCexyYGXkEzfv7aZH92_ZDGa9Cszlyqd3TJrDjj75zrkztc3coMOgbIVHoet_Ptmx, e=AQAB}]): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhHQ00ifQ.Ac5pGgt-UTQYOQBO4Z-sABTVhrSr70xjotF0FMXWFqUB4iyoihdLRBTnrpjTb6o-orOqA6EMsv6oDZZelSn3J5Ul-cJSPibXuehlX9VQkZv4NDhP38sUeuXNp0IDtNcJeX2tFI2t6W2uFrCYwIkvh8f8bKHR_yUZslFBWAXRwLX9H2PjyQLXhir3hM1SAOKrQQVjaoPOum1n-3F6p_fh8gZYaxVJiJ2Yq9kdqVwY1wjsEq5sq8JN3j8szfE1GBVYHQhdn2I96bpX9OI97ma-XDIZwmQRgHT1mMByhbTG1SzQiIOc4CXGp5b5zER8j55MVZYB0L3iPYVEELY5YjWULc8XTUeSkejvH3ENuckqBoMijx3vb3N3XUFvY1IW6l0DecXEbv87ead-qSRoCNWKsZKtNX457jhtl9xXO0lrjT5kB_D9z_0SbT2X7ffsZ4vMGBbzsII-Ip_cWwl8xYXxwy9OGVsiRt1F0q1JgtNS35lNP9hZvDJksWPo77ebqXEw.ocPwwRIpGacR3VO1.-XXqFCYM6zkOTl3j.hOTzs7STvZrH3Agtm4DoNg] -23:18:33.544 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=Hzbvc__4g2nqIaYoYkc__w): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoiZGV1eCJ9..JruwzL7TaQ1Fub8Hw6yYmQ.b4B9F3kerVHvyGB5zb40lkTqxulLbMhwFi-qvPfFwwbuyPVPf5s7TeT3i3MLRs0-l_1hP5bPxIEEnOEOBbqTGwO1TWuBn_lQsR8XpQRp6t4H0eaXZsnBqOa3MeEtmGpo.Hzbvc__4g2nqIaYoYkc___] -23:18:33.545 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256","kid":"deux"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=one}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=two}]): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoiZGV1eCJ9..JruwzL7TaQ1Fub8Hw6yYmQ.b4B9F3kerVHvyGB5zb40lkTqxulLbMhwFi-qvPfFwwbuyPVPf5s7TeT3i3MLRs0-l_1hP5bPxIEEnOEOBbqTGwO1TWuBn_lQsR8XpQRp6t4H0eaXZsnBqOa3MeEtmGpo.Hzbvc--4g2nqIaYoYkc2pQ] -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.189 s - in org.jose4j.jwt.consumer.JwksDecryptionKeyResolverUsingJwtConsumerTest -[INFO] Running org.jose4j.jwt.consumer.JwksVerificationKeyResolverUsingJwtConsumerTest -23:18:33.547 DEBUG o.j.j.c.JwksVerificationKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"HS512","kid":"nope"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=uno}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=two}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=trois}]): JsonWebSignature{"alg":"HS512","kid":"nope"}->eyJhbGciOiJIUzUxMiIsImtpZCI6Im5vcGUifQ.eyJpc3MiOiJGUk9NIiwiYXVkIjoiVE8iLCJleHAiOjE0MjQyMTg2NzksInN1YiI6IkFCT1VUIn0.lZOnt-l4wIUl667laxBjZgyTZsebfitsKT1yBrEQ-DognQiqEafQaVrFTaV3dJrZDvgDqAKL9FzxOHfdBg8NXw] -23:18:33.555 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.uIRIFrhftV39qJNOdaL8LwrK1prIJIHsP7Gn6jJAVbE2Mx4IkwGzBXDLKMulM1IvKElmSyK_KBg8afywcxoApA] -23:18:33.559 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.21eYfC_ZNf1FQ1Dtvj4rUiM9jYPgf1zJfeE_b2fclgu36KAN141ICqVjNxQqlK_7Wbct_FDxgyHvej_LEigb2Q] -23:18:33.563 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTEyNywiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.UE4B0IVPRip-3TDKhNAadCuj_Bf5PlEAn9K94Zd7mP25WNZwxDbQpDElZTZSp-3ngPqQyPGj27emYRHhOnFSAQ] -23:18:33.564 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES384"}->eyJhbGciOiJFUzM4NCJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTIzMSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.NyRtG_eFmMLQ0XkW5kvdSpzYsm6P5M3U8EBFKIhD-jw8E7FOYw9PZ3_o1PWuLWH3XeArZMW7-bAIVxo2bHqJsSUtB6Tf0NWPtCpUF2c1vbuRXEXkGrCUmc4sKyOBjimC] -23:18:33.564 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.pgBu9S8g7MC2BN9YNlWD9JhjzWbQVjqpmErW4hMFncKD8bUidIbMBJSI3URXvnMJrLrAC5eB2gb6DccF_txQaqX1X81JbTSdQ44_P1W-1uIIkfIXUvM6OXv48W-CPm8xGuetQ1ayHgU_1ljtdkbdUHZ6irgaeIrFMgZX0Jdb9Eydnfhwvno2oGk3y6ruq2KgKABIdzgvJXfwdOFGn1z0CxwQSVDkFRLsMsBljTwfTd0v3G8OXT8WRMZMGVyAgtKVu3XJyrPNntVqrzdgQQma6S06Y9J9V9t0AlgEAn2B4TqMxYcu1Tjr7bBL_v83zEXhbdcFBYLfJg-LY5wE6rA-dA] -23:18:33.599 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTEyNywiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.UE4B0IVPRip-3TDKhNAadCuj_Bf5PlEAn9K94Zd7mP25WNZwxDbQpDElZTZSp-3ngPqQyPGj27emYRHhOnFSAQ] -23:18:33.599 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES384"}->eyJhbGciOiJFUzM4NCJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTIzMSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.NyRtG_eFmMLQ0XkW5kvdSpzYsm6P5M3U8EBFKIhD-jw8E7FOYw9PZ3_o1PWuLWH3XeArZMW7-bAIVxo2bHqJsSUtB6Tf0NWPtCpUF2c1vbuRXEXkGrCUmc4sKyOBjimC] -23:18:33.605 DEBUG o.j.j.c.JwksVerificationKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"8a10l"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00r, use=sig, x=AZkOsR09YQeFcD6rhINHWAaAr8DMx9ndFzum50o5KLLUjqF7opKI7TxR5LP_4uUvG2jojF57xxWVwWi2otdETeI-, y=AadJxOSpjf_4VxRjTT_FdAtFX8Pw-CBpaoX-OQPPQ8o0kOrj5nzIltwnEORDldLFIkQQzgTXMzBnWyQurVHU5pUF, crv=P-521}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00q, use=sig, x=3n74sKXRbaBNw9qOGslnl-WcNCdC75cWo_UquiGUFKdDM3hudthywE5y0R6d2Li8, y=YbZ_0lregvTboKmUX7VE7eknQC1yETKUdHzt_YMX4zbTyOxgZL6A38AVfY8Q8HWd, crv=P-384}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00p, use=sig, x=S-EbFKVG-7pXjdgM9SPPw8rN3V8-2uX4bNg4y8R7EhA, y=KTtyNGz9B9_QrkFf7mP90YiH6F40fAYfqpzQh8HG7tc, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=8a00o, use=sig, n=kM-83p_Qaq-1FuxLHH6Y7jQeBT5MK9iHGB75Blnit8rMIcsns72Ls1uhEYiyB3_icK7ibLr2_AHiIl7MnJBY2cCquuwiTccDM5AYUccdypliSlVeAL0MBa_0xfpvBJw8fB45wX6kJKftbQI8xjvFhqSIuGNyQOzFXnJ_mCBOLv-6Nzn79qWxh47mQ7NJk2wSYdFDsz0NNGjBA2VQ9U6weqL1viZ1sbzXr-bJWCjjEYmKC5k0sjGGXJuvMPEqBY2q68kFXD3kiuslQ3tNS1j4d-IraadxpNVtedQ44-xM7MC-WFm2f5eO0LmJRzyipGNPkTer66q6MSEESguyhsoLNQ, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00n, use=sig, x=ADoTal4nAvVCgicprEBBFOzNKUKVJl1Ph8sISl3Z3tz7TJZlQB485LJ3xil-EmWvqW1-sKFl7dY2YtrGUZvjGp0O, y=AXVB58hIK7buMZmRgDU4hrGvcVQLXa-77_F755OKIkuWP5IJ6GdjFvaRHfIbbHMp-whqjmRrlwfYPN1xmyCGSzpT, crv=P-521}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00m, use=sig, x=5Y4xK9IBGJq5-E6QAVdpiqZb9Z-_tro_rX9TAUdWD3jiVS5N-blEnu5zWzoUoiJk, y=ZDFGBLBbiuvHLMOJ3DoOSRLU94uu5y3s03__HaaaLU04Efc4nGdY3vhTQ4kxEqVj, crv=P-384}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00l, use=sig, x=CWzKLukg4yQzi4oM-2m9M-ClxbU4e6P9G_HRn9A0edI, y=UB1OL_eziV6lA5J0PiAuzoKQU_YbXojbjh0sfxtVlOU, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=8a00k, use=sig, n=ux8LdF-7g3X1BlqglZUw36mqjd9P0JWfWxJYvR6pCFSyqLrETc-fL9_lTG3orohkGnEPe7G-BO65ldF44pYEe3eZzcEuEFtiO5W4_Jap1Z430vdYgC_nZtENIJDWlsGM9ev-cOld7By-8l3-wAyuspOKZijWtx6K57VLajyUHBSmbUtaeCwHQOGyMOV1V-cskbTO2u_HrLOLLkSv9oZrznAwpx_paFHy-aAsdFhb7EiBzwqqHQButo3aT3DsR69gbW_Nmrf6tfkril6B3ePKV4od_5jowa6V3765K6v2L4NER7fuZ2hJVbIc0eJXY8tL3NlkBnjnmQ8DBWQR81Ayhw, e=AQAB}]): JsonWebSignature{"alg":"ES256","kid":"8a10l"}->eyJhbGciOiJFUzI1NiIsImtpZCI6IjhhMTBsIn0.eyJzdWIiOiJoYWlsaWUiLCJhdWQiOiJhIiwianRpIjoiRmUwZ1h1UGpmcHoxSHEzdzRaaUZIQiIsImlzcyI6Imh0dHBzOlwvXC9sb2NhbGhvc3Q6OTAzMSIsImlhdCI6MTQyMTA5Mzg1OSwiZXhwIjoxNDIxMDk0NDU5LCJub25jZSI6ImZmcyIsImFjciI6InVybjpvYXNpczpuYW1lczp0YzpTQU1MOjIuMDphYzpjbGFzc2VzOlBhc3N3b3JkIiwiYXV0aF90aW1lIjoxNDIxMDkzMzc2fQ.gzJQZRErEHI_v6z6dZboTPzL7p9_wXrMJIWnYZFEENgq3E1InbrZuQM3wB-mJ5r33kwMibJY7Qi4y-jvk0IYqQ] -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.052 s - in org.jose4j.jwt.consumer.JwksVerificationKeyResolverUsingJwtConsumerTest -[INFO] Running org.jose4j.jwt.NumericDateTest -23:18:33.607 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854775807} -23:18:33.608 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372034707292160} -23:18:33.608 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223371822106411107} -23:18:33.608 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{4611686018427387903} -23:18:33.608 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{2305843009213693951} -23:18:33.608 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{144115188075855871} -23:18:33.608 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9232604641496272} -23:18:33.608 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854776} -23:18:33.608 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854775 -> Aug 17, 292278994, 7:12:55 AM GMT} -23:18:33.608 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854774 -> Aug 17, 292278994, 7:12:54 AM GMT} -23:18:33.609 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854775808} -23:18:33.609 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372034707292161} -23:18:33.609 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-4611686018427387904} -23:18:33.609 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-184467440737095516} -23:18:33.609 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9232604641496272} -23:18:33.609 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854776} -23:18:33.613 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854775 -> Dec 2, 292269055, 4:47:05 PM GMT} -23:18:33.613 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854774 -> Dec 2, 292269055, 4:47:06 PM GMT} -23:18:33.613 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 1 = -9223372036854775808 -23:18:33.613 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 60 = -9223372036854775749 -23:18:33.613 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 2147483647 = -9223372034707292162 -23:18:33.613 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 9223372036854775807 = -2 -23:18:33.613 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 2147483647 + 9223372036854775807 = -9223372034707292162 -23:18:33.613 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 60 + 9223372036854775807 = -9223372036854775749 -23:18:33.614 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 1 + 9223372036854775807 = -9223372036854775808 -23:18:33.614 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -1 = 9223372036854775807 -23:18:33.614 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -100 = 9223372036854775708 -23:18:33.614 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -2147483648 = 9223372034707292160 -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.jwt.NumericDateTest +[INFO] Running org.jose4j.cookbook.JoseCookbookTest +[INFO] Tests run: 22, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.232 s - in org.jose4j.cookbook.JoseCookbookTest [INFO] [INFO] Results: [INFO] @@ -4188,8 +4224,8 @@ [INFO] ------------------------------------------------------------------------ [INFO] BUILD SUCCESS [INFO] ------------------------------------------------------------------------ -[INFO] Total time: 33.990 s -[INFO] Finished at: 2024-05-06T23:18:41Z +[INFO] Total time: 21.498 s +[INFO] Finished at: 2025-06-09T05:44:54Z [INFO] ------------------------------------------------------------------------ create-stamp debian/debhelper-build-stamp dh_prep @@ -4212,8 +4248,8 @@ [INFO] ------------------------------------------------------------------------ [INFO] BUILD SUCCESS [INFO] ------------------------------------------------------------------------ -[INFO] Total time: 1.647 s -[INFO] Finished at: 2024-05-06T23:18:45Z +[INFO] Total time: 0.762 s +[INFO] Finished at: 2025-06-09T05:44:56Z [INFO] ------------------------------------------------------------------------ mh_resolve_dependencies --non-interactive --offline --build -plibjose4j-java --base-directory=/build/reproducible-path/libjose4j-java-0.7.12 --non-explore Analysing pom.xml... @@ -4239,12 +4275,14 @@ dpkg-buildpackage: info: binary-only upload (no source included) dpkg-genchanges: info: not including original source code in upload I: copying local configuration +I: user script /srv/workspace/pbuilder/26640/tmp/hooks/B01_cleanup starting +I: user script /srv/workspace/pbuilder/26640/tmp/hooks/B01_cleanup finished I: unmounting dev/ptmx filesystem I: unmounting dev/pts filesystem I: unmounting dev/shm filesystem I: unmounting proc filesystem I: unmounting sys filesystem I: cleaning the build env -I: removing directory /srv/workspace/pbuilder/2834998 and its subdirectories -I: Current time: Mon May 6 11:18:56 -12 2024 -I: pbuilder-time-stamp: 1715037536 +I: removing directory /srv/workspace/pbuilder/26640 and its subdirectories +I: Current time: Mon Jun 9 19:45:03 +14 2025 +I: pbuilder-time-stamp: 1749447903