Diff of the two buildlogs: -- --- b1/build.log 2025-01-13 08:33:41.121626658 +0000 +++ b2/build.log 2025-01-13 08:37:34.223022188 +0000 @@ -1,6 +1,6 @@ I: pbuilder: network access will be disabled during build -I: Current time: Sun Feb 15 02:53:43 -12 2026 -I: pbuilder-time-stamp: 1771167223 +I: Current time: Mon Jan 13 22:33:43 +14 2025 +I: pbuilder-time-stamp: 1736757223 I: Building the build Environment I: extracting base tarball [/var/cache/pbuilder/trixie-reproducible-base.tgz] I: copying local configuration @@ -24,52 +24,84 @@ dpkg-source: info: applying 01-test-failure.patch I: Not using root during the build. I: Installing the build-deps -I: user script /srv/workspace/pbuilder/276604/tmp/hooks/D02_print_environment starting +I: user script /srv/workspace/pbuilder/2021422/tmp/hooks/D01_modify_environment starting +debug: Running on ionos1-amd64. +I: Changing host+domainname to test build reproducibility +I: Adding a custom variable just for the fun of it... +I: Changing /bin/sh to bash +'/bin/sh' -> '/bin/bash' +lrwxrwxrwx 1 root root 9 Jan 13 08:33 /bin/sh -> /bin/bash +I: Setting pbuilder2's login shell to /bin/bash +I: Setting pbuilder2's GECOS to second user,second room,second work-phone,second home-phone,second other +I: user script /srv/workspace/pbuilder/2021422/tmp/hooks/D01_modify_environment finished +I: user script /srv/workspace/pbuilder/2021422/tmp/hooks/D02_print_environment starting I: set - BUILDDIR='/build/reproducible-path' - BUILDUSERGECOS='first user,first room,first work-phone,first home-phone,first other' - BUILDUSERNAME='pbuilder1' - BUILD_ARCH='amd64' - DEBIAN_FRONTEND='noninteractive' - DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all parallel=42 ' - DISTRIBUTION='trixie' - HOME='/root' - HOST_ARCH='amd64' + BASH=/bin/sh + BASHOPTS=checkwinsize:cmdhist:complete_fullquote:extquote:force_fignore:globasciiranges:globskipdots:hostcomplete:interactive_comments:patsub_replacement:progcomp:promptvars:sourcepath + BASH_ALIASES=() + BASH_ARGC=() + BASH_ARGV=() + BASH_CMDS=() + BASH_LINENO=([0]="12" [1]="0") + BASH_LOADABLES_PATH=/usr/local/lib/bash:/usr/lib/bash:/opt/local/lib/bash:/usr/pkg/lib/bash:/opt/pkg/lib/bash:. + BASH_SOURCE=([0]="/tmp/hooks/D02_print_environment" [1]="/tmp/hooks/D02_print_environment") + BASH_VERSINFO=([0]="5" [1]="2" [2]="37" [3]="1" [4]="release" [5]="x86_64-pc-linux-gnu") + BASH_VERSION='5.2.37(1)-release' + BUILDDIR=/build/reproducible-path + BUILDUSERGECOS='second user,second room,second work-phone,second home-phone,second other' + BUILDUSERNAME=pbuilder2 + BUILD_ARCH=amd64 + DEBIAN_FRONTEND=noninteractive + DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all parallel=20 ' + DIRSTACK=() + DISTRIBUTION=trixie + EUID=0 + FUNCNAME=([0]="Echo" [1]="main") + GROUPS=() + HOME=/root + HOSTNAME=i-capture-the-hostname + HOSTTYPE=x86_64 + HOST_ARCH=amd64 IFS=' ' - INVOCATION_ID='1966c1537c054b2dbab89b3c88b77157' - LANG='C' - LANGUAGE='en_US:en' - LC_ALL='C' - MAIL='/var/mail/root' - OPTIND='1' - PATH='/usr/sbin:/usr/bin:/sbin:/bin:/usr/games' - PBCURRENTCOMMANDLINEOPERATION='build' - PBUILDER_OPERATION='build' - PBUILDER_PKGDATADIR='/usr/share/pbuilder' - PBUILDER_PKGLIBDIR='/usr/lib/pbuilder' - PBUILDER_SYSCONFDIR='/etc' - PPID='276604' - PS1='# ' - PS2='> ' + INVOCATION_ID=0e130c0a86f44e0e9236313e81d5603c + LANG=C + LANGUAGE=et_EE:et + LC_ALL=C + MACHTYPE=x86_64-pc-linux-gnu + MAIL=/var/mail/root + OPTERR=1 + OPTIND=1 + OSTYPE=linux-gnu + PATH=/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path + PBCURRENTCOMMANDLINEOPERATION=build + PBUILDER_OPERATION=build + PBUILDER_PKGDATADIR=/usr/share/pbuilder + PBUILDER_PKGLIBDIR=/usr/lib/pbuilder + PBUILDER_SYSCONFDIR=/etc + PIPESTATUS=([0]="0") + POSIXLY_CORRECT=y + PPID=2021422 PS4='+ ' - PWD='/' - SHELL='/bin/bash' - SHLVL='2' - SUDO_COMMAND='/usr/bin/timeout -k 18.1h 18h /usr/bin/ionice -c 3 /usr/bin/nice /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.KaaOlnlk/pbuilderrc_Qkyd --distribution trixie --hookdir /etc/pbuilder/first-build-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/trixie-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.KaaOlnlk/b1 --logfile b1/build.log libjose4j-java_0.9.6-1.dsc' - SUDO_GID='111' - SUDO_UID='106' - SUDO_USER='jenkins' - TERM='unknown' - TZ='/usr/share/zoneinfo/Etc/GMT+12' - USER='root' - _='/usr/bin/systemd-run' - http_proxy='http://213.165.73.152:3128' + PWD=/ + SHELL=/bin/bash + SHELLOPTS=braceexpand:errexit:hashall:interactive-comments:posix + SHLVL=3 + SUDO_COMMAND='/usr/bin/timeout -k 24.1h 24h /usr/bin/ionice -c 3 /usr/bin/nice -n 11 /usr/bin/unshare --uts -- /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.KaaOlnlk/pbuilderrc_8twF --distribution trixie --hookdir /etc/pbuilder/rebuild-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/trixie-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.KaaOlnlk/b2 --logfile b2/build.log libjose4j-java_0.9.6-1.dsc' + SUDO_GID=110 + SUDO_UID=105 + SUDO_USER=jenkins + TERM=unknown + TZ=/usr/share/zoneinfo/Etc/GMT-14 + UID=0 + USER=root + _='I: set' + http_proxy=http://46.16.76.132:3128 I: uname -a - Linux ionos15-amd64 6.11.10+bpo-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.11.10-1~bpo12+1 (2024-12-19) x86_64 GNU/Linux + Linux i-capture-the-hostname 6.1.0-29-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.123-1 (2025-01-02) x86_64 GNU/Linux I: ls -l /bin - lrwxrwxrwx 1 root root 7 Nov 22 2024 /bin -> usr/bin -I: user script /srv/workspace/pbuilder/276604/tmp/hooks/D02_print_environment finished + lrwxrwxrwx 1 root root 7 Nov 22 14:40 /bin -> usr/bin +I: user script /srv/workspace/pbuilder/2021422/tmp/hooks/D02_print_environment finished -> Attempting to satisfy build-dependencies -> Creating pbuilder-satisfydepends-dummy package Package: pbuilder-satisfydepends-dummy @@ -436,7 +468,7 @@ Get: 311 http://deb.debian.org/debian trixie/main amd64 maven all 3.8.8-2 [19.5 kB] Get: 312 http://deb.debian.org/debian trixie/main amd64 maven-repo-helper all 1.11 [142 kB] Get: 313 http://deb.debian.org/debian trixie/main amd64 maven-debian-helper all 2.6.6 [108 kB] -Fetched 286 MB in 26s (10.9 MB/s) +Fetched 286 MB in 46s (6217 kB/s) Preconfiguring packages ... Selecting previously unselected package libapparmor1:amd64. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 19853 files and directories currently installed.) @@ -1918,7 +1950,11 @@ Building tag database... -> Finished parsing the build-deps I: Building the package -I: Running cd /build/reproducible-path/libjose4j-java-0.9.6/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-buildpackage -us -uc -b && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-genchanges -S > ../libjose4j-java_0.9.6-1_source.changes +I: user script /srv/workspace/pbuilder/2021422/tmp/hooks/A99_set_merged_usr starting +Not re-configuring usrmerge for trixie +I: user script /srv/workspace/pbuilder/2021422/tmp/hooks/A99_set_merged_usr finished +hostname: Name or service not known +I: Running cd /build/reproducible-path/libjose4j-java-0.9.6/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path" HOME="/nonexistent/second-build" dpkg-buildpackage -us -uc -b && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path" HOME="/nonexistent/second-build" dpkg-genchanges -S > ../libjose4j-java_0.9.6-1_source.changes dpkg-buildpackage: info: source package libjose4j-java dpkg-buildpackage: info: source version 0.9.6-1 dpkg-buildpackage: info: source distribution unstable @@ -1996,8 +2032,8 @@ [INFO] ------------------------------------------------------------------------ [INFO] BUILD SUCCESS [INFO] ------------------------------------------------------------------------ -[INFO] Total time: 4.658 s -[INFO] Finished at: 2026-02-15T14:55:53Z +[INFO] Total time: 10.487 s +[INFO] Finished at: 2025-01-13T08:36:29Z [INFO] ------------------------------------------------------------------------ dh_auto_test /usr/lib/jvm/default-java/bin/java -noverify -cp /usr/share/maven/boot/plexus-classworlds-2.x.jar -Dmaven.home=/usr/share/maven -Dmaven.multiModuleProjectDirectory=/build/reproducible-path/libjose4j-java-0.9.6 -Dclassworlds.conf=/etc/maven/m2-debian.conf -Dproperties.file.manual=/build/reproducible-path/libjose4j-java-0.9.6/debian/maven.properties org.codehaus.plexus.classworlds.launcher.Launcher -s/etc/maven/settings-debian.xml -Ddebian.dir=/build/reproducible-path/libjose4j-java-0.9.6/debian -Dmaven.repo.local=/build/reproducible-path/libjose4j-java-0.9.6/debian/maven-repo --batch-mode test @@ -2030,2298 +2066,824 @@ [INFO] ------------------------------------------------------- [INFO] T E S T S [INFO] ------------------------------------------------------- +[INFO] Running org.jose4j.jca.ProviderContextTest +08:36:35.435 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:35.440 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:35.452 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:35.453 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:35.454 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:35.457 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:35.461 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:35.462 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:35.463 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:35.494 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@78e4deb0 +08:36:35.494 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +08:36:35.495 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:35.496 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:35.496 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:35.500 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:35.502 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:35.504 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:35.504 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:35.508 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:35.509 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:35.527 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:35.528 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:35.533 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:35.533 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:35.534 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:35.537 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:35.540 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:35.543 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:35.546 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:35.547 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:35.548 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:35.548 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:35.554 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:35.555 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:35.556 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:35.557 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:35.557 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:35.558 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:35.558 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:35.559 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:35.560 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:35.561 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:35.561 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:35.563 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:35.563 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@7d9d0818 registered for zip algorithm DEF +08:36:35.563 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:35.563 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 125ms +08:36:35.563 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:35.563 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21, BC version 1.77] security providers installed)... +08:36:35.565 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:35.565 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:35.566 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:35.566 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:35.566 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:35.566 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:35.566 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:35.566 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:35.567 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@78e4deb0 +08:36:35.567 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +08:36:35.568 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:35.568 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:35.568 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:35.572 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:35.576 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:35.580 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:35.581 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:35.581 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:35.581 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:35.592 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:35.592 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:35.592 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:35.592 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:35.592 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:35.603 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:35.613 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:35.624 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:35.632 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:35.632 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:35.632 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:35.632 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:35.633 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:35.634 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:35.634 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:35.635 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:35.635 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:35.635 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:35.635 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:35.636 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:35.637 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:35.638 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:35.638 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:35.638 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:35.638 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@221a3fa4 registered for zip algorithm DEF +08:36:35.638 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:35.638 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 73ms +08:36:35.790 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:35.791 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:35.791 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:35.791 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:35.791 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:35.792 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:35.792 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:35.792 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:35.792 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:35.794 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:35.817 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@78e4deb0 +08:36:35.818 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +08:36:35.818 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:35.818 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:35.818 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:35.819 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:35.820 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:35.820 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:35.821 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:35.821 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:35.821 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:35.824 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:35.824 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:35.824 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:35.824 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:35.824 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:35.826 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:35.827 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:35.829 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:35.830 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:35.831 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:35.831 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:35.832 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:35.833 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:35.834 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:35.834 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:35.835 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:35.835 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:35.835 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:35.835 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:35.836 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:35.836 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:35.837 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:35.837 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:35.837 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:35.837 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@2f67a4d3 registered for zip algorithm DEF +08:36:35.837 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:35.837 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 46ms +08:36:35.918 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:35.918 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21, BC version 1.77] security providers installed)... +08:36:35.918 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:35.918 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:35.918 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:35.919 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:35.919 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:35.919 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:35.919 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:35.919 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:35.920 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@78e4deb0 +08:36:35.920 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +08:36:35.920 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:35.920 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:35.920 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:35.923 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:35.927 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:35.930 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:35.930 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:35.931 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:35.931 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:35.933 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:35.933 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:35.933 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:35.933 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:35.934 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:35.942 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:35.950 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:35.959 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:35.967 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:35.968 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:35.968 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:35.968 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:35.969 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:35.969 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:35.970 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:35.970 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:35.970 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:35.970 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:35.970 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:35.971 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:35.971 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:35.972 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:35.972 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:35.972 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:35.972 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@4b8729ff registered for zip algorithm DEF +08:36:35.972 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:35.972 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 54ms +08:36:35.981 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:35.982 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:35.982 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:35.982 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:35.982 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:35.982 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:35.982 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:35.982 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:35.983 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:35.983 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:35.984 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@78e4deb0 +08:36:35.984 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +08:36:35.984 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:35.985 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:35.985 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:35.986 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:35.986 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:35.987 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:35.987 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:35.987 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:35.987 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:35.990 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:35.990 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:35.991 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:35.991 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:35.991 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:35.992 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:35.994 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:35.996 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:35.997 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:35.999 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:35.999 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:36.000 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:36.000 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:36.001 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:36.001 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:36.001 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:36.002 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:36.002 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:36.002 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:36.002 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:36.002 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:36.003 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:36.003 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:36.003 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:36.003 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@383dc82c registered for zip algorithm DEF +08:36:36.003 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:36.003 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 21ms +[INFO] Tests run: 12, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.521 s - in org.jose4j.jca.ProviderContextTest +[INFO] Running org.jose4j.http.GetTest +[WARNING] Tests run: 1, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.001 s - in org.jose4j.http.GetTest [INFO] Running org.jose4j.lang.ByteUtilTest -14:55:56.481 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (2147483647) for converting to bit length -14:55:56.483 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-2147483648) for converting to bit length -14:55:56.483 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (268435456) for converting to bit length -14:55:56.483 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870929) for converting to bit length -14:55:56.483 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870920) for converting to bit length -14:55:56.483 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870928) for converting to bit length -14:55:56.483 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-1) for converting to bit length -14:55:56.483 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-536870928) for converting to bit length -[INFO] Tests run: 31, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.205 s - in org.jose4j.lang.ByteUtilTest +08:36:36.457 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (2147483647) for converting to bit length +08:36:36.457 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-2147483648) for converting to bit length +08:36:36.457 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (268435456) for converting to bit length +08:36:36.457 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870929) for converting to bit length +08:36:36.457 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870920) for converting to bit length +08:36:36.457 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870928) for converting to bit length +08:36:36.460 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-1) for converting to bit length +08:36:36.460 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-536870928) for converting to bit length +[INFO] Tests run: 31, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.lang.ByteUtilTest [INFO] Running org.jose4j.lang.JsonHelpTest [INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.lang.JsonHelpTest [INFO] Running org.jose4j.lang.MathsTest [INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.lang.MathsTest -[INFO] Running org.jose4j.jws.EcdsaUsingShaTest -14:55:56.574 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:55:56.576 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:56.583 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:56.583 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:56.584 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:56.586 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:56.587 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:56.588 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:56.589 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:56.594 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@40005471 -14:55:56.594 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:55:56.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:56.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:56.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:56.598 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:55:56.599 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:55:56.601 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:55:56.601 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:56.603 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:56.604 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:56.611 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:56.611 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:56.614 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:56.614 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:56.615 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:56.618 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:56.620 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:56.621 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:56.623 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:56.623 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:56.624 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:56.624 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:56.628 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:56.628 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:56.629 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:56.629 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:56.630 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:56.630 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:56.631 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:56.632 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:56.632 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:56.633 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:56.633 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:56.634 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:56.634 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@3af9c5b7 registered for zip algorithm DEF -14:55:56.634 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:56.634 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 59ms -14:55:56.646 DEBUG org.jose4j.jws.JwsTestSupport - ES384 eyJhbGciOiJFUzM4NCJ9.VGhlIHVtbGF1dCAoL8uIyoptbGHKinQvIFVVTS1sb3d0KSByZWZlcnMgdG8gYSBzb3VuZCBzaGlmdC4.v586e8N57h5Mg2mXSY9uEaKiRKiKkNrlIJ49ofj9K4-AjK8g4ylF3dlcobub3MgYLB2ho32pfxWt2ecghR1SdW1iG8SWG_svWU3F7zmwQxjKCwdvAr6bVXGirmTDUgxu -14:55:56.699 DEBUG org.jose4j.jws.JwsTestSupport - ES512 eyJhbGciOiJFUzUxMiJ9.Pz8_Pz8.AEBQOfQcwMm2OOF2GWMQ-rQYPFK4DsjMTDqRFAeogWKt89-QD7jQ6VUMCWGlko3gpwPBALscodA2nRbUTPAu_dsVAR9bE-X2sGgEhC8Qn427cj5ot1xk7rICQjm5n2rh8QAYsnxIcxwjumtsec88wVCn3umCXrY578yoCNuY-uDKn_wT -14:55:56.740 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -14:55:56.741 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -14:55:56.742 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:55:56.742 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA256withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl -14:55:56.743 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:55:56.743 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:55:56.744 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -14:55:56.744 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -14:55:56.744 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:55:56.745 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA384withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl -14:55:56.745 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:55:56.745 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:55:56.745 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -14:55:56.746 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -14:55:56.746 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:55:56.746 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA512withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl -14:55:56.747 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:55:56.747 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:55:56.747 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES256/SHA256withECDSA expects a key using P-256 but was P-521 -14:55:56.747 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES384/SHA384withECDSA expects a key using P-384 but was P-521 -14:55:56.748 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES384/SHA384withECDSA expects a key using P-384 but was P-256 -14:55:56.748 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES512/SHA512withECDSA expects a key using P-521 but was P-256 -14:55:56.758 DEBUG org.jose4j.jws.JwsTestSupport - ES512 eyJhbGciOiJFUzUxMiJ9.dG91Y2jDnw.AfHy6Azp488YjtVEO8c77TP0Ou_uPx5A-MJKHxIVTS9oP72KrlS_vQZYq812U5NRRG6NNJ9MJaKaYtuPCvayoeEvAMhCbdByjSW4RoEyr_9iNaJaInqWLFXWLQodd1XuAOM6julDipSPy0Ygz5K4qRSecuRhc32tU4YZ0wPYPJFDz7QC -14:55:56.851 DEBUG org.jose4j.jws.JwsTestSupport - ES256 eyJhbGciOiJFUzI1NiJ9.UEFZTE9BRCEhIQ.ZTgk0duAFtqxseOyY6pa61DP-AZHZuKSzRXjZ9udmEeOtKaB4GLuQ1-Zu9epfjvQXRDjEIAPXMBdceKUcAIJlw -14:55:56.966 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:56.966 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:55:56.966 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:56.966 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:56.967 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:56.967 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:56.968 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:56.977 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:56.978 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:56.978 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:57.094 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -14:55:57.097 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:57.098 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:57.099 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:57.103 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:55:57.105 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:55:57.107 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:55:57.108 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:57.110 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:57.111 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:57.131 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:57.131 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:57.135 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:57.135 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:57.135 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:57.142 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:57.147 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:57.152 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:57.155 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:57.156 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:57.156 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:57.156 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:57.169 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:57.170 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:57.171 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:57.171 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:57.171 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:57.172 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:57.172 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:57.173 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:57.174 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:57.174 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:57.174 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:57.174 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:57.175 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@9ef8eb7 registered for zip algorithm DEF -14:55:57.175 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:57.175 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 209ms -14:55:57.196 DEBUG org.jose4j.jws.JwsTestSupport - ES256K eyJhbGciOiJFUzI1NksifQ.aw.fqT0GY82DGb3HBjgGe3wslC64sNa6s7qtsJ44mRfJizbps5UdqtxSAcdyUgjTl1WQ0nTxQRwDcwFgf3DF92hYA -14:55:57.203 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:57.203 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:55:57.203 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:57.203 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:57.203 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:57.203 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:57.203 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:57.203 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:57.204 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:57.204 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:57.204 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@40005471 -14:55:57.205 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:55:57.205 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:57.205 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:57.205 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:57.205 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:55:57.205 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:55:57.206 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:55:57.206 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:57.206 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:57.206 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:57.207 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:57.207 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:57.207 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:57.207 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:57.207 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:57.208 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:57.210 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:57.211 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:57.212 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:57.212 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:57.212 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:57.212 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:57.213 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:57.213 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:57.214 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:57.214 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:57.214 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:57.214 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:57.214 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:57.215 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:57.215 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:57.215 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:57.216 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:57.216 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:57.216 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@616fe72b registered for zip algorithm DEF -14:55:57.216 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:57.216 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 13ms -14:55:57.219 DEBUG org.jose4j.jws.JwsTestSupport - ES256 eyJhbGciOiJFUzI1NiJ9.c29tZXRoaW5nIGhlcmU.HiOFiNWs19YOV8yjyuv9H6Rl1vvEQzTxLwMugLpFWh4I161004e0I44IqWNCqk8WiypjBySsGa-A6OnHVDfp4Q -14:55:57.239 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:57.239 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:55:57.240 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:57.240 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:57.240 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:57.240 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:57.240 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:57.240 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:57.240 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:57.241 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:57.243 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -14:55:57.243 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:57.244 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:57.244 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:57.246 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:55:57.248 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:55:57.249 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:55:57.249 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:57.250 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:57.250 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:57.251 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:57.251 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:57.252 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:57.252 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:57.252 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:57.256 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:57.260 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:57.269 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:57.273 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:57.274 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:57.274 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:57.274 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:57.275 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:57.276 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:57.277 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:57.277 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:57.277 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:57.277 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:57.277 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:57.278 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:57.279 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:57.280 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:57.280 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:57.280 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:57.280 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@7e5d9a50 registered for zip algorithm DEF -14:55:57.280 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:57.280 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 40ms -14:55:57.282 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:57.282 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:55:57.282 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:57.282 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:57.283 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:57.283 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:57.283 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:57.283 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:57.283 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:57.283 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:57.284 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@40005471 -14:55:57.284 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:55:57.284 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:57.284 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:57.284 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:57.285 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:55:57.285 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:55:57.286 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:55:57.286 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:57.286 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:57.286 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:57.288 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:57.288 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:57.288 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:57.288 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:57.288 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:57.289 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:57.290 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:57.291 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:57.292 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:57.292 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:57.293 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:57.293 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:57.293 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:57.294 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:57.294 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:57.294 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:57.294 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:57.294 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:57.294 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:57.295 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:57.295 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:57.296 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:57.296 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:57.296 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:57.296 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@60957c0f registered for zip algorithm DEF -14:55:57.296 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:57.296 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 14ms -[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.766 s - in org.jose4j.jws.EcdsaUsingShaTest -[INFO] Running org.jose4j.jws.JwsUsingEcdsaP521Sha512ExampleTest -Payload -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.022 s - in org.jose4j.jws.JwsUsingEcdsaP521Sha512ExampleTest -[INFO] Running org.jose4j.jws.JwsUnencodedPayloadOptionTest -14:55:57.365 DEBUG o.j.j.JwsUnencodedPayloadOptionTest - Expected exception because JWS Compact Serialization with unencoded non-detached payloads cannot have period ('.') characters : org.jose4j.lang.JoseException: per https://tools.ietf.org/html/rfc7797#section-5.2 when using the JWS Compact Serialization, unencoded non-detached payloads using period ('.') characters would cause parsing errors; such payloads MUST NOT be used with the JWS Compact Serialization. -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.043 s - in org.jose4j.jws.JwsUnencodedPayloadOptionTest -[INFO] Running org.jose4j.jws.MaintainEncodedPayloadAndHeaderTest -14:55:57.378 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", - "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9X.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -14:55:57.379 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", - "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9===.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -14:55:57.381 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", - "alg":"HS256"}->!!!!eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.008 s - in org.jose4j.jws.MaintainEncodedPayloadAndHeaderTest -[INFO] Running org.jose4j.jws.JwsUsingHmacSha256ExampleTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jws.JwsUsingHmacSha256ExampleTest -[INFO] Running org.jose4j.jws.EcdsaUsingShaEdgesTest -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.119 s - in org.jose4j.jws.EcdsaUsingShaEdgesTest -[INFO] Running org.jose4j.jws.JwsPayloadVariationsTest -14:55:57.536 DEBUG o.j.jws.JwsPayloadVariationsTest - Expected: org.jose4j.lang.IntegrityException: JWS signature is invalid. -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.025 s - in org.jose4j.jws.JwsPayloadVariationsTest -[INFO] Running org.jose4j.jws.RsaPssTest -14:55:57.539 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS -14:55:57.546 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS -14:55:57.552 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS -14:55:57.567 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS -14:55:57.572 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS -14:55:57.577 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS -14:55:57.591 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:57.591 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:55:57.591 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:57.591 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:57.591 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:57.591 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:57.591 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:57.591 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:57.592 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:57.592 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:57.594 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -14:55:57.594 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:57.594 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:57.594 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:57.596 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:55:57.597 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:55:57.598 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:55:57.599 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:57.599 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:57.599 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:57.600 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:57.600 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:57.600 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:57.601 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:57.601 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:57.604 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:57.607 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:57.611 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:57.615 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:57.616 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:57.616 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:57.616 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:57.617 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:57.617 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:57.618 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:57.618 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:57.618 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:57.618 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:57.618 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:57.619 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:57.619 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:57.620 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:57.620 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:57.620 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:57.620 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@4233e892 registered for zip algorithm DEF -14:55:57.620 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:57.620 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 29ms -14:55:57.627 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS -14:55:57.633 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@544820b7):Signature object: SHA256withRSAandMGF1 -14:55:57.638 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS -14:55:57.644 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@20b12f8a):Signature object: SHA384withRSAandMGF1 -14:55:57.649 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS -14:55:57.654 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@7d42c224):Signature object: SHA512withRSAandMGF1 -14:55:57.659 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:57.659 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:55:57.659 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:57.659 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:57.659 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:57.659 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:57.659 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:57.659 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:57.659 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:57.659 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:57.660 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@40005471 -14:55:57.660 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:55:57.660 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:57.660 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:57.660 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:57.661 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:55:57.661 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:55:57.661 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:55:57.661 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:57.662 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:57.662 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:57.663 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:57.663 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:57.663 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:57.663 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:57.663 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:57.664 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:57.666 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:57.667 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:57.667 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:57.667 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:57.668 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:57.668 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:57.668 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:57.669 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:57.669 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:57.669 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:57.669 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:57.669 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:57.669 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:57.670 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:57.670 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:57.670 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:57.671 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:57.671 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:57.671 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@56aaaecd registered for zip algorithm DEF -14:55:57.671 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:57.671 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 12ms -14:55:57.681 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:57.681 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:55:57.681 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:57.682 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:57.682 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:57.682 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:57.682 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:57.682 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:57.682 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:57.682 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:57.684 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -14:55:57.684 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:57.684 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:57.684 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:57.686 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|SHA256withRSAandMGF1) registered for alg algorithm PS256 -14:55:57.688 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|SHA384withRSAandMGF1) registered for alg algorithm PS384 -14:55:57.689 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|SHA512withRSAandMGF1) registered for alg algorithm PS512 -14:55:57.689 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:57.689 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:57.689 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:57.691 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:57.691 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:57.691 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:57.691 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:57.691 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:57.695 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:57.699 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:57.703 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:57.707 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:57.707 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:57.707 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:57.707 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:57.708 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:57.708 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:57.709 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:57.709 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:57.709 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:57.709 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:57.709 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:57.709 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:57.710 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:57.710 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:57.710 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:57.711 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:57.711 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@5e01a982 registered for zip algorithm DEF -14:55:57.711 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:57.711 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 30ms -14:55:57.711 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA256withRSAandMGF1 -14:55:57.716 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA384withRSAandMGF1 -14:55:57.721 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA512withRSAandMGF1 -14:55:57.726 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:57.726 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:55:57.726 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:57.726 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:57.726 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:57.726 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:57.726 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:57.726 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:57.727 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:57.727 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:57.727 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@40005471 -14:55:57.727 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:55:57.727 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:57.727 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:57.727 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:57.728 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:55:57.728 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:55:57.729 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:55:57.729 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:57.729 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:57.730 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:57.730 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:57.730 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:57.730 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:57.730 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:57.730 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:57.731 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:57.732 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:57.733 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:57.734 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:57.734 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:57.734 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:57.734 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:57.734 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:57.735 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:57.735 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:57.735 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:57.735 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:57.735 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:57.735 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:57.735 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:57.736 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:57.736 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:57.736 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:57.736 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:57.736 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@5ddea849 registered for zip algorithm DEF -14:55:57.736 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:57.736 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 10ms -14:55:57.769 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:57.769 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:55:57.769 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:57.769 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:57.769 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:57.769 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:57.769 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:57.770 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:57.770 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:57.770 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:57.772 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -14:55:57.772 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:57.772 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:57.772 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:57.773 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:55:57.775 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:55:57.776 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:55:57.776 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:57.776 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:57.776 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:57.777 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:57.778 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:57.778 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:57.778 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:57.778 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:57.781 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:57.785 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:57.788 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:57.791 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:57.791 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:57.791 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:57.792 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:57.792 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:57.793 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:57.794 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:57.794 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:57.794 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:57.794 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:57.794 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:57.794 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:57.795 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:57.795 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:57.795 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:57.795 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:57.795 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@58fb7731 registered for zip algorithm DEF -14:55:57.795 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:57.796 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 27ms -14:55:57.802 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:57.802 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:55:57.802 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:57.802 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:57.802 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:57.802 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:57.802 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:57.802 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:57.802 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:57.802 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:57.803 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@40005471 -14:55:57.803 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:55:57.803 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:57.803 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:57.803 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:57.803 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:55:57.804 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:55:57.804 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:55:57.804 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:57.805 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:57.805 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:57.805 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:57.805 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:57.805 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:57.806 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:57.806 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:57.807 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:57.807 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:57.808 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:57.809 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:57.809 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:57.809 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:57.809 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:57.810 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:57.810 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:57.810 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:57.810 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:57.811 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:57.811 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:57.811 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:57.811 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:57.811 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:57.812 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:57.812 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:57.812 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:57.812 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@13e547a9 registered for zip algorithm DEF -14:55:57.812 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:57.812 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 10ms -14:55:57.820 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:57.821 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:55:57.821 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:57.821 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:57.821 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:57.821 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:57.821 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:57.821 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:57.821 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:57.821 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:57.823 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -14:55:57.823 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:57.823 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:57.823 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:57.824 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|SHA256withRSAandMGF1) registered for alg algorithm PS256 -14:55:57.825 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|SHA384withRSAandMGF1) registered for alg algorithm PS384 -14:55:57.827 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|SHA512withRSAandMGF1) registered for alg algorithm PS512 -14:55:57.827 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:57.827 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:57.827 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:57.828 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:57.828 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:57.828 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:57.828 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:57.828 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:57.832 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:57.835 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:57.838 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:57.842 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:57.842 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:57.842 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:57.842 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:57.843 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:57.843 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:57.844 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:57.844 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:57.844 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:57.844 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:57.844 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:57.844 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:57.845 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:57.845 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:57.845 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:57.845 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:57.845 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@349c1daf registered for zip algorithm DEF -14:55:57.845 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:57.845 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 24ms -14:55:57.852 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:57.852 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:55:57.852 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:57.852 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:57.852 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:57.852 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:57.852 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:57.852 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:57.852 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:57.852 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:57.853 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@40005471 -14:55:57.853 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:55:57.853 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:57.853 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:57.853 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:57.853 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:55:57.854 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:55:57.854 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:55:57.854 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:57.854 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:57.854 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:57.855 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:57.855 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:57.855 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:57.855 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:57.855 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:57.856 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:57.857 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:57.858 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:57.859 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:57.859 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:57.859 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:57.859 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:57.859 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:57.860 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:57.860 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:57.860 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:57.860 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:57.860 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:57.860 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:57.861 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:57.861 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:57.861 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:57.861 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:57.861 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:57.861 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@dfddc9a registered for zip algorithm DEF -14:55:57.861 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:57.862 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 10ms -14:55:57.881 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:57.882 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:55:57.882 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:57.882 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:57.882 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:57.882 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:57.882 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:57.882 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:57.882 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:57.882 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:57.884 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -14:55:57.884 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:57.884 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:57.884 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:57.886 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:55:57.887 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:55:57.888 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:55:57.888 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:57.888 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:57.889 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:57.889 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:57.889 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:57.889 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:57.890 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:57.890 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:57.893 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:57.896 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:57.900 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:57.903 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:57.903 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:57.903 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:57.903 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:57.904 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:57.905 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:57.905 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:57.905 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:57.905 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:57.905 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:57.905 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:57.906 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:57.906 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:57.907 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:57.907 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:57.907 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:57.907 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@2b5f4d54 registered for zip algorithm DEF -14:55:57.907 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:57.907 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 25ms -14:55:57.908 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:57.909 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:55:57.909 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:57.909 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:57.909 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:57.909 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:57.909 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:57.909 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:57.909 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:57.909 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:57.909 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@40005471 -14:55:57.909 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:55:57.909 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:57.909 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:57.909 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:57.910 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:55:57.910 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:55:57.911 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:55:57.911 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:57.911 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:57.911 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:57.911 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:57.911 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:57.912 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:57.912 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:57.912 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:57.913 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:57.913 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:57.914 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:57.915 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:57.915 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:57.915 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:57.915 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:57.916 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:57.916 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:57.916 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:57.917 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:57.917 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:57.917 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:57.917 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:57.917 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:57.917 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:57.917 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:57.917 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:57.918 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:57.918 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@5f7b97da registered for zip algorithm DEF -14:55:57.918 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:57.918 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 9ms -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.378 s - in org.jose4j.jws.RsaPssTest -[INFO] Running org.jose4j.jws.JwsUsingEcdsaP256Sha256ExampleTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s - in org.jose4j.jws.JwsUsingEcdsaP256Sha256ExampleTest -[INFO] Running org.jose4j.jws.RsaUsingShaTest -14:55:58.038 DEBUG org.jose4j.jws.JwsTestSupport - RS256 eyJhbGciOiJSUzI1NiJ9.UEFZTE9BRCEhIQ.WsV4mP6qInwlApzeqPyMzNpPjzdmjslPAZN8wMAEvK1sy-DfkK-jzkKrOyqoafAOTy8HQ1Cyn_mccxGyeHouR80VfJt8bZGjdWDjdp6v3IRcUcbcl_VesfTtp4zVPh4Y_0yhUG_oVKGTFgndQU4xq9d4dt2zI2qfY2_9SFLdINFPXdAt0mmN9V0eAgZ1Io9ZO6s9vtwKM-otrE1z7r9bEu6PZH3l_HVhJIZtxW0JljOvmesdnGHF3H3NVSSJShTaj5uAvIeJt2v16qBZPRE6xT8Vy5C9MV-wlJ2wRORxUUIy7dur_9r9eWZVLj31O-PIwl0vYTNzIb8Mw74f_4A_uw -14:55:58.046 DEBUG org.jose4j.jws.JwsTestSupport - RS384 eyJhbGciOiJSUzM4NCJ9.UEFZTE9BRCEh.RmzTQw35zC5IQsnP97ISnd4cfl_T_ryqR_Jm7KfoUctr7ChqPGZrBlUq6fq4_D2v6dwkEPqElh5iovcpF0JSu8NLn3hhhj5obD42C_0yWo6KmO-oCSsjews0JtzfLiywiUbXtdW5qnNwldljDCppVz-fM-zskLPXtDSpB6GImcJFtw199o3LyU194M9iLaxzs-2g5riDZijWor92xZD7xhG6_ngOXR-BfqI9uZh11VQYYI539ppOLxsWmsSaJhc3xH-q1QSRhOYIen7VYGae63wm5_b0YshQ9-UeJ9DEhcPmkIcLHGDLOY8HIGoQpQj-FcXjHLcKWRqZeZNFFLz6Pg -14:55:58.053 DEBUG org.jose4j.jws.JwsTestSupport - RS512 eyJhbGciOiJSUzUxMiJ9.UEFZTE9BRCE.hQ7Uh2Z5LrFKff_h3qX2AzmWUW3zY_hKefj_TZXWSsRekIfcloUHfoJMWMxS4DOuM2P8tpUpt1Y4mAlI8KsvQj-52fXn_jGuSnW5JQW2FRHgdo_qPauwhqN1wgyfqlBd71cCfAc34MUEapoL2UOn-XlgISEgxWNG6UJslt1jkFzLrrevVbc3KSHF7C4-7UYuI34udMlZ29sDzls1LWaUKGIjgMCie8vus3xY_bLwPZCPhm7kcgGq3n__dTN7gitB_s4PV_QelqhrThgBHqmHI_Ys8Y4Eg79RQZl5aTasTeD7U5qIlT_CuzfTQqXvTDywgNaEPXIZb15FzKhM_9zt1Q -14:55:58.080 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -14:55:58.080 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -14:55:58.080 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -14:55:58.080 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -14:55:58.081 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:55:58.081 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -14:55:58.081 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -14:55:58.081 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:55:58.081 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:55:58.082 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -14:55:58.082 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -14:55:58.082 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -14:55:58.082 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -14:55:58.082 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:55:58.082 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA384withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -14:55:58.082 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA384withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -14:55:58.083 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:55:58.083 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:55:58.083 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -14:55:58.083 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -14:55:58.083 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -14:55:58.083 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -14:55:58.084 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:55:58.084 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA512withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -14:55:58.084 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA512withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -14:55:58.084 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:55:58.084 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.16 s - in org.jose4j.jws.RsaUsingShaTest -[INFO] Running org.jose4j.jws.EcdsaUsingShaAlgorithmTest -[0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 2] -[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.024 s - in org.jose4j.jws.EcdsaUsingShaAlgorithmTest -[INFO] Running org.jose4j.jws.HmacShaTest -14:55:58.116 DEBUG org.jose4j.jws.JwsTestSupport - HS256 eyJhbGciOiJIUzI1NiJ9.c29tZSBjb250ZW50IHRoYXQgaXMgdGhlIHBheWxvYWQ.qGO7O7W2ECVl6uO7lfsXDgEF-EUEti0i-a_AimulIRA -14:55:58.117 DEBUG org.jose4j.jws.JwsTestSupport - HS256 eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJodHRwczovL2p3dC1pZHAuZXhhbXBsZS5jb20iLAogICAgInBybiI6Im1haWx0bzptaWtlQGV4YW1wbGUuY29tIiwKICAgICJhdWQiOiJodHRwczovL2p3dC1ycC5leGFtcGxlLm5ldCIsCiAgICAiaWF0IjoxMzAwODE1NzgwLAogICAgImV4cCI6MTMwMDgxOTM4MCwKICAgICJodHRwOi8vY2xhaW1zLmV4YW1wbGUuY29tL21lbWJlciI6dHJ1ZX0.ZhkLsRIwT5xHXNgOpdFJ_7q5kqLd6sMiOOEV6kxTNCo -14:55:58.118 DEBUG org.jose4j.jws.JwsTestSupport - HS384 eyJhbGciOiJIUzM4NCJ9.eyJtZWgiOiJtZWgifQ.fptKQJmGN3fBP_FiQzdAGdmx-Q5iWjQvJrLfdmFnebxbQuzOmzejBrzYh4MyS01a -14:55:58.119 DEBUG org.jose4j.jws.JwsTestSupport - HS384 eyJhbGciOiJIUzM4NCJ9.TG9va2luZyBnb29kLCBCaWxseSBSYXkh.wtlqZW8_eLF3hjMZT9c_kzg133b2b_JsR44bHGshc4w_BEUJApKerwEw9cltL8w9 -14:55:58.121 DEBUG org.jose4j.jws.JwsTestSupport - HS512 eyJhbGciOiJIUzUxMiJ9.RmVlbGluZyBnb29kLCBMb3VpcyE.i4SAIaVYY4gxhqJxMvw3FKsar5RBCxzadaK2YT3HeeguWgJMLpDMu9cK1WxetjYmce49ZQmTxmB5nTbE_IgKHQ -14:55:58.122 DEBUG org.jose4j.jws.JwsTestSupport - HS512 eyJhbGciOiJIUzUxMiJ9.eyJtZWgiOiJtZWh2YWx1ZSJ9.NeB669dYkPmqgLqgd_sVqwIfCvb4XN-K67gpMJR93wfw_DylpxB1ell2opHM-E5P9jNKE2GYxTxwcI68Z2CTxw -14:55:58.125 DEBUG org.jose4j.jws.HmacShaTest - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 72 bits -14:55:58.125 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 384 bits for HS384) or larger MUST be used with the HMAC SHA algorithms but this key is only 376 bits -14:55:58.126 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 384 bits for HS384) or larger MUST be used with the HMAC SHA algorithms but this key is only 376 bits -14:55:58.126 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 512 bits for HS512) or larger MUST be used with the HMAC SHA algorithms but this key is only 504 bits -14:55:58.126 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 512 bits for HS512) or larger MUST be used with the HMAC SHA algorithms but this key is only 504 bits -14:55:58.127 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 8 bits -14:55:58.127 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 248 bits -14:55:58.127 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 248 bits -[INFO] Tests run: 16, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.013 s - in org.jose4j.jws.HmacShaTest -[INFO] Running org.jose4j.jws.JwsUsingRsaSha256ExampleTest -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s - in org.jose4j.jws.JwsUsingRsaSha256ExampleTest -[INFO] Running org.jose4j.jws.EdDsaTest -14:55:58.161 DEBUG org.jose4j.jws.EdDsaAlgorithm - Problem verifying EdDSA signature: java.security.SignatureException: Invalid point -14:55:58.170 DEBUG org.jose4j.jws.JwsTestSupport - EdDSA eyJhbGciOiJFZERTQSJ9.TGl0dGxlIEVk.GxUk1956lPvJwwZ466Dk-FySQbnTreLZL7v_PoK0TVoj1kNYXNpvWMGBJM92i9hawnfua22x-ontE60cmHQLCA -14:55:58.200 DEBUG org.jose4j.jws.JwsTestSupport - EdDSA eyJhbGciOiJFZERTQSJ9.QmlnIEVk.jiVthPWgmg_aTlH9vg_HbA5tIK_KgUjH0jcJxuAuV9VgPdJUivd3JuLwWp5xxoC_g95-1TQ2emIADgWNYt2aMyWbu_7sRQVp_m7-IWDlpEdsOpPHC5saNVb-tTWGfboM9LEzDl2LXBn7l7JRegk_4xYA -14:55:58.240 DEBUG org.jose4j.jws.JwsTestSupport - EdDSA eyJhbGciOiJFZERTQSJ9.Q291c2luIEVkZGll.BFa3s_DX88VPzFxCq5OkQ76bplUn-of0LiDVaUfQ8H9ds4ppQz1MN2K8HENOntA4S6Yk9ABf_emDlOzngjDFDA -14:55:58.250 DEBUG org.jose4j.jws.EdDsaAlgorithm - Problem verifying EdDSA signature: java.security.SignatureException: signature length invalid -14:55:58.256 DEBUG org.jose4j.jws.EdDsaAlgorithm - Problem verifying EdDSA signature: java.security.SignatureException: signature length invalid -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.116 s - in org.jose4j.jws.EdDsaTest -[INFO] Running org.jose4j.jws.DetachedContentTest -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.021 s - in org.jose4j.jws.DetachedContentTest -[INFO] Running org.jose4j.jws.PublicKeyAsHmacKeyTest -14:55:58.291 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:58.291 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:55:58.291 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:58.291 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:58.291 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:58.291 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:58.291 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:58.291 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:58.291 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:58.291 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:58.293 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -14:55:58.293 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:58.293 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:58.294 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:58.295 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:55:58.296 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:55:58.298 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:55:58.298 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:58.298 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:58.298 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:58.299 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:58.299 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:58.299 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:58.299 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:58.299 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:58.303 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:58.307 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:58.311 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:58.314 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:58.314 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:58.314 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:58.314 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:58.315 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:58.316 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:58.316 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:58.316 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:58.316 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:58.316 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:58.316 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:58.317 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:58.317 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:58.317 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:58.318 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:58.318 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:58.318 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@5bd82fed registered for zip algorithm DEF -14:55:58.318 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:58.318 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 27ms -14:55:58.319 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. -14:55:58.319 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:58.319 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:55:58.319 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:58.319 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:58.319 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:58.319 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:58.319 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:58.319 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:58.320 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:58.320 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:58.320 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@40005471 -14:55:58.320 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:55:58.320 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:58.320 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:58.320 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:58.321 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:55:58.321 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:55:58.321 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:55:58.321 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:58.322 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:58.322 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:58.322 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:58.322 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:58.322 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:58.322 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:58.322 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:58.323 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:58.324 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:58.325 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:58.326 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:58.326 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:58.326 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:58.326 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:58.326 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:58.326 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:58.327 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:58.327 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:58.327 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:58.327 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:58.327 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:58.327 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:58.328 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:58.328 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:58.328 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:58.328 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:58.328 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@3eeb318f registered for zip algorithm DEF -14:55:58.328 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:58.328 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 9ms -14:55:58.337 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:58.337 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:55:58.337 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:58.337 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:58.337 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:58.337 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:58.338 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:58.338 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:58.338 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:58.338 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:58.339 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -14:55:58.339 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:58.339 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:58.339 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:58.341 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:55:58.342 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:55:58.344 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:55:58.344 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:58.344 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:58.344 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:58.345 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:58.345 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:58.345 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:58.345 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:58.345 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:58.349 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:58.353 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:58.356 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:58.360 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:58.360 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:58.360 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:58.360 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:58.361 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:58.361 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:58.362 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:58.362 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:58.362 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:58.362 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:58.362 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:58.362 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:58.363 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:58.363 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:58.363 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:58.363 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:58.363 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@6da00fb9 registered for zip algorithm DEF -14:55:58.363 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:58.363 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 26ms -14:55:58.364 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. -14:55:58.364 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:58.364 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:55:58.364 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:58.364 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:58.364 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:58.364 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:58.364 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:58.364 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:58.364 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:58.364 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:58.364 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@40005471 -14:55:58.364 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:55:58.364 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:58.364 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:58.364 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:58.365 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:55:58.365 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:55:58.365 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:55:58.365 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:58.366 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:58.366 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:58.366 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:58.366 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:58.366 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:58.366 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:58.366 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:58.367 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:58.368 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:58.369 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:58.370 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:58.370 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:58.370 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:58.370 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:58.370 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:58.370 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:58.370 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:58.370 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:58.370 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:58.370 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:58.370 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:58.371 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:58.371 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:58.371 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:58.371 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:58.371 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:58.371 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@a202ccb registered for zip algorithm DEF -14:55:58.371 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:58.371 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 7ms -14:55:58.381 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:58.381 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:55:58.381 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:58.381 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:58.381 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:58.381 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:58.381 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:58.381 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:58.381 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:58.381 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:58.382 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -14:55:58.383 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:58.383 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:58.383 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:58.384 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:55:58.386 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:55:58.387 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:55:58.387 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:58.387 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:58.387 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:58.388 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:58.388 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:58.388 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:58.388 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:58.388 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:58.392 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:58.396 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:58.399 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:58.403 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:58.403 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:58.403 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:58.403 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:58.404 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:58.404 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:58.405 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:58.405 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:58.405 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:58.406 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:58.406 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:58.406 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:58.406 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:58.407 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:58.407 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:58.407 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:58.407 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@13cf7d52 registered for zip algorithm DEF -14:55:58.407 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:58.407 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 26ms -14:55:58.407 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. -14:55:58.407 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:58.407 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:55:58.408 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:58.408 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:58.408 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:58.408 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:58.408 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:58.408 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:58.408 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:58.408 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:58.408 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@40005471 -14:55:58.408 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:55:58.408 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:58.408 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:58.408 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:58.409 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:55:58.410 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:55:58.410 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:55:58.410 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:58.410 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:58.410 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:58.411 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:58.411 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:58.411 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:58.411 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:58.411 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:58.411 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:58.412 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:58.413 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:58.414 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:58.414 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:58.414 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:58.414 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:58.414 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:58.414 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:58.415 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:58.415 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:58.415 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:58.415 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:58.415 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:58.416 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:58.416 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:58.416 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:58.416 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:58.416 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:58.416 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@5d2a4eed registered for zip algorithm DEF -14:55:58.416 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:58.416 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 8ms -14:55:58.425 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:58.426 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:55:58.426 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:58.426 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:58.426 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:58.426 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:58.426 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:58.426 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:58.426 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:58.426 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:58.427 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -14:55:58.427 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:58.427 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:58.428 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:58.429 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:55:58.430 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:55:58.432 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:55:58.432 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:58.432 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:58.432 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:58.433 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:58.433 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:58.433 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:58.433 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:58.433 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:58.437 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:58.440 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:58.444 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:58.448 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:58.448 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:58.448 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:58.448 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:58.448 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:58.449 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:58.449 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:58.449 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:58.449 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:58.449 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:58.449 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:58.450 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:58.450 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:58.451 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:58.451 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:58.451 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:58.451 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@78fbff54 registered for zip algorithm DEF -14:55:58.451 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:58.451 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 25ms -14:55:58.451 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. -14:55:58.451 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:58.451 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:55:58.451 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:58.452 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:58.452 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:58.452 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:58.452 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:58.452 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:58.452 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:58.452 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:58.452 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@40005471 -14:55:58.452 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:55:58.452 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:58.452 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:58.452 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:58.453 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:55:58.453 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:55:58.453 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:55:58.453 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:58.453 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:58.453 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:58.454 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:58.454 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:58.454 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:58.454 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:58.454 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:58.455 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:58.455 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:58.456 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:58.457 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:58.457 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:58.457 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:58.457 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:58.457 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:58.457 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:58.458 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:58.458 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:58.458 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:58.458 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:58.458 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:58.458 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:58.458 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:58.458 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:58.458 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:58.458 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:58.458 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@3e10dc6 registered for zip algorithm DEF -14:55:58.458 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:58.458 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 7ms -14:55:58.464 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. -14:55:58.464 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. -14:55:58.466 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. -14:55:58.467 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.184 s - in org.jose4j.jws.PublicKeyAsHmacKeyTest -[INFO] Running org.jose4j.jws.CritHeaderTest -14:55:58.469 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'nope' marked as critical. -14:55:58.471 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: crit header value not an array (class java.lang.String). -14:55:58.471 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: crit header value not an array (class java.lang.Boolean). -14:55:58.471 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'http://example.com/UNDEFINED' marked as critical. -14:55:58.472 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'urn:example.com:nope' marked as critical. -14:55:58.473 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'urn:example.com:nope' marked as critical. -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.006 s - in org.jose4j.jws.CritHeaderTest -[INFO] Running org.jose4j.jws.JwsCryptoPrimitiveTest -14:55:58.476 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getSignature(): Signature object: SHA256withECDSA -14:55:58.478 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getSignature(): Signature object: SHA256withRSA -14:55:58.483 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getMac(): javax.crypto.Mac@7e22550a -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.006 s - in org.jose4j.jws.JwsCryptoPrimitiveTest -[INFO] Running org.jose4j.jws.ChangingKeyTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jws.ChangingKeyTest -[INFO] Running org.jose4j.jws.JwsPlaintextTest -14:55:58.488 DEBUG org.jose4j.jws.JwsPlaintextTest - {"auth_time":1339613248,"exp":1339613548,"iss":"https:\/\/example.com","aud":"a","jti":"jIA8qa35AroV6iP2q4wRAl","user_id":"john","iat":1339613248,"acr":3} -[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s - in org.jose4j.jws.JwsPlaintextTest -[INFO] Running org.jose4j.jws.GetPayloadTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jws.GetPayloadTest -[INFO] Running org.jose4j.jwx.JsonWebStructureTest -[INFO] Tests run: 12, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.01 s - in org.jose4j.jwx.JsonWebStructureTest +[INFO] Running org.jose4j.jwk.JwkGlitchesInDeploymentTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.JwkGlitchesInDeploymentTest +[INFO] Running org.jose4j.jwk.Rfc7638JwkThumbprintTest +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s - in org.jose4j.jwk.Rfc7638JwkThumbprintTest +[INFO] Running org.jose4j.jwk.OctetSequenceJsonWebKeyTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.OctetSequenceJsonWebKeyTest +[INFO] Running org.jose4j.jwk.RsaJsonWebKeyTest +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.025 s - in org.jose4j.jwk.RsaJsonWebKeyTest +[INFO] Running org.jose4j.jwk.VerificationJwkSelectorTest +08:36:36.637 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:36.637 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:36.638 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:36.638 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:36.639 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:36.639 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:36.641 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:36.645 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:36.646 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:36.647 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:36.769 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +08:36:36.769 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:36.771 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:36.771 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:36.777 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:36.780 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:36.782 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:36.782 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:36.787 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:36.788 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:36.829 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:36.830 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:36.835 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:36.835 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:36.835 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:36.843 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:36.849 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:36.856 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:36.864 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:36.864 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:36.864 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:36.864 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:36.883 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:36.885 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:36.886 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:36.886 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:36.886 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:36.887 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:36.887 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:36.888 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:36.890 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:36.891 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:36.891 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:36.891 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:36.891 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@31000e60 registered for zip algorithm DEF +08:36:36.891 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:36.891 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 253ms +08:36:36.897 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:36.897 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:36.897 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:36.897 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:36.897 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:36.897 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:36.897 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:36.897 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:36.897 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:36.898 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:36.898 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@78e4deb0 +08:36:36.898 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +08:36:36.898 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:36.899 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:36.899 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:36.899 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:36.900 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:36.900 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:36.900 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:36.901 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:36.901 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:36.902 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:36.902 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:36.902 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:36.902 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:36.902 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:36.904 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:36.905 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:36.907 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:36.908 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:36.908 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:36.908 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:36.908 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:36.909 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:36.909 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:36.913 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:36.913 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:36.913 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:36.913 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:36.914 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:36.914 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:36.914 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:36.915 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:36.915 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:36.915 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:36.915 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@48d5f34e registered for zip algorithm DEF +08:36:36.915 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:36.915 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 18ms +08:36:36.916 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Missing required 'kty' parameter.). JWK params: {alg=RSA, mod=4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w, exp=AQAB, user=sig} and the full JWKS content: {"keys":[{"alg":"RSA","mod":"4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w","exp":"AQAB","user":"sig"}]}. +08:36:36.980 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying RS512 signature: java.security.SignatureException: Bad signature length: got 512 but was expecting 256 +08:36:36.984 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying RS512 signature: java.security.SignatureException: Bad signature length: got 256 but was expecting 512 +[INFO] Tests run: 23, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.414 s - in org.jose4j.jwk.VerificationJwkSelectorTest +[INFO] Running org.jose4j.jwk.HttpsJwksTest +[WARNING] Tests run: 3, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.004 s - in org.jose4j.jwk.HttpsJwksTest +[INFO] Running org.jose4j.jwk.EcJwkGeneratorTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.054 s - in org.jose4j.jwk.EcJwkGeneratorTest +[INFO] Running org.jose4j.jwk.JsonWebKeySetTest +08:36:37.102 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.InvalidKeyException: "NOPERS" is an unknown or unsupported value for the "crv" parameter.). JWK params: {kty=EC, crv=NOPERS, kid=iRTU, x=tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY, y=2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +08:36:37.103 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Boolean type but is required to be a String.). JWK params: {kty=false, x=GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY, y=Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +08:36:37.103 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'x' parameter was Array type but is required to be a String.). JWK params: {kty=EC, x=[IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, huh], y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +08:36:37.104 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Number type but is required to be a String.). JWK params: {kty=1, x=IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +08:36:37.104 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Number type but is required to be a String.). JWK params: {kty=885584955514411149933357445595595145885566661, x=IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +08:36:37.104 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Object type but is required to be a String.). JWK params: {kty={EC=EC}, x=riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM, y=izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +08:36:37.104 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Missing required 'kty' parameter.). JWK params: {kty=null, x=riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM, y=izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +[INFO] Tests run: 10, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.017 s - in org.jose4j.jwk.JsonWebKeySetTest +[INFO] Running org.jose4j.jwk.JsonWebKeyTest +[INFO] Tests run: 13, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.02 s - in org.jose4j.jwk.JsonWebKeyTest +[INFO] Running org.jose4j.jwk.Rfc7638JwkThumbprintUriTest +[INFO] Tests run: 11, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.018 s - in org.jose4j.jwk.Rfc7638JwkThumbprintUriTest +[INFO] Running org.jose4j.jwk.EllipticCurveJsonWebKeyTest +org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=AekpBQ8ST8a8VcfVOTNl353vSrDCLLJXmPk06wTjxrrjcBpXp5EOnYG_NjFZ6OvLFV1jSfS9tsz4qUxcWceqwQGk, y=ADSmRA43Z1DSNx_RvcLI87cdL07l6jQyyBXMoxVg_l2Th-x3S1WDhjDly79ajL4Kkd0AZMaZmh9ubmf63e3kyMj2, crv=P-521} +[INFO] Tests run: 7, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.006 s - in org.jose4j.jwk.EllipticCurveJsonWebKeyTest +[INFO] Running org.jose4j.jwk.JsonWebKeySetAnotherTest +08:36:37.180 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Missing required 'y' parameter.). JWK params: {kty=EC, kid=this one shouldn't work 'cause there's no y, x=msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY, crv=P-256} and the full JWKS content: { "keys": [ { "kty": "EC", "kid": "96", "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg", "y": "y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4", "crv": "P-256" }, { "kty": "EC", "kid": "a9", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ", "crv": "P-256" }, { "kty": "EC", "kid": "this one shouldn't work 'cause there's no y", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "crv": "P-256" }, { "kty": "EC", "kid": "2d", "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw", "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4", "crv": "P-256" } ]}. +08:36:37.181 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Unknown key type algorithm: 'UNKNOWN'). JWK params: {kty=UNKNOWN, crv=whatever, x=11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo} and the full JWKS content: { "keys": [ { "kty": "EC", "kid": "96", "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg", "y": "y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4", "crv": "P-256" }, { "kty": "EC", "kid": "a9", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ", "crv": "P-256" }, { "kty":"UNKNOWN", "crv":"whatever", "x":"11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo" } { "kty": "EC", "kid": "2d", "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw", "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4", "crv": "P-256" } ]}. +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.jwk.JsonWebKeySetAnotherTest +[INFO] Running org.jose4j.jwk.RsaJwkGeneratorTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.345 s - in org.jose4j.jwk.RsaJwkGeneratorTest +[INFO] Running org.jose4j.jwk.ExtraJwkParametersTest +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.ExtraJwkParametersTest +[INFO] Running org.jose4j.jwk.DecryptionJwkSelectorTest +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.017 s - in org.jose4j.jwk.DecryptionJwkSelectorTest +[INFO] Running org.jose4j.jwk.X5cTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.007 s - in org.jose4j.jwk.X5cTest +[INFO] Running org.jose4j.jwk.OctJwkGeneratorTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.OctJwkGeneratorTest [INFO] Running org.jose4j.jwx.CompactSerializerTest -[INFO] Tests run: 11, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwx.CompactSerializerTest +[INFO] Tests run: 11, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.008 s - in org.jose4j.jwx.CompactSerializerTest [INFO] Running org.jose4j.jwx.HeadersTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwx.HeadersTest -[INFO] Running org.jose4j.jca.ProviderContextTest -14:55:58.518 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:58.518 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21, BC version 1.77] security providers installed)... -14:55:58.518 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:58.518 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:58.518 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:58.518 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:58.518 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:58.518 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:58.518 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:58.518 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:58.519 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@40005471 -14:55:58.519 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:55:58.519 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:58.519 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:58.519 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:58.520 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:55:58.522 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:55:58.523 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:55:58.523 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:58.523 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:58.523 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:58.524 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:58.524 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:58.524 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:58.524 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:58.524 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:58.528 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:58.531 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:58.535 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:58.539 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:58.539 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:58.539 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:58.539 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:58.539 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:58.539 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:58.539 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:58.539 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:58.539 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:58.539 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:58.539 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:58.540 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:58.540 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:58.540 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:58.540 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:58.540 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:58.540 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@62e6b5c8 registered for zip algorithm DEF -14:55:58.540 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:58.540 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 22ms -14:55:58.552 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:58.552 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:55:58.552 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:58.552 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:58.552 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:58.552 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:58.552 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:58.552 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:58.552 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:58.552 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:58.553 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@40005471 -14:55:58.553 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:55:58.553 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:58.553 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:58.553 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:58.553 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:55:58.554 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:55:58.554 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:55:58.554 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:58.554 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:58.554 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:58.555 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:58.555 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:58.555 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:58.555 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:58.555 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:58.556 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:58.556 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:58.557 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:58.558 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:58.558 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:58.558 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:58.558 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:58.559 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:58.559 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:58.559 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:58.559 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:58.559 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:58.559 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:58.559 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:58.559 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:58.559 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:58.560 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:58.560 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:58.560 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:58.560 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@2a8d39c4 registered for zip algorithm DEF -14:55:58.560 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:58.560 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 8ms -14:55:58.577 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:58.577 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21, BC version 1.77] security providers installed)... -14:55:58.577 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:58.577 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:58.577 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:58.577 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:58.577 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:58.577 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:58.577 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:58.577 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:58.577 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@40005471 -14:55:58.577 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:55:58.577 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:58.577 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:58.578 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:58.579 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:55:58.580 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:55:58.581 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:55:58.582 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:58.582 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:58.582 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:58.582 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:58.582 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:58.582 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:58.582 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:58.582 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:58.586 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:58.590 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:58.593 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:58.597 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:58.597 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:58.597 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:58.597 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:58.597 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:58.598 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:58.598 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:58.598 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:58.598 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:58.598 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:58.598 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:58.598 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:58.598 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:58.598 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:58.598 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:58.599 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:58.599 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@4c398c80 registered for zip algorithm DEF -14:55:58.599 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:58.599 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 22ms -14:55:58.601 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:58.601 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:55:58.601 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:58.601 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:58.601 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:58.601 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:58.601 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:58.601 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:58.601 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:58.601 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:58.602 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@40005471 -14:55:58.602 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:55:58.602 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:58.602 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:58.602 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:58.603 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:55:58.603 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:55:58.603 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:55:58.603 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:58.603 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:58.603 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:58.604 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:58.604 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:58.604 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:58.604 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:58.604 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:58.605 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:58.605 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:58.606 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:58.607 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:58.607 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:58.607 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:58.607 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:58.608 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:58.608 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:58.608 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:58.608 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:58.608 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:58.608 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:58.608 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:58.608 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:58.608 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:58.609 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:58.609 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:58.609 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:58.609 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@607fbe09 registered for zip algorithm DEF -14:55:58.609 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:58.609 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 8ms -[INFO] Tests run: 12, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.175 s - in org.jose4j.jca.ProviderContextTest -[INFO] Running org.jose4j.jwa.AlgorithmFactoryTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwa.AlgorithmFactoryTest -[INFO] Running org.jose4j.jwa.AlgorithmConstraintsTest -[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwa.AlgorithmConstraintsTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s - in org.jose4j.jwx.HeadersTest +[INFO] Running org.jose4j.jwx.JsonWebStructureTest +[INFO] Tests run: 12, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.007 s - in org.jose4j.jwx.JsonWebStructureTest [INFO] Running org.jose4j.base64url.internal.apache.commons.codec.binary.Base64Test -[INFO] Tests run: 47, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.016 s - in org.jose4j.base64url.internal.apache.commons.codec.binary.Base64Test -[INFO] Running org.jose4j.jwe.RsaKeyManagementMoreTest -14:55:58.714 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap/decrypt failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:383); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:475); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted... -14:55:58.714 DEBUG o.j.jwe.RsaKeyManagementMoreTest - org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch; caused by: javax.crypto.AEADBadTagException: Tag mismatch -14:55:58.716 DEBUG o.j.jwe.RsaKeyManagementMoreTest - org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch; caused by: javax.crypto.AEADBadTagException: Tag mismatch -14:55:58.925 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:58.925 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:55:58.925 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:58.925 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:58.925 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:58.925 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:58.925 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:58.925 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:58.925 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:58.925 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:58.927 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -14:55:58.927 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:58.927 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:58.927 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:58.928 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:55:58.929 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:55:58.931 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:55:58.931 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:58.931 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:58.931 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:58.932 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:58.932 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:58.932 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:58.932 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:58.932 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:58.936 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:58.939 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:58.943 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:58.947 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:58.947 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:58.947 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:58.947 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:58.947 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:58.947 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:58.948 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:58.948 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:58.948 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:58.948 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:58.948 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:58.948 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:58.949 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:58.949 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:58.949 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:58.949 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:58.949 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@2bd2b28e registered for zip algorithm DEF -14:55:58.949 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:58.949 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 24ms -14:55:58.963 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:55:58.963 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:55:58.963 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:55:58.963 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:55:58.963 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:55:58.963 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:55:58.963 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:55:58.963 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:55:58.963 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:55:58.963 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:55:58.963 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@40005471 -14:55:58.963 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:55:58.963 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:55:58.963 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:55:58.963 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:55:58.964 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:55:58.964 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:55:58.964 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:55:58.964 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:55:58.964 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:55:58.964 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:55:58.965 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:55:58.965 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:55:58.965 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:55:58.965 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:55:58.965 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:55:58.966 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:55:58.966 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:55:58.967 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:55:58.968 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:55:58.968 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:55:58.968 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:55:58.968 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:55:58.968 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:55:58.968 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:55:58.968 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:55:58.968 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:55:58.968 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:55:58.968 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:55:58.968 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:55:58.968 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:55:58.968 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:55:58.969 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:55:58.969 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:55:58.969 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:55:58.969 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@73163d48 registered for zip algorithm DEF -14:55:58.969 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:55:58.969 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 6ms -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.256 s - in org.jose4j.jwe.RsaKeyManagementMoreTest -[INFO] Running org.jose4j.jwe.XEcdhTest -{"kty":"OKP","crv":"X25519","x":"7yQZNayLGVsgvoH3OFbBPCcJGxE73cNwxVozFDOh7xc","d":"G8J55QvR68wCHJfQag3mnwPbJv4_J0-CHOI4vu21EqE"} -eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJPS1AiLCJjcnYiOiJYMjU1MTkiLCJ4IjoiQUJ4NVZsZHN6MlpKYU11NW9nNEh5VXVPemFJcW44LTAwVVpsM3AxaGtuWSJ9fQ..30gyIwRZn1hvDR1Dr1QfmQ.Vi2rtXQHK_hGBbtZ7mgK0UndqbZ7VefpQjmfRe4mdRabg2Mih-Ja43i2JjssiPLc.hLvVNfvZnvY4Zys4gMGEDQ -eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiT0tQIiwiY3J2IjoiWDQ0OCIsIngiOiJlX2F0Q09SejZpR2lrQ0dPWlhGOHRrNnRROUJLNU9NakhwMzFGeTRvX3ZaY0JYRURWNnoxTTMxZkd4Qno1ajhHYTZmTGE0ejNEaG9BIn19.6Q08wQ-rYD0sjYCQ3n9pRE1o8yJ5obX4brKdxQn7LfTH7NoWsKqc7wZPsAhmz9EBv5IH85eplXsG9n1Pi2hdHmFr-ECBE2mo.o_g_rUz_6elGkwkOBZkovw.s2WB8Qfx1NNHkIvlrSNr-IAqKM4y9XMiXen_Vzm7LK9ezq812K_c6Kbalhpth28i.AprQ7cF7Ewf9sC47djvq4nhKeoeIv0BOpbQ9Iob5ncE -[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.022 s - in org.jose4j.jwe.XEcdhTest +[INFO] Tests run: 47, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.063 s - in org.jose4j.base64url.internal.apache.commons.codec.binary.Base64Test +[INFO] Running org.jose4j.jwe.JsonWebEncryptionTest +[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.037 s - in org.jose4j.jwe.JsonWebEncryptionTest +[INFO] Running org.jose4j.jwe.EcdhKeyAgreementAlgorithmTest +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.052 s - in org.jose4j.jwe.EcdhKeyAgreementAlgorithmTest +[INFO] Running org.jose4j.jwe.CritHeaderTest +08:36:37.789 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'so.crit' marked as critical. +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.CritHeaderTest +[INFO] Running org.jose4j.jwe.ZipTest +eyJ6aXAiOiJERUYiLCJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..oF8U-ioynb2taQpE4m9t6g.FAToV5UTUFQ6ilC0qCYjK_U1wD8FE-KIOqzwC8Q_w_tUSysMuO-zSEb3H_1ImFnaCCQDXBwcKvgDrGlqydeO4Q.vpU_rc5ofe44EsllCG-X7g +eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..qQNyRabb4Gou9UYm5g2KqA.uVfjz_jhpQi9PwJGfRc_cL-tMZglks_YEVBfZoGCDmBCxqLJJvWBSU5s4awSChPMuLrADiO_8Baq9tVo1cG3mQPg3GICj31fs1fOusjxldtq9zZz9zmIrWmMWYWq_XGygt4Tby8l2pFmEMauXCkK8o_DKWHBzu92RwHc5y3ibNMbFB_Ndx3UNCqvBsaJisetI3bgyS3Eq0NikrosvsEqUzV7nBIn0z_L7n166xuhjic-Iu-s76W3QKMUbdLOifMUfrmazhJ3adpZx8ozuk1MdCSgdYHs80nOuRA7enRfmlee9IiB6juxAIhN5yXq9aLa3lC7FrZNZk1f3SK9YC_3YgVZImaAP0bMx51Ijj4m4MN1QQXO8mQwCb6-pxSbsKUh.3KeDXhIqZcnHR4nbFWkB4w +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwe.ZipTest +[INFO] Running org.jose4j.jwe.GeneralJweTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.GeneralJweTest [INFO] Running org.jose4j.jwe.Aes128CbcHmacSha256ContentEncryptionAlgorithmTest -[WARNING] Tests run: 4, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.001 s - in org.jose4j.jwe.Aes128CbcHmacSha256ContentEncryptionAlgorithmTest -[INFO] Running org.jose4j.jwe.Aes256GcmContentEncryptionAlgorithmTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.008 s - in org.jose4j.jwe.Aes256GcmContentEncryptionAlgorithmTest +[WARNING] Tests run: 4, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.006 s - in org.jose4j.jwe.Aes128CbcHmacSha256ContentEncryptionAlgorithmTest +[INFO] Running org.jose4j.jwe.kdf.Pbkdf2MoreTest +[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.02 s - in org.jose4j.jwe.kdf.Pbkdf2MoreTest +[INFO] Running org.jose4j.jwe.kdf.Rfc6070Pbkdf2TestVectorsTest +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.046 s - in org.jose4j.jwe.kdf.Rfc6070Pbkdf2TestVectorsTest +[INFO] Running org.jose4j.jwe.kdf.ConcatKeyDerivationFunctionTest +Sq8rGLm4rEtzScmnSsY5r1n-AqBl_iBU8FxN80Uc0S0 +LfkHot2nGTVlmfxbgxQfMg +[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.jwe.kdf.ConcatKeyDerivationFunctionTest +[INFO] Running org.jose4j.jwe.kdf.Pbkdf2CompareToJavaSecretKeyFactorySha1Test +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.045 s - in org.jose4j.jwe.kdf.Pbkdf2CompareToJavaSecretKeyFactorySha1Test +[INFO] Running org.jose4j.jwe.kdf.Pbkdf2JwkExampleTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.015 s - in org.jose4j.jwe.kdf.Pbkdf2JwkExampleTest [INFO] Running org.jose4j.jwe.NegativeJweWrappingTest -14:55:59.011 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap/decrypt failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:383); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:475); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted... -14:55:59.011 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ -14:55:59.013 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap/decrypt failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:383); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:475); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted... -14:55:59.013 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ -14:55:59.015 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed. -14:55:59.016 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed. -14:55:59.018 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=FlleGhb7Jp-VlWS1wonqsA -14:55:59.020 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ -14:55:59.022 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.InvalidKeyException: 256 bit content encryption key is not the correct size for the A192CBC-HS384 content encryption algorithm (384). -eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.MKaZT0kvfeYuXa2O4ANsRdR8RaQHxxuKUYI3vANgMX-_HAaT9YqYeXleUbboT28DN6EBAbY-U7WtxbYNo0s_IPKLtyvKM0go7eLxL8p-X6lwSh5iIbyCc6H4MckWLT8b7pWslPGl3HTUJPQTSVY-uwwa1al_YdumZtxhj_K9OUVCGaTesT5jpO0cgdpJCB01NpHN8AlhdUhFEYc9YaeKo_fsKCuEMDjQTkNdtWz-DN_HAk3KVxeCCusAbAJQ7cT3AD1TMg6PlYwzV-ZvRkvHy8B_E_LjToqnU62T3JH05v_8e6ft3MeISDdcHQlProEhkcBxCrMELHQN99QNpH_eMg.ONH9dxpDKEAZ1rLuPZC8GA.ya8jLexG_pI0WBHynwSrjeHt-ZV-wUPF3v4X74je9V9rSjaU6iKYR2hli_CyO8efRYILZzqDqEvr0uhbY589ms8Uq2W7RlDE_Stqh3112ig.50UsrVdjsH8tFAfmCoGzPQ -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.015 s - in org.jose4j.jwe.NegativeJweWrappingTest +08:36:37.991 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap/decrypt failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:383); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:475); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted... +08:36:37.991 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ +08:36:37.995 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap/decrypt failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:383); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:475); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted... +08:36:37.995 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ +08:36:37.999 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed. +08:36:38.002 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed. +08:36:38.006 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=FlleGhb7Jp-VlWS1wonqsA +08:36:38.009 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ +08:36:38.013 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.InvalidKeyException: 256 bit content encryption key is not the correct size for the A192CBC-HS384 content encryption algorithm (384). +eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.VFZsNxOfEN4LiZHX6woU2bRE0S_gqB0y0pAEcS8tMT0ndTFMelTylHvKJ4YQwoAaPXllV3JrBqpgTp0PiZENJRlwbkzpXPhZSPC66dURms7-9N7BQP557cXwBpwS1RUpVTs0WYEmazWeW90UMZ7MqvrQWygdI1AebdQOq4Ns0I5uochyh3WrkqkkAFNMfD72wDhJfqXl-rrKGJD7ZDxpCoKBTt3Pc71hZ-QVCap2DxnyKcYaVgfXJ7AwuxtynUdIMPadEsd7AxRQygk33M3kaguEfyI53mM5ssn99eFsnsvltSQzVs3nSJshvTaFj3ABOgHDd12FgKSfQS7z81PZTw.GoyVuNNJiGMM6Vn_NBQ94A.DdrOi-M8vVX3GN7TWTYAzfor_w6lvNvqphpON6Gfgb6KwJ9PUvxh22g187p6ClvS6kZD7_BNL9gqQgnM7wam04dm7s5v4Yn9oS2LQVLgWUM.bDWatxN-8Y_VqEi7g4pmBQ +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.035 s - in org.jose4j.jwe.NegativeJweWrappingTest +[INFO] Running org.jose4j.jwe.Pbes2ExampleEncryptedRSAPrivateKeyJwkAppendixCTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.031 s - in org.jose4j.jwe.Pbes2ExampleEncryptedRSAPrivateKeyJwkAppendixCTest +[INFO] Running org.jose4j.jwe.XEcdhTest +{"kty":"OKP","crv":"X25519","x":"ZRztinXrmFNJxi_C214N6cvs-ZdxX9nWCgZtzfHw1mQ","d":"P0C3A_4uBab7Em1fkAddWci42u3oJzkWGSZETUUBEHM"} +eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJPS1AiLCJjcnYiOiJYMjU1MTkiLCJ4IjoiWFMyQ1ZaX1BpTjdrak40TlV5ZW1rckFxZkZRTUdlcnBNOE5FNVgwN1lpTSJ9fQ..cSOL5oxx5yfgmKWBKT__Ow.it_4X2QwY62b1fRihqDoN8bLb8FTlzDfgiP8_nvXfRjdaEMMjDg_iTffv2fTZwg8.zmjuTNywEwVUdubDM4lz0A +eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiT0tQIiwiY3J2IjoiWDQ0OCIsIngiOiJ5NzRORVF6bmdoN1lNaFJCam92YlBTNjFWWERoa1NZZ3ZOU3NsYlgyQjBUUlpRQ1JFMWt1LUhQYW9FODZVNjFOLWdYR0d6T3dla2dBIn19.sZuaboQ8B-QubmEuzcAhXK2qLMLWdf6hsLvodVjXgSfywPmeqzIp1f0BjzGZq9ox3o62KAJN6iJMd8yaDATB7Q2MynmlGKXp.D7_A_1AeEDRbuowZRlzelQ.pO2fla3XyCl-X4GB04jMLT2D_BI-_KUZIHvKLNxP-AXOUMWx9CWEu-W1hX71jj1p.onR3Whxlqu1liNmA_6gMgu4KQ2WJIJRnP-9xTLWNwWA +[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.092 s - in org.jose4j.jwe.XEcdhTest +[INFO] Running org.jose4j.jwe.Aes128KeyWrapManagementAlgorithmTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.Aes128KeyWrapManagementAlgorithmTest +[INFO] Running org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithmTest +eyJhbGciOiJQQkVTMi1IUzI1NitBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwicDJjIjo2NTUzNiwicDJzIjoiS3VPYzlCVDZoZ2l4TnRHZiJ9._Q13pJfgeLD28xujTiA7ZhSQZK1nW4ygLAMx9UpBLNhfb_4pf2QxSg.wQxrnnwqMRTSMJI0SPVw1w.0XkFIUUjn0v6wb_Q-dKhVg.o0iRMmskRSEYP37dR8DC8A +08:36:42.542 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'PBES2-HS512+A256KW' is a blocked algorithm.): eyJhbGciOiJQQkVTMi1IUzUxMitBMjU2S1ciLCJwMnMiOiI4UTFTemluYXNSM3hjaFl6NlpaY0hBIiwicDJjIjoyMTQ3NDgzNjQ3LCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.YKbKLsEoyw_JoNvhtuHo9aaeRNSEhhAW2OVHcuF_HLqS0n6hA_fgCA.VBiCzVHNoLiR3F4V82uoTQ.23i-Tb1AV4n0WKVSSgcQrdg6GRqsUKxjruHXYsTHAJLZ2nsnGIX86vMXqIi6IRsfywCRFzLxEcZBRnTvG3nhzPk0GDD7FMyXhUHpDjEYCNA_XOmzg8yZR9oyjo6lTF6si4q9FZ2EhzgFQCLO_6h5EVg3vR75_hkBsnuoqoM3dwejXBtIodN84PeqMb6asmas_dpSsz7H10fC5ni9xIz424givB1YLldF6exVmL93R3fOoOJbmk2GBQZL_SEGllv2cQsBgeprARsaQ7Bq99tT80coH8ItBjgV08AtzXFFsx9qKvC982KLKdPQMTlVJKkqtV4Ru5LEVpBZXBnZrtViSOgyg6AiuwaS-rCrcD_ePOGSuxvgtrokAKYPqmXUeRdjFJwafkYEkiuDCV9vWGAi1DH2xTafhJwcmywIyzi4BqRpmdn_N-zl5tuJYyuvKhjKv6ihbsV_k1hJGPGAxJ6wUpmwC4PTQ2izEm0TuSE8oMKdTw8V3kobXZ77ulMwDs4p.ALTKwxvAefeL-32NY7eTAQ] +08:36:42.542 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: PBES2 iteration count (p2c=2147483647) cannot be more than 2499999 to avoid excessive resource utilization.): eyJhbGciOiJQQkVTMi1IUzUxMitBMjU2S1ciLCJwMnMiOiI4UTFTemluYXNSM3hjaFl6NlpaY0hBIiwicDJjIjoyMTQ3NDgzNjQ3LCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.YKbKLsEoyw_JoNvhtuHo9aaeRNSEhhAW2OVHcuF_HLqS0n6hA_fgCA.VBiCzVHNoLiR3F4V82uoTQ.23i-Tb1AV4n0WKVSSgcQrdg6GRqsUKxjruHXYsTHAJLZ2nsnGIX86vMXqIi6IRsfywCRFzLxEcZBRnTvG3nhzPk0GDD7FMyXhUHpDjEYCNA_XOmzg8yZR9oyjo6lTF6si4q9FZ2EhzgFQCLO_6h5EVg3vR75_hkBsnuoqoM3dwejXBtIodN84PeqMb6asmas_dpSsz7H10fC5ni9xIz424givB1YLldF6exVmL93R3fOoOJbmk2GBQZL_SEGllv2cQsBgeprARsaQ7Bq99tT80coH8ItBjgV08AtzXFFsx9qKvC982KLKdPQMTlVJKkqtV4Ru5LEVpBZXBnZrtViSOgyg6AiuwaS-rCrcD_ePOGSuxvgtrokAKYPqmXUeRdjFJwafkYEkiuDCV9vWGAi1DH2xTafhJwcmywIyzi4BqRpmdn_N-zl5tuJYyuvKhjKv6ihbsV_k1hJGPGAxJ6wUpmwC4PTQ2izEm0TuSE8oMKdTw8V3kobXZ77ulMwDs4p.ALTKwxvAefeL-32NY7eTAQ] +08:36:42.543 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'PBES2-HS512+A256KW' is a blocked algorithm.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTNTEyK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJwMnMiOiJGbVE0aDY1aUFlZEs0SUFyIn0._P2Mbn0nvqRZVCaEaLnKQkMFwGNmEVbm8Ffnb5uIas0iAt5wcWC3T7rdTwyliWW11YnhpaiXH0WRalAsIUyaVHC4Ku1j9bVP.Tg2KOblqWEF9iC71O-WgBw.OCjt9WYrTFMIst7XBZ8HeA.YRqs3_nMchYr39AJYquQs8-PrZa2NGuqshOvtLfWSvE] +08:36:42.543 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: PBES2 iteration count (p2c=2500000) cannot be more than 2499999 to avoid excessive resource utilization.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTNTEyK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJwMnMiOiJGbVE0aDY1aUFlZEs0SUFyIn0._P2Mbn0nvqRZVCaEaLnKQkMFwGNmEVbm8Ffnb5uIas0iAt5wcWC3T7rdTwyliWW11YnhpaiXH0WRalAsIUyaVHC4Ku1j9bVP.Tg2KOblqWEF9iC71O-WgBw.OCjt9WYrTFMIst7XBZ8HeA.YRqs3_nMchYr39AJYquQs8-PrZa2NGuqshOvtLfWSvE] +08:36:42.543 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'PBES2-HS384+A192KW' is a blocked algorithm.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTMzg0K0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJwMnMiOiJneXBKYzJFVXNtbmNqTUtqIn0.RYXJhCW2m4Pa5XPUPVVQVJRg8z-jj-zyXoa-Q1JzdfjO2tvrELM7Ko3qhkv2WcUAw3ZagzIeNjY.FhNCr7zjUt0fA6KotCbdUw.DMYLybjcrOX9cfwdWaORLg.QCGY9clkv4sz1rZeexg2dUx4ViH-BeL7 +] +08:36:42.543 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: PBES2 iteration count (p2c=2500000) cannot be more than 2499999 to avoid excessive resource utilization.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTMzg0K0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJwMnMiOiJneXBKYzJFVXNtbmNqTUtqIn0.RYXJhCW2m4Pa5XPUPVVQVJRg8z-jj-zyXoa-Q1JzdfjO2tvrELM7Ko3qhkv2WcUAw3ZagzIeNjY.FhNCr7zjUt0fA6KotCbdUw.DMYLybjcrOX9cfwdWaORLg.QCGY9clkv4sz1rZeexg2dUx4ViH-BeL7 +] +[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 4.389 s - in org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithmTest +[INFO] Running org.jose4j.jwe.RsaOaepKeyManagementAlgorithmTest +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.046 s - in org.jose4j.jwe.RsaOaepKeyManagementAlgorithmTest +[INFO] Running org.jose4j.jwe.RsaKeyManagementMoreTest +08:36:42.603 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap/decrypt failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:383); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:475); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted... +08:36:42.603 DEBUG o.j.jwe.RsaKeyManagementMoreTest - org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch; caused by: javax.crypto.AEADBadTagException: Tag mismatch +08:36:42.607 DEBUG o.j.jwe.RsaKeyManagementMoreTest - org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch; caused by: javax.crypto.AEADBadTagException: Tag mismatch +08:36:43.080 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:43.080 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:43.080 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:43.081 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:43.081 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:43.081 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:43.081 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:43.081 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:43.081 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:43.081 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:43.089 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +08:36:43.089 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:43.089 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:43.089 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:43.092 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:43.094 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:43.096 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:43.096 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:43.096 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:43.096 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:43.099 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:43.099 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:43.099 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:43.099 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:43.099 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:43.120 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:43.125 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:43.129 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:43.134 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:43.134 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:43.134 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:43.134 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:43.135 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:43.136 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:43.137 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:43.137 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:43.137 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:43.137 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:43.137 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:43.138 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:43.139 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:43.139 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:43.139 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:43.139 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:43.139 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@63fdab07 registered for zip algorithm DEF +08:36:43.139 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:43.139 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 59ms +08:36:43.169 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:43.169 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:43.169 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:43.170 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:43.170 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:43.170 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:43.170 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:43.170 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:43.170 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:43.170 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:43.171 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@78e4deb0 +08:36:43.171 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +08:36:43.171 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:43.171 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:43.171 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:43.172 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:43.172 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:43.173 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:43.173 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:43.173 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:43.173 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:43.173 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:43.173 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:43.173 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:43.173 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:43.173 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:43.174 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:43.175 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:43.176 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:43.177 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:43.177 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:43.177 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:43.177 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:43.178 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:43.178 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:43.178 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:43.178 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:43.178 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:43.178 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:43.178 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:43.178 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:43.178 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:43.179 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:43.179 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:43.179 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:43.179 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@5286c33a registered for zip algorithm DEF +08:36:43.179 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:43.179 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 10ms +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.58 s - in org.jose4j.jwe.RsaKeyManagementMoreTest +[INFO] Running org.jose4j.jwe.JweCryptoPrimitiveTest +08:36:43.182 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getCipher(): Cipher.RSA/ECB/OAEPWithSHA-1AndMGF1Padding, mode: key unwrapping, algorithm from: SunJCE +08:36:43.208 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@5c530d1e +08:36:43.217 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@85e6769 +08:36:43.224 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@c5ee75e +08:36:43.226 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKey(): 256 bit AES key +08:36:43.227 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getCipher(): Cipher.AESWrap, mode: key unwrapping, algorithm from: SunJCE +08:36:43.633 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKey(): javax.crypto.spec.SecretKeySpec@1781a +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.411 s - in org.jose4j.jwe.JweCryptoPrimitiveTest +[INFO] Running org.jose4j.jwe.Rsa1_5KeyManagementAlgorithmTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwe.Rsa1_5KeyManagementAlgorithmTest +[INFO] Running org.jose4j.jwe.Aes256GcmContentEncryptionAlgorithmTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.Aes256GcmContentEncryptionAlgorithmTest +[INFO] Running org.jose4j.jwe.InvalidCurveTest +08:36:43.660 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key is equal to 26 mod 113 +08:36:43.660 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w +08:36:43.660 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as expected: org.jose4j.lang.InvalidKeyException: epk is invalid for P-256 +08:36:43.661 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key is equal to 2446 mod 2447 +08:36:43.661 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w +08:36:43.661 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as expected: org.jose4j.lang.InvalidKeyException: epk is invalid for P-256 +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.InvalidCurveTest +[INFO] Running org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest +08:36:43.667 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoibUp4UmZ1MUZ3UUZvTjN4bFhCUXRzUE1TSHpVNUI1bS1aaF8tSEM3RlR3YyIsInkiOiJqMG4yRFgxQWMyek1UT2o2ZUFXendYOFJELTNkOUhxYVJuQ1ZwcHl0NHFJIiwiY3J2IjoiUC0yNTYifX0.hZ4RC1_Srj_AAc_T5TeHJwUCEwIPMkqbNqZMUyZbMTAxMpE_E3PLfQ.lvZD4A4Gx-dEuX1aySfbsA.8zioQgcHeeWMkV0piQjaiELFrlv3BnOcMQT1yKaLtizd5xZ9flsu1YL7X_l9Shd779-25wakEwJIDaN8P4EbJw.jqulf7tQU72itQZLWTKETg +08:36:43.675 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiNFJqY0x1d3VhV1phWndVQUd6SDVYY1BwQmFNTUhBVkJ0RXRQQ1lVX0tWMCIsInkiOiIxdjZZdUFBTWpGcTE2VXZ5VnE3R094eTQtRWhQLTcwYTdKOXRManFMVzRFIiwiY3J2IjoiUC0yNTYifX0.e4ZYpmZMLmdOqybarHwVdUyh0vdabkQjiQAbJwCy-IRcm2aJIQTg0WgW488LSrSHvnFtzrIW82Y.C2r7HjYAkFwbmbWPK30pdg.cJ_6YzI4x1w0xrgHCLA9oO4WjNH3ISrNrVrOQk_EuD7MTouf9zOx8A9f4sLRZa6Fh2flcecPC4sYH_0Gapsxmw.A6AiocLJsMPwaWvn7ly-nJ42EVxbvA5p +08:36:43.682 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4Ijoid0dfQUJZRGh4YVZoWXNQOUxUa0tNWi00RnNTV0g5VjJxOFdkYklZQnQxZyIsInkiOiI2NC1OTVJibzhyM1k4VGY1eDBhUFl2cUR1Q295cjEteWVrODNDdFBZblVzIiwiY3J2IjoiUC0yNTYifX0.dbHrpWPZT-NOd_1JCUl1tuTUJIGfrvw2x_LIwNO7gK6ge7JdoC1olZZsiqW5H41kLZFwF-si-nADYjVuKAngo3JSPuALhpwW.xz77vPvppTy6UTKdiR4LcA.MLhOuKJ-gPvmSM6r0LOJdqcWeXDgZ0CjSD7PSb38rSPMH_NR8M690qyRq-vMXwrocJI3NW5Zb0Z1HXlJ6Bi0BA.fcIQsSfwLuvD-ABYRb6D-HWQJgzHtADyMsD0EECwAnM +08:36:43.689 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiaFI0TzdCWkNwRUJlWU1pODdyS1lTWjdMRFFEd2EyRHBxNUlpRldzNDRrWSIsInkiOiJaaktVSkgxaWx0a3ZKZGxyN1IzT2NnMEJpUmFyNm5Ta3g3ZzlCeWJfQk5rIiwiY3J2IjoiUC0yNTYifX0.mL9bULUQaL6ndg6Uq_XyO5MFknv_Gv0bvYQSTVvhGcy2Y3M9QHHdJA.SUaFLC9n_X-qEhEf_sC4eA.Y91nWERiVBO1H1i2wkQJiwZkIKjPi80nAqwG1YQEiRTwwpmM8e1nTpyXoxgJrK_vSK-3pNwfpThxxA1FUkE-vQ.rJ9AE9WShGYvBw9-AT5XoQ +08:36:43.696 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiMEFMTGJiVzlEOHpGS2JNeEZBa1FVM1dPd08zUFd0TlZodXhZTThLZGc1OCIsInkiOiJWamhwdHZRWG4wcXNOTUplWGtqVlRXNWZpM2d6cl93Q09yWldKSG4xZEIwIiwiY3J2IjoiUC0yNTYifX0.fEpPZKd3FhEWBtcUsh4jL4bQhc8eW_bT5mC0NILnDJ4fb5XwFUZ-jjoGadB7YoNKvEAM5W5zmgM.VeSHJ3K6xYTuoSq7UZ46nA.LoKEl7yDTDfaN5h2WEU3dkm05m6x0OmPpiFZvgoLTxOMSY_4M8tlR3Rxjar1xEdO6fXCoC4-I73KuPkqlc2EbQ.BR5c57qugJGkjWVfKIKcp7uo0xRyk4og +08:36:43.703 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiMF85b1BBOC04YXZIb1BHNnBHQng5c1NJOWFyZVAwUlBtdVdvSkF3SUxqZyIsInkiOiJBcFFNeGpzMjVHalFqVzdXazNhaXhUV25jOWU5X1Q1NW9ZMTVxeVV4QzJvIiwiY3J2IjoiUC0yNTYifX0.z71_8EojyAYnlJjmTpJS9PFrPfYWSRqRDiIr_-485H84sQ3pZFv1LuzaevmqFR6K716LBi1IYz8rEo8qqNjMDlS7WoN6t0m-.oKt6JHJKtmG788WhXilaVQ.Gs-Cmsl-OnLm25yfOyMVz7i6fGTOTpjdCo9HbRRh73-JstGdLjGCMjRPkO_armeoLaSJfYX4K9BAD7atdecNRg.GPkLRQUj3XITYHfx08u8zjRuh-sslzFldaaYK_wXfio +08:36:43.711 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiNGJjeWE1SDVrZnRxMUlCQTJfc1ZMM3ctZjRxUEQxd1Y4M29mbnp5cDc4dyIsInkiOiJSRTk1LUJjdk5XYWxxV2c2MDZnSDBrV2ZJLTlZazZUVUktQ3ZpajZhTTZZIiwiY3J2IjoiUC0yNTYifX0.AJmT0F6tlyTrbb-NuI-jv8WXkhHtjzt7VWxL4a5ASGWkp8gDUDmVZQ.ihhsYdB4XYG8qTMsXmV6EQ.uq-cCkkfeJjPu6bzL5EWLX3WvFQbtrgyQgkkw7T3wzfCx2vX0i_PyBxMcILJnFL-2SyIUj59epT3Nm70UqlRcg.YqYlMEeVsip7nek82s5Zrw +08:36:43.718 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiVUJBcnM1ZjBOMGhLRFluSThJWFpzSUJpM3d4R2J0MnpTeVZQQ2poTDRKayIsInkiOiI4RmtsdmtFUVdmZXloODUwWWhPRXRCUGVhQ21iTVhxV3E5dF9JX2ZqT2JnIiwiY3J2IjoiUC0yNTYifX0.sF07-wPBlxh9sA06ADIO_48ZlwRaSQRumGWNOvx9JASTUlLorPbK65xziPc6lHTGOJFn8813JnY.Ick8jW9m5ihLJSgLxOiYGA.j-W7c8C3h_rHFXF-Kpc3ifmlhfFU0HxACv6pBge3LZ_gbfgIOEVe6KPZE6-KqvgFUsvnt8SyDxmt2dTlivOSwA.ZYeJm2_bPlC0iBUMyyZn146U0mVcPBoN +08:36:43.725 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiUkdJQzhEaXNFaWVGYll5bUU2b3RvNE5wREtnYWZRT3gyYkY2ZFZxQU9lYyIsInkiOiJ1WXlIcmFkLUd6MWRVb0g4TmdPXzVDbUgzRkFFaGtqcFhkZ1pweUpSSGR3IiwiY3J2IjoiUC0yNTYifX0.pNfjV-l715rcg6UQKSXsWQWFdXfvbkj8hlFyzGKl6ed-xrIG-K7YjiXtxJDhHsbhQt9bYz8Z9X6L0YDEHKQOZAvD2TKi92Kl.HwJAqbR3McQC5eAJOTCacg.J_MkeFW6y4KHlOa-FJ9PbXqgALYzdA_I_6H0w3MjsPJuCFmKYuSunp5F8VxG-TDa-2ZeXT0XRjB_xpfQPIj5Rg.KxuhZ2OX4WXgnLA4PRJeQY0KdVIQmlLh047LwQ-J5gk +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest [INFO] Running org.jose4j.jwe.NegativeJweKeyTest -14:55:59.026 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: 256 bit content encryption key is not the correct size for the A128GCM content encryption algorithm (128). -14:55:59.026 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided. -14:55:59.026 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided. -14:55:59.027 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided. -14:55:59.027 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided. -14:55:59.027 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided. -14:55:59.027 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided. -14:55:59.027 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 192 bit key was provided. -14:55:59.028 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 256 bit key was provided. -14:55:59.028 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 128 bit key was provided. -14:55:59.028 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 256 bit key was provided. -14:55:59.028 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 128 bit key was provided. -14:55:59.028 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 192 bit key was provided. -14:55:59.029 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided. -14:55:59.029 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided. -14:55:59.029 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided. -14:55:59.029 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -14:55:59.029 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -14:55:59.029 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -14:55:59.030 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 8 bit key was provided. -14:55:59.030 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 56 bit key was provided. -14:55:59.030 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 64 bit key was provided. -14:55:59.030 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 128 bit key was provided. -14:55:59.030 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 192 bit key was provided. -14:55:59.030 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 248 bit key was provided. -14:55:59.030 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided. -14:55:59.030 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided. -14:55:59.030 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided. -14:55:59.030 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 9744 bit key was provided. -14:55:59.030 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 2352 bit key was provided. -14:55:59.030 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 784 bit key was provided. -14:55:59.030 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 1264 bit key was provided. -14:55:59.030 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 8 bit key was provided. -14:55:59.030 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 56 bit key was provided. -14:55:59.030 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 64 bit key was provided. -14:55:59.030 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 128 bit key was provided. -14:55:59.030 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 192 bit key was provided. -14:55:59.030 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided. -14:55:59.030 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 376 bit key was provided. -14:55:59.030 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided. -14:55:59.030 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided. -14:55:59.030 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 9744 bit key was provided. -14:55:59.030 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 2352 bit key was provided. -14:55:59.030 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 784 bit key was provided. -14:55:59.030 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 1264 bit key was provided. -14:55:59.031 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 8 bit key was provided. -14:55:59.031 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 56 bit key was provided. -14:55:59.031 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 64 bit key was provided. -14:55:59.031 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 128 bit key was provided. -14:55:59.031 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 192 bit key was provided. -14:55:59.031 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided. -14:55:59.031 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided. -14:55:59.031 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 504 bit key was provided. -14:55:59.031 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided. -14:55:59.031 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 9744 bit key was provided. -14:55:59.031 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 2352 bit key was provided. -14:55:59.031 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 784 bit key was provided. -14:55:59.031 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 1264 bit key was provided. -14:55:59.031 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.PublicKey -14:55:59.032 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.PrivateKey -14:55:59.032 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. -14:55:59.032 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. -14:55:59.032 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. -14:55:59.032 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. -14:55:59.032 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An empty octet sequence is to be used as the JWE Encrypted Key value when utilizing direct encryption but this JWE has 40 octets in the encrypted key part. -14:55:59.033 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits +08:36:43.738 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: 256 bit content encryption key is not the correct size for the A128GCM content encryption algorithm (128). +08:36:43.738 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided. +08:36:43.739 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided. +08:36:43.739 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided. +08:36:43.739 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided. +08:36:43.739 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided. +08:36:43.740 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided. +08:36:43.740 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 192 bit key was provided. +08:36:43.740 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 256 bit key was provided. +08:36:43.740 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 128 bit key was provided. +08:36:43.740 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 256 bit key was provided. +08:36:43.741 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 128 bit key was provided. +08:36:43.741 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 192 bit key was provided. +08:36:43.741 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided. +08:36:43.741 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided. +08:36:43.742 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided. +08:36:43.742 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +08:36:43.742 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +08:36:43.742 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +08:36:43.742 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 8 bit key was provided. +08:36:43.743 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 56 bit key was provided. +08:36:43.743 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 64 bit key was provided. +08:36:43.745 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 128 bit key was provided. +08:36:43.745 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 192 bit key was provided. +08:36:43.745 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 248 bit key was provided. +08:36:43.745 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided. +08:36:43.745 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided. +08:36:43.745 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided. +08:36:43.745 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 9744 bit key was provided. +08:36:43.745 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 2352 bit key was provided. +08:36:43.745 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 784 bit key was provided. +08:36:43.745 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 1264 bit key was provided. +08:36:43.745 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 8 bit key was provided. +08:36:43.745 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 56 bit key was provided. +08:36:43.745 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 64 bit key was provided. +08:36:43.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 128 bit key was provided. +08:36:43.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 192 bit key was provided. +08:36:43.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided. +08:36:43.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 376 bit key was provided. +08:36:43.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided. +08:36:43.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided. +08:36:43.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 9744 bit key was provided. +08:36:43.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 2352 bit key was provided. +08:36:43.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 784 bit key was provided. +08:36:43.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 1264 bit key was provided. +08:36:43.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 8 bit key was provided. +08:36:43.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 56 bit key was provided. +08:36:43.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 64 bit key was provided. +08:36:43.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 128 bit key was provided. +08:36:43.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 192 bit key was provided. +08:36:43.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided. +08:36:43.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided. +08:36:43.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 504 bit key was provided. +08:36:43.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided. +08:36:43.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 9744 bit key was provided. +08:36:43.747 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 2352 bit key was provided. +08:36:43.747 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 784 bit key was provided. +08:36:43.747 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 1264 bit key was provided. +08:36:43.747 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.PublicKey +08:36:43.747 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.PrivateKey +08:36:43.747 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. +08:36:43.747 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. +08:36:43.748 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. +08:36:43.748 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. +08:36:43.748 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An empty octet sequence is to be used as the JWE Encrypted Key value when utilizing direct encryption but this JWE has 40 octets in the encrypted key part. +08:36:43.750 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -14:55:59.033 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -14:55:59.033 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key -14:55:59.033 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 -14:55:59.034 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null -14:55:59.034 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -14:55:59.034 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits +08:36:43.750 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +08:36:43.750 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key +08:36:43.750 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 +08:36:43.750 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null +08:36:43.750 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +08:36:43.751 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -14:55:59.034 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -14:55:59.034 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key -14:55:59.034 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 -14:55:59.034 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null -14:55:59.034 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -14:55:59.034 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits +08:36:43.751 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +08:36:43.751 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key +08:36:43.751 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 +08:36:43.751 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null +08:36:43.751 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +08:36:43.751 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -14:55:59.034 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -14:55:59.034 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key -14:55:59.034 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 -14:55:59.034 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null -14:55:59.034 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -14:55:59.034 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits +08:36:43.751 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +08:36:43.751 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key +08:36:43.751 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 +08:36:43.751 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null +08:36:43.751 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +08:36:43.752 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -14:55:59.034 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -14:55:59.034 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key -14:55:59.035 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 -14:55:59.035 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null -14:55:59.035 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -14:55:59.035 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun RSA public key, 2048 bits +08:36:43.752 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +08:36:43.752 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key +08:36:43.752 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 +08:36:43.752 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null +08:36:43.752 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +08:36:43.752 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -14:55:59.035 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -14:55:59.035 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given 128 bit AES key -14:55:59.044 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun EC public key, 256 bits +08:36:43.752 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +08:36:43.753 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given 128 bit AES key +08:36:43.766 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun EC public key, 256 bits public x coord: 57807358241436249728379122087876380298924820027722995515715270765240753673285 public y coord: 90436541859143682268950424386863654389577770182238183823381687388274600502701 - parameters: java.security.spec.ECParameterSpec@45efc20d -14:55:59.044 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: epk is invalid for P-521 -14:55:59.044 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -14:55:59.045 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun RSA public key, 2048 bits + parameters: java.security.spec.ECParameterSpec@bf1ec20 +08:36:43.766 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: epk is invalid for P-521 +08:36:43.766 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +08:36:43.766 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -14:55:59.045 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -14:55:59.045 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given 128 bit AES key -14:55:59.045 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun EC public key, 256 bits +08:36:43.767 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +08:36:43.767 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given 128 bit AES key +08:36:43.768 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun EC public key, 256 bits public x coord: 57807358241436249728379122087876380298924820027722995515715270765240753673285 public y coord: 90436541859143682268950424386863654389577770182238183823381687388274600502701 - parameters: java.security.spec.ECParameterSpec@45efc20d -14:55:59.045 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: epk is invalid for P-521 -14:55:59.045 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -14:55:59.045 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun RSA public key, 2048 bits + parameters: java.security.spec.ECParameterSpec@bf1ec20 +08:36:43.768 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: epk is invalid for P-521 +08:36:43.768 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +08:36:43.768 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -14:55:59.045 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -14:55:59.046 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given 128 bit AES key -14:55:59.046 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun EC public key, 256 bits +08:36:43.768 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +08:36:43.768 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given 128 bit AES key +08:36:43.768 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun EC public key, 256 bits public x coord: 57807358241436249728379122087876380298924820027722995515715270765240753673285 public y coord: 90436541859143682268950424386863654389577770182238183823381687388274600502701 - parameters: java.security.spec.ECParameterSpec@45efc20d -14:55:59.046 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: epk is invalid for P-521 -14:55:59.046 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -14:55:59.047 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.PublicKey -14:55:59.047 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Unable to encrypt (RSA/ECB/OAEPWithSHA-1AndMGF1Padding) the Content Encryption Key: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -14:55:59.047 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.ec.ECPrivateKeyImpl to java.security.PublicKey -14:55:59.047 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 8 bit key was provided. -14:55:59.047 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 40 bit key was provided. -14:55:59.047 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 136 bit key was provided. -14:55:59.047 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 192 bit key was provided. -14:55:59.047 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 256 bit key was provided. -14:55:59.047 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an RSA key was provided. -14:55:59.047 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an RSA key was provided. -14:55:59.047 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an EC key was provided. -14:55:59.047 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an EC key was provided. -14:55:59.047 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 8 bit key was provided. -14:55:59.047 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 40 bit key was provided. -14:55:59.047 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 128 bit key was provided. -14:55:59.048 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 184 bit key was provided. -14:55:59.048 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 256 bit key was provided. -14:55:59.048 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an RSA key was provided. -14:55:59.048 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an RSA key was provided. -14:55:59.048 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an EC key was provided. -14:55:59.048 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an EC key was provided. -14:55:59.048 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 8 bit key was provided. -14:55:59.048 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 40 bit key was provided. -14:55:59.048 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 128 bit key was provided. -14:55:59.048 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 192 bit key was provided. -14:55:59.048 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 248 bit key was provided. -14:55:59.048 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 264 bit key was provided. -14:55:59.048 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an RSA key was provided. -14:55:59.048 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an RSA key was provided. -14:55:59.048 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an EC key was provided. -14:55:59.048 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an EC key was provided. + parameters: java.security.spec.ECParameterSpec@bf1ec20 +08:36:43.769 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: epk is invalid for P-521 +08:36:43.769 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +08:36:43.769 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.PublicKey +08:36:43.769 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Unable to encrypt (RSA/ECB/OAEPWithSHA-1AndMGF1Padding) the Content Encryption Key: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +08:36:43.770 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.ec.ECPrivateKeyImpl to java.security.PublicKey +08:36:43.770 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 8 bit key was provided. +08:36:43.770 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 40 bit key was provided. +08:36:43.770 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 136 bit key was provided. +08:36:43.770 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 192 bit key was provided. +08:36:43.770 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 256 bit key was provided. +08:36:43.770 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an RSA key was provided. +08:36:43.770 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an RSA key was provided. +08:36:43.770 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an EC key was provided. +08:36:43.770 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an EC key was provided. +08:36:43.770 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 8 bit key was provided. +08:36:43.770 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 40 bit key was provided. +08:36:43.770 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 128 bit key was provided. +08:36:43.770 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 184 bit key was provided. +08:36:43.770 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 256 bit key was provided. +08:36:43.770 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an RSA key was provided. +08:36:43.770 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an RSA key was provided. +08:36:43.770 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an EC key was provided. +08:36:43.770 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an EC key was provided. +08:36:43.771 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 8 bit key was provided. +08:36:43.771 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 40 bit key was provided. +08:36:43.771 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 128 bit key was provided. +08:36:43.771 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 192 bit key was provided. +08:36:43.771 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 248 bit key was provided. +08:36:43.771 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 264 bit key was provided. +08:36:43.771 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an RSA key was provided. +08:36:43.771 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an RSA key was provided. +08:36:43.771 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an EC key was provided. +08:36:43.771 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an EC key was provided. [INFO] Tests run: 29, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.024 s - in org.jose4j.jwe.NegativeJweKeyTest -[INFO] Running org.jose4j.jwe.Pbes2ExampleEncryptedRSAPrivateKeyJwkAppendixCTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.019 s - in org.jose4j.jwe.Pbes2ExampleEncryptedRSAPrivateKeyJwkAppendixCTest -[INFO] Running org.jose4j.jwe.kdf.Rfc6070Pbkdf2TestVectorsTest -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.026 s - in org.jose4j.jwe.kdf.Rfc6070Pbkdf2TestVectorsTest -[INFO] Running org.jose4j.jwe.kdf.ConcatKeyDerivationFunctionTest -Sq8rGLm4rEtzScmnSsY5r1n-AqBl_iBU8FxN80Uc0S0 -LfkHot2nGTVlmfxbgxQfMg -[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwe.kdf.ConcatKeyDerivationFunctionTest -[INFO] Running org.jose4j.jwe.kdf.Pbkdf2MoreTest -[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.jwe.kdf.Pbkdf2MoreTest -[INFO] Running org.jose4j.jwe.kdf.Pbkdf2JwkExampleTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.jwe.kdf.Pbkdf2JwkExampleTest -[INFO] Running org.jose4j.jwe.kdf.Pbkdf2CompareToJavaSecretKeyFactorySha1Test -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.014 s - in org.jose4j.jwe.kdf.Pbkdf2CompareToJavaSecretKeyFactorySha1Test -[INFO] Running org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest -14:55:59.134 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiSUN5U1JxLXp2Tm1VTHgwM2xETk56RXJKQWxVYWdUOE1HMnZLbzF4LTdzOCIsInkiOiJoLTR6bWl0TWpEZUFWTzBmNkN4ZlVDZ0J3LVJKVldxZVZBT3Y4MXFURmE4IiwiY3J2IjoiUC0yNTYifX0.NwaRF-02B-IXZoMHR2CsfgJHx6f0d1hTtmmcYE2gTCt3eDF5qEZWzw.rj1cYGsFKSuSa5Ra_k0AnQ.JSBCdhar8Jfsh-kBEEKrw1gZXDEAbqYETkMpGkqrvwpNUopjSuuHI5mU_gr7R4ehVLDb4ImcqLnzfWXOyGJgGQ.zAGm1zMBq31MdPP8Rr236g -14:55:59.139 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiVDBVS2k0ZWpCU044REpYbVZob29ldFpCZ0JQY3hDVEk4SVZ5b1lGUHR1MCIsInkiOiJkOGFKY2NuQ0xqNnJNTUV6LUplQTZzYWZObUUyMENZNmZwbC1tZ3R0ZWVvIiwiY3J2IjoiUC0yNTYifX0.if0w4XuAYXmU7VMoMO1JLDEHDkuCL21PfrNbkLYCk0WTeY42IMOu2cnQfVUUEwxUb4gR4rHVpvo.2mouhm_0wyfLQsZAdy8O2Q.yhTHQKhquUDpUDHmKES_4oxHZVeuOMFB6QpNvwBpPk1Dhi2SrfxtnT0DN-dWQnl36Ra1zYXCecknURBid_YBoA.iVQxqhxMAkLtkbnGWdz5HbfiIHXwDv_4 -14:55:59.143 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4Ijoic1lPS1BlV29JTU1NcW9tNTBlX0VCWXliZTV6OHNYZFFUZlRnWUV0WDE4YyIsInkiOiJoTklNYjFWdEd5Ym9LQ1hSbUx5c0RTcTNnbW9TWmpVZzlfcVJLRjZSQlZNIiwiY3J2IjoiUC0yNTYifX0.XADtIhgZmAgzXcVqvZDkI3MaP8K_XKP2Yx3vP9Vc9R-2ZsCyhG1SJZmD0Ec97rzZ8slJTN7Xy9qgKBfRy-J2oE8FaHDcOzTV.xkLfCjk5rUJt6NbzMZPuBA.q8eOTVylWe7OWYcT3C4hcI7ECPWOuf2EZQPaBXNgicZtyi1-dEchg1LhFqgY9thVF2vS_aodEXFSsC2JRvLsXw.5CrwPKiaJyYTXIt-TG9pxunyuVlP7FViGMKjsxOUnhQ -14:55:59.147 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoieEVCZHB2c0pKckN6RGotcGFLOUhpMVJzZFJnLXRSUFEtN3p2TnJweGZ2dyIsInkiOiJkYm1nMTdlalRvOGdlNFRjUWZXZ0pvS1FidlZhQVF1NUpmVFd3bl81WTFzIiwiY3J2IjoiUC0yNTYifX0.qZGpGtLThIzw3WXZT9PynLF68TAlkvKi9Sm-guTHTCOfBlqNxGZKVA.V6Sc5QBJ8dapAAc2FqMINA.7WU0ixLQqrHVjwkiBxlW5BnA5B8oOKK7updKBd8O-pyzNze-E4ixGVf14IfFk3zpOOHAD_Chu3rYnmU7w-U8dQ.SM-iJmRSbT7WoDAUbcpsFw -14:55:59.152 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiUGl4V0FpR2NyR2ZWR0twTXJQaVBTV254cThvNFRyeFYwc05mazFPMmhyMCIsInkiOiJsUkJEOFdGWkFQNEZzbHQ0aUFPa0R6RGFfU1RxVGFwMjIwc1NjOURqM1BNIiwiY3J2IjoiUC0yNTYifX0.eQe3GnpsxS0DmQ-9mVUlIWObhA2rVqbRQXFpYILU944sjcLJ1rGJpPWchRHKtEKmswIA4wyoTJg._uPQhBcF5ueBZqWBEY4hYg.BSBXg2h9VhdXqrDwFJpWkUOXx0n7LNUvCeD-463Nbfr6HeJvjgCgsM6fNp7c5x-zHMw_68_ENZOL34pjYqWgcg.zFAqNiY4bh8qZf9Ob1RZow5CTjobqPD2 -14:55:59.156 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiNkRLQmMyYm81bk52M2RxWnY4MmY0Ym82NmZxemFScmFoREhRUThCMGFsQSIsInkiOiJHdmlDMEpoZXAwV3VSVGZ3OC1LQmNmV1hIaDI5VkN3Ri1xY2dpMFlNZktJIiwiY3J2IjoiUC0yNTYifX0.LAI9vrg-InnpfxKDtzIqe5T1GNpM0-TQ-hcHG-wVENIaDZ9NyufN434mwV7CpWQUxB1QZLk7A9hQ_6x8Gn48XapuG5DToCHv.KaaBBBGqx5GxOJu1vutouw.TEKQ3tJMYTh6S-S-gKx0DIX4IZffgHyJFZK0oXBq8A0hJ4Wz8GgiYJ6CoXW44WiRitInI-fgiCkMLKUxjXjuZw.0bONMpEZZPU5kEJxAMY-8BwnKZ_Kr4zJ2Q-b7BrzTd4 -14:55:59.160 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiR213NHVKbnk0T09KTThjNTlzY3FIVy1wNzR2Tlk5Q2RzWEZxQWV5dkx6WSIsInkiOiI0ZkJObEJ5TWlMdHEtWnRVNjAtZWlGRXlYdVI1RjNWUzV3ZHVId1Atc2pzIiwiY3J2IjoiUC0yNTYifX0.X3xeh3fZeSOVJCh2p1hE3L7xsYFznvEZn5lxf8EmMorAL_0EHxp-3A.5mgiFlz4LUkQsyEwZLBdZg.rs5dnc7vBwBC9A8PpH5HuybZor88vvsfcdCASwuR-l2u1ismyiwd3r2FjERLltsEQI8MsTQvlVNvm5k3dt57ag.sLrHIM3H8wlWt0-H9dzbNQ -14:55:59.164 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiazRaWUJvbEtyMURYcU0xc0g0UUxBcWE1di1MOVhwWDUzY0pRQUdvNDdQcyIsInkiOiJvR201RURfSnRFczIyQ1RGcF9xSVdFMHJ5M2VHZjhaZC1xVUdIeFBnN3ZnIiwiY3J2IjoiUC0yNTYifX0.BRH_TtQCu_BDJBfWbj9XrgoGmF185zrvJ1UI6KkKofmcecysqeB2lyX7aB5iIIXX5CKBR_cAQx4.Jkb8K2bCkuvXT_EA9dvkkw.7Q-5Qqylk3x0koArpybcH6lWYVmH0MEsXOXPsenuUgBdK2buPpYQtQgYkNgdz0zTZyIicXKAGnErF4aWOjjeGQ.-iOWYbW67lL-8yWOTG5b2tzLi0dfG1MW -14:55:59.168 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiRC1aN0QwOWd3eHhoSkhneWZZdGpLSmp5R3FCT2hMREd3U2ZzQ0pJTHNGZyIsInkiOiJ1QmxXOWx0ZWZLZkhlUGgtRUFpN3pkeDFFcXhmeTc1RVVXMEdlVEJRYnlzIiwiY3J2IjoiUC0yNTYifX0.0zOioEONEr5stQtAUbNNu6NdgupPx0pK26pqmoqeboTOXMX-SXHWWyYF8u_UXf3AIeT3BggfoAlYc2P_XPrP4Umvyds17q5A.V2xcn1JzGifaF_xKJxdrKQ.NXbDN6RZ6N7746oFVl8jYN69zy_S4y3ZKhNKGvjVOrV6oetj26COy_RuUdP5dtwv6iCCU8aueWwCT7Esb3G7rw.pqwkmeFUruw-eUvXZ8057Ayyc_-nPnUbVTZbvZwY1B4 -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.037 s - in org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest -[INFO] Running org.jose4j.jwe.Aes128KeyWrapManagementAlgorithmTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwe.Aes128KeyWrapManagementAlgorithmTest -[INFO] Running org.jose4j.jwe.JweCryptoPrimitiveTest -14:55:59.173 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getCipher(): Cipher.RSA/ECB/OAEPWithSHA-1AndMGF1Padding, mode: key unwrapping, algorithm from: SunJCE -14:55:59.181 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@e077866 -14:55:59.185 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@ed3068a -14:55:59.189 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@7c2b6087 -14:55:59.190 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKey(): 256 bit AES key -14:55:59.190 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getCipher(): Cipher.AESWrap, mode: key unwrapping, algorithm from: SunJCE -14:55:59.347 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKey(): javax.crypto.spec.SecretKeySpec@fffe9372 -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.174 s - in org.jose4j.jwe.JweCryptoPrimitiveTest -[INFO] Running org.jose4j.jwe.CritHeaderTest -14:55:59.348 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'so.crit' marked as critical. -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.CritHeaderTest -[INFO] Running org.jose4j.jwe.ZipTest -eyJ6aXAiOiJERUYiLCJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..as9aqsbQe09CiQbsYiK7NA.LQFhsil7XspI_DQ3Ull5r0vZWjS2BxPSgwZg2qYHsK-1lPXPoDcrekVc50AnBLCGlqzvjJRTi9-vc9QhzXWtBA.wQhibxUqH5-Y7q-eVjH_bA -eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..7EsP9HpyiVr6tTSX_uIStQ.Sdr6jsVRzGD9UydO5aTuBxUg4RNSwzI1UQSke1n24wchYBqfzvCy-TpaFoKhCZRq_HkUejfeUWCAUD-D4x8m0vCAbrPuE51EIgmhctN24wyrSEDWEB3SRNH4bcjE8sI9vSQCBQb0CwKC2whaFTjvhFAnCrbfCqcqeqncGlnTBgzxOITiWOTMWBf_V5ZeD2l0jdnUTXnHxs2I9oJ4bxIJzSmrGY3jWrYHcuszPHDyKEvk119KGyB-LrMWhMBgGUhXX4yI6B_yj15uShH77A8r0srnLjrTvC2IQnyPvYTL2FDbRFLfqJG_clI7GYXXsHE2RomXNSsRNw8yh3I6Tn4n3edvuobcYuAn91fB9MDsnw0gtaemf4tkgahB-TArsNLq.0xPCtyJ8Slc6tM_aIaOKQg -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.jwe.ZipTest -[INFO] Running org.jose4j.jwe.InvalidCurveTest -14:55:59.353 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key is equal to 26 mod 113 -14:55:59.353 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w -14:55:59.354 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as expected: org.jose4j.lang.InvalidKeyException: epk is invalid for P-256 -14:55:59.354 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key is equal to 2446 mod 2447 -14:55:59.354 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w -14:55:59.354 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as expected: org.jose4j.lang.InvalidKeyException: epk is invalid for P-256 -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.InvalidCurveTest -[INFO] Running org.jose4j.jwe.Rsa1_5KeyManagementAlgorithmTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.jwe.Rsa1_5KeyManagementAlgorithmTest -[INFO] Running org.jose4j.jwe.EcdhKeyAgreementAlgorithmTest -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.018 s - in org.jose4j.jwe.EcdhKeyAgreementAlgorithmTest -[INFO] Running org.jose4j.jwe.GeneralJweTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.GeneralJweTest -[INFO] Running org.jose4j.jwe.RsaOaepKeyManagementAlgorithmTest -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.035 s - in org.jose4j.jwe.RsaOaepKeyManagementAlgorithmTest -[INFO] Running org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithmTest -eyJhbGciOiJQQkVTMi1IUzI1NitBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwicDJjIjo2NTUzNiwicDJzIjoiNUVqcGZRVjFaN2NpWGk2SSJ9.5qM-cNLe4Q1hGoDW518Kx3XsfjPVPf5h3TgriER-ZPnrFrw6Ubut5w.Eu7DuyT8zmUy3Seyhf_yBw.EWs9-Hxr1Rxqu36fgGVNsg.NAC1PwL_7shiC7ZF2X9n2A -14:56:01.200 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'PBES2-HS512+A256KW' is a blocked algorithm.): eyJhbGciOiJQQkVTMi1IUzUxMitBMjU2S1ciLCJwMnMiOiI4UTFTemluYXNSM3hjaFl6NlpaY0hBIiwicDJjIjoyMTQ3NDgzNjQ3LCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.YKbKLsEoyw_JoNvhtuHo9aaeRNSEhhAW2OVHcuF_HLqS0n6hA_fgCA.VBiCzVHNoLiR3F4V82uoTQ.23i-Tb1AV4n0WKVSSgcQrdg6GRqsUKxjruHXYsTHAJLZ2nsnGIX86vMXqIi6IRsfywCRFzLxEcZBRnTvG3nhzPk0GDD7FMyXhUHpDjEYCNA_XOmzg8yZR9oyjo6lTF6si4q9FZ2EhzgFQCLO_6h5EVg3vR75_hkBsnuoqoM3dwejXBtIodN84PeqMb6asmas_dpSsz7H10fC5ni9xIz424givB1YLldF6exVmL93R3fOoOJbmk2GBQZL_SEGllv2cQsBgeprARsaQ7Bq99tT80coH8ItBjgV08AtzXFFsx9qKvC982KLKdPQMTlVJKkqtV4Ru5LEVpBZXBnZrtViSOgyg6AiuwaS-rCrcD_ePOGSuxvgtrokAKYPqmXUeRdjFJwafkYEkiuDCV9vWGAi1DH2xTafhJwcmywIyzi4BqRpmdn_N-zl5tuJYyuvKhjKv6ihbsV_k1hJGPGAxJ6wUpmwC4PTQ2izEm0TuSE8oMKdTw8V3kobXZ77ulMwDs4p.ALTKwxvAefeL-32NY7eTAQ] -14:56:01.201 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: PBES2 iteration count (p2c=2147483647) cannot be more than 2499999 to avoid excessive resource utilization.): eyJhbGciOiJQQkVTMi1IUzUxMitBMjU2S1ciLCJwMnMiOiI4UTFTemluYXNSM3hjaFl6NlpaY0hBIiwicDJjIjoyMTQ3NDgzNjQ3LCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.YKbKLsEoyw_JoNvhtuHo9aaeRNSEhhAW2OVHcuF_HLqS0n6hA_fgCA.VBiCzVHNoLiR3F4V82uoTQ.23i-Tb1AV4n0WKVSSgcQrdg6GRqsUKxjruHXYsTHAJLZ2nsnGIX86vMXqIi6IRsfywCRFzLxEcZBRnTvG3nhzPk0GDD7FMyXhUHpDjEYCNA_XOmzg8yZR9oyjo6lTF6si4q9FZ2EhzgFQCLO_6h5EVg3vR75_hkBsnuoqoM3dwejXBtIodN84PeqMb6asmas_dpSsz7H10fC5ni9xIz424givB1YLldF6exVmL93R3fOoOJbmk2GBQZL_SEGllv2cQsBgeprARsaQ7Bq99tT80coH8ItBjgV08AtzXFFsx9qKvC982KLKdPQMTlVJKkqtV4Ru5LEVpBZXBnZrtViSOgyg6AiuwaS-rCrcD_ePOGSuxvgtrokAKYPqmXUeRdjFJwafkYEkiuDCV9vWGAi1DH2xTafhJwcmywIyzi4BqRpmdn_N-zl5tuJYyuvKhjKv6ihbsV_k1hJGPGAxJ6wUpmwC4PTQ2izEm0TuSE8oMKdTw8V3kobXZ77ulMwDs4p.ALTKwxvAefeL-32NY7eTAQ] -14:56:01.201 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'PBES2-HS512+A256KW' is a blocked algorithm.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTNTEyK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJwMnMiOiJGbVE0aDY1aUFlZEs0SUFyIn0._P2Mbn0nvqRZVCaEaLnKQkMFwGNmEVbm8Ffnb5uIas0iAt5wcWC3T7rdTwyliWW11YnhpaiXH0WRalAsIUyaVHC4Ku1j9bVP.Tg2KOblqWEF9iC71O-WgBw.OCjt9WYrTFMIst7XBZ8HeA.YRqs3_nMchYr39AJYquQs8-PrZa2NGuqshOvtLfWSvE] -14:56:01.201 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: PBES2 iteration count (p2c=2500000) cannot be more than 2499999 to avoid excessive resource utilization.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTNTEyK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJwMnMiOiJGbVE0aDY1aUFlZEs0SUFyIn0._P2Mbn0nvqRZVCaEaLnKQkMFwGNmEVbm8Ffnb5uIas0iAt5wcWC3T7rdTwyliWW11YnhpaiXH0WRalAsIUyaVHC4Ku1j9bVP.Tg2KOblqWEF9iC71O-WgBw.OCjt9WYrTFMIst7XBZ8HeA.YRqs3_nMchYr39AJYquQs8-PrZa2NGuqshOvtLfWSvE] -14:56:01.201 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'PBES2-HS384+A192KW' is a blocked algorithm.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTMzg0K0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJwMnMiOiJneXBKYzJFVXNtbmNqTUtqIn0.RYXJhCW2m4Pa5XPUPVVQVJRg8z-jj-zyXoa-Q1JzdfjO2tvrELM7Ko3qhkv2WcUAw3ZagzIeNjY.FhNCr7zjUt0fA6KotCbdUw.DMYLybjcrOX9cfwdWaORLg.QCGY9clkv4sz1rZeexg2dUx4ViH-BeL7 -] -14:56:01.201 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: PBES2 iteration count (p2c=2500000) cannot be more than 2499999 to avoid excessive resource utilization.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTMzg0K0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJwMnMiOiJneXBKYzJFVXNtbmNqTUtqIn0.RYXJhCW2m4Pa5XPUPVVQVJRg8z-jj-zyXoa-Q1JzdfjO2tvrELM7Ko3qhkv2WcUAw3ZagzIeNjY.FhNCr7zjUt0fA6KotCbdUw.DMYLybjcrOX9cfwdWaORLg.QCGY9clkv4sz1rZeexg2dUx4ViH-BeL7 -] -[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.784 s - in org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithmTest -[INFO] Running org.jose4j.jwe.JsonWebEncryptionTest -[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.018 s - in org.jose4j.jwe.JsonWebEncryptionTest -[INFO] Running org.jose4j.zip.DeflateRFC1951CompressionAlgorithmTest -14:56:01.256 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:56:01.742 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithmTest - Expected exception because this tests going over the max allowed size of decompressed data org.jose4j.lang.JoseException: Maximum allowed size of decompressed data exceeded (which is 204800 bytes but configurable with the org.jose4j.zip.decompress-max-bytes system property) -14:56:01.743 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:56:01.743 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:56:01.743 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.52 s - in org.jose4j.zip.DeflateRFC1951CompressionAlgorithmTest -[INFO] Running org.jose4j.jwt.JwtClaimsTest -[INFO] Tests run: 38, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.007 s - in org.jose4j.jwt.JwtClaimsTest -[INFO] Running org.jose4j.jwt.consumer.JwtConsumerTest -14:56:01.774 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322039,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{1571322039 -> Oct 17, 2019, 2:20:39?PM GMT} is more than 60 second(s) in the past.] -14:56:01.776 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1570321001,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{1570321001 -> Oct 6, 2019, 12:16:41?AM GMT} is more than 60 second(s) in the past.] -14:56:01.779 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":12345,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{12345 -> Jan 1, 1970, 3:25:45?AM GMT} is more than 60 second(s) in the past.] -14:56:01.781 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":0,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{0 -> Jan 1, 1970, 12:00:00?AM GMT} is more than 60 second(s) in the past.] -14:56:01.783 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-938763,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{-938763 -> Dec 21, 1969, 3:13:57?AM GMT} is more than 60 second(s) in the past.] -14:56:01.785 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-2147483736,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{-2147483736 -> Dec 13, 1901, 8:44:24?PM GMT} is more than 60 second(s) in the past.] -14:56:01.787 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322101,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322101 -> Oct 17, 2019, 2:21:41?PM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] -14:56:01.790 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322177,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322177 -> Oct 17, 2019, 2:22:57?PM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] -14:56:01.792 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":2147483647,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{2147483647 -> Jan 19, 2038, 3:14:07?AM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] -14:56:01.794 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":7700000007,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{7700000007 -> Jan 2, 2214, 8:53:27?AM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] -14:56:01.799 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571321979,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{1571321979 -> Oct 17, 2019, 2:19:39?PM GMT} is more than 120 second(s) in the past.] -14:56:01.805 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322111,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322111 -> Oct 17, 2019, 2:21:51?PM GMT} is more than 10 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] -14:56:01.811 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"issuer.example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (issuer.example.com) doesn't match expected value of nope.example.com] -14:56:01.811 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] -14:56:01.811 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":["issuer1", "other.one", "meh"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'iss' claim is not the expected type ([issuer1, other.one, meh] - Cannot cast java.util.ArrayList to java.lang.String)] -14:56:01.811 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":["issuer1", "nope.not"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'iss' claim is not the expected type ([issuer1, nope.not] - Cannot cast java.util.ArrayList to java.lang.String)] -14:56:01.811 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https://accounts.google.com"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (https://accounts.google.com) doesn't match expected value of one of [nope.google.com, https://fake.google.com]] -14:56:01.811 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"x"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (x) doesn't match expected value of one of [a, b, c, d, e]] -14:56:01.811 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] -14:56:01.811 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] -14:56:01.811 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] -14:56:01.811 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] -14:56:01.812 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] -14:56:01.812 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] -14:56:01.812 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] -14:56:01.812 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] -14:56:01.812 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: JWS Plaintext (alg=none) must not use a key.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] -14:56:01.812 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: JWS Plaintext (alg=none) must not use a key.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] -14:56:01.812 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] -14:56:01.812 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] -14:56:02.046 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4Ijoic3p5cGFmZUZMWEwzWVhoOEJ2d3hjS2ZiWFJUVTFFdWNkNmtuY2pVQVhZcyIsInkiOiI1eV9uU3RJWW5heTdHeWc4N3EtMk12WmFsVll0My1fMDRaR21rSmgxN253IiwiY3J2IjoiUC0yNTYifX0.VeHczAI9vuebSz3Ky8OjxjVPatRY6HlUQaZEVuXLT1mmJIhn4uow5A.kBWxbth41LAu8MGstssYKA.AQfT9dXRdOJ9Sizjz8gmTNo6kd7aS2t8ujRgNK4rjlRiHAsXi3-KzKmY9kBc8k1X0s7lsodcOplLczCTsZ4n2A.JEP93jDcoGMnXwJkMZXe4A Additional details: [[20] Missing Integrity Protection] -14:56:02.049 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImtpZCI6ImVjMiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJRR28yWHJkVE5LaFRucHMtWXhTWlVjTkI5QjlSOHp3U01IZ04tNUF2VXBNIiwieSI6IldSTFFMaVEyV3FLNzlySjVqcmt3M05Pd2RyMzhMWlVjWXBzRlR1ek5HXzQiLCJjcnYiOiJQLTI1NiJ9fQ..sz6xrWIYbQb5zL8ucPjILQ.5PWmGXjq4KoQ6dt1Psm3jUESh9MPyuZO3teb2-HNrI9tTAA3wL3yOPRKCjJANbvcEfj7Ug4v0lgw0trL-8YzCQ.D_hKammGAhBeUCtGQMUtdA Additional details: [[20] Missing Integrity Protection] -14:56:02.053 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiQ0RSMlFDdEtYdmxHbVBsdEx3d3c2Q3duMzJqOTlIMnF0SGxtYS1sZktYUSIsInkiOiJSb2c3Y0ZCelB4UWZLaTZMX2JMamREVTBKNk5LTkg1ZEcyR2lxa2Nzb3pJIiwiY3J2IjoiUC0yNTYifX0.n5oHZGYkqgdaNy88uEC2yXzcTGuNWnuBN103ntP1kjW9BVZxqthrvup1F8UoAAJ7dCakR-Yp8X3R6UK14JRIPtErsz98M0xH.5ANfy-BjjyUgC8ZoDOe7eg.RB1wKWoOtWmO2E-w0AVV-6RKhutkbOVjgbry5o9jECdZoAddlSKiYyLSp2KdbGvSADWoBr4M52VcK771y48hPA.tfS7YE0nphmv8nB6kkoGL3iJ1lpwsUmmZAG2JTbhePI Additional details: [[20] Missing Integrity Protection] -14:56:02.057 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4Ijoib1M3QkUxRmtfSmhYbjJhWnhkM3dEREtiRmtTV2I5WjVYd3pobHVab2dycyIsInkiOiJheUJFRHpLdzJjbE9QczkwbUdQOEZlYkt2SWpuUklkak8tRjhteVhmNUFFIiwiY3J2IjoiUC0yNTYifX0.355K9omSwIIGZbbCJOCwwNEkc44-QCJzXW-MpsjfvHJLu17GTYEkUBsVOnPFLqk_fYqpU_1-MXo.zTvLCSiShNP3YpFhXUW0Zw.IuvOZC-URmeEoEoxtll2ciHTaa9gPdyorUhx5cmu_dgxjvrqwAEIQn_o1jNQS1WQnfjsrm8koXuPryAuMd6-lg.iiz-eJDS11DaG_2HS0n2zxY4FO4YKmGc Additional details: [[20] Missing Integrity Protection] -14:56:02.061 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJyMi1iIn0.TM_2XexfNM8Rtk5LdINGbYpIw3XMNOIqaG3mBdR4DmYxyx68uXvFt6gSjBRQqypEhWEUoLQqyU2p32frUSrlC7z8Ou_sl5EnwELJHrEW-sw2tPZXTAINRvsjTPDVzJvg8zCcSX1QS_lNEB2ShsKfCJml_iJ0V14BEiWk1hKGu9HP4N2RcDq7TIomc1NpwyJMxDlkznqAdatQCUHURGymWKuellqUreqhtjSx3xAsipNLj2eMwSDvaI7VKxCFtL-h5V5j7Wffe12vllzIZRAI4MLh4SO4HWFijNEKZ1K0vP1qy48z49uFktyBGhTuk7bvRo-9mqxN_jzsss6MxmtXTQ.mUmj89bT8_1uSpMBrlL_LQ.MiXaTf00UN_XViCvPJUbsTxWtIbwvpLqsZmDjaMjEk7PYlTP4wDSR9ADKrVXviCPCDKjJPlyZFtPxsZlaR95Ug.ZO1-ZBJQy2OQvKebYl7ftQ Additional details: [[20] Missing Integrity Protection] -14:56:02.064 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJraWQiOiJyMi1iIn0.2vIzH6pDB-iMdBd-xJtviQJLifxGLQkjxMPiBHI1QyW3pl5onSsOgPGubVEdbOmMlwJr4JkSOQ13U59o4thAwWUOxiYJX0Mvqxsq-QI0MIvQ5gKST0FPPOM_o76D3iKtSf7v6oC3FsorKFxVwpfysl6FXB3bXJW5lP0rlHKCAk31Z1bJ0ligrq4Tw9tGSCgjMBEIofIU6xaT0AlNXGFsb9NaXNF9LoU53wTCE6O-r0pB6c8_-vspCGp8JHKsbzTx8fD315WHCvpo3K37fl72fk4iOXW7O_XWP02YDcSVgwUM1pqj3GHS5eZq5agsFE4ndh-2eTu-_e4l7NqucVhVug.rWpraJHpo0OIQrVEcWOLmg.t1bcM7hSy6Z_DCqWPh7Rupjk-LHcbRH9vUWPCBEDCt3yI3m9c5OYqeCNOpmD-2fyRZWcIj-RR5GoLqDvQm4WtQ.fjTZSuz5dHKNsivt3CHC7jTStq0peB-u Additional details: [[20] Missing Integrity Protection] -14:56:02.066 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJraWQiOiJyMi1iIn0.mG3pLZU58QcXHVRUUL2eOJCHovrSnagoocUhvuik3Il4LoUKKGGvAIbJf_jaYEGBdWWdcG-PUcJt9Fdn9ExvZOqYE-rPGztILY5a-IHBRZL7O12JyJEd9FI5AO93u4iYtt8Qh1cb_B3DxbrL-BpuqoyvNCtZFr3fVAIoOb9N_KQNqSO_ajn8-BegXRHPSd5fm5D7WXGI4j11sewWMdT-MG_bL8EYwOYSl6Pfwrk3KzcyT-_Nt-gN2GHrRAi41nAIJ_jrTUUxS0h_ReJRmnczQGaYRGbZEwALN5NUm54sszE0IFxrrDolHBOLbdXwR2a9f5AnfR-rcrhZ6-FhxTLepg.YFVmrqGoiEweANejyHrjCw.qp_wZXc31arJPRjzLFIt_nOS32b55Igl0B8ZknmHZacum4yALga9qc8nTqenMG-z9WBhGD9eUobs8klhj0ytug.nL_vy3U1SAJJhe2SVZZg7_2bnVcBMFHL_dtjvbCejQ8 Additional details: [[20] Missing Integrity Protection] -14:56:02.066 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"HS256","kid":"r2"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec5, x=AH5S1GdBov0Y5H8j1NpTARLffxT81adL6zCtPqMgekXWtKrk4nbQoFdPVbHR9wz7dASkmMPuGh9HGDRl5uPRAGOd, y=AL--JVU1OcVrcUsiVF5qQZUOHNd1ZyLDsCZ0TM4T12wC7lrWYwcm40dGXgKn2ZVcLUKTfIwQYqJnmYrScaF5Fw_8, crv=P-521}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=512bits}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec2, x=YrVsKERxnnrrskQedhY4dORrtgv8zUAQh93XVeyEc48, y=64PvDpEcy6jXKGNHZCe4PIfB4AUvttub8jeKurBMlF4, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, n=rem1A2-PNpBDtlB50klAUSVtRaaoJL-hK52YfTuuQ8Ps7P5WjQcsJAdlEjSK98ylCFj-0RnttMixnQ9QvZsoak1vMGfBUVyhwfuRbU2Y_dtHuJbi88LKS_OakNNb6SjUhyM93274jodhscyXRsgo6gUBeCaDkYhs1nsWmumxCqU2xXv5F2h-jf7d6DlFRCeE_RjWZPfMwLCJEj11qCTC-Jd5W0DwJU82kX_F-KkDILX55OzHAwYIs6t5L_jwP34co-rLZiLmABUJQMd7QxBVLZ8dExTVlChTwOleh_gR0T6djTDIvluvmRn0pMWSaoMx5ojw7Oh1r0sO7OBEUO11FQ, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec3, x=M6lf-XGUeyfgkSRX5YL17L3bsFHHhc-a_sOYbWTObL1iLL0ionRuBRo59xgBMOOo, y=lPCHjHh-wWioRS3JkgMLyFHOL9bHqfMjE0yqmKWPiAjuUJnOX0WQzgbECcePmXPO, crv=P-384}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=128bits}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2-b, n=40TBvGcRbRtFtV_HRJ43dO3GQl0feGlDa4qVnCHZtseB_tVpY8bYjK8FBdhLxoPgWpL0czm394aKqJ9wfz38h22bJ9yuUUSFqnBeM0G4lGXWu-dB84TrZjxSAohj1qAeU1kd-QYnKWyuDbd-8y82l72Dl3C_jAzL5C3Bq8ZWa3W1GGXCnzVQm05HdMIuG9lW_kfVG4hYxQ_EsQr6wGjgkHCgdNtpSvi8tx3b9il5AzGKI-jFSoMiLueLxwCgM8tPN9SOnZohpGpTs6jrU0VeTHoiRtfny_PnL2rKOJXgvVF9Q9eI7vQu9PmsHfEo3h8_DXHgNEwXGIy2XHnEOgYuYw, e=AQAB}]): JsonWebSignature{"alg":"HS256","kid":"r2"}->eyJhbGciOiJIUzI1NiIsImtpZCI6InIyIn0.eyJhdWQiOiJhIiwiaXNzIjoiaSIsImV4cCI6MTc3MTE2Nzk2Miwic3ViIjoicyJ9.eWKJZaD0tv2CgS-A19-7KEakxjd-xRFyzzuyN7pqTPk] -14:56:02.067 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoicjItYiJ9.UxFHrCAApQvTeouYiToN-oaXJ2hAB07daNpgT8Pi2TrnutNUmqAb6CNpsJNI8FZs3oFdXajXX2JPjTQsn5nzK_JjTT4Qd4ZvXHNbbtHfdXDQfHD2ugr-vUIUFgRKjiOCtaZbvnDwhcTPJQ7_7HDVLd0UXX-JQOYkWMMRGuC0CxTOdYZ0yXEL4b4K7Q_E8v5XFzRK5-zQY6BC9jD0sOE-onw7glT8Adot-YgTLKqWDJl76wvM_nHm-Mu4RW0wCGXS356Nc8qBoCKYnkpmv-MS_-4dQ11d8Em3j61t2v2Lnl1KjaVxceYMe6BXPoBnO-YO70MRAXpz7K5EOW0OcQEExg.te0MXh35sy_O8O19JHrZjA.B0c63h8Mz3d518EWNEmjIp9cZ1fZybqkBZn1J5APvJUIkKNRSkh2qOiKwBykSnm2M7mn9-bCl3BfQ03Jg_uTqQ.zd2_ND2yMQxzcZ0VHtQFBg] -14:56:02.068 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoicjItYiJ9.UxFHrCAApQvTeouYiToN-oaXJ2hAB07daNpgT8Pi2TrnutNUmqAb6CNpsJNI8FZs3oFdXajXX2JPjTQsn5nzK_JjTT4Qd4ZvXHNbbtHfdXDQfHD2ugr-vUIUFgRKjiOCtaZbvnDwhcTPJQ7_7HDVLd0UXX-JQOYkWMMRGuC0CxTOdYZ0yXEL4b4K7Q_E8v5XFzRK5-zQY6BC9jD0sOE-onw7glT8Adot-YgTLKqWDJl76wvM_nHm-Mu4RW0wCGXS356Nc8qBoCKYnkpmv-MS_-4dQ11d8Em3j61t2v2Lnl1KjaVxceYMe6BXPoBnO-YO70MRAXpz7K5EOW0OcQEExg.te0MXh35sy_O8O19JHrZjA.B0c63h8Mz3d518EWNEmjIp9cZ1fZybqkBZn1J5APvJUIkKNRSkh2qOiKwBykSnm2M7mn9-bCl3BfQ03Jg_uTqQ.zd2_ND2yMQxzcZ0VHtQFBg Additional details: [[20] Missing Integrity Protection] -14:56:02.071 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no encryption but the JWT Consumer is configured to require it: eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk Additional details: [[19] No encryption.] -14:56:02.072 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no encryption but the JWT Consumer is configured to require it: eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk Additional details: [[19] No encryption.] -14:56:02.072 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value.] -14:56:02.072 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] doesn't contain an acceptable identifier. Expected example.org as an aud value.] -14:56:02.072 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] doesn't contain an acceptable identifier. Expected one of [example.org, nada, nope] as an aud value.] -14:56:02.072 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[7] No Audience (aud) claim present.] -14:56:02.072 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[7] No Audience (aud) claim present.] -14:56:02.072 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", "usa.org", "ca.ca"]}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com, usa.org, ca.ca] doesn't contain an acceptable identifier. Expected example.org as an aud value.] -14:56:02.072 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", "usa.org", "ca.ca"]}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com, usa.org, ca.ca] doesn't contain an acceptable identifier. Expected one of [example.org, some.other.junk] as an aud value.] -14:56:02.072 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", 47, false]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The array value of the 'aud' claim contains non string values (47 - class java.lang.Long cannot be cast to class java.lang.String (java.lang.Long and java.lang.String are in module java.base of loader 'bootstrap'))] -14:56:02.072 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":20475}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'aud' claim is not an array of strings or a single string value.] -14:56:02.072 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":{"aud":"example.org"}}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'aud' claim is not an array of strings or a single string value.] -14:56:02.073 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.JwtConsumerTest$4: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:919); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:913); ...omitted...] -14:56:02.074 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.JwtConsumerTest$4: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:919); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:913); ...omitted...] -14:56:02.074 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"name":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[14] No Subject (sub) claim is present.] -14:56:02.074 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":724729}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'sub' claim is not the expected type (724729 - Cannot cast java.lang.Long to java.lang.String)] -14:56:02.074 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":{"values":["one", "2"]}}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'sub' claim is not the expected type ({values=[one, 2]} - Cannot cast org.jose4j.json.JsonUtil$DupeKeyDisallowingLinkedHashMap to java.lang.String)] -14:56:02.076 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits).): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJhY2MiLCJjdHkiOiJKV1QifQ.KrukndaF2sHb3Y0r311rrYmCrXco-99ZIQ3iLjvCVbbow5MppRTK4DPJUShcndfcIVIFXMYSLGvIJwf39yZRJJ_EvBFnqhOUeCAsUHLGO1yxoQ619jmSh4bCaIicLYeivKaVSQN4Ezc5fvg-Nnv6TBIIgHuWMDU2Ztd96DJRokc.wMg2Eb8izCOUnACqdrcPQA.quFKSN7xQoMJzaYFBVwykQZ8zB3hpW8HtK7pm-4Ggzorno_K-eBQ7fXjRmJ1Jw-kCcmUa8flpnQqpL9jurtlz7DC1ABe0vm2ZkHoJluB6QeSr60Y9rP7kyy_rd3blXT_7t6Wgowo8MumXrrUUxxEQJgXvCmKbd-Rw9sK5jAHEug3zztLXHOX0O0QoxDzTJOsSRtodsu7bTJa-ADvPmK9e0Xp06NRqvx7WuJGKlq3cwQ.DL6yaCdiOUcViN-eZVIwOA] -14:56:02.102 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1771167302,"sub":"s","nbf":1771167182}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1771167362 -> Feb 15, 2026, 2:56:02?PM GMT} is on or after the Expiration Time (exp=NumericDate{1771167302 -> Feb 15, 2026, 2:55:02?PM GMT}) claim value.] -14:56:02.103 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1771167302,"sub":"s"}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1771167362 -> Feb 15, 2026, 2:56:02?PM GMT} is on or after the Expiration Time (exp=NumericDate{1771167302 -> Feb 15, 2026, 2:55:02?PM GMT}) claim value.] -14:56:02.104 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1771168562,"sub":"s","nbf":1771167602}) rejected due to invalid claims or other invalid content. Additional details: [[6] The JWT is not yet valid as the evaluation time NumericDate{1771167362 -> Feb 15, 2026, 2:56:02?PM GMT} is before the Not Before (nbf=NumericDate{1771167602 -> Feb 15, 2026, 3:00:02?PM GMT}) claim time.] -14:56:02.104 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 128 bits): JsonWebSignature{"kid":"esc","alg":"HS256"}->eyJraWQiOiJlc2MiLCJhbGciOiJIUzI1NiJ9.eyJhdWQiOiJhIiwiaXNzIjoiaSIsImV4cCI6MTQzMjMyNTQ5Niwic3ViIjoicyIsIm5iZiI6MTQzMjMyNDgzNn0.16LpzAZyBcokZ4aUaXHn5yN0xQ1zpmLyJVFHu6nH1zY] -14:56:02.106 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] 9223372036854775808 is unreasonable for a NumericDate] -14:56:02.108 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":25113002000004770000,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] 25113002000004770000 is unreasonable for a NumericDate] -14:56:02.110 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775809,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] -9223372036854775809 is unreasonable for a NumericDate] -14:56:02.111 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-77261600013501300000000,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] -77261600013501300000000 is unreasonable for a NumericDate] -14:56:02.113 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{9223372036854775807} is more than 2147483647 second(s) ahead of now NumericDate{9223372036854775 -> Aug 17, 292278994, 7:12:55?AM GMT}.] -14:56:02.116 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775 = 9214148664817921033 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] -14:56:02.120 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775807 = 1 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] -14:56:02.123 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775807 = 1 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] -14:56:02.125 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{9223372036854775807} is more than 10 second(s) ahead of now NumericDate{0 -> Jan 1, 1970, 12:00:00?AM GMT} (even when providing 2147483647 seconds of leeway to account for clock skew).] -14:56:02.127 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 2147483647 = 9223372034707292161 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] -14:56:02.159 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[-76717] You can go blind issuing tokens to yourself...] -14:56:02.159 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[-76717] You can go blind issuing tokens to yourself...] -14:56:02.164 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1771167302,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1771167362 -> Feb 15, 2026, 2:56:02?PM GMT} is on or after the Expiration Time (exp=NumericDate{1771167302 -> Feb 15, 2026, 2:55:02?PM GMT}) claim value.] -14:56:02.167 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[15] Subject (sub) claim value (d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea) doesn't match expected value of NOOOOOOOOOOOOOOOOPE] -14:56:02.167 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [R-RufjSDVGCGfdTmIobf2Q] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value.] -14:56:02.168 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [R-RufjSDVGCGfdTmIobf2Q] doesn't contain an acceptable identifier. Expected one of [no, nope, no way jose] as an aud value.] -14:56:02.168 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject", "iss":"issuer", "aud":"audience"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [audience] doesn't contain an acceptable identifier. Expected nope as an aud value., [12] Issuer (iss) claim value (issuer) doesn't match expected value of no way, [13] The JWT ID (jti) claim is not present.] -14:56:02.173 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1771167962,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [AUD] doesn't contain an acceptable identifier. Expected nope as an aud value.] -14:56:02.173 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1771167962,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (ISS) doesn't match expected value of no way] -14:56:02.174 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1771167962,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [AUD] doesn't contain an acceptable identifier. Expected nope as an aud value., [12] Issuer (iss) claim value (ISS) doesn't match expected value of no way, [5] The Expiration Time (exp=NumericDate{1771167962 -> Feb 15, 2026, 3:06:02?PM GMT}) claim value cannot be more than 5 minutes in the future relative to the evaluation time NumericDate{1771167362 -> Feb 15, 2026, 2:56:02?PM GMT}.] -14:56:02.174 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJleHAiOjE3NzExNjc5NjIsImlzcyI6IklTUyIsImF1ZCI6IkFVRCIsInN1YiI6IlNVQiJ9.NGns23fwIfHwxj0tDsFcFuzrlZYopHMWm5gaUzZyNdAwfLU3n_idriThNBjcA2Y68-3cw6IJs9sGmPlNVmXOtEG5n5DrjjmMLCpoeBvLmKW_sCPM35Dx62ZCoi4_QlfZvOVoSfzR9i7_9QwAmpRiPYBFLC3SVH2exH3Cr3FKIKqADeOf3yo86w22JaftSRcpA0I1wVOGvCvrw2EfO1nFuhl5g7Wp1Jl1aRnmYPo9v656Dq_zfmdNY8W9yGeuNXnpPTx4gXeQ2GbXS95vBzansM769TPtNaEC_kaQxzYMdPmc1MkAwqFcw6RQ6Qfv4JUwKs19XGwAuWLN8vT6djTODw] -14:56:02.180 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.BUIljSKnpe-u4PBTVRu9icDtcUh7e0_NfWDKeYrIvVBsD2SB0lnx4gfrzwEE2CchzUYABQcRgN3ySEdqSaAXIfiNxgrPzFE12pyLo09WcQq2YoHi4kSD7OEK3KXVv-Q87ELnH0CPT7gQ6dKhQ6F0VAyClJ__DK75HP3bzSUPzctx3pXFU7ORb1Ky6B5XB37gqy3oojw_m2iPjDXGWWa-Dth5leI6GjRpXernMDa5DBHZp_N53gKdtiQZvARA-zhodO7ggWCQKUW3MizBpSWOss4JSKQlFte7NjTo4Sqjraiwcnhx381o9UMlZaiJ768oGB01EbiebSE81WYBbppSPg.k_wBvR14WE5QSsOQyN_EAw.jo61tvWOpBokM5QcHkNpZ3py6mAd0MnlvUkxCojDXi8Jy4tqrO96-Ju3QkG6BbH5Ae3RH53emUmMnQMijhS7_A.6hYrgp0qpdLE-jowjFIczQ Additional details: [[10] Missing signature.] -14:56:02.181 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[17] You can go blind issuing tokens to yourself...] -14:56:02.181 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[17] You can go blind issuing tokens to yourself...] -14:56:02.185 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":-1239223372036854775808,"iat":1571322100,"exp":9223372036854775807,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] -1239223372036854775808 is unreasonable for a NumericDate] -14:56:02.186 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":1571322100,"iat":12345678900000000000,"exp":12345678900000000009,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] 12345678900000000009 is unreasonable for a NumericDate] -14:56:02.188 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":1571322100,"iat":1571322111,"exp":157132210009188371766311111,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] 157132210009188371766311111 is unreasonable for a NumericDate] -14:56:02.190 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{9223372036854775807}) claim value cannot be more than 2147483647 minutes in the future relative to the evaluation time NumericDate{9223371903710789693} (even when providing 2147483647 seconds of leeway to account for clock skew).] -14:56:02.192 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":-1,"exp":9223372036854775802,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow adding: 9223372036854775792 + 30 = -9223372036854775794 at org.jose4j.lang.Maths.add(Maths.java:13); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:143); ...omitted...] -14:56:02.193 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1572322100,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854774808 - 6000 = 9223372036854770808 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:113); ...omitted...] -14:56:02.195 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":-9223372036854775798,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775798 - 65 = 9223372036854775753 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:131); ...omitted...] -14:56:02.197 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: 9223372036854775807 - -10 = -9223372036854775799 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:131); ...omitted...] -14:56:02.198 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=QsGX3JhHP1Pwy4zQ8Ha9FQ): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..zWNzKpA-QA0BboVl02nz-A.eyJpc3MiOiJtZSIsImF1ZCI6Im1lIiwiZXhwIjoxNDIwMjMxNjA2LCJuYW1lIjoidmFsdWUifQ.QsGX3JhHP1Pwy4zQ8Ha9FQ] -14:56:02.198 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=QsGX3JhHP1Pwy4zQ8Ha9FQ): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..zWNzKpA-QA0BboVl02nz-A.u1D7JCpDFeRl69G1L-h3IRrmcOXiWLnhr23ugO2kkDqKVNcO1YQ4Xvl9Sag4aYOnkqUbqe6Wdz8KK3d9q178tA.QsGX3JhHP1Pwy4zQ8Ha9FQ] -14:56:02.202 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.g_hEwksO1Ax8Qn7HoN-BVeBoa8FXe0kpyk_XdcSmxvcM5_P296JXXtoHISr_DD_MqewaQSH4dZOQHoUgKLeFly-9RI11TG-_Ge1bZFazBPwKC5lJ6OLANLMd0QSL4fYEb9ERe-epKYE3xb2jfY1AltHqBO-PM6j23Guj2yDKnFv6WO72tteVzm_2n17SBFvhDuR9a2nHTE67pe0XGBUS_TK7ecA-iVq5COeVdJR4U4VZGGlxRGPLRHvolVLEHx6DYyLpw30Ay9R6d68YCLi9FYTq3hIXPK_-dmPlOUlKvPr1GgJzRoeC9G5qCvdcHWsqJGTO_z3Wfo5zsqwkxruxwA.UmVkbW9uZCBXQSA5ODA1Mg.VwHERHPvCNcHHpTjkoigx3_ExK0Qc71RMEParpatm0X_qpg-w8kozSjfNIPPXiTBBLXR65CIPkFqz4l1Ae9w_uowKiwyi9acgVztAi-pSL8GQSXnaamh9kX1mdh3M_TT-FZGQFQsFhu0Z72gJKGdfGE-OE7hS1zuBD5oEUfk0Dmb0VzWEzpxxiSSBbBAzP10l56pPfAtrjEYw-7ygeMkwBl6Z_mLS6w6xUgKlvW6ULmkV-uLC4FUiyKECK4e3WZYKw1bpgIqGYsw2v_grHjszJZ-_I5uM-9RA8ycX9KqPRp9gc6pXmoU_-27ATs9XCvrZXUtK2902AUzqpeEUJYjWWxSNsS-r1TJ1I-FMJ4XyAiGrfmo9hQPcNBYxPz3GQb28Y5CLSQfNgKSGt0A4isp1hBUXBHAndgtcslt7ZoQJaKe_nNJgNliWtWpJ_ebuOpEl8jdhehdccnRMIwAmU1n7SPkmhIl1HlSOpvcvDfhUN5wuqU955vOBvfkBOh5A11UzBuo2WlgZ6hYi9-e3w29bR0C2-pp3jbqxEDw3iWaf2dc5b-LnR0FEYXvI_tYk5rd_J9N0mg0tQ6RbpxNEMNoA9QWk5lgdPvbh9BaO195abQ.AVO9iT5AV4CzvDJCdhSFlQ] -14:56:02.202 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.g_hEwksO1Ax8Qn7HoN-BVeBoa8FXe0kpyk_XdcSmxvcM5_P296JXXtoHISr_DD_MqewaQSH4dZOQHoUgKLeFly-9RI11TG-_Ge1bZFazBPwKC5lJ6OLANLMd0QSL4fYEb9ERe-epKYE3xb2jfY1AltHqBO-PM6j23Guj2yDKnFv6WO72tteVzm_2n17SBFvhDuR9a2nHTE67pe0XGBUS_TK7ecA-iVq5COeVdJR4U4VZGGlxRGPLRHvolVLEHx6DYyLpw30Ay9R6d68YCLi9FYTq3hIXPK_-dmPlOUlKvPr1GgJzRoeC9G5qCvdcHWsqJGTO_z3Wfo5zsqwkxruxwA.UmVkbW9uZCBXQSA5ODA1Mg.VwHERHPvCNcHHpTjkoigx3_ExK0Qc71RMEParpatm0X_qpg-w8kozSjfNIPPXiTBBLXR65CIPkFqz4l1Ae9w_uowKiwyi9acgVztAi-pSL8GQSXnaamh9kX1mdh3M_TT-FZGQFQsFhu0Z72gJKGdfGE-OE7hS1zuBD5oEUfk0Dmb0VzWEzpxxiSSBbBAzP10l56pPfAtrjEYw-7ygeMkwBl6Z_mLS6w6xUgKlvW6ULmkV-uLC4FUiyKECK4e3WZYKw1bpgIqGYsw2v_grHjszJZ-_I5uM-9RA8ycX9KqPRp9gc6pXmoU_-27ATs9XCvrZXUtK2902AUzqpeEUJYjWWxSNsS-r1TJ1I-FMJ4XyAiGrfmo9hQPcNBYxPz3GQb28Y5CLSQfNgKSGt0A4isp1hBUXBHAndgtcslt7ZoQJaKe_nNJgNliWtWpJ_ebuOpEl8jdhehdccnRMIwAmU1n7SPkmhIl1HlSOpvcvDfhUN5wuqU955vOBvfkBOh5A11UzBuo2WlgZ6hYi9-e3w29bR0C2-pp3jbqxEDw3iWaf2dc5b-LnR0FEYXvI_tYk5rd_J9N0mg0tQ6RbpxNEMNoA9QWk5lgdPvbh9BaO195abQ.AVO9iT5AV4CzvDJCdhSFlQ] -14:56:02.202 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidKeyException: Key cannot be null): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.cC4hiUPoj9Eetdgtv3hF80EGrhuB__dzERat0XF9g2VtQgr9PJbu3XOiZj5RZmh7AAuHIm4Bh-0Qc_lF5YKt_O8W2Fp5jujGbds9uJdbF9CUAr7t1dnZcAcQjbKBYNX4BAynRFdiuB--f_nZLgrnbyTyWzO75vRK5h6xBArLIARNPvkSjtQBMHlb1L07Qe7K0GarZRmB_eSN9383LcOLn6_dO--xi12jzDwusC-eOkHWEsqtFZESc6BfI7noOPqvhJ1phCnvWh6IeYI2w9QOYEUipUTI8np6LbgGY9Fs98rqVt5AXLIhWkWywlVmtVrBp0igcN_IoypGlUPQGe77Rw] -14:56:02.202 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.g_hEwksO1Ax8Qn7HoN-BVeBoa8FXe0kpyk_XdcSmxvcM5_P296JXXtoHISr_DD_MqewaQSH4dZOQHoUgKLeFly-9RI11TG-_Ge1bZFazBPwKC5lJ6OLANLMd0QSL4fYEb9ERe-epKYE3xb2jfY1AltHqBO-PM6j23Guj2yDKnFv6WO72tteVzm_2n17SBFvhDuR9a2nHTE67pe0XGBUS_TK7ecA-iVq5COeVdJR4U4VZGGlxRGPLRHvolVLEHx6DYyLpw30Ay9R6d68YCLi9FYTq3hIXPK_-dmPlOUlKvPr1GgJzRoeC9G5qCvdcHWsqJGTO_z3Wfo5zsqwkxruxwA.UmVkbW9uZCBXQSA5ODA1Mg.VwHERHPvCNcHHpTjkoigx3_ExK0Qc71RMEParpatm0X_qpg-w8kozSjfNIPPXiTBBLXR65CIPkFqz4l1Ae9w_uowKiwyi9acgVztAi-pSL8GQSXnaamh9kX1mdh3M_TT-FZGQFQsFhu0Z72gJKGdfGE-OE7hS1zuBD5oEUfk0Dmb0VzWEzpxxiSSBbBAzP10l56pPfAtrjEYw-7ygeMkwBl6Z_mLS6w6xUgKlvW6ULmkV-uLC4FUiyKECK4e3WZYKw1bpgIqGYsw2v_grHjszJZ-_I5uM-9RA8ycX9KqPRp9gc6pXmoU_-27ATs9XCvrZXUtK2902AUzqpeEUJYjWWxSNsS-r1TJ1I-FMJ4XyAiGrfmo9hQPcNBYxPz3GQb28Y5CLSQfNgKSGt0A4isp1hBUXBHAndgtcslt7ZoQJaKe_nNJgNliWtWpJ_ebuOpEl8jdhehdccnRMIwAmU1n7SPkmhIl1HlSOpvcvDfhUN5wuqU955vOBvfkBOh5A11UzBuo2WlgZ6hYi9-e3w29bR0C2-pp3jbqxEDw3iWaf2dc5b-LnR0FEYXvI_tYk5rd_J9N0mg0tQ6RbpxNEMNoA9QWk5lgdPvbh9BaO195abQ.AVO9iT5AV4CzvDJCdhSFlQ] -14:56:02.203 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.cC4hiUPoj9Eetdgtv3hF80EGrhuB__dzERat0XF9g2VtQgr9PJbu3XOiZj5RZmh7AAuHIm4Bh-0Qc_lF5YKt_O8W2Fp5jujGbds9uJdbF9CUAr7t1dnZcAcQjbKBYNX4BAynRFdiuB--f_nZLgrnbyTyWzO75vRK5h6xBArLIARNPvkSjtQBMHlb1L07Qe7K0GarZRmB_eSN9383LcOLn6_dO--xi12jzDwusC-eOkHWEsqtFZESc6BfI7noOPqvhJ1phCnvWh6IeYI2w9QOYEUipUTI8np6LbgGY9Fs98rqVt5AXLIhWkWywlVmtVrBp0igcN_IoypGlUPQGe77Rw] -14:56:02.203 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JWT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"129ffs904","iss":"I?m sorry, this is our family?s first kidnapping.","aud":"ap.io/","exp":1702498218}] -14:56:02.203 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"jwt"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"1234","iss":"abcd","aud":"https://example.com/as","iat":1702497918,"exp":1702498218}] -14:56:02.203 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JWT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"0","iss":"ctyortyp","aud":"audiencia","exp":1702498218}] -14:56:02.203 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JWT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"2","iss":"ctyortyp","aud":"to.whom.it.may.concern","exp":1702499888}] -14:56:02.203 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JwT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"42","iss":"ctyortyp","aud":"to.whom.it.may.concern...","exp":1702599888}] -JWT Claims Set:{exp=1771167662, sub=subject, iss=issuer} -14:56:02.204 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[2] No Expiration Time (exp) claim present.] -14:56:02.204 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[3] No Issued At (iat) claim present.] -14:56:02.204 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[4] No Not Before (nbf) claim present.] -14:56:02.205 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value.] -14:56:02.206 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value.] -14:56:02.206 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value (even when providing 1 seconds of leeway to account for clock skew).] -14:56:02.206 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value (even when providing 2 seconds of leeway to account for clock skew).] -14:56:02.207 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602065 -> May 2, 2015, 9:27:45?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value.] -14:56:02.207 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602065 -> May 2, 2015, 9:27:45?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value (even when providing 60 seconds of leeway to account for clock skew).] -14:56:02.207 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[6] The JWT is not yet valid as the evaluation time NumericDate{1430601999 -> May 2, 2015, 9:26:39?PM GMT} is before the Not Before (nbf=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim time.] -14:56:02.208 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430603000, "iat":1430602060, "exp":1430602600 }) rejected due to invalid claims or other invalid content. Additional details: [[17] The Expiration Time (exp=NumericDate{1430602600 -> May 2, 2015, 9:36:40?PM GMT}) claim value cannot be before the Not Before (nbf=NumericDate{1430603000 -> May 2, 2015, 9:43:20?PM GMT}) claim value.] -14:56:02.208 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430602000, "iat":1430602660, "exp":1430602600 }) rejected due to invalid claims or other invalid content. Additional details: [[17] The Expiration Time (exp=NumericDate{1430602600 -> May 2, 2015, 9:36:40?PM GMT}) claim value cannot be before the Issued At (iat=NumericDate{1430602660 -> May 2, 2015, 9:37:40?PM GMT}) claim value.] -14:56:02.208 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430607201}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{1430607201 -> May 2, 2015, 10:53:21?PM GMT}) claim value cannot be more than 90 minutes in the future relative to the evaluation time NumericDate{1430600000 -> May 2, 2015, 8:53:20?PM GMT}.] -14:56:02.209 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430607201}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{1430607201 -> May 2, 2015, 10:53:21?PM GMT}) claim value cannot be more than 120 minutes in the future relative to the evaluation time NumericDate{1430600000 -> May 2, 2015, 8:53:20?PM GMT}.] -14:56:02.209 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: This VerificationKeyResolver always throws this exception.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJzdWIiOiJtZSIsImV4cCI6MTc3MTE2NzY2MiwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.] -14:56:02.209 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJzdWIiOiJtZSIsImV4cCI6MTc3MTE2NzY2MiwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.] -14:56:02.221 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Can't do it!): JsonWebSignature{"typ":"JWT", - "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -14:56:02.221 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Can't do it!): JsonWebSignature{"typ":"JWT", - "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -14:56:02.221 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unexpected exception encountered while processing JOSE object (java.lang.IllegalArgumentException: Stuff happens...): JsonWebSignature{"typ":"JWT", - "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -14:56:02.222 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unexpected exception encountered while processing JOSE object (java.lang.IllegalArgumentException: Stuff happens...): JsonWebSignature{"typ":"JWT", - "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -14:56:02.222 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:862); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:856); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...] -14:56:02.222 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:862); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:856); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...] -14:56:02.227 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[10] Missing signature.] -14:56:02.227 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[10] Missing signature.] -14:56:02.231 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[20] Missing Integrity Protection] -14:56:02.231 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[20] Missing Integrity Protection] -14:56:02.240 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -14:56:02.240 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -14:56:02.240 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -14:56:02.240 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -14:56:02.240 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -14:56:02.240 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -14:56:02.240 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -14:56:02.240 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -14:56:02.240 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -14:56:02.240 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -14:56:02.240 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -14:56:02.240 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -14:56:02.241 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -14:56:02.241 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -14:56:02.245 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: Unable to parse what was expected to be the JWT Claim Set JSON: "eyJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MjAyMTkwOTcsIm1lc3NhZ2UiOiJlaCJ9.ADXjpouiqbRqymN-NJ84HjU0ZZUmAajlb43Vzb6yTolFU9dTAcL6XhBAy5cwlPaS_3VT4Ce2CMpgruihmaftHA" Additional details: [[16] Invalid JSON.] -JWT Claims Set:{sub=me, aud=a, iss=i, exp=1771167962} -eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJjdHkiOiJqd3QiLCJjcml0IjpbImZha2UuYmxhaCJdfQ.Nbo8Sfj1HftmtsVc2cq8aFvig3jQ8tHqdGxg8pebIJbt-duC6ROdZmQy8vx6e5bRpYIOmqUfId3qwkX81TBbz9QW4gDPuge7MoNh-J0gS5LNtGhx7gjMU4CRFgh5efVvDX1QnyOm4ojwxJkT7Loug-mKgLLrL4aOflehmQzfuuD7DDZsLHVHBrG9pa9ixGQligLmvo0MXrFbCV-7sEjdD5QFTdKgEev-frBV4W5Y3v1Ocj0AuueKI5eXNavwkUigSFd8zq_6is10iX-fgFSB8Z0DwzT7pQ1t5iUd0glLeixlzR16N0j7sMPyxabaPCP-7zLolo_AETn-9gzqFLKvAg.q5KS179t4gsOipFYR7BZFw.HERk-N7RuXt9oG3_d7IGcZg1oGcLra_VgIH8po3oL05Dq3flApr2QFUg4s5Z1RW5ovpqHSkdcCZ9bsZ0y61QSL1H6-XrpTvzDqljqgsc8Z_jt7YiQxa4TDnRgPMKMA20gzExV8HceiVEVzgR3pU8LZ3-mI8vL-VWuvAiNI67Z_1wwV56ZANqfA6qjXYFNnkrYowDb09KQxcY3h9M2d-RRTxRhpPl8fggY4c1Q4yoAtUGrHFQXgVdlTRTxri-cQCxpinVhCJoFAiKcOs2vPeTJw.kB63aloKOXYLqNG32pjZ5A -14:56:02.250 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: Unrecognized header 'fake.blah' marked as critical.): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJjdHkiOiJqd3QiLCJjcml0IjpbImZha2UuYmxhaCJdfQ.Nbo8Sfj1HftmtsVc2cq8aFvig3jQ8tHqdGxg8pebIJbt-duC6ROdZmQy8vx6e5bRpYIOmqUfId3qwkX81TBbz9QW4gDPuge7MoNh-J0gS5LNtGhx7gjMU4CRFgh5efVvDX1QnyOm4ojwxJkT7Loug-mKgLLrL4aOflehmQzfuuD7DDZsLHVHBrG9pa9ixGQligLmvo0MXrFbCV-7sEjdD5QFTdKgEev-frBV4W5Y3v1Ocj0AuueKI5eXNavwkUigSFd8zq_6is10iX-fgFSB8Z0DwzT7pQ1t5iUd0glLeixlzR16N0j7sMPyxabaPCP-7zLolo_AETn-9gzqFLKvAg.q5KS179t4gsOipFYR7BZFw.HERk-N7RuXt9oG3_d7IGcZg1oGcLra_VgIH8po3oL05Dq3flApr2QFUg4s5Z1RW5ovpqHSkdcCZ9bsZ0y61QSL1H6-XrpTvzDqljqgsc8Z_jt7YiQxa4TDnRgPMKMA20gzExV8HceiVEVzgR3pU8LZ3-mI8vL-VWuvAiNI67Z_1wwV56ZANqfA6qjXYFNnkrYowDb09KQxcY3h9M2d-RRTxRhpPl8fggY4c1Q4yoAtUGrHFQXgVdlTRTxri-cQCxpinVhCJoFAiKcOs2vPeTJw.kB63aloKOXYLqNG32pjZ5A] -14:56:02.258 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1432327195,"sub":"s","nbf":1432326535}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [a] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value., [1] The JWT is no longer valid - the evaluation time NumericDate{1771167362 -> Feb 15, 2026, 2:56:02?PM GMT} is on or after the Expiration Time (exp=NumericDate{1432327195 -> May 22, 2015, 8:39:55?PM GMT}) claim value.] -14:56:02.259 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1432327195,"sub":"s","nbf":1432326535}) rejected due to invalid claims or other invalid content. Additional details: [[17] i isn't okay as an issuer] -14:56:02.259 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notjti":"lbZ_mLS6w3xBSlvW6ULmkV-uLCk"}) rejected due to invalid claims or other invalid content. Additional details: [[13] The JWT ID (jti) claim is not present.] -14:56:02.259 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"jti":55581529751992}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'jti' claim is not the expected type (55581529751992 - Cannot cast java.lang.Long to java.lang.String)] -14:56:02.260 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"jti":["S0w3XbslvW6ULmk0", "5iLSQfNgcSGt7A4is"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'jti' claim is not the expected type ([S0w3XbslvW6ULmk0, 5iLSQfNgcSGt7A4is] - Cannot cast java.util.ArrayList to java.lang.String)] -14:56:02.270 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1771167962,"nbf":1771167062,"jti":"3Wj8bXYVHFgAZ-rF2rR2Qg"}) rejected due to invalid claims or other invalid content. Additional details: [[21] No typ header parameter present in the innermost JWS/JWE] -14:56:02.279 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1771167962,"nbf":1771167062,"jti":"3Wj8bXYVHFgAZ-rF2rR2Qg"}) rejected due to invalid claims or other invalid content. Additional details: [[21] No typ header parameter present in the innermost JWS/JWE] -14:56:02.290 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1771167962,"nbf":1771167062,"jti":"3Wj8bXYVHFgAZ-rF2rR2Qg"}) rejected due to invalid claims or other invalid content. Additional details: [[22] Invalid typ header parameter value 'at+jwt'. Expecting 'application/secevent+jwt' or just 'secevent+jwt'.] -14:56:02.298 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1771167962,"nbf":1771167062,"jti":"3Wj8bXYVHFgAZ-rF2rR2Qg"}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.TypeValidator: java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.lang.String (java.util.ArrayList and java.lang.String are in module java.base of loader 'bootstrap') at org.jose4j.lang.JsonHelp.getString(JsonHelp.java:31); org.jose4j.jwx.Headers.getStringHeaderValue(Headers.java:78); org.jose4j.jwx.JsonWebStructure.getHeader(JsonWebStructure.java:153); org.jose4j.jwt.consumer.TypeValidator.validate(TypeValidator.java:37); ...omitted...] -14:56:02.300 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1771167962,"nbf":1771167062,"jti":"3Wj8bXYVHFgAZ-rF2rR2Qg"}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.TypeValidator: java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.lang.String (java.util.ArrayList and java.lang.String are in module java.base of loader 'bootstrap') at org.jose4j.lang.JsonHelp.getString(JsonHelp.java:31); org.jose4j.jwx.Headers.getStringHeaderValue(Headers.java:78); org.jose4j.jwx.JsonWebStructure.getHeader(JsonWebStructure.java:153); org.jose4j.jwt.consumer.TypeValidator.validate(TypeValidator.java:37); ...omitted...] -14:56:02.307 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1771167962,"nbf":1771167062,"jti":"3Wj8bXYVHFgAZ-rF2rR2Qg"}) rejected due to invalid claims or other invalid content. Additional details: [[22] typ header parameter value '' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: cannot have empty part] -14:56:02.309 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1771167962,"nbf":1771167062,"jti":"3Wj8bXYVHFgAZ-rF2rR2Qg"}) rejected due to invalid claims or other invalid content. Additional details: [[22] typ header parameter value '' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: cannot have empty part] -[INFO] Tests run: 49, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.555 s - in org.jose4j.jwt.consumer.JwtConsumerTest -[INFO] Running org.jose4j.jwt.consumer.TypeValidatorTest -14:56:02.310 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.311 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type 'application/noway)' isn't a valid media type in this context. -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '/' isn't a valid media type in this context. -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '/dpop+jwt' isn't a valid media type in this context. -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '' isn't a valid media type in this context. -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.312 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.313 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.314 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.314 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.314 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.314 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.314 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.314 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.314 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -14:56:02.314 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -14:56:02.314 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE -14:56:02.314 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.314 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.314 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.314 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.314 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.314 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.314 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.314 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:56:02.314 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -14:56:02.314 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.jwt.consumer.TypeValidatorTest -[INFO] Running org.jose4j.jwt.consumer.JwksVerificationKeyResolverUsingJwtConsumerTest -14:56:02.316 DEBUG o.j.j.c.JwksVerificationKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"HS512","kid":"nope"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=uno}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=two}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=trois}]): JsonWebSignature{"alg":"HS512","kid":"nope"}->eyJhbGciOiJIUzUxMiIsImtpZCI6Im5vcGUifQ.eyJpc3MiOiJGUk9NIiwiYXVkIjoiVE8iLCJleHAiOjE0MjQyMTg2NzksInN1YiI6IkFCT1VUIn0.lZOnt-l4wIUl667laxBjZgyTZsebfitsKT1yBrEQ-DognQiqEafQaVrFTaV3dJrZDvgDqAKL9FzxOHfdBg8NXw] -14:56:02.319 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.uIRIFrhftV39qJNOdaL8LwrK1prIJIHsP7Gn6jJAVbE2Mx4IkwGzBXDLKMulM1IvKElmSyK_KBg8afywcxoApA] -14:56:02.320 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.21eYfC_ZNf1FQ1Dtvj4rUiM9jYPgf1zJfeE_b2fclgu36KAN141ICqVjNxQqlK_7Wbct_FDxgyHvej_LEigb2Q] -14:56:02.321 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTEyNywiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.UE4B0IVPRip-3TDKhNAadCuj_Bf5PlEAn9K94Zd7mP25WNZwxDbQpDElZTZSp-3ngPqQyPGj27emYRHhOnFSAQ] -14:56:02.322 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES384"}->eyJhbGciOiJFUzM4NCJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTIzMSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.NyRtG_eFmMLQ0XkW5kvdSpzYsm6P5M3U8EBFKIhD-jw8E7FOYw9PZ3_o1PWuLWH3XeArZMW7-bAIVxo2bHqJsSUtB6Tf0NWPtCpUF2c1vbuRXEXkGrCUmc4sKyOBjimC] -14:56:02.322 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.pgBu9S8g7MC2BN9YNlWD9JhjzWbQVjqpmErW4hMFncKD8bUidIbMBJSI3URXvnMJrLrAC5eB2gb6DccF_txQaqX1X81JbTSdQ44_P1W-1uIIkfIXUvM6OXv48W-CPm8xGuetQ1ayHgU_1ljtdkbdUHZ6irgaeIrFMgZX0Jdb9Eydnfhwvno2oGk3y6ruq2KgKABIdzgvJXfwdOFGn1z0CxwQSVDkFRLsMsBljTwfTd0v3G8OXT8WRMZMGVyAgtKVu3XJyrPNntVqrzdgQQma6S06Y9J9V9t0AlgEAn2B4TqMxYcu1Tjr7bBL_v83zEXhbdcFBYLfJg-LY5wE6rA-dA] -14:56:02.333 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTEyNywiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.UE4B0IVPRip-3TDKhNAadCuj_Bf5PlEAn9K94Zd7mP25WNZwxDbQpDElZTZSp-3ngPqQyPGj27emYRHhOnFSAQ] -14:56:02.333 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES384"}->eyJhbGciOiJFUzM4NCJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTIzMSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.NyRtG_eFmMLQ0XkW5kvdSpzYsm6P5M3U8EBFKIhD-jw8E7FOYw9PZ3_o1PWuLWH3XeArZMW7-bAIVxo2bHqJsSUtB6Tf0NWPtCpUF2c1vbuRXEXkGrCUmc4sKyOBjimC] -14:56:02.335 DEBUG o.j.j.c.JwksVerificationKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"8a10l"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00r, use=sig, x=AZkOsR09YQeFcD6rhINHWAaAr8DMx9ndFzum50o5KLLUjqF7opKI7TxR5LP_4uUvG2jojF57xxWVwWi2otdETeI-, y=AadJxOSpjf_4VxRjTT_FdAtFX8Pw-CBpaoX-OQPPQ8o0kOrj5nzIltwnEORDldLFIkQQzgTXMzBnWyQurVHU5pUF, crv=P-521}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00q, use=sig, x=3n74sKXRbaBNw9qOGslnl-WcNCdC75cWo_UquiGUFKdDM3hudthywE5y0R6d2Li8, y=YbZ_0lregvTboKmUX7VE7eknQC1yETKUdHzt_YMX4zbTyOxgZL6A38AVfY8Q8HWd, crv=P-384}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00p, use=sig, x=S-EbFKVG-7pXjdgM9SPPw8rN3V8-2uX4bNg4y8R7EhA, y=KTtyNGz9B9_QrkFf7mP90YiH6F40fAYfqpzQh8HG7tc, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=8a00o, use=sig, n=kM-83p_Qaq-1FuxLHH6Y7jQeBT5MK9iHGB75Blnit8rMIcsns72Ls1uhEYiyB3_icK7ibLr2_AHiIl7MnJBY2cCquuwiTccDM5AYUccdypliSlVeAL0MBa_0xfpvBJw8fB45wX6kJKftbQI8xjvFhqSIuGNyQOzFXnJ_mCBOLv-6Nzn79qWxh47mQ7NJk2wSYdFDsz0NNGjBA2VQ9U6weqL1viZ1sbzXr-bJWCjjEYmKC5k0sjGGXJuvMPEqBY2q68kFXD3kiuslQ3tNS1j4d-IraadxpNVtedQ44-xM7MC-WFm2f5eO0LmJRzyipGNPkTer66q6MSEESguyhsoLNQ, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00n, use=sig, x=ADoTal4nAvVCgicprEBBFOzNKUKVJl1Ph8sISl3Z3tz7TJZlQB485LJ3xil-EmWvqW1-sKFl7dY2YtrGUZvjGp0O, y=AXVB58hIK7buMZmRgDU4hrGvcVQLXa-77_F755OKIkuWP5IJ6GdjFvaRHfIbbHMp-whqjmRrlwfYPN1xmyCGSzpT, crv=P-521}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00m, use=sig, x=5Y4xK9IBGJq5-E6QAVdpiqZb9Z-_tro_rX9TAUdWD3jiVS5N-blEnu5zWzoUoiJk, y=ZDFGBLBbiuvHLMOJ3DoOSRLU94uu5y3s03__HaaaLU04Efc4nGdY3vhTQ4kxEqVj, crv=P-384}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00l, use=sig, x=CWzKLukg4yQzi4oM-2m9M-ClxbU4e6P9G_HRn9A0edI, y=UB1OL_eziV6lA5J0PiAuzoKQU_YbXojbjh0sfxtVlOU, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=8a00k, use=sig, n=ux8LdF-7g3X1BlqglZUw36mqjd9P0JWfWxJYvR6pCFSyqLrETc-fL9_lTG3orohkGnEPe7G-BO65ldF44pYEe3eZzcEuEFtiO5W4_Jap1Z430vdYgC_nZtENIJDWlsGM9ev-cOld7By-8l3-wAyuspOKZijWtx6K57VLajyUHBSmbUtaeCwHQOGyMOV1V-cskbTO2u_HrLOLLkSv9oZrznAwpx_paFHy-aAsdFhb7EiBzwqqHQButo3aT3DsR69gbW_Nmrf6tfkril6B3ePKV4od_5jowa6V3765K6v2L4NER7fuZ2hJVbIc0eJXY8tL3NlkBnjnmQ8DBWQR81Ayhw, e=AQAB}]): JsonWebSignature{"alg":"ES256","kid":"8a10l"}->eyJhbGciOiJFUzI1NiIsImtpZCI6IjhhMTBsIn0.eyJzdWIiOiJoYWlsaWUiLCJhdWQiOiJhIiwianRpIjoiRmUwZ1h1UGpmcHoxSHEzdzRaaUZIQiIsImlzcyI6Imh0dHBzOlwvXC9sb2NhbGhvc3Q6OTAzMSIsImlhdCI6MTQyMTA5Mzg1OSwiZXhwIjoxNDIxMDk0NDU5LCJub25jZSI6ImZmcyIsImFjciI6InVybjpvYXNpczpuYW1lczp0YzpTQU1MOjIuMDphYzpjbGFzc2VzOlBhc3N3b3JkIiwiYXV0aF90aW1lIjoxNDIxMDkzMzc2fQ.gzJQZRErEHI_v6z6dZboTPzL7p9_wXrMJIWnYZFEENgq3E1InbrZuQM3wB-mJ5r33kwMibJY7Qi4y-jvk0IYqQ] -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.016 s - in org.jose4j.jwt.consumer.JwksVerificationKeyResolverUsingJwtConsumerTest -[INFO] Running org.jose4j.jwt.consumer.GoogsTooSmallKeyJwtConsumerTest -14:56:02.339 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits).): JsonWebSignature{"alg":"RS256","kid":"76fd32aec7e0f8c190dda8b9dd85e7cf5ad33c43"}->eyJhbGciOiJSUzI1NiIsImtpZCI6Ijc2ZmQzMmFlYzdlMGY4YzE5MGRkYThiOWRkODVlN2NmNWFkMzNjNDMifQ.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_aWQ9QUl0T2F3bGIxSEhFZFJJZW00d2Z1MXFNY1BUdWZvUDZzTi11ZVVrIiwiaWF0IjoxNDMxNjEyMjM4LCJleHAiOjE0MzE2MTU4Mzh9.RRMVpR9WJrkddegS4uKNT7rTov-LvRQ9sCtGo_SXrqkNbLZgArSJcmmHHxoQDsVWUjl2ZNG-7ZjDRuMu-POJLR4GHpwmQ8gttAEeywkiW4in5pUOb21AdgH29HDwG2mY6iVavsASHRutK747gURRlpt3wUJOJk00T9W2N0fVsTE] -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s - in org.jose4j.jwt.consumer.GoogsTooSmallKeyJwtConsumerTest -[INFO] Running org.jose4j.jwt.consumer.JwksDecryptionKeyResolverUsingJwtConsumerTest -14:56:02.341 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=SOR4S8o36S34oXmzEj-40Q). -14:56:02.341 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=C9FlR5el7tEq1wrPJ7KGiQ). -14:56:02.341 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=C9FlR5el7tEq1wrPJ7KGiQ). -14:56:02.341 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=G2eyDo3pDLTy67YWv2-6QQ). -14:56:02.341 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=G2eyDo3pDLTy67YWv2-6QQ). -14:56:02.341 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=G2eyDo3pDLTy67YWv2-6QQ). -14:56:02.342 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=v5J8WPmuKkVr-hEfM54tJg). -14:56:02.342 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=v5J8WPmuKkVr-hEfM54tJg). -14:56:02.342 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=v5J8WPmuKkVr-hEfM54tJg). -14:56:02.342 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=v5J8WPmuKkVr-hEfM54tJg). -14:56:02.342 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=ZeZkMraI8SxUP1hEf2Jdiw). -14:56:02.342 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=ZeZkMraI8SxUP1hEf2Jdiw). -14:56:02.342 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=ZeZkMraI8SxUP1hEf2Jdiw). -14:56:02.342 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=ZeZkMraI8SxUP1hEf2Jdiw). -14:56:02.342 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=5) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=ZeZkMraI8SxUP1hEf2Jdiw). -14:56:02.343 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=kErmC7eN2T1D8-SL-fa9gQ). -14:56:02.343 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=kErmC7eN2T1D8-SL-fa9gQ). -14:56:02.343 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=kErmC7eN2T1D8-SL-fa9gQ). -14:56:02.343 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=kErmC7eN2T1D8-SL-fa9gQ). -14:56:02.343 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=5) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=kErmC7eN2T1D8-SL-fa9gQ). -14:56:02.343 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=6) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=kErmC7eN2T1D8-SL-fa9gQ). -14:56:02.343 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256"} using attempted decryption to disambiguate from filtered candidate JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=1}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=2}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=3}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=4}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=5}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=6}]) selecting from keys: [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=1}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=2}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=3}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=4}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=5}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=6}]): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..wkPYTngRoVyyxPWvxtfPfQ.Gogt2dxDBykc3l_0JjVO_AyfHbOB0-DWXb0Q5UOJNzc.kErmC7eN2T1D8-SL-fa9gQ] -14:56:02.365 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). -14:56:02.378 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). -14:56:02.378 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Message is larger than modulus). -14:56:02.385 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). -14:56:02.397 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). -14:56:02.397 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). -14:56:02.416 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=e1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch; caused by: javax.crypto.AEADBadTagException: Tag mismatch). -14:56:02.428 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). -14:56:02.428 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). -14:56:02.433 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). -14:56:02.433 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). -14:56:02.434 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"RSA-OAEP","enc":"A128GCM"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"RSA-OAEP","enc":"A128GCM"} using attempted decryption to disambiguate from filtered candidate JWKs [org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r3, use=enc, n=pkTznDIyNrI9wvfoFqv3yZpHv5PBeSXxdvOIKtsrKTSXxgDqjfn3jS4CiZidUjW1TzwwkYRZYU3Ei-M7qecudUs1QFdoBUNyd7V_X-ueToD1K-JvQCCrb74bzQWHVfsb2bRfuLw3Tyw3JwnWU3Q-P7OP08INyitwFw9Oz5DvKovtuOyAh3-CT8eSXcPMy2LQTt7WW8h2YeMq1EvndAc67ohiz-q3u2Qqwbbyv-p237mL_90JLE4xMBnLNey4FDjtXbXIq8T8QbvGyn4Dc67ZxH4-izAxi_siA_3z0H7oTYRaeNL4JuNqhoB0R4CgThfofdGVGZVWPyyowzSI-7nxbMHYNNse96wDnbTTKC8pP-qDjExRYjzm4iNueaMzzcq3wAIpR5z2tZp1oULOo43R0kcXC51sKrenJWnqIaIj_WsENRAWWHsrh5IycgySWyytaGVgQHaeBagYJHzRcrhWk10e81M8oMtdPPL1MLS0bbU3CTpDcacr4KyAKAL8sVi7-M2UVqvtWkEZCJ9q1cgOFwcp0t8ZKOpw9OgVeyo-P8HoDpfeXM_WecqNuHSRBlJGbAIfKErBiAUAKFmdEKyHtuUi-Ni6cEwDgjrSxX3apxG_41POrZjZBuuV6FYBcR1wqnTr8k-_z49Kv8ZGF3yszgcV3IQ4qK3-M_qqypnEai8, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e1, use=enc, x=zw4_6TARtwAsHFDw4Q1gr65t6BMl6lXOmmOMA3R0q58, y=O0Gb45b83A8FRe-DH_xJ4H0dsaQVskZMT_RBIKaSGOc, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e2, use=enc, x=A47oP1eLgWo7NsiKGV2Q983D3oNxLnRDlgtEi7HCtSI, y=4CjFGXRHDmm3g_cSB2YZPYsnxorc4tAEJRD35wBu0ys, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r1, use=enc, n=lFZ04QwtWu_hHgqlry40DuIhVZyl6ci6FzyLfkeHLH8xfCDLR-rvslxX-Ub3teVnPjZYdUFlZztuDo5kOFsF7TvUQMJhx00VZ6qugm-4LDSJ93ioGuo37vNDjMYBs0dEw_xV38e_m_Jo-oTJZN8xfZFroiR0cRNzac2e98lPa-TCxtOCuVp8Q8ro1Y6nC_1g51iY3nZXHfELX4vUxSh-4z7I0VkzCREQNYx-iKWw6MqEl2qG2mohiwlRexphf-1--8RuJ7FgubewzFv6dP_vCO9cYGi2qB0Gw6b9u8Jb60JYM7xLT3wGTQNfepiXQWESbVorxYiwZODP7d0tteD-eQ, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r4, use=enc, n=srRMqzPSg5CoMyaY5YErUQBRJkn0QhkzSiIIPA6dow3MnhR2_1S-D4aNHdet29Yc6qs9Qh6HIirMWcp2FPaKfaIZaJ-Q_-9gVyPDWlKHp9jSTeSetDCxm401e8XxNMjluGqb-3uQWE9W0Ka7IlDXXW1KhLYZ75xDaP5Y1c2n84uMRMKwylNCKQv0KlHIRDhsPfHx82khTGUb1XMqom7FWO8Ii4whRr7Glw0JiXj8ANHGozVTP-EVkZqFRJmwLG-ndyvsJOclEwwrXYqklFloU7WUwZQ5M08F-g-6XlSNHtaDcFagUUQKXG8zSb6GqXtEfhrs0mwI1D66b3txAf_76w9phkwlHp0Ab_lLuJLAr0j_ACtXbyxUQvHOV8QXmBuSwl7dVqAXFXGBQNGRtdewjPYgzmS4l_SzjgvC8jRTd-xzSof_gIIbSrKEtMnIoKhMCexyYGXkEzfv7aZH92_ZDGa9Cszlyqd3TJrDjj75zrkztc3coMOgbIVHoet_Ptmx, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, use=enc, n=yzFYB2Nqp5Wb34XQUBGRR33tp1jPVds46D3xwmTXPqjsbr4LMQqPWghtN_qE2bHldPJ9RJUk-i3UxnTAwR1bKLaCj6Aip_blZ4z_wK6IUIkJZk2nPD75YyhTpE9CqoI26lL2KBjMj3gn3cIxHi22BdGshppUbaf-ogH18LQ1bStM63uiflX44ud7GT4JVGaBczoad_cr-R1hs4kWZNdJrzBh7aPxebYnbAVd2CTeyXGYr_GIiq_sgtaBBISGoggruY5r-fva3R4YnhoTnmNeFOLDb99bzDPHbWhyjJ5nqBx7yaw1mT9uBnWno-h423bAT81TvXOJ2ogZ-jsYigx6xw, e=AQAB}]) selecting from keys: [org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r3, use=enc, n=pkTznDIyNrI9wvfoFqv3yZpHv5PBeSXxdvOIKtsrKTSXxgDqjfn3jS4CiZidUjW1TzwwkYRZYU3Ei-M7qecudUs1QFdoBUNyd7V_X-ueToD1K-JvQCCrb74bzQWHVfsb2bRfuLw3Tyw3JwnWU3Q-P7OP08INyitwFw9Oz5DvKovtuOyAh3-CT8eSXcPMy2LQTt7WW8h2YeMq1EvndAc67ohiz-q3u2Qqwbbyv-p237mL_90JLE4xMBnLNey4FDjtXbXIq8T8QbvGyn4Dc67ZxH4-izAxi_siA_3z0H7oTYRaeNL4JuNqhoB0R4CgThfofdGVGZVWPyyowzSI-7nxbMHYNNse96wDnbTTKC8pP-qDjExRYjzm4iNueaMzzcq3wAIpR5z2tZp1oULOo43R0kcXC51sKrenJWnqIaIj_WsENRAWWHsrh5IycgySWyytaGVgQHaeBagYJHzRcrhWk10e81M8oMtdPPL1MLS0bbU3CTpDcacr4KyAKAL8sVi7-M2UVqvtWkEZCJ9q1cgOFwcp0t8ZKOpw9OgVeyo-P8HoDpfeXM_WecqNuHSRBlJGbAIfKErBiAUAKFmdEKyHtuUi-Ni6cEwDgjrSxX3apxG_41POrZjZBuuV6FYBcR1wqnTr8k-_z49Kv8ZGF3yszgcV3IQ4qK3-M_qqypnEai8, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e1, use=enc, x=zw4_6TARtwAsHFDw4Q1gr65t6BMl6lXOmmOMA3R0q58, y=O0Gb45b83A8FRe-DH_xJ4H0dsaQVskZMT_RBIKaSGOc, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e2, use=enc, x=A47oP1eLgWo7NsiKGV2Q983D3oNxLnRDlgtEi7HCtSI, y=4CjFGXRHDmm3g_cSB2YZPYsnxorc4tAEJRD35wBu0ys, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r1, use=enc, n=lFZ04QwtWu_hHgqlry40DuIhVZyl6ci6FzyLfkeHLH8xfCDLR-rvslxX-Ub3teVnPjZYdUFlZztuDo5kOFsF7TvUQMJhx00VZ6qugm-4LDSJ93ioGuo37vNDjMYBs0dEw_xV38e_m_Jo-oTJZN8xfZFroiR0cRNzac2e98lPa-TCxtOCuVp8Q8ro1Y6nC_1g51iY3nZXHfELX4vUxSh-4z7I0VkzCREQNYx-iKWw6MqEl2qG2mohiwlRexphf-1--8RuJ7FgubewzFv6dP_vCO9cYGi2qB0Gw6b9u8Jb60JYM7xLT3wGTQNfepiXQWESbVorxYiwZODP7d0tteD-eQ, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r4, use=enc, n=srRMqzPSg5CoMyaY5YErUQBRJkn0QhkzSiIIPA6dow3MnhR2_1S-D4aNHdet29Yc6qs9Qh6HIirMWcp2FPaKfaIZaJ-Q_-9gVyPDWlKHp9jSTeSetDCxm401e8XxNMjluGqb-3uQWE9W0Ka7IlDXXW1KhLYZ75xDaP5Y1c2n84uMRMKwylNCKQv0KlHIRDhsPfHx82khTGUb1XMqom7FWO8Ii4whRr7Glw0JiXj8ANHGozVTP-EVkZqFRJmwLG-ndyvsJOclEwwrXYqklFloU7WUwZQ5M08F-g-6XlSNHtaDcFagUUQKXG8zSb6GqXtEfhrs0mwI1D66b3txAf_76w9phkwlHp0Ab_lLuJLAr0j_ACtXbyxUQvHOV8QXmBuSwl7dVqAXFXGBQNGRtdewjPYgzmS4l_SzjgvC8jRTd-xzSof_gIIbSrKEtMnIoKhMCexyYGXkEzfv7aZH92_ZDGa9Cszlyqd3TJrDjj75zrkztc3coMOgbIVHoet_Ptmx, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, use=enc, n=yzFYB2Nqp5Wb34XQUBGRR33tp1jPVds46D3xwmTXPqjsbr4LMQqPWghtN_qE2bHldPJ9RJUk-i3UxnTAwR1bKLaCj6Aip_blZ4z_wK6IUIkJZk2nPD75YyhTpE9CqoI26lL2KBjMj3gn3cIxHi22BdGshppUbaf-ogH18LQ1bStM63uiflX44ud7GT4JVGaBczoad_cr-R1hs4kWZNdJrzBh7aPxebYnbAVd2CTeyXGYr_GIiq_sgtaBBISGoggruY5r-fva3R4YnhoTnmNeFOLDb99bzDPHbWhyjJ5nqBx7yaw1mT9uBnWno-h423bAT81TvXOJ2ogZ-jsYigx6xw, e=AQAB}]): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhHQ00ifQ.Ac5pGgt-UTQYOQBO4Z-sABTVhrSr70xjotF0FMXWFqUB4iyoihdLRBTnrpjTb6o-orOqA6EMsv6oDZZelSn3J5Ul-cJSPibXuehlX9VQkZv4NDhP38sUeuXNp0IDtNcJeX2tFI2t6W2uFrCYwIkvh8f8bKHR_yUZslFBWAXRwLX9H2PjyQLXhir3hM1SAOKrQQVjaoPOum1n-3F6p_fh8gZYaxVJiJ2Yq9kdqVwY1wjsEq5sq8JN3j8szfE1GBVYHQhdn2I96bpX9OI97ma-XDIZwmQRgHT1mMByhbTG1SzQiIOc4CXGp5b5zER8j55MVZYB0L3iPYVEELY5YjWULc8XTUeSkejvH3ENuckqBoMijx3vb3N3XUFvY1IW6l0DecXEbv87ead-qSRoCNWKsZKtNX457jhtl9xXO0lrjT5kB_D9z_0SbT2X7ffsZ4vMGBbzsII-Ip_cWwl8xYXxwy9OGVsiRt1F0q1JgtNS35lNP9hZvDJksWPo77ebqXEw.ocPwwRIpGacR3VO1.-XXqFCYM6zkOTl3j.hOTzs7STvZrH3Agtm4DoNg] -14:56:02.444 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=Hzbvc__4g2nqIaYoYkc__w): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoiZGV1eCJ9..JruwzL7TaQ1Fub8Hw6yYmQ.b4B9F3kerVHvyGB5zb40lkTqxulLbMhwFi-qvPfFwwbuyPVPf5s7TeT3i3MLRs0-l_1hP5bPxIEEnOEOBbqTGwO1TWuBn_lQsR8XpQRp6t4H0eaXZsnBqOa3MeEtmGpo.Hzbvc__4g2nqIaYoYkc___] -14:56:02.445 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256","kid":"deux"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=one}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=two}]): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoiZGV1eCJ9..JruwzL7TaQ1Fub8Hw6yYmQ.b4B9F3kerVHvyGB5zb40lkTqxulLbMhwFi-qvPfFwwbuyPVPf5s7TeT3i3MLRs0-l_1hP5bPxIEEnOEOBbqTGwO1TWuBn_lQsR8XpQRp6t4H0eaXZsnBqOa3MeEtmGpo.Hzbvc--4g2nqIaYoYkc2pQ] -[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.104 s - in org.jose4j.jwt.consumer.JwksDecryptionKeyResolverUsingJwtConsumerTest -[INFO] Running org.jose4j.jwt.consumer.ExamplesFromOpenIdConnectTest -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.jwt.consumer.ExamplesFromOpenIdConnectTest -[INFO] Running org.jose4j.jwt.consumer.X509VerificationKeyResolverInJwtConsumerTest -14:56:02.457 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=iHQKuSGeWUGYZCg4_RGJSIC0NDQ vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, Zb1HT7ryCRAAj2wcQ8hWbzaqX1s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, W8aO-BD2jx9KMzQjhZ85ukJA5Zg] x5t#S256=qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE].): JsonWebSignature{"x5t#S256":"qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE","x5t":"iHQKuSGeWUGYZCg4_RGJSIC0NDQ","alg":"ES256"}->eyJ4NXQjUzI1NiI6InFTX2JYTlNfSklYQ3JuUmdha2I2b3RFS3Utd0xlb3R6N0tBWjN4UVVPcUUiLCJ4NXQiOiJpSFFLdVNHZVdVR1laQ2c0X1JHSlNJQzBORFEiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTc2MSwic3ViIjoiYWJvdXQifQ.04qPYooLJN2G0q0LYVepaydszTuhY7jKjqi5IGkNBAWZ-IBlW_pWzkurR1MkO48SbJQK2swmy7Ogfihi1ClAlA] -14:56:02.457 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=iHQKuSGeWUGYZCg4_RGJSIC0NDQ vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, Zb1HT7ryCRAAj2wcQ8hWbzaqX1s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, W8aO-BD2jx9KMzQjhZ85ukJA5Zg] x5t#S256=qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE].): JsonWebSignature{"x5t#S256":"qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE","x5t":"iHQKuSGeWUGYZCg4_RGJSIC0NDQ","alg":"ES256"}->eyJ4NXQjUzI1NiI6InFTX2JYTlNfSklYQ3JuUmdha2I2b3RFS3Utd0xlb3R6N0tBWjN4UVVPcUUiLCJ4NXQiOiJpSFFLdVNHZVdVR1laQ2c0X1JHSlNJQzBORFEiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTc2MSwic3ViIjoiYWJvdXQifQ.04qPYooLJN2G0q0LYVepaydszTuhY7jKjqi5IGkNBAWZ-IBlW_pWzkurR1MkO48SbJQK2swmy7Ogfihi1ClAlA] -14:56:02.457 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Neither the x5t header nor the x5t#S256 header are present in the JWS.): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] -14:56:02.457 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Neither the x5t header nor the x5t#S256 header are present in the JWS.): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] -14:56:02.457 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -14:56:02.458 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -14:56:02.458 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -14:56:02.458 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -14:56:02.460 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -14:56:02.460 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -14:56:02.461 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to verify the signature with any of the provided keys - SHA-1 thumbs of provided certificates: [ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y].): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] -14:56:02.461 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to verify the signature with any of the provided keys - SHA-1 thumbs of provided certificates: [ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y].): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] -14:56:02.464 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t#S256=FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE].): JsonWebSignature{"x5t#S256":"FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE","alg":"ES256"}->eyJ4NXQjUzI1NiI6IkZTcU90QjV2UHFaNGtqWXAwOUZqQnBrbVhIMFZxRURtLXdFY1Rjb3g2RUUiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTUzOSwic3ViIjoiYWJvdXQifQ.9Nj3UG8N9u7Eyu0wupR-eVS4Mf0ItwwHBZzwLcY2KUCJeWoPRPT7zC4MqMbHfLj6PzFi09iC3q3PniSJwmWJTA] -14:56:02.464 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t#S256=FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE].): JsonWebSignature{"x5t#S256":"FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE","alg":"ES256"}->eyJ4NXQjUzI1NiI6IkZTcU90QjV2UHFaNGtqWXAwOUZqQnBrbVhIMFZxRURtLXdFY1Rjb3g2RUUiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTUzOSwic3ViIjoiYWJvdXQifQ.9Nj3UG8N9u7Eyu0wupR-eVS4Mf0ItwwHBZzwLcY2KUCJeWoPRPT7zC4MqMbHfLj6PzFi09iC3q3PniSJwmWJTA] -14:56:02.465 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=Zb1HT7ryCRAAj2wcQ8hWbzaqX1s vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, iHQKuSGeWUGYZCg4_RGJSIC0NDQ, W8aO-BD2jx9KMzQjhZ85ukJA5Zg].): JsonWebSignature{"x5t":"Zb1HT7ryCRAAj2wcQ8hWbzaqX1s","alg":"RS256"}->eyJ4NXQiOiJaYjFIVDdyeUNSQUFqMndjUThoV2J6YXFYMXMiLCJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5NjI1Nywic3ViIjoiYWJvdXQifQ.RidDM9z0OJkfV2mwxABtEh2Gr_BCFbTuetOTV_dmnFofarBK7VDPPdsdAhtIs3u7WQq9guoo6H3AUGfj4mTFKX3axi2TsaYRKM9wSoRjxFO7ednGcRGx8bnSerqqrbBuM9ZUUt93sIXuneJHYRKlh0Tt9mCXISv1H4OMEueXOJhck-JPgLPfLDqIPa8t93SULKTQtLvs8KEby2uJOL8vIy-a-lFp9irCWwTnd0QRidpuLAPLr428LPNPycEVqD2TpY7y_xaQJh49oqoq_AmQCmIn3CpZLDLqD1wpEPxLQyd1vbvgQ583y2XJ95_QufjbRd2Oshv3Z3JxpIm9Yie6yQ] -14:56:02.465 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=Zb1HT7ryCRAAj2wcQ8hWbzaqX1s vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, iHQKuSGeWUGYZCg4_RGJSIC0NDQ, W8aO-BD2jx9KMzQjhZ85ukJA5Zg].): JsonWebSignature{"x5t":"Zb1HT7ryCRAAj2wcQ8hWbzaqX1s","alg":"RS256"}->eyJ4NXQiOiJaYjFIVDdyeUNSQUFqMndjUThoV2J6YXFYMXMiLCJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5NjI1Nywic3ViIjoiYWJvdXQifQ.RidDM9z0OJkfV2mwxABtEh2Gr_BCFbTuetOTV_dmnFofarBK7VDPPdsdAhtIs3u7WQq9guoo6H3AUGfj4mTFKX3axi2TsaYRKM9wSoRjxFO7ednGcRGx8bnSerqqrbBuM9ZUUt93sIXuneJHYRKlh0Tt9mCXISv1H4OMEueXOJhck-JPgLPfLDqIPa8t93SULKTQtLvs8KEby2uJOL8vIy-a-lFp9irCWwTnd0QRidpuLAPLr428LPNPycEVqD2TpY7y_xaQJh49oqoq_AmQCmIn3CpZLDLqD1wpEPxLQyd1vbvgQ583y2XJ95_QufjbRd2Oshv3Z3JxpIm9Yie6yQ] -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.014 s - in org.jose4j.jwt.consumer.X509VerificationKeyResolverInJwtConsumerTest -[INFO] Running org.jose4j.jwt.NumericDateTest -14:56:02.466 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854775807} -14:56:02.466 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372034707292160} -14:56:02.466 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223371822106411107} -14:56:02.466 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{4611686018427387903} -14:56:02.466 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{2305843009213693951} -14:56:02.466 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{144115188075855871} -14:56:02.466 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9232604641496272} -14:56:02.466 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854776} -14:56:02.467 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854775 -> Aug 17, 292278994, 7:12:55?AM GMT} -14:56:02.467 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854774 -> Aug 17, 292278994, 7:12:54?AM GMT} -14:56:02.467 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854775808} -14:56:02.467 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372034707292161} -14:56:02.467 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-4611686018427387904} -14:56:02.467 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-184467440737095516} -14:56:02.467 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9232604641496272} -14:56:02.467 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854776} -14:56:02.469 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854775 -> Dec 2, 292269055, 4:47:05?PM GMT} -14:56:02.470 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854774 -> Dec 2, 292269055, 4:47:06?PM GMT} -14:56:02.470 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 1 = -9223372036854775808 -14:56:02.470 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 60 = -9223372036854775749 -14:56:02.470 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 2147483647 = -9223372034707292162 -14:56:02.470 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 9223372036854775807 = -2 -14:56:02.470 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 2147483647 + 9223372036854775807 = -9223372034707292162 -14:56:02.470 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 60 + 9223372036854775807 = -9223372036854775749 -14:56:02.470 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 1 + 9223372036854775807 = -9223372036854775808 -14:56:02.470 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -1 = 9223372036854775807 -14:56:02.470 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -100 = 9223372036854775708 -14:56:02.470 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -2147483648 = 9223372034707292160 -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.jwt.NumericDateTest -[INFO] Running org.jose4j.http.GetTest -[WARNING] Tests run: 1, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0 s - in org.jose4j.http.GetTest -[INFO] Running org.jose4j.examples.ExamplesTest -eyJhbGciOiJFUzI1NiJ9.VGhpcyBpcyBzb21lIHRleHQgdGhhdCBpcyB0byBiZSBzaWduZWQu.6Kfmbjo8efX2trHZZeWxBK27oTbbl7IoKnATqXxNfDQhke7_nzr2w3-ZyBo8shIvwF35BMtwiLSg9cRgzN_7Cg -JWS Signature is valid: true -JWS payload: PAYLOAD! -Serialized Encrypted JWE: eyJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.6xWbMQfGoCr1c_fqkHnjxEmZ7Kj4Ak8NCRGEb5Jrjxm3s-Xj4KYi2A.ByxPft45OMZozmidMlCuLQ.9ZEYPn5XZ6e5TjArwxOklQ.lIiMGqxc-7fIkwRKKigmXQ -Payload: Hello World! -JWS Signature is valid: true -JWS payload: This is some text that is to be signed. -JWT: eyJraWQiOiJrMSIsImFsZyI6IlJTMjU2In0.eyJpc3MiOiJJc3N1ZXIiLCJhdWQiOiJBdWRpZW5jZSIsImV4cCI6MTc3MTE2Nzk2MiwianRpIjoiZ3dvMTd2YXc4SXoya1VoRnN0WTZidyIsImlhdCI6MTc3MTE2NzM2MiwibmJmIjoxNzcxMTY3MjQyLCJzdWIiOiJzdWJqZWN0IiwiZW1haWwiOiJtYWlsQGV4YW1wbGUuY29tIiwiZ3JvdXBzIjpbImdyb3VwLW9uZSIsIm90aGVyLWdyb3VwIiwiZ3JvdXAtdGhyZWUiXX0.fpqoj2gAlG5GcHFXv13H8XVdOy9pSgC1ajUm3ik5a3Klf1-FFAXXXJS-FnG--6OYRK0XgzY6HNmE_yAonLsq6eL-MlfvR2nSvjITOb71C7_Sk6VE1_H8Yqie2CMZuWzN-h34PCle-ZFaAk0TRCM17v_Qfnxm2o3m0NHf1MjEQmyw7QmH4tmsLTYC7wNdln_rtTbHBPfe3_ryS5eD8SqYneO1O6XvszSXCaTF3dXmeSRuwgiCeNlqr3rNsmxXn8hhFlH9hZSaARuwKS9iP3jXB39qjryHU2-kfVpHQxqN5EIYnMI63Cl8VUCAGd2bRxwtzY3zvIgrjpGo3uqoDLGcRQ -JWT validation succeeded! JWT Claims Set:{iss=Issuer, aud=Audience, exp=1771167962, jti=gwo17vaw8Iz2kUhFstY6bw, iat=1771167362, nbf=1771167242, sub=subject, email=mail@example.com, groups=[group-one, other-group, group-three]} -JWT: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJyZWNlaXZlcidzIGtleSIsImN0eSI6IkpXVCIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJxVTlqZnZueVBTeEl3NndfbmluWTRpSk5NRlhDZUVjTjRtTDdtMExHNm1vIiwieSI6ImNIWXcwWGJsQ2JvYnZjd21nNjZMQ2tQbWFBbm5iaUo1R0F3NkdGNzVkdGciLCJjcnYiOiJQLTI1NiJ9fQ.Aj9VJcgpXi9pkhkXHp01ZpC8yUsYFSJvaG_zlKCsqtlKoBNh-r_gOQ.KcUV6cO5c619CERhefHA3w.q8ngZpioZKWAJXzPBvlTLUZ26I7F3zKnKzHEVaVOAIQNoRZX7BMZfbpZa3ig_sIAziYpYdtDlYxIbCvOxgIYThAOk18fgMDKXXYcBG4nR11FnxzzQagIbNwh9A2MFFzeZu71cTDktlYRB1f81MiqE_-fx8_BRd-i3H8bDrO4DynUafTB5exTcs2LiQmT5DwnS_aU2UzFlb7SehGNVETlkePOw_kYwJ7EO9Wv8AEJ3dDAvpTIWGacsAwJYih1Hxsrk8jfAv8E5DkYHFFnt_tjRYnmVs8GNXjhv4MXz2xWRlR0yMf6XRJfa3EQyzD9EyN6MTOGIk16XOL8czLFOUS3kRHSUdYlc6HL7MXO2vi0ZAPARnUMWm3IqP9Yf-OBtjTTHIbiKEiJL05LFB_7Fr5ZFHcK79IYE4HUqXC2jRk_K019wHNb7tQr4VhnqMlx7-aWrC74QOqosc3cI6ocQn2g-ZKoyz9ROW2Q8oEUMp-TUM5w6LlPBvmmod8JjzQQyDKGq6-Ww1gODjXH9A_ziOkfhBsJhFP7fJVpxJeJRINcxkM.vHY-dewUGZKvTGQ-nTlaNg -JWT validation succeeded! JWT Claims Set:{iss=sender, aud=receiver, exp=1771167962, jti=yYN4L98EpVM3KPR8c1bTmQ, iat=1771167362, nbf=1771167242, sub=subject, email=mail@example.com, groups=[group-1, other-group, group-3]} -JWE compact serialization: eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.._uWDNBt0EmMzLAI0OHl4Ew.aT4VvaoQr3wV5VSLo2xi3ZiSOunf4ze5WoUyfLmiMNjl4Ef-f28HwWoS4wiU1w-5e06Xa8r6NwGptW9CszRAfw.nYsrLqX18lczO6h_opX0Xg -plaintext: Well, as of this moment, they're on DOUBLE SECRET PROBATION! -eyJhbGciOiJFUzI1NiIsImtpZCI6ImV4YW1wbGUiLCJiNjQiOmZhbHNlLCJjcml0IjpbImI2NCJdfQ..fbQJCjeZiWzt-ZDTcmEVOKcXMS8_5LFJ8ljxPIZsFcEl8JLsOS2dccOhLTbnv_C4SAHPP-TakCron5DEumo6HA -this is the content that will be signed -JWS Signature is valid: true -JWT: eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImtpZCI6InJlY2VpdmVyIGtleSIsImN0eSI6IkpXVCIsImVwayI6eyJrdHkiOiJPS1AiLCJjcnYiOiJYMjU1MTkiLCJ4IjoiZk5LS2E0OFpIRV95NnFWYVY5WkU1YkJ5RGVTN1Z4aEo4WUN4ckF2X3drWSJ9fQ..hcIXmg04yXHgCGgKur8iEg.GIb2kOG7BaIhBuWLNblIlWjAQUdEA_yaUnfxP3hFwm8yrYC3cWGB8zpY0rHwizromXHT8mqLeuVLkDhGnWumI4CVJzfJ5i6LAxiud6b37PW7PoGcKlLtb4_6MBN1JiyUgCcGLNeTdHG3M_2ocWQ5UbTwFQultSJo5ofq02uUhAkmKhDUJI1aOvo-i0IH8VDhP6zTNjYHQL978DiTWxqVGlVFP0_KzFd6dLGe3-9OCaHAwZXUAxzUc8bZTWPhBYfwNBC7ib7ovG9MZ4P5MGqBg-zBCg61jdtwuPgItzGmE09g6oLsvHdYiyYuNlUOeYTpNJsKBKVbghS6SLzv2FZqsC2C2IwssDnMJWAlU-NxoUNiLf9srTt-bG7ooALC1dI-c9XkwU-lFrXZBxa9-F3dzkxg78JSi8HztaKUoVcYxn76oca6ez0SuA5fPT3iaLuHU0ryxOKevDQcA0rT4k8p-aZqmdeKOdEu089rDJ6q0yt42rgocWdT8e2aR9LE3zUL3inlob1eVpgcRTFEAs3xL78sbLVWiQ2jNo1EDIH2YGGdOxJsPuKiirmxY2eOhHBuA00GsixnjQDe1dDS_kzdj2LI4O8I4TxZMw1JL7IJBKolOTe54T5vEFTkr7UwjfAWJerTn7Bg3Mxwn8FxW8bK5G3dmxIMpWwS9cP58CxVNp-khpRFZz4h-Dqbw_JCk0GJJBZwJa0SaYt1Nfxi017TvQ.rI8IiiWyrqZlse_t8boTgQ -JWT validation succeeded! {"iss":"sender","aud":"receiver","exp":1771167962,"jti":"ZsRO8RDhpSLKMk0dHf21yA","iat":1771167362,"nbf":1771167242,"sub":"subject","email":"mail@example.com","groups":["group-1","other-group","group-3"],"address":{"street_address":"123 Main St","locality":"Anytown","region":"Anystate","country":"US"}} -[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.184 s - in org.jose4j.examples.ExamplesTest +[INFO] Running org.jose4j.keys.EllipticCurvesTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.009 s - in org.jose4j.keys.EllipticCurvesTest +[INFO] Running org.jose4j.keys.resolvers.EmbeddedJwkVerificationKeyResolverTest +08:36:43.792 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: No jwk in JWS header): JsonWebSignature{"typ":"dpop+jwt","alg":"ES256"}->eyJ0eXAiOiJkcG9wK2p3dCIsImFsZyI6IkVTMjU2In0.eyJqdGkiOiItQndDM3lFU2MwNGFjYzc3bFRjMjZ4IiwiaHRtIjoiUE9TVCIsImh0dSI6Imh0dHBzOi8vc2VydmVyLmV4YW1wbGUuY29tL3Rva2VuIiwiaWF0IjoxNTYyMjYyNjE2fQ.DlWrKDQE15d6lN14J525P877gT_pmYYKFwpFmUvs3uQ96wTHV-4ZdnozfXVmlHmpgF5DA_3Ld8x5iyS7MrOjhw] +08:36:43.793 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Problem processing jwk from JWS header (jwk header contains a private key, which it most definitely should not.)): JsonWebSignature{"alg":"ES256","typ":"dpop+jwt","jwk":{"kty":"EC","x":"76nY8PkSVA80iOPq3UEGnocuOGhQjGOkcPpbyWpsWmg","y":"00LZB2IcOxErkNZwcQX_dmudk-atORMKjDBTsUeMvoU","crv":"P-256","d":"IIbXpUbIHemOAreeQ_LM2akq7y66DcYluvgydOritJU"}}->eyJhbGciOiJFUzI1NiIsInR5cCI6ImRwb3Arand0IiwiandrIjp7Imt0eSI6IkVDIiwieCI6Ijc2blk4UGtTVkE4MGlPUHEzVUVHbm9jdU9HaFFqR09rY1BwYnlXcHNXbWciLCJ5IjoiMDBMWkIySWNPeEVya05ad2NRWF9kbXVkay1hdE9STUtqREJUc1VlTXZvVSIsImNydiI6IlAtMjU2IiwiZCI6IklJYlhwVWJJSGVtT0FyZWVRX0xNMmFrcTd5NjZEY1lsdXZneWRPcml0SlUifX0.eyJqdGkiOiJiYzc4OSIsImh0bSI6IkdFVCIsImh0dSI6Imh0dHBzOi8vYXBpLmV4YW1wbGUuY29tIiwiaWF0IjoxNjQ3OTU5MTMyfQ.-GKT4h58oZzS4LGk8b44Dh4GoJ9Y2extHUOr_LzbFIibO_XXfanPZ8ePZkXd8s7cuQyFKagePUVCdu1T2UKbTQ] +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.009 s - in org.jose4j.keys.resolvers.EmbeddedJwkVerificationKeyResolverTest +[INFO] Running org.jose4j.keys.resolvers.HttpsJwksVerificationKeyResolverTest +08:36:44.488 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +08:36:44.490 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} due to an unexpected exception (java.io.IOException: https://www.example.org/says 'no GET for you!') while obtaining or using keys from JWKS endpoint at https://www.example.org/ +08:36:44.497 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +08:36:44.498 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +08:36:44.498 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jan 13 09:36:44 GMT 2025 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] +08:36:44.527 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] +08:36:44.528 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +08:36:44.529 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +08:36:44.529 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jan 13 09:36:44 GMT 2025 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] +08:36:44.544 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] +08:36:44.544 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +08:36:44.545 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +08:36:44.545 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jan 13 09:36:44 GMT 2025 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] +08:36:44.552 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] obtained from https://www.example.org/ +08:36:44.552 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES384"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] +08:36:44.553 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +08:36:44.554 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +08:36:44.554 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jan 13 09:36:44 GMT 2025 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] +08:36:44.554 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] obtained from https://www.example.org/ +08:36:44.556 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +08:36:44.561 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +08:36:44.561 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jan 13 09:36:44 GMT 2025 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k1, x=1u9oeAkLQJcAnrv_m4fupf-lF43yFqmNjMsrukKDhEE, y=RG0cyWzinUl8NpfVVw2DqfH6zRqU_yF6aL1swssNv4E, crv=P-256}] +08:36:44.561 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256","kid":"k2"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k1, x=1u9oeAkLQJcAnrv_m4fupf-lF43yFqmNjMsrukKDhEE, y=RG0cyWzinUl8NpfVVw2DqfH6zRqU_yF6aL1swssNv4E, crv=P-256}] +08:36:44.561 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +08:36:44.561 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +08:36:44.561 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jan 13 09:36:44 GMT 2025 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] +08:36:44.562 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] +08:36:44.562 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +08:36:44.562 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +08:36:44.562 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jan 13 09:36:44 GMT 2025 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] +08:36:44.562 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] obtained from https://www.example.org/ +08:36:44.563 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://abc.bfe.xyz/ +08:36:44.563 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://abc.bfe.xyz/ +08:36:44.563 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://abc.bfe.xyz/ will be cached for 3600 seconds until about Mon Jan 13 09:36:44 GMT 2025 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] +08:36:44.569 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - We expected an exception out of the CustomHttpsJwksVerificationKeyResolver: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: There are multiple keys in the referenced JWK Set document, but the kid value was not provided in the JOSE Header.) while obtaining or using keys from JWKS endpoint at https://abc.bfe.xyz/ +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.773 s - in org.jose4j.keys.resolvers.HttpsJwksVerificationKeyResolverTest +[INFO] Running org.jose4j.keys.BigEndianBigIntegerTest +[INFO] Tests run: 19, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.233 s - in org.jose4j.keys.BigEndianBigIntegerTest [INFO] Running org.jose4j.keys.KeyPairUtilTest -14:56:02.660 DEBUG org.jose4j.keys.KeyPairUtilTest - The following JWT and public key should be (and were on 11/11/15) usable and produce a valid result at jwt.io (related to http://stackoverflow.com/questions/32744172): -eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJtZWgiLCJleHAiOjE3NzExNjg1NjIsImp0aSI6IkJwLTR1dnZJTkdIWUFpN1ZqYTFHQXciLCJhdWQiOiJ5b3UiLCJpc3MiOiJtZSJ9.K-5z3Ekhdm8gTj_tSnCHAk-wBtEuZQfZoISeDFCZMWPJsdcSKP-Hy8t9UvnYymHIU3DHyJxufQWxiVhFmVp7N6ntYwwC9y3M0-d04B1YVH6UKjXTbPACC1YHXRwXdLmRrtgbF5vTcKjKUNIxwMjm7GRMEHkJ7ByIG4pa8pk8QOiMmSxLwKZ_QHLeo1rt1zsHpFzavb4LfmylSyin7sTGt6eSqb4SpEf6LYWW2IWFd-nn3RgtsJji3I7VTk0F6-26ADHV-QkMRvfvI7oVIqBmJwZdROZcSWofdqbTU9iibpFKYR_7UNi0XQhn12T7Y6mnuVcPsf-qUtPi62mqQBzGCA +08:36:44.819 DEBUG org.jose4j.keys.KeyPairUtilTest - The following JWT and public key should be (and were on 11/11/15) usable and produce a valid result at jwt.io (related to http://stackoverflow.com/questions/32744172): +eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJtZWgiLCJleHAiOjE3MzY3NTg2MDQsImp0aSI6IkVKRk43VkRGRHZaaGI0eTk1TElpTmciLCJhdWQiOiJ5b3UiLCJpc3MiOiJtZSJ9.E5_8FUCCleXAsN0iMJsLbdFafdID78DSIBW_RjZLEgr81I-gbFZwIV4Xfte0bHVS4zSKgw77KXJ3fEvEe-wUAJB-3-Kw6lYAjz2nmvux7kbEM1p3VJtaYQ6SQijyE6Uxid5jyGwZwyxobozHLoQo_ZzMRtQFyOk8aABxI4TaMhKNddBWAQC_0vrp4NUmbxIyQUqQFyItomQ2oWQ0xeDySvv6eAletHE-abMxjGL82uwEbSkDqqTwDRHYMnyMJrTGJxoMXG_Ofvu8R92vvTgKPopjgmoxE50hgl_Dd87XuOeipKiORTLr5deXBMWWQPNBdgMkAIUiBSHPfWbamZIcmA -----BEGIN PUBLIC KEY----- MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAoahUIoWw0K0usKNuOR6H 4wkf4oBUXHTxRvgb48E+BVvxkeDNjbC4he8rUWcJoZmds2h7M70imEVhRU5djINX @@ -4331,206 +2893,1680 @@ FGzKsNa7LZK2djYgyD3JR/MB/4NUJW/TqOQtwHYbxevoJArm+L5StowjzGy+/bq6 GwIDAQAB -----END PUBLIC KEY----- -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s - in org.jose4j.keys.KeyPairUtilTest -[INFO] Running org.jose4j.keys.resolvers.HttpsJwksVerificationKeyResolverTest -14:56:03.119 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -14:56:03.121 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} due to an unexpected exception (java.io.IOException: https://www.example.org/says 'no GET for you!') while obtaining or using keys from JWKS endpoint at https://www.example.org/ -14:56:03.125 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -14:56:03.126 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -14:56:03.126 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Sun Feb 15 15:56:03 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] -14:56:03.132 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] -14:56:03.132 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -14:56:03.133 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -14:56:03.133 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Sun Feb 15 15:56:03 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] -14:56:03.139 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] -14:56:03.140 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -14:56:03.140 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -14:56:03.140 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Sun Feb 15 15:56:03 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] -14:56:03.143 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] obtained from https://www.example.org/ -14:56:03.144 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES384"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] -14:56:03.144 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -14:56:03.144 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -14:56:03.144 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Sun Feb 15 15:56:03 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] -14:56:03.144 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] obtained from https://www.example.org/ -14:56:03.145 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -14:56:03.145 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -14:56:03.145 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Sun Feb 15 15:56:03 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k1, x=1u9oeAkLQJcAnrv_m4fupf-lF43yFqmNjMsrukKDhEE, y=RG0cyWzinUl8NpfVVw2DqfH6zRqU_yF6aL1swssNv4E, crv=P-256}] -14:56:03.146 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256","kid":"k2"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k1, x=1u9oeAkLQJcAnrv_m4fupf-lF43yFqmNjMsrukKDhEE, y=RG0cyWzinUl8NpfVVw2DqfH6zRqU_yF6aL1swssNv4E, crv=P-256}] -14:56:03.146 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -14:56:03.146 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -14:56:03.146 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Sun Feb 15 15:56:03 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] -14:56:03.146 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] -14:56:03.146 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -14:56:03.146 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -14:56:03.146 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Sun Feb 15 15:56:03 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] -14:56:03.146 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] obtained from https://www.example.org/ -14:56:03.147 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://abc.bfe.xyz/ -14:56:03.147 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://abc.bfe.xyz/ -14:56:03.147 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://abc.bfe.xyz/ will be cached for 3600 seconds until about Sun Feb 15 15:56:03 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] -14:56:03.150 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - We expected an exception out of the CustomHttpsJwksVerificationKeyResolver: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: There are multiple keys in the referenced JWK Set document, but the kid value was not provided in the JOSE Header.) while obtaining or using keys from JWKS endpoint at https://abc.bfe.xyz/ -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.488 s - in org.jose4j.keys.resolvers.HttpsJwksVerificationKeyResolverTest -[INFO] Running org.jose4j.keys.resolvers.EmbeddedJwkVerificationKeyResolverTest -14:56:03.154 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: No jwk in JWS header): JsonWebSignature{"typ":"dpop+jwt","alg":"ES256"}->eyJ0eXAiOiJkcG9wK2p3dCIsImFsZyI6IkVTMjU2In0.eyJqdGkiOiItQndDM3lFU2MwNGFjYzc3bFRjMjZ4IiwiaHRtIjoiUE9TVCIsImh0dSI6Imh0dHBzOi8vc2VydmVyLmV4YW1wbGUuY29tL3Rva2VuIiwiaWF0IjoxNTYyMjYyNjE2fQ.DlWrKDQE15d6lN14J525P877gT_pmYYKFwpFmUvs3uQ96wTHV-4ZdnozfXVmlHmpgF5DA_3Ld8x5iyS7MrOjhw] -14:56:03.154 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Problem processing jwk from JWS header (jwk header contains a private key, which it most definitely should not.)): JsonWebSignature{"alg":"ES256","typ":"dpop+jwt","jwk":{"kty":"EC","x":"76nY8PkSVA80iOPq3UEGnocuOGhQjGOkcPpbyWpsWmg","y":"00LZB2IcOxErkNZwcQX_dmudk-atORMKjDBTsUeMvoU","crv":"P-256","d":"IIbXpUbIHemOAreeQ_LM2akq7y66DcYluvgydOritJU"}}->eyJhbGciOiJFUzI1NiIsInR5cCI6ImRwb3Arand0IiwiandrIjp7Imt0eSI6IkVDIiwieCI6Ijc2blk4UGtTVkE4MGlPUHEzVUVHbm9jdU9HaFFqR09rY1BwYnlXcHNXbWciLCJ5IjoiMDBMWkIySWNPeEVya05ad2NRWF9kbXVkay1hdE9STUtqREJUc1VlTXZvVSIsImNydiI6IlAtMjU2IiwiZCI6IklJYlhwVWJJSGVtT0FyZWVRX0xNMmFrcTd5NjZEY1lsdXZneWRPcml0SlUifX0.eyJqdGkiOiJiYzc4OSIsImh0bSI6IkdFVCIsImh0dSI6Imh0dHBzOi8vYXBpLmV4YW1wbGUuY29tIiwiaWF0IjoxNjQ3OTU5MTMyfQ.-GKT4h58oZzS4LGk8b44Dh4GoJ9Y2extHUOr_LzbFIibO_XXfanPZ8ePZkXd8s7cuQyFKagePUVCdu1T2UKbTQ] -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s - in org.jose4j.keys.resolvers.EmbeddedJwkVerificationKeyResolverTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.keys.KeyPairUtilTest [INFO] Running org.jose4j.keys.X509UtilTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s - in org.jose4j.keys.X509UtilTest -[INFO] Running org.jose4j.keys.BigEndianBigIntegerTest -[INFO] Tests run: 19, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.102 s - in org.jose4j.keys.BigEndianBigIntegerTest -[INFO] Running org.jose4j.keys.EllipticCurvesTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s - in org.jose4j.keys.EllipticCurvesTest -[INFO] Running org.jose4j.jwk.OctJwkGeneratorTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.OctJwkGeneratorTest -[INFO] Running org.jose4j.jwk.JsonWebKeyTest -[INFO] Tests run: 13, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.jwk.JsonWebKeyTest -[INFO] Running org.jose4j.jwk.EllipticCurveJsonWebKeyTest -org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=AekpBQ8ST8a8VcfVOTNl353vSrDCLLJXmPk06wTjxrrjcBpXp5EOnYG_NjFZ6OvLFV1jSfS9tsz4qUxcWceqwQGk, y=ADSmRA43Z1DSNx_RvcLI87cdL07l6jQyyBXMoxVg_l2Th-x3S1WDhjDly79ajL4Kkd0AZMaZmh9ubmf63e3kyMj2, crv=P-521} -[INFO] Tests run: 7, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.EllipticCurveJsonWebKeyTest -[INFO] Running org.jose4j.jwk.DecryptionJwkSelectorTest -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s - in org.jose4j.jwk.DecryptionJwkSelectorTest -[INFO] Running org.jose4j.jwk.JwkGlitchesInDeploymentTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.JwkGlitchesInDeploymentTest -[INFO] Running org.jose4j.jwk.ExtraJwkParametersTest -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.ExtraJwkParametersTest -[INFO] Running org.jose4j.jwk.VerificationJwkSelectorTest -14:56:03.298 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:56:03.298 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:56:03.298 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:56:03.298 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:56:03.298 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:56:03.298 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:56:03.298 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:56:03.298 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:56:03.298 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:56:03.298 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:56:03.300 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -14:56:03.300 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:56:03.300 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:56:03.300 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:56:03.302 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:56:03.303 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:56:03.305 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:56:03.305 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -14:56:03.305 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:56:03.305 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:56:03.306 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:56:03.306 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:56:03.306 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:56:03.306 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:56:03.306 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:56:03.309 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:56:03.313 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:56:03.317 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:56:03.320 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:56:03.320 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:56:03.320 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:56:03.320 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:56:03.321 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:56:03.321 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:56:03.322 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:56:03.322 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:56:03.322 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:56:03.322 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:56:03.322 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:56:03.322 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:56:03.322 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:56:03.322 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:56:03.322 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:56:03.322 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:56:03.322 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@2a32fb6 registered for zip algorithm DEF -14:56:03.322 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:56:03.322 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 24ms -14:56:03.324 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:56:03.324 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:56:03.324 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:56:03.324 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:56:03.324 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:56:03.324 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:56:03.324 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:56:03.324 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:56:03.324 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:56:03.324 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:56:03.325 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@40005471 -14:56:03.325 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:56:03.325 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:56:03.325 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:56:03.325 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:56:03.325 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:56:03.325 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:56:03.325 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:56:03.325 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:56:03.326 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:56:03.326 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:56:03.326 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:56:03.326 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:56:03.326 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:56:03.326 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:56:03.326 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:56:03.327 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:56:03.328 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:56:03.328 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:56:03.329 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:56:03.329 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:56:03.329 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:56:03.329 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:56:03.329 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:56:03.330 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:56:03.330 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:56:03.330 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:56:03.330 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:56:03.330 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:56:03.330 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:56:03.330 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:56:03.330 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:56:03.330 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:56:03.330 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:56:03.330 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:56:03.330 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@6009bea registered for zip algorithm DEF -14:56:03.330 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:56:03.330 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 6ms -14:56:03.330 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Missing required 'kty' parameter.). JWK params: {alg=RSA, mod=4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w, exp=AQAB, user=sig} and the full JWKS content: {"keys":[{"alg":"RSA","mod":"4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w","exp":"AQAB","user":"sig"}]}. -14:56:03.345 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying RS512 signature: java.security.SignatureException: Bad signature length: got 512 but was expecting 256 -14:56:03.346 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying RS512 signature: java.security.SignatureException: Bad signature length: got 256 but was expecting 512 -[INFO] Tests run: 23, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.064 s - in org.jose4j.jwk.VerificationJwkSelectorTest -[INFO] Running org.jose4j.jwk.OctetSequenceJsonWebKeyTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.OctetSequenceJsonWebKeyTest -[INFO] Running org.jose4j.jwk.RsaJsonWebKeyTest -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.RsaJsonWebKeyTest -[INFO] Running org.jose4j.jwk.Rfc7638JwkThumbprintUriTest -[INFO] Tests run: 11, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.01 s - in org.jose4j.jwk.Rfc7638JwkThumbprintUriTest -[INFO] Running org.jose4j.jwk.HttpsJwksTest -[WARNING] Tests run: 3, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0 s - in org.jose4j.jwk.HttpsJwksTest -[INFO] Running org.jose4j.jwk.RsaJwkGeneratorTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.053 s - in org.jose4j.jwk.RsaJwkGeneratorTest -[INFO] Running org.jose4j.jwk.X5cTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.X5cTest -[INFO] Running org.jose4j.jwk.Rfc7638JwkThumbprintTest -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.Rfc7638JwkThumbprintTest -[INFO] Running org.jose4j.jwk.JsonWebKeySetAnotherTest -14:56:03.429 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Missing required 'y' parameter.). JWK params: {kty=EC, kid=this one shouldn't work 'cause there's no y, x=msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY, crv=P-256} and the full JWKS content: { "keys": [ { "kty": "EC", "kid": "96", "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg", "y": "y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4", "crv": "P-256" }, { "kty": "EC", "kid": "a9", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ", "crv": "P-256" }, { "kty": "EC", "kid": "this one shouldn't work 'cause there's no y", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "crv": "P-256" }, { "kty": "EC", "kid": "2d", "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw", "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4", "crv": "P-256" } ]}. -14:56:03.429 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Unknown key type algorithm: 'UNKNOWN'). JWK params: {kty=UNKNOWN, crv=whatever, x=11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo} and the full JWKS content: { "keys": [ { "kty": "EC", "kid": "96", "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg", "y": "y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4", "crv": "P-256" }, { "kty": "EC", "kid": "a9", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ", "crv": "P-256" }, { "kty":"UNKNOWN", "crv":"whatever", "x":"11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo" } { "kty": "EC", "kid": "2d", "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw", "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4", "crv": "P-256" } ]}. -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.JsonWebKeySetAnotherTest -[INFO] Running org.jose4j.jwk.JsonWebKeySetTest -14:56:03.432 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.InvalidKeyException: "NOPERS" is an unknown or unsupported value for the "crv" parameter.). JWK params: {kty=EC, crv=NOPERS, kid=iRTU, x=tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY, y=2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -14:56:03.432 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Boolean type but is required to be a String.). JWK params: {kty=false, x=GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY, y=Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -14:56:03.432 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'x' parameter was Array type but is required to be a String.). JWK params: {kty=EC, x=[IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, huh], y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -14:56:03.432 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Number type but is required to be a String.). JWK params: {kty=1, x=IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -14:56:03.432 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Number type but is required to be a String.). JWK params: {kty=885584955514411149933357445595595145885566661, x=IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -14:56:03.432 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Object type but is required to be a String.). JWK params: {kty={EC=EC}, x=riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM, y=izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -14:56:03.432 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Missing required 'kty' parameter.). JWK params: {kty=null, x=riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM, y=izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -[INFO] Tests run: 10, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.jwk.JsonWebKeySetTest -[INFO] Running org.jose4j.jwk.EcJwkGeneratorTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.jwk.EcJwkGeneratorTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.keys.X509UtilTest +[INFO] Running org.jose4j.jws.EcdsaUsingShaTest +08:36:44.859 DEBUG org.jose4j.jws.JwsTestSupport - ES384 eyJhbGciOiJFUzM4NCJ9.VGhlIHVtbGF1dCAoL8uIyoptbGHKinQvIFVVTS1sb3d0KSByZWZlcnMgdG8gYSBzb3VuZCBzaGlmdC4.qdW0Y6mfTCtJZyDSMlAj9cCtJLEinO3aYpk6Kei6pr2qtm_5Aa4Dgp5KvgXTQ2_jw8eByampnHecvH7ZnCrrTzvkkpIuAP64yLFIXzlZgNym6mvj8oQZ-r0lmTcvsfFn +08:36:44.935 DEBUG org.jose4j.jws.JwsTestSupport - ES512 eyJhbGciOiJFUzUxMiJ9.Pz8_Pz8.AS3ntKPeQXhwMgb4w9jUaP-pFKRHzyRHWvVjfJknMBDZAReXg4JTsD67hjyFbr5jAWO2jpqExTB_o-XYOIBDZCfyAeCFT6z3XEdRRZlUbuX1osyNRNxc0wUCcki3D2H_bP4bCIMan6CzIOunP8hMXtp9_USRQ8p3IlppX-oQk3MQCTpo +08:36:45.010 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +08:36:45.010 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +08:36:45.010 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +08:36:45.011 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA256withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl +08:36:45.011 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +08:36:45.011 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +08:36:45.011 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +08:36:45.012 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +08:36:45.012 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +08:36:45.012 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA384withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl +08:36:45.012 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +08:36:45.012 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +08:36:45.013 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +08:36:45.013 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +08:36:45.013 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +08:36:45.013 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA512withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl +08:36:45.013 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +08:36:45.013 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +08:36:45.013 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES256/SHA256withECDSA expects a key using P-256 but was P-521 +08:36:45.013 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES384/SHA384withECDSA expects a key using P-384 but was P-521 +08:36:45.014 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES384/SHA384withECDSA expects a key using P-384 but was P-256 +08:36:45.014 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES512/SHA512withECDSA expects a key using P-521 but was P-256 +08:36:45.030 DEBUG org.jose4j.jws.JwsTestSupport - ES512 eyJhbGciOiJFUzUxMiJ9.dG91Y2jDnw.ATghwv_gc4ajl2xiVU3ro0RfCPwRsVt8LI7tT3PMzXKIWdx179pSEndjr1mPdxpwieyMnuhRAo5Iu0IBPtIaey4GAOxReYiDs3LFeLyJU47iQW7VIB9R_WLhvHNHoOJy0Q6rKTzIPcx8Pb435RxnUJsL4g3E0mhWsmo6LXvIyHt9gohg +08:36:45.103 DEBUG org.jose4j.jws.JwsTestSupport - ES256 eyJhbGciOiJFUzI1NiJ9.UEFZTE9BRCEhIQ.mQxu04BuAGQKGn_eC-g-cSWcyN5bqJ4ysynxeHCj4GziJPTgFWkXGtd7vZoSuJN8ntn7cQ0IH1lFQTcVhcxNWQ +08:36:45.130 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:45.130 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:45.130 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:45.130 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:45.130 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:45.130 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:45.130 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:45.131 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:45.131 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:45.131 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:45.142 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +08:36:45.142 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:45.142 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:45.142 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:45.145 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:45.147 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:45.149 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:45.150 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:45.150 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:45.150 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:45.154 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:45.154 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:45.154 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:45.154 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:45.154 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:45.161 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:45.168 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:45.173 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:45.180 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:45.180 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:45.180 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:45.180 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:45.182 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:45.182 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:45.183 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:45.183 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:45.183 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:45.183 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:45.183 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:45.184 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:45.184 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:45.185 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:45.185 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:45.185 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:45.185 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@4dbad37 registered for zip algorithm DEF +08:36:45.185 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:45.185 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 55ms +08:36:45.219 DEBUG org.jose4j.jws.JwsTestSupport - ES256K eyJhbGciOiJFUzI1NksifQ.aw.hzVafWFJ0s3Wy1U48gnf6h7RvHKPr70liE89NAGzdtHOSO_T3CFv3HFHSYhCEIdDkvDIrkb_Jp1Dct4r4rmCbA +08:36:45.229 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:45.229 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:45.229 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:45.229 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:45.229 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:45.229 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:45.229 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:45.229 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:45.229 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:45.229 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:45.229 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@78e4deb0 +08:36:45.229 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +08:36:45.229 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:45.230 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:45.230 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:45.230 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:45.230 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:45.231 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:45.231 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:45.231 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:45.231 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:45.232 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:45.232 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:45.232 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:45.232 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:45.232 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:45.234 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:45.236 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:45.237 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:45.238 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:45.238 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:45.238 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:45.238 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:45.239 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:45.240 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:45.240 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:45.240 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:45.240 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:45.240 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:45.240 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:45.240 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:45.240 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:45.241 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:45.241 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:45.241 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:45.241 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@5e5073ab registered for zip algorithm DEF +08:36:45.241 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:45.241 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 12ms +08:36:45.243 DEBUG org.jose4j.jws.JwsTestSupport - ES256 eyJhbGciOiJFUzI1NiJ9.c29tZXRoaW5nIGhlcmU.kKCRWC7BCvIto_Oe-vvF6WeGeyVMfc_y8FkoSplIenK4yBNv-h3NamlJrKdcUXgp9aS-6hMxNNVK-qPOR376Kg +08:36:45.273 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:45.273 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:45.273 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:45.274 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:45.274 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:45.274 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:45.274 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:45.274 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:45.274 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:45.274 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:45.280 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +08:36:45.280 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:45.280 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:45.281 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:45.283 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:45.287 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:45.289 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:45.289 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:45.289 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:45.290 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:45.291 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:45.291 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:45.291 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:45.291 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:45.292 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:45.298 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:45.304 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:45.311 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:45.317 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:45.318 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:45.318 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:45.318 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:45.319 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:45.319 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:45.320 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:45.320 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:45.320 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:45.320 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:45.320 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:45.321 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:45.322 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:45.323 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:45.323 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:45.323 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:45.323 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@30c0d731 registered for zip algorithm DEF +08:36:45.323 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:45.323 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 50ms +08:36:45.325 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:45.326 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:45.326 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:45.326 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:45.326 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:45.326 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:45.326 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:45.326 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:45.326 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:45.326 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:45.328 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@78e4deb0 +08:36:45.328 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +08:36:45.328 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:45.328 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:45.328 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:45.329 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:45.329 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:45.330 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:45.330 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:45.330 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:45.330 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:45.330 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:45.331 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:45.331 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:45.331 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:45.331 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:45.332 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:45.333 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:45.334 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:45.337 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:45.337 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:45.337 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:45.337 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:45.338 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:45.338 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:45.338 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:45.338 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:45.338 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:45.338 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:45.338 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:45.338 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:45.339 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:45.339 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:45.339 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:45.339 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:45.339 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@6d5037a9 registered for zip algorithm DEF +08:36:45.339 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:45.339 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 13ms +[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.207 s - in org.jose4j.jws.EcdsaUsingShaTest +[INFO] Running org.jose4j.jws.JwsUnencodedPayloadOptionTest +08:36:45.361 DEBUG o.j.j.JwsUnencodedPayloadOptionTest - Expected exception because JWS Compact Serialization with unencoded non-detached payloads cannot have period ('.') characters : org.jose4j.lang.JoseException: per https://tools.ietf.org/html/rfc7797#section-5.2 when using the JWS Compact Serialization, unencoded non-detached payloads using period ('.') characters would cause parsing errors; such payloads MUST NOT be used with the JWS Compact Serialization. +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.014 s - in org.jose4j.jws.JwsUnencodedPayloadOptionTest +[INFO] Running org.jose4j.jws.DetachedContentTest +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.021 s - in org.jose4j.jws.DetachedContentTest +[INFO] Running org.jose4j.jws.HmacShaTest +08:36:45.396 DEBUG org.jose4j.jws.JwsTestSupport - HS256 eyJhbGciOiJIUzI1NiJ9.c29tZSBjb250ZW50IHRoYXQgaXMgdGhlIHBheWxvYWQ.qGO7O7W2ECVl6uO7lfsXDgEF-EUEti0i-a_AimulIRA +08:36:45.397 DEBUG org.jose4j.jws.JwsTestSupport - HS256 eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJodHRwczovL2p3dC1pZHAuZXhhbXBsZS5jb20iLAogICAgInBybiI6Im1haWx0bzptaWtlQGV4YW1wbGUuY29tIiwKICAgICJhdWQiOiJodHRwczovL2p3dC1ycC5leGFtcGxlLm5ldCIsCiAgICAiaWF0IjoxMzAwODE1NzgwLAogICAgImV4cCI6MTMwMDgxOTM4MCwKICAgICJodHRwOi8vY2xhaW1zLmV4YW1wbGUuY29tL21lbWJlciI6dHJ1ZX0.ZhkLsRIwT5xHXNgOpdFJ_7q5kqLd6sMiOOEV6kxTNCo +08:36:45.397 DEBUG org.jose4j.jws.JwsTestSupport - HS384 eyJhbGciOiJIUzM4NCJ9.eyJtZWgiOiJtZWgifQ.fptKQJmGN3fBP_FiQzdAGdmx-Q5iWjQvJrLfdmFnebxbQuzOmzejBrzYh4MyS01a +08:36:45.398 DEBUG org.jose4j.jws.JwsTestSupport - HS384 eyJhbGciOiJIUzM4NCJ9.TG9va2luZyBnb29kLCBCaWxseSBSYXkh.wtlqZW8_eLF3hjMZT9c_kzg133b2b_JsR44bHGshc4w_BEUJApKerwEw9cltL8w9 +08:36:45.399 DEBUG org.jose4j.jws.JwsTestSupport - HS512 eyJhbGciOiJIUzUxMiJ9.RmVlbGluZyBnb29kLCBMb3VpcyE.i4SAIaVYY4gxhqJxMvw3FKsar5RBCxzadaK2YT3HeeguWgJMLpDMu9cK1WxetjYmce49ZQmTxmB5nTbE_IgKHQ +08:36:45.401 DEBUG org.jose4j.jws.JwsTestSupport - HS512 eyJhbGciOiJIUzUxMiJ9.eyJtZWgiOiJtZWh2YWx1ZSJ9.NeB669dYkPmqgLqgd_sVqwIfCvb4XN-K67gpMJR93wfw_DylpxB1ell2opHM-E5P9jNKE2GYxTxwcI68Z2CTxw +08:36:45.405 DEBUG org.jose4j.jws.HmacShaTest - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 72 bits +08:36:45.406 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 384 bits for HS384) or larger MUST be used with the HMAC SHA algorithms but this key is only 376 bits +08:36:45.406 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 384 bits for HS384) or larger MUST be used with the HMAC SHA algorithms but this key is only 376 bits +08:36:45.406 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 512 bits for HS512) or larger MUST be used with the HMAC SHA algorithms but this key is only 504 bits +08:36:45.406 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 512 bits for HS512) or larger MUST be used with the HMAC SHA algorithms but this key is only 504 bits +08:36:45.406 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 8 bits +08:36:45.407 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 248 bits +08:36:45.407 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 248 bits +[INFO] Tests run: 16, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.017 s - in org.jose4j.jws.HmacShaTest +[INFO] Running org.jose4j.jws.CritHeaderTest +08:36:45.410 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'nope' marked as critical. +08:36:45.414 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: crit header value not an array (class java.lang.String). +08:36:45.414 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: crit header value not an array (class java.lang.Boolean). +08:36:45.414 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'http://example.com/UNDEFINED' marked as critical. +08:36:45.415 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'urn:example.com:nope' marked as critical. +08:36:45.417 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'urn:example.com:nope' marked as critical. +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.01 s - in org.jose4j.jws.CritHeaderTest +[INFO] Running org.jose4j.jws.RsaPssTest +08:36:45.422 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS +08:36:45.431 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS +08:36:45.441 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS +08:36:45.485 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS +08:36:45.494 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS +08:36:45.504 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS +08:36:45.527 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:45.527 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:45.527 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:45.527 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:45.527 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:45.528 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:45.528 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:45.528 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:45.528 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:45.528 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:45.530 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +08:36:45.530 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:45.531 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:45.531 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:45.533 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:45.535 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:45.538 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:45.538 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:45.538 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:45.538 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:45.540 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:45.540 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:45.540 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:45.540 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:45.540 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:45.546 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:45.552 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:45.558 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:45.563 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:45.564 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:45.564 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:45.564 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:45.565 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:45.565 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:45.566 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:45.566 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:45.566 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:45.566 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:45.566 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:45.567 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:45.567 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:45.568 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:45.568 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:45.568 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:45.568 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@3bbf9027 registered for zip algorithm DEF +08:36:45.568 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:45.568 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 41ms +08:36:45.580 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS +08:36:45.590 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@6bf13698):Signature object: SHA256withRSAandMGF1 +08:36:45.600 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS +08:36:45.609 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@bdd2027):Signature object: SHA384withRSAandMGF1 +08:36:45.618 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS +08:36:45.628 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@504e1599):Signature object: SHA512withRSAandMGF1 +08:36:45.637 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:45.637 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:45.637 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:45.637 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:45.637 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:45.637 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:45.637 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:45.637 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:45.637 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:45.637 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:45.638 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@78e4deb0 +08:36:45.638 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +08:36:45.638 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:45.638 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:45.638 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:45.638 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:45.639 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:45.641 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:45.641 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:45.641 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:45.641 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:45.642 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:45.642 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:45.642 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:45.642 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:45.642 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:45.643 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:45.644 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:45.645 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:45.646 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:45.646 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:45.646 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:45.647 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:45.647 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:45.647 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:45.647 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:45.647 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:45.647 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:45.647 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:45.647 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:45.648 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:45.648 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:45.648 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:45.648 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:45.648 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:45.648 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@71f96dfb registered for zip algorithm DEF +08:36:45.648 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:45.648 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 11ms +08:36:45.664 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:45.664 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:45.664 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:45.664 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:45.664 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:45.664 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:45.664 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:45.664 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:45.664 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:45.664 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:45.667 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +08:36:45.667 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:45.667 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:45.667 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:45.670 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|SHA256withRSAandMGF1) registered for alg algorithm PS256 +08:36:45.673 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|SHA384withRSAandMGF1) registered for alg algorithm PS384 +08:36:45.675 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|SHA512withRSAandMGF1) registered for alg algorithm PS512 +08:36:45.675 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:45.675 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:45.675 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:45.676 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:45.676 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:45.677 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:45.677 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:45.677 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:45.683 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:45.689 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:45.694 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:45.700 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:45.700 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:45.700 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:45.700 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:45.701 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:45.702 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:45.703 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:45.703 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:45.703 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:45.703 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:45.703 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:45.703 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:45.704 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:45.704 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:45.704 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:45.704 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:45.704 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@49a26d19 registered for zip algorithm DEF +08:36:45.704 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:45.705 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 41ms +08:36:45.705 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA256withRSAandMGF1 +08:36:45.714 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA384withRSAandMGF1 +08:36:45.724 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA512withRSAandMGF1 +08:36:45.733 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:45.733 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:45.733 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:45.734 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:45.734 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:45.734 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:45.734 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:45.734 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:45.734 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:45.734 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:45.734 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@78e4deb0 +08:36:45.734 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +08:36:45.734 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:45.734 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:45.734 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:45.735 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:45.735 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:45.736 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:45.736 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:45.736 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:45.736 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:45.736 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:45.737 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:45.737 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:45.737 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:45.737 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:45.738 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:45.739 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:45.740 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:45.741 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:45.741 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:45.741 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:45.741 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:45.742 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:45.742 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:45.742 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:45.742 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:45.742 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:45.742 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:45.742 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:45.742 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:45.742 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:45.743 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:45.743 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:45.743 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:45.743 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@730e5763 registered for zip algorithm DEF +08:36:45.743 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:45.743 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 10ms +08:36:45.983 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:45.984 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:45.984 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:45.984 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:45.984 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:45.984 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:45.984 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:45.984 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:45.984 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:45.984 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:45.986 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +08:36:45.986 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:45.987 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:45.987 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:45.989 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:45.992 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:45.993 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:45.993 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:45.994 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:45.994 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:45.995 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:45.995 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:45.995 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:45.995 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:45.995 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:46.001 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:46.007 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:46.012 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:46.017 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:46.017 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:46.017 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:46.018 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:46.018 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:46.019 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:46.019 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:46.019 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:46.019 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:46.019 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:46.020 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:46.020 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:46.021 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:46.021 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:46.021 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:46.021 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:46.021 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@42210be1 registered for zip algorithm DEF +08:36:46.021 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:46.021 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 37ms +08:36:46.030 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:46.031 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:46.031 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:46.031 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:46.031 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:46.031 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:46.031 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:46.031 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:46.031 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:46.031 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:46.031 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@78e4deb0 +08:36:46.031 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +08:36:46.031 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:46.032 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:46.032 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:46.032 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:46.032 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:46.034 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:46.034 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:46.035 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:46.035 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:46.035 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:46.035 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:46.035 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:46.035 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:46.035 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:46.037 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:46.038 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:46.039 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:46.040 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:46.040 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:46.040 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:46.040 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:46.040 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:46.040 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:46.040 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:46.041 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:46.041 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:46.041 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:46.041 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:46.041 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:46.041 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:46.041 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:46.041 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:46.041 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:46.041 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@1eb2d371 registered for zip algorithm DEF +08:36:46.041 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:46.041 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 10ms +08:36:46.056 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:46.056 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:46.056 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:46.056 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:46.056 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:46.056 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:46.056 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:46.056 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:46.056 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:46.056 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:46.058 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +08:36:46.058 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:46.058 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:46.059 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:46.061 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|SHA256withRSAandMGF1) registered for alg algorithm PS256 +08:36:46.063 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|SHA384withRSAandMGF1) registered for alg algorithm PS384 +08:36:46.065 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|SHA512withRSAandMGF1) registered for alg algorithm PS512 +08:36:46.065 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:46.065 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:46.065 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:46.066 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:46.066 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:46.066 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:46.066 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:46.066 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:46.072 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:46.078 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:46.084 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:46.089 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:46.090 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:46.090 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:46.090 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:46.091 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:46.091 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:46.092 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:46.092 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:46.092 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:46.092 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:46.092 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:46.092 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:46.093 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:46.093 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:46.093 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:46.093 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:46.093 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@dab48d3 registered for zip algorithm DEF +08:36:46.093 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:46.093 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 37ms +08:36:46.102 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:46.102 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:46.102 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:46.102 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:46.102 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:46.102 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:46.102 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:46.102 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:46.102 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:46.102 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:46.103 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@78e4deb0 +08:36:46.103 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +08:36:46.103 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:46.103 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:46.103 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:46.103 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:46.105 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:46.105 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:46.105 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:46.105 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:46.105 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:46.106 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:46.106 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:46.106 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:46.106 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:46.106 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:46.107 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:46.108 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:46.109 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:46.110 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:46.110 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:46.110 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:46.110 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:46.110 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:46.111 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:46.111 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:46.111 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:46.111 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:46.112 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:46.112 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:46.112 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:46.112 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:46.112 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:46.113 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:46.113 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:46.113 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@58a2b4c registered for zip algorithm DEF +08:36:46.113 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:46.113 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 11ms +08:36:46.150 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:46.150 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:46.150 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:46.150 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:46.150 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:46.150 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:46.150 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:46.150 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:46.150 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:46.150 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:46.152 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +08:36:46.152 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:46.153 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:46.153 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:46.156 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:46.157 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:46.159 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:46.159 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:46.159 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:46.159 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:46.161 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:46.162 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:46.162 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:46.162 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:46.162 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:46.167 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:46.173 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:46.180 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:46.185 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:46.186 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:46.186 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:46.186 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:46.187 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:46.187 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:46.188 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:46.188 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:46.188 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:46.188 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:46.188 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:46.188 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:46.189 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:46.189 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:46.189 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:46.189 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:46.189 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@4ca8dbfa registered for zip algorithm DEF +08:36:46.189 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:46.189 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 39ms +08:36:46.192 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:46.192 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:46.192 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:46.192 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:46.192 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:46.192 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:46.192 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:46.192 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:46.192 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:46.192 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:46.192 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@78e4deb0 +08:36:46.192 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +08:36:46.193 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:46.193 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:46.193 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:46.193 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:46.193 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:46.194 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:46.194 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:46.194 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:46.194 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:46.195 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:46.195 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:46.195 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:46.195 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:46.195 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:46.196 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:46.198 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:46.199 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:46.200 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:46.200 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:46.200 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:46.201 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:46.201 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:46.201 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:46.201 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:46.201 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:46.201 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:46.201 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:46.201 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:46.202 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:46.202 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:46.202 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:46.202 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:46.202 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:46.202 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@7063686f registered for zip algorithm DEF +08:36:46.202 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:46.202 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 10ms +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.776 s - in org.jose4j.jws.RsaPssTest +[INFO] Running org.jose4j.jws.JwsUsingEcdsaP256Sha256ExampleTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jws.JwsUsingEcdsaP256Sha256ExampleTest +[INFO] Running org.jose4j.jws.PublicKeyAsHmacKeyTest +08:36:46.222 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:46.222 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:46.222 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:46.222 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:46.222 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:46.222 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:46.222 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:46.222 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:46.222 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:46.222 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:46.224 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +08:36:46.224 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:46.225 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:46.225 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:46.227 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:46.229 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:46.232 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:46.232 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:46.232 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:46.232 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:46.233 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:46.233 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:46.233 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:46.233 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:46.233 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:46.240 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:46.246 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:46.252 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:46.258 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:46.258 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:46.258 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:46.258 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:46.259 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:46.259 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:46.261 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:46.261 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:46.261 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:46.261 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:46.261 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:46.262 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:46.262 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:46.263 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:46.263 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:46.263 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:46.263 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@174e1b69 registered for zip algorithm DEF +08:36:46.263 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:46.263 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 41ms +08:36:46.264 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. +08:36:46.264 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:46.264 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:46.264 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:46.264 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:46.264 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:46.264 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:46.264 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:46.264 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:46.264 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:46.264 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:46.264 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@78e4deb0 +08:36:46.264 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +08:36:46.265 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:46.265 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:46.265 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:46.265 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:46.266 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:46.267 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:46.267 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:46.267 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:46.267 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:46.268 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:46.268 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:46.268 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:46.268 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:46.268 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:46.269 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:46.270 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:46.271 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:46.272 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:46.272 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:46.272 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:46.272 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:46.272 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:46.272 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:46.272 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:46.272 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:46.272 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:46.272 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:46.273 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:46.273 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:46.273 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:46.273 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:46.273 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:46.273 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:46.273 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@1046498a registered for zip algorithm DEF +08:36:46.273 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:46.273 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 9ms +08:36:46.381 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:46.381 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:46.381 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:46.381 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:46.381 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:46.381 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:46.381 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:46.381 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:46.381 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:46.381 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:46.383 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +08:36:46.383 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:46.383 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:46.383 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:46.387 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:46.389 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:46.391 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:46.391 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:46.391 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:46.391 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:46.392 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:46.392 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:46.392 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:46.392 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:46.392 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:46.398 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:46.404 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:46.410 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:46.415 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:46.415 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:46.415 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:46.415 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:46.417 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:46.417 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:46.418 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:46.418 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:46.418 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:46.418 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:46.418 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:46.418 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:46.419 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:46.419 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:46.419 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:46.419 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:46.419 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@3491e86e registered for zip algorithm DEF +08:36:46.419 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:46.419 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 38ms +08:36:46.420 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. +08:36:46.420 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:46.421 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:46.421 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:46.421 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:46.422 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:46.422 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:46.422 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:46.422 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:46.422 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:46.422 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:46.422 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@78e4deb0 +08:36:46.422 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +08:36:46.422 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:46.422 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:46.422 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:46.423 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:46.423 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:46.423 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:46.423 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:46.424 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:46.424 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:46.424 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:46.424 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:46.424 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:46.424 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:46.424 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:46.425 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:46.426 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:46.427 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:46.429 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:46.429 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:46.429 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:46.429 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:46.429 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:46.429 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:46.429 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:46.429 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:46.430 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:46.430 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:46.430 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:46.430 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:46.430 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:46.430 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:46.430 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:46.430 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:46.430 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@68f32020 registered for zip algorithm DEF +08:36:46.430 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:46.430 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 9ms +08:36:46.554 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:46.554 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:46.554 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:46.554 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:46.554 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:46.554 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:46.554 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:46.554 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:46.555 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:46.555 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:46.556 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +08:36:46.557 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:46.557 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:46.557 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:46.560 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:46.562 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:46.563 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:46.563 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:46.564 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:46.564 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:46.565 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:46.565 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:46.565 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:46.565 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:46.565 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:46.571 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:46.577 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:46.583 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:46.590 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:46.590 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:46.590 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:46.590 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:46.592 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:46.592 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:46.593 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:46.593 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:46.593 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:46.593 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:46.593 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:46.593 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:46.594 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:46.594 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:46.594 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:46.594 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:46.594 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@22590e3e registered for zip algorithm DEF +08:36:46.594 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:46.594 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 40ms +08:36:46.595 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. +08:36:46.595 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:46.595 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:46.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:46.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:46.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:46.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:46.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:46.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:46.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:46.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:46.595 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@78e4deb0 +08:36:46.596 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +08:36:46.596 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:46.596 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:46.596 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:46.596 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:46.596 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:46.597 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:46.597 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:46.597 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:46.597 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:46.597 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:46.597 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:46.597 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:46.597 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:46.597 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:46.598 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:46.600 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:46.602 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:46.603 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:46.603 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:46.603 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:46.603 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:46.604 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:46.604 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:46.604 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:46.604 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:46.604 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:46.604 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:46.604 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:46.604 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:46.604 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:46.604 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:46.604 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:46.605 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:46.605 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@53dad875 registered for zip algorithm DEF +08:36:46.605 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:46.605 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 10ms +08:36:46.620 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:46.620 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:46.620 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:46.621 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:46.621 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:46.621 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:46.621 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:46.621 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:46.635 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:46.636 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:46.638 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +08:36:46.638 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:46.638 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:46.638 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:46.641 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:46.642 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:46.645 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:46.645 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:46.646 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:46.646 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:46.647 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:46.647 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:46.647 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:46.647 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:46.647 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:46.653 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:46.659 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:46.665 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:46.671 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:46.672 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:46.672 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:46.672 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:46.672 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:46.673 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:46.673 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:46.673 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:46.673 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:46.673 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:46.673 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:46.674 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:46.674 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:46.674 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:46.674 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:46.674 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:46.674 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@2eaef76d registered for zip algorithm DEF +08:36:46.674 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:46.674 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 54ms +08:36:46.675 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. +08:36:46.675 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +08:36:46.675 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +08:36:46.675 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +08:36:46.675 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +08:36:46.675 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +08:36:46.675 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +08:36:46.675 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +08:36:46.675 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +08:36:46.675 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +08:36:46.675 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +08:36:46.675 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@78e4deb0 +08:36:46.676 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +08:36:46.676 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +08:36:46.676 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +08:36:46.676 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +08:36:46.676 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +08:36:46.676 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +08:36:46.677 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +08:36:46.677 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +08:36:46.677 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +08:36:46.677 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +08:36:46.677 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +08:36:46.677 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +08:36:46.677 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +08:36:46.677 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +08:36:46.677 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +08:36:46.678 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +08:36:46.680 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +08:36:46.681 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +08:36:46.682 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +08:36:46.682 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +08:36:46.682 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +08:36:46.682 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +08:36:46.682 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +08:36:46.682 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +08:36:46.683 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +08:36:46.683 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +08:36:46.683 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +08:36:46.683 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +08:36:46.683 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +08:36:46.683 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +08:36:46.683 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +08:36:46.683 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +08:36:46.683 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +08:36:46.683 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:46.683 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@2b329bbd registered for zip algorithm DEF +08:36:46.683 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +08:36:46.683 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 8ms +08:36:46.694 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. +08:36:46.694 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. +08:36:46.697 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. +08:36:46.697 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.463 s - in org.jose4j.jws.PublicKeyAsHmacKeyTest +[INFO] Running org.jose4j.jws.JwsCryptoPrimitiveTest +08:36:46.699 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getSignature(): Signature object: SHA256withECDSA +08:36:46.702 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getSignature(): Signature object: SHA256withRSA +08:36:46.712 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getMac(): javax.crypto.Mac@34819867 +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.012 s - in org.jose4j.jws.JwsCryptoPrimitiveTest +[INFO] Running org.jose4j.jws.MaintainEncodedPayloadAndHeaderTest +08:36:46.714 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", + "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9X.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] +08:36:46.716 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", + "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9===.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] +08:36:46.717 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", + "alg":"HS256"}->!!!!eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jws.MaintainEncodedPayloadAndHeaderTest +[INFO] Running org.jose4j.jws.EcdsaUsingShaEdgesTest +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.197 s - in org.jose4j.jws.EcdsaUsingShaEdgesTest +[INFO] Running org.jose4j.jws.GetPayloadTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jws.GetPayloadTest +[INFO] Running org.jose4j.jws.JwsPlaintextTest +08:36:46.922 DEBUG org.jose4j.jws.JwsPlaintextTest - {"auth_time":1339613248,"exp":1339613548,"iss":"https:\/\/example.com","aud":"a","jti":"jIA8qa35AroV6iP2q4wRAl","user_id":"john","iat":1339613248,"acr":3} +[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jws.JwsPlaintextTest +[INFO] Running org.jose4j.jws.EdDsaTest +08:36:46.945 DEBUG org.jose4j.jws.EdDsaAlgorithm - Problem verifying EdDSA signature: java.security.SignatureException: Invalid point +08:36:46.958 DEBUG org.jose4j.jws.JwsTestSupport - EdDSA eyJhbGciOiJFZERTQSJ9.TGl0dGxlIEVk.TU3neL8kn4-E1O6mcUAGWZJOOpHGVHPHgSyNMdI9MA7HMF1ujyGUblm4qLhMe9sysvY-VRSdNgiiB5V1CrVvAQ +08:36:47.008 DEBUG org.jose4j.jws.JwsTestSupport - EdDSA eyJhbGciOiJFZERTQSJ9.QmlnIEVk.zA8ynJ4pavvNkPeMNJ3zHhlyRpn6ZdOw8kq1eUngkANkP9LcO2gS4bodyFAbr3TmBycSPFyoV_AACvHe-MA2eXU7p1i7LLt29jd2JFTlv4H3rQFekIZwqqsvSCe816WdadyyCaP-G9Z1iSpyi_uTkj4A +08:36:47.089 DEBUG org.jose4j.jws.JwsTestSupport - EdDSA eyJhbGciOiJFZERTQSJ9.Q291c2luIEVkZGll.qiQjYT3OkFdf2TKRapOS6b-ToyTi49LtJaTVRgCttrkdz4W5PugaIDOBiVehARhj1IV6_Z-73ligH4vYAiqmCg +08:36:47.112 DEBUG org.jose4j.jws.EdDsaAlgorithm - Problem verifying EdDSA signature: java.security.SignatureException: signature length invalid +08:36:47.128 DEBUG org.jose4j.jws.EdDsaAlgorithm - Problem verifying EdDSA signature: java.security.SignatureException: signature length invalid +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.191 s - in org.jose4j.jws.EdDsaTest +[INFO] Running org.jose4j.jws.EcdsaUsingShaAlgorithmTest +[0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 2] +[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.029 s - in org.jose4j.jws.EcdsaUsingShaAlgorithmTest +[INFO] Running org.jose4j.jws.JwsUsingHmacSha256ExampleTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jws.JwsUsingHmacSha256ExampleTest +[INFO] Running org.jose4j.jws.JwsUsingEcdsaP521Sha512ExampleTest +Payload +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.029 s - in org.jose4j.jws.JwsUsingEcdsaP521Sha512ExampleTest +[INFO] Running org.jose4j.jws.ChangingKeyTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jws.ChangingKeyTest +[INFO] Running org.jose4j.jws.JwsUsingRsaSha256ExampleTest +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jws.JwsUsingRsaSha256ExampleTest +[INFO] Running org.jose4j.jws.JwsPayloadVariationsTest +08:36:47.255 DEBUG o.j.jws.JwsPayloadVariationsTest - Expected: org.jose4j.lang.IntegrityException: JWS signature is invalid. +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jws.JwsPayloadVariationsTest +[INFO] Running org.jose4j.jws.RsaUsingShaTest +08:36:47.447 DEBUG org.jose4j.jws.JwsTestSupport - RS256 eyJhbGciOiJSUzI1NiJ9.UEFZTE9BRCEhIQ.Gtdslxu3-pjDc-fo_gow_LPvSl8GyfRwztAclAVzGmDiHGxNupWmzcUl-d-A1ukunjX4YLYOd8XkmY3lQcWRAWsB-yuK0mE7DLn9u6hybpqsVh_-qVjks40qzEPpDnf29iLkmUOqbbVQFQvpO5EVjkQJBbNaziJHv4v2AXdPyIMAe8BGwcT44ghyt6gpUuK_QAowPcfo3Qz81npLXV3oIjUS8yaV5PzCpSByuzCm0GpIgu8gBOss8cL7nP49eY55XhlB0LN-_dao_O26OYTp5iogSygWMoJ714tNb868vIRAHGUVxrs5UOUbz_MO87Xbk54gLoh3Vw7DrrTZBbqeIg +08:36:47.463 DEBUG org.jose4j.jws.JwsTestSupport - RS384 eyJhbGciOiJSUzM4NCJ9.UEFZTE9BRCEh.Gk-cdK9smCo7OQRKUffyLc_lGmZlLeePmY7fGereDvVmNZ-ldcIxOUtxJXhf2o_cXzLKjcmT1sNrRErUd244beFEc1qXEEp3thQuz3epqpUbCKbiNhPMz3vPpuY04EKnup-_smMPtYbTRLkncr5aPbRnaU0q7InOPi_nNhk42WO28pwKFedoYV4W4I6oC5PCoLaLVqOYSEaJwH-jM7VmuMUgIdk-WeHE41nXnkk8CbG9X2QCwb7b467RrSl6rUPFtEkx6mSt0jYpnoE65orNbbSvUPoCYoUSganS3W27qZCPyvC-TSJyWhg15MNhdGFFQp-uYDyA0KCdTV9D_BU0eA +08:36:47.476 DEBUG org.jose4j.jws.JwsTestSupport - RS512 eyJhbGciOiJSUzUxMiJ9.UEFZTE9BRCE.HYaQF1dOm2wM4QyvlhCbzZ1RTCr1yFsFfZhhINVJifymZhhoAGrcJIMY0Q_HIds1j7GayvdB3AbzEFuCKEPIiFwdqPvyVTgVOX9Hf9wW0XSay6WItlSPfcPlQ14DMu1w60mXBRRPu08T9z5ghZ8h42DuW9YeynK4OZQdNET1x1qYdj8lXRZjkPMknq0u11maDAt7hf4ZQ9BTC1fZ-UAe-Tem_G97Obs_Bx5Ztu-Pqz8pRUsbEyzkI53SdQK7k6Nsre5Qq92KyUPd-Xv6M8RyYhBA4XnIN5xGo4iqaU149A3t88C_ajt9YVLG5UeS67DFEt5rWW8K8d-npjT6NuizHg +08:36:47.509 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +08:36:47.510 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +08:36:47.510 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +08:36:47.510 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +08:36:47.510 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +08:36:47.510 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +08:36:47.510 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +08:36:47.511 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +08:36:47.511 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +08:36:47.511 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +08:36:47.511 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +08:36:47.511 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +08:36:47.511 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +08:36:47.511 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +08:36:47.511 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA384withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +08:36:47.511 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA384withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +08:36:47.511 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +08:36:47.511 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +08:36:47.511 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +08:36:47.512 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +08:36:47.512 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +08:36:47.512 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +08:36:47.512 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +08:36:47.512 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA512withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +08:36:47.512 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA512withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +08:36:47.512 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +08:36:47.512 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.255 s - in org.jose4j.jws.RsaUsingShaTest +[INFO] Running org.jose4j.cookbook.JoseCookbookTest +[INFO] Tests run: 22, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.466 s - in org.jose4j.cookbook.JoseCookbookTest [INFO] Running org.jose4j.json.JsonUtilTest -{"char array":["a","\\","\""],"some object":"java.lang.Object@3effd4f3","nested":{"chars":["\"","m","e","h"]},"nested also":{"obj":"java.util.Random@41f4fe5"}} -14:56:03.442 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.util.Map (java.util.ArrayList and java.util.Map are in module java.base of loader 'bootstrap') -14:56:03.442 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.Boolean cannot be cast to class java.util.Map (java.lang.Boolean and java.util.Map are in module java.base of loader 'bootstrap') -14:56:03.442 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.String cannot be cast to class java.util.Map (java.lang.String and java.util.Map are in module java.base of loader 'bootstrap') -14:56:03.442 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.Long cannot be cast to class java.util.Map (java.lang.Long and java.util.Map are in module java.base of loader 'bootstrap') -14:56:03.442 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Parsing returned null +{"char array":["a","\\","\""],"some object":"java.lang.Object@396e6d9","nested":{"chars":["\"","m","e","h"]},"nested also":{"obj":"java.util.Random@75308740"}} +08:36:48.023 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.util.Map (java.util.ArrayList and java.util.Map are in module java.base of loader 'bootstrap') +08:36:48.023 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.Boolean cannot be cast to class java.util.Map (java.lang.Boolean and java.util.Map are in module java.base of loader 'bootstrap') +08:36:48.023 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.String cannot be cast to class java.util.Map (java.lang.String and java.util.Map are in module java.base of loader 'bootstrap') +08:36:48.023 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.Long cannot be cast to class java.util.Map (java.lang.Long and java.util.Map are in module java.base of loader 'bootstrap') +08:36:48.023 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Parsing returned null [INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.json.JsonUtilTest -[INFO] Running org.jose4j.cookbook.JoseCookbookTest -[INFO] Tests run: 22, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.188 s - in org.jose4j.cookbook.JoseCookbookTest +[INFO] Running org.jose4j.jwa.AlgorithmConstraintsTest +[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwa.AlgorithmConstraintsTest +[INFO] Running org.jose4j.jwa.AlgorithmFactoryTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwa.AlgorithmFactoryTest +[INFO] Running org.jose4j.zip.DeflateRFC1951CompressionAlgorithmTest +08:36:48.078 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:48.749 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithmTest - Expected exception because this tests going over the max allowed size of decompressed data org.jose4j.lang.JoseException: Maximum allowed size of decompressed data exceeded (which is 204800 bytes but configurable with the org.jose4j.zip.decompress-max-bytes system property) +08:36:48.749 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:48.749 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +08:36:48.750 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.707 s - in org.jose4j.zip.DeflateRFC1951CompressionAlgorithmTest +[INFO] Running org.jose4j.examples.ExamplesTest +eyJhbGciOiJFUzI1NiJ9.VGhpcyBpcyBzb21lIHRleHQgdGhhdCBpcyB0byBiZSBzaWduZWQu.DOkZGF8o9qfGc9sY12spvkaTU9GMsyCnjtyDTvdNRZX6SDFbjnENPNAhzDq2PBDZ0W_o6Bv4P7eXOoU2T5jIQQ +JWS Signature is valid: true +JWS payload: PAYLOAD! +Serialized Encrypted JWE: eyJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.ZQYcsbKOL-pWl9bdQhnkvgA43gTx4BBg4LzAbngFjDpJ7hWz-FaXNw.Ci6vuaRo5MU0F3u9F1rx4Q.Q6ex0zDzHhag6Q_kiBUQ0w.QNLYL7hXwv37uB13yY8HBQ +Payload: Hello World! +JWS Signature is valid: true +JWS payload: This is some text that is to be signed. +JWT: eyJraWQiOiJrMSIsImFsZyI6IlJTMjU2In0.eyJpc3MiOiJJc3N1ZXIiLCJhdWQiOiJBdWRpZW5jZSIsImV4cCI6MTczNjc1ODAwOSwianRpIjoiUVJQRmlpenc5MGV3UWRxNnV6NmhYQSIsImlhdCI6MTczNjc1NzQwOSwibmJmIjoxNzM2NzU3Mjg5LCJzdWIiOiJzdWJqZWN0IiwiZW1haWwiOiJtYWlsQGV4YW1wbGUuY29tIiwiZ3JvdXBzIjpbImdyb3VwLW9uZSIsIm90aGVyLWdyb3VwIiwiZ3JvdXAtdGhyZWUiXX0.ONsTr6EkL9c92hpBZr8VmRLxslVrR8_2AxjP0j9jwIa-5votam-_OOwzhifmBYn3xIm6uFc48zhBo3fRjKxOL0omOjMwrGASEW_3dVbzR8isiv5vmtHFfXSqzp91C8vpguFQ7MyCFykBUW5bnv_74JFkvOWIXNKsgjM19XOH4h7quDnwPYZAW-rA86_x2NV9mt8OgGaEdNvjqhchb-aGXvNsuTygSbIQWeW_a_d-Ln6cmCmnro3y9Ql29msyBwwjMhJmSQ4TZwmfioagpBkROJgGetSh1qrAsaJ4IqyYic-GZX1i3yl7SOATMjRv034m9K11lYZd44XOYrvDBPAgGA +JWT validation succeeded! JWT Claims Set:{iss=Issuer, aud=Audience, exp=1736758009, jti=QRPFiizw90ewQdq6uz6hXA, iat=1736757409, nbf=1736757289, sub=subject, email=mail@example.com, groups=[group-one, other-group, group-three]} +JWT: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJyZWNlaXZlcidzIGtleSIsImN0eSI6IkpXVCIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJnRTJsR1NtX2stZnVyRl9LV002MDhMSGNmcFVkVG01Zm10LTVEMXNSaUh3IiwieSI6IjU1ejJpejdjcnIwTnYtR2l3TzVuYnlVblZzUHlqWVY3a3U0ZEQ0LXo0ZEUiLCJjcnYiOiJQLTI1NiJ9fQ.nB82oVApUkwrrsVgMMT2bPm0BFp3XacdltjADmfWyYj5NK0OzRI4ug.NmdzuS8RsGGZ247w1jcL4w.PMKRSEpqfPH8iZGCpclnUYsAoEDD2UQ6voEyJRsSpRwGCDXgbrBlKmRj_XdSQ0ceiZ998W0-TS1D2mBxfHhPw3yCsQ74naXG4nC_UZBzB7mpOI0l2A_Us3B4dZrUiP0d8h5CQzhOHJJ_DDiujCbF-m8fSu1kq1MVnEpTEOT7NUoul-5DfxExa9vqvSSYVFK76qTn1zOTjWzsIvcYZbmEiShyLWOrSbm333QnCfppsVqD9F6Akd64dWfChg68nOk_-g8zQ4lodwkLOq6g76RqH-6A6ydp0k-gjMM7kcqEjLzoirArZak-gWMx3IBwGku_kIS9_7HtCx1ud_yiPID2YYq0WGMvn1vz6G2Q1QKwpV3DeoUkhCbeq41gCL4KY8f1ZgPDAT31dwOq2OMeo3_p4AicjO0A-04KnkEwyIXFOFcf6oQXIpLdHOxMljDWUi6PT-ZiH989TF0lCXeSbXR1mKRLgU0bIKU43pV_2f3DYZdbc4zXeekox7iVZshrJBBp0UodrXR5eEmTe1RArO_2grCFEQ7V2ujwt9Cnh-sWnIQ.Q4xdZxl7QDho1bZVYiUUgg +JWT validation succeeded! JWT Claims Set:{iss=sender, aud=receiver, exp=1736758009, jti=5WNIGRRjPTq-iXstMBekVw, iat=1736757409, nbf=1736757289, sub=subject, email=mail@example.com, groups=[group-1, other-group, group-3]} +JWE compact serialization: eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..Y2TE8KRJc0DH9n73umL6bQ.9SxCrMUL2nipi94d-L4dKzumGgwSComGk61nEJbA3Jag32wkXw_l0frBZYWvAUS9SLfmFe6aRVxH2Oh9M5Ym6Q.mZoA3e6Thw-7St5Hu-zjwA +plaintext: Well, as of this moment, they're on DOUBLE SECRET PROBATION! +eyJhbGciOiJFUzI1NiIsImtpZCI6ImV4YW1wbGUiLCJiNjQiOmZhbHNlLCJjcml0IjpbImI2NCJdfQ..ak1UHC4bGAy7RRbpF1bsE0QxmR4j6M8J5_DUv5p2pWFjhZMEDN-GCV5KpDwi6fxsP_YQBmA2vyRdiBAfGEchjQ +this is the content that will be signed +JWS Signature is valid: true +JWT: eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImtpZCI6InJlY2VpdmVyIGtleSIsImN0eSI6IkpXVCIsImVwayI6eyJrdHkiOiJPS1AiLCJjcnYiOiJYMjU1MTkiLCJ4IjoiajN6eFowa0tuYTdlWW8tSkVTRTJaWVFPN1JHclRxUHN1T0M4akU5NFB5RSJ9fQ..cPAC_Qvtt4MgPrhY84eeIA.ATxy7bl7ndApyNBI21qjjn0o1ssyRrboh-9bvL2pOHoc_1VHQjMGgbSO_oF-oW1HufvYrW22QdGwd_7BHHlySPb3LzgKt1itVP4CxEveXwQBOETAV2zRIueL0uB-atuGOIPI8HqyYz2IYC_fBtDVUHRSzq7r_IkOnbdMeSbn8VjM3FXxYKxvu1ZXoav2piiQUR5f07yGA95K2nq05MkCpXxGyXn4cxE7LQm0eh93QFinb9hJRz7MXkbENCLwB4c1YiQWDvr9z3Od8hhllFTebPZoo9PFfIM9a837hctkhal9a9kEThmOD8fKhm9QJahnzTkaSp0qxkhSHs-GA-LiP5Qxe6j14Rok6YpYJtUD2OauP3BTqT4BS70MoRltkWxtpDPoPFtEWBxb0vVj_BxUG-ZQXEhqSV7Njtp5iv9ZLp82x7aIVtL5XAaYSIOnxG1343QMIV2KnDqL_VvcyHweqgS5VM726cuh1CjN3utfphI3hyhWAKqAMaHZhGL3pX5K49PskZ-pEIrYgBH8JBOJh5i8ZROUyFfG9F5WU1H48SrUR6huvGKDaDx1Bc2TsUX80B1ToDBQV7YiRMKCHIziHkUOng7z8M4n3xH6P1JQYrx7Vris5HRpMSLgzYTMDIa91MEX_jdO1SwKg3C2v_fjPRJOCMx4qBTZ8zwQlyo8yr4tbvvgXaDI5ZYgOp641RqLgB5KV7fZKhhyBFc6TRhDwA.35lmSfqIlA865dUCpKQAgA +JWT validation succeeded! {"iss":"sender","aud":"receiver","exp":1736758009,"jti":"Buaa336LXjd8TTmvgbyyOQ","iat":1736757409,"nbf":1736757289,"sub":"subject","email":"mail@example.com","groups":["group-1","other-group","group-3"],"address":{"street_address":"123 Main St","locality":"Anytown","region":"Anystate","country":"US"}} +[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.189 s - in org.jose4j.examples.ExamplesTest +[INFO] Running org.jose4j.jwt.JwtClaimsTest +[INFO] Tests run: 38, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.013 s - in org.jose4j.jwt.JwtClaimsTest +[INFO] Running org.jose4j.jwt.consumer.GoogsTooSmallKeyJwtConsumerTest +08:36:49.107 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits).): JsonWebSignature{"alg":"RS256","kid":"76fd32aec7e0f8c190dda8b9dd85e7cf5ad33c43"}->eyJhbGciOiJSUzI1NiIsImtpZCI6Ijc2ZmQzMmFlYzdlMGY4YzE5MGRkYThiOWRkODVlN2NmNWFkMzNjNDMifQ.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_aWQ9QUl0T2F3bGIxSEhFZFJJZW00d2Z1MXFNY1BUdWZvUDZzTi11ZVVrIiwiaWF0IjoxNDMxNjEyMjM4LCJleHAiOjE0MzE2MTU4Mzh9.RRMVpR9WJrkddegS4uKNT7rTov-LvRQ9sCtGo_SXrqkNbLZgArSJcmmHHxoQDsVWUjl2ZNG-7ZjDRuMu-POJLR4GHpwmQ8gttAEeywkiW4in5pUOb21AdgH29HDwG2mY6iVavsASHRutK747gURRlpt3wUJOJk00T9W2N0fVsTE] +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwt.consumer.GoogsTooSmallKeyJwtConsumerTest +[INFO] Running org.jose4j.jwt.consumer.ExamplesFromOpenIdConnectTest +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwt.consumer.ExamplesFromOpenIdConnectTest +[INFO] Running org.jose4j.jwt.consumer.TypeValidatorTest +08:36:49.115 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.115 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.115 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.115 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.115 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.115 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.115 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.115 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.115 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.115 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.115 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.115 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.115 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.115 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.115 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.115 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.115 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.115 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.115 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.115 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.115 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.115 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.115 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.116 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.116 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.116 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.116 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.116 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.116 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.116 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.116 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.116 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.116 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.116 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.116 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.116 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.116 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.116 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.116 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.116 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.116 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.116 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.116 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.116 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.116 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.116 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.116 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.116 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.116 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.117 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.117 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.117 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.117 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.117 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.117 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.117 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +08:36:49.117 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type 'application/noway)' isn't a valid media type in this context. +08:36:49.117 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '/' isn't a valid media type in this context. +08:36:49.117 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '/dpop+jwt' isn't a valid media type in this context. +08:36:49.117 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '' isn't a valid media type in this context. +08:36:49.117 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type +08:36:49.117 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type +08:36:49.117 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type +08:36:49.117 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.117 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.118 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.118 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.118 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.118 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.118 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.118 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.118 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +08:36:49.118 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +08:36:49.118 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE +08:36:49.118 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.118 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.118 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.118 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.118 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.118 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.118 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.118 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.118 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +08:36:49.118 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +08:36:49.119 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.119 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.119 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.119 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.119 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.119 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.119 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.119 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.119 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +08:36:49.119 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +08:36:49.119 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE +08:36:49.119 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.119 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.119 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.119 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.119 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.119 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.119 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.119 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.120 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +08:36:49.120 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +08:36:49.120 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.120 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.120 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.120 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.120 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.120 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.120 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.120 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.120 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +08:36:49.120 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +08:36:49.120 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE +08:36:49.120 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.120 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.120 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.120 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.120 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.120 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.120 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.120 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.120 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +08:36:49.121 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +08:36:49.121 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.121 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.121 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.121 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.121 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.121 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.121 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.121 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.121 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +08:36:49.121 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +08:36:49.121 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE +08:36:49.121 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.121 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.121 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.121 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.121 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.122 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.122 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.122 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +08:36:49.122 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +08:36:49.122 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.012 s - in org.jose4j.jwt.consumer.TypeValidatorTest +[INFO] Running org.jose4j.jwt.consumer.X509VerificationKeyResolverInJwtConsumerTest +08:36:49.131 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=iHQKuSGeWUGYZCg4_RGJSIC0NDQ vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, Zb1HT7ryCRAAj2wcQ8hWbzaqX1s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, W8aO-BD2jx9KMzQjhZ85ukJA5Zg] x5t#S256=qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE].): JsonWebSignature{"x5t#S256":"qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE","x5t":"iHQKuSGeWUGYZCg4_RGJSIC0NDQ","alg":"ES256"}->eyJ4NXQjUzI1NiI6InFTX2JYTlNfSklYQ3JuUmdha2I2b3RFS3Utd0xlb3R6N0tBWjN4UVVPcUUiLCJ4NXQiOiJpSFFLdVNHZVdVR1laQ2c0X1JHSlNJQzBORFEiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTc2MSwic3ViIjoiYWJvdXQifQ.04qPYooLJN2G0q0LYVepaydszTuhY7jKjqi5IGkNBAWZ-IBlW_pWzkurR1MkO48SbJQK2swmy7Ogfihi1ClAlA] +08:36:49.131 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=iHQKuSGeWUGYZCg4_RGJSIC0NDQ vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, Zb1HT7ryCRAAj2wcQ8hWbzaqX1s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, W8aO-BD2jx9KMzQjhZ85ukJA5Zg] x5t#S256=qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE].): JsonWebSignature{"x5t#S256":"qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE","x5t":"iHQKuSGeWUGYZCg4_RGJSIC0NDQ","alg":"ES256"}->eyJ4NXQjUzI1NiI6InFTX2JYTlNfSklYQ3JuUmdha2I2b3RFS3Utd0xlb3R6N0tBWjN4UVVPcUUiLCJ4NXQiOiJpSFFLdVNHZVdVR1laQ2c0X1JHSlNJQzBORFEiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTc2MSwic3ViIjoiYWJvdXQifQ.04qPYooLJN2G0q0LYVepaydszTuhY7jKjqi5IGkNBAWZ-IBlW_pWzkurR1MkO48SbJQK2swmy7Ogfihi1ClAlA] +08:36:49.132 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Neither the x5t header nor the x5t#S256 header are present in the JWS.): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] +08:36:49.132 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Neither the x5t header nor the x5t#S256 header are present in the JWS.): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] +08:36:49.132 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +08:36:49.132 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +08:36:49.133 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +08:36:49.133 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +08:36:49.137 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +08:36:49.137 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +08:36:49.138 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to verify the signature with any of the provided keys - SHA-1 thumbs of provided certificates: [ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y].): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] +08:36:49.138 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to verify the signature with any of the provided keys - SHA-1 thumbs of provided certificates: [ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y].): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] +08:36:49.144 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t#S256=FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE].): JsonWebSignature{"x5t#S256":"FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE","alg":"ES256"}->eyJ4NXQjUzI1NiI6IkZTcU90QjV2UHFaNGtqWXAwOUZqQnBrbVhIMFZxRURtLXdFY1Rjb3g2RUUiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTUzOSwic3ViIjoiYWJvdXQifQ.9Nj3UG8N9u7Eyu0wupR-eVS4Mf0ItwwHBZzwLcY2KUCJeWoPRPT7zC4MqMbHfLj6PzFi09iC3q3PniSJwmWJTA] +08:36:49.144 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t#S256=FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE].): JsonWebSignature{"x5t#S256":"FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE","alg":"ES256"}->eyJ4NXQjUzI1NiI6IkZTcU90QjV2UHFaNGtqWXAwOUZqQnBrbVhIMFZxRURtLXdFY1Rjb3g2RUUiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTUzOSwic3ViIjoiYWJvdXQifQ.9Nj3UG8N9u7Eyu0wupR-eVS4Mf0ItwwHBZzwLcY2KUCJeWoPRPT7zC4MqMbHfLj6PzFi09iC3q3PniSJwmWJTA] +08:36:49.147 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=Zb1HT7ryCRAAj2wcQ8hWbzaqX1s vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, iHQKuSGeWUGYZCg4_RGJSIC0NDQ, W8aO-BD2jx9KMzQjhZ85ukJA5Zg].): JsonWebSignature{"x5t":"Zb1HT7ryCRAAj2wcQ8hWbzaqX1s","alg":"RS256"}->eyJ4NXQiOiJaYjFIVDdyeUNSQUFqMndjUThoV2J6YXFYMXMiLCJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5NjI1Nywic3ViIjoiYWJvdXQifQ.RidDM9z0OJkfV2mwxABtEh2Gr_BCFbTuetOTV_dmnFofarBK7VDPPdsdAhtIs3u7WQq9guoo6H3AUGfj4mTFKX3axi2TsaYRKM9wSoRjxFO7ednGcRGx8bnSerqqrbBuM9ZUUt93sIXuneJHYRKlh0Tt9mCXISv1H4OMEueXOJhck-JPgLPfLDqIPa8t93SULKTQtLvs8KEby2uJOL8vIy-a-lFp9irCWwTnd0QRidpuLAPLr428LPNPycEVqD2TpY7y_xaQJh49oqoq_AmQCmIn3CpZLDLqD1wpEPxLQyd1vbvgQ583y2XJ95_QufjbRd2Oshv3Z3JxpIm9Yie6yQ] +08:36:49.147 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=Zb1HT7ryCRAAj2wcQ8hWbzaqX1s vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, iHQKuSGeWUGYZCg4_RGJSIC0NDQ, W8aO-BD2jx9KMzQjhZ85ukJA5Zg].): JsonWebSignature{"x5t":"Zb1HT7ryCRAAj2wcQ8hWbzaqX1s","alg":"RS256"}->eyJ4NXQiOiJaYjFIVDdyeUNSQUFqMndjUThoV2J6YXFYMXMiLCJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5NjI1Nywic3ViIjoiYWJvdXQifQ.RidDM9z0OJkfV2mwxABtEh2Gr_BCFbTuetOTV_dmnFofarBK7VDPPdsdAhtIs3u7WQq9guoo6H3AUGfj4mTFKX3axi2TsaYRKM9wSoRjxFO7ednGcRGx8bnSerqqrbBuM9ZUUt93sIXuneJHYRKlh0Tt9mCXISv1H4OMEueXOJhck-JPgLPfLDqIPa8t93SULKTQtLvs8KEby2uJOL8vIy-a-lFp9irCWwTnd0QRidpuLAPLr428LPNPycEVqD2TpY7y_xaQJh49oqoq_AmQCmIn3CpZLDLqD1wpEPxLQyd1vbvgQ583y2XJ95_QufjbRd2Oshv3Z3JxpIm9Yie6yQ] +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.014 s - in org.jose4j.jwt.consumer.X509VerificationKeyResolverInJwtConsumerTest +[INFO] Running org.jose4j.jwt.consumer.JwtConsumerTest +08:36:49.167 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322039,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{1571322039 -> Oct 17, 2019, 2:20:39?PM GMT} is more than 60 second(s) in the past.] +08:36:49.171 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1570321001,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{1570321001 -> Oct 6, 2019, 12:16:41?AM GMT} is more than 60 second(s) in the past.] +08:36:49.174 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":12345,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{12345 -> Jan 1, 1970, 3:25:45?AM GMT} is more than 60 second(s) in the past.] +08:36:49.177 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":0,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{0 -> Jan 1, 1970, 12:00:00?AM GMT} is more than 60 second(s) in the past.] +08:36:49.181 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-938763,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{-938763 -> Dec 21, 1969, 3:13:57?AM GMT} is more than 60 second(s) in the past.] +08:36:49.185 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-2147483736,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{-2147483736 -> Dec 13, 1901, 8:44:24?PM GMT} is more than 60 second(s) in the past.] +08:36:49.188 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322101,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322101 -> Oct 17, 2019, 2:21:41?PM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] +08:36:49.192 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322177,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322177 -> Oct 17, 2019, 2:22:57?PM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] +08:36:49.196 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":2147483647,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{2147483647 -> Jan 19, 2038, 3:14:07?AM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] +08:36:49.199 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":7700000007,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{7700000007 -> Jan 2, 2214, 8:53:27?AM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] +08:36:49.208 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571321979,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{1571321979 -> Oct 17, 2019, 2:19:39?PM GMT} is more than 120 second(s) in the past.] +08:36:49.217 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322111,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322111 -> Oct 17, 2019, 2:21:51?PM GMT} is more than 10 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] +08:36:49.222 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"issuer.example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (issuer.example.com) doesn't match expected value of nope.example.com] +08:36:49.222 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] +08:36:49.222 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":["issuer1", "other.one", "meh"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'iss' claim is not the expected type ([issuer1, other.one, meh] - Cannot cast java.util.ArrayList to java.lang.String)] +08:36:49.222 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":["issuer1", "nope.not"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'iss' claim is not the expected type ([issuer1, nope.not] - Cannot cast java.util.ArrayList to java.lang.String)] +08:36:49.222 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https://accounts.google.com"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (https://accounts.google.com) doesn't match expected value of one of [nope.google.com, https://fake.google.com]] +08:36:49.223 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"x"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (x) doesn't match expected value of one of [a, b, c, d, e]] +08:36:49.223 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] +08:36:49.223 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] +08:36:49.223 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] +08:36:49.223 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] +08:36:49.223 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] +08:36:49.223 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] +08:36:49.224 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] +08:36:49.224 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] +08:36:49.224 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: JWS Plaintext (alg=none) must not use a key.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] +08:36:49.224 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: JWS Plaintext (alg=none) must not use a key.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] +08:36:49.224 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] +08:36:49.224 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] +08:36:49.952 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiVGh5dzVfWVZwVGNQYUVwN3dzVkdfcEVuek04ZUU1WXFxYWYyQ0lkbnJ0VSIsInkiOiJ0bnBXajdhRmFWY1RYaTNFdFhNc08xNmcwU1VVSHZVZ2xCM09WZGdUWmk0IiwiY3J2IjoiUC0yNTYifX0.meQF7mAvA7QHP5jaMGYCV55MIF88_35Kn6HxSRwDONSe41vQbI0j7A.RMYkXOGqrZiE-Uz7-8F_4w.itJ_LCO0whuUGaOxxL6uakXkyu5nm-1QrrDH53PSCzCitAOcjoARhe0S2NaNVRNNfsHFlZHsbhi2hLwkc6YNaw.BLqIJKTsz26ybfSGgSvBbQ Additional details: [[20] Missing Integrity Protection] +08:36:49.959 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImtpZCI6ImVjMiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJxWVhCNmkza3pueUZIb2RVejhNTXhHX09PUHhIV09GdklCQjJ3dTRzc1RBIiwieSI6Im5fU0h5RTYtVW42bHZUTUpRUTNJRWdyUHEzYlRuT2w1aHpuWEVMQUI1Wm8iLCJjcnYiOiJQLTI1NiJ9fQ..fgu8KRq8wW6bkXCdg1jRgQ.GjJJNapqYf8av9RR3dD-rlttZbgG2lM3YTLOA5NarybpsRtOv9yLwLsSry2fwaY8ZjrS643tltN4h-p2L9IZLw.LBhBZkgivFxN8KwZOeXzwg Additional details: [[20] Missing Integrity Protection] +08:36:49.966 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoicDZ3eTVUYkxVeC1mRXNTT01hT0dIOUk4cjRsNkJpWHlPbnZXeVIxUTZaSSIsInkiOiIxR0REU1F4anFEWVhlZlJtNmxqYjl1QklCN2I1Z1hJeEdjd3pVckYzbG04IiwiY3J2IjoiUC0yNTYifX0.KSUv7I9WjeBkaK7z5u_Pzoggw95vJoPcL1zOSo5w9hWCOuzmJMaM1QZga_WA8roPRnaUeNopuLN0tLXttamrZt32iAUdKnl4.8uq2mOOg72mPJp8Qb1RcCQ.TVjG1HFMnqD0BNSA0Shb3D7GhrqXvA0o4FUmpdZ6uxWYeMqFtSaO_4KGEuzddo4sFCS3PmhUj1G_SuxvjE-7BA.-wd4zSdRFSJH2pywZgQjXyXY85jSXBRVoNlr0TaZMBI Additional details: [[20] Missing Integrity Protection] +08:36:49.973 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ244SnJhZlZsalN0dFdhTDdBR1NJNmhYbVlZbk0xNU9hTEZ1bXJhTGhPZyIsInkiOiJXVjNLMnFZY2I3MkVYcF8wc0NYQW5xNlZCUnFPTGhmRzhFSHBQN2xaY3dvIiwiY3J2IjoiUC0yNTYifX0.pfeEED_XRGRbeQnESOURDPzu1V4TjrWXqR92Pe25cUGYprzr0rEiutECAiQqDbLd0jh862sXeys.7pF4OqhxPY_Zso7bcH0OBA.a6ZXwvVrlsEci3DwpIl3nEI2BsA2Mh7nicYi8QHzwNRzAcf6DksJaspO85TsUDfUMC1mBKDukiz4G79qTJG66g.DlP_GOSCaPpd5cS_Dr2amH_-frGGeMi_ Additional details: [[20] Missing Integrity Protection] +08:36:49.979 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJyMi1iIn0.FXBcT_Dc_Q2sRPYBHbQYyMygB2NlD-XSp3Bd5b0ORU_T_GuDyOyssAb4jOgGVrXqOa-Uj1bx5bIzllrx21MFsyHa2vCug4RwREgHEiXD5IPg67Foa5YhdimcYziLDepqyduPoFyIpoFdalGYbfVGt315udkeOArnaI7PPGS-yvnnTuQtuGWBYwG69iORgVJ2r2jirgqNtaQyHZOphuw7sUlJaChXIntswFqQxPFIIlunNziEOoe-4JvHd2386q5Hr6ohQ9iSZszxNJOAAzCN9u3DtOAgOr9VR7a2w8WjGZnotIL2OwwDkU-YVlqQruQMjntelNMWZER_pN6lvlSa8w.ZfjAuKrTvhs5MEKqVA5RwA.QmWmieuq2sQc1IQgIOmPiBshUDocTF6nY3Ot-gfHIR8NH3g8y0SC1MJHsU3ymrlf4ceRZL8YVGM36d3HqL7J5A.b0DqSyTwkJVQKO_kFHMewA Additional details: [[20] Missing Integrity Protection] +08:36:49.982 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJraWQiOiJyMi1iIn0.NLfU0wxlfINs2S37yYw7IcW2nH_iB-pWRNipDJFAuTvTP3-WGqtKolIkSzlQjF0XYqHqV8M-F-xaFGKJhcvwuK2MRZvvWumz8XA2wwLQHJ3rz9HuOys2PcRWYmmUvWYE8lnv4O4p0WDYzSmvEbBIPP-mdzJrq2IijpU4k5JIGIskTz5mxt4PWjyOjyl46I_Fkr2XO4WLiOo8M_9xsjKgSDlLg9Mpy4F52Eom0JyoFnoI2pp_wzRBxVAPitoaXBXSlCIkYLixjXEnWCXQ9qWXuAILiHpH-tVEiJKb961i1Ldk66lrSXErGSVEUSxjF3DwKGzEngeN9Pq74P3C5C6opg.DfSJDxL7AurDMgnCdKJmEA.qmYaAmcdOBrwsUocdTeN5ARXtMnw9iaSwSHtzFxUcNK8Xzd3x9hZgFehTOBK3kNykrDSXsQywD6p5qXIszKHaw.eqE14ZCichHsBbslmHvc2peksgXmhOJx Additional details: [[20] Missing Integrity Protection] +08:36:49.986 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJraWQiOiJyMi1iIn0.a9CH-Wx-c_2W8TvCqqL0bk1fqkNtWKLNB94RoHlYiNxPNRJk7Kw0X8iDxaGS6FVYD518Pmpw2x14Wd9ef3D7rD3QT4c0M-P6zC9dmo_g8N4zQ__WlOZ824w7s5blXcLZnUrP5lcSxCIJ_pAH-sa5IOp3pOpoPPmPPwUXkuWSrOzpXepPpnMQ5WgMK9y4_m8QzcHNF_3Y6v7yi9sjmq5f2VvUstbHLTuLJ6DeGcnZDts7E5qh2fQV3josH-XBxRRDMpbHq7kqS6xHA2Qm06znWFHw3wEAOIstKkjgZB_NGnCGFTMqco9V5otPR8cJ3ECcbR0wcEwwH3MHxmlczNyiNA.9gJQ-Mo6geq9DA_b710xUw.QBronc8pAHshAKVbWZL7j2c1SL7qJS_FVOIT7vTKPPpDE04mlaMprBq2Iqnd_l0WvRe_uvD0N45OMinV8G1IiA._ffava-JsV9Dp_zEkU6W-HafojIq2li5WgqYqu5VGqg Additional details: [[20] Missing Integrity Protection] +08:36:49.986 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"HS256","kid":"r2"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec5, x=AfSht_594Kvq6BTM4HIZd4dJAmzYFMVZkJf7PieqEPCPd9va0T9HtAeYXaYZVJ7ewBqFZEYXytvIOKcfCwefvjpa, y=Ac3vr8XVNSUQVNJu-tzgOQwFTlUtu2ltrmmv4HwCyIPK6xz87Vxxzqat5sYDPqQjFz0zzWgfROp5lpELMvaoe8L8, crv=P-521}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=512bits}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec2, x=6kz-iNUWE4abPCOgx-wzr62B7cdOrICpWlyn0VVKkpI, y=fN-jVnBKRAIzm881133miktD1LvOo2zU0hDHKskcbeo, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, n=tc_LtCP2uZCEMmhFAUTDPRcoPbmeqRFQoFayk_ZG_a86RCXY5ItXUeiUc0G2q4rb52FpuydB5cRKAvuVWWgK2gbqfx9b9rwc8uNMLgkQJJ56XBllsCGo99RBiWeAEMUQV1r_Vffen9jbn59CisRIHJ9vAvliEvFOkQG-CFGfCLBlt_dmZyA_5z7NTj1vep34R3KMsE5v44NHxqND53SPUp07-N0isB3tae5wcvZ8sQdV3Y7UsWZIchOGfnex45YWkmrQ6SG0Wuft55Fd4dgBimB41NgdUx6zOQIrn0mkgbw_3_r3HITDkfuuC5LKZWPvpbT84yerxdc8roDseT1T5w, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec3, x=bA3wyoKJlNuW4a84kPMTpTuvPVRak5-HYm0D215a3OZv9TFhNigZTS76nvdA7yqT, y=9PuLKBUexOEFlbBCcBLnnVwuIiCXSe2pMkpQNm1bDmoX9XMmacLNHPTHiFb7b1Yp, crv=P-384}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=128bits}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2-b, n=6HEUxoVXzfZmQnYAQOtwI0opelgRl1KneSPqfqTUXV0x5hOP8H9IPdXKM7R06ZF-xxL_mDwwUZeM_keB5c_fGPjTWmlBAZuMrzdttMBYn_aXzUlinjiDa6yaVVMmAuNanoQvOsfce9uObap6BRr1DegOWr_R5FIrrBjmy_ixWPVhacBeDb6U5UTPA5G_lbg081AdKkTnupRzLEWlypeBQKZXSfeRWsrdv_e_-TMCv6WFGtERyxIRPnrqCdrrOWMLKuC-_Y4jT1GXOb_2dzdpujPeJDDBTFC35SH3acDIZkQV-gPapHEhBFtOxaEpTV34OovzT-3mP08vdTzu8NAenw, e=AQAB}]): JsonWebSignature{"alg":"HS256","kid":"r2"}->eyJhbGciOiJIUzI1NiIsImtpZCI6InIyIn0.eyJhdWQiOiJhIiwiaXNzIjoiaSIsImV4cCI6MTczNjc1ODAwOSwic3ViIjoicyJ9.eG49KSNnk3Qqw74khVtlaIWn5AxljJMSvDvGP_w7a2Y] +08:36:49.987 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoicjItYiJ9.XT00GFxRX-Y9htIyjxr5nh39c0We7JN0H7wtIw8sdo77lWZOcGN5M0Fam0a0q5oPSl3tiXOW1XWGcSlGWNI1mvYM1dChjrdypVT8KzAz-1lVi6BICSlUUZQcC0XUaqWWlqwKY38E9D6ZPoqWiDByeWk2GYVjN_pj-CBcG3PB-MFB8D86OJkRWSTHJATRlotSRw91migsXKsrZWwjC80HeJb1gArdB3UmmUviMi4UiyVzQi3f3Qc7G9bcPoO6xJ3F_pH2yZOzQdHa8QKnSL2nOoRkWHGfBYB1453Hr32K0l4g__KUOMRiNOm-JTwEzeHKJqWM3WNOQ_UiJjPMcYuhCA.wWd_WxiBzLFtxPypMsA3Qg.rsJnZkcJopolvUGubfEXi5tzmZFsM0GAvRWWC3wHPwzYTBSubbJMdm_h09rBs9MFexIlJEyol97hnBi1geyCuw.-3MEkPFOuJvvw49WUhjIQg] +08:36:49.990 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoicjItYiJ9.XT00GFxRX-Y9htIyjxr5nh39c0We7JN0H7wtIw8sdo77lWZOcGN5M0Fam0a0q5oPSl3tiXOW1XWGcSlGWNI1mvYM1dChjrdypVT8KzAz-1lVi6BICSlUUZQcC0XUaqWWlqwKY38E9D6ZPoqWiDByeWk2GYVjN_pj-CBcG3PB-MFB8D86OJkRWSTHJATRlotSRw91migsXKsrZWwjC80HeJb1gArdB3UmmUviMi4UiyVzQi3f3Qc7G9bcPoO6xJ3F_pH2yZOzQdHa8QKnSL2nOoRkWHGfBYB1453Hr32K0l4g__KUOMRiNOm-JTwEzeHKJqWM3WNOQ_UiJjPMcYuhCA.wWd_WxiBzLFtxPypMsA3Qg.rsJnZkcJopolvUGubfEXi5tzmZFsM0GAvRWWC3wHPwzYTBSubbJMdm_h09rBs9MFexIlJEyol97hnBi1geyCuw.-3MEkPFOuJvvw49WUhjIQg Additional details: [[20] Missing Integrity Protection] +08:36:49.993 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no encryption but the JWT Consumer is configured to require it: eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk Additional details: [[19] No encryption.] +08:36:49.993 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no encryption but the JWT Consumer is configured to require it: eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk Additional details: [[19] No encryption.] +08:36:49.994 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value.] +08:36:49.994 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] doesn't contain an acceptable identifier. Expected example.org as an aud value.] +08:36:49.994 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] doesn't contain an acceptable identifier. Expected one of [example.org, nada, nope] as an aud value.] +08:36:49.994 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[7] No Audience (aud) claim present.] +08:36:49.994 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[7] No Audience (aud) claim present.] +08:36:49.994 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", "usa.org", "ca.ca"]}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com, usa.org, ca.ca] doesn't contain an acceptable identifier. Expected example.org as an aud value.] +08:36:49.994 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", "usa.org", "ca.ca"]}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com, usa.org, ca.ca] doesn't contain an acceptable identifier. Expected one of [example.org, some.other.junk] as an aud value.] +08:36:49.995 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", 47, false]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The array value of the 'aud' claim contains non string values (47 - class java.lang.Long cannot be cast to class java.lang.String (java.lang.Long and java.lang.String are in module java.base of loader 'bootstrap'))] +08:36:49.995 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":20475}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'aud' claim is not an array of strings or a single string value.] +08:36:49.995 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":{"aud":"example.org"}}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'aud' claim is not an array of strings or a single string value.] +08:36:49.996 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.JwtConsumerTest$4: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:919); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:913); ...omitted...] +08:36:49.996 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.JwtConsumerTest$4: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:919); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:913); ...omitted...] +08:36:49.997 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"name":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[14] No Subject (sub) claim is present.] +08:36:49.997 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":724729}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'sub' claim is not the expected type (724729 - Cannot cast java.lang.Long to java.lang.String)] +08:36:49.997 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":{"values":["one", "2"]}}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'sub' claim is not the expected type ({values=[one, 2]} - Cannot cast org.jose4j.json.JsonUtil$DupeKeyDisallowingLinkedHashMap to java.lang.String)] +08:36:50.001 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits).): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJhY2MiLCJjdHkiOiJKV1QifQ.KrukndaF2sHb3Y0r311rrYmCrXco-99ZIQ3iLjvCVbbow5MppRTK4DPJUShcndfcIVIFXMYSLGvIJwf39yZRJJ_EvBFnqhOUeCAsUHLGO1yxoQ619jmSh4bCaIicLYeivKaVSQN4Ezc5fvg-Nnv6TBIIgHuWMDU2Ztd96DJRokc.wMg2Eb8izCOUnACqdrcPQA.quFKSN7xQoMJzaYFBVwykQZ8zB3hpW8HtK7pm-4Ggzorno_K-eBQ7fXjRmJ1Jw-kCcmUa8flpnQqpL9jurtlz7DC1ABe0vm2ZkHoJluB6QeSr60Y9rP7kyy_rd3blXT_7t6Wgowo8MumXrrUUxxEQJgXvCmKbd-Rw9sK5jAHEug3zztLXHOX0O0QoxDzTJOsSRtodsu7bTJa-ADvPmK9e0Xp06NRqvx7WuJGKlq3cwQ.DL6yaCdiOUcViN-eZVIwOA] +08:36:50.047 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1736757350,"sub":"s","nbf":1736757230}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1736757410 -> Jan 13, 2025, 8:36:50?AM GMT} is on or after the Expiration Time (exp=NumericDate{1736757350 -> Jan 13, 2025, 8:35:50?AM GMT}) claim value.] +08:36:50.047 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1736757350,"sub":"s"}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1736757410 -> Jan 13, 2025, 8:36:50?AM GMT} is on or after the Expiration Time (exp=NumericDate{1736757350 -> Jan 13, 2025, 8:35:50?AM GMT}) claim value.] +08:36:50.048 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1736758610,"sub":"s","nbf":1736757650}) rejected due to invalid claims or other invalid content. Additional details: [[6] The JWT is not yet valid as the evaluation time NumericDate{1736757410 -> Jan 13, 2025, 8:36:50?AM GMT} is before the Not Before (nbf=NumericDate{1736757650 -> Jan 13, 2025, 8:40:50?AM GMT}) claim time.] +08:36:50.049 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 128 bits): JsonWebSignature{"kid":"esc","alg":"HS256"}->eyJraWQiOiJlc2MiLCJhbGciOiJIUzI1NiJ9.eyJhdWQiOiJhIiwiaXNzIjoiaSIsImV4cCI6MTQzMjMyNTQ5Niwic3ViIjoicyIsIm5iZiI6MTQzMjMyNDgzNn0.16LpzAZyBcokZ4aUaXHn5yN0xQ1zpmLyJVFHu6nH1zY] +08:36:50.053 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] 9223372036854775808 is unreasonable for a NumericDate] +08:36:50.056 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":25113002000004770000,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] 25113002000004770000 is unreasonable for a NumericDate] +08:36:50.058 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775809,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] -9223372036854775809 is unreasonable for a NumericDate] +08:36:50.061 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-77261600013501300000000,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] -77261600013501300000000 is unreasonable for a NumericDate] +08:36:50.064 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{9223372036854775807} is more than 2147483647 second(s) ahead of now NumericDate{9223372036854775 -> Aug 17, 292278994, 7:12:55?AM GMT}.] +08:36:50.070 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775 = 9214148664817921033 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] +08:36:50.077 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775807 = 1 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] +08:36:50.085 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775807 = 1 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] +08:36:50.089 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{9223372036854775807} is more than 10 second(s) ahead of now NumericDate{0 -> Jan 1, 1970, 12:00:00?AM GMT} (even when providing 2147483647 seconds of leeway to account for clock skew).] +08:36:50.092 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 2147483647 = 9223372034707292161 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] +08:36:50.381 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[-76717] You can go blind issuing tokens to yourself...] +08:36:50.381 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[-76717] You can go blind issuing tokens to yourself...] +08:36:50.392 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1736757350,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1736757410 -> Jan 13, 2025, 8:36:50?AM GMT} is on or after the Expiration Time (exp=NumericDate{1736757350 -> Jan 13, 2025, 8:35:50?AM GMT}) claim value.] +08:36:50.395 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[15] Subject (sub) claim value (d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea) doesn't match expected value of NOOOOOOOOOOOOOOOOPE] +08:36:50.396 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [R-RufjSDVGCGfdTmIobf2Q] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value.] +08:36:50.397 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [R-RufjSDVGCGfdTmIobf2Q] doesn't contain an acceptable identifier. Expected one of [no, nope, no way jose] as an aud value.] +08:36:50.397 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject", "iss":"issuer", "aud":"audience"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [audience] doesn't contain an acceptable identifier. Expected nope as an aud value., [12] Issuer (iss) claim value (issuer) doesn't match expected value of no way, [13] The JWT ID (jti) claim is not present.] +08:36:50.407 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1736758010,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [AUD] doesn't contain an acceptable identifier. Expected nope as an aud value.] +08:36:50.407 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1736758010,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (ISS) doesn't match expected value of no way] +08:36:50.408 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1736758010,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [AUD] doesn't contain an acceptable identifier. Expected nope as an aud value., [12] Issuer (iss) claim value (ISS) doesn't match expected value of no way, [5] The Expiration Time (exp=NumericDate{1736758010 -> Jan 13, 2025, 8:46:50?AM GMT}) claim value cannot be more than 5 minutes in the future relative to the evaluation time NumericDate{1736757410 -> Jan 13, 2025, 8:36:50?AM GMT}.] +08:36:50.409 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJleHAiOjE3MzY3NTgwMTAsImlzcyI6IklTUyIsImF1ZCI6IkFVRCIsInN1YiI6IlNVQiJ9.NGns23fwIfHwxj0tDsFcFuzrlZYopHMWm5gaUzZyNdAwfLU3n_idriThNBjcA2Y68-3cw6IJs9sGmPlNVmXOtEG5n5DrjjmMLCpoeBvLmKW_sCPM35Dx62ZCoi4_QlfZvOVoSfzR9i7_9QwAmpRiPYBFLC3SVH2exH3Cr3FKIKqADeOf3yo86w22JaftSRcpA0I1wVOGvCvrw2EfO1nFuhl5g7Wp1Jl1aRnmYPo9v656Dq_zfmdNY8W9yGeuNXnpPTx4gXeQ2GbXS95vBzansM769TPtNaEC_kaQxzYMdPmc1MkAwqFcw6RQ6Qfv4JUwKs19XGwAuWLN8vT6djTODw] +08:36:50.419 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.H_d_M7Kwz8JKJuS0_SAFZaEvowtSS7Ip1cFFyvEqlJDVsZui6t6vXlTKKy0Lw5ffLT6Ep6uT0oTIG-e-mwcaMOkU5v0LvaDAyWnB1hmTvBD_Pg1qWMftgEQbkLrPJ0RbEdhHNqR9zurHiYZ1_0QwEFWPvrznnEVJHHf8W8x3hplUQWIZbPf75-H7qrLrXnUVPXTd7SZLbRVPaxDBXI3ib73ZtMqychGL-AWET3E7NYacHbnKa4RYFzVbHHJ_JlDyyOAcUnaResOd_myu3hnXJw5bb4mwawUDhh_TAIgrnv5xuo85f12sjRK94VFqtwVD4bHihdRHDfA3amGmhFIyeA.rOH45cgHn48pYMudUuCLhQ.7lFA22gARDJK6Q_--PZpIm6ZbGbQCflSoamTK2arSs_yZN2-Q-a1c8KBW3LuVv8IjdBzfvP2qK4qiq0W0HS6fQ.3IgVxn_BLi0n8wJcAzBUiQ Additional details: [[10] Missing signature.] +08:36:50.421 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[17] You can go blind issuing tokens to yourself...] +08:36:50.421 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[17] You can go blind issuing tokens to yourself...] +08:36:50.427 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":-1239223372036854775808,"iat":1571322100,"exp":9223372036854775807,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] -1239223372036854775808 is unreasonable for a NumericDate] +08:36:50.430 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":1571322100,"iat":12345678900000000000,"exp":12345678900000000009,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] 12345678900000000009 is unreasonable for a NumericDate] +08:36:50.432 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":1571322100,"iat":1571322111,"exp":157132210009188371766311111,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] 157132210009188371766311111 is unreasonable for a NumericDate] +08:36:50.435 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{9223372036854775807}) claim value cannot be more than 2147483647 minutes in the future relative to the evaluation time NumericDate{9223371903710789693} (even when providing 2147483647 seconds of leeway to account for clock skew).] +08:36:50.438 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":-1,"exp":9223372036854775802,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow adding: 9223372036854775792 + 30 = -9223372036854775794 at org.jose4j.lang.Maths.add(Maths.java:13); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:143); ...omitted...] +08:36:50.441 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1572322100,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854774808 - 6000 = 9223372036854770808 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:113); ...omitted...] +08:36:50.444 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":-9223372036854775798,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775798 - 65 = 9223372036854775753 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:131); ...omitted...] +08:36:50.446 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: 9223372036854775807 - -10 = -9223372036854775799 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:131); ...omitted...] +08:36:50.447 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=QsGX3JhHP1Pwy4zQ8Ha9FQ): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..zWNzKpA-QA0BboVl02nz-A.eyJpc3MiOiJtZSIsImF1ZCI6Im1lIiwiZXhwIjoxNDIwMjMxNjA2LCJuYW1lIjoidmFsdWUifQ.QsGX3JhHP1Pwy4zQ8Ha9FQ] +08:36:50.448 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=QsGX3JhHP1Pwy4zQ8Ha9FQ): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..zWNzKpA-QA0BboVl02nz-A.u1D7JCpDFeRl69G1L-h3IRrmcOXiWLnhr23ugO2kkDqKVNcO1YQ4Xvl9Sag4aYOnkqUbqe6Wdz8KK3d9q178tA.QsGX3JhHP1Pwy4zQ8Ha9FQ] +08:36:50.455 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.g_hEwksO1Ax8Qn7HoN-BVeBoa8FXe0kpyk_XdcSmxvcM5_P296JXXtoHISr_DD_MqewaQSH4dZOQHoUgKLeFly-9RI11TG-_Ge1bZFazBPwKC5lJ6OLANLMd0QSL4fYEb9ERe-epKYE3xb2jfY1AltHqBO-PM6j23Guj2yDKnFv6WO72tteVzm_2n17SBFvhDuR9a2nHTE67pe0XGBUS_TK7ecA-iVq5COeVdJR4U4VZGGlxRGPLRHvolVLEHx6DYyLpw30Ay9R6d68YCLi9FYTq3hIXPK_-dmPlOUlKvPr1GgJzRoeC9G5qCvdcHWsqJGTO_z3Wfo5zsqwkxruxwA.UmVkbW9uZCBXQSA5ODA1Mg.VwHERHPvCNcHHpTjkoigx3_ExK0Qc71RMEParpatm0X_qpg-w8kozSjfNIPPXiTBBLXR65CIPkFqz4l1Ae9w_uowKiwyi9acgVztAi-pSL8GQSXnaamh9kX1mdh3M_TT-FZGQFQsFhu0Z72gJKGdfGE-OE7hS1zuBD5oEUfk0Dmb0VzWEzpxxiSSBbBAzP10l56pPfAtrjEYw-7ygeMkwBl6Z_mLS6w6xUgKlvW6ULmkV-uLC4FUiyKECK4e3WZYKw1bpgIqGYsw2v_grHjszJZ-_I5uM-9RA8ycX9KqPRp9gc6pXmoU_-27ATs9XCvrZXUtK2902AUzqpeEUJYjWWxSNsS-r1TJ1I-FMJ4XyAiGrfmo9hQPcNBYxPz3GQb28Y5CLSQfNgKSGt0A4isp1hBUXBHAndgtcslt7ZoQJaKe_nNJgNliWtWpJ_ebuOpEl8jdhehdccnRMIwAmU1n7SPkmhIl1HlSOpvcvDfhUN5wuqU955vOBvfkBOh5A11UzBuo2WlgZ6hYi9-e3w29bR0C2-pp3jbqxEDw3iWaf2dc5b-LnR0FEYXvI_tYk5rd_J9N0mg0tQ6RbpxNEMNoA9QWk5lgdPvbh9BaO195abQ.AVO9iT5AV4CzvDJCdhSFlQ] +08:36:50.455 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.g_hEwksO1Ax8Qn7HoN-BVeBoa8FXe0kpyk_XdcSmxvcM5_P296JXXtoHISr_DD_MqewaQSH4dZOQHoUgKLeFly-9RI11TG-_Ge1bZFazBPwKC5lJ6OLANLMd0QSL4fYEb9ERe-epKYE3xb2jfY1AltHqBO-PM6j23Guj2yDKnFv6WO72tteVzm_2n17SBFvhDuR9a2nHTE67pe0XGBUS_TK7ecA-iVq5COeVdJR4U4VZGGlxRGPLRHvolVLEHx6DYyLpw30Ay9R6d68YCLi9FYTq3hIXPK_-dmPlOUlKvPr1GgJzRoeC9G5qCvdcHWsqJGTO_z3Wfo5zsqwkxruxwA.UmVkbW9uZCBXQSA5ODA1Mg.VwHERHPvCNcHHpTjkoigx3_ExK0Qc71RMEParpatm0X_qpg-w8kozSjfNIPPXiTBBLXR65CIPkFqz4l1Ae9w_uowKiwyi9acgVztAi-pSL8GQSXnaamh9kX1mdh3M_TT-FZGQFQsFhu0Z72gJKGdfGE-OE7hS1zuBD5oEUfk0Dmb0VzWEzpxxiSSBbBAzP10l56pPfAtrjEYw-7ygeMkwBl6Z_mLS6w6xUgKlvW6ULmkV-uLC4FUiyKECK4e3WZYKw1bpgIqGYsw2v_grHjszJZ-_I5uM-9RA8ycX9KqPRp9gc6pXmoU_-27ATs9XCvrZXUtK2902AUzqpeEUJYjWWxSNsS-r1TJ1I-FMJ4XyAiGrfmo9hQPcNBYxPz3GQb28Y5CLSQfNgKSGt0A4isp1hBUXBHAndgtcslt7ZoQJaKe_nNJgNliWtWpJ_ebuOpEl8jdhehdccnRMIwAmU1n7SPkmhIl1HlSOpvcvDfhUN5wuqU955vOBvfkBOh5A11UzBuo2WlgZ6hYi9-e3w29bR0C2-pp3jbqxEDw3iWaf2dc5b-LnR0FEYXvI_tYk5rd_J9N0mg0tQ6RbpxNEMNoA9QWk5lgdPvbh9BaO195abQ.AVO9iT5AV4CzvDJCdhSFlQ] +08:36:50.455 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidKeyException: Key cannot be null): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.cC4hiUPoj9Eetdgtv3hF80EGrhuB__dzERat0XF9g2VtQgr9PJbu3XOiZj5RZmh7AAuHIm4Bh-0Qc_lF5YKt_O8W2Fp5jujGbds9uJdbF9CUAr7t1dnZcAcQjbKBYNX4BAynRFdiuB--f_nZLgrnbyTyWzO75vRK5h6xBArLIARNPvkSjtQBMHlb1L07Qe7K0GarZRmB_eSN9383LcOLn6_dO--xi12jzDwusC-eOkHWEsqtFZESc6BfI7noOPqvhJ1phCnvWh6IeYI2w9QOYEUipUTI8np6LbgGY9Fs98rqVt5AXLIhWkWywlVmtVrBp0igcN_IoypGlUPQGe77Rw] +08:36:50.455 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.g_hEwksO1Ax8Qn7HoN-BVeBoa8FXe0kpyk_XdcSmxvcM5_P296JXXtoHISr_DD_MqewaQSH4dZOQHoUgKLeFly-9RI11TG-_Ge1bZFazBPwKC5lJ6OLANLMd0QSL4fYEb9ERe-epKYE3xb2jfY1AltHqBO-PM6j23Guj2yDKnFv6WO72tteVzm_2n17SBFvhDuR9a2nHTE67pe0XGBUS_TK7ecA-iVq5COeVdJR4U4VZGGlxRGPLRHvolVLEHx6DYyLpw30Ay9R6d68YCLi9FYTq3hIXPK_-dmPlOUlKvPr1GgJzRoeC9G5qCvdcHWsqJGTO_z3Wfo5zsqwkxruxwA.UmVkbW9uZCBXQSA5ODA1Mg.VwHERHPvCNcHHpTjkoigx3_ExK0Qc71RMEParpatm0X_qpg-w8kozSjfNIPPXiTBBLXR65CIPkFqz4l1Ae9w_uowKiwyi9acgVztAi-pSL8GQSXnaamh9kX1mdh3M_TT-FZGQFQsFhu0Z72gJKGdfGE-OE7hS1zuBD5oEUfk0Dmb0VzWEzpxxiSSBbBAzP10l56pPfAtrjEYw-7ygeMkwBl6Z_mLS6w6xUgKlvW6ULmkV-uLC4FUiyKECK4e3WZYKw1bpgIqGYsw2v_grHjszJZ-_I5uM-9RA8ycX9KqPRp9gc6pXmoU_-27ATs9XCvrZXUtK2902AUzqpeEUJYjWWxSNsS-r1TJ1I-FMJ4XyAiGrfmo9hQPcNBYxPz3GQb28Y5CLSQfNgKSGt0A4isp1hBUXBHAndgtcslt7ZoQJaKe_nNJgNliWtWpJ_ebuOpEl8jdhehdccnRMIwAmU1n7SPkmhIl1HlSOpvcvDfhUN5wuqU955vOBvfkBOh5A11UzBuo2WlgZ6hYi9-e3w29bR0C2-pp3jbqxEDw3iWaf2dc5b-LnR0FEYXvI_tYk5rd_J9N0mg0tQ6RbpxNEMNoA9QWk5lgdPvbh9BaO195abQ.AVO9iT5AV4CzvDJCdhSFlQ] +08:36:50.455 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.cC4hiUPoj9Eetdgtv3hF80EGrhuB__dzERat0XF9g2VtQgr9PJbu3XOiZj5RZmh7AAuHIm4Bh-0Qc_lF5YKt_O8W2Fp5jujGbds9uJdbF9CUAr7t1dnZcAcQjbKBYNX4BAynRFdiuB--f_nZLgrnbyTyWzO75vRK5h6xBArLIARNPvkSjtQBMHlb1L07Qe7K0GarZRmB_eSN9383LcOLn6_dO--xi12jzDwusC-eOkHWEsqtFZESc6BfI7noOPqvhJ1phCnvWh6IeYI2w9QOYEUipUTI8np6LbgGY9Fs98rqVt5AXLIhWkWywlVmtVrBp0igcN_IoypGlUPQGe77Rw] +08:36:50.456 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JWT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"129ffs904","iss":"I?m sorry, this is our family?s first kidnapping.","aud":"ap.io/","exp":1702498218}] +08:36:50.456 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"jwt"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"1234","iss":"abcd","aud":"https://example.com/as","iat":1702497918,"exp":1702498218}] +08:36:50.456 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JWT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"0","iss":"ctyortyp","aud":"audiencia","exp":1702498218}] +08:36:50.456 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JWT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"2","iss":"ctyortyp","aud":"to.whom.it.may.concern","exp":1702499888}] +08:36:50.456 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JwT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"42","iss":"ctyortyp","aud":"to.whom.it.may.concern...","exp":1702599888}] +JWT Claims Set:{exp=1736757710, sub=subject, iss=issuer} +08:36:50.458 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[2] No Expiration Time (exp) claim present.] +08:36:50.458 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[3] No Issued At (iat) claim present.] +08:36:50.458 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[4] No Not Before (nbf) claim present.] +08:36:50.459 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value.] +08:36:50.459 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value.] +08:36:50.460 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value (even when providing 1 seconds of leeway to account for clock skew).] +08:36:50.460 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value (even when providing 2 seconds of leeway to account for clock skew).] +08:36:50.461 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602065 -> May 2, 2015, 9:27:45?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value.] +08:36:50.461 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602065 -> May 2, 2015, 9:27:45?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value (even when providing 60 seconds of leeway to account for clock skew).] +08:36:50.462 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[6] The JWT is not yet valid as the evaluation time NumericDate{1430601999 -> May 2, 2015, 9:26:39?PM GMT} is before the Not Before (nbf=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim time.] +08:36:50.462 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430603000, "iat":1430602060, "exp":1430602600 }) rejected due to invalid claims or other invalid content. Additional details: [[17] The Expiration Time (exp=NumericDate{1430602600 -> May 2, 2015, 9:36:40?PM GMT}) claim value cannot be before the Not Before (nbf=NumericDate{1430603000 -> May 2, 2015, 9:43:20?PM GMT}) claim value.] +08:36:50.463 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430602000, "iat":1430602660, "exp":1430602600 }) rejected due to invalid claims or other invalid content. Additional details: [[17] The Expiration Time (exp=NumericDate{1430602600 -> May 2, 2015, 9:36:40?PM GMT}) claim value cannot be before the Issued At (iat=NumericDate{1430602660 -> May 2, 2015, 9:37:40?PM GMT}) claim value.] +08:36:50.463 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430607201}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{1430607201 -> May 2, 2015, 10:53:21?PM GMT}) claim value cannot be more than 90 minutes in the future relative to the evaluation time NumericDate{1430600000 -> May 2, 2015, 8:53:20?PM GMT}.] +08:36:50.463 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430607201}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{1430607201 -> May 2, 2015, 10:53:21?PM GMT}) claim value cannot be more than 120 minutes in the future relative to the evaluation time NumericDate{1430600000 -> May 2, 2015, 8:53:20?PM GMT}.] +08:36:50.464 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: This VerificationKeyResolver always throws this exception.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJzdWIiOiJtZSIsImV4cCI6MTczNjc1NzcxMCwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.] +08:36:50.465 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJzdWIiOiJtZSIsImV4cCI6MTczNjc1NzcxMCwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.] +08:36:50.836 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Can't do it!): JsonWebSignature{"typ":"JWT", + "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] +08:36:50.836 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Can't do it!): JsonWebSignature{"typ":"JWT", + "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] +08:36:50.837 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unexpected exception encountered while processing JOSE object (java.lang.IllegalArgumentException: Stuff happens...): JsonWebSignature{"typ":"JWT", + "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] +08:36:50.837 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unexpected exception encountered while processing JOSE object (java.lang.IllegalArgumentException: Stuff happens...): JsonWebSignature{"typ":"JWT", + "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] +08:36:50.838 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:862); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:856); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...] +08:36:50.838 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:862); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:856); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...] +08:36:50.846 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[10] Missing signature.] +08:36:50.846 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[10] Missing signature.] +08:36:50.852 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[20] Missing Integrity Protection] +08:36:50.852 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[20] Missing Integrity Protection] +08:36:50.888 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +08:36:50.888 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +08:36:50.888 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +08:36:50.888 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +08:36:50.889 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +08:36:50.889 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +08:36:50.889 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +08:36:50.889 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +08:36:50.889 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +08:36:50.889 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +08:36:50.889 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +08:36:50.889 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +08:36:50.890 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +08:36:50.890 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +08:36:50.897 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: Unable to parse what was expected to be the JWT Claim Set JSON: "eyJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MjAyMTkwOTcsIm1lc3NhZ2UiOiJlaCJ9.ADXjpouiqbRqymN-NJ84HjU0ZZUmAajlb43Vzb6yTolFU9dTAcL6XhBAy5cwlPaS_3VT4Ce2CMpgruihmaftHA" Additional details: [[16] Invalid JSON.] +JWT Claims Set:{sub=me, aud=a, iss=i, exp=1736758010} +eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJjdHkiOiJqd3QiLCJjcml0IjpbImZha2UuYmxhaCJdfQ.HFT6BvVUGp5Y4sGF62PX9t1Q_Y2CXoSJj6Q6pZlJe3egtg19NFQ3Ze8QpMltuKjazvpl7YfjcHx2xktFUjJPesA7HxfPEDSAC50HS-WVV8xDPEffcr6Di39XSKOEVQYB8wrdOjyhUv8x8Z0-dBo41yKuNnRQXQCqV56WP2-IHFjDqTZS9gWkpOZrnAFMQK20i4s5tSXSGAin9ZriWO1RFBaPhEjuDl72N-fCT2wneM6h3xvtrjGv_JOgO8548tlMs0OPlwJn8a4sbgpPJSiD_sGoeR82wTwBfUiz4OfYbgJGUWig38kZiD1hAw-j5qTyRJZvGil13aHXyVzivEW-aQ.wEEFg5dMLJlJrTDOgEoAhw.yTfvrPNGykw7M8yc0qLEihDObac3h8A2ZJKVi16rD9738wy1aJeNc4Nk_rvmFfx2He5yQdbqNlsNVlzz37w9CtApGmUwH7xvwMh-RbT92g1L1hRX4f1KrhMiHntswEEbL9gEnUvto32Z3JigipoK5rAy2QXUaWtoKolnGWLrymFiRk3X_qITohe_VzigNz2-9NfqQYSuTHZ2aDGHrwm692jPfH6DD3g08kb2dY7nhQ5Sn6X6PynGAnTmuNAS43agzr3vGcXEvSwrtAgi5R170Q.Stx6V-_ADnwLxMDhSt9_bQ +08:36:50.909 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: Unrecognized header 'fake.blah' marked as critical.): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJjdHkiOiJqd3QiLCJjcml0IjpbImZha2UuYmxhaCJdfQ.HFT6BvVUGp5Y4sGF62PX9t1Q_Y2CXoSJj6Q6pZlJe3egtg19NFQ3Ze8QpMltuKjazvpl7YfjcHx2xktFUjJPesA7HxfPEDSAC50HS-WVV8xDPEffcr6Di39XSKOEVQYB8wrdOjyhUv8x8Z0-dBo41yKuNnRQXQCqV56WP2-IHFjDqTZS9gWkpOZrnAFMQK20i4s5tSXSGAin9ZriWO1RFBaPhEjuDl72N-fCT2wneM6h3xvtrjGv_JOgO8548tlMs0OPlwJn8a4sbgpPJSiD_sGoeR82wTwBfUiz4OfYbgJGUWig38kZiD1hAw-j5qTyRJZvGil13aHXyVzivEW-aQ.wEEFg5dMLJlJrTDOgEoAhw.yTfvrPNGykw7M8yc0qLEihDObac3h8A2ZJKVi16rD9738wy1aJeNc4Nk_rvmFfx2He5yQdbqNlsNVlzz37w9CtApGmUwH7xvwMh-RbT92g1L1hRX4f1KrhMiHntswEEbL9gEnUvto32Z3JigipoK5rAy2QXUaWtoKolnGWLrymFiRk3X_qITohe_VzigNz2-9NfqQYSuTHZ2aDGHrwm692jPfH6DD3g08kb2dY7nhQ5Sn6X6PynGAnTmuNAS43agzr3vGcXEvSwrtAgi5R170Q.Stx6V-_ADnwLxMDhSt9_bQ] +08:36:51.148 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1432327195,"sub":"s","nbf":1432326535}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [a] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value., [1] The JWT is no longer valid - the evaluation time NumericDate{1736757411 -> Jan 13, 2025, 8:36:51?AM GMT} is on or after the Expiration Time (exp=NumericDate{1432327195 -> May 22, 2015, 8:39:55?PM GMT}) claim value.] +08:36:51.149 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1432327195,"sub":"s","nbf":1432326535}) rejected due to invalid claims or other invalid content. Additional details: [[17] i isn't okay as an issuer] +08:36:51.151 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notjti":"lbZ_mLS6w3xBSlvW6ULmkV-uLCk"}) rejected due to invalid claims or other invalid content. Additional details: [[13] The JWT ID (jti) claim is not present.] +08:36:51.151 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"jti":55581529751992}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'jti' claim is not the expected type (55581529751992 - Cannot cast java.lang.Long to java.lang.String)] +08:36:51.151 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"jti":["S0w3XbslvW6ULmk0", "5iLSQfNgcSGt7A4is"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'jti' claim is not the expected type ([S0w3XbslvW6ULmk0, 5iLSQfNgcSGt7A4is] - Cannot cast java.util.ArrayList to java.lang.String)] +08:36:51.168 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1736758011,"nbf":1736757111,"jti":"yiqoT4qWR1UtxF2sUrBO4Q"}) rejected due to invalid claims or other invalid content. Additional details: [[21] No typ header parameter present in the innermost JWS/JWE] +08:36:51.185 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1736758011,"nbf":1736757111,"jti":"yiqoT4qWR1UtxF2sUrBO4Q"}) rejected due to invalid claims or other invalid content. Additional details: [[21] No typ header parameter present in the innermost JWS/JWE] +08:36:51.205 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1736758011,"nbf":1736757111,"jti":"yiqoT4qWR1UtxF2sUrBO4Q"}) rejected due to invalid claims or other invalid content. Additional details: [[22] Invalid typ header parameter value 'at+jwt'. Expecting 'application/secevent+jwt' or just 'secevent+jwt'.] +08:36:51.218 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1736758011,"nbf":1736757111,"jti":"yiqoT4qWR1UtxF2sUrBO4Q"}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.TypeValidator: java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.lang.String (java.util.ArrayList and java.lang.String are in module java.base of loader 'bootstrap') at org.jose4j.lang.JsonHelp.getString(JsonHelp.java:31); org.jose4j.jwx.Headers.getStringHeaderValue(Headers.java:78); org.jose4j.jwx.JsonWebStructure.getHeader(JsonWebStructure.java:153); org.jose4j.jwt.consumer.TypeValidator.validate(TypeValidator.java:37); ...omitted...] +08:36:51.221 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1736758011,"nbf":1736757111,"jti":"yiqoT4qWR1UtxF2sUrBO4Q"}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.TypeValidator: java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.lang.String (java.util.ArrayList and java.lang.String are in module java.base of loader 'bootstrap') at org.jose4j.lang.JsonHelp.getString(JsonHelp.java:31); org.jose4j.jwx.Headers.getStringHeaderValue(Headers.java:78); org.jose4j.jwx.JsonWebStructure.getHeader(JsonWebStructure.java:153); org.jose4j.jwt.consumer.TypeValidator.validate(TypeValidator.java:37); ...omitted...] +08:36:51.234 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1736758011,"nbf":1736757111,"jti":"yiqoT4qWR1UtxF2sUrBO4Q"}) rejected due to invalid claims or other invalid content. Additional details: [[22] typ header parameter value '' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: cannot have empty part] +08:36:51.238 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1736758011,"nbf":1736757111,"jti":"yiqoT4qWR1UtxF2sUrBO4Q"}) rejected due to invalid claims or other invalid content. Additional details: [[22] typ header parameter value '' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: cannot have empty part] +[INFO] Tests run: 49, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 2.087 s - in org.jose4j.jwt.consumer.JwtConsumerTest +[INFO] Running org.jose4j.jwt.consumer.JwksDecryptionKeyResolverUsingJwtConsumerTest +08:36:51.241 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=I4Y2OqnZv1sFDo5krJb-8Q). +08:36:51.241 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=5eLZ0XgOHmrebAZXBDONeA). +08:36:51.241 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=5eLZ0XgOHmrebAZXBDONeA). +08:36:51.241 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=vb3tdmYaCbT7YV-8jXzhfg). +08:36:51.242 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=vb3tdmYaCbT7YV-8jXzhfg). +08:36:51.242 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=vb3tdmYaCbT7YV-8jXzhfg). +08:36:51.242 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=Njwy6JiRz3zFecRbwDJVkQ). +08:36:51.242 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=Njwy6JiRz3zFecRbwDJVkQ). +08:36:51.242 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=Njwy6JiRz3zFecRbwDJVkQ). +08:36:51.242 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=Njwy6JiRz3zFecRbwDJVkQ). +08:36:51.242 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=3NtfGWEGtmXmMaSQAbhPRw). +08:36:51.242 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=3NtfGWEGtmXmMaSQAbhPRw). +08:36:51.242 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=3NtfGWEGtmXmMaSQAbhPRw). +08:36:51.243 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=3NtfGWEGtmXmMaSQAbhPRw). +08:36:51.243 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=5) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=3NtfGWEGtmXmMaSQAbhPRw). +08:36:51.243 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=k9N2_mxbDgvCSgFAiGdYyQ). +08:36:51.243 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=k9N2_mxbDgvCSgFAiGdYyQ). +08:36:51.243 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=k9N2_mxbDgvCSgFAiGdYyQ). +08:36:51.243 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=k9N2_mxbDgvCSgFAiGdYyQ). +08:36:51.243 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=5) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=k9N2_mxbDgvCSgFAiGdYyQ). +08:36:51.243 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=6) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=k9N2_mxbDgvCSgFAiGdYyQ). +08:36:51.244 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256"} using attempted decryption to disambiguate from filtered candidate JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=1}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=2}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=3}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=4}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=5}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=6}]) selecting from keys: [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=1}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=2}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=3}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=4}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=5}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=6}]): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..ByGqDfh2bkxqA1VxfVfsRQ.O2orz9HZ35oyHnr4Mt1K9XfRZ6EH2BGLpvOoWD1tsfQ.k9N2_mxbDgvCSgFAiGdYyQ] +08:36:51.261 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). +08:36:51.270 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=e2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: A128KW key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: javax.crypto.IllegalBlockSizeException: Integrity check failed; caused by: javax.crypto.IllegalBlockSizeException: Integrity check failed). +08:36:51.276 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). +08:36:51.276 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). +08:36:51.301 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). +08:36:51.302 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). +08:36:51.320 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). +08:36:51.331 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). +08:36:51.331 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). +08:36:51.350 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). +08:36:51.358 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). +08:36:51.359 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"RSA-OAEP","enc":"A128GCM"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"RSA-OAEP","enc":"A128GCM"} using attempted decryption to disambiguate from filtered candidate JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e2, use=enc, x=A47oP1eLgWo7NsiKGV2Q983D3oNxLnRDlgtEi7HCtSI, y=4CjFGXRHDmm3g_cSB2YZPYsnxorc4tAEJRD35wBu0ys, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, use=enc, n=yzFYB2Nqp5Wb34XQUBGRR33tp1jPVds46D3xwmTXPqjsbr4LMQqPWghtN_qE2bHldPJ9RJUk-i3UxnTAwR1bKLaCj6Aip_blZ4z_wK6IUIkJZk2nPD75YyhTpE9CqoI26lL2KBjMj3gn3cIxHi22BdGshppUbaf-ogH18LQ1bStM63uiflX44ud7GT4JVGaBczoad_cr-R1hs4kWZNdJrzBh7aPxebYnbAVd2CTeyXGYr_GIiq_sgtaBBISGoggruY5r-fva3R4YnhoTnmNeFOLDb99bzDPHbWhyjJ5nqBx7yaw1mT9uBnWno-h423bAT81TvXOJ2ogZ-jsYigx6xw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r1, use=enc, n=lFZ04QwtWu_hHgqlry40DuIhVZyl6ci6FzyLfkeHLH8xfCDLR-rvslxX-Ub3teVnPjZYdUFlZztuDo5kOFsF7TvUQMJhx00VZ6qugm-4LDSJ93ioGuo37vNDjMYBs0dEw_xV38e_m_Jo-oTJZN8xfZFroiR0cRNzac2e98lPa-TCxtOCuVp8Q8ro1Y6nC_1g51iY3nZXHfELX4vUxSh-4z7I0VkzCREQNYx-iKWw6MqEl2qG2mohiwlRexphf-1--8RuJ7FgubewzFv6dP_vCO9cYGi2qB0Gw6b9u8Jb60JYM7xLT3wGTQNfepiXQWESbVorxYiwZODP7d0tteD-eQ, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r3, use=enc, n=pkTznDIyNrI9wvfoFqv3yZpHv5PBeSXxdvOIKtsrKTSXxgDqjfn3jS4CiZidUjW1TzwwkYRZYU3Ei-M7qecudUs1QFdoBUNyd7V_X-ueToD1K-JvQCCrb74bzQWHVfsb2bRfuLw3Tyw3JwnWU3Q-P7OP08INyitwFw9Oz5DvKovtuOyAh3-CT8eSXcPMy2LQTt7WW8h2YeMq1EvndAc67ohiz-q3u2Qqwbbyv-p237mL_90JLE4xMBnLNey4FDjtXbXIq8T8QbvGyn4Dc67ZxH4-izAxi_siA_3z0H7oTYRaeNL4JuNqhoB0R4CgThfofdGVGZVWPyyowzSI-7nxbMHYNNse96wDnbTTKC8pP-qDjExRYjzm4iNueaMzzcq3wAIpR5z2tZp1oULOo43R0kcXC51sKrenJWnqIaIj_WsENRAWWHsrh5IycgySWyytaGVgQHaeBagYJHzRcrhWk10e81M8oMtdPPL1MLS0bbU3CTpDcacr4KyAKAL8sVi7-M2UVqvtWkEZCJ9q1cgOFwcp0t8ZKOpw9OgVeyo-P8HoDpfeXM_WecqNuHSRBlJGbAIfKErBiAUAKFmdEKyHtuUi-Ni6cEwDgjrSxX3apxG_41POrZjZBuuV6FYBcR1wqnTr8k-_z49Kv8ZGF3yszgcV3IQ4qK3-M_qqypnEai8, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r4, use=enc, n=srRMqzPSg5CoMyaY5YErUQBRJkn0QhkzSiIIPA6dow3MnhR2_1S-D4aNHdet29Yc6qs9Qh6HIirMWcp2FPaKfaIZaJ-Q_-9gVyPDWlKHp9jSTeSetDCxm401e8XxNMjluGqb-3uQWE9W0Ka7IlDXXW1KhLYZ75xDaP5Y1c2n84uMRMKwylNCKQv0KlHIRDhsPfHx82khTGUb1XMqom7FWO8Ii4whRr7Glw0JiXj8ANHGozVTP-EVkZqFRJmwLG-ndyvsJOclEwwrXYqklFloU7WUwZQ5M08F-g-6XlSNHtaDcFagUUQKXG8zSb6GqXtEfhrs0mwI1D66b3txAf_76w9phkwlHp0Ab_lLuJLAr0j_ACtXbyxUQvHOV8QXmBuSwl7dVqAXFXGBQNGRtdewjPYgzmS4l_SzjgvC8jRTd-xzSof_gIIbSrKEtMnIoKhMCexyYGXkEzfv7aZH92_ZDGa9Cszlyqd3TJrDjj75zrkztc3coMOgbIVHoet_Ptmx, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e1, use=enc, x=zw4_6TARtwAsHFDw4Q1gr65t6BMl6lXOmmOMA3R0q58, y=O0Gb45b83A8FRe-DH_xJ4H0dsaQVskZMT_RBIKaSGOc, crv=P-256}]) selecting from keys: [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e2, use=enc, x=A47oP1eLgWo7NsiKGV2Q983D3oNxLnRDlgtEi7HCtSI, y=4CjFGXRHDmm3g_cSB2YZPYsnxorc4tAEJRD35wBu0ys, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, use=enc, n=yzFYB2Nqp5Wb34XQUBGRR33tp1jPVds46D3xwmTXPqjsbr4LMQqPWghtN_qE2bHldPJ9RJUk-i3UxnTAwR1bKLaCj6Aip_blZ4z_wK6IUIkJZk2nPD75YyhTpE9CqoI26lL2KBjMj3gn3cIxHi22BdGshppUbaf-ogH18LQ1bStM63uiflX44ud7GT4JVGaBczoad_cr-R1hs4kWZNdJrzBh7aPxebYnbAVd2CTeyXGYr_GIiq_sgtaBBISGoggruY5r-fva3R4YnhoTnmNeFOLDb99bzDPHbWhyjJ5nqBx7yaw1mT9uBnWno-h423bAT81TvXOJ2ogZ-jsYigx6xw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r1, use=enc, n=lFZ04QwtWu_hHgqlry40DuIhVZyl6ci6FzyLfkeHLH8xfCDLR-rvslxX-Ub3teVnPjZYdUFlZztuDo5kOFsF7TvUQMJhx00VZ6qugm-4LDSJ93ioGuo37vNDjMYBs0dEw_xV38e_m_Jo-oTJZN8xfZFroiR0cRNzac2e98lPa-TCxtOCuVp8Q8ro1Y6nC_1g51iY3nZXHfELX4vUxSh-4z7I0VkzCREQNYx-iKWw6MqEl2qG2mohiwlRexphf-1--8RuJ7FgubewzFv6dP_vCO9cYGi2qB0Gw6b9u8Jb60JYM7xLT3wGTQNfepiXQWESbVorxYiwZODP7d0tteD-eQ, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r3, use=enc, n=pkTznDIyNrI9wvfoFqv3yZpHv5PBeSXxdvOIKtsrKTSXxgDqjfn3jS4CiZidUjW1TzwwkYRZYU3Ei-M7qecudUs1QFdoBUNyd7V_X-ueToD1K-JvQCCrb74bzQWHVfsb2bRfuLw3Tyw3JwnWU3Q-P7OP08INyitwFw9Oz5DvKovtuOyAh3-CT8eSXcPMy2LQTt7WW8h2YeMq1EvndAc67ohiz-q3u2Qqwbbyv-p237mL_90JLE4xMBnLNey4FDjtXbXIq8T8QbvGyn4Dc67ZxH4-izAxi_siA_3z0H7oTYRaeNL4JuNqhoB0R4CgThfofdGVGZVWPyyowzSI-7nxbMHYNNse96wDnbTTKC8pP-qDjExRYjzm4iNueaMzzcq3wAIpR5z2tZp1oULOo43R0kcXC51sKrenJWnqIaIj_WsENRAWWHsrh5IycgySWyytaGVgQHaeBagYJHzRcrhWk10e81M8oMtdPPL1MLS0bbU3CTpDcacr4KyAKAL8sVi7-M2UVqvtWkEZCJ9q1cgOFwcp0t8ZKOpw9OgVeyo-P8HoDpfeXM_WecqNuHSRBlJGbAIfKErBiAUAKFmdEKyHtuUi-Ni6cEwDgjrSxX3apxG_41POrZjZBuuV6FYBcR1wqnTr8k-_z49Kv8ZGF3yszgcV3IQ4qK3-M_qqypnEai8, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r4, use=enc, n=srRMqzPSg5CoMyaY5YErUQBRJkn0QhkzSiIIPA6dow3MnhR2_1S-D4aNHdet29Yc6qs9Qh6HIirMWcp2FPaKfaIZaJ-Q_-9gVyPDWlKHp9jSTeSetDCxm401e8XxNMjluGqb-3uQWE9W0Ka7IlDXXW1KhLYZ75xDaP5Y1c2n84uMRMKwylNCKQv0KlHIRDhsPfHx82khTGUb1XMqom7FWO8Ii4whRr7Glw0JiXj8ANHGozVTP-EVkZqFRJmwLG-ndyvsJOclEwwrXYqklFloU7WUwZQ5M08F-g-6XlSNHtaDcFagUUQKXG8zSb6GqXtEfhrs0mwI1D66b3txAf_76w9phkwlHp0Ab_lLuJLAr0j_ACtXbyxUQvHOV8QXmBuSwl7dVqAXFXGBQNGRtdewjPYgzmS4l_SzjgvC8jRTd-xzSof_gIIbSrKEtMnIoKhMCexyYGXkEzfv7aZH92_ZDGa9Cszlyqd3TJrDjj75zrkztc3coMOgbIVHoet_Ptmx, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e1, use=enc, x=zw4_6TARtwAsHFDw4Q1gr65t6BMl6lXOmmOMA3R0q58, y=O0Gb45b83A8FRe-DH_xJ4H0dsaQVskZMT_RBIKaSGOc, crv=P-256}]): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhHQ00ifQ.Ac5pGgt-UTQYOQBO4Z-sABTVhrSr70xjotF0FMXWFqUB4iyoihdLRBTnrpjTb6o-orOqA6EMsv6oDZZelSn3J5Ul-cJSPibXuehlX9VQkZv4NDhP38sUeuXNp0IDtNcJeX2tFI2t6W2uFrCYwIkvh8f8bKHR_yUZslFBWAXRwLX9H2PjyQLXhir3hM1SAOKrQQVjaoPOum1n-3F6p_fh8gZYaxVJiJ2Yq9kdqVwY1wjsEq5sq8JN3j8szfE1GBVYHQhdn2I96bpX9OI97ma-XDIZwmQRgHT1mMByhbTG1SzQiIOc4CXGp5b5zER8j55MVZYB0L3iPYVEELY5YjWULc8XTUeSkejvH3ENuckqBoMijx3vb3N3XUFvY1IW6l0DecXEbv87ead-qSRoCNWKsZKtNX457jhtl9xXO0lrjT5kB_D9z_0SbT2X7ffsZ4vMGBbzsII-Ip_cWwl8xYXxwy9OGVsiRt1F0q1JgtNS35lNP9hZvDJksWPo77ebqXEw.ocPwwRIpGacR3VO1.-XXqFCYM6zkOTl3j.hOTzs7STvZrH3Agtm4DoNg] +08:36:51.378 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=Hzbvc__4g2nqIaYoYkc__w): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoiZGV1eCJ9..JruwzL7TaQ1Fub8Hw6yYmQ.b4B9F3kerVHvyGB5zb40lkTqxulLbMhwFi-qvPfFwwbuyPVPf5s7TeT3i3MLRs0-l_1hP5bPxIEEnOEOBbqTGwO1TWuBn_lQsR8XpQRp6t4H0eaXZsnBqOa3MeEtmGpo.Hzbvc__4g2nqIaYoYkc___] +08:36:51.378 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256","kid":"deux"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=one}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=two}]): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoiZGV1eCJ9..JruwzL7TaQ1Fub8Hw6yYmQ.b4B9F3kerVHvyGB5zb40lkTqxulLbMhwFi-qvPfFwwbuyPVPf5s7TeT3i3MLRs0-l_1hP5bPxIEEnOEOBbqTGwO1TWuBn_lQsR8XpQRp6t4H0eaXZsnBqOa3MeEtmGpo.Hzbvc--4g2nqIaYoYkc2pQ] +[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.013 s - in org.jose4j.jwt.consumer.JwksDecryptionKeyResolverUsingJwtConsumerTest +[INFO] Running org.jose4j.jwt.consumer.JwksVerificationKeyResolverUsingJwtConsumerTest +08:36:51.381 DEBUG o.j.j.c.JwksVerificationKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"HS512","kid":"nope"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=uno}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=two}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=trois}]): JsonWebSignature{"alg":"HS512","kid":"nope"}->eyJhbGciOiJIUzUxMiIsImtpZCI6Im5vcGUifQ.eyJpc3MiOiJGUk9NIiwiYXVkIjoiVE8iLCJleHAiOjE0MjQyMTg2NzksInN1YiI6IkFCT1VUIn0.lZOnt-l4wIUl667laxBjZgyTZsebfitsKT1yBrEQ-DognQiqEafQaVrFTaV3dJrZDvgDqAKL9FzxOHfdBg8NXw] +08:36:51.385 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.uIRIFrhftV39qJNOdaL8LwrK1prIJIHsP7Gn6jJAVbE2Mx4IkwGzBXDLKMulM1IvKElmSyK_KBg8afywcxoApA] +08:36:51.387 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.21eYfC_ZNf1FQ1Dtvj4rUiM9jYPgf1zJfeE_b2fclgu36KAN141ICqVjNxQqlK_7Wbct_FDxgyHvej_LEigb2Q] +08:36:51.389 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTEyNywiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.UE4B0IVPRip-3TDKhNAadCuj_Bf5PlEAn9K94Zd7mP25WNZwxDbQpDElZTZSp-3ngPqQyPGj27emYRHhOnFSAQ] +08:36:51.390 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES384"}->eyJhbGciOiJFUzM4NCJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTIzMSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.NyRtG_eFmMLQ0XkW5kvdSpzYsm6P5M3U8EBFKIhD-jw8E7FOYw9PZ3_o1PWuLWH3XeArZMW7-bAIVxo2bHqJsSUtB6Tf0NWPtCpUF2c1vbuRXEXkGrCUmc4sKyOBjimC] +08:36:51.390 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.pgBu9S8g7MC2BN9YNlWD9JhjzWbQVjqpmErW4hMFncKD8bUidIbMBJSI3URXvnMJrLrAC5eB2gb6DccF_txQaqX1X81JbTSdQ44_P1W-1uIIkfIXUvM6OXv48W-CPm8xGuetQ1ayHgU_1ljtdkbdUHZ6irgaeIrFMgZX0Jdb9Eydnfhwvno2oGk3y6ruq2KgKABIdzgvJXfwdOFGn1z0CxwQSVDkFRLsMsBljTwfTd0v3G8OXT8WRMZMGVyAgtKVu3XJyrPNntVqrzdgQQma6S06Y9J9V9t0AlgEAn2B4TqMxYcu1Tjr7bBL_v83zEXhbdcFBYLfJg-LY5wE6rA-dA] +08:36:51.408 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTEyNywiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.UE4B0IVPRip-3TDKhNAadCuj_Bf5PlEAn9K94Zd7mP25WNZwxDbQpDElZTZSp-3ngPqQyPGj27emYRHhOnFSAQ] +08:36:51.408 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES384"}->eyJhbGciOiJFUzM4NCJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTIzMSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.NyRtG_eFmMLQ0XkW5kvdSpzYsm6P5M3U8EBFKIhD-jw8E7FOYw9PZ3_o1PWuLWH3XeArZMW7-bAIVxo2bHqJsSUtB6Tf0NWPtCpUF2c1vbuRXEXkGrCUmc4sKyOBjimC] +08:36:51.412 DEBUG o.j.j.c.JwksVerificationKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"8a10l"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00r, use=sig, x=AZkOsR09YQeFcD6rhINHWAaAr8DMx9ndFzum50o5KLLUjqF7opKI7TxR5LP_4uUvG2jojF57xxWVwWi2otdETeI-, y=AadJxOSpjf_4VxRjTT_FdAtFX8Pw-CBpaoX-OQPPQ8o0kOrj5nzIltwnEORDldLFIkQQzgTXMzBnWyQurVHU5pUF, crv=P-521}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00q, use=sig, x=3n74sKXRbaBNw9qOGslnl-WcNCdC75cWo_UquiGUFKdDM3hudthywE5y0R6d2Li8, y=YbZ_0lregvTboKmUX7VE7eknQC1yETKUdHzt_YMX4zbTyOxgZL6A38AVfY8Q8HWd, crv=P-384}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00p, use=sig, x=S-EbFKVG-7pXjdgM9SPPw8rN3V8-2uX4bNg4y8R7EhA, y=KTtyNGz9B9_QrkFf7mP90YiH6F40fAYfqpzQh8HG7tc, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=8a00o, use=sig, n=kM-83p_Qaq-1FuxLHH6Y7jQeBT5MK9iHGB75Blnit8rMIcsns72Ls1uhEYiyB3_icK7ibLr2_AHiIl7MnJBY2cCquuwiTccDM5AYUccdypliSlVeAL0MBa_0xfpvBJw8fB45wX6kJKftbQI8xjvFhqSIuGNyQOzFXnJ_mCBOLv-6Nzn79qWxh47mQ7NJk2wSYdFDsz0NNGjBA2VQ9U6weqL1viZ1sbzXr-bJWCjjEYmKC5k0sjGGXJuvMPEqBY2q68kFXD3kiuslQ3tNS1j4d-IraadxpNVtedQ44-xM7MC-WFm2f5eO0LmJRzyipGNPkTer66q6MSEESguyhsoLNQ, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00n, use=sig, x=ADoTal4nAvVCgicprEBBFOzNKUKVJl1Ph8sISl3Z3tz7TJZlQB485LJ3xil-EmWvqW1-sKFl7dY2YtrGUZvjGp0O, y=AXVB58hIK7buMZmRgDU4hrGvcVQLXa-77_F755OKIkuWP5IJ6GdjFvaRHfIbbHMp-whqjmRrlwfYPN1xmyCGSzpT, crv=P-521}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00m, use=sig, x=5Y4xK9IBGJq5-E6QAVdpiqZb9Z-_tro_rX9TAUdWD3jiVS5N-blEnu5zWzoUoiJk, y=ZDFGBLBbiuvHLMOJ3DoOSRLU94uu5y3s03__HaaaLU04Efc4nGdY3vhTQ4kxEqVj, crv=P-384}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00l, use=sig, x=CWzKLukg4yQzi4oM-2m9M-ClxbU4e6P9G_HRn9A0edI, y=UB1OL_eziV6lA5J0PiAuzoKQU_YbXojbjh0sfxtVlOU, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=8a00k, use=sig, n=ux8LdF-7g3X1BlqglZUw36mqjd9P0JWfWxJYvR6pCFSyqLrETc-fL9_lTG3orohkGnEPe7G-BO65ldF44pYEe3eZzcEuEFtiO5W4_Jap1Z430vdYgC_nZtENIJDWlsGM9ev-cOld7By-8l3-wAyuspOKZijWtx6K57VLajyUHBSmbUtaeCwHQOGyMOV1V-cskbTO2u_HrLOLLkSv9oZrznAwpx_paFHy-aAsdFhb7EiBzwqqHQButo3aT3DsR69gbW_Nmrf6tfkril6B3ePKV4od_5jowa6V3765K6v2L4NER7fuZ2hJVbIc0eJXY8tL3NlkBnjnmQ8DBWQR81Ayhw, e=AQAB}]): JsonWebSignature{"alg":"ES256","kid":"8a10l"}->eyJhbGciOiJFUzI1NiIsImtpZCI6IjhhMTBsIn0.eyJzdWIiOiJoYWlsaWUiLCJhdWQiOiJhIiwianRpIjoiRmUwZ1h1UGpmcHoxSHEzdzRaaUZIQiIsImlzcyI6Imh0dHBzOlwvXC9sb2NhbGhvc3Q6OTAzMSIsImlhdCI6MTQyMTA5Mzg1OSwiZXhwIjoxNDIxMDk0NDU5LCJub25jZSI6ImZmcyIsImFjciI6InVybjpvYXNpczpuYW1lczp0YzpTQU1MOjIuMDphYzpjbGFzc2VzOlBhc3N3b3JkIiwiYXV0aF90aW1lIjoxNDIxMDkzMzc2fQ.gzJQZRErEHI_v6z6dZboTPzL7p9_wXrMJIWnYZFEENgq3E1InbrZuQM3wB-mJ5r33kwMibJY7Qi4y-jvk0IYqQ] +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwt.consumer.JwksVerificationKeyResolverUsingJwtConsumerTest +[INFO] Running org.jose4j.jwt.NumericDateTest +08:36:51.413 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854775807} +08:36:51.413 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372034707292160} +08:36:51.413 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223371822106411107} +08:36:51.413 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{4611686018427387903} +08:36:51.413 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{2305843009213693951} +08:36:51.413 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{144115188075855871} +08:36:51.413 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9232604641496272} +08:36:51.413 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854776} +08:36:51.413 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854775 -> Aug 17, 292278994, 7:12:55?AM GMT} +08:36:51.414 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854774 -> Aug 17, 292278994, 7:12:54?AM GMT} +08:36:51.414 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854775808} +08:36:51.414 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372034707292161} +08:36:51.414 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-4611686018427387904} +08:36:51.414 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-184467440737095516} +08:36:51.414 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9232604641496272} +08:36:51.414 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854776} +08:36:51.417 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854775 -> Dec 2, 292269055, 4:47:05?PM GMT} +08:36:51.418 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854774 -> Dec 2, 292269055, 4:47:06?PM GMT} +08:36:51.418 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 1 = -9223372036854775808 +08:36:51.418 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 60 = -9223372036854775749 +08:36:51.418 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 2147483647 = -9223372034707292162 +08:36:51.418 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 9223372036854775807 = -2 +08:36:51.418 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 2147483647 + 9223372036854775807 = -9223372034707292162 +08:36:51.418 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 60 + 9223372036854775807 = -9223372036854775749 +08:36:51.418 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 1 + 9223372036854775807 = -9223372036854775808 +08:36:51.418 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -1 = 9223372036854775807 +08:36:51.418 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -100 = 9223372036854775708 +08:36:51.418 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -2147483648 = 9223372034707292160 +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.jwt.NumericDateTest [INFO] [INFO] Results: [INFO] @@ -4539,8 +4575,8 @@ [INFO] ------------------------------------------------------------------------ [INFO] BUILD SUCCESS [INFO] ------------------------------------------------------------------------ -[INFO] Total time: 39.495 s -[INFO] Finished at: 2026-02-15T14:56:33Z +[INFO] Total time: 50.304 s +[INFO] Finished at: 2025-01-13T08:37:21Z [INFO] ------------------------------------------------------------------------ create-stamp debian/debhelper-build-stamp dh_prep @@ -4564,8 +4600,8 @@ [INFO] ------------------------------------------------------------------------ [INFO] BUILD SUCCESS [INFO] ------------------------------------------------------------------------ -[INFO] Total time: 0.728 s -[INFO] Finished at: 2026-02-15T14:56:35Z +[INFO] Total time: 1.343 s +[INFO] Finished at: 2025-01-13T08:37:25Z [INFO] ------------------------------------------------------------------------ mh_resolve_dependencies --non-interactive --offline --build -plibjose4j-java --base-directory=/build/reproducible-path/libjose4j-java-0.9.6 --non-explore Analysing pom.xml... @@ -4591,12 +4627,14 @@ dpkg-buildpackage: info: binary-only upload (no source included) dpkg-genchanges: info: including full source code in upload I: copying local configuration +I: user script /srv/workspace/pbuilder/2021422/tmp/hooks/B01_cleanup starting +I: user script /srv/workspace/pbuilder/2021422/tmp/hooks/B01_cleanup finished I: unmounting dev/ptmx filesystem I: unmounting dev/pts filesystem I: unmounting dev/shm filesystem I: unmounting proc filesystem I: unmounting sys filesystem I: cleaning the build env -I: removing directory /srv/workspace/pbuilder/276604 and its subdirectories -I: Current time: Sun Feb 15 02:56:39 -12 2026 -I: pbuilder-time-stamp: 1771167399 +I: removing directory /srv/workspace/pbuilder/2021422 and its subdirectories +I: Current time: Mon Jan 13 22:37:33 +14 2025 +I: pbuilder-time-stamp: 1736757453