Diff of the two buildlogs: -- --- b1/build.log 2024-12-17 07:58:39.318152415 +0000 +++ b2/build.log 2024-12-17 08:04:35.434040485 +0000 @@ -1,6 +1,6 @@ I: pbuilder: network access will be disabled during build -I: Current time: Mon Jan 19 02:19:40 -12 2026 -I: pbuilder-time-stamp: 1768832380 +I: Current time: Tue Jan 20 04:21:42 +14 2026 +I: pbuilder-time-stamp: 1768832502 I: Building the build Environment I: extracting base tarball [/var/cache/pbuilder/trixie-reproducible-base.tgz] I: copying local configuration @@ -28,52 +28,84 @@ dpkg-source: info: applying 01-test-failure.patch I: Not using root during the build. I: Installing the build-deps -I: user script /srv/workspace/pbuilder/3998790/tmp/hooks/D02_print_environment starting +I: user script /srv/workspace/pbuilder/3638218/tmp/hooks/D01_modify_environment starting +debug: Running on codethink01-arm64. +I: Changing host+domainname to test build reproducibility +I: Adding a custom variable just for the fun of it... +I: Changing /bin/sh to bash +'/bin/sh' -> '/bin/bash' +lrwxrwxrwx 1 root root 9 Jan 19 14:21 /bin/sh -> /bin/bash +I: Setting pbuilder2's login shell to /bin/bash +I: Setting pbuilder2's GECOS to second user,second room,second work-phone,second home-phone,second other +I: user script /srv/workspace/pbuilder/3638218/tmp/hooks/D01_modify_environment finished +I: user script /srv/workspace/pbuilder/3638218/tmp/hooks/D02_print_environment starting I: set - BUILDDIR='/build/reproducible-path' - BUILDUSERGECOS='first user,first room,first work-phone,first home-phone,first other' - BUILDUSERNAME='pbuilder1' - BUILD_ARCH='arm64' - DEBIAN_FRONTEND='noninteractive' + BASH=/bin/sh + BASHOPTS=checkwinsize:cmdhist:complete_fullquote:extquote:force_fignore:globasciiranges:globskipdots:hostcomplete:interactive_comments:patsub_replacement:progcomp:promptvars:sourcepath + BASH_ALIASES=() + BASH_ARGC=() + BASH_ARGV=() + BASH_CMDS=() + BASH_LINENO=([0]="12" [1]="0") + BASH_LOADABLES_PATH=/usr/local/lib/bash:/usr/lib/bash:/opt/local/lib/bash:/usr/pkg/lib/bash:/opt/pkg/lib/bash:. + BASH_SOURCE=([0]="/tmp/hooks/D02_print_environment" [1]="/tmp/hooks/D02_print_environment") + BASH_VERSINFO=([0]="5" [1]="2" [2]="37" [3]="1" [4]="release" [5]="aarch64-unknown-linux-gnu") + BASH_VERSION='5.2.37(1)-release' + BUILDDIR=/build/reproducible-path + BUILDUSERGECOS='second user,second room,second work-phone,second home-phone,second other' + BUILDUSERNAME=pbuilder2 + BUILD_ARCH=arm64 + DEBIAN_FRONTEND=noninteractive DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all parallel=12 ' - DISTRIBUTION='trixie' - HOME='/root' - HOST_ARCH='arm64' + DIRSTACK=() + DISTRIBUTION=trixie + EUID=0 + FUNCNAME=([0]="Echo" [1]="main") + GROUPS=() + HOME=/root + HOSTNAME=i-capture-the-hostname + HOSTTYPE=aarch64 + HOST_ARCH=arm64 IFS=' ' - INVOCATION_ID='a2cfea6a7e5e4c6b9487b80fbfb92e28' - LANG='C' - LANGUAGE='en_US:en' - LC_ALL='C' - MAIL='/var/mail/root' - OPTIND='1' - PATH='/usr/sbin:/usr/bin:/sbin:/bin:/usr/games' - PBCURRENTCOMMANDLINEOPERATION='build' - PBUILDER_OPERATION='build' - PBUILDER_PKGDATADIR='/usr/share/pbuilder' - PBUILDER_PKGLIBDIR='/usr/lib/pbuilder' - PBUILDER_SYSCONFDIR='/etc' - PPID='3998790' - PS1='# ' - PS2='> ' + INVOCATION_ID=529326f0cf004ef3a14869c00bf07c21 + LANG=C + LANGUAGE=nl_BE:nl + LC_ALL=C + MACHTYPE=aarch64-unknown-linux-gnu + MAIL=/var/mail/root + OPTERR=1 + OPTIND=1 + OSTYPE=linux-gnu + PATH=/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path + PBCURRENTCOMMANDLINEOPERATION=build + PBUILDER_OPERATION=build + PBUILDER_PKGDATADIR=/usr/share/pbuilder + PBUILDER_PKGLIBDIR=/usr/lib/pbuilder + PBUILDER_SYSCONFDIR=/etc + PIPESTATUS=([0]="0") + POSIXLY_CORRECT=y + PPID=3638218 PS4='+ ' - PWD='/' - SHELL='/bin/bash' - SHLVL='2' - SUDO_COMMAND='/usr/bin/timeout -k 18.1h 18h /usr/bin/ionice -c 3 /usr/bin/nice /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.SEbszpA7/pbuilderrc_9wYy --distribution trixie --hookdir /etc/pbuilder/first-build-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/trixie-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.SEbszpA7/b1 --logfile b1/build.log libjose4j-java_0.9.6-1.dsc' - SUDO_GID='109' - SUDO_UID='104' - SUDO_USER='jenkins' - TERM='unknown' - TZ='/usr/share/zoneinfo/Etc/GMT+12' - USER='root' - _='/usr/bin/systemd-run' - http_proxy='http://192.168.101.4:3128' + PWD=/ + SHELL=/bin/bash + SHELLOPTS=braceexpand:errexit:hashall:interactive-comments:posix + SHLVL=3 + SUDO_COMMAND='/usr/bin/timeout -k 24.1h 24h /usr/bin/ionice -c 3 /usr/bin/nice -n 11 /usr/bin/unshare --uts -- /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.SEbszpA7/pbuilderrc_f60d --distribution trixie --hookdir /etc/pbuilder/rebuild-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/trixie-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.SEbszpA7/b2 --logfile b2/build.log libjose4j-java_0.9.6-1.dsc' + SUDO_GID=109 + SUDO_UID=104 + SUDO_USER=jenkins + TERM=unknown + TZ=/usr/share/zoneinfo/Etc/GMT-14 + UID=0 + USER=root + _='I: set' + http_proxy=http://192.168.101.4:3128 I: uname -a - Linux codethink03-arm64 6.1.0-28-cloud-arm64 #1 SMP Debian 6.1.119-1 (2024-11-22) aarch64 GNU/Linux + Linux i-capture-the-hostname 6.1.0-28-cloud-arm64 #1 SMP Debian 6.1.119-1 (2024-11-22) aarch64 GNU/Linux I: ls -l /bin lrwxrwxrwx 1 root root 7 Nov 22 2024 /bin -> usr/bin -I: user script /srv/workspace/pbuilder/3998790/tmp/hooks/D02_print_environment finished +I: user script /srv/workspace/pbuilder/3638218/tmp/hooks/D02_print_environment finished -> Attempting to satisfy build-dependencies -> Creating pbuilder-satisfydepends-dummy package Package: pbuilder-satisfydepends-dummy @@ -432,7 +464,7 @@ Get: 303 http://deb.debian.org/debian trixie/main arm64 maven all 3.8.8-2 [19.5 kB] Get: 304 http://deb.debian.org/debian trixie/main arm64 maven-repo-helper all 1.11 [142 kB] Get: 305 http://deb.debian.org/debian trixie/main arm64 maven-debian-helper all 2.6.6 [108 kB] -Fetched 274 MB in 1s (228 MB/s) +Fetched 274 MB in 3s (80.2 MB/s) debconf: delaying package configuration, since apt-utils is not installed Selecting previously unselected package libapparmor1:arm64. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 20082 files and directories currently installed.) @@ -1876,7 +1908,11 @@ Building tag database... -> Finished parsing the build-deps I: Building the package -I: Running cd /build/reproducible-path/libjose4j-java-0.9.6/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-buildpackage -us -uc -b && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-genchanges -S > ../libjose4j-java_0.9.6-1_source.changes +I: user script /srv/workspace/pbuilder/3638218/tmp/hooks/A99_set_merged_usr starting +Not re-configuring usrmerge for trixie +I: user script /srv/workspace/pbuilder/3638218/tmp/hooks/A99_set_merged_usr finished +hostname: Name or service not known +I: Running cd /build/reproducible-path/libjose4j-java-0.9.6/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path" HOME="/nonexistent/second-build" dpkg-buildpackage -us -uc -b && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path" HOME="/nonexistent/second-build" dpkg-genchanges -S > ../libjose4j-java_0.9.6-1_source.changes dpkg-buildpackage: info: source package libjose4j-java dpkg-buildpackage: info: source version 0.9.6-1 dpkg-buildpackage: info: source distribution unstable @@ -1954,8 +1990,8 @@ [INFO] ------------------------------------------------------------------------ [INFO] BUILD SUCCESS [INFO] ------------------------------------------------------------------------ -[INFO] Total time: 7.043 s -[INFO] Finished at: 2026-01-19T14:20:46Z +[INFO] Total time: 23.942 s +[INFO] Finished at: 2026-01-19T14:25:54Z [INFO] ------------------------------------------------------------------------ dh_auto_test /usr/lib/jvm/default-java/bin/java -noverify -cp /usr/share/maven/boot/plexus-classworlds-2.x.jar -Dmaven.home=/usr/share/maven -Dmaven.multiModuleProjectDirectory=/build/reproducible-path/libjose4j-java-0.9.6 -Dclassworlds.conf=/etc/maven/m2-debian.conf -Dproperties.file.manual=/build/reproducible-path/libjose4j-java-0.9.6/debian/maven.properties org.codehaus.plexus.classworlds.launcher.Launcher -s/etc/maven/settings-debian.xml -Ddebian.dir=/build/reproducible-path/libjose4j-java-0.9.6/debian -Dmaven.repo.local=/build/reproducible-path/libjose4j-java-0.9.6/debian/maven-repo --batch-mode test @@ -1989,677 +2025,677 @@ [INFO] T E S T S [INFO] ------------------------------------------------------- [INFO] Running org.jose4j.http.GetTest -[WARNING] Tests run: 1, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.007 s - in org.jose4j.http.GetTest +[WARNING] Tests run: 1, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.015 s - in org.jose4j.http.GetTest [INFO] Running org.jose4j.examples.ExamplesTest -14:20:51.064 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:51.068 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:51.078 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:51.080 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:51.081 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:51.087 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:51.092 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:51.094 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:51.096 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:51.129 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 -14:20:51.129 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:20:51.130 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:51.131 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:51.132 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:51.139 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:51.143 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:51.147 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:51.148 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:51.154 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:51.155 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:51.179 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:51.180 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:51.187 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:51.188 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:51.189 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:51.194 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:51.198 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:51.202 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:51.205 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:51.207 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:51.208 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:51.209 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:51.215 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:51.217 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:51.219 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:51.219 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:51.219 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:51.221 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:51.221 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:51.223 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:51.224 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:51.226 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:51.226 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:51.227 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:51.228 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@5e5d171f registered for zip algorithm DEF -14:20:51.228 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:51.228 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 161ms -eyJhbGciOiJFUzI1NiJ9.VGhpcyBpcyBzb21lIHRleHQgdGhhdCBpcyB0byBiZSBzaWduZWQu.iJ0jQvsWQqvTH-w8GJy-pGAUBuBlaDGdws2UI4PIj3bwbiCSAkVs54Awed5ZIw9PQeOU1pZH1HJHPfkw1ndVuQ +14:26:07.942 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:07.954 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:07.978 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:07.978 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:07.979 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:07.986 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:07.996 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:07.998 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:07.999 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:08.033 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 +14:26:08.034 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +14:26:08.034 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:08.035 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:08.035 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:08.050 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:08.052 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:08.053 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:08.054 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:08.085 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:08.086 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:08.135 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:08.136 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:08.139 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:08.141 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:08.142 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:08.145 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:08.147 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:08.161 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:08.163 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:08.172 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:08.173 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:08.173 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:08.186 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:08.187 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:08.191 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:08.191 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:08.191 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:08.192 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:08.192 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:08.193 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:08.194 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:08.195 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:08.195 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:08.204 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:08.204 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@5e5d171f registered for zip algorithm DEF +14:26:08.204 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:08.204 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 251ms +eyJhbGciOiJFUzI1NiJ9.VGhpcyBpcyBzb21lIHRleHQgdGhhdCBpcyB0byBiZSBzaWduZWQu.FIdtHqYXf0SYK49o2l7PKlLm4cs3hYAkhkxFSuY7TlE0Xhqk6_W9kIt5XguTe0FLlnIJ1RHVw17eCibqqocCgw JWS Signature is valid: true JWS payload: PAYLOAD! -Serialized Encrypted JWE: eyJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.4X6URaCab02MAbVZu2aMQ-y9pCfVcmDRGTxY5pvAQJMn-_UvJG_bEg.iqKH1ZZ8atYG-zr7jGVhUg.T0JRKTc17KjRt5AUEc6xRQ.s3AR3u9rlT-8e90_vZU3VA +Serialized Encrypted JWE: eyJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0._WIdhHPhPZleVqU3hUb1eU5JfZOcrkY--l1hacrJnRUr7lkGfeMHog.tPrcnQpIS34k4jpE5IOPhg.H9sc-AUjGE_fPJkUsN1rkw.4an14n32_hlfW81a86QZBA Payload: Hello World! JWS Signature is valid: true JWS payload: This is some text that is to be signed. -JWT: eyJraWQiOiJrMSIsImFsZyI6IlJTMjU2In0.eyJpc3MiOiJJc3N1ZXIiLCJhdWQiOiJBdWRpZW5jZSIsImV4cCI6MTc2ODgzMzA1MSwianRpIjoiOGlZS3I1eGFla1JNazlpQmVrdFVnZyIsImlhdCI6MTc2ODgzMjQ1MSwibmJmIjoxNzY4ODMyMzMxLCJzdWIiOiJzdWJqZWN0IiwiZW1haWwiOiJtYWlsQGV4YW1wbGUuY29tIiwiZ3JvdXBzIjpbImdyb3VwLW9uZSIsIm90aGVyLWdyb3VwIiwiZ3JvdXAtdGhyZWUiXX0.EZyY6KrK7192NsogEE6woEgt3rGEDx2auGKkwIZcvNXiFLB3DNb8KflkcGQMTeH7TdZcoXazXKiJq-8VhSqw6RrHaZfoSmbRcTYNz-GvZDqdBLWIbqz_FmKG7k1m4gYmgpP1hgu6tUvF-FTc8KAmBMLEPQFNLVZ7dnzfctfSPHxzvtveDNcmBjvmUH_oefATbAZQ61NyUz5MkAbIk40IX5afsDvIThSM8ZSAsdhCXfb2qfQmufO-01FV9EC3nJ-3mja84l2KxQQg1XGcliQl1h7Ls86baybx103iSRCfzR2STf5Y4nzlOKSLFiLzi-DKknL9LZtkdJPrwIshgx6oFg -JWT validation succeeded! JWT Claims Set:{iss=Issuer, aud=Audience, exp=1768833051, jti=8iYKr5xaekRMk9iBektUgg, iat=1768832451, nbf=1768832331, sub=subject, email=mail@example.com, groups=[group-one, other-group, group-three]} -JWT: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJyZWNlaXZlcidzIGtleSIsImN0eSI6IkpXVCIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJYRHlPTUFmbFUxS3lLMHp6RFlCeDFIeUdtM3VMRTBOMUtuTGpnNFMyYkhFIiwieSI6IlR5RVc1VHFVcE1PWlpJM2p3LU1WVUcySzVtTVF2RlJiVjFVUURmdlF1ZEEiLCJjcnYiOiJQLTI1NiJ9fQ.J3WKtaruluQvnHMBmm-ZJHyS1lNdBNbn_QxOhIRSAuSXc-OzsS182w.yJS9cv8okO2xH41xYRhJjQ.TFh7XHZ3H9PRVXrDXiX8nKfx4S_tQ8hcGkHZ6yTWMAk9IpIE_92HVZiIOPGeHwe53uyrWAl6Itl2yKatGVtvDFfm00XBwOIynmI4Xs2WpUICwd7kXCwApe9QRJNs6kVu2UFUwImRl_xIu-wNU4Q74smc-0jxMfvSYbCjNYy5rO6UQgfiWFlnNvFbuHzdWDFIqyofG0-4ORhpiFOtHOzbISx6BF-1EGxzBlRXOnQUNm_5BVqZlC-Fr9DL-w2ekmEmQqLDOj81AKCSeVC8Tnbj5zhtWPSIpty6V3lFCq7_fLWwZ7Nh5zA-2hgpOAALOef4wvn8bVdzV1XgvGrRsqzQxSgoTXWVGxPtGm8QuDTeOWaO4j9j2bTsj0ejwT4nGNzu-GrntDJ5VwnuQs758QMZr-59zXLAC3YIYvwy_IRM1KGzr1e6zDk-cPR4ymLb12fDPiS9rgnbkdu0kSDDwGtL8LLvBV4nrftXiAwh2AJyLgAPFySQn66cVMgWd_RhJeRYiXZbCUKtDKkaL8WozdH8_otHNmU9UrKDbbFz5LbY3o0.CQLB-Ero3-MfN5ppKt0O6w -JWT validation succeeded! JWT Claims Set:{iss=sender, aud=receiver, exp=1768833051, jti=ov3qc7XODhGl00szw8N6qw, iat=1768832451, nbf=1768832331, sub=subject, email=mail@example.com, groups=[group-1, other-group, group-3]} -JWE compact serialization: eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..xK_DMTkMEaigT8ht6bQzMQ.EAIKnp9oak6QBrLJdEH_mY2QbMJlAZ9rb3eS8v39wcFZgJMIVjyGQjZ3xYkjIkC91GpU67vn81KoKdeiB664RA.pGg0cJVpEleXxLD9EejKog +JWT: eyJraWQiOiJrMSIsImFsZyI6IlJTMjU2In0.eyJpc3MiOiJJc3N1ZXIiLCJhdWQiOiJBdWRpZW5jZSIsImV4cCI6MTc2ODgzMzM2OSwianRpIjoiN3FMQ3luSklDOGdHaHVuTWJNVjNpdyIsImlhdCI6MTc2ODgzMjc2OSwibmJmIjoxNzY4ODMyNjQ5LCJzdWIiOiJzdWJqZWN0IiwiZW1haWwiOiJtYWlsQGV4YW1wbGUuY29tIiwiZ3JvdXBzIjpbImdyb3VwLW9uZSIsIm90aGVyLWdyb3VwIiwiZ3JvdXAtdGhyZWUiXX0.dGY0mLs62A-m1LG6v1mQnmQ2_k8kuMe25ZVd3B0X_1HbzUu6kMwky2IRozp_Vq5vD9V7saXafyW76gaXhYTf7NqdAALMPKaLjb_WtTuiXR-0l5a2z_hyv7Z8eoiX8OfKI2RYdaPOsd_AxiLP6d7WEUaMs4GesxqJmYkq5Ny6HCQKEF7P8XbyAq0EDTYtFS3smBzUZfCnxTGfSqK2VeK8-wH7lmCfoG_pQNS12Lc-gQ8Vb0QWATY9OsIaEUIW_zF5iUjlrG7u5YyaULvUjRY6JIXTtZK2xGzpMQzmPqaq7Kg6Jme9-iBXVWZkGlWTKI9nLmHKrrVieYmG87uezIcoWg +JWT validation succeeded! JWT Claims Set:{iss=Issuer, aud=Audience, exp=1768833369, jti=7qLCynJIC8gGhunMbMV3iw, iat=1768832769, nbf=1768832649, sub=subject, email=mail@example.com, groups=[group-one, other-group, group-three]} +JWT: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJyZWNlaXZlcidzIGtleSIsImN0eSI6IkpXVCIsImVwayI6eyJrdHkiOiJFQyIsIngiOiI5Z1l4OFdFUjl5Tzc2N3doYnhONm1YUVBQbjRjRC1HTk5WV0JIMTFLRDk0IiwieSI6IjFXa3FodGhMT3lKNzdzTlA0V0lzc0FIdlZoMWVRckZqNGtnRW95Q2RkMDQiLCJjcnYiOiJQLTI1NiJ9fQ.S2yN5g_HRPBTA-mOhkHdEzYs7qV_wa1tNJ7eA_tZG7IwK1fnIz_YuQ._LuRz4wkoo3XTZQe9tubMg.hctIvZkESozqtc1zvdslRCBS3GPJobprJs5iXiK2Xe4M56xbv99IE3J6FLl4w1LVQ1kOcwyRQBti0ZXXEAiF9i_kZ52X3bKpAT2FTsCUk11fYYvCFeCV61kNH4fFPGv5fmgfmrtSdOtmrVLCHnxlTxlntYYTwTk4fgoPSOEpUkGIsSAz6i83jcBydkyNRm31H363AuYCm3yUmrJsliwPQfSO_2UfXN-LF96zWOyRjTEsi_qieHwg6A3Eb8XjlQL7lbmXzwxAu_FL8kTfVAUT0gqcVCS7UDryirxK4GFNZYnuollHNb5jR0OdI3OLReZgvpCXCaoOG5MxgVwhnV1BPSm9DMVgAgW1V98lKSebOZxao4NQumg2xuncFMmylniR0xcyTPVdr-OiQS4BVx2aARAnqsjqb0jvSUaVhDMdyvQmHrhyw7Z6Vo0h6loGhQEpnKfwJiyFUKnj5iWteLq4fAwO9YErljnfDfvEHxN-lT5fsCtGv4dJbmNwiZs9B65Lro7uAD-rC5w1ih5rGSpL8yhir3TXjLSkfkBcumktPyw.PO_ZvY8ZogzMrKs1YOaMyg +JWT validation succeeded! JWT Claims Set:{iss=sender, aud=receiver, exp=1768833369, jti=chbwXa-vbh3IZLo0tJBQng, iat=1768832769, nbf=1768832649, sub=subject, email=mail@example.com, groups=[group-1, other-group, group-3]} +JWE compact serialization: eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..ohhbu2S5DE4KFY0gjLcbdg.XTR5E6FZG6m40ewOaczOXwwgGJQ8ZQbs3g7p-oZqg8enYGTrk2CAcmFoaj_5stZ6HeAMXdrpEYb83Tqtk8Lt0g.bP3t9CHksYBSzDDFRJwrTQ plaintext: Well, as of this moment, they're on DOUBLE SECRET PROBATION! -eyJhbGciOiJFUzI1NiIsImtpZCI6ImV4YW1wbGUiLCJiNjQiOmZhbHNlLCJjcml0IjpbImI2NCJdfQ..EK8W4jWrJtdyvoB09Qpp2MSNZKST-AC7qoayjXRDLXFc6fT2ltSxzuWBCHj5q2Cr3tY5ylX4Tm3exGVUXLY2Qg +eyJhbGciOiJFUzI1NiIsImtpZCI6ImV4YW1wbGUiLCJiNjQiOmZhbHNlLCJjcml0IjpbImI2NCJdfQ..xgtqveVLFbWCsRSzzhUVJkGYa1ZqV_ohdcgFCYQWWin7Ka-r8EBNzfqetvdYYqON7egs-zuX2-EJst8AX2RmAg this is the content that will be signed JWS Signature is valid: true -JWT: eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImtpZCI6InJlY2VpdmVyIGtleSIsImN0eSI6IkpXVCIsImVwayI6eyJrdHkiOiJPS1AiLCJjcnYiOiJYMjU1MTkiLCJ4IjoiTVhzRHZ1T0oteUFsWHJ4YU9iXzcydHVGOG53dzJxQmNwVmhjVkRHd0JudyJ9fQ..WOvAywbBQDl-CDJb_xjheA.s1TRLlM2zDkqEO4ZMuO890PLhc7JfvUbTI9LVBkMR1gizkA_wEOFft8avdeD2JB1k1xWEGDfS0HDWUT7mYQavBTSvsOdFcqPo8uqQdqmMiKP2TPsahpMyrAgLSceBjQAWnszSp3tmgvzFUwqem1nornkdgtCLeiNTYP0-ol5Fi-lg8qB0cUVjpTirCI4dlGhGy5YBwaF-2rVyXohm9JcqzEMNeh2MbADjsvSnfIZZ_J7yE4RPj9cL92YvJNqFCubC1hLj9MfbBlB6ibCxPsOjCNDyvUUyzxOBbAkAekpzn3kETuJdi0IOJJHbx9Vx_Qiq9WIais6RdpduBxjFTh4aBtGDzP3pgBlY4u120DyNRr3jtekV9FGhoknUAR31ODWvwZqqIuKzy2YVD1iGaSgYKVi-iOZQfZKhgnOT5ubiC-82dCZc1kzMYxCOjzYyMsqOTiLjch1D5d3kFJb9HxUqJnkcMKY3LGfMOSSVYabjZzCMQpF3gOyFTo8k4wCO6FsX87QFDBzJkh8qqIfP7AqkyvTbm_bvPe2oA0ARic4q-8igznnx7fh8ZSrOGZxbINWjhnGd6ZyXHn1VTVYhYGrsjw_mDycqqZPubSxvTeieqG_JwJlGd-EiYcRO4dhx2d5KHmtQtNF2rQxQtIxU1ZVkkGiIdkcLKACznaqxVDfAaBxKrbjAARAOF4QgWfd5TL5vXA6llXjxpq13awlYgoztQ.77Gztr8a1liIcWd4uQTBrQ -JWT validation succeeded! {"iss":"sender","aud":"receiver","exp":1768833051,"jti":"WYFxMPwE3KtgaTSuOzGlGw","iat":1768832451,"nbf":1768832331,"sub":"subject","email":"mail@example.com","groups":["group-1","other-group","group-3"],"address":{"street_address":"123 Main St","locality":"Anytown","region":"Anystate","country":"US"}} -[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.937 s - in org.jose4j.examples.ExamplesTest +JWT: eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImtpZCI6InJlY2VpdmVyIGtleSIsImN0eSI6IkpXVCIsImVwayI6eyJrdHkiOiJPS1AiLCJjcnYiOiJYMjU1MTkiLCJ4IjoiR0xCZnh5NlZkWVJyTHRTenc3ZHZGdUhQVWdoZ3lrMTRBUEhMSS1sOUJqayJ9fQ..pr65n0YLk95ZG6G3u02Gmg.QlGNhzUt3Noei4UGE1Be--Z_6zunSqBG1X6IZSFJA8LsVK-sST91C4hOtOupxcHKyLIMFb2DbGtV3brmxWtfmfbNeJM7EW8ZacYm8tuvTefOFhWpdYw3Bj9bJv0iLbX2QohfkVzcCuos3UvJfiRwsH22qVeTEgymx854uUl42X4ZmbnD5eTm0R4z-vBVg8cyQTXSqa2DmmkWlBW3hoGr0C_WEbQT8TNzRVrk_OYOJ4ja_kXWxbNdUc3ovMLBQEabPCPtudHpUz0RRdTKwiOdKE3sHWmt6BH0PyjUUjjZnPCNf8Lcx_Y-guW7jMPRaU_FM9d9Tmx8prEKOl-DTs3ACyDHXEdqk2ryFvZcJ6ojnkq7cfPQlfwV7QaHWGUYs0JK-4X0F5GOl5Ler6MGR6fXx66EroaOeebpU4bf6LmhjXdIoYSVKTzcr6BMpy3W6XcGz6eGbLBJZLN_VvzZqaQK8O5FMeTdM0WVSum07yi_M_w86EvJ_hjHZ582gu7lw9-NePt1u6IrNjamH8u3t7ChsFJfZKviHD5ZlFo6rEdFeqdcB7WJKSeu0JSFIhG-wfaKNrfjpqs5m9DXIhJyugy4nrRSLXImJKFlQe8BoX4x7_Cm8nE79wNao1sl6Rzs1E9KItn3A4cXETHaxXlAuzvaAmFIDjfsR-ATusBnu0pvrWcq4dGNc6mmR4StCJhufXFmUNmv4O79SdCaLy_Ne2HBKA.sxyj2HP0gyrmzy5JTEEDDA +JWT validation succeeded! {"iss":"sender","aud":"receiver","exp":1768833369,"jti":"lkFfL0mylk2kKY1wW4T3Xw","iat":1768832769,"nbf":1768832649,"sub":"subject","email":"mail@example.com","groups":["group-1","other-group","group-3"],"address":{"street_address":"123 Main St","locality":"Anytown","region":"Anystate","country":"US"}} +[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 2.95 s - in org.jose4j.examples.ExamplesTest [INFO] Running org.jose4j.zip.DeflateRFC1951CompressionAlgorithmTest -14:20:51.794 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:52.464 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithmTest - Expected exception because this tests going over the max allowed size of decompressed data org.jose4j.lang.JoseException: Maximum allowed size of decompressed data exceeded (which is 204800 bytes but configurable with the org.jose4j.zip.decompress-max-bytes system property) -14:20:52.465 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:52.474 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:52.475 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.679 s - in org.jose4j.zip.DeflateRFC1951CompressionAlgorithmTest +14:26:10.108 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:11.635 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithmTest - Expected exception because this tests going over the max allowed size of decompressed data org.jose4j.lang.JoseException: Maximum allowed size of decompressed data exceeded (which is 204800 bytes but configurable with the org.jose4j.zip.decompress-max-bytes system property) +14:26:11.644 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:11.645 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:11.645 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.563 s - in org.jose4j.zip.DeflateRFC1951CompressionAlgorithmTest [INFO] Running org.jose4j.json.JsonUtilTest {"char array":["a","\\","\""],"some object":"java.lang.Object@62230c58","nested":{"chars":["\"","m","e","h"]},"nested also":{"obj":"java.util.Random@2cd2a21f"}} -14:20:52.488 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.util.Map (java.util.ArrayList and java.util.Map are in module java.base of loader 'bootstrap') -14:20:52.488 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.Boolean cannot be cast to class java.util.Map (java.lang.Boolean and java.util.Map are in module java.base of loader 'bootstrap') -14:20:52.488 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.String cannot be cast to class java.util.Map (java.lang.String and java.util.Map are in module java.base of loader 'bootstrap') -14:20:52.488 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.Long cannot be cast to class java.util.Map (java.lang.Long and java.util.Map are in module java.base of loader 'bootstrap') -14:20:52.489 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Parsing returned null -[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.json.JsonUtilTest +14:26:11.671 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.util.Map (java.util.ArrayList and java.util.Map are in module java.base of loader 'bootstrap') +14:26:11.671 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.Boolean cannot be cast to class java.util.Map (java.lang.Boolean and java.util.Map are in module java.base of loader 'bootstrap') +14:26:11.671 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.String cannot be cast to class java.util.Map (java.lang.String and java.util.Map are in module java.base of loader 'bootstrap') +14:26:11.671 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.Long cannot be cast to class java.util.Map (java.lang.Long and java.util.Map are in module java.base of loader 'bootstrap') +14:26:11.671 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Parsing returned null +[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.021 s - in org.jose4j.json.JsonUtilTest [INFO] Running org.jose4j.lang.MathsTest -[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.007 s - in org.jose4j.lang.MathsTest +[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.009 s - in org.jose4j.lang.MathsTest [INFO] Running org.jose4j.lang.ByteUtilTest -14:20:52.521 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (2147483647) for converting to bit length -14:20:52.521 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-2147483648) for converting to bit length -14:20:52.521 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (268435456) for converting to bit length -14:20:52.521 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870929) for converting to bit length -14:20:52.521 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870920) for converting to bit length -14:20:52.521 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870928) for converting to bit length -14:20:52.521 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-1) for converting to bit length -14:20:52.521 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-536870928) for converting to bit length -[INFO] Tests run: 31, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.02 s - in org.jose4j.lang.ByteUtilTest +14:26:11.733 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (2147483647) for converting to bit length +14:26:11.733 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-2147483648) for converting to bit length +14:26:11.733 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (268435456) for converting to bit length +14:26:11.733 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870929) for converting to bit length +14:26:11.733 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870920) for converting to bit length +14:26:11.733 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870928) for converting to bit length +14:26:11.733 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-1) for converting to bit length +14:26:11.733 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-536870928) for converting to bit length +[INFO] Tests run: 31, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.056 s - in org.jose4j.lang.ByteUtilTest [INFO] Running org.jose4j.lang.JsonHelpTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.007 s - in org.jose4j.lang.JsonHelpTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.lang.JsonHelpTest [INFO] Running org.jose4j.cookbook.JoseCookbookTest -[INFO] Tests run: 22, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.97 s - in org.jose4j.cookbook.JoseCookbookTest +[INFO] Tests run: 22, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.982 s - in org.jose4j.cookbook.JoseCookbookTest [INFO] Running org.jose4j.jwa.AlgorithmFactoryTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.014 s - in org.jose4j.jwa.AlgorithmFactoryTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.008 s - in org.jose4j.jwa.AlgorithmFactoryTest [INFO] Running org.jose4j.jwa.AlgorithmConstraintsTest -[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.01 s - in org.jose4j.jwa.AlgorithmConstraintsTest +[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.015 s - in org.jose4j.jwa.AlgorithmConstraintsTest [INFO] Running org.jose4j.jwx.HeadersTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwx.HeadersTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.006 s - in org.jose4j.jwx.HeadersTest [INFO] Running org.jose4j.jwx.CompactSerializerTest -[INFO] Tests run: 11, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwx.CompactSerializerTest +[INFO] Tests run: 11, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.018 s - in org.jose4j.jwx.CompactSerializerTest [INFO] Running org.jose4j.jwx.JsonWebStructureTest -[INFO] Tests run: 12, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.021 s - in org.jose4j.jwx.JsonWebStructureTest +[INFO] Tests run: 12, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.048 s - in org.jose4j.jwx.JsonWebStructureTest [INFO] Running org.jose4j.base64url.internal.apache.commons.codec.binary.Base64Test -[INFO] Tests run: 47, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.056 s - in org.jose4j.base64url.internal.apache.commons.codec.binary.Base64Test +[INFO] Tests run: 47, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.076 s - in org.jose4j.base64url.internal.apache.commons.codec.binary.Base64Test [INFO] Running org.jose4j.jca.ProviderContextTest -14:20:53.655 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:53.655 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21, BC version 1.77] security providers installed)... -14:20:53.655 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:53.656 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:53.656 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:53.656 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:53.656 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:53.656 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:53.656 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:53.656 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:53.656 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 -14:20:53.656 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:20:53.656 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:53.657 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:53.657 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:53.660 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:53.662 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:53.665 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:53.665 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:53.665 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:53.665 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:53.666 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:53.667 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:53.667 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:53.667 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:53.667 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:53.674 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:53.681 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:53.687 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:53.693 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:53.693 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:53.693 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:53.693 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:53.694 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:53.694 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:53.694 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:53.694 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:53.694 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:53.694 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:53.695 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:53.695 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:53.695 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:53.695 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:53.695 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:53.695 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:53.695 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@14f232c4 registered for zip algorithm DEF -14:20:53.695 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:53.696 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 41ms -14:20:53.747 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:53.748 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:53.748 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:53.748 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:53.748 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:53.748 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:53.748 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:53.748 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:53.748 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:53.748 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:53.749 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 -14:20:53.749 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:20:53.749 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:53.749 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:53.749 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:53.750 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:53.750 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:53.751 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:53.751 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:53.751 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:53.751 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:53.751 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:53.752 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:53.752 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:53.752 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:53.753 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:53.754 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:53.755 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:53.756 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:53.757 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:53.757 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:53.757 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:53.758 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:53.758 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:53.758 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:53.759 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:53.759 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:53.760 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:53.760 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:53.760 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:53.760 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:53.760 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:53.761 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:53.761 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:53.761 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:53.761 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@78aa1f72 registered for zip algorithm DEF -14:20:53.761 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:53.761 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 13ms -14:20:53.784 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:53.784 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21, BC version 1.77] security providers installed)... -14:20:53.784 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:53.784 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:53.784 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:53.784 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:53.784 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:53.784 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:53.784 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:53.784 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:53.785 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 -14:20:53.785 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:20:53.785 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:53.785 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:53.785 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:53.787 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:53.789 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:53.792 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:53.792 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:53.793 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:53.793 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:53.793 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:53.793 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:53.794 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:53.794 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:53.794 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:53.799 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:53.805 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:53.810 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:53.815 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:53.815 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:53.816 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:53.816 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:53.816 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:53.816 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:53.816 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:53.816 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:53.817 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:53.817 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:53.817 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:53.817 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:53.817 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:53.818 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:53.818 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:53.818 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:53.818 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@6304101a registered for zip algorithm DEF -14:20:53.818 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:53.818 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 34ms -14:20:53.822 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:53.822 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:53.822 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:53.822 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:53.822 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:53.822 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:53.822 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:53.822 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:53.822 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:53.822 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:53.823 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 -14:20:53.823 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:20:53.824 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:53.824 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:53.824 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:53.824 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:53.825 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:53.826 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:53.826 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:53.826 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:53.826 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:53.827 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:53.827 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:53.828 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:53.828 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:53.828 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:53.830 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:53.831 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:53.834 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:53.836 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:53.836 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:53.836 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:53.837 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:53.837 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:53.837 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:53.838 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:53.838 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:53.838 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:53.838 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:53.838 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:53.838 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:53.839 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:53.839 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:53.839 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:53.839 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:53.839 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@2812b107 registered for zip algorithm DEF -14:20:53.846 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:53.847 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 25ms -[INFO] Tests run: 12, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.307 s - in org.jose4j.jca.ProviderContextTest +14:26:14.019 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:14.019 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21, BC version 1.77] security providers installed)... +14:26:14.019 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:14.019 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:14.019 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:14.019 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:14.019 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:14.019 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:14.019 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:14.020 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:14.028 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 +14:26:14.028 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +14:26:14.028 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:14.029 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:14.029 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:14.032 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:14.034 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:14.049 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:14.049 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:14.050 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:14.050 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:14.051 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:14.051 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:14.051 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:14.051 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:14.051 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:14.076 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:14.083 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:14.106 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:14.121 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:14.121 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:14.121 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:14.121 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:14.121 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:14.122 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:14.122 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:14.122 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:14.122 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:14.122 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:14.122 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:14.122 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:14.122 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:14.123 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:14.123 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:14.123 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:14.123 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@14f232c4 registered for zip algorithm DEF +14:26:14.123 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:14.123 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 104ms +14:26:14.254 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:14.254 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:14.254 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:14.254 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:14.254 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:14.254 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:14.254 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:14.254 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:14.254 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:14.255 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:14.255 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 +14:26:14.255 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +14:26:14.255 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:14.255 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:14.255 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:14.256 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:14.268 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:14.269 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:14.269 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:14.269 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:14.269 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:14.278 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:14.278 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:14.278 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:14.278 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:14.278 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:14.279 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:14.280 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:14.282 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:14.285 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:14.285 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:14.285 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:14.285 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:14.285 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:14.286 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:14.286 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:14.286 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:14.286 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:14.286 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:14.286 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:14.286 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:14.286 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:14.287 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:14.287 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:14.287 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:14.287 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@78aa1f72 registered for zip algorithm DEF +14:26:14.287 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:14.287 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 33ms +14:26:14.356 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:14.368 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21, BC version 1.77] security providers installed)... +14:26:14.368 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:14.368 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:14.368 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:14.368 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:14.368 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:14.368 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:14.368 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:14.368 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:14.369 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 +14:26:14.369 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +14:26:14.369 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:14.369 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:14.369 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:14.371 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:14.385 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:14.388 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:14.400 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:14.400 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:14.400 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:14.401 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:14.401 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:14.401 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:14.401 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:14.401 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:14.423 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:14.461 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:14.471 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:14.484 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:14.485 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:14.485 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:14.485 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:14.485 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:14.485 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:14.486 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:14.486 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:14.486 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:14.486 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:14.486 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:14.486 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:14.486 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:14.486 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:14.486 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:14.487 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:14.487 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@6304101a registered for zip algorithm DEF +14:26:14.487 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:14.487 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 119ms +14:26:14.499 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:14.499 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:14.499 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:14.499 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:14.499 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:14.499 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:14.499 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:14.499 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:14.499 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:14.499 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:14.500 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 +14:26:14.500 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +14:26:14.504 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:14.504 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:14.504 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:14.505 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:14.505 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:14.506 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:14.506 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:14.506 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:14.506 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:14.506 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:14.507 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:14.507 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:14.507 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:14.507 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:14.507 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:14.524 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:14.526 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:14.526 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:14.527 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:14.527 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:14.527 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:14.527 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:14.527 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:14.527 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:14.527 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:14.527 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:14.527 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:14.527 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:14.528 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:14.536 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:14.536 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:14.536 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:14.536 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:14.536 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@2812b107 registered for zip algorithm DEF +14:26:14.536 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:14.536 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 37ms +[INFO] Tests run: 12, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.97 s - in org.jose4j.jca.ProviderContextTest [INFO] Running org.jose4j.jwe.Aes128KeyWrapManagementAlgorithmTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwe.Aes128KeyWrapManagementAlgorithmTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.027 s - in org.jose4j.jwe.Aes128KeyWrapManagementAlgorithmTest [INFO] Running org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithmTest -eyJhbGciOiJQQkVTMi1IUzI1NitBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwicDJjIjo2NTUzNiwicDJzIjoiQ1BVdmxmM1hXblZoMEJ5TiJ9.bfMm6RkRn0RBNDWln6Lji6IpR0izFoH5sSpN41Ib94lL9uZ7Z9cy9g.JqqqLYHycvygw9ycDKq8Ow.s6ZjTBpEWt1ltOVwOjN4MA.V7g9af4K0BNO7SLg_b9ooA -14:20:54.963 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'PBES2-HS512+A256KW' is a blocked algorithm.): eyJhbGciOiJQQkVTMi1IUzUxMitBMjU2S1ciLCJwMnMiOiI4UTFTemluYXNSM3hjaFl6NlpaY0hBIiwicDJjIjoyMTQ3NDgzNjQ3LCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.YKbKLsEoyw_JoNvhtuHo9aaeRNSEhhAW2OVHcuF_HLqS0n6hA_fgCA.VBiCzVHNoLiR3F4V82uoTQ.23i-Tb1AV4n0WKVSSgcQrdg6GRqsUKxjruHXYsTHAJLZ2nsnGIX86vMXqIi6IRsfywCRFzLxEcZBRnTvG3nhzPk0GDD7FMyXhUHpDjEYCNA_XOmzg8yZR9oyjo6lTF6si4q9FZ2EhzgFQCLO_6h5EVg3vR75_hkBsnuoqoM3dwejXBtIodN84PeqMb6asmas_dpSsz7H10fC5ni9xIz424givB1YLldF6exVmL93R3fOoOJbmk2GBQZL_SEGllv2cQsBgeprARsaQ7Bq99tT80coH8ItBjgV08AtzXFFsx9qKvC982KLKdPQMTlVJKkqtV4Ru5LEVpBZXBnZrtViSOgyg6AiuwaS-rCrcD_ePOGSuxvgtrokAKYPqmXUeRdjFJwafkYEkiuDCV9vWGAi1DH2xTafhJwcmywIyzi4BqRpmdn_N-zl5tuJYyuvKhjKv6ihbsV_k1hJGPGAxJ6wUpmwC4PTQ2izEm0TuSE8oMKdTw8V3kobXZ77ulMwDs4p.ALTKwxvAefeL-32NY7eTAQ] -14:20:54.964 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: PBES2 iteration count (p2c=2147483647) cannot be more than 2499999 to avoid excessive resource utilization.): eyJhbGciOiJQQkVTMi1IUzUxMitBMjU2S1ciLCJwMnMiOiI4UTFTemluYXNSM3hjaFl6NlpaY0hBIiwicDJjIjoyMTQ3NDgzNjQ3LCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.YKbKLsEoyw_JoNvhtuHo9aaeRNSEhhAW2OVHcuF_HLqS0n6hA_fgCA.VBiCzVHNoLiR3F4V82uoTQ.23i-Tb1AV4n0WKVSSgcQrdg6GRqsUKxjruHXYsTHAJLZ2nsnGIX86vMXqIi6IRsfywCRFzLxEcZBRnTvG3nhzPk0GDD7FMyXhUHpDjEYCNA_XOmzg8yZR9oyjo6lTF6si4q9FZ2EhzgFQCLO_6h5EVg3vR75_hkBsnuoqoM3dwejXBtIodN84PeqMb6asmas_dpSsz7H10fC5ni9xIz424givB1YLldF6exVmL93R3fOoOJbmk2GBQZL_SEGllv2cQsBgeprARsaQ7Bq99tT80coH8ItBjgV08AtzXFFsx9qKvC982KLKdPQMTlVJKkqtV4Ru5LEVpBZXBnZrtViSOgyg6AiuwaS-rCrcD_ePOGSuxvgtrokAKYPqmXUeRdjFJwafkYEkiuDCV9vWGAi1DH2xTafhJwcmywIyzi4BqRpmdn_N-zl5tuJYyuvKhjKv6ihbsV_k1hJGPGAxJ6wUpmwC4PTQ2izEm0TuSE8oMKdTw8V3kobXZ77ulMwDs4p.ALTKwxvAefeL-32NY7eTAQ] -14:20:54.964 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'PBES2-HS512+A256KW' is a blocked algorithm.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTNTEyK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJwMnMiOiJGbVE0aDY1aUFlZEs0SUFyIn0._P2Mbn0nvqRZVCaEaLnKQkMFwGNmEVbm8Ffnb5uIas0iAt5wcWC3T7rdTwyliWW11YnhpaiXH0WRalAsIUyaVHC4Ku1j9bVP.Tg2KOblqWEF9iC71O-WgBw.OCjt9WYrTFMIst7XBZ8HeA.YRqs3_nMchYr39AJYquQs8-PrZa2NGuqshOvtLfWSvE] -14:20:54.964 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: PBES2 iteration count (p2c=2500000) cannot be more than 2499999 to avoid excessive resource utilization.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTNTEyK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJwMnMiOiJGbVE0aDY1aUFlZEs0SUFyIn0._P2Mbn0nvqRZVCaEaLnKQkMFwGNmEVbm8Ffnb5uIas0iAt5wcWC3T7rdTwyliWW11YnhpaiXH0WRalAsIUyaVHC4Ku1j9bVP.Tg2KOblqWEF9iC71O-WgBw.OCjt9WYrTFMIst7XBZ8HeA.YRqs3_nMchYr39AJYquQs8-PrZa2NGuqshOvtLfWSvE] -14:20:54.964 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'PBES2-HS384+A192KW' is a blocked algorithm.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTMzg0K0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJwMnMiOiJneXBKYzJFVXNtbmNqTUtqIn0.RYXJhCW2m4Pa5XPUPVVQVJRg8z-jj-zyXoa-Q1JzdfjO2tvrELM7Ko3qhkv2WcUAw3ZagzIeNjY.FhNCr7zjUt0fA6KotCbdUw.DMYLybjcrOX9cfwdWaORLg.QCGY9clkv4sz1rZeexg2dUx4ViH-BeL7 +eyJhbGciOiJQQkVTMi1IUzI1NitBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwicDJjIjo2NTUzNiwicDJzIjoiX2FteHhyMFZIYWJuVGpZSSJ9.PAnJG9HdhpDgh_X8A5PsCBnO90WgacxwspOPkK0Dzf7FBWlCZkkXZg.HvszdSDPzoA2HjI7bfSyVA.ebg72qPefyfaKayBF5sKjg.czSnThfBpgYKJdLD1L0Mhw +14:26:18.204 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'PBES2-HS512+A256KW' is a blocked algorithm.): eyJhbGciOiJQQkVTMi1IUzUxMitBMjU2S1ciLCJwMnMiOiI4UTFTemluYXNSM3hjaFl6NlpaY0hBIiwicDJjIjoyMTQ3NDgzNjQ3LCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.YKbKLsEoyw_JoNvhtuHo9aaeRNSEhhAW2OVHcuF_HLqS0n6hA_fgCA.VBiCzVHNoLiR3F4V82uoTQ.23i-Tb1AV4n0WKVSSgcQrdg6GRqsUKxjruHXYsTHAJLZ2nsnGIX86vMXqIi6IRsfywCRFzLxEcZBRnTvG3nhzPk0GDD7FMyXhUHpDjEYCNA_XOmzg8yZR9oyjo6lTF6si4q9FZ2EhzgFQCLO_6h5EVg3vR75_hkBsnuoqoM3dwejXBtIodN84PeqMb6asmas_dpSsz7H10fC5ni9xIz424givB1YLldF6exVmL93R3fOoOJbmk2GBQZL_SEGllv2cQsBgeprARsaQ7Bq99tT80coH8ItBjgV08AtzXFFsx9qKvC982KLKdPQMTlVJKkqtV4Ru5LEVpBZXBnZrtViSOgyg6AiuwaS-rCrcD_ePOGSuxvgtrokAKYPqmXUeRdjFJwafkYEkiuDCV9vWGAi1DH2xTafhJwcmywIyzi4BqRpmdn_N-zl5tuJYyuvKhjKv6ihbsV_k1hJGPGAxJ6wUpmwC4PTQ2izEm0TuSE8oMKdTw8V3kobXZ77ulMwDs4p.ALTKwxvAefeL-32NY7eTAQ] +14:26:18.216 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: PBES2 iteration count (p2c=2147483647) cannot be more than 2499999 to avoid excessive resource utilization.): eyJhbGciOiJQQkVTMi1IUzUxMitBMjU2S1ciLCJwMnMiOiI4UTFTemluYXNSM3hjaFl6NlpaY0hBIiwicDJjIjoyMTQ3NDgzNjQ3LCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.YKbKLsEoyw_JoNvhtuHo9aaeRNSEhhAW2OVHcuF_HLqS0n6hA_fgCA.VBiCzVHNoLiR3F4V82uoTQ.23i-Tb1AV4n0WKVSSgcQrdg6GRqsUKxjruHXYsTHAJLZ2nsnGIX86vMXqIi6IRsfywCRFzLxEcZBRnTvG3nhzPk0GDD7FMyXhUHpDjEYCNA_XOmzg8yZR9oyjo6lTF6si4q9FZ2EhzgFQCLO_6h5EVg3vR75_hkBsnuoqoM3dwejXBtIodN84PeqMb6asmas_dpSsz7H10fC5ni9xIz424givB1YLldF6exVmL93R3fOoOJbmk2GBQZL_SEGllv2cQsBgeprARsaQ7Bq99tT80coH8ItBjgV08AtzXFFsx9qKvC982KLKdPQMTlVJKkqtV4Ru5LEVpBZXBnZrtViSOgyg6AiuwaS-rCrcD_ePOGSuxvgtrokAKYPqmXUeRdjFJwafkYEkiuDCV9vWGAi1DH2xTafhJwcmywIyzi4BqRpmdn_N-zl5tuJYyuvKhjKv6ihbsV_k1hJGPGAxJ6wUpmwC4PTQ2izEm0TuSE8oMKdTw8V3kobXZ77ulMwDs4p.ALTKwxvAefeL-32NY7eTAQ] +14:26:18.216 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'PBES2-HS512+A256KW' is a blocked algorithm.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTNTEyK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJwMnMiOiJGbVE0aDY1aUFlZEs0SUFyIn0._P2Mbn0nvqRZVCaEaLnKQkMFwGNmEVbm8Ffnb5uIas0iAt5wcWC3T7rdTwyliWW11YnhpaiXH0WRalAsIUyaVHC4Ku1j9bVP.Tg2KOblqWEF9iC71O-WgBw.OCjt9WYrTFMIst7XBZ8HeA.YRqs3_nMchYr39AJYquQs8-PrZa2NGuqshOvtLfWSvE] +14:26:18.217 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: PBES2 iteration count (p2c=2500000) cannot be more than 2499999 to avoid excessive resource utilization.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTNTEyK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJwMnMiOiJGbVE0aDY1aUFlZEs0SUFyIn0._P2Mbn0nvqRZVCaEaLnKQkMFwGNmEVbm8Ffnb5uIas0iAt5wcWC3T7rdTwyliWW11YnhpaiXH0WRalAsIUyaVHC4Ku1j9bVP.Tg2KOblqWEF9iC71O-WgBw.OCjt9WYrTFMIst7XBZ8HeA.YRqs3_nMchYr39AJYquQs8-PrZa2NGuqshOvtLfWSvE] +14:26:18.217 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'PBES2-HS384+A192KW' is a blocked algorithm.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTMzg0K0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJwMnMiOiJneXBKYzJFVXNtbmNqTUtqIn0.RYXJhCW2m4Pa5XPUPVVQVJRg8z-jj-zyXoa-Q1JzdfjO2tvrELM7Ko3qhkv2WcUAw3ZagzIeNjY.FhNCr7zjUt0fA6KotCbdUw.DMYLybjcrOX9cfwdWaORLg.QCGY9clkv4sz1rZeexg2dUx4ViH-BeL7 ] -14:20:54.964 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: PBES2 iteration count (p2c=2500000) cannot be more than 2499999 to avoid excessive resource utilization.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTMzg0K0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJwMnMiOiJneXBKYzJFVXNtbmNqTUtqIn0.RYXJhCW2m4Pa5XPUPVVQVJRg8z-jj-zyXoa-Q1JzdfjO2tvrELM7Ko3qhkv2WcUAw3ZagzIeNjY.FhNCr7zjUt0fA6KotCbdUw.DMYLybjcrOX9cfwdWaORLg.QCGY9clkv4sz1rZeexg2dUx4ViH-BeL7 +14:26:18.217 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: PBES2 iteration count (p2c=2500000) cannot be more than 2499999 to avoid excessive resource utilization.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTMzg0K0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJwMnMiOiJneXBKYzJFVXNtbmNqTUtqIn0.RYXJhCW2m4Pa5XPUPVVQVJRg8z-jj-zyXoa-Q1JzdfjO2tvrELM7Ko3qhkv2WcUAw3ZagzIeNjY.FhNCr7zjUt0fA6KotCbdUw.DMYLybjcrOX9cfwdWaORLg.QCGY9clkv4sz1rZeexg2dUx4ViH-BeL7 ] -[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.991 s - in org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithmTest +[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 3.229 s - in org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithmTest [INFO] Running org.jose4j.jwe.InvalidCurveTest -14:20:54.967 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key is equal to 26 mod 113 -14:20:54.967 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w -14:20:54.967 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as expected: org.jose4j.lang.InvalidKeyException: epk is invalid for P-256 -14:20:54.967 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key is equal to 2446 mod 2447 -14:20:54.967 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w -14:20:54.968 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as expected: org.jose4j.lang.InvalidKeyException: epk is invalid for P-256 -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.InvalidCurveTest +14:26:18.219 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key is equal to 26 mod 113 +14:26:18.219 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w +14:26:18.219 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as expected: org.jose4j.lang.InvalidKeyException: epk is invalid for P-256 +14:26:18.219 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key is equal to 2446 mod 2447 +14:26:18.219 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w +14:26:18.219 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as expected: org.jose4j.lang.InvalidKeyException: epk is invalid for P-256 +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.jwe.InvalidCurveTest [INFO] Running org.jose4j.jwe.JweCryptoPrimitiveTest -14:20:54.971 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getCipher(): Cipher.RSA/ECB/OAEPWithSHA-1AndMGF1Padding, mode: key unwrapping, algorithm from: SunJCE -14:20:55.000 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@7674b62c -14:20:55.005 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@19e7a160 -14:20:55.011 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@662706a7 -14:20:55.012 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKey(): 256 bit AES key -14:20:55.013 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getCipher(): Cipher.AESWrap, mode: key unwrapping, algorithm from: SunJCE -14:20:55.052 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKey(): javax.crypto.spec.SecretKeySpec@fffe8fc5 -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.084 s - in org.jose4j.jwe.JweCryptoPrimitiveTest +14:26:18.251 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getCipher(): Cipher.RSA/ECB/OAEPWithSHA-1AndMGF1Padding, mode: key unwrapping, algorithm from: SunJCE +14:26:18.368 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@7674b62c +14:26:18.389 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@19e7a160 +14:26:18.411 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@662706a7 +14:26:18.425 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKey(): 256 bit AES key +14:26:18.425 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getCipher(): Cipher.AESWrap, mode: key unwrapping, algorithm from: SunJCE +14:26:18.550 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKey(): javax.crypto.spec.SecretKeySpec@fffe8164 +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.295 s - in org.jose4j.jwe.JweCryptoPrimitiveTest [INFO] Running org.jose4j.jwe.EcdhKeyAgreementAlgorithmTest -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.023 s - in org.jose4j.jwe.EcdhKeyAgreementAlgorithmTest +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.137 s - in org.jose4j.jwe.EcdhKeyAgreementAlgorithmTest [INFO] Running org.jose4j.jwe.NegativeJweWrappingTest -14:20:55.091 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap/decrypt failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:383); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:475); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted... -14:20:55.092 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ -14:20:55.096 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap/decrypt failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:383); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:475); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted... -14:20:55.096 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ -14:20:55.100 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed. -14:20:55.103 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed. -14:20:55.107 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=FlleGhb7Jp-VlWS1wonqsA -14:20:55.111 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ -14:20:55.115 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.InvalidKeyException: 256 bit content encryption key is not the correct size for the A192CBC-HS384 content encryption algorithm (384). -eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.SMbg3HCRfbxbCara5dDxYa4VO8zwJbDUDjEVLpBgsFl9t_-4M3PJs9amhaOicTbraMs2s2C_aB9IH5f39VBopLB3vxZi3iQ38xeVU0YsGFBcL9MGYu13e87n86TWyQM5lnKebIXEsjsDD93LlcjTIVzSMojrTpgeeU92QkhYL3j0-rkkNWHw6_8k11s9Pguzu53Y8NUvVydaOBgU9r6Zbs2IaoT_1hR6dQN3vJhxXwGF7AZe86pYrg2JXM6HiT9aui08dg16g6vZe4ZSvx70Fz9i3i7NRIUYNi17fuToQDDT9VFWvRi3gGP02XD-Dq8X1dbJrRPirYdTFpJh_M-iYA.LJDL3N6UGY8u6PxAdJzveg.sVWF5SpMZRrC-oPSeAaPMeTyPo_1ZJBg8qB6YLYu3wDG9DSyghupvi4j_oD8oYla00465_Rvdp1t5zNMZv23EWhaUs3eICHbxvqRkFa4KB0.4xYz_6uvgDDvXei3OJsnsw -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.027 s - in org.jose4j.jwe.NegativeJweWrappingTest +14:26:18.719 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap/decrypt failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:383); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:475); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted... +14:26:18.719 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ +14:26:18.731 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap/decrypt failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:383); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:475); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted... +14:26:18.731 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ +14:26:18.736 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed. +14:26:18.744 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed. +14:26:18.752 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=FlleGhb7Jp-VlWS1wonqsA +14:26:18.761 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ +14:26:18.767 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.InvalidKeyException: 256 bit content encryption key is not the correct size for the A192CBC-HS384 content encryption algorithm (384). +eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.MAPlOEDnoRx9DOi8bhoWu2bVMqMe9gnhFaWIq_82ZVXaBs4xZud1Yz84AjicLnGbn-Jh4rp6Fk02tjFnATUNU6h6NQfHFGLqjeGt8r4PV8hOmjyvG-m_2F4_FzopTblVFFL1uhlb7DcbPw09TiIAJg7YCWz20BMEJ3EEc5Tkff0yvEe0dnG3KdZCJbz5aEV2X4WoaQt3OjOXS5xUFTTiBY0LL9Bu9kiryxo7qWUA3UUa7fQK0TCen3pw0j17RBBquOOioYo0S1uUVSogudhUg4giuuljtb9YJ2J3xN_Qj1V2Ov7cONBVYE12de99IIok7zu-8o_X9ViNspVUKHMN-w.1Oi_iUYd9XjHC-bDAOq7uQ.AgJkN_ZE7hK4l599o0JQ154aYcqbIUe7t8MVgrpZl8ryBRUbdyOHl3qstsYirRNWc1RxIBcTQyaHMCXBf0qawGz3uf9QGNy7D9d6Y6fuYU4.IwVcZt5VG96rL5Qzx1xyEw +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.068 s - in org.jose4j.jwe.NegativeJweWrappingTest [INFO] Running org.jose4j.jwe.GeneralJweTest [INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.GeneralJweTest [INFO] Running org.jose4j.jwe.CritHeaderTest -14:20:55.121 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'so.crit' marked as critical. -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.CritHeaderTest +14:26:18.792 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'so.crit' marked as critical. +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.019 s - in org.jose4j.jwe.CritHeaderTest [INFO] Running org.jose4j.jwe.XEcdhTest -{"kty":"OKP","crv":"X25519","x":"MCIcAHnyKc5hyYDb81c4VQ7pcZVTFmGCqF7A-qV-9jM","d":"_WT0B6XvfPXUmXarepa821gbqcIR20KpRsvzKfP-QNY"} -eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJPS1AiLCJjcnYiOiJYMjU1MTkiLCJ4IjoiTkdrcktTeVc4anZHejRlWHRKQkZvQUpzVmt2bXJUWTk2YUVib1pDUU1oMCJ9fQ..UUmHM82m71PM8TyAA35u_A.yxtbbhtmiA4uKWU25FRMvCRovpg2WVU6WAXkdj5S0p9yaOGfhRKUSEG1IwjNldpS.BzknbrZIJiDD3N1jldd2mg -eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiT0tQIiwiY3J2IjoiWDQ0OCIsIngiOiI4TTdFV1ZMYmhMQW1TZmpOMWZka1VnMlBDdUZLMXJ2VjdlbVF3aHk1bklpbGJaNmUtUDFIeFlSbTljRkJLaEFCanJQYTNjbEhidjhBIn19.SmH4Fj-LR97k8BGP6HDaB-4uPPzUYvdww8wweMjZ3LQZG1aAjmp7RJPtirCn-TExZVL2lEqRxOV8kSbMzBWwGuK4ExLkXnYC.W3QVMg1w3loclMS0zG5n6Q.pbxUGxNYCVSGCUytOewlA30ixcClFgaRP0RYCPI1WZWchcS1bzBZ7S4RHcMQu5yh.scdM4G0F0DHvlVk0x3shuyALWQJr_Z08_IN4vzEcF3o -[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.017 s - in org.jose4j.jwe.XEcdhTest +{"kty":"OKP","crv":"X25519","x":"o8rHkh5i3HmsmQMlcz9g4KxXGFRy1ctbNXQChuTCkTk","d":"lTI-xAOoneZDHSzhQ66kx9R44Kd8kX1nJ4MU6ahFOA4"} +eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJPS1AiLCJjcnYiOiJYMjU1MTkiLCJ4IjoiWnJWZVNOdERuSTkzMU9Ed09zQjYzRUd2TjgtWDdUdlhfcHhMV2ZGTzJSOCJ9fQ..VL7jLlxDgw0DltB4SQObfA.qzIU7UH5M_exaAm8twoOjCXi8B_xKDn6F7x1uOTskTG4nceEPOZyuE3RAFr7nsgS.ck7hYrZAbOZGfyYoX19sDg +eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiT0tQIiwiY3J2IjoiWDQ0OCIsIngiOiJHTG5mRXJONnk2dUIxZlY3aGVMckhTQVhtejF6eGw1d3JjdHJGekFLbF9Ba18wczlDQXhPSW1BX1JrTklWbkhIX1NYUlB4b1hGNjRBIn19.NRJQT-c90nAzgnJolRZ-j9FziN9snfpUhiVR5N3uNmqeSWoZy_cFoLXZFFwl2wEy4rvt0uVEPbTKsIoV2BBx7PgNyUMwRztC.G57R3rPxtFe8Awhdab_UwA.BO1-Kcuj47HJtD1U489waNq1pnyuy9Q35QPiuoCK4mx31PoDear1t5VtV85Qg0pz.0wv3Ouqr4atsIgWQ2JMUsEFfEOg9cDDRQPBGqlixPfE +[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.075 s - in org.jose4j.jwe.XEcdhTest [INFO] Running org.jose4j.jwe.NegativeJweKeyTest -14:20:55.161 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: 256 bit content encryption key is not the correct size for the A128GCM content encryption algorithm (128). -14:20:55.161 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided. -14:20:55.162 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided. -14:20:55.162 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided. -14:20:55.163 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided. -14:20:55.163 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided. -14:20:55.164 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided. -14:20:55.164 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 192 bit key was provided. -14:20:55.164 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 256 bit key was provided. -14:20:55.165 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 128 bit key was provided. -14:20:55.165 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 256 bit key was provided. -14:20:55.165 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 128 bit key was provided. -14:20:55.166 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 192 bit key was provided. -14:20:55.166 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided. -14:20:55.167 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided. -14:20:55.167 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided. -14:20:55.167 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -14:20:55.167 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -14:20:55.168 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -14:20:55.168 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 8 bit key was provided. -14:20:55.168 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 56 bit key was provided. -14:20:55.168 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 64 bit key was provided. -14:20:55.168 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 128 bit key was provided. -14:20:55.168 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 192 bit key was provided. -14:20:55.168 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 248 bit key was provided. -14:20:55.168 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided. -14:20:55.168 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided. -14:20:55.168 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided. -14:20:55.168 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 9744 bit key was provided. -14:20:55.168 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 2352 bit key was provided. -14:20:55.168 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 784 bit key was provided. -14:20:55.168 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 1264 bit key was provided. -14:20:55.169 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 8 bit key was provided. -14:20:55.169 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 56 bit key was provided. -14:20:55.169 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 64 bit key was provided. -14:20:55.169 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 128 bit key was provided. -14:20:55.169 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 192 bit key was provided. -14:20:55.169 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided. -14:20:55.169 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 376 bit key was provided. -14:20:55.169 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided. -14:20:55.169 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided. -14:20:55.169 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 9744 bit key was provided. -14:20:55.169 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 2352 bit key was provided. -14:20:55.169 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 784 bit key was provided. -14:20:55.169 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 1264 bit key was provided. -14:20:55.169 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 8 bit key was provided. -14:20:55.169 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 56 bit key was provided. -14:20:55.169 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 64 bit key was provided. -14:20:55.170 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 128 bit key was provided. -14:20:55.170 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 192 bit key was provided. -14:20:55.170 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided. -14:20:55.170 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided. -14:20:55.170 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 504 bit key was provided. -14:20:55.170 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided. -14:20:55.170 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 9744 bit key was provided. -14:20:55.170 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 2352 bit key was provided. -14:20:55.170 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 784 bit key was provided. -14:20:55.170 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 1264 bit key was provided. -14:20:55.170 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.PublicKey -14:20:55.171 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.PrivateKey -14:20:55.171 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. -14:20:55.171 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. -14:20:55.171 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. -14:20:55.171 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. -14:20:55.172 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An empty octet sequence is to be used as the JWE Encrypted Key value when utilizing direct encryption but this JWE has 40 octets in the encrypted key part. -14:20:55.173 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits +14:26:18.891 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: 256 bit content encryption key is not the correct size for the A128GCM content encryption algorithm (128). +14:26:18.891 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided. +14:26:18.905 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided. +14:26:18.905 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided. +14:26:18.906 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided. +14:26:18.906 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided. +14:26:18.907 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided. +14:26:18.907 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 192 bit key was provided. +14:26:18.907 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 256 bit key was provided. +14:26:18.908 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 128 bit key was provided. +14:26:18.916 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 256 bit key was provided. +14:26:18.917 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 128 bit key was provided. +14:26:18.917 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 192 bit key was provided. +14:26:18.918 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided. +14:26:18.918 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided. +14:26:18.918 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided. +14:26:18.919 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +14:26:18.919 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +14:26:18.919 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +14:26:18.920 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 8 bit key was provided. +14:26:18.920 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 56 bit key was provided. +14:26:18.920 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 64 bit key was provided. +14:26:18.928 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 128 bit key was provided. +14:26:18.928 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 192 bit key was provided. +14:26:18.928 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 248 bit key was provided. +14:26:18.928 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided. +14:26:18.928 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided. +14:26:18.928 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided. +14:26:18.928 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 9744 bit key was provided. +14:26:18.928 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 2352 bit key was provided. +14:26:18.928 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 784 bit key was provided. +14:26:18.928 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 1264 bit key was provided. +14:26:18.929 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 8 bit key was provided. +14:26:18.929 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 56 bit key was provided. +14:26:18.929 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 64 bit key was provided. +14:26:18.929 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 128 bit key was provided. +14:26:18.929 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 192 bit key was provided. +14:26:18.929 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided. +14:26:18.929 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 376 bit key was provided. +14:26:18.929 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided. +14:26:18.929 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided. +14:26:18.929 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 9744 bit key was provided. +14:26:18.929 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 2352 bit key was provided. +14:26:18.929 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 784 bit key was provided. +14:26:18.929 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 1264 bit key was provided. +14:26:18.930 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 8 bit key was provided. +14:26:18.930 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 56 bit key was provided. +14:26:18.930 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 64 bit key was provided. +14:26:18.930 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 128 bit key was provided. +14:26:18.930 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 192 bit key was provided. +14:26:18.930 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided. +14:26:18.930 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided. +14:26:18.930 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 504 bit key was provided. +14:26:18.930 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided. +14:26:18.930 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 9744 bit key was provided. +14:26:18.930 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 2352 bit key was provided. +14:26:18.930 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 784 bit key was provided. +14:26:18.930 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 1264 bit key was provided. +14:26:18.931 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.PublicKey +14:26:18.931 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.PrivateKey +14:26:18.931 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. +14:26:18.931 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. +14:26:18.932 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. +14:26:18.974 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. +14:26:18.974 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An empty octet sequence is to be used as the JWE Encrypted Key value when utilizing direct encryption but this JWE has 40 octets in the encrypted key part. +14:26:18.975 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -14:20:55.173 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -14:20:55.173 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key -14:20:55.173 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 -14:20:55.173 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null -14:20:55.173 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -14:20:55.173 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits +14:26:18.976 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +14:26:18.976 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key +14:26:18.976 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 +14:26:18.976 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null +14:26:18.976 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +14:26:18.976 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -14:20:55.173 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -14:20:55.173 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key -14:20:55.173 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 -14:20:55.173 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null -14:20:55.173 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -14:20:55.174 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits +14:26:18.976 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +14:26:18.976 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key +14:26:18.976 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 +14:26:18.976 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null +14:26:18.976 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +14:26:18.976 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -14:20:55.174 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -14:20:55.174 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key -14:20:55.174 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 -14:20:55.174 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null -14:20:55.174 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -14:20:55.174 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits +14:26:18.976 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +14:26:18.976 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key +14:26:18.976 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 +14:26:18.976 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null +14:26:18.976 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +14:26:18.977 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -14:20:55.174 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -14:20:55.174 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key -14:20:55.174 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 -14:20:55.174 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null -14:20:55.174 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -14:20:55.175 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun RSA public key, 2048 bits +14:26:18.977 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +14:26:18.977 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key +14:26:18.977 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 +14:26:18.977 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null +14:26:18.977 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +14:26:18.977 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -14:20:55.175 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -14:20:55.175 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given 128 bit AES key -14:20:55.193 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun EC public key, 256 bits +14:26:18.977 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +14:26:18.977 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given 128 bit AES key +14:26:19.039 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun EC public key, 256 bits public x coord: 57807358241436249728379122087876380298924820027722995515715270765240753673285 public y coord: 90436541859143682268950424386863654389577770182238183823381687388274600502701 parameters: java.security.spec.ECParameterSpec@30bce90b -14:20:55.193 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: epk is invalid for P-521 -14:20:55.193 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -14:20:55.194 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun RSA public key, 2048 bits +14:26:19.056 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: epk is invalid for P-521 +14:26:19.057 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +14:26:19.057 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -14:20:55.194 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -14:20:55.194 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given 128 bit AES key -14:20:55.194 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun EC public key, 256 bits +14:26:19.057 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +14:26:19.057 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given 128 bit AES key +14:26:19.057 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun EC public key, 256 bits public x coord: 57807358241436249728379122087876380298924820027722995515715270765240753673285 public y coord: 90436541859143682268950424386863654389577770182238183823381687388274600502701 parameters: java.security.spec.ECParameterSpec@30bce90b -14:20:55.194 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: epk is invalid for P-521 -14:20:55.195 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -14:20:55.195 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun RSA public key, 2048 bits +14:26:19.057 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: epk is invalid for P-521 +14:26:19.058 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +14:26:19.058 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -14:20:55.195 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -14:20:55.195 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given 128 bit AES key -14:20:55.195 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun EC public key, 256 bits +14:26:19.058 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +14:26:19.058 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given 128 bit AES key +14:26:19.058 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun EC public key, 256 bits public x coord: 57807358241436249728379122087876380298924820027722995515715270765240753673285 public y coord: 90436541859143682268950424386863654389577770182238183823381687388274600502701 parameters: java.security.spec.ECParameterSpec@30bce90b -14:20:55.195 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: epk is invalid for P-521 -14:20:55.195 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -14:20:55.196 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.PublicKey -14:20:55.197 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Unable to encrypt (RSA/ECB/OAEPWithSHA-1AndMGF1Padding) the Content Encryption Key: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -14:20:55.197 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.ec.ECPrivateKeyImpl to java.security.PublicKey -14:20:55.197 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 8 bit key was provided. -14:20:55.197 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 40 bit key was provided. -14:20:55.197 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 136 bit key was provided. -14:20:55.197 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 192 bit key was provided. -14:20:55.197 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 256 bit key was provided. -14:20:55.197 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an RSA key was provided. -14:20:55.197 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an RSA key was provided. -14:20:55.197 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an EC key was provided. -14:20:55.197 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an EC key was provided. -14:20:55.198 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 8 bit key was provided. -14:20:55.199 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 40 bit key was provided. -14:20:55.199 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 128 bit key was provided. -14:20:55.199 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 184 bit key was provided. -14:20:55.199 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 256 bit key was provided. -14:20:55.199 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an RSA key was provided. -14:20:55.199 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an RSA key was provided. -14:20:55.200 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an EC key was provided. -14:20:55.200 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an EC key was provided. -14:20:55.201 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 8 bit key was provided. -14:20:55.201 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 40 bit key was provided. -14:20:55.201 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 128 bit key was provided. -14:20:55.201 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 192 bit key was provided. -14:20:55.201 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 248 bit key was provided. -14:20:55.201 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 264 bit key was provided. -14:20:55.201 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an RSA key was provided. -14:20:55.201 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an RSA key was provided. -14:20:55.201 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an EC key was provided. -14:20:55.201 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an EC key was provided. -[INFO] Tests run: 29, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.045 s - in org.jose4j.jwe.NegativeJweKeyTest +14:26:19.058 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: epk is invalid for P-521 +14:26:19.059 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +14:26:19.059 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.PublicKey +14:26:19.059 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Unable to encrypt (RSA/ECB/OAEPWithSHA-1AndMGF1Padding) the Content Encryption Key: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +14:26:19.059 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.ec.ECPrivateKeyImpl to java.security.PublicKey +14:26:19.076 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 8 bit key was provided. +14:26:19.076 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 40 bit key was provided. +14:26:19.076 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 136 bit key was provided. +14:26:19.076 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 192 bit key was provided. +14:26:19.076 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 256 bit key was provided. +14:26:19.076 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an RSA key was provided. +14:26:19.076 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an RSA key was provided. +14:26:19.076 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an EC key was provided. +14:26:19.077 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an EC key was provided. +14:26:19.077 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 8 bit key was provided. +14:26:19.077 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 40 bit key was provided. +14:26:19.077 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 128 bit key was provided. +14:26:19.077 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 184 bit key was provided. +14:26:19.077 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 256 bit key was provided. +14:26:19.077 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an RSA key was provided. +14:26:19.077 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an RSA key was provided. +14:26:19.077 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an EC key was provided. +14:26:19.077 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an EC key was provided. +14:26:19.078 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 8 bit key was provided. +14:26:19.078 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 40 bit key was provided. +14:26:19.078 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 128 bit key was provided. +14:26:19.078 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 192 bit key was provided. +14:26:19.078 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 248 bit key was provided. +14:26:19.078 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 264 bit key was provided. +14:26:19.078 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an RSA key was provided. +14:26:19.078 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an RSA key was provided. +14:26:19.078 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an EC key was provided. +14:26:19.078 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an EC key was provided. +[INFO] Tests run: 29, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.142 s - in org.jose4j.jwe.NegativeJweKeyTest [INFO] Running org.jose4j.jwe.JsonWebEncryptionTest -[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.031 s - in org.jose4j.jwe.JsonWebEncryptionTest +[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.208 s - in org.jose4j.jwe.JsonWebEncryptionTest [INFO] Running org.jose4j.jwe.Aes128CbcHmacSha256ContentEncryptionAlgorithmTest -[WARNING] Tests run: 4, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.002 s - in org.jose4j.jwe.Aes128CbcHmacSha256ContentEncryptionAlgorithmTest +[WARNING] Tests run: 4, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.019 s - in org.jose4j.jwe.Aes128CbcHmacSha256ContentEncryptionAlgorithmTest [INFO] Running org.jose4j.jwe.ZipTest -eyJ6aXAiOiJERUYiLCJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..rDFU0gkhVaNR5oa34Bu0Ew.SbUSRs55lxfvuQM_ETvZpwuiPgZPBBuhzFDxUhZTsuaGcqKnneZ0x2bU8D3nCdLhSHEk3XJhOYdR2oEoEfeDjg.oZqULY3LWG_ZCz6eaJLtoA -eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..eYfSbLEzEfJ0ljJ5p8TNlw.vsT3fyCMscWsNuIHeG_7KhJa9UD6_sdqTPc1XZpW6Ys8qkkf4NmV3Cp6xgN4N4QLMlMUJn32GM3rhfOgdjDDBDf7YCk9-F-WFuXI5JJEvMUsvuTBgpAJXF4MdNz5P3jrKb-dA5ujiIWznwLzpU1mfs-u8e45rFm6Oz8GGlp5lHxUhLoFk_2sMFDfZ1NTY29DgLuzigYjMUL7j98qNb4cMOJ2jEkka70GxkVlYy3Hf5F3PvZEZ688e_Qh12qQYFlwLNskT_muZWtI7rz0Mhi87WAF_kJVMSNnKCQhjWn95Qf9wnoT32a0bIDL8P6qJFkT_SbWIkSJzLVNNDbpnCGI1fLKCalb_CnafTfrIr-q9Pfy5cIs318-F419BGmV1Qwk.3Fumpt8NdMkbmdaGBKmwXA -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.jwe.ZipTest +eyJ6aXAiOiJERUYiLCJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..-oT8nmp52Ep08YF0lsrD3Q.YziYPvk_aA7q5CfOQFp_C46eBXg0Zf1BQTMZr0Jk_qNJjRakoBs84u_xemQWTi9hAVKDQWNodvdPwa6WUPhrcw.Q9f70X94oqZc6Tyo8eyjbw +eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..YZ_V9Lz2hYttbGn_5IsqBw.6jvj8k_D2s6_m_kHeQGL2x8Pke6j4D0Y-biQ57ZUBLBNbM1b10aJFpOiGodRdacUBTKM9niPpHlDRuvIiThlUaTx1mcNuwGCcP3WfuSzF12FDCu-O3JBMPpAHzS5lEN32Gt9uH60UuULog_DOko7sG3p04umJibn1cnMlQY6tVJVFHWs2QfV21Y0KPTBAHUF_mIqnOaY_X__liRI5jsf_cNFZByGYtM4Ff_XulhcaCI1ZcKgNo8NiIRbJxl1S19rG1pWNYG-wFrOnlofhr33VF26ztP8AaVEdWtaYJLvvZ0w-KEgbiSWBYaxRAHmoAdfblplstBfhkqvy16NrgTXFT9yzOv3kWFIc1aelGRaAvXr0Xg14zRw6e-621ZY7jNP.0wHlh_AvUKYjlUgCIl0jgg +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.016 s - in org.jose4j.jwe.ZipTest [INFO] Running org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest -14:20:55.254 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiRVR2d2dRX1J3akZ4S3pUWXBtTXBFWjBmSzFIWTBYTHEwNUdoaFFJYjQ5QSIsInkiOiJjZHBrWmg0Rktaa3RVSndGYldQdHpKSVFvQzBrRVpVaGZrRTVfVG5pbnNVIiwiY3J2IjoiUC0yNTYifX0.I_-UnicgYAKORhypYY0xqnC-jWGPlQvhDaX0webE3L1vv-KJXUvGgg.ltaQwl0hQKdTahVaVTjPcw.UBkEmbEZ5gfBO5CeC7nTWxpPaHCbMEB5uFZcbjwfBTqzntwLW1Yf9nL7ug2BG74WMhn6kpRanA5sCg_Zznkf6Q.fXsgMOt1Nrb2i9idQyRJ4g -14:20:55.262 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoicW9wV19PbTR0bEF4aExtLThkTFJBTUZBWTl1SnNxMTNUanhfN1d0LWJQcyIsInkiOiJwYTgweklRejRqZUR0OTZyN2JPQ252S3dubDUyMWVfeWs1blVGaVlRUm9jIiwiY3J2IjoiUC0yNTYifX0.Y9QnZUITFxYtPFHjUMqIXVP5B95GmdVGD0CoJMdpKeWAtXF5cGxgyvISEjCLxQ3gnX7lQuqhZ8o.kJf4MNsDoah0dYbvThmR_A.3SAuq0Dvt7bMv2PRQjsxpLX49Yjz8xhe4g-SEDTl4YeNVPsyC7TfA34pTHIai4uZ9TOzVHHGs-PTQJtIjUu2NA.1XCOsDOHGlcFyMhzY4DcqJiSkwpeRDH4 -14:20:55.269 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiR2xBY2hZOHNFUXVvc2JrVE9uM0ZsTW9xN2xLVW0tRW1aMlY1RkdLaWthRSIsInkiOiI2WkhNNW1RX0lKZG1ta3J3bDk5dk1odmY0QUtzbERsSm1pYldMSGs1bm1jIiwiY3J2IjoiUC0yNTYifX0.04B7TFxfKBZnf5EX2BOEluAd6XIfazR5aizLuZ9DwbEluRr5eNuk9QkYyEr6702Bn0_KsE8bmXZqCHe0VFzXHRMiZ2w9nSuA.UgsmcFG2HvXUioSRLwJuQA.gwW2sqCgjHv6pcH0eDgDDHM0FpujK2CDTaS58-OrI6GyYZKXUn9JN8VsoNXSkUVnBC-V8AnK4u5JZHfFTVE-6w.BKPBVEYmjWq_OeqiyKZKKE7cBeKUYV0K4SaLIg1zSt4 -14:20:55.277 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiSTZ0azY4YUM0WXhScU05OWEzenktdENVLXVSclQ4UnVoOXNWdTJRV2ZBMCIsInkiOiJXaVc5eGpCZW1KaDRRSGpqX1UzanpMcTdaZjU3dmxaSzdnWjBRZy0xMWtzIiwiY3J2IjoiUC0yNTYifX0.CMBXJlK1VrKT7zK8U2dLk6JGAVreWmQqNsHpyauavDyV-vxBcQXsjQ.N0CGhz1pMga6WSUGcgP4oA.IAE93LsoRDjCRWhpLR9IeoMxuUrwtD7HEedj1IyOF1bYTkwfflBUg1MYh_wp_XAJSAnHo6L0E69oQmc0ZXSsrg.lMWKC5bfY6NBMrfVSmxuEg -14:20:55.284 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZVRFVGh2TGFITUk4UEpoYXBoWXlWaDNEUW1oVzJXZnpoTWF2X0piMjUwYyIsInkiOiJYaVdxOWdYVXBRb1lGVjBsamhWVVI4dzBXZEs5NkRZZzltQWpyMmtUZHhzIiwiY3J2IjoiUC0yNTYifX0.YOWS_4DeBo7_ZYoaWqCdrQKxTXEv6_pm2asgNIZZQGdu8NmpjCjWf2Ihrq0eDtqCHMWIG_qbgss.zaFupkTGQ3ElSbk08TfbpA.DLehSC2ib3fgaRONA3FcV_W-eWm9cJ47vUGc0xbua_vFwyKTxy6LtUaQMth15mo8St02fn73kJ1P8OeWA3Qk-g.mhEeh74KYlCmO1tQDpG2c8RmAq-du-0f -14:20:55.291 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiN0pwaEstSnpBZFFQR1ZRR0hoa0JLaGtzeDRndUdCbHJWajlMYnVEVE9MayIsInkiOiJtYWFvMnJsSFR1QkxES2dZN0pVYnVTVjMwc2tFU001NTIxak5RcEZoaU9rIiwiY3J2IjoiUC0yNTYifX0.Gtyd3o23Eh0OmSBQ86R6_81yQHY1XRab8tnwbxMw4tuz2IDhZG9Hah-qT6IyS7C-iFSVCqikXdokUoZx29qlotM15y196DKh.ZRdPrS8JMohjj5Q-3EUnWA.J6B5XLsUyAByu6OIVYUAuWsIiPtreTsmr1Z1u0EfzNebN9MRegsJRxufaApP4t-LUNLGeNZsyc3w82bkch0nzg.DbN4pF4SyQcUxZ7Xb9zCqELBHMdMyiwRKnLyxyktUrE -14:20:55.297 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiNXJLVXV1RU5qUy1lVkJyVG9VZWpwTWZ0Xzg2UkQzT2NEdVZaN1pRbG1vayIsInkiOiI3TkV6S3VhTFJSdl9ybXYzOVhsVWtVeXcweGZHc0xXTmdVanJleEIybU5rIiwiY3J2IjoiUC0yNTYifX0.Nr1paOnetYHjcdAihiu1UoI4q1QWPLHKakwhyfBJOgs-4SAmaDMdEw.dxOM24MtKSGPzWMM0sp5_g.P_dtQzDCKkxaTkXLPpPxgNWFTVfMnYshw8lS3R8Hf3A4Onb-HHWt4xb6I2jbWs56gAyVnc_fVIZQB7pqyLxK1w.1eYlw4auAiPA5dAfF5113Q -14:20:55.304 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiR3JzaFE2cklvZ2dCejYwdGFFZnpUR1haM28ydWx5alR4Y2hxbXFYalFITSIsInkiOiJrYlBUYXFFempvT1I2R0RaMnJwcDgzQUpGcjhOSEJTcHo1T3BnR3Fsa1Y0IiwiY3J2IjoiUC0yNTYifX0.s6j7tkNDjyBBkr0KhqD-MhMvgXgsG8Ma_NUDUfL8mGWP5J0xl7URjrnuiOSs45lZMy86UUIRaO0.MArqfYppKowAwvhTjeKJhA.mK9sQOjriOkCooRLWeoZnVwkMFq8OByddrXPqX3ZZZfM06k6lQ2X8Fd8CCZWYvqOm_rhkKnsclEO2-qk4r4A3A.LsdClvT2ZG2C6VZ3I2EaV0izBlUkZ4sF -14:20:55.310 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZDVxVm1HZWlwV1ZoQ19IcmJpSlBDWXNhUWt5djJCd3BnNHRCLTF1bDAwNCIsInkiOiJkczNhbW1SbnVEeVk4RUt2X1JRRWkybmRIVFpwM1NpeExKLWxyUER2WGtVIiwiY3J2IjoiUC0yNTYifX0.kFgDJivnHBbYr56bV96rLZXBRHCAySPfeLWGIogO6kw8LrG7KJ4vgnbTeFYXY3q13CdXXIIIEF_3T0A_VWjxVpUB91gupnWF.iVNUN6cTdUSeHUkn4nDjow.qZll8jpCyn-wnXa4FkLi6UhXx9_cubalnJS-CoAUnXKw9ERjM84o83AzhTzLON3csRv_Ep4QJXQSU-CD9PjpkA.tKcfzPBYZ00LDHOXuq6sMM9hyohpFOZVmuOm4ALPkAE -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.061 s - in org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest +14:26:19.367 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZkV3d2hicmJhUHhqOXR5QkJ4TjRTVmxkSzJYSEVNQ2Y5MzVGdFZsc1UxbyIsInkiOiJvaFFZWjZ1WG1oMkJmdmFxVWVCQkt5RDZzeGx2bTZrMGJQQmQ4NnhNV2k0IiwiY3J2IjoiUC0yNTYifX0.Yj0RrPF9W_Ol05TNRaEovFq1ubKBHqxMPVNoj87XP4i8tsadfJjB-Q.Xl8m8EEYDnD4DSaziFBBDQ.7g0JE8RDYOrn7axf8gYTU2nimJI4goJFV8YIycOR72fwy4C2eH0_5j4x_o-JtvcL2ofp5L34kgQ0L9MdsNsHig.KV9nXQqqgqC7cq68_WEc-w +14:26:19.389 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiTHd3ZlNuazcwSE56YVczZ2lsdXBFcXd5ZG1IWEhMQXAxR3lNNUlyLUg5OCIsInkiOiJCYko3ZFZaX2tNZWJoenhJNzBmcmhEa3c0eDR0YmwwMkJ0enlVYzZPN3RvIiwiY3J2IjoiUC0yNTYifX0.3q2_guBMxU8BfVvI3ygVZTjFLn-rpGhbNKPRyTYSuWicwMsygIKZiNfFKIJixoT38ihf0_1OkkY.VDFdNYXUwKX3XJprWzrolw.kBFwUAYWxGWbcbFnW9IFMVQSTj_mQ0Otcbae44Mfzga8G4kDOa6LAyhCr3spl5_mh2g6QE6pqMN0zhGnJ-ZzTA.5gb3K2k7KzX-jK8glYa1AEPMpsSdJ14b +14:26:19.406 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoibU8tN2hPVW44WmF6NDRKdU1rR1pydGk0dUdZSmtOYjczMHVoMDFhTEJ2byIsInkiOiJtMWhOS3cwSTFiYnA1X3dNNDNBamg3cGZtSWRnb0ZfLXFaSmVJREE0aW5VIiwiY3J2IjoiUC0yNTYifX0.YaD6vhdFGmiEaCpe2SU4uuElHsbGrbNuPMkcYsNBbj2lydurVY4dw7iAnhU9V94c4BS_8tvm36LFx_x4jEo3yLr0nBw91H_d.Oa6r6DFdZo5x_-ECLowujQ.eUwcFffk5_5ZZDGWbb-5r21ig5ODsjJIbMlJHyPzN3gq8_cpW1pjTzC6OdY-rJ65ioizlIzm-MSB5WJc0joFiQ.PAMs_SjfFC7DAh0FsoJHCF0kPYe8E4ZVsmDm8l_VgXw +14:26:19.422 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiTmw4SUR3em92RV9xNGZkbzFmZEt5am1tUVMwVTlrUVlCYlMyeG1nS2VKOCIsInkiOiJPdFdGY0dyY09pNWpkcUtaYTdKLWw1YkY1UFZfRzl2eWxsZUJwb3AwR3FRIiwiY3J2IjoiUC0yNTYifX0.3IvegHXN2N_3tP7XEmHXd1vUiLiU2_Rf3Rf7SRZG9ehvkWzSBQEf5g.WzlGXhtOgfykTALBwQm00Q.AZDqvJmvm1lKw-dhk8ez717zsKhxwNLG75Xv3iRqOL55HvLONF6Td-g8kN8NtLDXfjtndmir3MoeaVdhGWUw6g.XX5MJ8GW9btgVYdbajQEuA +14:26:19.445 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiMEI0eEpvT2MwTW8wMGE5X0hhU01qOU5WMXlGcUhvdlMzek15ZGNLM1RtbyIsInkiOiJiWW0yc0FMcmZsMGhJTGVrSEUxOGdLcVRjRlJKQ0JQdU9lTnF0QzNzVVJvIiwiY3J2IjoiUC0yNTYifX0.X-FxJeK-mDRKV_Syj0sLsrOlwCTyuFqc0u7Cd64i9Gq_q5slK_Rk2FZhJ4OubOcun3nUGpM-yQg.HzPooSJhpFHZs-wav-CSoQ.5Jxh4ydJPXaVs8WsbgcdH7OL7iAjuzQlWoS8O3voS16OsCaYv3vvQTIc9BAjSyPP5SuLrl7psNRqqhYacHHV1A.ZBkAa8y0HTx30z_L_DEOrZttK6IF9YxF +14:26:19.464 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiNXRobzd3dElENU5YOUFfd3gwbUotNEJhLUw2a1NOcXV2VDhlUnB0SEc2MCIsInkiOiI4SUdqMndHSGhUaWZlN29vZzgwaV94Ym55Zk5VZ0FldGlaVWEzTGkwSVV3IiwiY3J2IjoiUC0yNTYifX0.Co9NU0XP34hpWtgKkSpVoq5-hV3Yesoja7VT_kyl16s5uxf17Y5stVmv1HD_sFqormy5yddNZ4R638iim3K3EmzP-oCrCWJ1.ocvtxTUxMivZDLxKH9FL5g.NL6TPBxnuq3YYEcE6njknB88uIKcMdJ9HxcEl1vAtbUbiXg7T6ksy9BZ8tbE_Si_03p-S5uYOr2nErXso7b5IA.wvhhHp_VdtF_j7mnSo4Vl_B0VuFSHz0OIJJxhu2Mn6o +14:26:19.479 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4Ijoidi0zSEpPbjJjNk1Jc0ExcnlrZnhXdTZOb0Y0RExwTVhRVm02bEtHU1JhTSIsInkiOiJWRmVJUTVKZWpINW1pdWt3NlZXSUZjOUo5cDREeG5fM0FJU08xZVllVGUwIiwiY3J2IjoiUC0yNTYifX0.FpPlYeXHByteJcR-cVN0OoYyIGkbvIQ8MZWZ5C17Kn93bLQFQKF7OA.GgDHsRR0Z6g9ctB5jsCmKg.j7PnCi4sxHZVD6LKV1jQYgdCs1zSrRUqpiMBupQi-kBhtk2Pu4Rk0phG54RTh-9ZZfQ2ot5UFRV8brwKHQqlwQ.Rs6d752os1fbeegaW40sjQ +14:26:19.501 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiTjZCR0I5S1JqclBOZzJGbTBUNkVZb2pMV0RCN3p3T1lXb2tWZjBBSndYOCIsInkiOiJEWk9LVTJnQmZoNUZMSUR4Z3NLMktFMDBEeEJlQldKU2FCQ1pzVmJRNkNFIiwiY3J2IjoiUC0yNTYifX0.HS6krloie33b0O8NfXlnId02V_IbYeYOmz5sKEarsp8vd1E6XI_Od-cxh8O5cFzzSjmuWZ022b8.uX-cgi0IoXenMgNOlrq0rg.q3_u4isG2EaXMPJUZIYXB2PJD7hEDIzyy2cQh7f-WRucQnq3NWvXm1N_n2gnHTk1nr25gvBeeP7nQYN_X4mknA.8OpgkgtHuCIpIVwUgEkdWGctKAlQ6YK3 +14:26:19.507 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiVFBTeU1uc1lVWGFiRVBibHNHSG9sbVU0T3k2ZGRkYTVTNU12ckhwdjJOTSIsInkiOiJmbXl3cW92TFZ2T1djTVhhcE5BSmtmYkFDYURhcVkxMks5QjVrSGRaRVdNIiwiY3J2IjoiUC0yNTYifX0.anIrv5qcT-QMXzabXk76j6R0sv9q9Isexq5lEIJd6L1pIg26ZcPyN0XtFv-nhVPhB237zP6A43Hvk08iqVPnN04G5np-OkSE.pjt-Ibde3eBWQFYOydpF5Q.a5--z12KmfbQn_hUmNrMPY1OX9vNgHZ77Yt58x8MViLIdH593qPFtMAK0CKH97uSRchFP4MMoz7lOkbskPVxyw.uwh13HcL_b1Cb1KlbOawEOMugPhP6QJBcIEE_c-DGQU +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.16 s - in org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest [INFO] Running org.jose4j.jwe.Pbes2ExampleEncryptedRSAPrivateKeyJwkAppendixCTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.jwe.Pbes2ExampleEncryptedRSAPrivateKeyJwkAppendixCTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.031 s - in org.jose4j.jwe.Pbes2ExampleEncryptedRSAPrivateKeyJwkAppendixCTest [INFO] Running org.jose4j.jwe.RsaKeyManagementMoreTest -14:20:55.326 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap/decrypt failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:383); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:475); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted... -14:20:55.326 DEBUG o.j.jwe.RsaKeyManagementMoreTest - org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch; caused by: javax.crypto.AEADBadTagException: Tag mismatch -14:20:55.330 DEBUG o.j.jwe.RsaKeyManagementMoreTest - org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch; caused by: javax.crypto.AEADBadTagException: Tag mismatch -14:20:55.662 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:55.662 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:55.662 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:55.662 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:55.662 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:55.662 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:55.664 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:55.667 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:55.668 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:55.669 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:55.749 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -14:20:55.749 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:55.750 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:55.751 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:55.755 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:55.757 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:55.759 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:55.759 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:55.763 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:55.764 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:55.794 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:55.794 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:55.798 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:55.798 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:55.798 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:55.803 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:55.808 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:55.812 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:55.817 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:55.817 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:55.817 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:55.817 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:55.830 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:55.831 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:55.832 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:55.832 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:55.832 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:55.833 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:55.833 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:55.833 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:55.834 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:55.835 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:55.835 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:55.835 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:55.835 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@1c3146bc registered for zip algorithm DEF -14:20:55.835 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:55.835 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 173ms -14:20:55.868 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:55.869 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:55.869 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:55.869 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:55.869 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:55.869 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:55.869 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:55.869 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:55.869 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:55.869 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:55.869 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 -14:20:55.869 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:20:55.869 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:55.869 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:55.870 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:55.870 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:55.870 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:55.871 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:55.871 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:55.871 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:55.871 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:55.871 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:55.872 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:55.872 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:55.872 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:55.872 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:55.872 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:55.873 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:55.874 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:55.875 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:55.875 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:55.876 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:55.876 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:55.876 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:55.876 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:55.876 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:55.876 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:55.876 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:55.876 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:55.876 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:55.877 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:55.877 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:55.877 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:55.878 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:55.878 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:55.878 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@2eced48b registered for zip algorithm DEF -14:20:55.878 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:55.878 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 9ms -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.556 s - in org.jose4j.jwe.RsaKeyManagementMoreTest +14:26:19.572 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap/decrypt failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:383); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:475); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted... +14:26:19.573 DEBUG o.j.jwe.RsaKeyManagementMoreTest - org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch; caused by: javax.crypto.AEADBadTagException: Tag mismatch +14:26:19.589 DEBUG o.j.jwe.RsaKeyManagementMoreTest - org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch; caused by: javax.crypto.AEADBadTagException: Tag mismatch +14:26:20.497 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:20.497 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:20.497 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:20.497 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:20.497 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:20.498 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:20.499 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:20.514 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:20.515 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:20.515 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:20.810 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +14:26:20.811 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:20.812 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:20.821 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:20.833 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:20.836 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:20.850 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:20.850 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:20.866 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:20.867 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:20.970 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:20.970 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:20.982 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:20.982 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:20.982 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:20.999 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:21.021 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:21.039 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:21.061 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:21.061 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:21.061 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:21.061 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:21.104 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:21.106 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:21.106 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:21.107 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:21.107 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:21.107 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:21.107 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:21.108 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:21.121 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:21.122 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:21.122 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:21.122 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:21.122 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@1c3146bc registered for zip algorithm DEF +14:26:21.122 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:21.122 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 625ms +14:26:21.239 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:21.239 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:21.240 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:21.240 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:21.240 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:21.248 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:21.248 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:21.248 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:21.248 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:21.248 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:21.249 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 +14:26:21.249 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +14:26:21.249 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:21.249 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:21.249 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:21.249 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:21.250 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:21.250 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:21.250 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:21.250 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:21.250 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:21.251 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:21.251 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:21.251 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:21.251 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:21.251 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:21.252 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:21.265 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:21.266 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:21.267 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:21.267 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:21.267 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:21.267 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:21.268 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:21.268 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:21.268 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:21.268 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:21.268 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:21.268 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:21.268 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:21.268 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:21.269 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:21.269 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:21.269 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:21.269 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:21.269 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@2eced48b registered for zip algorithm DEF +14:26:21.269 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:21.270 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 31ms +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.719 s - in org.jose4j.jwe.RsaKeyManagementMoreTest [INFO] Running org.jose4j.jwe.Aes256GcmContentEncryptionAlgorithmTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.009 s - in org.jose4j.jwe.Aes256GcmContentEncryptionAlgorithmTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.044 s - in org.jose4j.jwe.Aes256GcmContentEncryptionAlgorithmTest [INFO] Running org.jose4j.jwe.Rsa1_5KeyManagementAlgorithmTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s - in org.jose4j.jwe.Rsa1_5KeyManagementAlgorithmTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.022 s - in org.jose4j.jwe.Rsa1_5KeyManagementAlgorithmTest [INFO] Running org.jose4j.jwe.RsaOaepKeyManagementAlgorithmTest -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.036 s - in org.jose4j.jwe.RsaOaepKeyManagementAlgorithmTest +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.11 s - in org.jose4j.jwe.RsaOaepKeyManagementAlgorithmTest [INFO] Running org.jose4j.jwe.kdf.Rfc6070Pbkdf2TestVectorsTest -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.025 s - in org.jose4j.jwe.kdf.Rfc6070Pbkdf2TestVectorsTest +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.081 s - in org.jose4j.jwe.kdf.Rfc6070Pbkdf2TestVectorsTest [INFO] Running org.jose4j.jwe.kdf.Pbkdf2MoreTest -[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s - in org.jose4j.jwe.kdf.Pbkdf2MoreTest +[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.009 s - in org.jose4j.jwe.kdf.Pbkdf2MoreTest [INFO] Running org.jose4j.jwe.kdf.Pbkdf2CompareToJavaSecretKeyFactorySha1Test -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.kdf.Pbkdf2CompareToJavaSecretKeyFactorySha1Test +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.046 s - in org.jose4j.jwe.kdf.Pbkdf2CompareToJavaSecretKeyFactorySha1Test [INFO] Running org.jose4j.jwe.kdf.Pbkdf2JwkExampleTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.kdf.Pbkdf2JwkExampleTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.016 s - in org.jose4j.jwe.kdf.Pbkdf2JwkExampleTest [INFO] Running org.jose4j.jwe.kdf.ConcatKeyDerivationFunctionTest Sq8rGLm4rEtzScmnSsY5r1n-AqBl_iBU8FxN80Uc0S0 LfkHot2nGTVlmfxbgxQfMg [INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.kdf.ConcatKeyDerivationFunctionTest [INFO] Running org.jose4j.keys.KeyPairUtilTest -14:20:56.010 DEBUG org.jose4j.keys.KeyPairUtilTest - The following JWT and public key should be (and were on 11/11/15) usable and produce a valid result at jwt.io (related to http://stackoverflow.com/questions/32744172): -eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJtZWgiLCJleHAiOjE3Njg4MzM2NTYsImp0aSI6ImgwN0tjTjZxQnUya1dYVlZBOFd3QkEiLCJhdWQiOiJ5b3UiLCJpc3MiOiJtZSJ9.mLn0wyd7qoaRdxQi0g-2FgMC7zxI0xIew-AzPhaBW2UpwdbyPmOW7650lYE1c6c-SeQaTMexaBVKBeCiTkYH-KDpHcN0Qp6hvGB0rHPTeVHKIAVC8LVOzSCL7E6KqNetfx586ClmdQUCWHrNKlvmE3v82G74BXbgGazMv5vKDh5ezmJaoLZ237RRRI_b91Bb80LznIcNyov9igkBCx04bM3cFQp8kleM6PrPou7C9iP0PWThurSAhBtnDfrdDufSlXZPbTEFfOWj6EzqK4oRy0E_wDhcXTAs8nKSJ8IhdpRaQTqMCAJwo_-x42r7Gura7-qC1VyultRbLAmMMlvn7Q +14:26:21.657 DEBUG org.jose4j.keys.KeyPairUtilTest - The following JWT and public key should be (and were on 11/11/15) usable and produce a valid result at jwt.io (related to http://stackoverflow.com/questions/32744172): +eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJtZWgiLCJleHAiOjE3Njg4MzM5ODEsImp0aSI6Ik9IYk9JOEFoUlZieXZMSm91RDJ2cGciLCJhdWQiOiJ5b3UiLCJpc3MiOiJtZSJ9.EY14jMPH5-gL88qCkBw_P3hNJRjX8Bno-bNTHA0Dn5NcOG21bRtnS4oQZ2D-ClmN9a12CiZ_om7HOdUsMni2PN1ckrrxoqz78Pda2t2yKX40e8GOXc6MyPF4cSZmqQMy4ysO08JwlxyU7jXgbQOxHKqOdvUNpczoGyLSxGDCjWYUFvgxJKFKBcDfE0416bm8OWJ6HrtTz5XKw6EW29tWaWMDKDUOuW104AciyFdC0GoR93guw-f2FxjBO_lh2-xdq3PSbqP-sBCQ6WnvmnfjK5qDmC5G1_cK7ogNlVn8_W7lDv-eCnn1iAAwxVG5yEaSYVsUKv7g1RfP9AEgUjE9bQ -----BEGIN PUBLIC KEY----- MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAoahUIoWw0K0usKNuOR6H 4wkf4oBUXHTxRvgb48E+BVvxkeDNjbC4he8rUWcJoZmds2h7M70imEVhRU5djINX @@ -2669,1826 +2705,1826 @@ FGzKsNa7LZK2djYgyD3JR/MB/4NUJW/TqOQtwHYbxevoJArm+L5StowjzGy+/bq6 GwIDAQAB -----END PUBLIC KEY----- -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.keys.KeyPairUtilTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.023 s - in org.jose4j.keys.KeyPairUtilTest [INFO] Running org.jose4j.keys.BigEndianBigIntegerTest -[INFO] Tests run: 19, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.074 s - in org.jose4j.keys.BigEndianBigIntegerTest +[INFO] Tests run: 19, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.318 s - in org.jose4j.keys.BigEndianBigIntegerTest [INFO] Running org.jose4j.keys.resolvers.EmbeddedJwkVerificationKeyResolverTest -14:20:56.094 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: No jwk in JWS header): JsonWebSignature{"typ":"dpop+jwt","alg":"ES256"}->eyJ0eXAiOiJkcG9wK2p3dCIsImFsZyI6IkVTMjU2In0.eyJqdGkiOiItQndDM3lFU2MwNGFjYzc3bFRjMjZ4IiwiaHRtIjoiUE9TVCIsImh0dSI6Imh0dHBzOi8vc2VydmVyLmV4YW1wbGUuY29tL3Rva2VuIiwiaWF0IjoxNTYyMjYyNjE2fQ.DlWrKDQE15d6lN14J525P877gT_pmYYKFwpFmUvs3uQ96wTHV-4ZdnozfXVmlHmpgF5DA_3Ld8x5iyS7MrOjhw] -14:20:56.095 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Problem processing jwk from JWS header (jwk header contains a private key, which it most definitely should not.)): JsonWebSignature{"alg":"ES256","typ":"dpop+jwt","jwk":{"kty":"EC","x":"76nY8PkSVA80iOPq3UEGnocuOGhQjGOkcPpbyWpsWmg","y":"00LZB2IcOxErkNZwcQX_dmudk-atORMKjDBTsUeMvoU","crv":"P-256","d":"IIbXpUbIHemOAreeQ_LM2akq7y66DcYluvgydOritJU"}}->eyJhbGciOiJFUzI1NiIsInR5cCI6ImRwb3Arand0IiwiandrIjp7Imt0eSI6IkVDIiwieCI6Ijc2blk4UGtTVkE4MGlPUHEzVUVHbm9jdU9HaFFqR09rY1BwYnlXcHNXbWciLCJ5IjoiMDBMWkIySWNPeEVya05ad2NRWF9kbXVkay1hdE9STUtqREJUc1VlTXZvVSIsImNydiI6IlAtMjU2IiwiZCI6IklJYlhwVWJJSGVtT0FyZWVRX0xNMmFrcTd5NjZEY1lsdXZneWRPcml0SlUifX0.eyJqdGkiOiJiYzc4OSIsImh0bSI6IkdFVCIsImh0dSI6Imh0dHBzOi8vYXBpLmV4YW1wbGUuY29tIiwiaWF0IjoxNjQ3OTU5MTMyfQ.-GKT4h58oZzS4LGk8b44Dh4GoJ9Y2extHUOr_LzbFIibO_XXfanPZ8ePZkXd8s7cuQyFKagePUVCdu1T2UKbTQ] -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.007 s - in org.jose4j.keys.resolvers.EmbeddedJwkVerificationKeyResolverTest +14:26:22.003 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: No jwk in JWS header): JsonWebSignature{"typ":"dpop+jwt","alg":"ES256"}->eyJ0eXAiOiJkcG9wK2p3dCIsImFsZyI6IkVTMjU2In0.eyJqdGkiOiItQndDM3lFU2MwNGFjYzc3bFRjMjZ4IiwiaHRtIjoiUE9TVCIsImh0dSI6Imh0dHBzOi8vc2VydmVyLmV4YW1wbGUuY29tL3Rva2VuIiwiaWF0IjoxNTYyMjYyNjE2fQ.DlWrKDQE15d6lN14J525P877gT_pmYYKFwpFmUvs3uQ96wTHV-4ZdnozfXVmlHmpgF5DA_3Ld8x5iyS7MrOjhw] +14:26:22.016 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Problem processing jwk from JWS header (jwk header contains a private key, which it most definitely should not.)): JsonWebSignature{"alg":"ES256","typ":"dpop+jwt","jwk":{"kty":"EC","x":"76nY8PkSVA80iOPq3UEGnocuOGhQjGOkcPpbyWpsWmg","y":"00LZB2IcOxErkNZwcQX_dmudk-atORMKjDBTsUeMvoU","crv":"P-256","d":"IIbXpUbIHemOAreeQ_LM2akq7y66DcYluvgydOritJU"}}->eyJhbGciOiJFUzI1NiIsInR5cCI6ImRwb3Arand0IiwiandrIjp7Imt0eSI6IkVDIiwieCI6Ijc2blk4UGtTVkE4MGlPUHEzVUVHbm9jdU9HaFFqR09rY1BwYnlXcHNXbWciLCJ5IjoiMDBMWkIySWNPeEVya05ad2NRWF9kbXVkay1hdE9STUtqREJUc1VlTXZvVSIsImNydiI6IlAtMjU2IiwiZCI6IklJYlhwVWJJSGVtT0FyZWVRX0xNMmFrcTd5NjZEY1lsdXZneWRPcml0SlUifX0.eyJqdGkiOiJiYzc4OSIsImh0bSI6IkdFVCIsImh0dSI6Imh0dHBzOi8vYXBpLmV4YW1wbGUuY29tIiwiaWF0IjoxNjQ3OTU5MTMyfQ.-GKT4h58oZzS4LGk8b44Dh4GoJ9Y2extHUOr_LzbFIibO_XXfanPZ8ePZkXd8s7cuQyFKagePUVCdu1T2UKbTQ] +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.054 s - in org.jose4j.keys.resolvers.EmbeddedJwkVerificationKeyResolverTest [INFO] Running org.jose4j.keys.resolvers.HttpsJwksVerificationKeyResolverTest -14:20:56.684 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -14:20:56.687 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} due to an unexpected exception (java.io.IOException: https://www.example.org/says 'no GET for you!') while obtaining or using keys from JWKS endpoint at https://www.example.org/ -14:20:56.692 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -14:20:56.693 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -14:20:56.693 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jan 19 15:20:56 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] -14:20:56.713 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] -14:20:56.713 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -14:20:56.714 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -14:20:56.714 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jan 19 15:20:56 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] -14:20:56.724 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] -14:20:56.724 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -14:20:56.725 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -14:20:56.725 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jan 19 15:20:56 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] -14:20:56.730 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] obtained from https://www.example.org/ -14:20:56.730 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES384"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] -14:20:56.730 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -14:20:56.730 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -14:20:56.730 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jan 19 15:20:56 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] -14:20:56.731 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] obtained from https://www.example.org/ -14:20:56.732 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -14:20:56.732 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -14:20:56.732 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jan 19 15:20:56 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k1, x=1u9oeAkLQJcAnrv_m4fupf-lF43yFqmNjMsrukKDhEE, y=RG0cyWzinUl8NpfVVw2DqfH6zRqU_yF6aL1swssNv4E, crv=P-256}] -14:20:56.732 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256","kid":"k2"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k1, x=1u9oeAkLQJcAnrv_m4fupf-lF43yFqmNjMsrukKDhEE, y=RG0cyWzinUl8NpfVVw2DqfH6zRqU_yF6aL1swssNv4E, crv=P-256}] -14:20:56.732 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -14:20:56.733 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -14:20:56.733 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jan 19 15:20:56 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] -14:20:56.733 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] -14:20:56.733 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -14:20:56.733 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -14:20:56.733 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jan 19 15:20:56 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] -14:20:56.734 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] obtained from https://www.example.org/ -14:20:56.735 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://abc.bfe.xyz/ -14:20:56.735 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://abc.bfe.xyz/ -14:20:56.735 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://abc.bfe.xyz/ will be cached for 3600 seconds until about Mon Jan 19 15:20:56 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] -14:20:56.739 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - We expected an exception out of the CustomHttpsJwksVerificationKeyResolver: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: There are multiple keys in the referenced JWK Set document, but the kid value was not provided in the JOSE Header.) while obtaining or using keys from JWKS endpoint at https://abc.bfe.xyz/ -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.634 s - in org.jose4j.keys.resolvers.HttpsJwksVerificationKeyResolverTest +14:26:24.129 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +14:26:24.140 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} due to an unexpected exception (java.io.IOException: https://www.example.org/says 'no GET for you!') while obtaining or using keys from JWKS endpoint at https://www.example.org/ +14:26:24.158 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +14:26:24.159 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +14:26:24.159 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jan 19 15:26:24 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] +14:26:24.195 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] +14:26:24.195 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +14:26:24.195 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +14:26:24.196 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jan 19 15:26:24 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] +14:26:24.207 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] +14:26:24.211 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +14:26:24.212 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +14:26:24.212 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jan 19 15:26:24 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] +14:26:24.225 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] obtained from https://www.example.org/ +14:26:24.225 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES384"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] +14:26:24.225 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +14:26:24.226 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +14:26:24.226 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jan 19 15:26:24 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] +14:26:24.226 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] obtained from https://www.example.org/ +14:26:24.227 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +14:26:24.228 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +14:26:24.229 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jan 19 15:26:24 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k1, x=1u9oeAkLQJcAnrv_m4fupf-lF43yFqmNjMsrukKDhEE, y=RG0cyWzinUl8NpfVVw2DqfH6zRqU_yF6aL1swssNv4E, crv=P-256}] +14:26:24.230 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256","kid":"k2"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k1, x=1u9oeAkLQJcAnrv_m4fupf-lF43yFqmNjMsrukKDhEE, y=RG0cyWzinUl8NpfVVw2DqfH6zRqU_yF6aL1swssNv4E, crv=P-256}] +14:26:24.230 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +14:26:24.230 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +14:26:24.230 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jan 19 15:26:24 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] +14:26:24.230 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] +14:26:24.230 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +14:26:24.231 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +14:26:24.231 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Mon Jan 19 15:26:24 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] +14:26:24.231 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] obtained from https://www.example.org/ +14:26:24.232 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://abc.bfe.xyz/ +14:26:24.232 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://abc.bfe.xyz/ +14:26:24.232 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://abc.bfe.xyz/ will be cached for 3600 seconds until about Mon Jan 19 15:26:24 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] +14:26:24.236 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - We expected an exception out of the CustomHttpsJwksVerificationKeyResolver: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: There are multiple keys in the referenced JWK Set document, but the kid value was not provided in the JOSE Header.) while obtaining or using keys from JWKS endpoint at https://abc.bfe.xyz/ +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 2.186 s - in org.jose4j.keys.resolvers.HttpsJwksVerificationKeyResolverTest [INFO] Running org.jose4j.keys.X509UtilTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s - in org.jose4j.keys.X509UtilTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.014 s - in org.jose4j.keys.X509UtilTest [INFO] Running org.jose4j.keys.EllipticCurvesTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.006 s - in org.jose4j.keys.EllipticCurvesTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.016 s - in org.jose4j.keys.EllipticCurvesTest [INFO] Running org.jose4j.jws.JwsUsingHmacSha256ExampleTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jws.JwsUsingHmacSha256ExampleTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jws.JwsUsingHmacSha256ExampleTest [INFO] Running org.jose4j.jws.EcdsaUsingShaAlgorithmTest [0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 2] -[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.03 s - in org.jose4j.jws.EcdsaUsingShaAlgorithmTest +[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.049 s - in org.jose4j.jws.EcdsaUsingShaAlgorithmTest [INFO] Running org.jose4j.jws.CritHeaderTest -14:20:56.790 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'nope' marked as critical. -14:20:56.792 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: crit header value not an array (class java.lang.String). -14:20:56.793 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: crit header value not an array (class java.lang.Boolean). -14:20:56.793 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'http://example.com/UNDEFINED' marked as critical. -14:20:56.794 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'urn:example.com:nope' marked as critical. -14:20:56.797 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'urn:example.com:nope' marked as critical. -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.01 s - in org.jose4j.jws.CritHeaderTest +14:26:24.323 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'nope' marked as critical. +14:26:24.334 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: crit header value not an array (class java.lang.String). +14:26:24.334 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: crit header value not an array (class java.lang.Boolean). +14:26:24.335 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'http://example.com/UNDEFINED' marked as critical. +14:26:24.335 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'urn:example.com:nope' marked as critical. +14:26:24.338 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'urn:example.com:nope' marked as critical. +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.024 s - in org.jose4j.jws.CritHeaderTest [INFO] Running org.jose4j.jws.RsaUsingShaTest -14:20:56.970 DEBUG org.jose4j.jws.JwsTestSupport - RS256 eyJhbGciOiJSUzI1NiJ9.UEFZTE9BRCEhIQ.SX5MrAAFI9oy8rqyi2CcChSbR3RuCZSz2v-HcchjcGO3Hp-Zg6RcKNFzODBxiLHLkPOOh3D9m-vD6Sl82oAJUi-2S8yfHWVkTBH19xKfZjdx4zGoHYh4fL7ZcG-QYkta_j6d5AvMi3PoMKl_laa_NJCeRJovW6cCgbmh2XKqz7T2JXthkvAHzPeUEWJ8E77R33YaSewyqEMznQPoBPY9MN70uMh1z8gzo4NY23ips2z7wDeDhywSDI-kwK6ZKiLwq6wI3pq3vmjLju4iEI-FH-VYkdWh0b15XYU_z5wF8_0zdVCdYdAk4eKQRAy7PXWaPnxMI8VmVhptBxoqoIWbIA -14:20:56.987 DEBUG org.jose4j.jws.JwsTestSupport - RS384 eyJhbGciOiJSUzM4NCJ9.UEFZTE9BRCEh.SrZqzpg3W-Bs59kUlyayODhydfOHCa8B3PqMTqgCYLmhaZL60JUDVFTa6G8WRMvNsymZjhT_urwZ6lt17-dVWoGWO4hM2u9Yp3maPauRtwvQZqaLl06179F8gZtpbhm1lSdmjFJZoa3oKfF9ElKDbzXjCp1pNuyOttjkGSpKljAhcZ0JKQGj4hAQ8dAMWBZ_cLiQ19wuaHPymjQSS86oG7r8LJtVrO_OswmvzQ0FNqaWykbt6OP2gNU6Eupf8XbibKPDDE68KDHILY4pfanJpQjU8jjrwV_JLiOh_eMMtLH6r0CcTWy7Qrwcv_au0B4Qv8C3PUodJyD_rjExfzD0ew -14:20:57.004 DEBUG org.jose4j.jws.JwsTestSupport - RS512 eyJhbGciOiJSUzUxMiJ9.UEFZTE9BRCE.clMzB2ZYyPtGMaTt18OpmRdN4JZ89HSLBVJy9Z9j_WSbdEX7jqo0LvPK_xR4nPAUTVOwNfzGtTdFz-2lhtjuko4u8m6-DaB0hUcx5NgJDbU_6zkUL5nXwTv7hg9mNHj5O_aQK2DI2XJXJdF-X8uf0FGB1A2305a0V0yiIuPgJ3Ls5UkXdDOZY9TxL4onSjYvNbuS9YkfWRH9uCn5VWjvpmVvhWGDpfnXTY2Xf97iPxknJRMI3ztkNLeHGtIRdvGT1HKUsIaRWK-yZB-2HgkT1c--4U_rKHpzwRxU3cVBWjeqRPrEiINSGclbjGDCM7jgy2X2_fZqfQLCdzPY33_TkQ -14:20:57.045 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -14:20:57.046 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -14:20:57.046 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -14:20:57.046 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -14:20:57.046 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:20:57.046 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -14:20:57.047 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -14:20:57.047 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:20:57.047 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:20:57.047 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -14:20:57.047 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -14:20:57.047 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -14:20:57.047 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -14:20:57.047 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:20:57.047 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA384withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -14:20:57.047 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA384withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -14:20:57.048 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:20:57.048 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:20:57.048 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -14:20:57.048 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -14:20:57.048 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -14:20:57.048 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -14:20:57.048 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:20:57.048 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA512withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -14:20:57.048 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA512withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -14:20:57.048 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:20:57.048 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.242 s - in org.jose4j.jws.RsaUsingShaTest +14:26:24.755 DEBUG org.jose4j.jws.JwsTestSupport - RS256 eyJhbGciOiJSUzI1NiJ9.UEFZTE9BRCEhIQ.P15AvzWBX4lRtVTA5HPUsuxv2PLq0G-tQv-EsFcHi3sw08WEJEL9nXoWjaAYXfFe7jYIHG2ho4gyTVFf4DmixGlrcUxF4CQhjhJRvIBHvPcn20jIDWDHIOXZuObybmIN6yG-3_11qK-5f368mpX8CqmrB9v8tCKBvyR2YKOtdtGK84au_Q4NAawYciUh1nYnA0XQFIk73T6j7RVk2zGuTJ9IETtMZmdzG2ipo7SqMzDWcRBc97a4_JBEf0qfhPv6CaB0R2crFwLNRk3OGmvg9D3CAgL_907-JSpANDxvedUAPc781JoZMV0y5-4nCISmnNEfHZ4pooBSorB1fPwC8g +14:26:24.774 DEBUG org.jose4j.jws.JwsTestSupport - RS384 eyJhbGciOiJSUzM4NCJ9.UEFZTE9BRCEh.mnkPsZFZ8-HeMPirk90KrUqMwdmGcdh748ljdT3rTk2yKGsxJTKIGy_NYC6rNtTNwHZ_jjt9Z7ysNB2u7mujYLpddzVSActbRLkJYxrhHXRFjjUrMNCRgXk-hUoI0y-JdxFJZ_PJYsnk-oSQ9K4U1UCb97flM6VbcVViJ_6HW7CFI-wD5vrNiAFZtlF6AHaqC0kph5YdF156D4r_Umjswc9iH6bz-GoGd6oPjhh4du_XV8Jsq5WOuKjPdL3LvoEslSYZ1h7hNinacSV4YqgJj4rM1uC8qUp7fF8lbdklh4SuhOqnKsKNATBblngEiFZuteP33unAejqkVfeLhJJZWw +14:26:24.791 DEBUG org.jose4j.jws.JwsTestSupport - RS512 eyJhbGciOiJSUzUxMiJ9.UEFZTE9BRCE.QTlwn-cpq94Anct7C3Bqd6wF9ojQX8DMqgS0Xv0fuIrGTit8Tp7MpDoRCZFJiapCG2QwkRZ83Y_32PrWROc6qgophFot8OTsCTD0KqY_T-errxIpQajDpo8UMdwdcg_ITspcVqkDRfCuyaRaKrRz0j-mQazeQNtz2jhBU1UTy5GO8JeOWnaEHpTyxJ3DSWhewn1Kq99b2f1QTdN0PhiVXC9Wyftns-owm_ishrLnoWmmr4Lxvf2_WG-ab-TMHR6AshMCPe498D0TjLz9_ckSV1VODgJvNc76DGL4mKO0BwU_hcQzous-9FBze2MKznGezjhDc_L4iJGu6FsrHRSE3A +14:26:24.823 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +14:26:24.823 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +14:26:24.824 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +14:26:24.824 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +14:26:24.826 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +14:26:24.827 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +14:26:24.827 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +14:26:24.827 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +14:26:24.827 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +14:26:24.827 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +14:26:24.827 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +14:26:24.827 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +14:26:24.827 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +14:26:24.827 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +14:26:24.827 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA384withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +14:26:24.827 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA384withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +14:26:24.827 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +14:26:24.827 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +14:26:24.828 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +14:26:24.828 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +14:26:24.828 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +14:26:24.828 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +14:26:24.828 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +14:26:24.828 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA512withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +14:26:24.828 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA512withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +14:26:24.828 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +14:26:24.828 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.475 s - in org.jose4j.jws.RsaUsingShaTest [INFO] Running org.jose4j.jws.JwsCryptoPrimitiveTest -14:20:57.050 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getSignature(): Signature object: SHA256withECDSA -14:20:57.052 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getSignature(): Signature object: SHA256withRSA -14:20:57.065 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getMac(): javax.crypto.Mac@3f93e4a8 -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.014 s - in org.jose4j.jws.JwsCryptoPrimitiveTest +14:26:24.830 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getSignature(): Signature object: SHA256withECDSA +14:26:24.839 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getSignature(): Signature object: SHA256withRSA +14:26:24.852 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getMac(): javax.crypto.Mac@3f93e4a8 +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.021 s - in org.jose4j.jws.JwsCryptoPrimitiveTest [INFO] Running org.jose4j.jws.MaintainEncodedPayloadAndHeaderTest -14:20:57.067 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", +14:26:24.854 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9X.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -14:20:57.068 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", +14:26:24.855 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9===.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -14:20:57.069 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", +14:26:24.860 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", "alg":"HS256"}->!!!!eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jws.MaintainEncodedPayloadAndHeaderTest +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.006 s - in org.jose4j.jws.MaintainEncodedPayloadAndHeaderTest [INFO] Running org.jose4j.jws.EdDsaTest -14:20:57.080 DEBUG org.jose4j.jws.EdDsaAlgorithm - Problem verifying EdDSA signature: java.security.SignatureException: Invalid point -14:20:57.084 DEBUG org.jose4j.jws.JwsTestSupport - EdDSA eyJhbGciOiJFZERTQSJ9.TGl0dGxlIEVk.oH_VdrivjOl9mGha635yLSoh0ydQ6ujdTsiH_kNGmMx3FpAr9LWkEH1FtWAtSvQtrnbcT7o3rcoocMOiq2glAg -14:20:57.115 DEBUG org.jose4j.jws.JwsTestSupport - EdDSA eyJhbGciOiJFZERTQSJ9.QmlnIEVk.VoPi17dYPsZ_7tJZFsYjhAafOExy6zb0PvglC6ZPDWQAzBbasfptS-gLu9lp3O1Ws62FpeNEi44AWJFQc6lF870T77IjwQ0HyJES-5zD4R6ZcsSGTiZBRMzpniX18bB27Z0DLNsFJp61Qb0daYy4HQYA -14:20:57.158 DEBUG org.jose4j.jws.JwsTestSupport - EdDSA eyJhbGciOiJFZERTQSJ9.Q291c2luIEVkZGll.i2g0UKUlnRCvfESWJAdxsIr8q4noDwV2wmjyjWA8PkiPTtdA7WdIydC8E0VvZ8uEDpDtfzt7AfVSsyhqenY4CA -14:20:57.168 DEBUG org.jose4j.jws.EdDsaAlgorithm - Problem verifying EdDSA signature: java.security.SignatureException: signature length invalid -14:20:57.175 DEBUG org.jose4j.jws.EdDsaAlgorithm - Problem verifying EdDSA signature: java.security.SignatureException: signature length invalid -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.101 s - in org.jose4j.jws.EdDsaTest +14:26:24.879 DEBUG org.jose4j.jws.EdDsaAlgorithm - Problem verifying EdDSA signature: java.security.SignatureException: Invalid point +14:26:24.884 DEBUG org.jose4j.jws.JwsTestSupport - EdDSA eyJhbGciOiJFZERTQSJ9.TGl0dGxlIEVk.ddLEkVvBJV8KQjFTIFFird7fNqspXDFGxH621YWxDIGymRJ_1gpMHPFgVuecwxg05Xu_J6-8AD11f1UNM_u8Cg +14:26:24.943 DEBUG org.jose4j.jws.JwsTestSupport - EdDSA eyJhbGciOiJFZERTQSJ9.QmlnIEVk.tDISlBKfUFucNomznKYlWA-Cqp6myMF85_QK1edFD2oZ0eCEpHnLsVWd7i1jnkAwv4PR6irmRGyA6G8V08RslBlVrhuMjD2gdBA-2VGaGh2YFMAeVqVJYao-S80g5gSq-dSiak_1YuBsxpkeMIb3tAcA +14:26:25.033 DEBUG org.jose4j.jws.JwsTestSupport - EdDSA eyJhbGciOiJFZERTQSJ9.Q291c2luIEVkZGll.fAFdMRAEDCBET421QL-Fams2EZqq88BsI9D5JqqVhhud0yM6CXPegGJk68IyYWBz5SsD8-Ur-zY2k64EmbgdCg +14:26:25.055 DEBUG org.jose4j.jws.EdDsaAlgorithm - Problem verifying EdDSA signature: java.security.SignatureException: signature length invalid +14:26:25.070 DEBUG org.jose4j.jws.EdDsaAlgorithm - Problem verifying EdDSA signature: java.security.SignatureException: signature length invalid +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.204 s - in org.jose4j.jws.EdDsaTest [INFO] Running org.jose4j.jws.RsaPssTest -14:20:57.177 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS -14:20:57.189 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS -14:20:57.201 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS -14:20:57.222 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS -14:20:57.234 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS -14:20:57.246 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS -14:20:57.266 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:57.267 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:57.267 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:57.267 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:57.267 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:57.267 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:57.267 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:57.267 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:57.267 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:57.267 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:57.272 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -14:20:57.272 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:57.272 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:57.272 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:57.274 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:57.276 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:57.278 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:57.278 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:57.278 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:57.279 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:57.280 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:57.280 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:57.280 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:57.281 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:57.281 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:57.285 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:57.298 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:57.301 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:57.305 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:57.305 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:57.305 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:57.305 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:57.306 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:57.307 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:57.308 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:57.308 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:57.308 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:57.308 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:57.308 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:57.309 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:57.309 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:57.310 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:57.310 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:57.310 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:57.310 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@3cd206b5 registered for zip algorithm DEF -14:20:57.310 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:57.310 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 43ms -14:20:57.324 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS -14:20:57.337 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@65ec8b24):Signature object: SHA256withRSAandMGF1 -14:20:57.349 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS -14:20:57.362 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@58b67519):Signature object: SHA384withRSAandMGF1 -14:20:57.374 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS -14:20:57.386 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@116a2108):Signature object: SHA512withRSAandMGF1 -14:20:57.398 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:57.398 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:57.398 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:57.398 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:57.398 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:57.398 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:57.398 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:57.398 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:57.398 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:57.398 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:57.398 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 -14:20:57.398 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:20:57.399 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:57.399 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:57.399 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:57.399 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:57.399 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:57.399 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:57.400 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:57.400 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:57.400 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:57.400 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:57.400 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:57.400 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:57.400 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:57.400 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:57.401 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:57.402 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:57.403 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:57.404 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:57.404 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:57.404 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:57.404 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:57.404 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:57.404 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:57.404 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:57.405 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:57.405 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:57.405 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:57.405 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:57.405 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:57.405 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:57.405 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:57.405 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:57.405 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:57.405 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@5e8c34a0 registered for zip algorithm DEF -14:20:57.405 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:57.405 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 7ms -14:20:57.414 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:57.414 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:57.414 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:57.414 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:57.414 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:57.414 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:57.414 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:57.414 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:57.414 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:57.414 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:57.419 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -14:20:57.419 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:57.419 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:57.419 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:57.421 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|SHA256withRSAandMGF1) registered for alg algorithm PS256 -14:20:57.423 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|SHA384withRSAandMGF1) registered for alg algorithm PS384 -14:20:57.425 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|SHA512withRSAandMGF1) registered for alg algorithm PS512 -14:20:57.425 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:57.425 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:57.426 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:57.427 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:57.427 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:57.427 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:57.427 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:57.427 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:57.432 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:57.436 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:57.441 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:57.446 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:57.446 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:57.446 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:57.446 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:57.447 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:57.448 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:57.448 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:57.448 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:57.449 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:57.449 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:57.449 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:57.449 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:57.449 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:57.450 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:57.450 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:57.450 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:57.450 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@3ac8cf9b registered for zip algorithm DEF -14:20:57.450 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:57.450 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 36ms -14:20:57.451 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA256withRSAandMGF1 -14:20:57.463 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA384withRSAandMGF1 -14:20:57.475 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA512withRSAandMGF1 -14:20:57.486 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:57.487 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:57.487 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:57.487 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:57.487 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:57.487 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:57.487 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:57.487 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:57.487 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:57.487 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:57.487 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 -14:20:57.487 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:20:57.487 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:57.487 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:57.487 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:57.488 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:57.488 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:57.488 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:57.488 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:57.488 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:57.488 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:57.489 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:57.489 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:57.489 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:57.489 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:57.489 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:57.490 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:57.491 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:57.491 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:57.492 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:57.492 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:57.492 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:57.492 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:57.493 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:57.493 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:57.493 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:57.493 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:57.493 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:57.493 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:57.493 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:57.493 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:57.493 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:57.493 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:57.494 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:57.494 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:57.494 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@55ec556 registered for zip algorithm DEF -14:20:57.494 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:57.494 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 7ms -14:20:57.519 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:57.519 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:57.519 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:57.519 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:57.519 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:57.519 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:57.519 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:57.519 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:57.519 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:57.519 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:57.523 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -14:20:57.523 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:57.523 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:57.523 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:57.525 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:57.527 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:57.529 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:57.529 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:57.529 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:57.530 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:57.531 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:57.531 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:57.531 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:57.531 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:57.531 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:57.551 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:57.561 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:57.569 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:57.576 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:57.577 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:57.577 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:57.577 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:57.578 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:57.578 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:57.579 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:57.579 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:57.579 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:57.579 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:57.579 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:57.580 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:57.581 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:57.582 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:57.582 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:57.582 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:57.582 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@38018b62 registered for zip algorithm DEF -14:20:57.582 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:57.582 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 63ms -14:20:57.594 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:57.594 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:57.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:57.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:57.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:57.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:57.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:57.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:57.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:57.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:57.595 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 -14:20:57.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:20:57.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:57.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:57.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:57.596 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:57.597 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:57.597 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:57.597 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:57.597 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:57.597 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:57.598 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:57.598 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:57.598 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:57.598 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:57.598 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:57.599 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:57.601 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:57.602 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:57.603 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:57.603 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:57.603 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:57.603 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:57.604 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:57.604 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:57.604 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:57.604 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:57.604 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:57.604 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:57.604 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:57.605 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:57.605 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:57.605 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:57.605 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:57.605 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:57.605 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@ce9b9a9 registered for zip algorithm DEF -14:20:57.605 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:57.605 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 11ms -14:20:57.616 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:57.616 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:57.616 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:57.617 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:57.617 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:57.617 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:57.617 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:57.617 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:57.617 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:57.617 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:57.620 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -14:20:57.620 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:57.620 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:57.620 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:57.622 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|SHA256withRSAandMGF1) registered for alg algorithm PS256 -14:20:57.625 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|SHA384withRSAandMGF1) registered for alg algorithm PS384 -14:20:57.627 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|SHA512withRSAandMGF1) registered for alg algorithm PS512 -14:20:57.627 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:57.627 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:57.627 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:57.628 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:57.629 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:57.629 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:57.629 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:57.629 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:57.634 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:57.639 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:57.644 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:57.649 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:57.649 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:57.649 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:57.649 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:57.650 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:57.651 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:57.651 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:57.651 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:57.651 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:57.651 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:57.651 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:57.652 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:57.653 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:57.653 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:57.653 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:57.653 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:57.653 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@15d0849 registered for zip algorithm DEF -14:20:57.653 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:57.653 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 37ms -14:20:57.660 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:57.660 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:57.660 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:57.660 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:57.660 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:57.660 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:57.660 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:57.660 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:57.660 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:57.660 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:57.661 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 -14:20:57.661 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:20:57.661 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:57.661 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:57.661 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:57.661 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:57.662 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:57.662 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:57.662 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:57.662 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:57.662 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:57.663 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:57.663 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:57.663 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:57.663 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:57.663 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:57.663 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:57.664 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:57.665 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:57.666 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:57.666 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:57.666 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:57.666 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:57.666 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:57.666 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:57.666 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:57.667 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:57.667 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:57.667 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:57.667 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:57.667 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:57.667 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:57.667 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:57.667 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:57.667 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:57.667 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@4038cd3a registered for zip algorithm DEF -14:20:57.667 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:57.667 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 7ms -14:20:57.687 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:57.687 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:57.687 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:57.687 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:57.687 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:57.687 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:57.687 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:57.687 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:57.687 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:57.688 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:57.689 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -14:20:57.689 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:57.690 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:57.690 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:57.691 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:57.693 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:57.695 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:57.695 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:57.695 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:57.696 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:57.696 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:57.696 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:57.697 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:57.697 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:57.697 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:57.709 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:57.715 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:57.722 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:57.728 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:57.729 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:57.729 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:57.729 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:57.729 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:57.730 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:57.731 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:57.731 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:57.731 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:57.731 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:57.731 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:57.732 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:57.733 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:57.733 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:57.733 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:57.733 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:57.733 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@506dcf55 registered for zip algorithm DEF -14:20:57.733 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:57.733 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 46ms -14:20:57.737 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:57.737 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:57.737 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:57.737 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:57.737 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:57.737 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:57.737 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:57.737 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:57.737 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:57.737 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:57.738 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 -14:20:57.738 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:20:57.738 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:57.738 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:57.738 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:57.738 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:57.739 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:57.739 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:57.739 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:57.739 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:57.739 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:57.740 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:57.740 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:57.740 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:57.740 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:57.740 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:57.741 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:57.742 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:57.743 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:57.744 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:57.745 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:57.745 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:57.745 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:57.745 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:57.745 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:57.746 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:57.746 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:57.746 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:57.746 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:57.746 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:57.746 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:57.746 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:57.746 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:57.746 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:57.746 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:57.746 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@270b6b5e registered for zip algorithm DEF -14:20:57.746 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:57.746 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 9ms -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.568 s - in org.jose4j.jws.RsaPssTest +14:26:25.081 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS +14:26:25.102 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS +14:26:25.130 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS +14:26:25.195 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS +14:26:25.231 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS +14:26:25.257 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS +14:26:25.322 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:25.323 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:25.323 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:25.323 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:25.323 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:25.323 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:25.323 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:25.323 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:25.323 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:25.323 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:25.388 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +14:26:25.389 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:25.389 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:25.389 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:25.391 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:25.417 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:25.419 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:25.419 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:25.448 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:25.448 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:25.449 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:25.450 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:25.450 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:25.450 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:25.450 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:25.475 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:25.520 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:25.574 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:25.590 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:25.590 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:25.590 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:25.590 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:25.591 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:25.591 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:25.616 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:25.616 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:25.617 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:25.617 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:25.617 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:25.617 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:25.618 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:25.618 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:25.619 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:25.619 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:25.619 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@3cd206b5 registered for zip algorithm DEF +14:26:25.619 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:25.619 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 296ms +14:26:25.737 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS +14:26:25.814 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@65ec8b24):Signature object: SHA256withRSAandMGF1 +14:26:25.863 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS +14:26:25.899 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@58b67519):Signature object: SHA384withRSAandMGF1 +14:26:25.944 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS +14:26:25.981 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@116a2108):Signature object: SHA512withRSAandMGF1 +14:26:26.021 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:26.021 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:26.021 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:26.021 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:26.021 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:26.021 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:26.021 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:26.021 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:26.021 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:26.021 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:26.021 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 +14:26:26.021 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +14:26:26.021 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:26.021 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:26.021 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:26.022 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:26.022 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:26.022 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:26.022 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:26.023 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:26.023 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:26.023 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:26.023 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:26.023 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:26.023 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:26.023 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:26.036 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:26.037 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:26.038 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:26.038 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:26.038 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:26.038 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:26.038 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:26.039 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:26.039 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:26.039 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:26.039 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:26.039 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:26.039 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:26.039 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:26.039 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:26.039 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:26.040 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:26.040 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:26.040 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:26.040 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@5e8c34a0 registered for zip algorithm DEF +14:26:26.040 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:26.040 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 19ms +14:26:26.093 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:26.093 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:26.093 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:26.093 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:26.093 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:26.093 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:26.093 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:26.093 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:26.093 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:26.093 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:26.117 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +14:26:26.117 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:26.118 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:26.118 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:26.119 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|SHA256withRSAandMGF1) registered for alg algorithm PS256 +14:26:26.142 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|SHA384withRSAandMGF1) registered for alg algorithm PS384 +14:26:26.144 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|SHA512withRSAandMGF1) registered for alg algorithm PS512 +14:26:26.156 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:26.156 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:26.156 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:26.157 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:26.157 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:26.158 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:26.158 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:26.158 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:26.182 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:26.203 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:26.240 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:26.266 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:26.266 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:26.266 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:26.266 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:26.267 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:26.267 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:26.267 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:26.267 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:26.268 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:26.268 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:26.268 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:26.288 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:26.289 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:26.290 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:26.290 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:26.290 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:26.290 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@3ac8cf9b registered for zip algorithm DEF +14:26:26.290 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:26.290 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 197ms +14:26:26.291 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA256withRSAandMGF1 +14:26:26.343 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA384withRSAandMGF1 +14:26:26.396 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA512withRSAandMGF1 +14:26:26.448 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:26.448 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:26.448 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:26.448 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:26.448 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:26.448 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:26.448 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:26.448 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:26.448 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:26.448 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:26.449 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 +14:26:26.449 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +14:26:26.449 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:26.449 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:26.449 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:26.449 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:26.450 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:26.450 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:26.450 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:26.450 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:26.450 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:26.450 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:26.450 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:26.450 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:26.451 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:26.451 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:26.451 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:26.468 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:26.469 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:26.470 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:26.470 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:26.470 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:26.470 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:26.470 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:26.470 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:26.470 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:26.470 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:26.470 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:26.470 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:26.470 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:26.471 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:26.471 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:26.471 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:26.471 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:26.471 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:26.471 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@55ec556 registered for zip algorithm DEF +14:26:26.471 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:26.471 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 23ms +14:26:26.596 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:26.596 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:26.596 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:26.596 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:26.596 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:26.596 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:26.596 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:26.596 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:26.596 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:26.597 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:26.628 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +14:26:26.629 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:26.629 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:26.629 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:26.631 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:26.633 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:26.635 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:26.652 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:26.676 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:26.676 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:26.677 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:26.677 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:26.678 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:26.678 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:26.678 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:26.739 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:26.743 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:26.771 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:26.794 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:26.795 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:26.795 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:26.795 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:26.795 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:26.816 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:26.817 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:26.817 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:26.817 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:26.817 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:26.817 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:26.817 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:26.818 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:26.818 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:26.818 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:26.818 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:26.818 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@38018b62 registered for zip algorithm DEF +14:26:26.818 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:26.818 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 222ms +14:26:26.857 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:26.857 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:26.857 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:26.857 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:26.857 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:26.857 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:26.857 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:26.857 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:26.857 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:26.857 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:26.858 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 +14:26:26.858 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +14:26:26.858 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:26.858 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:26.858 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:26.858 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:26.858 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:26.859 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:26.859 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:26.859 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:26.859 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:26.859 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:26.859 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:26.859 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:26.859 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:26.859 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:26.876 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:26.877 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:26.878 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:26.879 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:26.879 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:26.879 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:26.879 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:26.879 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:26.879 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:26.879 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:26.879 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:26.879 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:26.879 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:26.879 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:26.879 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:26.879 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:26.880 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:26.880 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:26.880 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:26.896 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@ce9b9a9 registered for zip algorithm DEF +14:26:26.896 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:26.896 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 39ms +14:26:26.948 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:26.948 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:26.948 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:26.948 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:26.949 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:26.949 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:26.949 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:26.949 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:26.949 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:26.949 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:26.951 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +14:26:26.951 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:26.951 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:26.951 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:26.973 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|SHA256withRSAandMGF1) registered for alg algorithm PS256 +14:26:26.975 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|SHA384withRSAandMGF1) registered for alg algorithm PS384 +14:26:26.993 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|SHA512withRSAandMGF1) registered for alg algorithm PS512 +14:26:26.993 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:26.993 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:26.993 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:26.994 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:26.994 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:26.994 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:26.995 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:26.995 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:27.019 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:27.060 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:27.093 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:27.106 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:27.106 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:27.106 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:27.107 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:27.107 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:27.108 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:27.120 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:27.120 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:27.121 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:27.121 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:27.121 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:27.121 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:27.121 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:27.122 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:27.122 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:27.122 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:27.122 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@15d0849 registered for zip algorithm DEF +14:26:27.122 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:27.122 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 174ms +14:26:27.149 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:27.150 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:27.150 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:27.150 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:27.150 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:27.150 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:27.150 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:27.150 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:27.150 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:27.150 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:27.150 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 +14:26:27.150 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +14:26:27.150 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:27.150 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:27.150 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:27.150 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:27.151 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:27.151 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:27.151 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:27.151 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:27.151 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:27.164 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:27.164 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:27.164 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:27.164 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:27.164 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:27.165 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:27.166 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:27.166 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:27.167 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:27.167 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:27.167 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:27.167 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:27.167 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:27.167 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:27.168 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:27.168 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:27.184 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:27.184 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:27.184 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:27.184 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:27.184 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:27.185 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:27.185 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:27.185 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:27.185 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@4038cd3a registered for zip algorithm DEF +14:26:27.185 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:27.185 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 35ms +14:26:27.257 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:27.257 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:27.257 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:27.257 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:27.257 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:27.258 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:27.258 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:27.258 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:27.258 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:27.258 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:27.259 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +14:26:27.259 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:27.259 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:27.259 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:27.273 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:27.275 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:27.285 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:27.285 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:27.286 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:27.286 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:27.287 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:27.287 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:27.287 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:27.287 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:27.287 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:27.328 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:27.335 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:27.347 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:27.359 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:27.372 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:27.372 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:27.372 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:27.373 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:27.374 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:27.374 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:27.374 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:27.374 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:27.374 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:27.374 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:27.375 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:27.375 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:27.375 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:27.375 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:27.375 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:27.376 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@506dcf55 registered for zip algorithm DEF +14:26:27.376 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:27.376 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 119ms +14:26:27.378 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:27.378 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:27.378 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:27.378 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:27.378 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:27.378 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:27.378 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:27.378 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:27.378 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:27.378 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:27.378 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 +14:26:27.378 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +14:26:27.378 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:27.378 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:27.378 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:27.379 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:27.379 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:27.379 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:27.379 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:27.379 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:27.379 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:27.400 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:27.400 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:27.400 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:27.400 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:27.400 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:27.401 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:27.402 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:27.402 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:27.403 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:27.403 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:27.403 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:27.403 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:27.403 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:27.404 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:27.404 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:27.413 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:27.413 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:27.413 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:27.413 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:27.414 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:27.414 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:27.414 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:27.414 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:27.414 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:27.414 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@270b6b5e registered for zip algorithm DEF +14:26:27.414 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:27.414 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 36ms +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 2.342 s - in org.jose4j.jws.RsaPssTest [INFO] Running org.jose4j.jws.JwsUnencodedPayloadOptionTest -14:20:57.781 DEBUG o.j.j.JwsUnencodedPayloadOptionTest - Expected exception because JWS Compact Serialization with unencoded non-detached payloads cannot have period ('.') characters : org.jose4j.lang.JoseException: per https://tools.ietf.org/html/rfc7797#section-5.2 when using the JWS Compact Serialization, unencoded non-detached payloads using period ('.') characters would cause parsing errors; such payloads MUST NOT be used with the JWS Compact Serialization. -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.03 s - in org.jose4j.jws.JwsUnencodedPayloadOptionTest +14:26:27.504 DEBUG o.j.j.JwsUnencodedPayloadOptionTest - Expected exception because JWS Compact Serialization with unencoded non-detached payloads cannot have period ('.') characters : org.jose4j.lang.JoseException: per https://tools.ietf.org/html/rfc7797#section-5.2 when using the JWS Compact Serialization, unencoded non-detached payloads using period ('.') characters would cause parsing errors; such payloads MUST NOT be used with the JWS Compact Serialization. +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.086 s - in org.jose4j.jws.JwsUnencodedPayloadOptionTest [INFO] Running org.jose4j.jws.ChangingKeyTest [INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jws.ChangingKeyTest [INFO] Running org.jose4j.jws.JwsUsingEcdsaP521Sha512ExampleTest Payload -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.023 s - in org.jose4j.jws.JwsUsingEcdsaP521Sha512ExampleTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.063 s - in org.jose4j.jws.JwsUsingEcdsaP521Sha512ExampleTest [INFO] Running org.jose4j.jws.JwsPlaintextTest -14:20:57.815 DEBUG org.jose4j.jws.JwsPlaintextTest - {"auth_time":1339613248,"exp":1339613548,"iss":"https:\/\/example.com","aud":"a","jti":"jIA8qa35AroV6iP2q4wRAl","user_id":"john","iat":1339613248,"acr":3} -[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jws.JwsPlaintextTest +14:26:27.610 DEBUG org.jose4j.jws.JwsPlaintextTest - {"auth_time":1339613248,"exp":1339613548,"iss":"https:\/\/example.com","aud":"a","jti":"jIA8qa35AroV6iP2q4wRAl","user_id":"john","iat":1339613248,"acr":3} +[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.013 s - in org.jose4j.jws.JwsPlaintextTest [INFO] Running org.jose4j.jws.DetachedContentTest -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.01 s - in org.jose4j.jws.DetachedContentTest +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.037 s - in org.jose4j.jws.DetachedContentTest [INFO] Running org.jose4j.jws.GetPayloadTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jws.GetPayloadTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.jws.GetPayloadTest [INFO] Running org.jose4j.jws.EcdsaUsingShaEdgesTest -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.124 s - in org.jose4j.jws.EcdsaUsingShaEdgesTest +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.42 s - in org.jose4j.jws.EcdsaUsingShaEdgesTest [INFO] Running org.jose4j.jws.JwsUsingRsaSha256ExampleTest -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.011 s - in org.jose4j.jws.JwsUsingRsaSha256ExampleTest +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.052 s - in org.jose4j.jws.JwsUsingRsaSha256ExampleTest [INFO] Running org.jose4j.jws.EcdsaUsingShaTest -14:20:57.985 DEBUG org.jose4j.jws.JwsTestSupport - ES384 eyJhbGciOiJFUzM4NCJ9.VGhlIHVtbGF1dCAoL8uIyoptbGHKinQvIFVVTS1sb3d0KSByZWZlcnMgdG8gYSBzb3VuZCBzaGlmdC4.El7y0nse31wkuc2GkArxqsXfGfb7GrvsMbMTzBuxfBmvvL6TXgDMfVuwo-6sfH4KAdClVgxBuDbd09zVVfrt5xj_rcH0Z_GGqE7g3UydjgxXY0wZ3Z0JWm8KY94qoATE -14:20:58.021 DEBUG org.jose4j.jws.JwsTestSupport - ES512 eyJhbGciOiJFUzUxMiJ9.Pz8_Pz8.Ad0aYofqiS6hvMtulaworZ-oXI3Md6-5aWcs-het9Uf0env2Fc4Mj_7Hnz6Na__6nDihTod93lH9sc0tTdUr-meLAGJbwXGcgMVsbXyoPhiLMdEJLCGarssZZjrDtySAXJq5BTX_KI8JGl0PbYtJSQq68FsTYE5fLUGuhpKnMywglmu- -14:20:58.066 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -14:20:58.066 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -14:20:58.066 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:20:58.066 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA256withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl -14:20:58.066 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:20:58.066 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:20:58.066 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -14:20:58.066 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -14:20:58.067 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:20:58.067 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA384withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl -14:20:58.067 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:20:58.067 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:20:58.067 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -14:20:58.067 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -14:20:58.067 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:20:58.067 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA512withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl -14:20:58.067 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:20:58.067 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -14:20:58.067 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES256/SHA256withECDSA expects a key using P-256 but was P-521 -14:20:58.067 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES384/SHA384withECDSA expects a key using P-384 but was P-521 -14:20:58.067 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES384/SHA384withECDSA expects a key using P-384 but was P-256 -14:20:58.068 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES512/SHA512withECDSA expects a key using P-521 but was P-256 -14:20:58.078 DEBUG org.jose4j.jws.JwsTestSupport - ES512 eyJhbGciOiJFUzUxMiJ9.dG91Y2jDnw.AI4Fk-qq8LT3YDktOsQOv92IvHASZMtC_Pl6rpJ98it8g-HJOUYy-gUMpp3ToASe27KMkzPoJv6j0vCl2s-2JSCuAaRBQg-sMFCraH5Q2MHuWVrKLESGvDl1o5b-cIF-NuCJelGQFVnSaOMp_nMOmVXKRmg-t5fMpI_OUsjbKZMAvptO -14:20:58.123 DEBUG org.jose4j.jws.JwsTestSupport - ES256 eyJhbGciOiJFUzI1NiJ9.UEFZTE9BRCEhIQ.HbBjTb55RIlRCsEPZBqdAJS3n3bFHWxUrGG1IJSDDMLzv5pk33VsCFSdGM_DRz5uhl9gLNJY2HOD8EgrzOUqGw -14:20:58.138 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:58.138 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:58.138 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:58.138 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:58.138 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:58.139 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:58.139 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:58.139 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:58.139 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:58.139 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:58.140 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -14:20:58.140 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:58.141 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:58.141 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:58.142 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:58.144 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:58.146 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:58.146 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:58.146 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:58.147 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:58.147 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:58.147 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:58.148 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:58.148 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:58.148 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:58.162 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:58.166 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:58.169 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:58.173 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:58.173 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:58.173 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:58.173 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:58.174 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:58.174 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:58.175 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:58.175 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:58.175 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:58.175 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:58.175 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:58.175 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:58.176 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:58.176 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:58.176 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:58.176 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:58.176 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@138caeca registered for zip algorithm DEF -14:20:58.176 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:58.176 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 38ms -14:20:58.193 DEBUG org.jose4j.jws.JwsTestSupport - ES256K eyJhbGciOiJFUzI1NksifQ.aw.sEUEQKQnKbFmYkXonI2grIenoU6ePmOj078I1O8nGOL6OzlpE5npE7gF9BkxtQU6x2Am9IvsX1bprc4kZnh2Lw -14:20:58.199 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:58.199 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:58.199 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:58.199 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:58.199 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:58.199 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:58.199 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:58.199 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:58.200 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:58.200 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:58.200 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 -14:20:58.200 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:20:58.200 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:58.200 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:58.200 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:58.200 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:58.201 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:58.201 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:58.201 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:58.201 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:58.201 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:58.202 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:58.202 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:58.202 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:58.202 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:58.202 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:58.202 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:58.203 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:58.204 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:58.205 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:58.205 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:58.205 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:58.205 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:58.205 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:58.205 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:58.205 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:58.205 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:58.205 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:58.206 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:58.206 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:58.206 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:58.206 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:58.206 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:58.206 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:58.206 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:58.206 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@72d0f2b4 registered for zip algorithm DEF -14:20:58.206 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:58.206 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 7ms -14:20:58.208 DEBUG org.jose4j.jws.JwsTestSupport - ES256 eyJhbGciOiJFUzI1NiJ9.c29tZXRoaW5nIGhlcmU.t_pwecWCCfFLtZghoIdrhNAYwz1cY26wlFJvKzrrjC8O2YrBaK1nHz5UO7XrVWoW_4MeHUh_yTCmArGSNqg34Q -14:20:58.222 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:58.222 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:58.222 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:58.222 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:58.222 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:58.222 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:58.222 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:58.222 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:58.222 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:58.222 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:58.224 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -14:20:58.224 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:58.224 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:58.224 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:58.226 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:58.228 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:58.229 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:58.230 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:58.230 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:58.230 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:58.231 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:58.231 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:58.231 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:58.231 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:58.231 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:58.236 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:58.241 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:58.245 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:58.250 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:58.250 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:58.251 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:58.251 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:58.251 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:58.252 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:58.252 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:58.252 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:58.252 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:58.252 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:58.253 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:58.253 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:58.253 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:58.254 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:58.254 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:58.254 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:58.254 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@b2f4ece registered for zip algorithm DEF -14:20:58.254 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:58.254 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 32ms -14:20:58.255 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:58.255 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:58.255 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:58.255 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:58.255 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:58.256 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:58.256 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:58.256 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:58.256 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:58.256 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:58.256 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 -14:20:58.256 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:20:58.256 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:58.256 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:58.256 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:58.256 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:58.257 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:58.257 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:58.257 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:58.257 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:58.257 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:58.257 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:58.258 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:58.258 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:58.258 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:58.258 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:58.258 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:58.259 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:58.260 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:58.261 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:58.261 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:58.261 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:58.261 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:58.261 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:58.261 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:58.261 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:58.261 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:58.261 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:58.261 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:58.261 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:58.262 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:58.262 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:58.262 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:58.262 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:58.262 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:58.262 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@7e1f584d registered for zip algorithm DEF -14:20:58.262 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:58.262 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 7ms -[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.283 s - in org.jose4j.jws.EcdsaUsingShaTest +14:26:28.180 DEBUG org.jose4j.jws.JwsTestSupport - ES384 eyJhbGciOiJFUzM4NCJ9.VGhlIHVtbGF1dCAoL8uIyoptbGHKinQvIFVVTS1sb3d0KSByZWZlcnMgdG8gYSBzb3VuZCBzaGlmdC4.WHO5hz0extq1A-JS1jq7whsQeTkNC5gl8RcMyckLzqrMafBxF5GTaZWlrj8VDKEDqibX2GGS6khFZK9CfGdopAmX2cwFjvYiu2A5TDJWX6XVDP59YcsTUcCbKG82bxxp +14:26:28.357 DEBUG org.jose4j.jws.JwsTestSupport - ES512 eyJhbGciOiJFUzUxMiJ9.Pz8_Pz8.AJYM-eNrJ45te0yc9VwIp_E8-twePEckhWpf9-FOeCe4IN1QHCjmJXQRoIS-J3C3L9ubEGtf_3fGnrv_EnpzXyYHAHNxDStSuYwOy-O0LQXpa8kw4MW0aatBROnol_45RVy7PAYOuN6rv1ywbwyLutVjckAeX-OFfLxuGnChBIfw_E8d +14:26:28.575 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +14:26:28.575 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +14:26:28.575 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +14:26:28.575 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA256withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl +14:26:28.575 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +14:26:28.575 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +14:26:28.576 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +14:26:28.576 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +14:26:28.592 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +14:26:28.592 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA384withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl +14:26:28.592 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +14:26:28.592 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +14:26:28.592 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +14:26:28.592 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +14:26:28.592 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +14:26:28.592 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA512withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl +14:26:28.593 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +14:26:28.593 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +14:26:28.593 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES256/SHA256withECDSA expects a key using P-256 but was P-521 +14:26:28.593 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES384/SHA384withECDSA expects a key using P-384 but was P-521 +14:26:28.593 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES384/SHA384withECDSA expects a key using P-384 but was P-256 +14:26:28.593 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES512/SHA512withECDSA expects a key using P-521 but was P-256 +14:26:28.627 DEBUG org.jose4j.jws.JwsTestSupport - ES512 eyJhbGciOiJFUzUxMiJ9.dG91Y2jDnw.AZbQTgLFQrupoW4gYoohY-V-KI1N74tIV2gnKVdeepbJdnEajwPG7Q1PT4x--ZR9WXvrFi3nVWTzp-RknVhxjDCMABEclVNuu2g0y7VTefua90oYhoGmMnqFJrkSv8hxxIEb7GMjIoS-2kTJYIxQiRBl8y9XXvfdWIhEuJ5uBNM3RZxR +14:26:28.830 DEBUG org.jose4j.jws.JwsTestSupport - ES256 eyJhbGciOiJFUzI1NiJ9.UEFZTE9BRCEhIQ.skj6PcCUdlseTouR1Z05kU95y-l_L11z4d8pefXyp1udR-mfjNbbSNvImc9EABDYki7oXNcCKEC2QuKaZjfbYQ +14:26:28.901 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:28.901 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:28.901 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:28.901 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:28.901 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:28.901 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:28.901 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:28.901 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:28.901 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:28.901 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:28.903 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +14:26:28.903 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:28.903 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:28.903 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:28.921 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:28.923 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:28.941 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:28.941 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:28.941 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:28.941 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:28.942 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:28.942 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:28.942 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:28.942 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:28.942 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:28.959 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:28.999 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:29.011 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:29.026 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:29.026 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:29.026 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:29.027 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:29.027 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:29.028 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:29.044 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:29.044 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:29.044 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:29.044 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:29.044 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:29.045 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:29.045 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:29.045 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:29.046 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:29.046 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:29.046 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@138caeca registered for zip algorithm DEF +14:26:29.046 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:29.046 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 145ms +14:26:29.129 DEBUG org.jose4j.jws.JwsTestSupport - ES256K eyJhbGciOiJFUzI1NksifQ.aw.l6V1dUmSGAuBQL4XbZz0PVBApP_Vi5M90JxcgHxtoCA9TJBnsqZvr1P4TTPD0mfsHcYfcTvh7W0i9h2OjhR6uA +14:26:29.151 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:29.151 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:29.151 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:29.151 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:29.151 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:29.151 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:29.151 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:29.151 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:29.151 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:29.151 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:29.151 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 +14:26:29.151 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +14:26:29.151 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:29.151 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:29.151 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:29.151 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:29.174 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:29.174 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:29.174 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:29.174 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:29.174 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:29.175 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:29.175 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:29.175 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:29.175 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:29.175 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:29.176 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:29.176 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:29.177 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:29.178 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:29.178 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:29.178 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:29.178 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:29.178 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:29.178 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:29.178 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:29.178 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:29.179 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:29.179 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:29.179 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:29.200 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:29.200 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:29.200 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:29.200 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:29.200 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:29.200 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@72d0f2b4 registered for zip algorithm DEF +14:26:29.200 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:29.200 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 49ms +14:26:29.202 DEBUG org.jose4j.jws.JwsTestSupport - ES256 eyJhbGciOiJFUzI1NiJ9.c29tZXRoaW5nIGhlcmU.SXtySPuiXon7oROcdZ81eVC3GjdyPuM79U8GPqv8pyOSkU4GbmVHOuFMVbx7oBt8FeX7F_LY1SnPxfF8eQf4eA +14:26:29.276 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:29.276 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:29.276 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:29.276 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:29.276 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:29.276 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:29.276 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:29.277 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:29.277 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:29.277 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:29.278 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +14:26:29.278 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:29.278 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:29.278 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:29.292 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:29.294 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:29.296 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:29.308 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:29.308 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:29.308 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:29.309 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:29.309 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:29.309 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:29.309 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:29.309 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:29.330 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:29.347 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:29.380 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:29.397 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:29.397 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:29.397 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:29.397 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:29.398 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:29.398 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:29.399 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:29.399 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:29.399 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:29.399 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:29.399 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:29.399 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:29.399 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:29.400 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:29.424 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:29.424 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:29.424 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@b2f4ece registered for zip algorithm DEF +14:26:29.424 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:29.424 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 148ms +14:26:29.425 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:29.425 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:29.425 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:29.425 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:29.425 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:29.425 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:29.425 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:29.425 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:29.425 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:29.425 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:29.426 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 +14:26:29.426 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +14:26:29.426 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:29.426 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:29.426 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:29.426 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:29.426 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:29.427 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:29.427 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:29.427 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:29.427 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:29.427 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:29.427 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:29.427 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:29.427 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:29.427 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:29.444 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:29.445 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:29.446 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:29.446 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:29.446 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:29.447 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:29.447 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:29.447 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:29.447 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:29.447 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:29.447 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:29.447 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:29.447 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:29.447 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:29.447 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:29.447 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:29.447 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:29.447 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:29.448 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:29.448 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@7e1f584d registered for zip algorithm DEF +14:26:29.448 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:29.448 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 23ms +[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.309 s - in org.jose4j.jws.EcdsaUsingShaTest [INFO] Running org.jose4j.jws.JwsUsingEcdsaP256Sha256ExampleTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jws.JwsUsingEcdsaP256Sha256ExampleTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.jws.JwsUsingEcdsaP256Sha256ExampleTest [INFO] Running org.jose4j.jws.PublicKeyAsHmacKeyTest -14:20:58.274 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:58.274 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:58.274 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:58.274 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:58.274 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:58.275 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:58.275 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:58.275 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:58.275 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:58.275 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:58.276 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -14:20:58.276 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:58.276 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:58.276 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:58.278 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:58.280 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:58.282 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:58.282 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:58.282 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:58.282 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:58.283 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:58.283 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:58.283 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:58.283 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:58.283 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:58.288 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:58.293 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:58.298 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:58.303 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:58.303 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:58.303 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:58.303 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:58.303 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:58.304 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:58.304 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:58.304 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:58.304 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:58.304 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:58.304 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:58.305 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:58.305 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:58.306 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:58.306 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:58.306 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:58.306 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@34fe326d registered for zip algorithm DEF -14:20:58.306 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:58.306 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 32ms -14:20:58.306 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. -14:20:58.306 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:58.306 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:58.306 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:58.306 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:58.306 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:58.306 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:58.306 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:58.307 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:58.307 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:58.307 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:58.307 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 -14:20:58.307 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:20:58.307 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:58.307 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:58.307 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:58.307 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:58.308 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:58.308 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:58.308 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:58.308 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:58.308 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:58.309 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:58.309 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:58.309 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:58.309 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:58.309 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:58.309 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:58.310 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:58.311 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:58.312 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:58.312 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:58.312 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:58.312 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:58.312 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:58.312 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:58.312 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:58.312 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:58.312 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:58.312 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:58.312 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:58.312 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:58.313 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:58.313 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:58.313 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:58.313 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:58.313 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@30a7c98f registered for zip algorithm DEF -14:20:58.313 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:58.313 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 7ms -14:20:58.321 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:58.321 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:58.321 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:58.321 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:58.321 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:58.321 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:58.321 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:58.321 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:58.321 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:58.321 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:58.323 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -14:20:58.323 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:58.323 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:58.323 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:58.325 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:58.327 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:58.329 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:58.329 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:58.329 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:58.329 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:58.330 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:58.330 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:58.330 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:58.330 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:58.330 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:58.335 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:58.340 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:58.344 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:58.349 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:58.349 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:58.349 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:58.349 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:58.350 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:58.350 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:58.351 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:58.351 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:58.352 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:58.352 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:58.352 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:58.352 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:58.352 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:58.353 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:58.353 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:58.353 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:58.353 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@a33b4e3 registered for zip algorithm DEF -14:20:58.353 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:58.353 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 32ms -14:20:58.353 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. -14:20:58.353 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:58.353 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:58.353 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:58.353 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:58.353 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:58.353 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:58.354 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:58.354 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:58.354 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:58.354 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:58.354 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 -14:20:58.354 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:20:58.354 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:58.354 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:58.354 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:58.354 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:58.355 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:58.355 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:58.355 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:58.355 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:58.355 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:58.355 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:58.355 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:58.355 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:58.355 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:58.356 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:58.356 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:58.357 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:58.358 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:58.358 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:58.359 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:58.359 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:58.359 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:58.359 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:58.359 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:58.359 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:58.359 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:58.359 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:58.359 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:58.359 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:58.359 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:58.359 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:58.359 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:58.359 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:58.359 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:58.359 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@c6da8bb registered for zip algorithm DEF -14:20:58.359 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:58.359 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 6ms -14:20:58.367 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:58.368 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:58.368 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:58.368 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:58.368 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:58.368 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:58.368 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:58.368 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:58.368 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:58.368 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:58.369 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -14:20:58.369 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:58.370 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:58.370 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:58.372 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:58.373 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:58.375 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:58.375 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:58.375 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:58.375 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:58.376 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:58.376 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:58.376 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:58.376 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:58.376 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:58.381 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:58.386 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:58.391 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:58.395 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:58.395 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:58.395 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:58.395 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:58.396 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:58.397 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:58.397 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:58.397 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:58.397 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:58.397 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:58.397 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:58.398 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:58.398 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:58.399 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:58.399 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:58.399 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:58.399 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@7e736350 registered for zip algorithm DEF -14:20:58.399 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:58.399 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 31ms -14:20:58.399 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. -14:20:58.399 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:58.399 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:58.399 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:58.399 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:58.399 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:58.399 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:58.399 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:58.399 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:58.399 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:58.399 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:58.400 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 -14:20:58.400 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:20:58.400 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:58.400 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:58.400 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:58.400 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:58.400 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:58.400 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:58.400 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:58.401 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:58.401 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:58.401 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:58.401 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:58.401 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:58.401 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:58.401 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:58.402 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:58.403 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:58.403 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:58.404 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:58.404 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:58.404 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:58.404 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:58.404 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:58.404 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:58.405 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:58.405 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:58.405 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:58.405 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:58.405 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:58.405 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:58.405 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:58.405 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:58.405 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:58.405 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:58.405 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@36b310aa registered for zip algorithm DEF -14:20:58.405 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:58.405 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 6ms -14:20:58.413 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:58.413 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:58.413 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:58.413 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:58.413 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:58.414 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:58.414 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:58.414 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:58.414 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:58.414 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:58.415 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -14:20:58.415 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:58.415 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:58.415 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:58.417 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:58.419 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:58.421 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:58.421 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:58.421 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:58.421 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:58.422 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:58.422 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:58.422 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:58.422 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:58.422 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:58.427 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:58.432 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:58.436 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:58.441 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:58.441 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:58.441 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:58.441 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:58.442 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:58.442 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:58.443 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:58.443 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:58.443 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:58.443 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:58.443 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:58.443 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:58.444 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:58.444 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:58.444 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:58.444 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:58.444 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@5d7835a8 registered for zip algorithm DEF -14:20:58.444 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:58.444 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 31ms -14:20:58.444 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. -14:20:58.444 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:58.445 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:58.445 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:58.445 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:58.445 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:58.445 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:58.445 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:58.445 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:58.445 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:58.445 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:58.445 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 -14:20:58.445 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:20:58.445 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:58.445 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:58.445 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:58.445 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:58.446 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:58.446 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:58.446 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:58.446 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:58.446 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:58.446 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:58.447 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:58.447 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:58.447 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:58.447 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:58.447 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:58.448 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:58.449 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:58.450 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:58.450 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:58.450 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:58.450 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:58.450 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:58.450 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:58.450 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:58.450 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:58.450 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:58.450 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:58.450 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:58.450 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:58.451 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:58.451 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:58.451 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:58.451 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:58.451 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@736048ed registered for zip algorithm DEF -14:20:58.451 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:58.451 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 6ms -14:20:58.463 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. -14:20:58.464 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. -14:20:58.466 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. -14:20:58.466 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.196 s - in org.jose4j.jws.PublicKeyAsHmacKeyTest +14:26:29.529 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:29.529 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:29.529 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:29.529 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:29.529 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:29.529 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:29.529 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:29.529 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:29.529 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:29.529 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:29.530 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +14:26:29.531 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:29.531 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:29.531 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:29.549 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:29.551 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:29.553 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:29.553 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:29.553 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:29.553 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:29.554 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:29.554 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:29.554 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:29.554 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:29.554 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:29.579 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:29.612 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:29.629 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:29.710 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:29.710 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:29.710 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:29.710 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:29.711 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:29.711 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:29.712 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:29.732 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:29.732 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:29.732 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:29.732 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:29.733 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:29.733 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:29.733 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:29.733 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:29.733 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:29.733 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@34fe326d registered for zip algorithm DEF +14:26:29.733 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:29.733 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 204ms +14:26:29.734 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. +14:26:29.734 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:29.734 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:29.734 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:29.734 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:29.734 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:29.734 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:29.734 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:29.734 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:29.734 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:29.734 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:29.735 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 +14:26:29.735 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +14:26:29.735 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:29.735 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:29.735 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:29.735 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:29.735 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:29.735 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:29.735 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:29.736 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:29.736 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:29.748 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:29.748 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:29.748 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:29.748 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:29.748 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:29.749 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:29.750 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:29.751 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:29.751 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:29.751 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:29.751 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:29.751 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:29.752 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:29.752 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:29.768 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:29.768 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:29.768 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:29.768 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:29.768 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:29.768 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:29.768 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:29.769 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:29.769 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:29.769 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:29.769 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@30a7c98f registered for zip algorithm DEF +14:26:29.769 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:29.769 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 35ms +14:26:29.805 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:29.805 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:29.805 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:29.805 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:29.805 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:29.805 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:29.805 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:29.805 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:29.805 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:29.805 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:29.807 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +14:26:29.807 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:29.807 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:29.807 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:29.829 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:29.831 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:29.848 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:29.849 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:29.849 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:29.849 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:29.850 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:29.850 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:29.850 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:29.850 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:29.850 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:29.867 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:29.900 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:29.917 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:29.938 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:29.938 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:29.938 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:29.938 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:29.939 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:29.939 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:29.956 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:29.956 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:29.956 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:29.957 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:29.957 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:29.957 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:29.957 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:29.958 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:29.958 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:29.958 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:29.958 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@a33b4e3 registered for zip algorithm DEF +14:26:29.958 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:29.958 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 153ms +14:26:29.958 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. +14:26:29.958 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:29.958 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:29.958 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:29.958 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:29.958 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:29.958 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:29.958 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:29.958 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:29.958 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:29.958 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:29.959 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 +14:26:29.959 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +14:26:29.959 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:29.959 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:29.959 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:29.959 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:29.959 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:29.960 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:29.960 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:29.980 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:29.980 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:29.980 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:29.981 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:29.981 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:29.981 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:29.981 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:29.981 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:29.982 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:29.983 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:29.983 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:29.983 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:29.983 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:29.984 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:30.004 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:30.004 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:30.004 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:30.004 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:30.004 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:30.004 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:30.004 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:30.004 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:30.005 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:30.005 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:30.005 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:30.005 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:30.005 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@c6da8bb registered for zip algorithm DEF +14:26:30.005 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:30.005 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 47ms +14:26:30.049 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:30.049 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:30.049 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:30.049 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:30.049 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:30.049 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:30.049 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:30.050 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:30.050 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:30.050 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:30.051 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +14:26:30.051 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:30.051 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:30.051 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:30.073 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:30.075 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:30.093 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:30.093 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:30.093 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:30.093 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:30.094 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:30.094 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:30.094 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:30.094 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:30.094 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:30.119 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:30.149 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:30.170 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:30.187 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:30.187 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:30.187 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:30.187 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:30.204 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:30.205 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:30.205 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:30.205 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:30.205 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:30.205 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:30.205 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:30.206 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:30.206 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:30.206 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:30.206 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:30.207 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:30.207 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@7e736350 registered for zip algorithm DEF +14:26:30.207 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:30.207 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 158ms +14:26:30.207 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. +14:26:30.207 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:30.207 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:30.207 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:30.207 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:30.207 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:30.207 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:30.207 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:30.207 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:30.207 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:30.207 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:30.207 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 +14:26:30.207 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +14:26:30.207 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:30.207 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:30.207 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:30.224 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:30.224 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:30.225 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:30.225 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:30.225 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:30.225 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:30.225 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:30.225 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:30.225 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:30.225 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:30.225 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:30.226 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:30.227 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:30.227 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:30.244 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:30.244 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:30.245 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:30.245 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:30.245 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:30.245 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:30.245 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:30.245 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:30.245 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:30.245 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:30.245 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:30.246 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:30.246 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:30.246 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:30.246 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:30.246 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:30.246 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@36b310aa registered for zip algorithm DEF +14:26:30.246 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:30.246 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 39ms +14:26:30.286 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:30.287 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:30.287 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:30.287 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:30.287 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:30.287 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:30.287 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:30.287 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:30.287 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:30.287 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:30.304 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +14:26:30.304 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:30.304 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:30.304 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:30.306 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:30.324 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:30.326 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:30.326 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:30.326 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:30.327 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:30.327 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:30.327 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:30.328 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:30.328 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:30.328 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:30.357 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:30.379 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:30.412 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:30.429 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:30.429 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:30.429 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:30.429 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:30.430 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:30.430 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:30.431 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:30.431 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:30.431 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:30.431 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:30.431 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:30.431 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:30.431 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:30.456 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:30.456 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:30.456 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:30.456 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@5d7835a8 registered for zip algorithm DEF +14:26:30.456 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:30.456 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 169ms +14:26:30.456 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. +14:26:30.456 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:30.456 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:30.456 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:30.456 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:30.457 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:30.457 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:30.457 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:30.457 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:30.457 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:30.457 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:30.457 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 +14:26:30.457 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +14:26:30.457 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:30.457 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:30.457 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:30.457 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:30.458 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:30.458 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:30.458 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:30.458 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:30.458 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:30.458 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:30.458 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:30.458 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:30.458 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:30.458 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:30.459 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:30.476 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:30.477 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:30.478 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:30.478 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:30.478 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:30.478 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:30.478 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:30.478 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:30.478 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:30.478 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:30.478 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:30.478 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:30.478 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:30.478 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:30.478 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:30.479 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:30.479 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:30.479 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:30.479 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@736048ed registered for zip algorithm DEF +14:26:30.479 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:30.479 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 23ms +14:26:30.539 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. +14:26:30.552 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. +14:26:30.554 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. +14:26:30.555 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.065 s - in org.jose4j.jws.PublicKeyAsHmacKeyTest [INFO] Running org.jose4j.jws.HmacShaTest -14:20:58.469 DEBUG org.jose4j.jws.JwsTestSupport - HS256 eyJhbGciOiJIUzI1NiJ9.c29tZSBjb250ZW50IHRoYXQgaXMgdGhlIHBheWxvYWQ.qGO7O7W2ECVl6uO7lfsXDgEF-EUEti0i-a_AimulIRA -14:20:58.469 DEBUG org.jose4j.jws.JwsTestSupport - HS256 eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJodHRwczovL2p3dC1pZHAuZXhhbXBsZS5jb20iLAogICAgInBybiI6Im1haWx0bzptaWtlQGV4YW1wbGUuY29tIiwKICAgICJhdWQiOiJodHRwczovL2p3dC1ycC5leGFtcGxlLm5ldCIsCiAgICAiaWF0IjoxMzAwODE1NzgwLAogICAgImV4cCI6MTMwMDgxOTM4MCwKICAgICJodHRwOi8vY2xhaW1zLmV4YW1wbGUuY29tL21lbWJlciI6dHJ1ZX0.ZhkLsRIwT5xHXNgOpdFJ_7q5kqLd6sMiOOEV6kxTNCo -14:20:58.470 DEBUG org.jose4j.jws.JwsTestSupport - HS384 eyJhbGciOiJIUzM4NCJ9.eyJtZWgiOiJtZWgifQ.fptKQJmGN3fBP_FiQzdAGdmx-Q5iWjQvJrLfdmFnebxbQuzOmzejBrzYh4MyS01a -14:20:58.471 DEBUG org.jose4j.jws.JwsTestSupport - HS384 eyJhbGciOiJIUzM4NCJ9.TG9va2luZyBnb29kLCBCaWxseSBSYXkh.wtlqZW8_eLF3hjMZT9c_kzg133b2b_JsR44bHGshc4w_BEUJApKerwEw9cltL8w9 -14:20:58.471 DEBUG org.jose4j.jws.JwsTestSupport - HS512 eyJhbGciOiJIUzUxMiJ9.RmVlbGluZyBnb29kLCBMb3VpcyE.i4SAIaVYY4gxhqJxMvw3FKsar5RBCxzadaK2YT3HeeguWgJMLpDMu9cK1WxetjYmce49ZQmTxmB5nTbE_IgKHQ -14:20:58.472 DEBUG org.jose4j.jws.JwsTestSupport - HS512 eyJhbGciOiJIUzUxMiJ9.eyJtZWgiOiJtZWh2YWx1ZSJ9.NeB669dYkPmqgLqgd_sVqwIfCvb4XN-K67gpMJR93wfw_DylpxB1ell2opHM-E5P9jNKE2GYxTxwcI68Z2CTxw -14:20:58.473 DEBUG org.jose4j.jws.HmacShaTest - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 72 bits -14:20:58.473 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 384 bits for HS384) or larger MUST be used with the HMAC SHA algorithms but this key is only 376 bits -14:20:58.474 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 384 bits for HS384) or larger MUST be used with the HMAC SHA algorithms but this key is only 376 bits -14:20:58.474 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 512 bits for HS512) or larger MUST be used with the HMAC SHA algorithms but this key is only 504 bits -14:20:58.474 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 512 bits for HS512) or larger MUST be used with the HMAC SHA algorithms but this key is only 504 bits -14:20:58.474 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 8 bits -14:20:58.475 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 248 bits -14:20:58.475 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 248 bits -[INFO] Tests run: 16, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s - in org.jose4j.jws.HmacShaTest +14:26:30.581 DEBUG org.jose4j.jws.JwsTestSupport - HS256 eyJhbGciOiJIUzI1NiJ9.c29tZSBjb250ZW50IHRoYXQgaXMgdGhlIHBheWxvYWQ.qGO7O7W2ECVl6uO7lfsXDgEF-EUEti0i-a_AimulIRA +14:26:30.582 DEBUG org.jose4j.jws.JwsTestSupport - HS256 eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJodHRwczovL2p3dC1pZHAuZXhhbXBsZS5jb20iLAogICAgInBybiI6Im1haWx0bzptaWtlQGV4YW1wbGUuY29tIiwKICAgICJhdWQiOiJodHRwczovL2p3dC1ycC5leGFtcGxlLm5ldCIsCiAgICAiaWF0IjoxMzAwODE1NzgwLAogICAgImV4cCI6MTMwMDgxOTM4MCwKICAgICJodHRwOi8vY2xhaW1zLmV4YW1wbGUuY29tL21lbWJlciI6dHJ1ZX0.ZhkLsRIwT5xHXNgOpdFJ_7q5kqLd6sMiOOEV6kxTNCo +14:26:30.583 DEBUG org.jose4j.jws.JwsTestSupport - HS384 eyJhbGciOiJIUzM4NCJ9.eyJtZWgiOiJtZWgifQ.fptKQJmGN3fBP_FiQzdAGdmx-Q5iWjQvJrLfdmFnebxbQuzOmzejBrzYh4MyS01a +14:26:30.583 DEBUG org.jose4j.jws.JwsTestSupport - HS384 eyJhbGciOiJIUzM4NCJ9.TG9va2luZyBnb29kLCBCaWxseSBSYXkh.wtlqZW8_eLF3hjMZT9c_kzg133b2b_JsR44bHGshc4w_BEUJApKerwEw9cltL8w9 +14:26:30.608 DEBUG org.jose4j.jws.JwsTestSupport - HS512 eyJhbGciOiJIUzUxMiJ9.RmVlbGluZyBnb29kLCBMb3VpcyE.i4SAIaVYY4gxhqJxMvw3FKsar5RBCxzadaK2YT3HeeguWgJMLpDMu9cK1WxetjYmce49ZQmTxmB5nTbE_IgKHQ +14:26:30.609 DEBUG org.jose4j.jws.JwsTestSupport - HS512 eyJhbGciOiJIUzUxMiJ9.eyJtZWgiOiJtZWh2YWx1ZSJ9.NeB669dYkPmqgLqgd_sVqwIfCvb4XN-K67gpMJR93wfw_DylpxB1ell2opHM-E5P9jNKE2GYxTxwcI68Z2CTxw +14:26:30.610 DEBUG org.jose4j.jws.HmacShaTest - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 72 bits +14:26:30.610 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 384 bits for HS384) or larger MUST be used with the HMAC SHA algorithms but this key is only 376 bits +14:26:30.611 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 384 bits for HS384) or larger MUST be used with the HMAC SHA algorithms but this key is only 376 bits +14:26:30.611 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 512 bits for HS512) or larger MUST be used with the HMAC SHA algorithms but this key is only 504 bits +14:26:30.611 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 512 bits for HS512) or larger MUST be used with the HMAC SHA algorithms but this key is only 504 bits +14:26:30.611 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 8 bits +14:26:30.611 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 248 bits +14:26:30.612 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 248 bits +[INFO] Tests run: 16, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.052 s - in org.jose4j.jws.HmacShaTest [INFO] Running org.jose4j.jws.JwsPayloadVariationsTest -14:20:58.507 DEBUG o.j.jws.JwsPayloadVariationsTest - Expected: org.jose4j.lang.IntegrityException: JWS signature is invalid. -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.031 s - in org.jose4j.jws.JwsPayloadVariationsTest +14:26:30.800 DEBUG o.j.jws.JwsPayloadVariationsTest - Expected: org.jose4j.lang.IntegrityException: JWS signature is invalid. +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.167 s - in org.jose4j.jws.JwsPayloadVariationsTest [INFO] Running org.jose4j.jwt.JwtClaimsTest -[INFO] Tests run: 38, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.007 s - in org.jose4j.jwt.JwtClaimsTest +[INFO] Tests run: 38, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.036 s - in org.jose4j.jwt.JwtClaimsTest [INFO] Running org.jose4j.jwt.NumericDateTest -14:20:58.520 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854775807} -14:20:58.520 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372034707292160} -14:20:58.520 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223371822106411107} -14:20:58.520 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{4611686018427387903} -14:20:58.520 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{2305843009213693951} -14:20:58.520 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{144115188075855871} -14:20:58.520 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9232604641496272} -14:20:58.520 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854776} -14:20:58.522 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854775 -> Aug 17, 292278994, 7:12:55?AM GMT} -14:20:58.522 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854774 -> Aug 17, 292278994, 7:12:54?AM GMT} -14:20:58.522 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854775808} -14:20:58.522 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372034707292161} -14:20:58.522 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-4611686018427387904} -14:20:58.522 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-184467440737095516} -14:20:58.522 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9232604641496272} -14:20:58.522 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854776} -14:20:58.526 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854775 -> Dec 2, 292269055, 4:47:05?PM GMT} -14:20:58.526 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854774 -> Dec 2, 292269055, 4:47:06?PM GMT} -14:20:58.526 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 1 = -9223372036854775808 -14:20:58.526 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 60 = -9223372036854775749 -14:20:58.526 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 2147483647 = -9223372034707292162 -14:20:58.526 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 9223372036854775807 = -2 -14:20:58.526 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 2147483647 + 9223372036854775807 = -9223372034707292162 -14:20:58.526 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 60 + 9223372036854775807 = -9223372036854775749 -14:20:58.526 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 1 + 9223372036854775807 = -9223372036854775808 -14:20:58.526 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -1 = 9223372036854775807 -14:20:58.527 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -100 = 9223372036854775708 -14:20:58.527 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -2147483648 = 9223372034707292160 -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.jwt.NumericDateTest +14:26:30.868 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854775807} +14:26:30.868 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372034707292160} +14:26:30.868 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223371822106411107} +14:26:30.868 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{4611686018427387903} +14:26:30.868 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{2305843009213693951} +14:26:30.868 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{144115188075855871} +14:26:30.868 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9232604641496272} +14:26:30.868 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854776} +14:26:30.870 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854775 -> Aug 17, 292278994, 7:12:55?AM GMT} +14:26:30.870 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854774 -> Aug 17, 292278994, 7:12:54?AM GMT} +14:26:30.870 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854775808} +14:26:30.870 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372034707292161} +14:26:30.870 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-4611686018427387904} +14:26:30.870 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-184467440737095516} +14:26:30.870 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9232604641496272} +14:26:30.870 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854776} +14:26:30.896 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854775 -> Dec 2, 292269055, 4:47:05?PM GMT} +14:26:30.897 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854774 -> Dec 2, 292269055, 4:47:06?PM GMT} +14:26:30.897 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 1 = -9223372036854775808 +14:26:30.897 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 60 = -9223372036854775749 +14:26:30.897 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 2147483647 = -9223372034707292162 +14:26:30.897 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 9223372036854775807 = -2 +14:26:30.897 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 2147483647 + 9223372036854775807 = -9223372034707292162 +14:26:30.897 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 60 + 9223372036854775807 = -9223372036854775749 +14:26:30.897 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 1 + 9223372036854775807 = -9223372036854775808 +14:26:30.897 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -1 = 9223372036854775807 +14:26:30.897 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -100 = 9223372036854775708 +14:26:30.897 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -2147483648 = 9223372034707292160 +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.053 s - in org.jose4j.jwt.NumericDateTest [INFO] Running org.jose4j.jwt.consumer.X509VerificationKeyResolverInJwtConsumerTest -14:20:58.534 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=iHQKuSGeWUGYZCg4_RGJSIC0NDQ vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, Zb1HT7ryCRAAj2wcQ8hWbzaqX1s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, W8aO-BD2jx9KMzQjhZ85ukJA5Zg] x5t#S256=qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE].): JsonWebSignature{"x5t#S256":"qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE","x5t":"iHQKuSGeWUGYZCg4_RGJSIC0NDQ","alg":"ES256"}->eyJ4NXQjUzI1NiI6InFTX2JYTlNfSklYQ3JuUmdha2I2b3RFS3Utd0xlb3R6N0tBWjN4UVVPcUUiLCJ4NXQiOiJpSFFLdVNHZVdVR1laQ2c0X1JHSlNJQzBORFEiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTc2MSwic3ViIjoiYWJvdXQifQ.04qPYooLJN2G0q0LYVepaydszTuhY7jKjqi5IGkNBAWZ-IBlW_pWzkurR1MkO48SbJQK2swmy7Ogfihi1ClAlA] -14:20:58.534 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=iHQKuSGeWUGYZCg4_RGJSIC0NDQ vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, Zb1HT7ryCRAAj2wcQ8hWbzaqX1s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, W8aO-BD2jx9KMzQjhZ85ukJA5Zg] x5t#S256=qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE].): JsonWebSignature{"x5t#S256":"qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE","x5t":"iHQKuSGeWUGYZCg4_RGJSIC0NDQ","alg":"ES256"}->eyJ4NXQjUzI1NiI6InFTX2JYTlNfSklYQ3JuUmdha2I2b3RFS3Utd0xlb3R6N0tBWjN4UVVPcUUiLCJ4NXQiOiJpSFFLdVNHZVdVR1laQ2c0X1JHSlNJQzBORFEiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTc2MSwic3ViIjoiYWJvdXQifQ.04qPYooLJN2G0q0LYVepaydszTuhY7jKjqi5IGkNBAWZ-IBlW_pWzkurR1MkO48SbJQK2swmy7Ogfihi1ClAlA] -14:20:58.535 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Neither the x5t header nor the x5t#S256 header are present in the JWS.): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] -14:20:58.535 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Neither the x5t header nor the x5t#S256 header are present in the JWS.): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] -14:20:58.535 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -14:20:58.535 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -14:20:58.536 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -14:20:58.536 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -14:20:58.538 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -14:20:58.539 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -14:20:58.540 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to verify the signature with any of the provided keys - SHA-1 thumbs of provided certificates: [ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y].): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] -14:20:58.540 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to verify the signature with any of the provided keys - SHA-1 thumbs of provided certificates: [ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y].): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] -14:20:58.545 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t#S256=FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE].): JsonWebSignature{"x5t#S256":"FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE","alg":"ES256"}->eyJ4NXQjUzI1NiI6IkZTcU90QjV2UHFaNGtqWXAwOUZqQnBrbVhIMFZxRURtLXdFY1Rjb3g2RUUiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTUzOSwic3ViIjoiYWJvdXQifQ.9Nj3UG8N9u7Eyu0wupR-eVS4Mf0ItwwHBZzwLcY2KUCJeWoPRPT7zC4MqMbHfLj6PzFi09iC3q3PniSJwmWJTA] -14:20:58.545 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t#S256=FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE].): JsonWebSignature{"x5t#S256":"FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE","alg":"ES256"}->eyJ4NXQjUzI1NiI6IkZTcU90QjV2UHFaNGtqWXAwOUZqQnBrbVhIMFZxRURtLXdFY1Rjb3g2RUUiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTUzOSwic3ViIjoiYWJvdXQifQ.9Nj3UG8N9u7Eyu0wupR-eVS4Mf0ItwwHBZzwLcY2KUCJeWoPRPT7zC4MqMbHfLj6PzFi09iC3q3PniSJwmWJTA] -14:20:58.548 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=Zb1HT7ryCRAAj2wcQ8hWbzaqX1s vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, iHQKuSGeWUGYZCg4_RGJSIC0NDQ, W8aO-BD2jx9KMzQjhZ85ukJA5Zg].): JsonWebSignature{"x5t":"Zb1HT7ryCRAAj2wcQ8hWbzaqX1s","alg":"RS256"}->eyJ4NXQiOiJaYjFIVDdyeUNSQUFqMndjUThoV2J6YXFYMXMiLCJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5NjI1Nywic3ViIjoiYWJvdXQifQ.RidDM9z0OJkfV2mwxABtEh2Gr_BCFbTuetOTV_dmnFofarBK7VDPPdsdAhtIs3u7WQq9guoo6H3AUGfj4mTFKX3axi2TsaYRKM9wSoRjxFO7ednGcRGx8bnSerqqrbBuM9ZUUt93sIXuneJHYRKlh0Tt9mCXISv1H4OMEueXOJhck-JPgLPfLDqIPa8t93SULKTQtLvs8KEby2uJOL8vIy-a-lFp9irCWwTnd0QRidpuLAPLr428LPNPycEVqD2TpY7y_xaQJh49oqoq_AmQCmIn3CpZLDLqD1wpEPxLQyd1vbvgQ583y2XJ95_QufjbRd2Oshv3Z3JxpIm9Yie6yQ] -14:20:58.548 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=Zb1HT7ryCRAAj2wcQ8hWbzaqX1s vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, iHQKuSGeWUGYZCg4_RGJSIC0NDQ, W8aO-BD2jx9KMzQjhZ85ukJA5Zg].): JsonWebSignature{"x5t":"Zb1HT7ryCRAAj2wcQ8hWbzaqX1s","alg":"RS256"}->eyJ4NXQiOiJaYjFIVDdyeUNSQUFqMndjUThoV2J6YXFYMXMiLCJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5NjI1Nywic3ViIjoiYWJvdXQifQ.RidDM9z0OJkfV2mwxABtEh2Gr_BCFbTuetOTV_dmnFofarBK7VDPPdsdAhtIs3u7WQq9guoo6H3AUGfj4mTFKX3axi2TsaYRKM9wSoRjxFO7ednGcRGx8bnSerqqrbBuM9ZUUt93sIXuneJHYRKlh0Tt9mCXISv1H4OMEueXOJhck-JPgLPfLDqIPa8t93SULKTQtLvs8KEby2uJOL8vIy-a-lFp9irCWwTnd0QRidpuLAPLr428LPNPycEVqD2TpY7y_xaQJh49oqoq_AmQCmIn3CpZLDLqD1wpEPxLQyd1vbvgQ583y2XJ95_QufjbRd2Oshv3Z3JxpIm9Yie6yQ] -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.014 s - in org.jose4j.jwt.consumer.X509VerificationKeyResolverInJwtConsumerTest +14:26:30.949 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=iHQKuSGeWUGYZCg4_RGJSIC0NDQ vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, Zb1HT7ryCRAAj2wcQ8hWbzaqX1s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, W8aO-BD2jx9KMzQjhZ85ukJA5Zg] x5t#S256=qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE].): JsonWebSignature{"x5t#S256":"qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE","x5t":"iHQKuSGeWUGYZCg4_RGJSIC0NDQ","alg":"ES256"}->eyJ4NXQjUzI1NiI6InFTX2JYTlNfSklYQ3JuUmdha2I2b3RFS3Utd0xlb3R6N0tBWjN4UVVPcUUiLCJ4NXQiOiJpSFFLdVNHZVdVR1laQ2c0X1JHSlNJQzBORFEiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTc2MSwic3ViIjoiYWJvdXQifQ.04qPYooLJN2G0q0LYVepaydszTuhY7jKjqi5IGkNBAWZ-IBlW_pWzkurR1MkO48SbJQK2swmy7Ogfihi1ClAlA] +14:26:30.950 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=iHQKuSGeWUGYZCg4_RGJSIC0NDQ vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, Zb1HT7ryCRAAj2wcQ8hWbzaqX1s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, W8aO-BD2jx9KMzQjhZ85ukJA5Zg] x5t#S256=qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE].): JsonWebSignature{"x5t#S256":"qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE","x5t":"iHQKuSGeWUGYZCg4_RGJSIC0NDQ","alg":"ES256"}->eyJ4NXQjUzI1NiI6InFTX2JYTlNfSklYQ3JuUmdha2I2b3RFS3Utd0xlb3R6N0tBWjN4UVVPcUUiLCJ4NXQiOiJpSFFLdVNHZVdVR1laQ2c0X1JHSlNJQzBORFEiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTc2MSwic3ViIjoiYWJvdXQifQ.04qPYooLJN2G0q0LYVepaydszTuhY7jKjqi5IGkNBAWZ-IBlW_pWzkurR1MkO48SbJQK2swmy7Ogfihi1ClAlA] +14:26:30.950 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Neither the x5t header nor the x5t#S256 header are present in the JWS.): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] +14:26:30.950 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Neither the x5t header nor the x5t#S256 header are present in the JWS.): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] +14:26:30.951 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +14:26:30.951 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +14:26:30.951 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +14:26:30.951 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +14:26:30.974 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +14:26:30.974 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +14:26:30.975 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to verify the signature with any of the provided keys - SHA-1 thumbs of provided certificates: [ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y].): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] +14:26:30.975 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to verify the signature with any of the provided keys - SHA-1 thumbs of provided certificates: [ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y].): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] +14:26:31.016 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t#S256=FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE].): JsonWebSignature{"x5t#S256":"FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE","alg":"ES256"}->eyJ4NXQjUzI1NiI6IkZTcU90QjV2UHFaNGtqWXAwOUZqQnBrbVhIMFZxRURtLXdFY1Rjb3g2RUUiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTUzOSwic3ViIjoiYWJvdXQifQ.9Nj3UG8N9u7Eyu0wupR-eVS4Mf0ItwwHBZzwLcY2KUCJeWoPRPT7zC4MqMbHfLj6PzFi09iC3q3PniSJwmWJTA] +14:26:31.016 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t#S256=FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE].): JsonWebSignature{"x5t#S256":"FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE","alg":"ES256"}->eyJ4NXQjUzI1NiI6IkZTcU90QjV2UHFaNGtqWXAwOUZqQnBrbVhIMFZxRURtLXdFY1Rjb3g2RUUiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTUzOSwic3ViIjoiYWJvdXQifQ.9Nj3UG8N9u7Eyu0wupR-eVS4Mf0ItwwHBZzwLcY2KUCJeWoPRPT7zC4MqMbHfLj6PzFi09iC3q3PniSJwmWJTA] +14:26:31.018 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=Zb1HT7ryCRAAj2wcQ8hWbzaqX1s vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, iHQKuSGeWUGYZCg4_RGJSIC0NDQ, W8aO-BD2jx9KMzQjhZ85ukJA5Zg].): JsonWebSignature{"x5t":"Zb1HT7ryCRAAj2wcQ8hWbzaqX1s","alg":"RS256"}->eyJ4NXQiOiJaYjFIVDdyeUNSQUFqMndjUThoV2J6YXFYMXMiLCJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5NjI1Nywic3ViIjoiYWJvdXQifQ.RidDM9z0OJkfV2mwxABtEh2Gr_BCFbTuetOTV_dmnFofarBK7VDPPdsdAhtIs3u7WQq9guoo6H3AUGfj4mTFKX3axi2TsaYRKM9wSoRjxFO7ednGcRGx8bnSerqqrbBuM9ZUUt93sIXuneJHYRKlh0Tt9mCXISv1H4OMEueXOJhck-JPgLPfLDqIPa8t93SULKTQtLvs8KEby2uJOL8vIy-a-lFp9irCWwTnd0QRidpuLAPLr428LPNPycEVqD2TpY7y_xaQJh49oqoq_AmQCmIn3CpZLDLqD1wpEPxLQyd1vbvgQ583y2XJ95_QufjbRd2Oshv3Z3JxpIm9Yie6yQ] +14:26:31.018 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=Zb1HT7ryCRAAj2wcQ8hWbzaqX1s vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, iHQKuSGeWUGYZCg4_RGJSIC0NDQ, W8aO-BD2jx9KMzQjhZ85ukJA5Zg].): JsonWebSignature{"x5t":"Zb1HT7ryCRAAj2wcQ8hWbzaqX1s","alg":"RS256"}->eyJ4NXQiOiJaYjFIVDdyeUNSQUFqMndjUThoV2J6YXFYMXMiLCJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5NjI1Nywic3ViIjoiYWJvdXQifQ.RidDM9z0OJkfV2mwxABtEh2Gr_BCFbTuetOTV_dmnFofarBK7VDPPdsdAhtIs3u7WQq9guoo6H3AUGfj4mTFKX3axi2TsaYRKM9wSoRjxFO7ednGcRGx8bnSerqqrbBuM9ZUUt93sIXuneJHYRKlh0Tt9mCXISv1H4OMEueXOJhck-JPgLPfLDqIPa8t93SULKTQtLvs8KEby2uJOL8vIy-a-lFp9irCWwTnd0QRidpuLAPLr428LPNPycEVqD2TpY7y_xaQJh49oqoq_AmQCmIn3CpZLDLqD1wpEPxLQyd1vbvgQ583y2XJ95_QufjbRd2Oshv3Z3JxpIm9Yie6yQ] +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.089 s - in org.jose4j.jwt.consumer.X509VerificationKeyResolverInJwtConsumerTest [INFO] Running org.jose4j.jwt.consumer.JwksVerificationKeyResolverUsingJwtConsumerTest -14:20:58.550 DEBUG o.j.j.c.JwksVerificationKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"HS512","kid":"nope"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=uno}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=two}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=trois}]): JsonWebSignature{"alg":"HS512","kid":"nope"}->eyJhbGciOiJIUzUxMiIsImtpZCI6Im5vcGUifQ.eyJpc3MiOiJGUk9NIiwiYXVkIjoiVE8iLCJleHAiOjE0MjQyMTg2NzksInN1YiI6IkFCT1VUIn0.lZOnt-l4wIUl667laxBjZgyTZsebfitsKT1yBrEQ-DognQiqEafQaVrFTaV3dJrZDvgDqAKL9FzxOHfdBg8NXw] -14:20:58.554 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.uIRIFrhftV39qJNOdaL8LwrK1prIJIHsP7Gn6jJAVbE2Mx4IkwGzBXDLKMulM1IvKElmSyK_KBg8afywcxoApA] -14:20:58.556 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.21eYfC_ZNf1FQ1Dtvj4rUiM9jYPgf1zJfeE_b2fclgu36KAN141ICqVjNxQqlK_7Wbct_FDxgyHvej_LEigb2Q] -14:20:58.557 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTEyNywiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.UE4B0IVPRip-3TDKhNAadCuj_Bf5PlEAn9K94Zd7mP25WNZwxDbQpDElZTZSp-3ngPqQyPGj27emYRHhOnFSAQ] -14:20:58.558 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES384"}->eyJhbGciOiJFUzM4NCJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTIzMSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.NyRtG_eFmMLQ0XkW5kvdSpzYsm6P5M3U8EBFKIhD-jw8E7FOYw9PZ3_o1PWuLWH3XeArZMW7-bAIVxo2bHqJsSUtB6Tf0NWPtCpUF2c1vbuRXEXkGrCUmc4sKyOBjimC] -14:20:58.558 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.pgBu9S8g7MC2BN9YNlWD9JhjzWbQVjqpmErW4hMFncKD8bUidIbMBJSI3URXvnMJrLrAC5eB2gb6DccF_txQaqX1X81JbTSdQ44_P1W-1uIIkfIXUvM6OXv48W-CPm8xGuetQ1ayHgU_1ljtdkbdUHZ6irgaeIrFMgZX0Jdb9Eydnfhwvno2oGk3y6ruq2KgKABIdzgvJXfwdOFGn1z0CxwQSVDkFRLsMsBljTwfTd0v3G8OXT8WRMZMGVyAgtKVu3XJyrPNntVqrzdgQQma6S06Y9J9V9t0AlgEAn2B4TqMxYcu1Tjr7bBL_v83zEXhbdcFBYLfJg-LY5wE6rA-dA] -14:20:58.571 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTEyNywiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.UE4B0IVPRip-3TDKhNAadCuj_Bf5PlEAn9K94Zd7mP25WNZwxDbQpDElZTZSp-3ngPqQyPGj27emYRHhOnFSAQ] -14:20:58.572 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES384"}->eyJhbGciOiJFUzM4NCJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTIzMSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.NyRtG_eFmMLQ0XkW5kvdSpzYsm6P5M3U8EBFKIhD-jw8E7FOYw9PZ3_o1PWuLWH3XeArZMW7-bAIVxo2bHqJsSUtB6Tf0NWPtCpUF2c1vbuRXEXkGrCUmc4sKyOBjimC] -14:20:58.575 DEBUG o.j.j.c.JwksVerificationKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"8a10l"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00r, use=sig, x=AZkOsR09YQeFcD6rhINHWAaAr8DMx9ndFzum50o5KLLUjqF7opKI7TxR5LP_4uUvG2jojF57xxWVwWi2otdETeI-, y=AadJxOSpjf_4VxRjTT_FdAtFX8Pw-CBpaoX-OQPPQ8o0kOrj5nzIltwnEORDldLFIkQQzgTXMzBnWyQurVHU5pUF, crv=P-521}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00q, use=sig, x=3n74sKXRbaBNw9qOGslnl-WcNCdC75cWo_UquiGUFKdDM3hudthywE5y0R6d2Li8, y=YbZ_0lregvTboKmUX7VE7eknQC1yETKUdHzt_YMX4zbTyOxgZL6A38AVfY8Q8HWd, crv=P-384}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00p, use=sig, x=S-EbFKVG-7pXjdgM9SPPw8rN3V8-2uX4bNg4y8R7EhA, y=KTtyNGz9B9_QrkFf7mP90YiH6F40fAYfqpzQh8HG7tc, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=8a00o, use=sig, n=kM-83p_Qaq-1FuxLHH6Y7jQeBT5MK9iHGB75Blnit8rMIcsns72Ls1uhEYiyB3_icK7ibLr2_AHiIl7MnJBY2cCquuwiTccDM5AYUccdypliSlVeAL0MBa_0xfpvBJw8fB45wX6kJKftbQI8xjvFhqSIuGNyQOzFXnJ_mCBOLv-6Nzn79qWxh47mQ7NJk2wSYdFDsz0NNGjBA2VQ9U6weqL1viZ1sbzXr-bJWCjjEYmKC5k0sjGGXJuvMPEqBY2q68kFXD3kiuslQ3tNS1j4d-IraadxpNVtedQ44-xM7MC-WFm2f5eO0LmJRzyipGNPkTer66q6MSEESguyhsoLNQ, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00n, use=sig, x=ADoTal4nAvVCgicprEBBFOzNKUKVJl1Ph8sISl3Z3tz7TJZlQB485LJ3xil-EmWvqW1-sKFl7dY2YtrGUZvjGp0O, y=AXVB58hIK7buMZmRgDU4hrGvcVQLXa-77_F755OKIkuWP5IJ6GdjFvaRHfIbbHMp-whqjmRrlwfYPN1xmyCGSzpT, crv=P-521}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00m, use=sig, x=5Y4xK9IBGJq5-E6QAVdpiqZb9Z-_tro_rX9TAUdWD3jiVS5N-blEnu5zWzoUoiJk, y=ZDFGBLBbiuvHLMOJ3DoOSRLU94uu5y3s03__HaaaLU04Efc4nGdY3vhTQ4kxEqVj, crv=P-384}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00l, use=sig, x=CWzKLukg4yQzi4oM-2m9M-ClxbU4e6P9G_HRn9A0edI, y=UB1OL_eziV6lA5J0PiAuzoKQU_YbXojbjh0sfxtVlOU, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=8a00k, use=sig, n=ux8LdF-7g3X1BlqglZUw36mqjd9P0JWfWxJYvR6pCFSyqLrETc-fL9_lTG3orohkGnEPe7G-BO65ldF44pYEe3eZzcEuEFtiO5W4_Jap1Z430vdYgC_nZtENIJDWlsGM9ev-cOld7By-8l3-wAyuspOKZijWtx6K57VLajyUHBSmbUtaeCwHQOGyMOV1V-cskbTO2u_HrLOLLkSv9oZrznAwpx_paFHy-aAsdFhb7EiBzwqqHQButo3aT3DsR69gbW_Nmrf6tfkril6B3ePKV4od_5jowa6V3765K6v2L4NER7fuZ2hJVbIc0eJXY8tL3NlkBnjnmQ8DBWQR81Ayhw, e=AQAB}]): JsonWebSignature{"alg":"ES256","kid":"8a10l"}->eyJhbGciOiJFUzI1NiIsImtpZCI6IjhhMTBsIn0.eyJzdWIiOiJoYWlsaWUiLCJhdWQiOiJhIiwianRpIjoiRmUwZ1h1UGpmcHoxSHEzdzRaaUZIQiIsImlzcyI6Imh0dHBzOlwvXC9sb2NhbGhvc3Q6OTAzMSIsImlhdCI6MTQyMTA5Mzg1OSwiZXhwIjoxNDIxMDk0NDU5LCJub25jZSI6ImZmcyIsImFjciI6InVybjpvYXNpczpuYW1lczp0YzpTQU1MOjIuMDphYzpjbGFzc2VzOlBhc3N3b3JkIiwiYXV0aF90aW1lIjoxNDIxMDkzMzc2fQ.gzJQZRErEHI_v6z6dZboTPzL7p9_wXrMJIWnYZFEENgq3E1InbrZuQM3wB-mJ5r33kwMibJY7Qi4y-jvk0IYqQ] -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.023 s - in org.jose4j.jwt.consumer.JwksVerificationKeyResolverUsingJwtConsumerTest +14:26:31.040 DEBUG o.j.j.c.JwksVerificationKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"HS512","kid":"nope"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=uno}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=two}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=trois}]): JsonWebSignature{"alg":"HS512","kid":"nope"}->eyJhbGciOiJIUzUxMiIsImtpZCI6Im5vcGUifQ.eyJpc3MiOiJGUk9NIiwiYXVkIjoiVE8iLCJleHAiOjE0MjQyMTg2NzksInN1YiI6IkFCT1VUIn0.lZOnt-l4wIUl667laxBjZgyTZsebfitsKT1yBrEQ-DognQiqEafQaVrFTaV3dJrZDvgDqAKL9FzxOHfdBg8NXw] +14:26:31.060 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.uIRIFrhftV39qJNOdaL8LwrK1prIJIHsP7Gn6jJAVbE2Mx4IkwGzBXDLKMulM1IvKElmSyK_KBg8afywcxoApA] +14:26:31.062 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.21eYfC_ZNf1FQ1Dtvj4rUiM9jYPgf1zJfeE_b2fclgu36KAN141ICqVjNxQqlK_7Wbct_FDxgyHvej_LEigb2Q] +14:26:31.064 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTEyNywiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.UE4B0IVPRip-3TDKhNAadCuj_Bf5PlEAn9K94Zd7mP25WNZwxDbQpDElZTZSp-3ngPqQyPGj27emYRHhOnFSAQ] +14:26:31.084 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES384"}->eyJhbGciOiJFUzM4NCJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTIzMSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.NyRtG_eFmMLQ0XkW5kvdSpzYsm6P5M3U8EBFKIhD-jw8E7FOYw9PZ3_o1PWuLWH3XeArZMW7-bAIVxo2bHqJsSUtB6Tf0NWPtCpUF2c1vbuRXEXkGrCUmc4sKyOBjimC] +14:26:31.085 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.pgBu9S8g7MC2BN9YNlWD9JhjzWbQVjqpmErW4hMFncKD8bUidIbMBJSI3URXvnMJrLrAC5eB2gb6DccF_txQaqX1X81JbTSdQ44_P1W-1uIIkfIXUvM6OXv48W-CPm8xGuetQ1ayHgU_1ljtdkbdUHZ6irgaeIrFMgZX0Jdb9Eydnfhwvno2oGk3y6ruq2KgKABIdzgvJXfwdOFGn1z0CxwQSVDkFRLsMsBljTwfTd0v3G8OXT8WRMZMGVyAgtKVu3XJyrPNntVqrzdgQQma6S06Y9J9V9t0AlgEAn2B4TqMxYcu1Tjr7bBL_v83zEXhbdcFBYLfJg-LY5wE6rA-dA] +14:26:31.154 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTEyNywiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.UE4B0IVPRip-3TDKhNAadCuj_Bf5PlEAn9K94Zd7mP25WNZwxDbQpDElZTZSp-3ngPqQyPGj27emYRHhOnFSAQ] +14:26:31.155 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES384"}->eyJhbGciOiJFUzM4NCJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTIzMSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.NyRtG_eFmMLQ0XkW5kvdSpzYsm6P5M3U8EBFKIhD-jw8E7FOYw9PZ3_o1PWuLWH3XeArZMW7-bAIVxo2bHqJsSUtB6Tf0NWPtCpUF2c1vbuRXEXkGrCUmc4sKyOBjimC] +14:26:31.170 DEBUG o.j.j.c.JwksVerificationKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"8a10l"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00r, use=sig, x=AZkOsR09YQeFcD6rhINHWAaAr8DMx9ndFzum50o5KLLUjqF7opKI7TxR5LP_4uUvG2jojF57xxWVwWi2otdETeI-, y=AadJxOSpjf_4VxRjTT_FdAtFX8Pw-CBpaoX-OQPPQ8o0kOrj5nzIltwnEORDldLFIkQQzgTXMzBnWyQurVHU5pUF, crv=P-521}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00q, use=sig, x=3n74sKXRbaBNw9qOGslnl-WcNCdC75cWo_UquiGUFKdDM3hudthywE5y0R6d2Li8, y=YbZ_0lregvTboKmUX7VE7eknQC1yETKUdHzt_YMX4zbTyOxgZL6A38AVfY8Q8HWd, crv=P-384}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00p, use=sig, x=S-EbFKVG-7pXjdgM9SPPw8rN3V8-2uX4bNg4y8R7EhA, y=KTtyNGz9B9_QrkFf7mP90YiH6F40fAYfqpzQh8HG7tc, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=8a00o, use=sig, n=kM-83p_Qaq-1FuxLHH6Y7jQeBT5MK9iHGB75Blnit8rMIcsns72Ls1uhEYiyB3_icK7ibLr2_AHiIl7MnJBY2cCquuwiTccDM5AYUccdypliSlVeAL0MBa_0xfpvBJw8fB45wX6kJKftbQI8xjvFhqSIuGNyQOzFXnJ_mCBOLv-6Nzn79qWxh47mQ7NJk2wSYdFDsz0NNGjBA2VQ9U6weqL1viZ1sbzXr-bJWCjjEYmKC5k0sjGGXJuvMPEqBY2q68kFXD3kiuslQ3tNS1j4d-IraadxpNVtedQ44-xM7MC-WFm2f5eO0LmJRzyipGNPkTer66q6MSEESguyhsoLNQ, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00n, use=sig, x=ADoTal4nAvVCgicprEBBFOzNKUKVJl1Ph8sISl3Z3tz7TJZlQB485LJ3xil-EmWvqW1-sKFl7dY2YtrGUZvjGp0O, y=AXVB58hIK7buMZmRgDU4hrGvcVQLXa-77_F755OKIkuWP5IJ6GdjFvaRHfIbbHMp-whqjmRrlwfYPN1xmyCGSzpT, crv=P-521}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00m, use=sig, x=5Y4xK9IBGJq5-E6QAVdpiqZb9Z-_tro_rX9TAUdWD3jiVS5N-blEnu5zWzoUoiJk, y=ZDFGBLBbiuvHLMOJ3DoOSRLU94uu5y3s03__HaaaLU04Efc4nGdY3vhTQ4kxEqVj, crv=P-384}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00l, use=sig, x=CWzKLukg4yQzi4oM-2m9M-ClxbU4e6P9G_HRn9A0edI, y=UB1OL_eziV6lA5J0PiAuzoKQU_YbXojbjh0sfxtVlOU, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=8a00k, use=sig, n=ux8LdF-7g3X1BlqglZUw36mqjd9P0JWfWxJYvR6pCFSyqLrETc-fL9_lTG3orohkGnEPe7G-BO65ldF44pYEe3eZzcEuEFtiO5W4_Jap1Z430vdYgC_nZtENIJDWlsGM9ev-cOld7By-8l3-wAyuspOKZijWtx6K57VLajyUHBSmbUtaeCwHQOGyMOV1V-cskbTO2u_HrLOLLkSv9oZrznAwpx_paFHy-aAsdFhb7EiBzwqqHQButo3aT3DsR69gbW_Nmrf6tfkril6B3ePKV4od_5jowa6V3765K6v2L4NER7fuZ2hJVbIc0eJXY8tL3NlkBnjnmQ8DBWQR81Ayhw, e=AQAB}]): JsonWebSignature{"alg":"ES256","kid":"8a10l"}->eyJhbGciOiJFUzI1NiIsImtpZCI6IjhhMTBsIn0.eyJzdWIiOiJoYWlsaWUiLCJhdWQiOiJhIiwianRpIjoiRmUwZ1h1UGpmcHoxSHEzdzRaaUZIQiIsImlzcyI6Imh0dHBzOlwvXC9sb2NhbGhvc3Q6OTAzMSIsImlhdCI6MTQyMTA5Mzg1OSwiZXhwIjoxNDIxMDk0NDU5LCJub25jZSI6ImZmcyIsImFjciI6InVybjpvYXNpczpuYW1lczp0YzpTQU1MOjIuMDphYzpjbGFzc2VzOlBhc3N3b3JkIiwiYXV0aF90aW1lIjoxNDIxMDkzMzc2fQ.gzJQZRErEHI_v6z6dZboTPzL7p9_wXrMJIWnYZFEENgq3E1InbrZuQM3wB-mJ5r33kwMibJY7Qi4y-jvk0IYqQ] +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.144 s - in org.jose4j.jwt.consumer.JwksVerificationKeyResolverUsingJwtConsumerTest [INFO] Running org.jose4j.jwt.consumer.ExamplesFromOpenIdConnectTest -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.jwt.consumer.ExamplesFromOpenIdConnectTest +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.028 s - in org.jose4j.jwt.consumer.ExamplesFromOpenIdConnectTest [INFO] Running org.jose4j.jwt.consumer.JwksDecryptionKeyResolverUsingJwtConsumerTest -14:20:58.585 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=ceIymXD3A10scNMzzIUX1w). -14:20:58.586 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=9_w8Por3cMPU3ZKNxvmlPA). -14:20:58.586 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=9_w8Por3cMPU3ZKNxvmlPA). -14:20:58.586 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=HlpFVPfuwih6QlTNSSLoYg). -14:20:58.586 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=HlpFVPfuwih6QlTNSSLoYg). -14:20:58.586 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=HlpFVPfuwih6QlTNSSLoYg). -14:20:58.587 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=SupSbrq7BD7qhYdV0m9vlQ). -14:20:58.587 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=SupSbrq7BD7qhYdV0m9vlQ). -14:20:58.587 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=SupSbrq7BD7qhYdV0m9vlQ). -14:20:58.587 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=SupSbrq7BD7qhYdV0m9vlQ). -14:20:58.587 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=2lRQbta_cIjmDZbEKtGjlg). -14:20:58.587 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=2lRQbta_cIjmDZbEKtGjlg). -14:20:58.587 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=2lRQbta_cIjmDZbEKtGjlg). -14:20:58.587 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=2lRQbta_cIjmDZbEKtGjlg). -14:20:58.588 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=5) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=2lRQbta_cIjmDZbEKtGjlg). -14:20:58.588 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=zFNXih6jzhEvhY_WUAZCMw). -14:20:58.588 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=zFNXih6jzhEvhY_WUAZCMw). -14:20:58.588 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=zFNXih6jzhEvhY_WUAZCMw). -14:20:58.588 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=zFNXih6jzhEvhY_WUAZCMw). -14:20:58.588 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=5) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=zFNXih6jzhEvhY_WUAZCMw). -14:20:58.588 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=6) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=zFNXih6jzhEvhY_WUAZCMw). -14:20:58.589 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256"} using attempted decryption to disambiguate from filtered candidate JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=1}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=2}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=3}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=4}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=5}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=6}]) selecting from keys: [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=1}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=2}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=3}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=4}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=5}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=6}]): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..yxIdB6_0NUnJWJ4tDUI-GQ.uoFJTwA2DPcwDMU1sjia63HhiTtQbYEDC1HHOg6Pa4A.zFNXih6jzhEvhY_WUAZCMw] -14:20:58.624 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). -14:20:58.624 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). -14:20:58.662 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). -14:20:58.663 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Message is larger than modulus). -14:20:58.673 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). -14:20:58.680 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=e1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch; caused by: javax.crypto.AEADBadTagException: Tag mismatch). -14:20:58.706 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). -14:20:58.759 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). -14:20:58.759 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). -14:20:58.770 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). -14:20:58.770 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). -14:20:58.770 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"RSA-OAEP","enc":"A128GCM"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"RSA-OAEP","enc":"A128GCM"} using attempted decryption to disambiguate from filtered candidate JWKs [org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r3, use=enc, n=pkTznDIyNrI9wvfoFqv3yZpHv5PBeSXxdvOIKtsrKTSXxgDqjfn3jS4CiZidUjW1TzwwkYRZYU3Ei-M7qecudUs1QFdoBUNyd7V_X-ueToD1K-JvQCCrb74bzQWHVfsb2bRfuLw3Tyw3JwnWU3Q-P7OP08INyitwFw9Oz5DvKovtuOyAh3-CT8eSXcPMy2LQTt7WW8h2YeMq1EvndAc67ohiz-q3u2Qqwbbyv-p237mL_90JLE4xMBnLNey4FDjtXbXIq8T8QbvGyn4Dc67ZxH4-izAxi_siA_3z0H7oTYRaeNL4JuNqhoB0R4CgThfofdGVGZVWPyyowzSI-7nxbMHYNNse96wDnbTTKC8pP-qDjExRYjzm4iNueaMzzcq3wAIpR5z2tZp1oULOo43R0kcXC51sKrenJWnqIaIj_WsENRAWWHsrh5IycgySWyytaGVgQHaeBagYJHzRcrhWk10e81M8oMtdPPL1MLS0bbU3CTpDcacr4KyAKAL8sVi7-M2UVqvtWkEZCJ9q1cgOFwcp0t8ZKOpw9OgVeyo-P8HoDpfeXM_WecqNuHSRBlJGbAIfKErBiAUAKFmdEKyHtuUi-Ni6cEwDgjrSxX3apxG_41POrZjZBuuV6FYBcR1wqnTr8k-_z49Kv8ZGF3yszgcV3IQ4qK3-M_qqypnEai8, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e1, use=enc, x=zw4_6TARtwAsHFDw4Q1gr65t6BMl6lXOmmOMA3R0q58, y=O0Gb45b83A8FRe-DH_xJ4H0dsaQVskZMT_RBIKaSGOc, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e2, use=enc, x=A47oP1eLgWo7NsiKGV2Q983D3oNxLnRDlgtEi7HCtSI, y=4CjFGXRHDmm3g_cSB2YZPYsnxorc4tAEJRD35wBu0ys, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r1, use=enc, n=lFZ04QwtWu_hHgqlry40DuIhVZyl6ci6FzyLfkeHLH8xfCDLR-rvslxX-Ub3teVnPjZYdUFlZztuDo5kOFsF7TvUQMJhx00VZ6qugm-4LDSJ93ioGuo37vNDjMYBs0dEw_xV38e_m_Jo-oTJZN8xfZFroiR0cRNzac2e98lPa-TCxtOCuVp8Q8ro1Y6nC_1g51iY3nZXHfELX4vUxSh-4z7I0VkzCREQNYx-iKWw6MqEl2qG2mohiwlRexphf-1--8RuJ7FgubewzFv6dP_vCO9cYGi2qB0Gw6b9u8Jb60JYM7xLT3wGTQNfepiXQWESbVorxYiwZODP7d0tteD-eQ, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r4, use=enc, n=srRMqzPSg5CoMyaY5YErUQBRJkn0QhkzSiIIPA6dow3MnhR2_1S-D4aNHdet29Yc6qs9Qh6HIirMWcp2FPaKfaIZaJ-Q_-9gVyPDWlKHp9jSTeSetDCxm401e8XxNMjluGqb-3uQWE9W0Ka7IlDXXW1KhLYZ75xDaP5Y1c2n84uMRMKwylNCKQv0KlHIRDhsPfHx82khTGUb1XMqom7FWO8Ii4whRr7Glw0JiXj8ANHGozVTP-EVkZqFRJmwLG-ndyvsJOclEwwrXYqklFloU7WUwZQ5M08F-g-6XlSNHtaDcFagUUQKXG8zSb6GqXtEfhrs0mwI1D66b3txAf_76w9phkwlHp0Ab_lLuJLAr0j_ACtXbyxUQvHOV8QXmBuSwl7dVqAXFXGBQNGRtdewjPYgzmS4l_SzjgvC8jRTd-xzSof_gIIbSrKEtMnIoKhMCexyYGXkEzfv7aZH92_ZDGa9Cszlyqd3TJrDjj75zrkztc3coMOgbIVHoet_Ptmx, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, use=enc, n=yzFYB2Nqp5Wb34XQUBGRR33tp1jPVds46D3xwmTXPqjsbr4LMQqPWghtN_qE2bHldPJ9RJUk-i3UxnTAwR1bKLaCj6Aip_blZ4z_wK6IUIkJZk2nPD75YyhTpE9CqoI26lL2KBjMj3gn3cIxHi22BdGshppUbaf-ogH18LQ1bStM63uiflX44ud7GT4JVGaBczoad_cr-R1hs4kWZNdJrzBh7aPxebYnbAVd2CTeyXGYr_GIiq_sgtaBBISGoggruY5r-fva3R4YnhoTnmNeFOLDb99bzDPHbWhyjJ5nqBx7yaw1mT9uBnWno-h423bAT81TvXOJ2ogZ-jsYigx6xw, e=AQAB}]) selecting from keys: [org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r3, use=enc, n=pkTznDIyNrI9wvfoFqv3yZpHv5PBeSXxdvOIKtsrKTSXxgDqjfn3jS4CiZidUjW1TzwwkYRZYU3Ei-M7qecudUs1QFdoBUNyd7V_X-ueToD1K-JvQCCrb74bzQWHVfsb2bRfuLw3Tyw3JwnWU3Q-P7OP08INyitwFw9Oz5DvKovtuOyAh3-CT8eSXcPMy2LQTt7WW8h2YeMq1EvndAc67ohiz-q3u2Qqwbbyv-p237mL_90JLE4xMBnLNey4FDjtXbXIq8T8QbvGyn4Dc67ZxH4-izAxi_siA_3z0H7oTYRaeNL4JuNqhoB0R4CgThfofdGVGZVWPyyowzSI-7nxbMHYNNse96wDnbTTKC8pP-qDjExRYjzm4iNueaMzzcq3wAIpR5z2tZp1oULOo43R0kcXC51sKrenJWnqIaIj_WsENRAWWHsrh5IycgySWyytaGVgQHaeBagYJHzRcrhWk10e81M8oMtdPPL1MLS0bbU3CTpDcacr4KyAKAL8sVi7-M2UVqvtWkEZCJ9q1cgOFwcp0t8ZKOpw9OgVeyo-P8HoDpfeXM_WecqNuHSRBlJGbAIfKErBiAUAKFmdEKyHtuUi-Ni6cEwDgjrSxX3apxG_41POrZjZBuuV6FYBcR1wqnTr8k-_z49Kv8ZGF3yszgcV3IQ4qK3-M_qqypnEai8, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e1, use=enc, x=zw4_6TARtwAsHFDw4Q1gr65t6BMl6lXOmmOMA3R0q58, y=O0Gb45b83A8FRe-DH_xJ4H0dsaQVskZMT_RBIKaSGOc, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e2, use=enc, x=A47oP1eLgWo7NsiKGV2Q983D3oNxLnRDlgtEi7HCtSI, y=4CjFGXRHDmm3g_cSB2YZPYsnxorc4tAEJRD35wBu0ys, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r1, use=enc, n=lFZ04QwtWu_hHgqlry40DuIhVZyl6ci6FzyLfkeHLH8xfCDLR-rvslxX-Ub3teVnPjZYdUFlZztuDo5kOFsF7TvUQMJhx00VZ6qugm-4LDSJ93ioGuo37vNDjMYBs0dEw_xV38e_m_Jo-oTJZN8xfZFroiR0cRNzac2e98lPa-TCxtOCuVp8Q8ro1Y6nC_1g51iY3nZXHfELX4vUxSh-4z7I0VkzCREQNYx-iKWw6MqEl2qG2mohiwlRexphf-1--8RuJ7FgubewzFv6dP_vCO9cYGi2qB0Gw6b9u8Jb60JYM7xLT3wGTQNfepiXQWESbVorxYiwZODP7d0tteD-eQ, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r4, use=enc, n=srRMqzPSg5CoMyaY5YErUQBRJkn0QhkzSiIIPA6dow3MnhR2_1S-D4aNHdet29Yc6qs9Qh6HIirMWcp2FPaKfaIZaJ-Q_-9gVyPDWlKHp9jSTeSetDCxm401e8XxNMjluGqb-3uQWE9W0Ka7IlDXXW1KhLYZ75xDaP5Y1c2n84uMRMKwylNCKQv0KlHIRDhsPfHx82khTGUb1XMqom7FWO8Ii4whRr7Glw0JiXj8ANHGozVTP-EVkZqFRJmwLG-ndyvsJOclEwwrXYqklFloU7WUwZQ5M08F-g-6XlSNHtaDcFagUUQKXG8zSb6GqXtEfhrs0mwI1D66b3txAf_76w9phkwlHp0Ab_lLuJLAr0j_ACtXbyxUQvHOV8QXmBuSwl7dVqAXFXGBQNGRtdewjPYgzmS4l_SzjgvC8jRTd-xzSof_gIIbSrKEtMnIoKhMCexyYGXkEzfv7aZH92_ZDGa9Cszlyqd3TJrDjj75zrkztc3coMOgbIVHoet_Ptmx, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, use=enc, n=yzFYB2Nqp5Wb34XQUBGRR33tp1jPVds46D3xwmTXPqjsbr4LMQqPWghtN_qE2bHldPJ9RJUk-i3UxnTAwR1bKLaCj6Aip_blZ4z_wK6IUIkJZk2nPD75YyhTpE9CqoI26lL2KBjMj3gn3cIxHi22BdGshppUbaf-ogH18LQ1bStM63uiflX44ud7GT4JVGaBczoad_cr-R1hs4kWZNdJrzBh7aPxebYnbAVd2CTeyXGYr_GIiq_sgtaBBISGoggruY5r-fva3R4YnhoTnmNeFOLDb99bzDPHbWhyjJ5nqBx7yaw1mT9uBnWno-h423bAT81TvXOJ2ogZ-jsYigx6xw, e=AQAB}]): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhHQ00ifQ.Ac5pGgt-UTQYOQBO4Z-sABTVhrSr70xjotF0FMXWFqUB4iyoihdLRBTnrpjTb6o-orOqA6EMsv6oDZZelSn3J5Ul-cJSPibXuehlX9VQkZv4NDhP38sUeuXNp0IDtNcJeX2tFI2t6W2uFrCYwIkvh8f8bKHR_yUZslFBWAXRwLX9H2PjyQLXhir3hM1SAOKrQQVjaoPOum1n-3F6p_fh8gZYaxVJiJ2Yq9kdqVwY1wjsEq5sq8JN3j8szfE1GBVYHQhdn2I96bpX9OI97ma-XDIZwmQRgHT1mMByhbTG1SzQiIOc4CXGp5b5zER8j55MVZYB0L3iPYVEELY5YjWULc8XTUeSkejvH3ENuckqBoMijx3vb3N3XUFvY1IW6l0DecXEbv87ead-qSRoCNWKsZKtNX457jhtl9xXO0lrjT5kB_D9z_0SbT2X7ffsZ4vMGBbzsII-Ip_cWwl8xYXxwy9OGVsiRt1F0q1JgtNS35lNP9hZvDJksWPo77ebqXEw.ocPwwRIpGacR3VO1.-XXqFCYM6zkOTl3j.hOTzs7STvZrH3Agtm4DoNg] -14:20:58.784 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=Hzbvc__4g2nqIaYoYkc__w): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoiZGV1eCJ9..JruwzL7TaQ1Fub8Hw6yYmQ.b4B9F3kerVHvyGB5zb40lkTqxulLbMhwFi-qvPfFwwbuyPVPf5s7TeT3i3MLRs0-l_1hP5bPxIEEnOEOBbqTGwO1TWuBn_lQsR8XpQRp6t4H0eaXZsnBqOa3MeEtmGpo.Hzbvc__4g2nqIaYoYkc___] -14:20:58.784 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256","kid":"deux"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=one}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=two}]): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoiZGV1eCJ9..JruwzL7TaQ1Fub8Hw6yYmQ.b4B9F3kerVHvyGB5zb40lkTqxulLbMhwFi-qvPfFwwbuyPVPf5s7TeT3i3MLRs0-l_1hP5bPxIEEnOEOBbqTGwO1TWuBn_lQsR8XpQRp6t4H0eaXZsnBqOa3MeEtmGpo.Hzbvc--4g2nqIaYoYkc2pQ] -[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.199 s - in org.jose4j.jwt.consumer.JwksDecryptionKeyResolverUsingJwtConsumerTest +14:26:31.225 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=9NTINb4AhXmcT8qfdalM2Q). +14:26:31.226 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=IbIYWsLJdrNl--TfA9oHow). +14:26:31.226 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=IbIYWsLJdrNl--TfA9oHow). +14:26:31.226 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=bIMR4fnc-PBsbRd_nzQ08g). +14:26:31.226 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=bIMR4fnc-PBsbRd_nzQ08g). +14:26:31.226 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=bIMR4fnc-PBsbRd_nzQ08g). +14:26:31.226 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=q96TGfd7e4C7bd4FfR8VKg). +14:26:31.227 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=q96TGfd7e4C7bd4FfR8VKg). +14:26:31.227 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=q96TGfd7e4C7bd4FfR8VKg). +14:26:31.227 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=q96TGfd7e4C7bd4FfR8VKg). +14:26:31.227 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=eR96UM8mfGA870l5PQxqpQ). +14:26:31.227 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=eR96UM8mfGA870l5PQxqpQ). +14:26:31.227 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=eR96UM8mfGA870l5PQxqpQ). +14:26:31.227 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=eR96UM8mfGA870l5PQxqpQ). +14:26:31.227 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=5) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=eR96UM8mfGA870l5PQxqpQ). +14:26:31.228 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=-JNtCO_yeIRLVz7p6kOJQQ). +14:26:31.228 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=-JNtCO_yeIRLVz7p6kOJQQ). +14:26:31.244 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=-JNtCO_yeIRLVz7p6kOJQQ). +14:26:31.244 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=-JNtCO_yeIRLVz7p6kOJQQ). +14:26:31.244 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=5) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=-JNtCO_yeIRLVz7p6kOJQQ). +14:26:31.244 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=6) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=-JNtCO_yeIRLVz7p6kOJQQ). +14:26:31.244 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256"} using attempted decryption to disambiguate from filtered candidate JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=1}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=2}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=3}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=4}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=5}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=6}]) selecting from keys: [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=1}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=2}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=3}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=4}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=5}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=6}]): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..rllpQT2d3D_fsvMvIeF5Tg.Z1GqvjDk0UyDKVDLVvnXSzd7wz0769NmCLv-D46m2hA.-JNtCO_yeIRLVz7p6kOJQQ] +14:26:31.282 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). +14:26:31.335 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). +14:26:31.335 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). +14:26:31.478 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Message is larger than modulus). +14:26:31.553 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). +14:26:31.705 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). +14:26:31.756 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=e2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: A128KW key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: javax.crypto.IllegalBlockSizeException: Integrity check failed; caused by: javax.crypto.IllegalBlockSizeException: Integrity check failed). +14:26:31.781 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). +14:26:31.856 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). +14:26:32.005 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). +14:26:32.005 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). +14:26:32.005 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"RSA-OAEP","enc":"A128GCM"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"RSA-OAEP","enc":"A128GCM"} using attempted decryption to disambiguate from filtered candidate JWKs [org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r1, use=enc, n=lFZ04QwtWu_hHgqlry40DuIhVZyl6ci6FzyLfkeHLH8xfCDLR-rvslxX-Ub3teVnPjZYdUFlZztuDo5kOFsF7TvUQMJhx00VZ6qugm-4LDSJ93ioGuo37vNDjMYBs0dEw_xV38e_m_Jo-oTJZN8xfZFroiR0cRNzac2e98lPa-TCxtOCuVp8Q8ro1Y6nC_1g51iY3nZXHfELX4vUxSh-4z7I0VkzCREQNYx-iKWw6MqEl2qG2mohiwlRexphf-1--8RuJ7FgubewzFv6dP_vCO9cYGi2qB0Gw6b9u8Jb60JYM7xLT3wGTQNfepiXQWESbVorxYiwZODP7d0tteD-eQ, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e2, use=enc, x=A47oP1eLgWo7NsiKGV2Q983D3oNxLnRDlgtEi7HCtSI, y=4CjFGXRHDmm3g_cSB2YZPYsnxorc4tAEJRD35wBu0ys, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r4, use=enc, n=srRMqzPSg5CoMyaY5YErUQBRJkn0QhkzSiIIPA6dow3MnhR2_1S-D4aNHdet29Yc6qs9Qh6HIirMWcp2FPaKfaIZaJ-Q_-9gVyPDWlKHp9jSTeSetDCxm401e8XxNMjluGqb-3uQWE9W0Ka7IlDXXW1KhLYZ75xDaP5Y1c2n84uMRMKwylNCKQv0KlHIRDhsPfHx82khTGUb1XMqom7FWO8Ii4whRr7Glw0JiXj8ANHGozVTP-EVkZqFRJmwLG-ndyvsJOclEwwrXYqklFloU7WUwZQ5M08F-g-6XlSNHtaDcFagUUQKXG8zSb6GqXtEfhrs0mwI1D66b3txAf_76w9phkwlHp0Ab_lLuJLAr0j_ACtXbyxUQvHOV8QXmBuSwl7dVqAXFXGBQNGRtdewjPYgzmS4l_SzjgvC8jRTd-xzSof_gIIbSrKEtMnIoKhMCexyYGXkEzfv7aZH92_ZDGa9Cszlyqd3TJrDjj75zrkztc3coMOgbIVHoet_Ptmx, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r3, use=enc, n=pkTznDIyNrI9wvfoFqv3yZpHv5PBeSXxdvOIKtsrKTSXxgDqjfn3jS4CiZidUjW1TzwwkYRZYU3Ei-M7qecudUs1QFdoBUNyd7V_X-ueToD1K-JvQCCrb74bzQWHVfsb2bRfuLw3Tyw3JwnWU3Q-P7OP08INyitwFw9Oz5DvKovtuOyAh3-CT8eSXcPMy2LQTt7WW8h2YeMq1EvndAc67ohiz-q3u2Qqwbbyv-p237mL_90JLE4xMBnLNey4FDjtXbXIq8T8QbvGyn4Dc67ZxH4-izAxi_siA_3z0H7oTYRaeNL4JuNqhoB0R4CgThfofdGVGZVWPyyowzSI-7nxbMHYNNse96wDnbTTKC8pP-qDjExRYjzm4iNueaMzzcq3wAIpR5z2tZp1oULOo43R0kcXC51sKrenJWnqIaIj_WsENRAWWHsrh5IycgySWyytaGVgQHaeBagYJHzRcrhWk10e81M8oMtdPPL1MLS0bbU3CTpDcacr4KyAKAL8sVi7-M2UVqvtWkEZCJ9q1cgOFwcp0t8ZKOpw9OgVeyo-P8HoDpfeXM_WecqNuHSRBlJGbAIfKErBiAUAKFmdEKyHtuUi-Ni6cEwDgjrSxX3apxG_41POrZjZBuuV6FYBcR1wqnTr8k-_z49Kv8ZGF3yszgcV3IQ4qK3-M_qqypnEai8, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e1, use=enc, x=zw4_6TARtwAsHFDw4Q1gr65t6BMl6lXOmmOMA3R0q58, y=O0Gb45b83A8FRe-DH_xJ4H0dsaQVskZMT_RBIKaSGOc, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, use=enc, n=yzFYB2Nqp5Wb34XQUBGRR33tp1jPVds46D3xwmTXPqjsbr4LMQqPWghtN_qE2bHldPJ9RJUk-i3UxnTAwR1bKLaCj6Aip_blZ4z_wK6IUIkJZk2nPD75YyhTpE9CqoI26lL2KBjMj3gn3cIxHi22BdGshppUbaf-ogH18LQ1bStM63uiflX44ud7GT4JVGaBczoad_cr-R1hs4kWZNdJrzBh7aPxebYnbAVd2CTeyXGYr_GIiq_sgtaBBISGoggruY5r-fva3R4YnhoTnmNeFOLDb99bzDPHbWhyjJ5nqBx7yaw1mT9uBnWno-h423bAT81TvXOJ2ogZ-jsYigx6xw, e=AQAB}]) selecting from keys: [org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r1, use=enc, n=lFZ04QwtWu_hHgqlry40DuIhVZyl6ci6FzyLfkeHLH8xfCDLR-rvslxX-Ub3teVnPjZYdUFlZztuDo5kOFsF7TvUQMJhx00VZ6qugm-4LDSJ93ioGuo37vNDjMYBs0dEw_xV38e_m_Jo-oTJZN8xfZFroiR0cRNzac2e98lPa-TCxtOCuVp8Q8ro1Y6nC_1g51iY3nZXHfELX4vUxSh-4z7I0VkzCREQNYx-iKWw6MqEl2qG2mohiwlRexphf-1--8RuJ7FgubewzFv6dP_vCO9cYGi2qB0Gw6b9u8Jb60JYM7xLT3wGTQNfepiXQWESbVorxYiwZODP7d0tteD-eQ, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e2, use=enc, x=A47oP1eLgWo7NsiKGV2Q983D3oNxLnRDlgtEi7HCtSI, y=4CjFGXRHDmm3g_cSB2YZPYsnxorc4tAEJRD35wBu0ys, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r4, use=enc, n=srRMqzPSg5CoMyaY5YErUQBRJkn0QhkzSiIIPA6dow3MnhR2_1S-D4aNHdet29Yc6qs9Qh6HIirMWcp2FPaKfaIZaJ-Q_-9gVyPDWlKHp9jSTeSetDCxm401e8XxNMjluGqb-3uQWE9W0Ka7IlDXXW1KhLYZ75xDaP5Y1c2n84uMRMKwylNCKQv0KlHIRDhsPfHx82khTGUb1XMqom7FWO8Ii4whRr7Glw0JiXj8ANHGozVTP-EVkZqFRJmwLG-ndyvsJOclEwwrXYqklFloU7WUwZQ5M08F-g-6XlSNHtaDcFagUUQKXG8zSb6GqXtEfhrs0mwI1D66b3txAf_76w9phkwlHp0Ab_lLuJLAr0j_ACtXbyxUQvHOV8QXmBuSwl7dVqAXFXGBQNGRtdewjPYgzmS4l_SzjgvC8jRTd-xzSof_gIIbSrKEtMnIoKhMCexyYGXkEzfv7aZH92_ZDGa9Cszlyqd3TJrDjj75zrkztc3coMOgbIVHoet_Ptmx, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r3, use=enc, n=pkTznDIyNrI9wvfoFqv3yZpHv5PBeSXxdvOIKtsrKTSXxgDqjfn3jS4CiZidUjW1TzwwkYRZYU3Ei-M7qecudUs1QFdoBUNyd7V_X-ueToD1K-JvQCCrb74bzQWHVfsb2bRfuLw3Tyw3JwnWU3Q-P7OP08INyitwFw9Oz5DvKovtuOyAh3-CT8eSXcPMy2LQTt7WW8h2YeMq1EvndAc67ohiz-q3u2Qqwbbyv-p237mL_90JLE4xMBnLNey4FDjtXbXIq8T8QbvGyn4Dc67ZxH4-izAxi_siA_3z0H7oTYRaeNL4JuNqhoB0R4CgThfofdGVGZVWPyyowzSI-7nxbMHYNNse96wDnbTTKC8pP-qDjExRYjzm4iNueaMzzcq3wAIpR5z2tZp1oULOo43R0kcXC51sKrenJWnqIaIj_WsENRAWWHsrh5IycgySWyytaGVgQHaeBagYJHzRcrhWk10e81M8oMtdPPL1MLS0bbU3CTpDcacr4KyAKAL8sVi7-M2UVqvtWkEZCJ9q1cgOFwcp0t8ZKOpw9OgVeyo-P8HoDpfeXM_WecqNuHSRBlJGbAIfKErBiAUAKFmdEKyHtuUi-Ni6cEwDgjrSxX3apxG_41POrZjZBuuV6FYBcR1wqnTr8k-_z49Kv8ZGF3yszgcV3IQ4qK3-M_qqypnEai8, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e1, use=enc, x=zw4_6TARtwAsHFDw4Q1gr65t6BMl6lXOmmOMA3R0q58, y=O0Gb45b83A8FRe-DH_xJ4H0dsaQVskZMT_RBIKaSGOc, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, use=enc, n=yzFYB2Nqp5Wb34XQUBGRR33tp1jPVds46D3xwmTXPqjsbr4LMQqPWghtN_qE2bHldPJ9RJUk-i3UxnTAwR1bKLaCj6Aip_blZ4z_wK6IUIkJZk2nPD75YyhTpE9CqoI26lL2KBjMj3gn3cIxHi22BdGshppUbaf-ogH18LQ1bStM63uiflX44ud7GT4JVGaBczoad_cr-R1hs4kWZNdJrzBh7aPxebYnbAVd2CTeyXGYr_GIiq_sgtaBBISGoggruY5r-fva3R4YnhoTnmNeFOLDb99bzDPHbWhyjJ5nqBx7yaw1mT9uBnWno-h423bAT81TvXOJ2ogZ-jsYigx6xw, e=AQAB}]): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhHQ00ifQ.Ac5pGgt-UTQYOQBO4Z-sABTVhrSr70xjotF0FMXWFqUB4iyoihdLRBTnrpjTb6o-orOqA6EMsv6oDZZelSn3J5Ul-cJSPibXuehlX9VQkZv4NDhP38sUeuXNp0IDtNcJeX2tFI2t6W2uFrCYwIkvh8f8bKHR_yUZslFBWAXRwLX9H2PjyQLXhir3hM1SAOKrQQVjaoPOum1n-3F6p_fh8gZYaxVJiJ2Yq9kdqVwY1wjsEq5sq8JN3j8szfE1GBVYHQhdn2I96bpX9OI97ma-XDIZwmQRgHT1mMByhbTG1SzQiIOc4CXGp5b5zER8j55MVZYB0L3iPYVEELY5YjWULc8XTUeSkejvH3ENuckqBoMijx3vb3N3XUFvY1IW6l0DecXEbv87ead-qSRoCNWKsZKtNX457jhtl9xXO0lrjT5kB_D9z_0SbT2X7ffsZ4vMGBbzsII-Ip_cWwl8xYXxwy9OGVsiRt1F0q1JgtNS35lNP9hZvDJksWPo77ebqXEw.ocPwwRIpGacR3VO1.-XXqFCYM6zkOTl3j.hOTzs7STvZrH3Agtm4DoNg] +14:26:32.082 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=Hzbvc__4g2nqIaYoYkc__w): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoiZGV1eCJ9..JruwzL7TaQ1Fub8Hw6yYmQ.b4B9F3kerVHvyGB5zb40lkTqxulLbMhwFi-qvPfFwwbuyPVPf5s7TeT3i3MLRs0-l_1hP5bPxIEEnOEOBbqTGwO1TWuBn_lQsR8XpQRp6t4H0eaXZsnBqOa3MeEtmGpo.Hzbvc__4g2nqIaYoYkc___] +14:26:32.083 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256","kid":"deux"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=one}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=two}]): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoiZGV1eCJ9..JruwzL7TaQ1Fub8Hw6yYmQ.b4B9F3kerVHvyGB5zb40lkTqxulLbMhwFi-qvPfFwwbuyPVPf5s7TeT3i3MLRs0-l_1hP5bPxIEEnOEOBbqTGwO1TWuBn_lQsR8XpQRp6t4H0eaXZsnBqOa3MeEtmGpo.Hzbvc--4g2nqIaYoYkc2pQ] +[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.868 s - in org.jose4j.jwt.consumer.JwksDecryptionKeyResolverUsingJwtConsumerTest [INFO] Running org.jose4j.jwt.consumer.JwtConsumerTest -14:20:58.797 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322039,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{1571322039 -> Oct 17, 2019, 2:20:39?PM GMT} is more than 60 second(s) in the past.] -14:20:58.800 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1570321001,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{1570321001 -> Oct 6, 2019, 12:16:41?AM GMT} is more than 60 second(s) in the past.] -14:20:58.802 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":12345,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{12345 -> Jan 1, 1970, 3:25:45?AM GMT} is more than 60 second(s) in the past.] -14:20:58.805 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":0,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{0 -> Jan 1, 1970, 12:00:00?AM GMT} is more than 60 second(s) in the past.] -14:20:58.807 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-938763,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{-938763 -> Dec 21, 1969, 3:13:57?AM GMT} is more than 60 second(s) in the past.] -14:20:58.810 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-2147483736,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{-2147483736 -> Dec 13, 1901, 8:44:24?PM GMT} is more than 60 second(s) in the past.] -14:20:58.813 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322101,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322101 -> Oct 17, 2019, 2:21:41?PM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] -14:20:58.815 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322177,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322177 -> Oct 17, 2019, 2:22:57?PM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] -14:20:58.818 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":2147483647,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{2147483647 -> Jan 19, 2038, 3:14:07?AM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] -14:20:58.820 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":7700000007,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{7700000007 -> Jan 2, 2214, 8:53:27?AM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] -14:20:58.826 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571321979,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{1571321979 -> Oct 17, 2019, 2:19:39?PM GMT} is more than 120 second(s) in the past.] -14:20:58.832 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322111,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322111 -> Oct 17, 2019, 2:21:51?PM GMT} is more than 10 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] -14:20:58.837 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"issuer.example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (issuer.example.com) doesn't match expected value of nope.example.com] -14:20:58.837 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] -14:20:58.837 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":["issuer1", "other.one", "meh"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'iss' claim is not the expected type ([issuer1, other.one, meh] - Cannot cast java.util.ArrayList to java.lang.String)] -14:20:58.837 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":["issuer1", "nope.not"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'iss' claim is not the expected type ([issuer1, nope.not] - Cannot cast java.util.ArrayList to java.lang.String)] -14:20:58.837 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https://accounts.google.com"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (https://accounts.google.com) doesn't match expected value of one of [nope.google.com, https://fake.google.com]] -14:20:58.837 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"x"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (x) doesn't match expected value of one of [a, b, c, d, e]] -14:20:58.837 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] -14:20:58.837 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] -14:20:58.837 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] -14:20:58.837 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] -14:20:58.838 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] -14:20:58.838 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] -14:20:58.838 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] -14:20:58.838 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] -14:20:58.838 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: JWS Plaintext (alg=none) must not use a key.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] -14:20:58.838 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: JWS Plaintext (alg=none) must not use a key.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] -14:20:58.839 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] -14:20:58.839 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] -14:20:59.249 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4Ijoiay0wNWZnYWY0bEdLOF9kTXhsQUM0MjlvZ2JCZ19fd2FvRFpScGprMEQ0dyIsInkiOiJQYnF2c2pVclVJVXItVG1TVEl0clkyZ1doUl8zczBBYUxWNU5JZEhJSkcwIiwiY3J2IjoiUC0yNTYifX0.Rmptf-_3hpCrgI6IaZMNhRbV1mqFjHKWwyC6aczcdFn7tzbcGekpfQ.Z4wmdgthq0MccOcmnA_7Dw.H5XvC8FHxGd02QulQNjGmyYiVjLBRhYThA8dSwm_5AAn_mjjt_b0sjLTWDyF-YZr_alYAbgRnF_2DDmaHIjJEw.uimE6VbrhxAnDLLwVXfz-A Additional details: [[20] Missing Integrity Protection] -14:20:59.253 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImtpZCI6ImVjMiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJqcm1YbUdzVUdZY2hJY1B4QVU1ZjJkT0dwX1JoU1AxcTF1bHBWUThhQnRJIiwieSI6IjhIRm03MnVTbGZBb083QWllajdJdUZib19kTEVELVVGc0d6SFFoaXhRZGMiLCJjcnYiOiJQLTI1NiJ9fQ..cjk6gm2Dz5x6AIotZUJ5GA.WkOAc55J-q1SQhLnmUPTR-sQ0iAUZozCZOA2fJKIqRcis6h1Ddu_VZ9KI82rG6ngvry1MnU5uVjhY27m9A_FeQ.6HaK3q02k2aEyP-uLYF-ag Additional details: [[20] Missing Integrity Protection] -14:20:59.258 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiQlJGeWR1dkVUdjU4SEtpLS1rTHJzNjlKQWxGR0FBenFzU016OHpUQkZtMCIsInkiOiI4OVZNSGkyV2hJemlLSUx3Skp1U2M1UVAxM1lpNEhaTzNwVFluQ1pacWhjIiwiY3J2IjoiUC0yNTYifX0.oAxmJWTnNV-Qq0m7-XIM18Bs1OAgIOKn47E-dW-m_2Li4GB6rwf7z9q8LzAJ0v-UmoymgmKhC7clmpEu8T-CY8oqMByYeygD.ZH1eNKAZsnX57f1ray1AAQ.PB6neLvP0-UvM9ZQKdAEgDQqdgcVOlJ1rPREfdBOlpDhvBZ1Np1S6lkyphzkcfctVEjoHRuq3n8obHOQqosh9A.2_9Jt1Tmu7M71ohJkOJ0elAUBsWQr-t8__6r7TG7DUk Additional details: [[20] Missing Integrity Protection] -14:20:59.263 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiRmNEblZhWk5LV3QtM1kwVkNvR1owX2xxU3ZqbnpNb0N0bl9zWHp3dlJFYyIsInkiOiJqeXlBWjN2bFdIUnFDNFM5NU4zbnhTYnJPcVN1c3RXdFNNbERtbE9CckF3IiwiY3J2IjoiUC0yNTYifX0.9EvQj3ouyOgWA4ze1HHH5blzSc0ykGoLcJn7DpXU8_M5aiRGSWfXakYgCd6qfpooaBgTbpzCQCI.vLnUnj385M80D3WyVQKi9A.PW-TUj7qZfZ0aSoJbgiKhZllzbInnHvGuTiJq4X3jltmYIW_0lC3t7A5M8y5RThx-qGfjMspuEKQtosmMIGf3g.jxzZHCVCrYgYZI-R5BWcSpG65USyh1w1 Additional details: [[20] Missing Integrity Protection] -14:20:59.269 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJyMi1iIn0.rVdWKvXZiO08TdzL7rMtghEHbCbffyWA9EzV5txWD54acMndwy7gfsa97kujrO2OFsLhTbnL_xzg1bxXcWoWL4HgPg1g52Wi0qBdshztvA_OjAYzS2msosZiXpp20U2UdBnt4DJ0piZxl8kKnThGg-_ZBdTEatN_nRs6U83ZUj2O_SJGRo1nuF4J6UTtZklevR53uilAseZiovAxF99yVWepx0v16MS44gUfo7Qqw7pmGvttZQszku9cWVY_j9NXSWkqm7gas4lB-LhJhoXYu4xZ6BdFNTh30XC3RcWUJyPwkB-Fn6XVcB09DhF7Y1DSDWLGc3C6bDQWQaEp37Uo9Q.gIHccarw56klCiDpbDv7nA.RAa6U-t3NS19trgAH2hlGsbeDlyQG2UqLMC4VYcHIC7QAwlj_Q8cjxWB1lZzW2M9O9q1ykfP19-ahMUebPcDPA.cFi7NhZNSQ-jah82W8gmog Additional details: [[20] Missing Integrity Protection] -14:20:59.274 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJraWQiOiJyMi1iIn0.WFM8wcZlC2SdBrxd4YuAIDbUq9dAe3IqN4_1B8HzxEJ_IiVta2iFFQxu4pPKYjDdmYuhL9vOefRkeKHOzbBnKUrbuGK0UxXU1AYk5-Eh1noyYFOTzmD8fZPfvpsEBHP-nAMrEtuDPvNiZ629XhMQWqJy8xHxSjvlz4942j9LgMvzDxkI4rDQViqiaBba1zMp93P8IJboWCGc9ZiMBbLV0Qcv9z7Eau9u3wlFGYACq2xVraFbydsX7XPtP6b3dhuszBoER8zleuF-o2jQtG2yRRRAVF6MTsbU7_F-s61LIX7_HMWEnp6xosxXevII0hLvpflPS_sojalImtieHnwjCA.sRszwnaP7rvfC8r43t7vOA.bIwcTiQ_hnQnaROp8ULeRGqzXz-Nw71npsJRsfp_MdzjY9DCRtoaP6xbAk4HjmSzpiFjeYEqkQhYDaVpSKWSdA.ZWC_JKuEWoc-IuYMl-jucI2y_IzYh_sJ Additional details: [[20] Missing Integrity Protection] -14:20:59.278 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJraWQiOiJyMi1iIn0.kpPMPtSpuBnEQ0Oqfm_GRU4_iNIANpWn8YlGehCUO1e5JjGk92i9WxTFZtEqulK_W4ICVn51Cxmxh8Q5M8TpVZRudJLmOeURNYS8l2_EeaPhHSWwM6sYg0mU_8evSmdZOhkR2-HGdFRAbSIOp4vB9XL5iWfJ-GGQdA3CAeOOSmXe4G9-QoWN6mxfs30cOO5NBkXtVh67kSB4pL18wM4ZavjpuCwj4k7A0w6wviROhv2opJJAqHFBXISJppRCp7kZxVSBo3roumgt0sgbosvultETAhS1RR7NF76FQm6ycrZHPhpRLkL0M9uFPdRWBFhX-srOWpl4VqTtVgOM5DOmLw.cErTWbDnNEii24xz-GFumA.d5hudj-qOy484p7EUM8XBFmM5P33DEn5dCj6b8W35hZ4Fdkkc948yOKqQnx61HPgkbDaf-oKAjCQThQrGQOleQ.y0RsQI7lxGXbfrsN1IizmPqgwSFFBofPImGm8BNue1Y Additional details: [[20] Missing Integrity Protection] -14:20:59.278 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"HS256","kid":"r2"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec5, x=AFYgIYf30NMnVrHVbKfRJyIMnx8pK-CFCBw3zzvnC5Hd50tAQeaXq-XIxZui2hOmsnTCPZKFSzhFIdSWlYRDb9cM, y=AZGoQHkolNqNuOkZSFEQBlga9OniKNmAKgTH3Hp6S4A33qBSUPhYq72Y4jr8OBe6TDh7dgwgztsPD-Apnu1Xvjum, crv=P-521}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=512bits}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec2, x=z6xZ91qev4jHYyCTHWFQubckMKpUMqfADlFGO13h3iI, y=Aabge6x3FoZkEMepfc9OqSKQuxbld2jNOrh8vph3FHo, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, n=xu4rhumC_lAM-lFGH0XtRtJDOJwiQPFs0XeJcdPw2A8W-96a5g82xtHjlxpDJJAGAXJTQ9TmBY6HsUa0QgOrQR7br7XWv_fy2FhbjPggG2Rgk9m0bqrxVMPJh_Kvon47oyKb068qikow9CGBc0XpoSYpGj8EeEoz0GttEhTcpD3J29vVfrWLHqPewy46P0oUxFRxjeKftof4pGXhRNxFwXAKhDsLqWR_lomi6Qt6_KlU5P3qWjUBN76RXP-1XPUTUfGA42XRcvm_JOQ4wagFXjyBhNx25AfKJNwORNXj2wneb45Uo2juZmpcRWvmU0hMO8pNlPC1EF4QNKdpK-V4qQ, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec3, x=Cc6XBmqjx8ycBwUlqCgHxeKewBF6y2BV0rTjh-PqRE6aVnGv9NBdo5qse1UiSfNZ, y=ZEaMPRhAFWa1vRtRkFNrhaSnVTpRA34Im4jA8Hb7veojzL0cMrOUBDgIIXlJvIw0, crv=P-384}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=128bits}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2-b, n=4MUEd2EWrxwSg8_N2hQ3mOixAhP4qa5yAlNEnayV8Uiz8dU1X_splQoW7w-87gF8iiXTV_XqDvtt51tkFeOVZEpNtTg4X8N32rSazd6MoSH8t9nWDFYbQHP_dFBTUmlLzMJ2X2UGbhvLLMvXOMTseb-tpxUZM3ugA8X9lhgz-cmDzXyRwk6bc6c_AZhvxAksysIzhaZmduNZBQWjLjvarK2pppuQBQZK3Jc5E-ZKv-GI5L0__kSrIjRosmnd5CwE6N_JSrJRYUP3nq-SfQiPm4liXwt7iT_7lBiVvRK67YsxfrNcrjmGMROhUQXRUhidOOPoMPnkoBdqjLaEEYOc8Q, e=AQAB}]): JsonWebSignature{"alg":"HS256","kid":"r2"}->eyJhbGciOiJIUzI1NiIsImtpZCI6InIyIn0.eyJhdWQiOiJhIiwiaXNzIjoiaSIsImV4cCI6MTc2ODgzMzA1OSwic3ViIjoicyJ9.VLZnOGX1wTjpTgcLpAHDpCYxZ1ljAtZcV7wzRBZkWnE] -14:20:59.279 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoicjItYiJ9.GICz9Cwx0NsVPO0fuirGDJy0MY3b6jy2aKufYAbNoFDJyzwzYnhxqr9FlYz-AnOSS-RL3laA1f_tP6REtuz8z9jOaUb2oNMKfU_uv2wpehbD3-oMh1BV4fkuF48ZU_kSnmIJzCc0YODn1sMPr0HgyMys-XitTDzHyqr6LuPciiLIMyq9vaj87xhR9-qNgE5eQ06rzdjPfGD195ku4b6woTFFPmNLGryEHKu73U8GuLwwWnhc77f95bz9Tk0WTaDbZz4Fm5-y95U5KcYmoMiFsGALon1syyFfLVNulLeNC06KOIXGVZ4Uk4zdPeQ39cQr8hMjizx7O3728oYN3KosTw.Yc8dccfBgkudVaRyS_gHSw.NXr25G3ybu_RZPnK-lM2_P6dL465rMJ1wZLlL4vT3r-WWkaAzyXyjxVBYnYlLCG-vMuTKDKmW7pTSLweMtbqKA.4tB7hm072ycXfuTNZqOB-w] -14:20:59.283 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoicjItYiJ9.GICz9Cwx0NsVPO0fuirGDJy0MY3b6jy2aKufYAbNoFDJyzwzYnhxqr9FlYz-AnOSS-RL3laA1f_tP6REtuz8z9jOaUb2oNMKfU_uv2wpehbD3-oMh1BV4fkuF48ZU_kSnmIJzCc0YODn1sMPr0HgyMys-XitTDzHyqr6LuPciiLIMyq9vaj87xhR9-qNgE5eQ06rzdjPfGD195ku4b6woTFFPmNLGryEHKu73U8GuLwwWnhc77f95bz9Tk0WTaDbZz4Fm5-y95U5KcYmoMiFsGALon1syyFfLVNulLeNC06KOIXGVZ4Uk4zdPeQ39cQr8hMjizx7O3728oYN3KosTw.Yc8dccfBgkudVaRyS_gHSw.NXr25G3ybu_RZPnK-lM2_P6dL465rMJ1wZLlL4vT3r-WWkaAzyXyjxVBYnYlLCG-vMuTKDKmW7pTSLweMtbqKA.4tB7hm072ycXfuTNZqOB-w Additional details: [[20] Missing Integrity Protection] -14:20:59.287 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no encryption but the JWT Consumer is configured to require it: eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk Additional details: [[19] No encryption.] -14:20:59.287 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no encryption but the JWT Consumer is configured to require it: eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk Additional details: [[19] No encryption.] -14:20:59.287 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value.] -14:20:59.287 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] doesn't contain an acceptable identifier. Expected example.org as an aud value.] -14:20:59.287 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] doesn't contain an acceptable identifier. Expected one of [example.org, nada, nope] as an aud value.] -14:20:59.287 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[7] No Audience (aud) claim present.] -14:20:59.287 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[7] No Audience (aud) claim present.] -14:20:59.288 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", "usa.org", "ca.ca"]}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com, usa.org, ca.ca] doesn't contain an acceptable identifier. Expected example.org as an aud value.] -14:20:59.288 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", "usa.org", "ca.ca"]}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com, usa.org, ca.ca] doesn't contain an acceptable identifier. Expected one of [example.org, some.other.junk] as an aud value.] -14:20:59.288 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", 47, false]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The array value of the 'aud' claim contains non string values (47 - class java.lang.Long cannot be cast to class java.lang.String (java.lang.Long and java.lang.String are in module java.base of loader 'bootstrap'))] -14:20:59.288 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":20475}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'aud' claim is not an array of strings or a single string value.] -14:20:59.288 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":{"aud":"example.org"}}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'aud' claim is not an array of strings or a single string value.] -14:20:59.289 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.JwtConsumerTest$4: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:919); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:913); ...omitted...] -14:20:59.289 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.JwtConsumerTest$4: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:919); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:913); ...omitted...] -14:20:59.290 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"name":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[14] No Subject (sub) claim is present.] -14:20:59.290 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":724729}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'sub' claim is not the expected type (724729 - Cannot cast java.lang.Long to java.lang.String)] -14:20:59.290 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":{"values":["one", "2"]}}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'sub' claim is not the expected type ({values=[one, 2]} - Cannot cast org.jose4j.json.JsonUtil$DupeKeyDisallowingLinkedHashMap to java.lang.String)] -14:20:59.293 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits).): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJhY2MiLCJjdHkiOiJKV1QifQ.KrukndaF2sHb3Y0r311rrYmCrXco-99ZIQ3iLjvCVbbow5MppRTK4DPJUShcndfcIVIFXMYSLGvIJwf39yZRJJ_EvBFnqhOUeCAsUHLGO1yxoQ619jmSh4bCaIicLYeivKaVSQN4Ezc5fvg-Nnv6TBIIgHuWMDU2Ztd96DJRokc.wMg2Eb8izCOUnACqdrcPQA.quFKSN7xQoMJzaYFBVwykQZ8zB3hpW8HtK7pm-4Ggzorno_K-eBQ7fXjRmJ1Jw-kCcmUa8flpnQqpL9jurtlz7DC1ABe0vm2ZkHoJluB6QeSr60Y9rP7kyy_rd3blXT_7t6Wgowo8MumXrrUUxxEQJgXvCmKbd-Rw9sK5jAHEug3zztLXHOX0O0QoxDzTJOsSRtodsu7bTJa-ADvPmK9e0Xp06NRqvx7WuJGKlq3cwQ.DL6yaCdiOUcViN-eZVIwOA] -14:20:59.324 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1768832399,"sub":"s","nbf":1768832279}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1768832459 -> Jan 19, 2026, 2:20:59?PM GMT} is on or after the Expiration Time (exp=NumericDate{1768832399 -> Jan 19, 2026, 2:19:59?PM GMT}) claim value.] -14:20:59.325 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1768832399,"sub":"s"}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1768832459 -> Jan 19, 2026, 2:20:59?PM GMT} is on or after the Expiration Time (exp=NumericDate{1768832399 -> Jan 19, 2026, 2:19:59?PM GMT}) claim value.] -14:20:59.325 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1768833659,"sub":"s","nbf":1768832699}) rejected due to invalid claims or other invalid content. Additional details: [[6] The JWT is not yet valid as the evaluation time NumericDate{1768832459 -> Jan 19, 2026, 2:20:59?PM GMT} is before the Not Before (nbf=NumericDate{1768832699 -> Jan 19, 2026, 2:24:59?PM GMT}) claim time.] -14:20:59.326 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 128 bits): JsonWebSignature{"kid":"esc","alg":"HS256"}->eyJraWQiOiJlc2MiLCJhbGciOiJIUzI1NiJ9.eyJhdWQiOiJhIiwiaXNzIjoiaSIsImV4cCI6MTQzMjMyNTQ5Niwic3ViIjoicyIsIm5iZiI6MTQzMjMyNDgzNn0.16LpzAZyBcokZ4aUaXHn5yN0xQ1zpmLyJVFHu6nH1zY] -14:20:59.329 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] 9223372036854775808 is unreasonable for a NumericDate] -14:20:59.331 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":25113002000004770000,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] 25113002000004770000 is unreasonable for a NumericDate] -14:20:59.333 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775809,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] -9223372036854775809 is unreasonable for a NumericDate] -14:20:59.335 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-77261600013501300000000,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] -77261600013501300000000 is unreasonable for a NumericDate] -14:20:59.338 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{9223372036854775807} is more than 2147483647 second(s) ahead of now NumericDate{9223372036854775 -> Aug 17, 292278994, 7:12:55?AM GMT}.] -14:20:59.342 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775 = 9214148664817921033 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] -14:20:59.346 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775807 = 1 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] -14:20:59.350 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775807 = 1 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] -14:20:59.352 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{9223372036854775807} is more than 10 second(s) ahead of now NumericDate{0 -> Jan 1, 1970, 12:00:00?AM GMT} (even when providing 2147483647 seconds of leeway to account for clock skew).] -14:20:59.354 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 2147483647 = 9223372034707292161 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] -14:20:59.376 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[-76717] You can go blind issuing tokens to yourself...] -14:20:59.376 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[-76717] You can go blind issuing tokens to yourself...] -14:20:59.389 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1768832399,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1768832459 -> Jan 19, 2026, 2:20:59?PM GMT} is on or after the Expiration Time (exp=NumericDate{1768832399 -> Jan 19, 2026, 2:19:59?PM GMT}) claim value.] -14:20:59.393 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[15] Subject (sub) claim value (d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea) doesn't match expected value of NOOOOOOOOOOOOOOOOPE] -14:20:59.394 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [R-RufjSDVGCGfdTmIobf2Q] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value.] -14:20:59.394 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [R-RufjSDVGCGfdTmIobf2Q] doesn't contain an acceptable identifier. Expected one of [no, nope, no way jose] as an aud value.] -14:20:59.395 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject", "iss":"issuer", "aud":"audience"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [audience] doesn't contain an acceptable identifier. Expected nope as an aud value., [12] Issuer (iss) claim value (issuer) doesn't match expected value of no way, [13] The JWT ID (jti) claim is not present.] -14:20:59.408 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1768833059,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [AUD] doesn't contain an acceptable identifier. Expected nope as an aud value.] -14:20:59.408 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1768833059,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (ISS) doesn't match expected value of no way] -14:20:59.409 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1768833059,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [AUD] doesn't contain an acceptable identifier. Expected nope as an aud value., [12] Issuer (iss) claim value (ISS) doesn't match expected value of no way, [5] The Expiration Time (exp=NumericDate{1768833059 -> Jan 19, 2026, 2:30:59?PM GMT}) claim value cannot be more than 5 minutes in the future relative to the evaluation time NumericDate{1768832459 -> Jan 19, 2026, 2:20:59?PM GMT}.] -14:20:59.410 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJleHAiOjE3Njg4MzMwNTksImlzcyI6IklTUyIsImF1ZCI6IkFVRCIsInN1YiI6IlNVQiJ9.NGns23fwIfHwxj0tDsFcFuzrlZYopHMWm5gaUzZyNdAwfLU3n_idriThNBjcA2Y68-3cw6IJs9sGmPlNVmXOtEG5n5DrjjmMLCpoeBvLmKW_sCPM35Dx62ZCoi4_QlfZvOVoSfzR9i7_9QwAmpRiPYBFLC3SVH2exH3Cr3FKIKqADeOf3yo86w22JaftSRcpA0I1wVOGvCvrw2EfO1nFuhl5g7Wp1Jl1aRnmYPo9v656Dq_zfmdNY8W9yGeuNXnpPTx4gXeQ2GbXS95vBzansM769TPtNaEC_kaQxzYMdPmc1MkAwqFcw6RQ6Qfv4JUwKs19XGwAuWLN8vT6djTODw] -14:20:59.423 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.iDBh8SWbr0DDBhD6U-s_mCurHTLSeaui06R-fghVZ1Kb0Nz6yyGGNTz3UgMGGY9GGbutz5pBbc9Q2TNDpqotSUeBvIFZQEGnFoM2ktTcybgsL1xSNtxsJH3YDWCH0jyEkFwORq6FWpKPi1IECHNG8n7n_L7DtUEFc1oP-5s2Q_XLGiazPtbZbB4Gpanhyz9QerM-solQeH1Sr9ZBP9Ycqf5uQystXPYfAB8Ox7irrsqRV4uugeeNbYNnTCIS-6b2mnwutlen8Qn6HNBqPfefXq5CgJZXvjGqAnHVG0NBJRwbZyTK-tbJTgFnr1qq-g1f_znDcrY_49R8zWEWKkcVgg.dud2B5nfSdpPe7I4G1sJ-Q.yDOxZbPHtwDcXXhPAxoSwjX-KflTSlNAJi27ZCZvv5yZ8PR5ns_Fnmr1ZgXMZMYfoEDePnzK0mRgEMTbFkhM7A.5TpyUiXJwP8d5fA_oif8pg Additional details: [[10] Missing signature.] -14:20:59.424 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[17] You can go blind issuing tokens to yourself...] -14:20:59.424 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[17] You can go blind issuing tokens to yourself...] -14:20:59.429 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":-1239223372036854775808,"iat":1571322100,"exp":9223372036854775807,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] -1239223372036854775808 is unreasonable for a NumericDate] -14:20:59.431 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":1571322100,"iat":12345678900000000000,"exp":12345678900000000009,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] 12345678900000000009 is unreasonable for a NumericDate] -14:20:59.433 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":1571322100,"iat":1571322111,"exp":157132210009188371766311111,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] 157132210009188371766311111 is unreasonable for a NumericDate] -14:20:59.435 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{9223372036854775807}) claim value cannot be more than 2147483647 minutes in the future relative to the evaluation time NumericDate{9223371903710789693} (even when providing 2147483647 seconds of leeway to account for clock skew).] -14:20:59.437 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":-1,"exp":9223372036854775802,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow adding: 9223372036854775792 + 30 = -9223372036854775794 at org.jose4j.lang.Maths.add(Maths.java:13); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:143); ...omitted...] -14:20:59.439 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1572322100,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854774808 - 6000 = 9223372036854770808 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:113); ...omitted...] -14:20:59.441 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":-9223372036854775798,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775798 - 65 = 9223372036854775753 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:131); ...omitted...] -14:20:59.444 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: 9223372036854775807 - -10 = -9223372036854775799 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:131); ...omitted...] -14:20:59.445 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=QsGX3JhHP1Pwy4zQ8Ha9FQ): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..zWNzKpA-QA0BboVl02nz-A.eyJpc3MiOiJtZSIsImF1ZCI6Im1lIiwiZXhwIjoxNDIwMjMxNjA2LCJuYW1lIjoidmFsdWUifQ.QsGX3JhHP1Pwy4zQ8Ha9FQ] -14:20:59.445 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=QsGX3JhHP1Pwy4zQ8Ha9FQ): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..zWNzKpA-QA0BboVl02nz-A.u1D7JCpDFeRl69G1L-h3IRrmcOXiWLnhr23ugO2kkDqKVNcO1YQ4Xvl9Sag4aYOnkqUbqe6Wdz8KK3d9q178tA.QsGX3JhHP1Pwy4zQ8Ha9FQ] -14:20:59.453 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.g_hEwksO1Ax8Qn7HoN-BVeBoa8FXe0kpyk_XdcSmxvcM5_P296JXXtoHISr_DD_MqewaQSH4dZOQHoUgKLeFly-9RI11TG-_Ge1bZFazBPwKC5lJ6OLANLMd0QSL4fYEb9ERe-epKYE3xb2jfY1AltHqBO-PM6j23Guj2yDKnFv6WO72tteVzm_2n17SBFvhDuR9a2nHTE67pe0XGBUS_TK7ecA-iVq5COeVdJR4U4VZGGlxRGPLRHvolVLEHx6DYyLpw30Ay9R6d68YCLi9FYTq3hIXPK_-dmPlOUlKvPr1GgJzRoeC9G5qCvdcHWsqJGTO_z3Wfo5zsqwkxruxwA.UmVkbW9uZCBXQSA5ODA1Mg.VwHERHPvCNcHHpTjkoigx3_ExK0Qc71RMEParpatm0X_qpg-w8kozSjfNIPPXiTBBLXR65CIPkFqz4l1Ae9w_uowKiwyi9acgVztAi-pSL8GQSXnaamh9kX1mdh3M_TT-FZGQFQsFhu0Z72gJKGdfGE-OE7hS1zuBD5oEUfk0Dmb0VzWEzpxxiSSBbBAzP10l56pPfAtrjEYw-7ygeMkwBl6Z_mLS6w6xUgKlvW6ULmkV-uLC4FUiyKECK4e3WZYKw1bpgIqGYsw2v_grHjszJZ-_I5uM-9RA8ycX9KqPRp9gc6pXmoU_-27ATs9XCvrZXUtK2902AUzqpeEUJYjWWxSNsS-r1TJ1I-FMJ4XyAiGrfmo9hQPcNBYxPz3GQb28Y5CLSQfNgKSGt0A4isp1hBUXBHAndgtcslt7ZoQJaKe_nNJgNliWtWpJ_ebuOpEl8jdhehdccnRMIwAmU1n7SPkmhIl1HlSOpvcvDfhUN5wuqU955vOBvfkBOh5A11UzBuo2WlgZ6hYi9-e3w29bR0C2-pp3jbqxEDw3iWaf2dc5b-LnR0FEYXvI_tYk5rd_J9N0mg0tQ6RbpxNEMNoA9QWk5lgdPvbh9BaO195abQ.AVO9iT5AV4CzvDJCdhSFlQ] -14:20:59.453 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.g_hEwksO1Ax8Qn7HoN-BVeBoa8FXe0kpyk_XdcSmxvcM5_P296JXXtoHISr_DD_MqewaQSH4dZOQHoUgKLeFly-9RI11TG-_Ge1bZFazBPwKC5lJ6OLANLMd0QSL4fYEb9ERe-epKYE3xb2jfY1AltHqBO-PM6j23Guj2yDKnFv6WO72tteVzm_2n17SBFvhDuR9a2nHTE67pe0XGBUS_TK7ecA-iVq5COeVdJR4U4VZGGlxRGPLRHvolVLEHx6DYyLpw30Ay9R6d68YCLi9FYTq3hIXPK_-dmPlOUlKvPr1GgJzRoeC9G5qCvdcHWsqJGTO_z3Wfo5zsqwkxruxwA.UmVkbW9uZCBXQSA5ODA1Mg.VwHERHPvCNcHHpTjkoigx3_ExK0Qc71RMEParpatm0X_qpg-w8kozSjfNIPPXiTBBLXR65CIPkFqz4l1Ae9w_uowKiwyi9acgVztAi-pSL8GQSXnaamh9kX1mdh3M_TT-FZGQFQsFhu0Z72gJKGdfGE-OE7hS1zuBD5oEUfk0Dmb0VzWEzpxxiSSBbBAzP10l56pPfAtrjEYw-7ygeMkwBl6Z_mLS6w6xUgKlvW6ULmkV-uLC4FUiyKECK4e3WZYKw1bpgIqGYsw2v_grHjszJZ-_I5uM-9RA8ycX9KqPRp9gc6pXmoU_-27ATs9XCvrZXUtK2902AUzqpeEUJYjWWxSNsS-r1TJ1I-FMJ4XyAiGrfmo9hQPcNBYxPz3GQb28Y5CLSQfNgKSGt0A4isp1hBUXBHAndgtcslt7ZoQJaKe_nNJgNliWtWpJ_ebuOpEl8jdhehdccnRMIwAmU1n7SPkmhIl1HlSOpvcvDfhUN5wuqU955vOBvfkBOh5A11UzBuo2WlgZ6hYi9-e3w29bR0C2-pp3jbqxEDw3iWaf2dc5b-LnR0FEYXvI_tYk5rd_J9N0mg0tQ6RbpxNEMNoA9QWk5lgdPvbh9BaO195abQ.AVO9iT5AV4CzvDJCdhSFlQ] -14:20:59.453 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidKeyException: Key cannot be null): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.cC4hiUPoj9Eetdgtv3hF80EGrhuB__dzERat0XF9g2VtQgr9PJbu3XOiZj5RZmh7AAuHIm4Bh-0Qc_lF5YKt_O8W2Fp5jujGbds9uJdbF9CUAr7t1dnZcAcQjbKBYNX4BAynRFdiuB--f_nZLgrnbyTyWzO75vRK5h6xBArLIARNPvkSjtQBMHlb1L07Qe7K0GarZRmB_eSN9383LcOLn6_dO--xi12jzDwusC-eOkHWEsqtFZESc6BfI7noOPqvhJ1phCnvWh6IeYI2w9QOYEUipUTI8np6LbgGY9Fs98rqVt5AXLIhWkWywlVmtVrBp0igcN_IoypGlUPQGe77Rw] -14:20:59.453 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.g_hEwksO1Ax8Qn7HoN-BVeBoa8FXe0kpyk_XdcSmxvcM5_P296JXXtoHISr_DD_MqewaQSH4dZOQHoUgKLeFly-9RI11TG-_Ge1bZFazBPwKC5lJ6OLANLMd0QSL4fYEb9ERe-epKYE3xb2jfY1AltHqBO-PM6j23Guj2yDKnFv6WO72tteVzm_2n17SBFvhDuR9a2nHTE67pe0XGBUS_TK7ecA-iVq5COeVdJR4U4VZGGlxRGPLRHvolVLEHx6DYyLpw30Ay9R6d68YCLi9FYTq3hIXPK_-dmPlOUlKvPr1GgJzRoeC9G5qCvdcHWsqJGTO_z3Wfo5zsqwkxruxwA.UmVkbW9uZCBXQSA5ODA1Mg.VwHERHPvCNcHHpTjkoigx3_ExK0Qc71RMEParpatm0X_qpg-w8kozSjfNIPPXiTBBLXR65CIPkFqz4l1Ae9w_uowKiwyi9acgVztAi-pSL8GQSXnaamh9kX1mdh3M_TT-FZGQFQsFhu0Z72gJKGdfGE-OE7hS1zuBD5oEUfk0Dmb0VzWEzpxxiSSBbBAzP10l56pPfAtrjEYw-7ygeMkwBl6Z_mLS6w6xUgKlvW6ULmkV-uLC4FUiyKECK4e3WZYKw1bpgIqGYsw2v_grHjszJZ-_I5uM-9RA8ycX9KqPRp9gc6pXmoU_-27ATs9XCvrZXUtK2902AUzqpeEUJYjWWxSNsS-r1TJ1I-FMJ4XyAiGrfmo9hQPcNBYxPz3GQb28Y5CLSQfNgKSGt0A4isp1hBUXBHAndgtcslt7ZoQJaKe_nNJgNliWtWpJ_ebuOpEl8jdhehdccnRMIwAmU1n7SPkmhIl1HlSOpvcvDfhUN5wuqU955vOBvfkBOh5A11UzBuo2WlgZ6hYi9-e3w29bR0C2-pp3jbqxEDw3iWaf2dc5b-LnR0FEYXvI_tYk5rd_J9N0mg0tQ6RbpxNEMNoA9QWk5lgdPvbh9BaO195abQ.AVO9iT5AV4CzvDJCdhSFlQ] -14:20:59.454 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.cC4hiUPoj9Eetdgtv3hF80EGrhuB__dzERat0XF9g2VtQgr9PJbu3XOiZj5RZmh7AAuHIm4Bh-0Qc_lF5YKt_O8W2Fp5jujGbds9uJdbF9CUAr7t1dnZcAcQjbKBYNX4BAynRFdiuB--f_nZLgrnbyTyWzO75vRK5h6xBArLIARNPvkSjtQBMHlb1L07Qe7K0GarZRmB_eSN9383LcOLn6_dO--xi12jzDwusC-eOkHWEsqtFZESc6BfI7noOPqvhJ1phCnvWh6IeYI2w9QOYEUipUTI8np6LbgGY9Fs98rqVt5AXLIhWkWywlVmtVrBp0igcN_IoypGlUPQGe77Rw] -14:20:59.454 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JWT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"129ffs904","iss":"I?m sorry, this is our family?s first kidnapping.","aud":"ap.io/","exp":1702498218}] -14:20:59.454 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"jwt"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"1234","iss":"abcd","aud":"https://example.com/as","iat":1702497918,"exp":1702498218}] -14:20:59.455 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JWT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"0","iss":"ctyortyp","aud":"audiencia","exp":1702498218}] -14:20:59.455 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JWT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"2","iss":"ctyortyp","aud":"to.whom.it.may.concern","exp":1702499888}] -14:20:59.455 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JwT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"42","iss":"ctyortyp","aud":"to.whom.it.may.concern...","exp":1702599888}] -JWT Claims Set:{exp=1768832759, sub=subject, iss=issuer} -14:20:59.456 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[2] No Expiration Time (exp) claim present.] -14:20:59.457 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[3] No Issued At (iat) claim present.] -14:20:59.457 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[4] No Not Before (nbf) claim present.] -14:20:59.457 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value.] -14:20:59.457 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value.] -14:20:59.458 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value (even when providing 1 seconds of leeway to account for clock skew).] -14:20:59.458 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value (even when providing 2 seconds of leeway to account for clock skew).] -14:20:59.459 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602065 -> May 2, 2015, 9:27:45?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value.] -14:20:59.459 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602065 -> May 2, 2015, 9:27:45?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value (even when providing 60 seconds of leeway to account for clock skew).] -14:20:59.459 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[6] The JWT is not yet valid as the evaluation time NumericDate{1430601999 -> May 2, 2015, 9:26:39?PM GMT} is before the Not Before (nbf=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim time.] -14:20:59.460 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430603000, "iat":1430602060, "exp":1430602600 }) rejected due to invalid claims or other invalid content. Additional details: [[17] The Expiration Time (exp=NumericDate{1430602600 -> May 2, 2015, 9:36:40?PM GMT}) claim value cannot be before the Not Before (nbf=NumericDate{1430603000 -> May 2, 2015, 9:43:20?PM GMT}) claim value.] -14:20:59.460 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430602000, "iat":1430602660, "exp":1430602600 }) rejected due to invalid claims or other invalid content. Additional details: [[17] The Expiration Time (exp=NumericDate{1430602600 -> May 2, 2015, 9:36:40?PM GMT}) claim value cannot be before the Issued At (iat=NumericDate{1430602660 -> May 2, 2015, 9:37:40?PM GMT}) claim value.] -14:20:59.460 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430607201}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{1430607201 -> May 2, 2015, 10:53:21?PM GMT}) claim value cannot be more than 90 minutes in the future relative to the evaluation time NumericDate{1430600000 -> May 2, 2015, 8:53:20?PM GMT}.] -14:20:59.461 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430607201}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{1430607201 -> May 2, 2015, 10:53:21?PM GMT}) claim value cannot be more than 120 minutes in the future relative to the evaluation time NumericDate{1430600000 -> May 2, 2015, 8:53:20?PM GMT}.] -14:20:59.462 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: This VerificationKeyResolver always throws this exception.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJzdWIiOiJtZSIsImV4cCI6MTc2ODgzMjc1OSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.] -14:20:59.462 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJzdWIiOiJtZSIsImV4cCI6MTc2ODgzMjc1OSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.] -14:20:59.475 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Can't do it!): JsonWebSignature{"typ":"JWT", +14:26:32.184 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322039,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{1571322039 -> Oct 17, 2019, 2:20:39?PM GMT} is more than 60 second(s) in the past.] +14:26:32.187 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1570321001,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{1570321001 -> Oct 6, 2019, 12:16:41?AM GMT} is more than 60 second(s) in the past.] +14:26:32.213 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":12345,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{12345 -> Jan 1, 1970, 3:25:45?AM GMT} is more than 60 second(s) in the past.] +14:26:32.236 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":0,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{0 -> Jan 1, 1970, 12:00:00?AM GMT} is more than 60 second(s) in the past.] +14:26:32.239 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-938763,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{-938763 -> Dec 21, 1969, 3:13:57?AM GMT} is more than 60 second(s) in the past.] +14:26:32.262 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-2147483736,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{-2147483736 -> Dec 13, 1901, 8:44:24?PM GMT} is more than 60 second(s) in the past.] +14:26:32.288 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322101,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322101 -> Oct 17, 2019, 2:21:41?PM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] +14:26:32.291 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322177,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322177 -> Oct 17, 2019, 2:22:57?PM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] +14:26:32.314 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":2147483647,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{2147483647 -> Jan 19, 2038, 3:14:07?AM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] +14:26:32.336 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":7700000007,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{7700000007 -> Jan 2, 2214, 8:53:27?AM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] +14:26:32.367 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571321979,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{1571321979 -> Oct 17, 2019, 2:19:39?PM GMT} is more than 120 second(s) in the past.] +14:26:32.406 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322111,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322111 -> Oct 17, 2019, 2:21:51?PM GMT} is more than 10 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] +14:26:32.435 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"issuer.example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (issuer.example.com) doesn't match expected value of nope.example.com] +14:26:32.435 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] +14:26:32.435 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":["issuer1", "other.one", "meh"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'iss' claim is not the expected type ([issuer1, other.one, meh] - Cannot cast java.util.ArrayList to java.lang.String)] +14:26:32.435 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":["issuer1", "nope.not"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'iss' claim is not the expected type ([issuer1, nope.not] - Cannot cast java.util.ArrayList to java.lang.String)] +14:26:32.435 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https://accounts.google.com"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (https://accounts.google.com) doesn't match expected value of one of [nope.google.com, https://fake.google.com]] +14:26:32.435 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"x"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (x) doesn't match expected value of one of [a, b, c, d, e]] +14:26:32.435 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] +14:26:32.435 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] +14:26:32.435 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] +14:26:32.435 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] +14:26:32.460 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] +14:26:32.460 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] +14:26:32.460 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] +14:26:32.460 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] +14:26:32.461 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: JWS Plaintext (alg=none) must not use a key.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] +14:26:32.461 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: JWS Plaintext (alg=none) must not use a key.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] +14:26:32.461 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] +14:26:32.461 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] +14:26:35.146 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiM2c1LXVtbmxBMUVEQlVaZHBZQXZVRjgtT0g2b2ZhNW8xa3o5Ri01Y0x5SSIsInkiOiJfU2lhTE5XRlg1SXJQcFpCTFI2eTBza3p5ek9DbkFpNjhQZUw1T3FlcWVvIiwiY3J2IjoiUC0yNTYifX0.ED-dK--aEh3CksydrdoJDIL-v0let7KoK2sk1ClUB0zNjgK4dKGE6w.l3BXFJjPV4qhBsGLRGrkGA.An_hBDW_WJsjji8m3epA7cAlc19mCefW4Ah0GNw_pS0F2tzPcB-cB1_mxipwJOKLD4PAswwG2N_Gb-xY3XQKtQ.pPgnK_ycmWNZMpZ01PZ4MA Additional details: [[20] Missing Integrity Protection] +14:26:35.162 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImtpZCI6ImVjMiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJuRldtd0Zld2xWNWZVRGZRbWFpNHBfbk5JLXVJYW43TkZtbEZmSThyS0tzIiwieSI6Imx6aE1BZXc0ajNPZUZVM0Q4alZnWGJSNnJZMk1VQTc5WEJBY2ZUXzBHS2siLCJjcnYiOiJQLTI1NiJ9fQ..ZzGbsXIUNWmvJ4MPrU2qBQ.urfQwD92-Ck2-qLRnZM9pMCPlaka_yb0eRGzTVs-H9sTstw3HlQJ2zO1ws-ZMFep3oe4HSpOUfaSuz-Jk2fEUg.CKnSv34XSJZsNS6-xO-aiA Additional details: [[20] Missing Integrity Protection] +14:26:35.179 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiMFJzZ2xLSW1rS0hhYXROLVFuRHBjRllHWEwwbmpEcGVhY1dwako1c25TTSIsInkiOiJtVGY5SlZwU0dSdm9IUnFic1A5ZVFyeDlobGxzWW01R2VUUkUtWFFOUkFnIiwiY3J2IjoiUC0yNTYifX0.F_pbEcHDLO5nGyVbpOqH_nqvMn9ONf37l9wWV-qYaSbPnnS6Ycmpd_tgMGRPmHK_OlqNH9u7jkM2APO5s-oRrBUyDvpXZBn6.7rgGHtCG4E9Mgrly82noYQ.3IznaJe_lyQg1JjWNb2mUm7k3zt_V6h7jeQ53zfMcYiMJJBwNqws_AvWhKg_Z_tHeSE9cztcMmPAKvy5x2lwWQ.eCccGnNPn4x2t2Jqt8CASzHyx3wSGsSLrVQrQCKO_Bg Additional details: [[20] Missing Integrity Protection] +14:26:35.213 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoibjlJdVVhN3diUWdVcXZscDR4d2tqYnhydnNWTHhsYWEtWFI5endWLWdtRSIsInkiOiJMZzRTRWlXdnR3VWZ3SW1VYVFidXNCcXRZOVNnRmhtZHlZR1QzRk1QeFdjIiwiY3J2IjoiUC0yNTYifX0.RUNMuwhUwRf-VAaZNtOL47ulRL6s-nxLllw5fLGScb66LOB_BoM6h-BwdQVw4rFtWaJfIClbH1Q.VgvaD8ZBG8jm2ivWi92Q1A.KFon1gz9cAjI1UM5rbOSS5jza-szjCr8_EYCrizdodtu5KkmDcmFKFbN-kSJ02TNFEeYdVcOJTNT0YOqz6R6fw.4K8XhRY0GZSd4NJafTiH2ux-3nrQgPcl Additional details: [[20] Missing Integrity Protection] +14:26:35.235 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJyMi1iIn0.YX-zgPBtizp6DTjjDQKozodLa2ZdVT5kHykQ5KrzqylwVtukaZvmiPdiVp8mFW8vZUb13oLzbBiIep9QaaEz56hJXGzZE-B_me8UpbchoDaxkM-1pvU9XUumTP8u3F_N4h2Ln1FpX-uKt7BZ4-GmQa6zfpa7LPYx5CP92FGHecqQTDeTZ532Zgfw9853BQDp7mxIbROiS3k9s7kl7LVXKQUAJRsdMykd1-QSo0Dmi0QmuD2f5pn3TkQPiOYcXRMqD4r7yfMdS978jJoF7MU5H-S7Mh89BQlOlMZwb_EDuKYjhE6ALqX659yN-ERwA0VQ2tWC1HNX4vbLnAGfDbqdMA.YqoCY6Vr9uOEW5JyLfJvYA.WFH-4sdDpQO_5QoMCs8tzgX7wDV0DSi6iPEu8oeNczqHU34tyxJDQcKR3h689ZrtiYWG7KHNZabvBULY4UvMHQ.xZx-RqwgisRWDG4zx1VTFA Additional details: [[20] Missing Integrity Protection] +14:26:35.251 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJraWQiOiJyMi1iIn0.PDGMUDGsqPTzSKfSWOLF6tAIL-J2TA0ahiJozmOPR9LRugX4auUTD4wQUayIQLsrmOB4MaTcVdGJ_YSq4wnENQ4xr0JruA4gczQDgPT-0FvApKY4V5EHTjzmf3gvUU0eaqpByqPZFTeIilANaAgXOuROjO8_-hEgw9k65xALuARDQ9VjERqsobUZbycBBdiYSQwapjHlaiP8-QTZZAaStJBycuLSKYmHkJC2wDRHRff0NyJy862tJpRF2CqMlglXPFlbmrneQutVFPDintIXZnh3bKeWkLooernW5Prxrf_3797nikZX_uBMSh90_J7BhSsb5fpmCd8UFcAO22gzfw.JYZFgJ61kQcV0xkyERU-cA.YS8v-qHFoTY8e9R0ZXjsJq8pAbXg385lmkSLJkyr5eUfQvrf1IVLin-IoGSnSK10bRdV91rLP7H9PCe5W36ZjQ.5p2K4mnueYproYZWr0lMq24Q4ZKEansP Additional details: [[20] Missing Integrity Protection] +14:26:35.268 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJraWQiOiJyMi1iIn0.NobYiNfcJoATrRIu8gYVXDa6DJDndPIvGUlirFk-VMxmaVA_RbbLkEXD9qPtsrgVSVKjHI-iad39R08cA7NOiSI617vjbLiGZOicsGusbghsHaOPj6zuMDUYTPDWy_un3iej5_ooP4O2FTebp-XPmWGAF5lAwnJILrJRCJcstyaoVSIapOfpwYZkEZuHfuRU5hXSDSXgmMu9oqWk6SSq-QEMRQE5rdgcm8o3wUKbxi-Ksa3TFfkeoWnZOC5fSqdtmkuz1ReiBi7fAIm5wR011bNbeCI8oqEk9hmBd2zlKB3OyCI--tG_e90-cyakih1APjMwTDEomvrT91QPZfeJpQ.3kfQi1PyuEriHQpsV35Czw.Ql3k0gp1zb9s98AfeoDPwHxbMlrksHJBy8Ivp5WMkIpJAIQfgScp8zXdw7xJpJ5Eg4uWn38u7_0bHCSjTNso7g.TxWEy_VGCcbs1heyJlIQPNEDgPDiqattCOJzK8zIYj0 Additional details: [[20] Missing Integrity Protection] +14:26:35.276 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"HS256","kid":"r2"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec5, x=AFMCc0KtxWHoJUDqSeH0TbzSwT3vIatyBvqd7X8aATDTLsEnP7NdqNW1hDdjTCYXEV4hBhMDcF1DNYFg4WOEPNz_, y=AO7DkCj8Tms8VFP3LkBA93oJbyxyJJJSdVWb4a6FyhGEfC64-zbAOHPXjMdziicyezIV6j_q7ywkSLsLeD8NFstd, crv=P-521}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=512bits}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec2, x=ckca2__qqg8dHQlVgQuuJNzbI0GGlfMX6m3tUGhj0_Q, y=oq1--L6qjhrtbLsZZqv-0Djqt8GGWatsDhxIVFXbH6Q, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, n=lvqISE8MObrPPzstX_S4W8paqqs2Wc3ebnYx4WAdpJRGYktsr30GbJu3BiyeoKORFeSP9CX9QU1WJfGQHshTe0ZiBcWFMhsAjKvwPIi9tZHfp0UOaZZJ5sNkHeBAeV6mev4UTibFaiuRCQxfwt7TpKUwTXI2WOUa9McIcSRFEE9ePH9W3-Yp33h-3jw0mi_DS325GIV5WVptjhsVFyOrZY4D18o670GKSPAUvdMjgTAIQbZMhTOcGxFAvqBopXT90FURbCuErg19jxkjzI2P1PgtnAt-2HqiBnqJDoJNrQtfw6E4stVl2mZPCRI2fisCJ5REXz9h64bf4ENvy6UhuQ, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec3, x=-30K8bHsoJRwG8Z_2nMCveerDMzvDGRxUIGiK-UgLUOhvYHxVS_MpdU7EAeh3shP, y=qad_BEHB383Gg7cn-NGzchxleceO1qVLLzgopA_WzRWn6qrlTFTn2yqIV1QoE1fq, crv=P-384}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=128bits}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2-b, n=6SgrP6U7y0Bl5twXy61w1Mqq9m8Pp-1N41X0riTTfpeOGQQ7gOc_MLWfwuUrQ8imkIV4ih8UN5qrUxO27f0d7IhURWKU-TikDjLdgQ7h2c8uHAmHDMJYX3MiyUO-FFKSqEwEdT-ccFDvnbG-TKz7i9HNJlAykFN0zNPtoS-WPm43Hxs4FiW7OqtgRyH-QTSlBRkl662OzV7ulxYQCK-7vszqOAF-5l_TW-b1PzX4Umqox3ANleiUhtzwkGy7R8wijtAoGQ6-DmBp7uv-nIGumss5pd2Z80rtr4W2SljwxkDU81CdlLTuxCWP1zb312p_JnKjBNq66IgcC-jitipocQ, e=AQAB}]): JsonWebSignature{"alg":"HS256","kid":"r2"}->eyJhbGciOiJIUzI1NiIsImtpZCI6InIyIn0.eyJhdWQiOiJhIiwiaXNzIjoiaSIsImV4cCI6MTc2ODgzMzM5NSwic3ViIjoicyJ9.Rip5Wuma1Zi9VHvGITzv-ClWFvPqfQ46asuZz4r9Wto] +14:26:35.277 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoicjItYiJ9.N0u8p4W3Nj9DcGTGyLu6Iz7AoLrt8NV0BDTnb4tcrJ92EZdHVP3uoOuhGR5k8i7aQ2b-yLlFjr-Ys9YFw_XStkAdH3SE7jZoet_ncNhAyjZrM3_W9AjWCosExg_IsyNq5BKhvVP10RSHE8jAWUldsvcgfb_Cd9H3qJWhJ9H_DI-KRmOe6HY0Z3tAVP7Fij7qE9RZzVO_RClfjAzqCODNGeprFAKLKo-tg9IBQecreioP0SbHDCWdvYb246_BAFUAEh-Ng8Heu5uXRU3YimRHtfPgQ0s02ZnE_sHTg24hckoLQLEqsQMe3Yvqmawm4-0Ggs2Df8fb_ScVGwyEq2M_aw.xBoOoqUt5uFdAlb8jmk1iw.gLnEHkvITZUGA4uUYnJsHGg5EAfzj7xaC93XCCOWXy6zVCe3-ecxKdDTkrN9EQYbg0-0rsDLd32evvvIwV75UA.8785V9gQyhiAsVXMieuxDA] +14:26:35.297 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoicjItYiJ9.N0u8p4W3Nj9DcGTGyLu6Iz7AoLrt8NV0BDTnb4tcrJ92EZdHVP3uoOuhGR5k8i7aQ2b-yLlFjr-Ys9YFw_XStkAdH3SE7jZoet_ncNhAyjZrM3_W9AjWCosExg_IsyNq5BKhvVP10RSHE8jAWUldsvcgfb_Cd9H3qJWhJ9H_DI-KRmOe6HY0Z3tAVP7Fij7qE9RZzVO_RClfjAzqCODNGeprFAKLKo-tg9IBQecreioP0SbHDCWdvYb246_BAFUAEh-Ng8Heu5uXRU3YimRHtfPgQ0s02ZnE_sHTg24hckoLQLEqsQMe3Yvqmawm4-0Ggs2Df8fb_ScVGwyEq2M_aw.xBoOoqUt5uFdAlb8jmk1iw.gLnEHkvITZUGA4uUYnJsHGg5EAfzj7xaC93XCCOWXy6zVCe3-ecxKdDTkrN9EQYbg0-0rsDLd32evvvIwV75UA.8785V9gQyhiAsVXMieuxDA Additional details: [[20] Missing Integrity Protection] +14:26:35.317 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no encryption but the JWT Consumer is configured to require it: eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk Additional details: [[19] No encryption.] +14:26:35.317 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no encryption but the JWT Consumer is configured to require it: eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk Additional details: [[19] No encryption.] +14:26:35.317 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value.] +14:26:35.317 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] doesn't contain an acceptable identifier. Expected example.org as an aud value.] +14:26:35.317 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] doesn't contain an acceptable identifier. Expected one of [example.org, nada, nope] as an aud value.] +14:26:35.317 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[7] No Audience (aud) claim present.] +14:26:35.317 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[7] No Audience (aud) claim present.] +14:26:35.318 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", "usa.org", "ca.ca"]}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com, usa.org, ca.ca] doesn't contain an acceptable identifier. Expected example.org as an aud value.] +14:26:35.318 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", "usa.org", "ca.ca"]}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com, usa.org, ca.ca] doesn't contain an acceptable identifier. Expected one of [example.org, some.other.junk] as an aud value.] +14:26:35.318 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", 47, false]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The array value of the 'aud' claim contains non string values (47 - class java.lang.Long cannot be cast to class java.lang.String (java.lang.Long and java.lang.String are in module java.base of loader 'bootstrap'))] +14:26:35.318 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":20475}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'aud' claim is not an array of strings or a single string value.] +14:26:35.318 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":{"aud":"example.org"}}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'aud' claim is not an array of strings or a single string value.] +14:26:35.319 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.JwtConsumerTest$4: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:919); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:913); ...omitted...] +14:26:35.319 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.JwtConsumerTest$4: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:919); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:913); ...omitted...] +14:26:35.320 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"name":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[14] No Subject (sub) claim is present.] +14:26:35.320 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":724729}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'sub' claim is not the expected type (724729 - Cannot cast java.lang.Long to java.lang.String)] +14:26:35.336 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":{"values":["one", "2"]}}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'sub' claim is not the expected type ({values=[one, 2]} - Cannot cast org.jose4j.json.JsonUtil$DupeKeyDisallowingLinkedHashMap to java.lang.String)] +14:26:35.339 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits).): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJhY2MiLCJjdHkiOiJKV1QifQ.KrukndaF2sHb3Y0r311rrYmCrXco-99ZIQ3iLjvCVbbow5MppRTK4DPJUShcndfcIVIFXMYSLGvIJwf39yZRJJ_EvBFnqhOUeCAsUHLGO1yxoQ619jmSh4bCaIicLYeivKaVSQN4Ezc5fvg-Nnv6TBIIgHuWMDU2Ztd96DJRokc.wMg2Eb8izCOUnACqdrcPQA.quFKSN7xQoMJzaYFBVwykQZ8zB3hpW8HtK7pm-4Ggzorno_K-eBQ7fXjRmJ1Jw-kCcmUa8flpnQqpL9jurtlz7DC1ABe0vm2ZkHoJluB6QeSr60Y9rP7kyy_rd3blXT_7t6Wgowo8MumXrrUUxxEQJgXvCmKbd-Rw9sK5jAHEug3zztLXHOX0O0QoxDzTJOsSRtodsu7bTJa-ADvPmK9e0Xp06NRqvx7WuJGKlq3cwQ.DL6yaCdiOUcViN-eZVIwOA] +14:26:35.508 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1768832735,"sub":"s","nbf":1768832615}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1768832795 -> Jan 19, 2026, 2:26:35?PM GMT} is on or after the Expiration Time (exp=NumericDate{1768832735 -> Jan 19, 2026, 2:25:35?PM GMT}) claim value.] +14:26:35.509 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1768832735,"sub":"s"}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1768832795 -> Jan 19, 2026, 2:26:35?PM GMT} is on or after the Expiration Time (exp=NumericDate{1768832735 -> Jan 19, 2026, 2:25:35?PM GMT}) claim value.] +14:26:35.510 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1768833995,"sub":"s","nbf":1768833035}) rejected due to invalid claims or other invalid content. Additional details: [[6] The JWT is not yet valid as the evaluation time NumericDate{1768832795 -> Jan 19, 2026, 2:26:35?PM GMT} is before the Not Before (nbf=NumericDate{1768833035 -> Jan 19, 2026, 2:30:35?PM GMT}) claim time.] +14:26:35.510 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 128 bits): JsonWebSignature{"kid":"esc","alg":"HS256"}->eyJraWQiOiJlc2MiLCJhbGciOiJIUzI1NiJ9.eyJhdWQiOiJhIiwiaXNzIjoiaSIsImV4cCI6MTQzMjMyNTQ5Niwic3ViIjoicyIsIm5iZiI6MTQzMjMyNDgzNn0.16LpzAZyBcokZ4aUaXHn5yN0xQ1zpmLyJVFHu6nH1zY] +14:26:35.533 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] 9223372036854775808 is unreasonable for a NumericDate] +14:26:35.552 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":25113002000004770000,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] 25113002000004770000 is unreasonable for a NumericDate] +14:26:35.554 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775809,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] -9223372036854775809 is unreasonable for a NumericDate] +14:26:35.584 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-77261600013501300000000,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] -77261600013501300000000 is unreasonable for a NumericDate] +14:26:35.587 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{9223372036854775807} is more than 2147483647 second(s) ahead of now NumericDate{9223372036854775 -> Aug 17, 292278994, 7:12:55?AM GMT}.] +14:26:35.619 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775 = 9214148664817921033 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] +14:26:35.647 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775807 = 1 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] +14:26:35.675 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775807 = 1 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] +14:26:35.702 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{9223372036854775807} is more than 10 second(s) ahead of now NumericDate{0 -> Jan 1, 1970, 12:00:00?AM GMT} (even when providing 2147483647 seconds of leeway to account for clock skew).] +14:26:35.732 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 2147483647 = 9223372034707292161 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] +14:26:35.875 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[-76717] You can go blind issuing tokens to yourself...] +14:26:35.875 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[-76717] You can go blind issuing tokens to yourself...] +14:26:35.964 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1768832735,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1768832795 -> Jan 19, 2026, 2:26:35?PM GMT} is on or after the Expiration Time (exp=NumericDate{1768832735 -> Jan 19, 2026, 2:25:35?PM GMT}) claim value.] +14:26:35.967 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[15] Subject (sub) claim value (d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea) doesn't match expected value of NOOOOOOOOOOOOOOOOPE] +14:26:35.987 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [R-RufjSDVGCGfdTmIobf2Q] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value.] +14:26:35.988 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [R-RufjSDVGCGfdTmIobf2Q] doesn't contain an acceptable identifier. Expected one of [no, nope, no way jose] as an aud value.] +14:26:35.989 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject", "iss":"issuer", "aud":"audience"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [audience] doesn't contain an acceptable identifier. Expected nope as an aud value., [12] Issuer (iss) claim value (issuer) doesn't match expected value of no way, [13] The JWT ID (jti) claim is not present.] +14:26:36.007 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1768833395,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [AUD] doesn't contain an acceptable identifier. Expected nope as an aud value.] +14:26:36.007 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1768833395,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (ISS) doesn't match expected value of no way] +14:26:36.009 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1768833395,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [AUD] doesn't contain an acceptable identifier. Expected nope as an aud value., [12] Issuer (iss) claim value (ISS) doesn't match expected value of no way, [5] The Expiration Time (exp=NumericDate{1768833395 -> Jan 19, 2026, 2:36:35?PM GMT}) claim value cannot be more than 5 minutes in the future relative to the evaluation time NumericDate{1768832796 -> Jan 19, 2026, 2:26:36?PM GMT}.] +14:26:36.009 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJleHAiOjE3Njg4MzMzOTUsImlzcyI6IklTUyIsImF1ZCI6IkFVRCIsInN1YiI6IlNVQiJ9.NGns23fwIfHwxj0tDsFcFuzrlZYopHMWm5gaUzZyNdAwfLU3n_idriThNBjcA2Y68-3cw6IJs9sGmPlNVmXOtEG5n5DrjjmMLCpoeBvLmKW_sCPM35Dx62ZCoi4_QlfZvOVoSfzR9i7_9QwAmpRiPYBFLC3SVH2exH3Cr3FKIKqADeOf3yo86w22JaftSRcpA0I1wVOGvCvrw2EfO1nFuhl5g7Wp1Jl1aRnmYPo9v656Dq_zfmdNY8W9yGeuNXnpPTx4gXeQ2GbXS95vBzansM769TPtNaEC_kaQxzYMdPmc1MkAwqFcw6RQ6Qfv4JUwKs19XGwAuWLN8vT6djTODw] +14:26:36.025 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.NaovETHHc9F539HbpRI-IUABN2kAH4wfwawJHev8BomzepR01xID9U1UapX3yG0reu13nEvEZBkVJb0kLz7fcbkNbA5LBwgM8NNIXmRv9DuzXmz_riSJeD-Y0wBO_VobbUWIJ2o9IpwdWUHqHVoL5FbPmL8x4uTS07a5RDFu8-RuEnZk_9CezQT_gYMo_zVdLUsClab-GnEN632nC2kvSj27alj36vKxo_LslN1yN40kHoOVedIpLhZ1pKskrOXQnOGNaIch8iw8bZq4zW58AP-1rgEQ1g6Xessfu2rN8rDfe9EXmK2v9T63mOxKm4sIgCIi_3m8NOkSJmQqkjvdsA.E3m14x0lnbsv8gsvrI_wlw.mqwcI9pOtSmXOxtBmudzHdeDfHh9xXgYMlxgquUwtInzsN91tw3XEOJwlssJOoMwQQPIkYtmX-GYcrpkDEjG1Q.MaDJ9fXjUjoEUmkKF9o8vg Additional details: [[10] Missing signature.] +14:26:36.026 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[17] You can go blind issuing tokens to yourself...] +14:26:36.026 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[17] You can go blind issuing tokens to yourself...] +14:26:36.032 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":-1239223372036854775808,"iat":1571322100,"exp":9223372036854775807,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] -1239223372036854775808 is unreasonable for a NumericDate] +14:26:36.034 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":1571322100,"iat":12345678900000000000,"exp":12345678900000000009,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] 12345678900000000009 is unreasonable for a NumericDate] +14:26:36.037 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":1571322100,"iat":1571322111,"exp":157132210009188371766311111,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] 157132210009188371766311111 is unreasonable for a NumericDate] +14:26:36.039 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{9223372036854775807}) claim value cannot be more than 2147483647 minutes in the future relative to the evaluation time NumericDate{9223371903710789693} (even when providing 2147483647 seconds of leeway to account for clock skew).] +14:26:36.043 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":-1,"exp":9223372036854775802,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow adding: 9223372036854775792 + 30 = -9223372036854775794 at org.jose4j.lang.Maths.add(Maths.java:13); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:143); ...omitted...] +14:26:36.045 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1572322100,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854774808 - 6000 = 9223372036854770808 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:113); ...omitted...] +14:26:36.047 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":-9223372036854775798,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775798 - 65 = 9223372036854775753 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:131); ...omitted...] +14:26:36.052 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: 9223372036854775807 - -10 = -9223372036854775799 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:131); ...omitted...] +14:26:36.052 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=QsGX3JhHP1Pwy4zQ8Ha9FQ): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..zWNzKpA-QA0BboVl02nz-A.eyJpc3MiOiJtZSIsImF1ZCI6Im1lIiwiZXhwIjoxNDIwMjMxNjA2LCJuYW1lIjoidmFsdWUifQ.QsGX3JhHP1Pwy4zQ8Ha9FQ] +14:26:36.053 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=QsGX3JhHP1Pwy4zQ8Ha9FQ): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..zWNzKpA-QA0BboVl02nz-A.u1D7JCpDFeRl69G1L-h3IRrmcOXiWLnhr23ugO2kkDqKVNcO1YQ4Xvl9Sag4aYOnkqUbqe6Wdz8KK3d9q178tA.QsGX3JhHP1Pwy4zQ8Ha9FQ] +14:26:36.063 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.g_hEwksO1Ax8Qn7HoN-BVeBoa8FXe0kpyk_XdcSmxvcM5_P296JXXtoHISr_DD_MqewaQSH4dZOQHoUgKLeFly-9RI11TG-_Ge1bZFazBPwKC5lJ6OLANLMd0QSL4fYEb9ERe-epKYE3xb2jfY1AltHqBO-PM6j23Guj2yDKnFv6WO72tteVzm_2n17SBFvhDuR9a2nHTE67pe0XGBUS_TK7ecA-iVq5COeVdJR4U4VZGGlxRGPLRHvolVLEHx6DYyLpw30Ay9R6d68YCLi9FYTq3hIXPK_-dmPlOUlKvPr1GgJzRoeC9G5qCvdcHWsqJGTO_z3Wfo5zsqwkxruxwA.UmVkbW9uZCBXQSA5ODA1Mg.VwHERHPvCNcHHpTjkoigx3_ExK0Qc71RMEParpatm0X_qpg-w8kozSjfNIPPXiTBBLXR65CIPkFqz4l1Ae9w_uowKiwyi9acgVztAi-pSL8GQSXnaamh9kX1mdh3M_TT-FZGQFQsFhu0Z72gJKGdfGE-OE7hS1zuBD5oEUfk0Dmb0VzWEzpxxiSSBbBAzP10l56pPfAtrjEYw-7ygeMkwBl6Z_mLS6w6xUgKlvW6ULmkV-uLC4FUiyKECK4e3WZYKw1bpgIqGYsw2v_grHjszJZ-_I5uM-9RA8ycX9KqPRp9gc6pXmoU_-27ATs9XCvrZXUtK2902AUzqpeEUJYjWWxSNsS-r1TJ1I-FMJ4XyAiGrfmo9hQPcNBYxPz3GQb28Y5CLSQfNgKSGt0A4isp1hBUXBHAndgtcslt7ZoQJaKe_nNJgNliWtWpJ_ebuOpEl8jdhehdccnRMIwAmU1n7SPkmhIl1HlSOpvcvDfhUN5wuqU955vOBvfkBOh5A11UzBuo2WlgZ6hYi9-e3w29bR0C2-pp3jbqxEDw3iWaf2dc5b-LnR0FEYXvI_tYk5rd_J9N0mg0tQ6RbpxNEMNoA9QWk5lgdPvbh9BaO195abQ.AVO9iT5AV4CzvDJCdhSFlQ] +14:26:36.063 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.g_hEwksO1Ax8Qn7HoN-BVeBoa8FXe0kpyk_XdcSmxvcM5_P296JXXtoHISr_DD_MqewaQSH4dZOQHoUgKLeFly-9RI11TG-_Ge1bZFazBPwKC5lJ6OLANLMd0QSL4fYEb9ERe-epKYE3xb2jfY1AltHqBO-PM6j23Guj2yDKnFv6WO72tteVzm_2n17SBFvhDuR9a2nHTE67pe0XGBUS_TK7ecA-iVq5COeVdJR4U4VZGGlxRGPLRHvolVLEHx6DYyLpw30Ay9R6d68YCLi9FYTq3hIXPK_-dmPlOUlKvPr1GgJzRoeC9G5qCvdcHWsqJGTO_z3Wfo5zsqwkxruxwA.UmVkbW9uZCBXQSA5ODA1Mg.VwHERHPvCNcHHpTjkoigx3_ExK0Qc71RMEParpatm0X_qpg-w8kozSjfNIPPXiTBBLXR65CIPkFqz4l1Ae9w_uowKiwyi9acgVztAi-pSL8GQSXnaamh9kX1mdh3M_TT-FZGQFQsFhu0Z72gJKGdfGE-OE7hS1zuBD5oEUfk0Dmb0VzWEzpxxiSSBbBAzP10l56pPfAtrjEYw-7ygeMkwBl6Z_mLS6w6xUgKlvW6ULmkV-uLC4FUiyKECK4e3WZYKw1bpgIqGYsw2v_grHjszJZ-_I5uM-9RA8ycX9KqPRp9gc6pXmoU_-27ATs9XCvrZXUtK2902AUzqpeEUJYjWWxSNsS-r1TJ1I-FMJ4XyAiGrfmo9hQPcNBYxPz3GQb28Y5CLSQfNgKSGt0A4isp1hBUXBHAndgtcslt7ZoQJaKe_nNJgNliWtWpJ_ebuOpEl8jdhehdccnRMIwAmU1n7SPkmhIl1HlSOpvcvDfhUN5wuqU955vOBvfkBOh5A11UzBuo2WlgZ6hYi9-e3w29bR0C2-pp3jbqxEDw3iWaf2dc5b-LnR0FEYXvI_tYk5rd_J9N0mg0tQ6RbpxNEMNoA9QWk5lgdPvbh9BaO195abQ.AVO9iT5AV4CzvDJCdhSFlQ] +14:26:36.063 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidKeyException: Key cannot be null): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.cC4hiUPoj9Eetdgtv3hF80EGrhuB__dzERat0XF9g2VtQgr9PJbu3XOiZj5RZmh7AAuHIm4Bh-0Qc_lF5YKt_O8W2Fp5jujGbds9uJdbF9CUAr7t1dnZcAcQjbKBYNX4BAynRFdiuB--f_nZLgrnbyTyWzO75vRK5h6xBArLIARNPvkSjtQBMHlb1L07Qe7K0GarZRmB_eSN9383LcOLn6_dO--xi12jzDwusC-eOkHWEsqtFZESc6BfI7noOPqvhJ1phCnvWh6IeYI2w9QOYEUipUTI8np6LbgGY9Fs98rqVt5AXLIhWkWywlVmtVrBp0igcN_IoypGlUPQGe77Rw] +14:26:36.063 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.g_hEwksO1Ax8Qn7HoN-BVeBoa8FXe0kpyk_XdcSmxvcM5_P296JXXtoHISr_DD_MqewaQSH4dZOQHoUgKLeFly-9RI11TG-_Ge1bZFazBPwKC5lJ6OLANLMd0QSL4fYEb9ERe-epKYE3xb2jfY1AltHqBO-PM6j23Guj2yDKnFv6WO72tteVzm_2n17SBFvhDuR9a2nHTE67pe0XGBUS_TK7ecA-iVq5COeVdJR4U4VZGGlxRGPLRHvolVLEHx6DYyLpw30Ay9R6d68YCLi9FYTq3hIXPK_-dmPlOUlKvPr1GgJzRoeC9G5qCvdcHWsqJGTO_z3Wfo5zsqwkxruxwA.UmVkbW9uZCBXQSA5ODA1Mg.VwHERHPvCNcHHpTjkoigx3_ExK0Qc71RMEParpatm0X_qpg-w8kozSjfNIPPXiTBBLXR65CIPkFqz4l1Ae9w_uowKiwyi9acgVztAi-pSL8GQSXnaamh9kX1mdh3M_TT-FZGQFQsFhu0Z72gJKGdfGE-OE7hS1zuBD5oEUfk0Dmb0VzWEzpxxiSSBbBAzP10l56pPfAtrjEYw-7ygeMkwBl6Z_mLS6w6xUgKlvW6ULmkV-uLC4FUiyKECK4e3WZYKw1bpgIqGYsw2v_grHjszJZ-_I5uM-9RA8ycX9KqPRp9gc6pXmoU_-27ATs9XCvrZXUtK2902AUzqpeEUJYjWWxSNsS-r1TJ1I-FMJ4XyAiGrfmo9hQPcNBYxPz3GQb28Y5CLSQfNgKSGt0A4isp1hBUXBHAndgtcslt7ZoQJaKe_nNJgNliWtWpJ_ebuOpEl8jdhehdccnRMIwAmU1n7SPkmhIl1HlSOpvcvDfhUN5wuqU955vOBvfkBOh5A11UzBuo2WlgZ6hYi9-e3w29bR0C2-pp3jbqxEDw3iWaf2dc5b-LnR0FEYXvI_tYk5rd_J9N0mg0tQ6RbpxNEMNoA9QWk5lgdPvbh9BaO195abQ.AVO9iT5AV4CzvDJCdhSFlQ] +14:26:36.064 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.cC4hiUPoj9Eetdgtv3hF80EGrhuB__dzERat0XF9g2VtQgr9PJbu3XOiZj5RZmh7AAuHIm4Bh-0Qc_lF5YKt_O8W2Fp5jujGbds9uJdbF9CUAr7t1dnZcAcQjbKBYNX4BAynRFdiuB--f_nZLgrnbyTyWzO75vRK5h6xBArLIARNPvkSjtQBMHlb1L07Qe7K0GarZRmB_eSN9383LcOLn6_dO--xi12jzDwusC-eOkHWEsqtFZESc6BfI7noOPqvhJ1phCnvWh6IeYI2w9QOYEUipUTI8np6LbgGY9Fs98rqVt5AXLIhWkWywlVmtVrBp0igcN_IoypGlUPQGe77Rw] +14:26:36.065 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JWT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"129ffs904","iss":"I?m sorry, this is our family?s first kidnapping.","aud":"ap.io/","exp":1702498218}] +14:26:36.066 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"jwt"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"1234","iss":"abcd","aud":"https://example.com/as","iat":1702497918,"exp":1702498218}] +14:26:36.066 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JWT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"0","iss":"ctyortyp","aud":"audiencia","exp":1702498218}] +14:26:36.066 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JWT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"2","iss":"ctyortyp","aud":"to.whom.it.may.concern","exp":1702499888}] +14:26:36.066 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JwT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"42","iss":"ctyortyp","aud":"to.whom.it.may.concern...","exp":1702599888}] +JWT Claims Set:{exp=1768833096, sub=subject, iss=issuer} +14:26:36.067 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[2] No Expiration Time (exp) claim present.] +14:26:36.067 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[3] No Issued At (iat) claim present.] +14:26:36.067 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[4] No Not Before (nbf) claim present.] +14:26:36.071 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value.] +14:26:36.071 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value.] +14:26:36.071 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value (even when providing 1 seconds of leeway to account for clock skew).] +14:26:36.071 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value (even when providing 2 seconds of leeway to account for clock skew).] +14:26:36.072 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602065 -> May 2, 2015, 9:27:45?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value.] +14:26:36.072 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602065 -> May 2, 2015, 9:27:45?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value (even when providing 60 seconds of leeway to account for clock skew).] +14:26:36.072 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[6] The JWT is not yet valid as the evaluation time NumericDate{1430601999 -> May 2, 2015, 9:26:39?PM GMT} is before the Not Before (nbf=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim time.] +14:26:36.073 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430603000, "iat":1430602060, "exp":1430602600 }) rejected due to invalid claims or other invalid content. Additional details: [[17] The Expiration Time (exp=NumericDate{1430602600 -> May 2, 2015, 9:36:40?PM GMT}) claim value cannot be before the Not Before (nbf=NumericDate{1430603000 -> May 2, 2015, 9:43:20?PM GMT}) claim value.] +14:26:36.073 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430602000, "iat":1430602660, "exp":1430602600 }) rejected due to invalid claims or other invalid content. Additional details: [[17] The Expiration Time (exp=NumericDate{1430602600 -> May 2, 2015, 9:36:40?PM GMT}) claim value cannot be before the Issued At (iat=NumericDate{1430602660 -> May 2, 2015, 9:37:40?PM GMT}) claim value.] +14:26:36.073 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430607201}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{1430607201 -> May 2, 2015, 10:53:21?PM GMT}) claim value cannot be more than 90 minutes in the future relative to the evaluation time NumericDate{1430600000 -> May 2, 2015, 8:53:20?PM GMT}.] +14:26:36.074 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430607201}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{1430607201 -> May 2, 2015, 10:53:21?PM GMT}) claim value cannot be more than 120 minutes in the future relative to the evaluation time NumericDate{1430600000 -> May 2, 2015, 8:53:20?PM GMT}.] +14:26:36.075 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: This VerificationKeyResolver always throws this exception.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJzdWIiOiJtZSIsImV4cCI6MTc2ODgzMzA5NiwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.] +14:26:36.075 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJzdWIiOiJtZSIsImV4cCI6MTc2ODgzMzA5NiwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.] +14:26:36.094 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Can't do it!): JsonWebSignature{"typ":"JWT", "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -14:20:59.475 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Can't do it!): JsonWebSignature{"typ":"JWT", +14:26:36.094 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Can't do it!): JsonWebSignature{"typ":"JWT", "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -14:20:59.475 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unexpected exception encountered while processing JOSE object (java.lang.IllegalArgumentException: Stuff happens...): JsonWebSignature{"typ":"JWT", +14:26:36.095 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unexpected exception encountered while processing JOSE object (java.lang.IllegalArgumentException: Stuff happens...): JsonWebSignature{"typ":"JWT", "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -14:20:59.475 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unexpected exception encountered while processing JOSE object (java.lang.IllegalArgumentException: Stuff happens...): JsonWebSignature{"typ":"JWT", +14:26:36.095 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unexpected exception encountered while processing JOSE object (java.lang.IllegalArgumentException: Stuff happens...): JsonWebSignature{"typ":"JWT", "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -14:20:59.477 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:862); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:856); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...] -14:20:59.477 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:862); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:856); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...] -14:20:59.482 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[10] Missing signature.] -14:20:59.482 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[10] Missing signature.] -14:20:59.487 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[20] Missing Integrity Protection] -14:20:59.487 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[20] Missing Integrity Protection] -14:20:59.498 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -14:20:59.498 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -14:20:59.498 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -14:20:59.499 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -14:20:59.499 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -14:20:59.499 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -14:20:59.499 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -14:20:59.499 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -14:20:59.499 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -14:20:59.499 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -14:20:59.499 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -14:20:59.499 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -14:20:59.500 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -14:20:59.500 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -14:20:59.505 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: Unable to parse what was expected to be the JWT Claim Set JSON: "eyJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MjAyMTkwOTcsIm1lc3NhZ2UiOiJlaCJ9.ADXjpouiqbRqymN-NJ84HjU0ZZUmAajlb43Vzb6yTolFU9dTAcL6XhBAy5cwlPaS_3VT4Ce2CMpgruihmaftHA" Additional details: [[16] Invalid JSON.] -JWT Claims Set:{sub=me, aud=a, iss=i, exp=1768833059} -eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJjdHkiOiJqd3QiLCJjcml0IjpbImZha2UuYmxhaCJdfQ.Ed2zYJAxjrVwvtJdQTTGV96_ozXxGLPccyp86B8fRVikFZgDm1KseZ96UEv58zztC6h48M0gCZlteEtkjXMbeiRjFJ1i-bU8V7u8-1-b7KzE4fXZ5IOHmeiZZGhZ0h9bTu2Y7qhJDHUmuL6SllUCHFUQWADylvDqBr9AKweTk_sbk_BwQVC9nUE6aN68pzMsRHFb1k8eT2Ae9y6ouIGqysDcjpvDc83naqQprIdSg-Wu1QBnb-J3YEZXJMueB1HY6P8pUD67BxRf4HHIeHjQu7CWTDJ4hxlzN76vhufzz81keFMIyONqdDGO6bE3HBO0pt6QBqr6BHNKRbA8WXDsHA.ddpwHfSt7fDdjslUVxGsxg.yvjbctln4AmYw6Q-n1iFyjsYsb9D2Fr7GzSsbphwYg6WlyzwgwVyeOIueR7Jgpe4LyLNhjvGC4TwuEFBWvzCLh68R568UEBrprXzmlKppNU0B8bXoCI9mfDak6sDDBfzN-Q25i1pxmaxcoVsZ-HRri0b4eoa9WJZqEAdsdLneyny-EVFGm1zrsGyLoOsAWjL-LfWfSmkoCLJZxeLZYXPqcwlPCgv-HJ_OsUmwiRRnASSuBcHon4AHwUgbYkgD2WIQi3pIOrii5MbzAUQFBDqHg.32O9BQwkUvZwPdsfZrG1wA -14:20:59.512 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: Unrecognized header 'fake.blah' marked as critical.): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJjdHkiOiJqd3QiLCJjcml0IjpbImZha2UuYmxhaCJdfQ.Ed2zYJAxjrVwvtJdQTTGV96_ozXxGLPccyp86B8fRVikFZgDm1KseZ96UEv58zztC6h48M0gCZlteEtkjXMbeiRjFJ1i-bU8V7u8-1-b7KzE4fXZ5IOHmeiZZGhZ0h9bTu2Y7qhJDHUmuL6SllUCHFUQWADylvDqBr9AKweTk_sbk_BwQVC9nUE6aN68pzMsRHFb1k8eT2Ae9y6ouIGqysDcjpvDc83naqQprIdSg-Wu1QBnb-J3YEZXJMueB1HY6P8pUD67BxRf4HHIeHjQu7CWTDJ4hxlzN76vhufzz81keFMIyONqdDGO6bE3HBO0pt6QBqr6BHNKRbA8WXDsHA.ddpwHfSt7fDdjslUVxGsxg.yvjbctln4AmYw6Q-n1iFyjsYsb9D2Fr7GzSsbphwYg6WlyzwgwVyeOIueR7Jgpe4LyLNhjvGC4TwuEFBWvzCLh68R568UEBrprXzmlKppNU0B8bXoCI9mfDak6sDDBfzN-Q25i1pxmaxcoVsZ-HRri0b4eoa9WJZqEAdsdLneyny-EVFGm1zrsGyLoOsAWjL-LfWfSmkoCLJZxeLZYXPqcwlPCgv-HJ_OsUmwiRRnASSuBcHon4AHwUgbYkgD2WIQi3pIOrii5MbzAUQFBDqHg.32O9BQwkUvZwPdsfZrG1wA] -14:20:59.529 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1432327195,"sub":"s","nbf":1432326535}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [a] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value., [1] The JWT is no longer valid - the evaluation time NumericDate{1768832459 -> Jan 19, 2026, 2:20:59?PM GMT} is on or after the Expiration Time (exp=NumericDate{1432327195 -> May 22, 2015, 8:39:55?PM GMT}) claim value.] -14:20:59.529 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1432327195,"sub":"s","nbf":1432326535}) rejected due to invalid claims or other invalid content. Additional details: [[17] i isn't okay as an issuer] -14:20:59.530 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notjti":"lbZ_mLS6w3xBSlvW6ULmkV-uLCk"}) rejected due to invalid claims or other invalid content. Additional details: [[13] The JWT ID (jti) claim is not present.] -14:20:59.530 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"jti":55581529751992}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'jti' claim is not the expected type (55581529751992 - Cannot cast java.lang.Long to java.lang.String)] -14:20:59.530 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"jti":["S0w3XbslvW6ULmk0", "5iLSQfNgcSGt7A4is"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'jti' claim is not the expected type ([S0w3XbslvW6ULmk0, 5iLSQfNgcSGt7A4is] - Cannot cast java.util.ArrayList to java.lang.String)] -14:20:59.551 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1768833059,"nbf":1768832159,"jti":"tphtBxvmIDyiSrkDUeThJg"}) rejected due to invalid claims or other invalid content. Additional details: [[21] No typ header parameter present in the innermost JWS/JWE] -14:20:59.571 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1768833059,"nbf":1768832159,"jti":"tphtBxvmIDyiSrkDUeThJg"}) rejected due to invalid claims or other invalid content. Additional details: [[21] No typ header parameter present in the innermost JWS/JWE] -14:20:59.595 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1768833059,"nbf":1768832159,"jti":"tphtBxvmIDyiSrkDUeThJg"}) rejected due to invalid claims or other invalid content. Additional details: [[22] Invalid typ header parameter value 'at+jwt'. Expecting 'application/secevent+jwt' or just 'secevent+jwt'.] -14:20:59.612 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1768833059,"nbf":1768832159,"jti":"tphtBxvmIDyiSrkDUeThJg"}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.TypeValidator: java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.lang.String (java.util.ArrayList and java.lang.String are in module java.base of loader 'bootstrap') at org.jose4j.lang.JsonHelp.getString(JsonHelp.java:31); org.jose4j.jwx.Headers.getStringHeaderValue(Headers.java:78); org.jose4j.jwx.JsonWebStructure.getHeader(JsonWebStructure.java:153); org.jose4j.jwt.consumer.TypeValidator.validate(TypeValidator.java:37); ...omitted...] -14:20:59.616 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1768833059,"nbf":1768832159,"jti":"tphtBxvmIDyiSrkDUeThJg"}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.TypeValidator: java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.lang.String (java.util.ArrayList and java.lang.String are in module java.base of loader 'bootstrap') at org.jose4j.lang.JsonHelp.getString(JsonHelp.java:31); org.jose4j.jwx.Headers.getStringHeaderValue(Headers.java:78); org.jose4j.jwx.JsonWebStructure.getHeader(JsonWebStructure.java:153); org.jose4j.jwt.consumer.TypeValidator.validate(TypeValidator.java:37); ...omitted...] -14:20:59.632 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1768833059,"nbf":1768832159,"jti":"tphtBxvmIDyiSrkDUeThJg"}) rejected due to invalid claims or other invalid content. Additional details: [[22] typ header parameter value '' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: cannot have empty part] -14:20:59.636 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1768833059,"nbf":1768832159,"jti":"tphtBxvmIDyiSrkDUeThJg"}) rejected due to invalid claims or other invalid content. Additional details: [[22] typ header parameter value '' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: cannot have empty part] -[INFO] Tests run: 49, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.849 s - in org.jose4j.jwt.consumer.JwtConsumerTest +14:26:36.096 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:862); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:856); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...] +14:26:36.096 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:862); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:856); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...] +14:26:36.103 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[10] Missing signature.] +14:26:36.104 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[10] Missing signature.] +14:26:36.109 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[20] Missing Integrity Protection] +14:26:36.109 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[20] Missing Integrity Protection] +14:26:36.121 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +14:26:36.121 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +14:26:36.121 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +14:26:36.121 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +14:26:36.121 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +14:26:36.121 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +14:26:36.122 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +14:26:36.122 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +14:26:36.122 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +14:26:36.122 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +14:26:36.122 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +14:26:36.122 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +14:26:36.122 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +14:26:36.122 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +14:26:36.138 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: Unable to parse what was expected to be the JWT Claim Set JSON: "eyJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MjAyMTkwOTcsIm1lc3NhZ2UiOiJlaCJ9.ADXjpouiqbRqymN-NJ84HjU0ZZUmAajlb43Vzb6yTolFU9dTAcL6XhBAy5cwlPaS_3VT4Ce2CMpgruihmaftHA" Additional details: [[16] Invalid JSON.] +JWT Claims Set:{sub=me, aud=a, iss=i, exp=1768833396} +eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJjdHkiOiJqd3QiLCJjcml0IjpbImZha2UuYmxhaCJdfQ.oQNNELeRFOFaK1TOWwpRjF_pB8bqhOIzi0E5yv1z3HQs-SEKBXD2VXdFfOlupQ1yIuLeRwySSPkU4i6PaC9uCrghXSSqR0imSrvcsnrtRtYYjPtPVEucKz8m1-nMkehdlM0zv7pZKWeC6pf1DI3bVWeSSvcWxZXIeDG0UcRwmhuh0kNdRv5MD5BzD-j-7UB7jFy6dON_HA8sRaFLjQbPBmz2Dz_Fkg-iCXrzqfZFWuDdy_7AHA7Kxp-_G_5Q4ORMAcL0hYxtrBuCOVAO3rr-6Wn2QaBDfXPfZTotmCQugatX3VkHgUjyU4Nqx646cRBGowyRJ4b6EajfteWf_QSl8g.KBk-TKZCyngmRoAI_p-ivQ.tYPCy1lKvBHFSJ8H8Et3KgMpGfv4mGH8_dLq2B8Nd52-rx-ff0IzeoiQ82L0WVfT85lCqoDZKK35c0GY6h238x9iCfp7DdEHtd9PPL2HuQV6PQWm8zIG05fyjk3EsVw6exa_o_eeL3MD9DSJOMfSZxiG1SHJwwHN-pfzMM36qaMta6Uxts3UhOLjjz_4-U2uwwLoxFZ5v569rWTDWXtC36DNg-zFUlNs7_nTINWMmKJRaTi6MknwYzkog00J38mNIvR7akcvrThbhh9KBbNSJA.WNgSasw_0GSZIEEuEtDzrQ +14:26:36.146 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: Unrecognized header 'fake.blah' marked as critical.): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJjdHkiOiJqd3QiLCJjcml0IjpbImZha2UuYmxhaCJdfQ.oQNNELeRFOFaK1TOWwpRjF_pB8bqhOIzi0E5yv1z3HQs-SEKBXD2VXdFfOlupQ1yIuLeRwySSPkU4i6PaC9uCrghXSSqR0imSrvcsnrtRtYYjPtPVEucKz8m1-nMkehdlM0zv7pZKWeC6pf1DI3bVWeSSvcWxZXIeDG0UcRwmhuh0kNdRv5MD5BzD-j-7UB7jFy6dON_HA8sRaFLjQbPBmz2Dz_Fkg-iCXrzqfZFWuDdy_7AHA7Kxp-_G_5Q4ORMAcL0hYxtrBuCOVAO3rr-6Wn2QaBDfXPfZTotmCQugatX3VkHgUjyU4Nqx646cRBGowyRJ4b6EajfteWf_QSl8g.KBk-TKZCyngmRoAI_p-ivQ.tYPCy1lKvBHFSJ8H8Et3KgMpGfv4mGH8_dLq2B8Nd52-rx-ff0IzeoiQ82L0WVfT85lCqoDZKK35c0GY6h238x9iCfp7DdEHtd9PPL2HuQV6PQWm8zIG05fyjk3EsVw6exa_o_eeL3MD9DSJOMfSZxiG1SHJwwHN-pfzMM36qaMta6Uxts3UhOLjjz_4-U2uwwLoxFZ5v569rWTDWXtC36DNg-zFUlNs7_nTINWMmKJRaTi6MknwYzkog00J38mNIvR7akcvrThbhh9KBbNSJA.WNgSasw_0GSZIEEuEtDzrQ] +14:26:36.171 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1432327195,"sub":"s","nbf":1432326535}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [a] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value., [1] The JWT is no longer valid - the evaluation time NumericDate{1768832796 -> Jan 19, 2026, 2:26:36?PM GMT} is on or after the Expiration Time (exp=NumericDate{1432327195 -> May 22, 2015, 8:39:55?PM GMT}) claim value.] +14:26:36.176 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1432327195,"sub":"s","nbf":1432326535}) rejected due to invalid claims or other invalid content. Additional details: [[17] i isn't okay as an issuer] +14:26:36.177 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notjti":"lbZ_mLS6w3xBSlvW6ULmkV-uLCk"}) rejected due to invalid claims or other invalid content. Additional details: [[13] The JWT ID (jti) claim is not present.] +14:26:36.177 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"jti":55581529751992}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'jti' claim is not the expected type (55581529751992 - Cannot cast java.lang.Long to java.lang.String)] +14:26:36.177 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"jti":["S0w3XbslvW6ULmk0", "5iLSQfNgcSGt7A4is"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'jti' claim is not the expected type ([S0w3XbslvW6ULmk0, 5iLSQfNgcSGt7A4is] - Cannot cast java.util.ArrayList to java.lang.String)] +14:26:36.219 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1768833396,"nbf":1768832496,"jti":"fH_p6G0iNrHSvcNhJsCa_g"}) rejected due to invalid claims or other invalid content. Additional details: [[21] No typ header parameter present in the innermost JWS/JWE] +14:26:36.265 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1768833396,"nbf":1768832496,"jti":"fH_p6G0iNrHSvcNhJsCa_g"}) rejected due to invalid claims or other invalid content. Additional details: [[21] No typ header parameter present in the innermost JWS/JWE] +14:26:36.306 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1768833396,"nbf":1768832496,"jti":"fH_p6G0iNrHSvcNhJsCa_g"}) rejected due to invalid claims or other invalid content. Additional details: [[22] Invalid typ header parameter value 'at+jwt'. Expecting 'application/secevent+jwt' or just 'secevent+jwt'.] +14:26:36.340 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1768833396,"nbf":1768832496,"jti":"fH_p6G0iNrHSvcNhJsCa_g"}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.TypeValidator: java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.lang.String (java.util.ArrayList and java.lang.String are in module java.base of loader 'bootstrap') at org.jose4j.lang.JsonHelp.getString(JsonHelp.java:31); org.jose4j.jwx.Headers.getStringHeaderValue(Headers.java:78); org.jose4j.jwx.JsonWebStructure.getHeader(JsonWebStructure.java:153); org.jose4j.jwt.consumer.TypeValidator.validate(TypeValidator.java:37); ...omitted...] +14:26:36.349 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1768833396,"nbf":1768832496,"jti":"fH_p6G0iNrHSvcNhJsCa_g"}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.TypeValidator: java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.lang.String (java.util.ArrayList and java.lang.String are in module java.base of loader 'bootstrap') at org.jose4j.lang.JsonHelp.getString(JsonHelp.java:31); org.jose4j.jwx.Headers.getStringHeaderValue(Headers.java:78); org.jose4j.jwx.JsonWebStructure.getHeader(JsonWebStructure.java:153); org.jose4j.jwt.consumer.TypeValidator.validate(TypeValidator.java:37); ...omitted...] +14:26:36.382 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1768833396,"nbf":1768832496,"jti":"fH_p6G0iNrHSvcNhJsCa_g"}) rejected due to invalid claims or other invalid content. Additional details: [[22] typ header parameter value '' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: cannot have empty part] +14:26:36.394 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1768833396,"nbf":1768832496,"jti":"fH_p6G0iNrHSvcNhJsCa_g"}) rejected due to invalid claims or other invalid content. Additional details: [[22] typ header parameter value '' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: cannot have empty part] +[INFO] Tests run: 49, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 4.305 s - in org.jose4j.jwt.consumer.JwtConsumerTest [INFO] Running org.jose4j.jwt.consumer.GoogsTooSmallKeyJwtConsumerTest -14:20:59.641 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits).): JsonWebSignature{"alg":"RS256","kid":"76fd32aec7e0f8c190dda8b9dd85e7cf5ad33c43"}->eyJhbGciOiJSUzI1NiIsImtpZCI6Ijc2ZmQzMmFlYzdlMGY4YzE5MGRkYThiOWRkODVlN2NmNWFkMzNjNDMifQ.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_aWQ9QUl0T2F3bGIxSEhFZFJJZW00d2Z1MXFNY1BUdWZvUDZzTi11ZVVrIiwiaWF0IjoxNDMxNjEyMjM4LCJleHAiOjE0MzE2MTU4Mzh9.RRMVpR9WJrkddegS4uKNT7rTov-LvRQ9sCtGo_SXrqkNbLZgArSJcmmHHxoQDsVWUjl2ZNG-7ZjDRuMu-POJLR4GHpwmQ8gttAEeywkiW4in5pUOb21AdgH29HDwG2mY6iVavsASHRutK747gURRlpt3wUJOJk00T9W2N0fVsTE] -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwt.consumer.GoogsTooSmallKeyJwtConsumerTest +14:26:36.401 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits).): JsonWebSignature{"alg":"RS256","kid":"76fd32aec7e0f8c190dda8b9dd85e7cf5ad33c43"}->eyJhbGciOiJSUzI1NiIsImtpZCI6Ijc2ZmQzMmFlYzdlMGY4YzE5MGRkYThiOWRkODVlN2NmNWFkMzNjNDMifQ.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_aWQ9QUl0T2F3bGIxSEhFZFJJZW00d2Z1MXFNY1BUdWZvUDZzTi11ZVVrIiwiaWF0IjoxNDMxNjEyMjM4LCJleHAiOjE0MzE2MTU4Mzh9.RRMVpR9WJrkddegS4uKNT7rTov-LvRQ9sCtGo_SXrqkNbLZgArSJcmmHHxoQDsVWUjl2ZNG-7ZjDRuMu-POJLR4GHpwmQ8gttAEeywkiW4in5pUOb21AdgH29HDwG2mY6iVavsASHRutK747gURRlpt3wUJOJk00T9W2N0fVsTE] +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.006 s - in org.jose4j.jwt.consumer.GoogsTooSmallKeyJwtConsumerTest [INFO] Running org.jose4j.jwt.consumer.TypeValidatorTest -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.644 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.645 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.645 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.645 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.645 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.645 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.645 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.645 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.645 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.645 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.645 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.645 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.645 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.645 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.645 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.645 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.645 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.645 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -14:20:59.645 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type 'application/noway)' isn't a valid media type in this context. -14:20:59.645 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '/' isn't a valid media type in this context. -14:20:59.645 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '/dpop+jwt' isn't a valid media type in this context. -14:20:59.645 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '' isn't a valid media type in this context. -14:20:59.645 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type -14:20:59.645 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type -14:20:59.645 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.646 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.647 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.648 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -14:20:59.648 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -14:20:59.648 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.jwt.consumer.TypeValidatorTest +14:26:36.402 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.403 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +14:26:36.416 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type 'application/noway)' isn't a valid media type in this context. +14:26:36.416 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '/' isn't a valid media type in this context. +14:26:36.416 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '/dpop+jwt' isn't a valid media type in this context. +14:26:36.416 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '' isn't a valid media type in this context. +14:26:36.416 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type +14:26:36.416 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type +14:26:36.416 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type +14:26:36.416 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.416 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.416 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.416 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.416 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.416 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.416 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.416 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.417 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +14:26:36.418 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.015 s - in org.jose4j.jwt.consumer.TypeValidatorTest [INFO] Running org.jose4j.jwk.JsonWebKeySetAnotherTest -14:20:59.649 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Missing required 'y' parameter.). JWK params: {kty=EC, kid=this one shouldn't work 'cause there's no y, x=msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY, crv=P-256} and the full JWKS content: { "keys": [ { "kty": "EC", "kid": "96", "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg", "y": "y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4", "crv": "P-256" }, { "kty": "EC", "kid": "a9", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ", "crv": "P-256" }, { "kty": "EC", "kid": "this one shouldn't work 'cause there's no y", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "crv": "P-256" }, { "kty": "EC", "kid": "2d", "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw", "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4", "crv": "P-256" } ]}. -14:20:59.649 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Unknown key type algorithm: 'UNKNOWN'). JWK params: {kty=UNKNOWN, crv=whatever, x=11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo} and the full JWKS content: { "keys": [ { "kty": "EC", "kid": "96", "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg", "y": "y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4", "crv": "P-256" }, { "kty": "EC", "kid": "a9", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ", "crv": "P-256" }, { "kty":"UNKNOWN", "crv":"whatever", "x":"11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo" } { "kty": "EC", "kid": "2d", "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw", "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4", "crv": "P-256" } ]}. -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.JsonWebKeySetAnotherTest +14:26:36.419 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Missing required 'y' parameter.). JWK params: {kty=EC, kid=this one shouldn't work 'cause there's no y, x=msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY, crv=P-256} and the full JWKS content: { "keys": [ { "kty": "EC", "kid": "96", "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg", "y": "y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4", "crv": "P-256" }, { "kty": "EC", "kid": "a9", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ", "crv": "P-256" }, { "kty": "EC", "kid": "this one shouldn't work 'cause there's no y", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "crv": "P-256" }, { "kty": "EC", "kid": "2d", "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw", "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4", "crv": "P-256" } ]}. +14:26:36.433 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Unknown key type algorithm: 'UNKNOWN'). JWK params: {kty=UNKNOWN, crv=whatever, x=11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo} and the full JWKS content: { "keys": [ { "kty": "EC", "kid": "96", "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg", "y": "y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4", "crv": "P-256" }, { "kty": "EC", "kid": "a9", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ", "crv": "P-256" }, { "kty":"UNKNOWN", "crv":"whatever", "x":"11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo" } { "kty": "EC", "kid": "2d", "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw", "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4", "crv": "P-256" } ]}. +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s - in org.jose4j.jwk.JsonWebKeySetAnotherTest [INFO] Running org.jose4j.jwk.HttpsJwksTest -[WARNING] Tests run: 3, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.001 s - in org.jose4j.jwk.HttpsJwksTest +[WARNING] Tests run: 3, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0 s - in org.jose4j.jwk.HttpsJwksTest [INFO] Running org.jose4j.jwk.Rfc7638JwkThumbprintTest -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.Rfc7638JwkThumbprintTest +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.006 s - in org.jose4j.jwk.Rfc7638JwkThumbprintTest [INFO] Running org.jose4j.jwk.OctetSequenceJsonWebKeyTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.OctetSequenceJsonWebKeyTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.OctetSequenceJsonWebKeyTest [INFO] Running org.jose4j.jwk.JsonWebKeyTest -[INFO] Tests run: 13, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.JsonWebKeyTest +[INFO] Tests run: 13, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.012 s - in org.jose4j.jwk.JsonWebKeyTest [INFO] Running org.jose4j.jwk.OctJwkGeneratorTest [INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.OctJwkGeneratorTest [INFO] Running org.jose4j.jwk.DecryptionJwkSelectorTest -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.DecryptionJwkSelectorTest +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s - in org.jose4j.jwk.DecryptionJwkSelectorTest [INFO] Running org.jose4j.jwk.ExtraJwkParametersTest -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.ExtraJwkParametersTest +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.007 s - in org.jose4j.jwk.ExtraJwkParametersTest [INFO] Running org.jose4j.jwk.Rfc7638JwkThumbprintUriTest -[INFO] Tests run: 11, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.Rfc7638JwkThumbprintUriTest +[INFO] Tests run: 11, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.036 s - in org.jose4j.jwk.Rfc7638JwkThumbprintUriTest [INFO] Running org.jose4j.jwk.RsaJsonWebKeyTest -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.RsaJsonWebKeyTest +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.jwk.RsaJsonWebKeyTest [INFO] Running org.jose4j.jwk.X5cTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.X5cTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.01 s - in org.jose4j.jwk.X5cTest [INFO] Running org.jose4j.jwk.VerificationJwkSelectorTest -14:20:59.706 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:59.706 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:59.706 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:59.706 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:59.706 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:59.706 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:59.706 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:59.707 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:59.707 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:59.707 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:59.708 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -14:20:59.708 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:59.708 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:59.708 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:59.710 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:59.712 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:59.714 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:59.714 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:59.714 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:59.714 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:59.715 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:59.715 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:59.715 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:59.715 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:59.715 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:59.720 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:59.725 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:59.730 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:59.734 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:59.735 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:59.735 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:59.735 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:59.735 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:59.736 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:59.736 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:59.736 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:59.736 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:59.736 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:59.736 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:59.736 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:59.737 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:59.737 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:59.737 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:59.737 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:59.737 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@514cd540 registered for zip algorithm DEF -14:20:59.737 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:59.737 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 31ms -14:20:59.739 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -14:20:59.739 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -14:20:59.739 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -14:20:59.739 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -14:20:59.739 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -14:20:59.739 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -14:20:59.739 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -14:20:59.739 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -14:20:59.739 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -14:20:59.739 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -14:20:59.740 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 -14:20:59.740 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -14:20:59.740 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -14:20:59.740 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -14:20:59.740 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -14:20:59.740 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -14:20:59.740 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -14:20:59.741 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -14:20:59.741 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -14:20:59.741 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -14:20:59.741 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -14:20:59.741 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -14:20:59.741 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -14:20:59.741 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -14:20:59.741 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -14:20:59.741 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -14:20:59.742 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -14:20:59.743 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -14:20:59.744 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -14:20:59.744 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -14:20:59.744 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -14:20:59.744 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -14:20:59.744 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -14:20:59.745 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -14:20:59.745 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -14:20:59.745 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -14:20:59.745 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -14:20:59.745 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -14:20:59.745 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -14:20:59.745 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -14:20:59.745 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -14:20:59.745 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -14:20:59.745 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -14:20:59.745 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -14:20:59.745 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -14:20:59.745 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@186cb891 registered for zip algorithm DEF -14:20:59.745 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -14:20:59.745 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 6ms -14:20:59.746 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Missing required 'kty' parameter.). JWK params: {alg=RSA, mod=4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w, exp=AQAB, user=sig} and the full JWKS content: {"keys":[{"alg":"RSA","mod":"4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w","exp":"AQAB","user":"sig"}]}. -14:20:59.764 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying RS512 signature: java.security.SignatureException: Bad signature length: got 512 but was expecting 256 -14:20:59.766 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying RS512 signature: java.security.SignatureException: Bad signature length: got 256 but was expecting 512 -[INFO] Tests run: 23, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.073 s - in org.jose4j.jwk.VerificationJwkSelectorTest +14:26:36.577 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:36.577 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:36.577 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:36.577 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:36.577 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:36.577 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:36.577 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:36.577 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:36.577 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:36.577 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:36.579 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +14:26:36.579 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:36.579 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:36.579 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:36.589 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:36.592 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:36.594 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:36.594 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:36.594 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:36.594 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:36.595 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:36.595 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:36.595 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:36.595 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:36.595 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:36.608 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:36.621 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:36.626 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:36.639 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:36.639 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:36.639 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:36.640 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:36.644 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:36.645 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:36.645 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:36.645 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:36.645 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:36.645 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:36.645 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:36.646 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:36.646 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:36.646 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:36.646 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:36.646 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:36.646 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@11d4dbd6 registered for zip algorithm DEF +14:26:36.646 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:36.646 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 69ms +14:26:36.656 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +14:26:36.656 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-arm64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +14:26:36.656 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +14:26:36.656 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +14:26:36.656 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +14:26:36.656 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +14:26:36.656 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +14:26:36.656 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +14:26:36.656 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +14:26:36.656 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +14:26:36.657 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@557caf28 +14:26:36.657 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +14:26:36.657 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +14:26:36.657 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +14:26:36.657 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +14:26:36.657 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +14:26:36.658 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +14:26:36.658 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +14:26:36.658 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +14:26:36.658 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +14:26:36.658 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +14:26:36.658 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +14:26:36.658 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +14:26:36.658 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +14:26:36.658 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +14:26:36.658 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +14:26:36.659 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +14:26:36.662 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +14:26:36.663 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +14:26:36.664 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +14:26:36.664 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +14:26:36.664 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +14:26:36.664 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +14:26:36.664 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +14:26:36.664 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +14:26:36.664 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +14:26:36.664 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +14:26:36.664 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +14:26:36.664 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +14:26:36.664 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +14:26:36.664 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +14:26:36.665 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +14:26:36.665 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +14:26:36.665 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +14:26:36.665 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +14:26:36.665 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@3ec2ecea registered for zip algorithm DEF +14:26:36.665 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +14:26:36.665 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 9ms +14:26:36.665 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Missing required 'kty' parameter.). JWK params: {alg=RSA, mod=4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w, exp=AQAB, user=sig} and the full JWKS content: {"keys":[{"alg":"RSA","mod":"4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w","exp":"AQAB","user":"sig"}]}. +14:26:36.707 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying RS512 signature: java.security.SignatureException: Bad signature length: got 512 but was expecting 256 +14:26:36.717 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying RS512 signature: java.security.SignatureException: Bad signature length: got 256 but was expecting 512 +[INFO] Tests run: 23, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.175 s - in org.jose4j.jwk.VerificationJwkSelectorTest [INFO] Running org.jose4j.jwk.JwkGlitchesInDeploymentTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.JwkGlitchesInDeploymentTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.JwkGlitchesInDeploymentTest [INFO] Running org.jose4j.jwk.JsonWebKeySetTest -14:20:59.778 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.InvalidKeyException: "NOPERS" is an unknown or unsupported value for the "crv" parameter.). JWK params: {kty=EC, crv=NOPERS, kid=iRTU, x=tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY, y=2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -14:20:59.778 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Boolean type but is required to be a String.). JWK params: {kty=false, x=GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY, y=Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -14:20:59.778 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'x' parameter was Array type but is required to be a String.). JWK params: {kty=EC, x=[IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, huh], y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -14:20:59.778 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Number type but is required to be a String.). JWK params: {kty=1, x=IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -14:20:59.778 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Number type but is required to be a String.). JWK params: {kty=885584955514411149933357445595595145885566661, x=IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -14:20:59.778 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Object type but is required to be a String.). JWK params: {kty={EC=EC}, x=riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM, y=izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -14:20:59.778 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Missing required 'kty' parameter.). JWK params: {kty=null, x=riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM, y=izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -[INFO] Tests run: 10, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.JsonWebKeySetTest +14:26:36.746 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.InvalidKeyException: "NOPERS" is an unknown or unsupported value for the "crv" parameter.). JWK params: {kty=EC, crv=NOPERS, kid=iRTU, x=tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY, y=2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +14:26:36.746 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Boolean type but is required to be a String.). JWK params: {kty=false, x=GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY, y=Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +14:26:36.746 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'x' parameter was Array type but is required to be a String.). JWK params: {kty=EC, x=[IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, huh], y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +14:26:36.746 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Number type but is required to be a String.). JWK params: {kty=1, x=IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +14:26:36.746 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Number type but is required to be a String.). JWK params: {kty=885584955514411149933357445595595145885566661, x=IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +14:26:36.746 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Object type but is required to be a String.). JWK params: {kty={EC=EC}, x=riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM, y=izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +14:26:36.746 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Missing required 'kty' parameter.). JWK params: {kty=null, x=riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM, y=izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +[INFO] Tests run: 10, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.017 s - in org.jose4j.jwk.JsonWebKeySetTest [INFO] Running org.jose4j.jwk.EcJwkGeneratorTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s - in org.jose4j.jwk.EcJwkGeneratorTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.018 s - in org.jose4j.jwk.EcJwkGeneratorTest [INFO] Running org.jose4j.jwk.EllipticCurveJsonWebKeyTest org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=AekpBQ8ST8a8VcfVOTNl353vSrDCLLJXmPk06wTjxrrjcBpXp5EOnYG_NjFZ6OvLFV1jSfS9tsz4qUxcWceqwQGk, y=ADSmRA43Z1DSNx_RvcLI87cdL07l6jQyyBXMoxVg_l2Th-x3S1WDhjDly79ajL4Kkd0AZMaZmh9ubmf63e3kyMj2, crv=P-521} -[INFO] Tests run: 7, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.EllipticCurveJsonWebKeyTest +[INFO] Tests run: 7, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.01 s - in org.jose4j.jwk.EllipticCurveJsonWebKeyTest [INFO] Running org.jose4j.jwk.RsaJwkGeneratorTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.12 s - in org.jose4j.jwk.RsaJwkGeneratorTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 2.486 s - in org.jose4j.jwk.RsaJwkGeneratorTest [INFO] [INFO] Results: [INFO] @@ -4497,8 +4533,8 @@ [INFO] ------------------------------------------------------------------------ [INFO] BUILD SUCCESS [INFO] ------------------------------------------------------------------------ -[INFO] Total time: 41.953 s -[INFO] Finished at: 2026-01-19T14:21:30Z +[INFO] Total time: 01:10 min +[INFO] Finished at: 2026-01-19T14:27:09Z [INFO] ------------------------------------------------------------------------ create-stamp debian/debhelper-build-stamp dh_prep @@ -4522,8 +4558,8 @@ [INFO] ------------------------------------------------------------------------ [INFO] BUILD SUCCESS [INFO] ------------------------------------------------------------------------ -[INFO] Total time: 0.886 s -[INFO] Finished at: 2026-01-19T14:21:32Z +[INFO] Total time: 4.062 s +[INFO] Finished at: 2026-01-19T14:27:19Z [INFO] ------------------------------------------------------------------------ mh_resolve_dependencies --non-interactive --offline --build -plibjose4j-java --base-directory=/build/reproducible-path/libjose4j-java-0.9.6 --non-explore Analysing pom.xml... @@ -4549,12 +4585,14 @@ dpkg-buildpackage: info: binary-only upload (no source included) dpkg-genchanges: info: including full source code in upload I: copying local configuration +I: user script /srv/workspace/pbuilder/3638218/tmp/hooks/B01_cleanup starting +I: user script /srv/workspace/pbuilder/3638218/tmp/hooks/B01_cleanup finished I: unmounting dev/ptmx filesystem I: unmounting dev/pts filesystem I: unmounting dev/shm filesystem I: unmounting proc filesystem I: unmounting sys filesystem I: cleaning the build env -I: removing directory /srv/workspace/pbuilder/3998790 and its subdirectories -I: Current time: Mon Jan 19 02:21:37 -12 2026 -I: pbuilder-time-stamp: 1768832497 +I: removing directory /srv/workspace/pbuilder/3638218 and its subdirectories +I: Current time: Tue Jan 20 04:27:33 +14 2026 +I: pbuilder-time-stamp: 1768832853