Diff of the two buildlogs: -- --- b1/build.log 2024-10-20 18:13:53.800954749 +0000 +++ b2/build.log 2024-10-20 18:27:39.255598342 +0000 @@ -1,6 +1,6 @@ I: pbuilder: network access will be disabled during build -I: Current time: Sun Oct 20 06:06:11 -12 2024 -I: pbuilder-time-stamp: 1729447571 +I: Current time: Mon Oct 21 08:14:14 +14 2024 +I: pbuilder-time-stamp: 1729448054 I: Building the build Environment I: extracting base tarball [/var/cache/pbuilder/unstable-reproducible-base.tgz] I: copying local configuration @@ -28,52 +28,84 @@ dpkg-source: info: applying 01-test-failure.patch I: Not using root during the build. I: Installing the build-deps -I: user script /srv/workspace/pbuilder/23419/tmp/hooks/D02_print_environment starting +I: user script /srv/workspace/pbuilder/1484/tmp/hooks/D01_modify_environment starting +debug: Running on cbxi4a. +I: Changing host+domainname to test build reproducibility +I: Adding a custom variable just for the fun of it... +I: Changing /bin/sh to bash +'/bin/sh' -> '/bin/bash' +lrwxrwxrwx 1 root root 9 Oct 20 18:14 /bin/sh -> /bin/bash +I: Setting pbuilder2's login shell to /bin/bash +I: Setting pbuilder2's GECOS to second user,second room,second work-phone,second home-phone,second other +I: user script /srv/workspace/pbuilder/1484/tmp/hooks/D01_modify_environment finished +I: user script /srv/workspace/pbuilder/1484/tmp/hooks/D02_print_environment starting I: set - BUILDDIR='/build/reproducible-path' - BUILDUSERGECOS='first user,first room,first work-phone,first home-phone,first other' - BUILDUSERNAME='pbuilder1' - BUILD_ARCH='armhf' - DEBIAN_FRONTEND='noninteractive' - DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all parallel=3 ' - DISTRIBUTION='unstable' - HOME='/root' - HOST_ARCH='armhf' + BASH=/bin/sh + BASHOPTS=checkwinsize:cmdhist:complete_fullquote:extquote:force_fignore:globasciiranges:globskipdots:hostcomplete:interactive_comments:patsub_replacement:progcomp:promptvars:sourcepath + BASH_ALIASES=() + BASH_ARGC=() + BASH_ARGV=() + BASH_CMDS=() + BASH_LINENO=([0]="12" [1]="0") + BASH_LOADABLES_PATH=/usr/local/lib/bash:/usr/lib/bash:/opt/local/lib/bash:/usr/pkg/lib/bash:/opt/pkg/lib/bash:. + BASH_SOURCE=([0]="/tmp/hooks/D02_print_environment" [1]="/tmp/hooks/D02_print_environment") + BASH_VERSINFO=([0]="5" [1]="2" [2]="32" [3]="1" [4]="release" [5]="arm-unknown-linux-gnueabihf") + BASH_VERSION='5.2.32(1)-release' + BUILDDIR=/build/reproducible-path + BUILDUSERGECOS='second user,second room,second work-phone,second home-phone,second other' + BUILDUSERNAME=pbuilder2 + BUILD_ARCH=armhf + DEBIAN_FRONTEND=noninteractive + DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all parallel=4 ' + DIRSTACK=() + DISTRIBUTION=unstable + EUID=0 + FUNCNAME=([0]="Echo" [1]="main") + GROUPS=() + HOME=/root + HOSTNAME=i-capture-the-hostname + HOSTTYPE=arm + HOST_ARCH=armhf IFS=' ' - INVOCATION_ID='ce67f5fea3e24eabaad26aaf9b064ff3' - LANG='C' - LANGUAGE='en_US:en' - LC_ALL='C' - MAIL='/var/mail/root' - OPTIND='1' - PATH='/usr/sbin:/usr/bin:/sbin:/bin:/usr/games' - PBCURRENTCOMMANDLINEOPERATION='build' - PBUILDER_OPERATION='build' - PBUILDER_PKGDATADIR='/usr/share/pbuilder' - PBUILDER_PKGLIBDIR='/usr/lib/pbuilder' - PBUILDER_SYSCONFDIR='/etc' - PPID='23419' - PS1='# ' - PS2='> ' + INVOCATION_ID=9a5399a7fbe2495abb48ae20c3657476 + LANG=C + LANGUAGE=it_CH:it + LC_ALL=C + MACHTYPE=arm-unknown-linux-gnueabihf + MAIL=/var/mail/root + OPTERR=1 + OPTIND=1 + OSTYPE=linux-gnueabihf + PATH=/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path + PBCURRENTCOMMANDLINEOPERATION=build + PBUILDER_OPERATION=build + PBUILDER_PKGDATADIR=/usr/share/pbuilder + PBUILDER_PKGLIBDIR=/usr/lib/pbuilder + PBUILDER_SYSCONFDIR=/etc + PIPESTATUS=([0]="0") + POSIXLY_CORRECT=y + PPID=1484 PS4='+ ' - PWD='/' - SHELL='/bin/bash' - SHLVL='2' - SUDO_COMMAND='/usr/bin/timeout -k 18.1h 18h /usr/bin/ionice -c 3 /usr/bin/nice /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.8tQkAKUe/pbuilderrc_giMy --distribution unstable --hookdir /etc/pbuilder/first-build-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/unstable-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.8tQkAKUe/b1 --logfile b1/build.log libjose4j-java_0.9.6-1.dsc' - SUDO_GID='113' - SUDO_UID='107' - SUDO_USER='jenkins' - TERM='unknown' - TZ='/usr/share/zoneinfo/Etc/GMT+12' - USER='root' - _='/usr/bin/systemd-run' - http_proxy='http://10.0.0.15:3142/' + PWD=/ + SHELL=/bin/bash + SHELLOPTS=braceexpand:errexit:hashall:interactive-comments:posix + SHLVL=3 + SUDO_COMMAND='/usr/bin/timeout -k 24.1h 24h /usr/bin/ionice -c 3 /usr/bin/nice -n 11 /usr/bin/unshare --uts -- /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.8tQkAKUe/pbuilderrc_WxrM --distribution unstable --hookdir /etc/pbuilder/rebuild-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/unstable-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.8tQkAKUe/b2 --logfile b2/build.log libjose4j-java_0.9.6-1.dsc' + SUDO_GID=113 + SUDO_UID=107 + SUDO_USER=jenkins + TERM=unknown + TZ=/usr/share/zoneinfo/Etc/GMT-14 + UID=0 + USER=root + _='I: set' + http_proxy=http://10.0.0.15:3142/ I: uname -a - Linux virt64b 6.1.0-26-arm64 #1 SMP Debian 6.1.112-1 (2024-09-30) aarch64 GNU/Linux + Linux i-capture-the-hostname 6.1.0-23-armmp #1 SMP Debian 6.1.99-1 (2024-07-15) armv7l GNU/Linux I: ls -l /bin lrwxrwxrwx 1 root root 7 Aug 4 21:30 /bin -> usr/bin -I: user script /srv/workspace/pbuilder/23419/tmp/hooks/D02_print_environment finished +I: user script /srv/workspace/pbuilder/1484/tmp/hooks/D02_print_environment finished -> Attempting to satisfy build-dependencies -> Creating pbuilder-satisfydepends-dummy package Package: pbuilder-satisfydepends-dummy @@ -443,7 +475,7 @@ Get: 314 http://deb.debian.org/debian unstable/main armhf maven all 3.8.8-1 [19.3 kB] Get: 315 http://deb.debian.org/debian unstable/main armhf maven-repo-helper all 1.11 [142 kB] Get: 316 http://deb.debian.org/debian unstable/main armhf maven-debian-helper all 2.6.4 [108 kB] -Fetched 287 MB in 10s (28.3 MB/s) +Fetched 287 MB in 19s (15.4 MB/s) debconf: delaying package configuration, since apt-utils is not installed Selecting previously unselected package libapparmor1:armhf. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 19665 files and directories currently installed.) @@ -1931,7 +1963,11 @@ Building tag database... -> Finished parsing the build-deps I: Building the package -I: Running cd /build/reproducible-path/libjose4j-java-0.9.6/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-buildpackage -us -uc -b && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-genchanges -S > ../libjose4j-java_0.9.6-1_source.changes +I: user script /srv/workspace/pbuilder/1484/tmp/hooks/A99_set_merged_usr starting +Not re-configuring usrmerge for unstable +I: user script /srv/workspace/pbuilder/1484/tmp/hooks/A99_set_merged_usr finished +hostname: Name or service not known +I: Running cd /build/reproducible-path/libjose4j-java-0.9.6/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path" HOME="/nonexistent/second-build" dpkg-buildpackage -us -uc -b && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path" HOME="/nonexistent/second-build" dpkg-genchanges -S > ../libjose4j-java_0.9.6-1_source.changes dpkg-buildpackage: info: source package libjose4j-java dpkg-buildpackage: info: source version 0.9.6-1 dpkg-buildpackage: info: source distribution unstable @@ -1998,8 +2034,8 @@ [INFO] ------------------------------------------------------------------------ [INFO] BUILD SUCCESS [INFO] ------------------------------------------------------------------------ -[INFO] Total time: 30.530 s -[INFO] Finished at: 2024-10-20T18:11:22Z +[INFO] Total time: 01:28 min +[INFO] Finished at: 2024-10-20T18:21:37Z [INFO] ------------------------------------------------------------------------ dh_auto_test /usr/lib/jvm/default-java/bin/java -noverify -cp /usr/share/maven/boot/plexus-classworlds-2.x.jar -Dmaven.home=/usr/share/maven -Dmaven.multiModuleProjectDirectory=/build/reproducible-path/libjose4j-java-0.9.6 -Dclassworlds.conf=/etc/maven/m2-debian.conf -Dproperties.file.manual=/build/reproducible-path/libjose4j-java-0.9.6/debian/maven.properties org.codehaus.plexus.classworlds.launcher.Launcher -s/etc/maven/settings-debian.xml -Ddebian.dir=/build/reproducible-path/libjose4j-java-0.9.6/debian -Dmaven.repo.local=/build/reproducible-path/libjose4j-java-0.9.6/debian/maven-repo --batch-mode test @@ -2032,2507 +2068,2507 @@ [INFO] ------------------------------------------------------- [INFO] T E S T S [INFO] ------------------------------------------------------- -[INFO] Running org.jose4j.base64url.internal.apache.commons.codec.binary.Base64Test -[INFO] Tests run: 47, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.431 s - in org.jose4j.base64url.internal.apache.commons.codec.binary.Base64Test -[INFO] Running org.jose4j.jwx.HeadersTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.05 s - in org.jose4j.jwx.HeadersTest -[INFO] Running org.jose4j.jwx.CompactSerializerTest -[INFO] Tests run: 11, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.041 s - in org.jose4j.jwx.CompactSerializerTest -[INFO] Running org.jose4j.jwx.JsonWebStructureTest -18:11:39.541 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:11:39.557 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:11:39.588 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:11:39.590 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:11:39.591 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:11:39.599 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:11:39.608 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:11:39.611 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:11:39.614 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:11:39.643 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@125bf5b -18:11:39.644 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -18:11:39.646 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:11:39.648 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:11:39.649 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:11:39.660 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:11:39.668 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:11:39.675 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:11:39.676 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -18:11:39.686 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:11:39.688 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:11:39.741 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:11:39.743 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:11:39.752 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:11:39.754 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:11:39.756 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:11:39.768 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:11:39.777 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:11:39.785 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:11:39.792 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:11:39.795 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:11:39.796 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:11:39.798 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:11:39.811 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:11:39.814 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:11:39.817 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:11:39.818 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:11:39.819 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:11:39.820 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:11:39.821 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:11:39.825 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:11:39.828 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:11:39.831 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:11:39.831 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:11:39.834 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:11:39.834 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@2ef0ea registered for zip algorithm DEF -18:11:39.835 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:11:39.835 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 283ms -[INFO] Tests run: 12, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.182 s - in org.jose4j.jwx.JsonWebStructureTest [INFO] Running org.jose4j.jwt.NumericDateTest -18:11:39.960 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854775807} -18:11:39.961 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372034707292160} -18:11:39.961 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223371822106411107} -18:11:39.961 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{4611686018427387903} -18:11:39.961 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{2305843009213693951} -18:11:39.962 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{144115188075855871} -18:11:39.962 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9232604641496272} -18:11:39.962 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854776} -18:11:40.007 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854775 -> Aug 17, 292278994, 7:12:55?AM GMT} -18:11:40.008 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854774 -> Aug 17, 292278994, 7:12:54?AM GMT} -18:11:40.009 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854775808} -18:11:40.009 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372034707292161} -18:11:40.009 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-4611686018427387904} -18:11:40.009 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-184467440737095516} -18:11:40.009 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9232604641496272} -18:11:40.010 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854776} -18:11:40.014 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854775 -> Dec 2, 292269055, 4:47:05?PM GMT} -18:11:40.015 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854774 -> Dec 2, 292269055, 4:47:06?PM GMT} -18:11:40.015 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 1 = -9223372036854775808 -18:11:40.016 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 60 = -9223372036854775749 -18:11:40.016 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 2147483647 = -9223372034707292162 -18:11:40.016 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 9223372036854775807 = -2 -18:11:40.016 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 2147483647 + 9223372036854775807 = -9223372034707292162 -18:11:40.017 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 60 + 9223372036854775807 = -9223372036854775749 -18:11:40.017 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 1 + 9223372036854775807 = -9223372036854775808 -18:11:40.017 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -1 = 9223372036854775807 -18:11:40.017 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -100 = 9223372036854775708 -18:11:40.018 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -2147483648 = 9223372034707292160 -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.04 s - in org.jose4j.jwt.NumericDateTest +18:22:17.648 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854775807} +18:22:17.669 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372034707292160} +18:22:17.670 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223371822106411107} +18:22:17.671 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{4611686018427387903} +18:22:17.672 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{2305843009213693951} +18:22:17.672 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{144115188075855871} +18:22:17.673 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9232604641496272} +18:22:17.674 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854776} +18:22:17.823 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854775 -> Aug 17, 292278994, 7:12:55?AM GMT} +18:22:17.827 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854774 -> Aug 17, 292278994, 7:12:54?AM GMT} +18:22:17.829 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854775808} +18:22:17.830 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372034707292161} +18:22:17.831 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-4611686018427387904} +18:22:17.832 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-184467440737095516} +18:22:17.833 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9232604641496272} +18:22:17.834 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854776} +18:22:17.845 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854775 -> Dec 2, 292269055, 4:47:05?PM GMT} +18:22:17.849 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854774 -> Dec 2, 292269055, 4:47:06?PM GMT} +18:22:17.850 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 1 = -9223372036854775808 +18:22:17.852 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 60 = -9223372036854775749 +18:22:17.853 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 2147483647 = -9223372034707292162 +18:22:17.854 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 9223372036854775807 = -2 +18:22:17.855 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 2147483647 + 9223372036854775807 = -9223372034707292162 +18:22:17.856 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 60 + 9223372036854775807 = -9223372036854775749 +18:22:17.857 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 1 + 9223372036854775807 = -9223372036854775808 +18:22:17.859 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -1 = 9223372036854775807 +18:22:17.860 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -100 = 9223372036854775708 +18:22:17.861 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -2147483648 = 9223372034707292160 +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 2.743 s - in org.jose4j.jwt.NumericDateTest +[INFO] Running org.jose4j.jwt.consumer.ExamplesFromOpenIdConnectTest +18:22:18.640 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:22:18.662 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:22:18.730 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:22:18.734 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:22:18.739 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:22:18.760 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:22:18.782 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:22:18.790 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:22:18.798 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:22:18.891 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@1d5509a +18:22:18.892 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +18:22:18.898 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:22:18.902 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:22:18.907 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:22:18.993 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:22:19.070 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:22:19.088 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:22:19.089 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +18:22:19.112 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:22:19.117 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:22:19.237 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:22:19.242 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:22:19.262 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:22:19.266 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:22:19.270 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:22:19.309 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:22:19.332 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:22:19.402 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:22:19.421 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:22:19.427 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:22:19.432 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:22:19.436 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:22:19.472 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:22:19.480 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:22:19.486 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:22:19.488 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:22:19.491 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:22:19.495 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:22:19.499 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:22:19.508 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:22:19.514 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:22:19.521 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:22:19.522 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:22:19.529 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:22:19.530 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@ebe890 registered for zip algorithm DEF +18:22:19.531 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:22:19.532 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 883ms +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.781 s - in org.jose4j.jwt.consumer.ExamplesFromOpenIdConnectTest +[INFO] Running org.jose4j.jwt.consumer.TypeValidatorTest +18:22:20.010 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.012 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.013 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.014 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.015 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.016 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.017 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.020 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.021 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.022 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.023 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.024 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.025 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.026 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.028 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.029 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.030 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.031 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.032 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.033 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.034 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.036 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.037 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.038 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.039 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.040 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.041 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.042 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.044 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.045 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.046 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.047 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.048 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.049 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.050 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.052 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.053 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.054 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.055 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.056 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.057 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.058 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.060 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.061 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.062 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.063 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.064 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.065 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.066 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.068 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.070 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.071 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.072 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.074 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.075 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.076 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +18:22:20.083 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type 'application/noway)' isn't a valid media type in this context. +18:22:20.084 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '/' isn't a valid media type in this context. +18:22:20.085 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '/dpop+jwt' isn't a valid media type in this context. +18:22:20.086 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '' isn't a valid media type in this context. +18:22:20.087 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type +18:22:20.088 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type +18:22:20.089 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type +18:22:20.095 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.096 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.098 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.099 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.099 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.100 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.101 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.103 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.104 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +18:22:20.105 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +18:22:20.107 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE +18:22:20.109 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.110 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.111 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.112 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.113 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.114 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.115 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.116 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.118 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +18:22:20.119 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +18:22:20.121 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.122 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.124 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.125 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.126 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.127 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.129 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.130 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.131 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +18:22:20.132 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +18:22:20.134 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE +18:22:20.136 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.137 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.138 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.139 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.140 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.142 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.143 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.144 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.146 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +18:22:20.147 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +18:22:20.149 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.150 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.151 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.153 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.154 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.156 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.157 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +18:22:20.158 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +18:22:20.160 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE +18:22:20.161 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.162 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.163 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.164 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.165 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.167 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.168 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.169 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +18:22:20.171 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +18:22:20.172 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.174 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.175 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.176 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.177 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.178 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.179 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.180 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.181 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +18:22:20.182 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +18:22:20.183 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE +18:22:20.184 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.185 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.186 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.187 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.188 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.189 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.190 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.191 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +18:22:20.192 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +18:22:20.194 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.185 s - in org.jose4j.jwt.consumer.TypeValidatorTest [INFO] Running org.jose4j.jwt.consumer.JwtConsumerTest -18:11:41.102 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322039,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{1571322039 -> Oct 17, 2019, 2:20:39?PM GMT} is more than 60 second(s) in the past.] -18:11:41.150 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1570321001,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{1570321001 -> Oct 6, 2019, 12:16:41?AM GMT} is more than 60 second(s) in the past.] -18:11:41.198 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":12345,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{12345 -> Jan 1, 1970, 3:25:45?AM GMT} is more than 60 second(s) in the past.] -18:11:41.246 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":0,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{0 -> Jan 1, 1970, 12:00:00?AM GMT} is more than 60 second(s) in the past.] -18:11:41.293 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-938763,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{-938763 -> Dec 21, 1969, 3:13:57?AM GMT} is more than 60 second(s) in the past.] -18:11:41.341 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-2147483736,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{-2147483736 -> Dec 13, 1901, 8:44:24?PM GMT} is more than 60 second(s) in the past.] -18:11:41.390 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322101,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322101 -> Oct 17, 2019, 2:21:41?PM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] -18:11:41.438 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322177,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322177 -> Oct 17, 2019, 2:22:57?PM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] -18:11:41.482 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":2147483647,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{2147483647 -> Jan 19, 2038, 3:14:07?AM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] -18:11:41.524 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":7700000007,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{7700000007 -> Jan 2, 2214, 8:53:27?AM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] -18:11:41.626 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571321979,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{1571321979 -> Oct 17, 2019, 2:19:39?PM GMT} is more than 120 second(s) in the past.] -18:11:41.732 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322111,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322111 -> Oct 17, 2019, 2:21:51?PM GMT} is more than 10 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] -18:11:41.808 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"issuer.example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (issuer.example.com) doesn't match expected value of nope.example.com] -18:11:41.808 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] -18:11:41.810 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":["issuer1", "other.one", "meh"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'iss' claim is not the expected type ([issuer1, other.one, meh] - Cannot cast java.util.ArrayList to java.lang.String)] -18:11:41.811 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":["issuer1", "nope.not"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'iss' claim is not the expected type ([issuer1, nope.not] - Cannot cast java.util.ArrayList to java.lang.String)] -18:11:41.812 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https://accounts.google.com"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (https://accounts.google.com) doesn't match expected value of one of [nope.google.com, https://fake.google.com]] -18:11:41.813 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"x"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (x) doesn't match expected value of one of [a, b, c, d, e]] -18:11:41.813 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] -18:11:41.814 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] -18:11:41.814 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] -18:11:41.815 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] -18:11:41.819 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] -18:11:41.820 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] -18:11:41.821 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] -18:11:41.822 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] -18:11:41.835 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: JWS Plaintext (alg=none) must not use a key.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] -18:11:41.835 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: JWS Plaintext (alg=none) must not use a key.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] -18:11:41.836 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] -18:11:41.837 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] -18:11:47.523 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4Ijoic29QZzliQno0MUtzM2Y3bGNaM241LTFBTVZ1OVRPdVA3bnVkMC1vR21RdyIsInkiOiJuVUdoMkdKbndpWEpPMHRpSUZuRHg0cVpocVlfSUx3cDJvY2QyMmNEZ1VRIiwiY3J2IjoiUC0yNTYifX0.ro3R4INQjNwESyVmHuRi5KFOZzA9Y3NnYeBrtD-4O_igm4gjKcttDQ.q8y8pOJ94lKrLYYI_ZzD2A.lWjEwv91RlN75mzj7QvyD01iIJVfqfZbwitQHR3954TXpouDo3jhn8kJd1_ZkEPZGk1nsUY4DAs4s0on3VVbSA.-ORpbFs_7f_kFjmD5t7cLQ Additional details: [[20] Missing Integrity Protection] -18:11:47.587 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImtpZCI6ImVjMiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJxNkUxaEgza0gtZWVWakpOM293eC1KWDdBNERkazVlcDZkT0lYUXR6RlNVIiwieSI6Ikd5Zmw5cVVEM1I1UDhQb0t1MkF3RUJfczRuWnhqdUlONVVnbXZ3bGQ4N2siLCJjcnYiOiJQLTI1NiJ9fQ..2P-8gdRrFMAnhfE5y9tsFw.U56U9R6YjXAgUe7XKUtAdYwCsUuebjNdFmLgrOZp4R1AElYVNS6yrn1e9zRA600z4HlHTKBMovlfs7rtfQJUEg.S2Nf_QpXN73-TWkVA3bQpQ Additional details: [[20] Missing Integrity Protection] -18:11:47.652 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiNUQ0YW1GWnNrcG5jNi1VMnhQdXo4bmVVelJfTXJFdU1aNFVaSXktY0FiUSIsInkiOiJOcHBTelRVUHIwcV9HQXd5TXZ5T2hRYzc1OEJrb1ZxWDNqamNJTTBWQmxZIiwiY3J2IjoiUC0yNTYifX0.y8s0is33s5NNSeDMHevszyIaX_hqbOEA1AQAgjAXZxvfqiAt9AJlAZ40SNrgzcNYoZfiVjw2cGbsNHPi2054wHQ4XknLtvgO.5LpMaNOUIH8LJyi2AkTQaw.X7R-0lyR6b4ayHZZmnSZ6byb_Q45TOdh3Fw0CPVvNRseu_YBOBRbijkDWGTg16O4JZ_Ei0p6C0pJDPeE47VD7w.cTEOfurVJpcYDmvgbSo9geZKBegia05NwzCAFcJChl8 Additional details: [[20] Missing Integrity Protection] -18:11:47.714 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiR1h0RnhVUUt2RW0tdV9ZMHVkcVJ0N2tULWZad0U5SmdHVkoybFdDWGk2ayIsInkiOiJTNXVfQk5hM09lRVV3b1FWb3A2bi1EX0NhMUdMMFo4LXpKanpRLVo5UnBZIiwiY3J2IjoiUC0yNTYifX0.UIbYW2lPGchuKlnSe7ghJICl9_fQaEB8a_OA8ZpVB_E7umDet1C3VfPbD4Ufs-wdUrjp8QYSb94.mhjzeh4DtqjE2bi_i8UqHQ.ehR56W_u93IXYWaLpVNhdAaaI42BB2NlmwYq8qQJOGV1TX6ag0Gd_QMK-c3ep01RDzm4iyvQBfSvmIlBUejGrg.BqOcFkSMnQ1NA6iY2FlmHLSx8PFXgVf9 Additional details: [[20] Missing Integrity Protection] -18:11:47.818 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJyMi1iIn0.s2Qq42qoDFgJXdwTpgOW0yP4c5pNq1BUz1ZBtuu_M8cyyXCjcrshjrs3FNkMkIjZ2vZ-9-9Uz0CtxacSWf098TRSzTg_nqQqft5fsnx1eTYL8U8wkoVTjeIBPS5WrcPSSNBBmAH4Gr1IzzQmgahYZ4lxBpdlPDzZIH7sw2XWInuokcPnuR3cTKdedAc0dxOoXZaA1dPCG6LJ313UXdwLB9-SV3wHMkiMlb17yZ0loe2xPn1Y9xiYE7mIQD4r2kmWtfRW36NSoB6yT4BWqqK9jri3qNcD-QiJy8_kNU9yyP2InLtuT8JIhOs4PxcLXrWgsoBxWGCpYvahewF7z2C36A.62W2s4ecfkFWO6TWLDg_cw.opLw6b54Qnij9aAPCcIuaXzvsHdew_wZ2Ud6fP5XDefSh6u3KGYDqy48-wcEw86pBX3vZflzT1i3mtWBq-0aaw.d7ujTaFQJmBV0ipuSmLz2A Additional details: [[20] Missing Integrity Protection] -18:11:47.879 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJraWQiOiJyMi1iIn0.f36V0v4bZJLnthHtturxDGJH64iMUgNDTn0z7E5qsp2YBl70xDMCxKcnwTfqGk9e_i_eLOmQ-BxjAbz9IAhuujGqZTN3oBl0e2EasJJ4zErh2f7QKvrPKWPHy-8SDOrVliaBTErHjVZ5VpaodSJlFaB17ryLA6he4whxhckQzk0M3Te-1BrKRmmSr_Mqf-s3qqM3CGoQF09qYrv6B0HvYa3kDUTB72r6YNBn9vxmQHz9g4-IBsGtVVTtlwsXJoO6vg-tvF0NoDz_Eec5UQJXl1DdgGcWPs09CfIsWTE-xZ-Zq5oeJSdOxPlPMSXNUBvz9IeQRSvj2aUEoY98KC4jUw.PqIdqoP_CoRMUK19fqOyzQ.EgNJzy50lVyuHXPzWTy2-Mex3fL-zZjIRmgUrIrt3xmKYajTAC8KgDHEoYrPe6ecAZk-D4mc9GW6dFprHJQG3A.UkeiW0_-LD9v9s1xM8am5aYVqSHQnjvv Additional details: [[20] Missing Integrity Protection] -18:11:47.940 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJraWQiOiJyMi1iIn0.AUIV7toAq7KX3bx-L3__n4S2aNCRaSTV2_sBWi5TLNSQF3MuPM0usepZJYAPo30KBKVgzNVzWjcO02RI8SnEpFqb03AukpgXM6zgzyfcnLVFDm66hwQQ5PKw1OCmawupogXsWa4XN8ZmVTfd2A06t5SubfaWBPVV1By9ywh0FmXXs4RpCu8voVqhzU7HGmUNzD9ZRKLZ5Abcj5V4loGZgspPCjDmpAQzIRuVfNPgwycH1yMy7ybTF7Rb0rVQfuLxQamIlH3F4lFrKmlOfryu2mtmIY3Yd3NtU6h_dR0ZRhvk1zDeNjX8-s4eGaviVx_SBXp5qERdGKtXD-vJS7P2BQ.Rx95pUHJw08dcMYk9rtKsA.tBTmt_fxxMXjiB4DTtJavPRxt7H73LJtmii8wHimQtIz0EcUVjuvyg4eWXkqn2TJOfiaVU4bofxjpgMlOGYJPg.OWWdSfDngETtUMFkZ43ox-kGjVE8cTJ7sgbHkFADG64 Additional details: [[20] Missing Integrity Protection] -18:11:47.946 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"HS256","kid":"r2"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec5, x=AXMGXBHbh40fHRSbU9NRUIe9o3OW_HqkpeHx9cjMqpTFSy1taRCVe2cf3nkkt15DKCT6nm4PFqaykUm5vEptufRf, y=Abf3V08Sv06oazcCUk4FUI1Oa4EIZ9FT2D0MEXzYqI1cUz8VrjSEz0QTqp5muYY79e8Q66qg4u9GWhCjmofEB4ye, crv=P-521}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=512bits}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec2, x=JLNug5h71LW4AEStrGiN0J_9Z6jRVQpyZPyxrNctPII, y=r1fL5EuMuNS3Th7-ArEZwkBsRFbYTXybXB1yl640JS0, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, n=89rvFLpkQOlOiJKsxgvcCU7tiJa3fMny38zJA524f4Du4D6OpPMJ67GHvck1mLxibo5ToAQnYAAj5p7QvFr2RR7g3ztVhd9ZD680Rp9Ck2pG57gdn47CIIEwtf5s9uxrghX0KA6ybAfAmIhBnXdCWkPhFy-1JgFz80yaVamiojknffDMk6CVJTi7NrCqr6I0rRYjAtHR40xdTR98yRQSjHZc8bU1BmmoS8KeITJTKbJQTrnk6npu8g4TIQ_6mbbxPIF5vA2PiL4xXA1yDnQZV4mQCpNw13xMuy1JJTF8bgH61fmXoBiEco0Q4ZJbYZoVQrfctp3W6dcOk05y_1rDRQ, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec3, x=pu0KpVoSUzuNjNNTkM_Y9MN2H97kcerQ8HF6K18_neEi1s-_7yYXGikhf4dKXDMu, y=NJFoKg7UqWd6Y7OWtyVHYExVsC45x5mmrQT8Zyoh-jnaajcr11aOL0eiK-KJ4C8J, crv=P-384}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=128bits}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2-b, n=uHGJ7jKiRoX4Phlo_bUkoTAJmC4X0IZe70_hm9LDpIcVwpOpUzhqIWmmCfMvt6AcREYP6y28jyTbIbfvkLfZsyop1QQumPdpcbFN8FBPVEaJb-DYv9DUlKVztrjGD_nHXHQBXPy93HI0L0EOTppbQ1P8mwNSUUxnKsmkBDUiX4knGxuqS8E0pq-VLHfsYtRowxUgaKQrDYnctSVDrRGolW7VT-0dv-W3Odr5FN6_b0p0GRkSjKb5tYsB1sQ2ke4QPekfUGDGMrUb2rBLpZT7gL25_zu0tajLUkFFzHC0yRMrJBS0kV5RujJgE0wL0PV50ZuGfMrLKBm9n7veqnSxlQ, e=AQAB}]): JsonWebSignature{"alg":"HS256","kid":"r2"}->eyJhbGciOiJIUzI1NiIsImtpZCI6InIyIn0.eyJhdWQiOiJhIiwiaXNzIjoiaSIsImV4cCI6MTcyOTQ0ODUwNiwic3ViIjoicyJ9.QesuLx3o1HYg4S6EWKS_eP4EqSF4-mzRu1Uj4ZczK94] -18:11:47.954 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoicjItYiJ9.J02gRqcLOX4f8uzuMejrYHc4tIU-cPkATBbSTXlwnXkji7vAwTZ7J7WGLg9R329aZlp176F4p-Pm8v8DAZkpo8gzH1gDeDah7Vo9wIad8MJJy_1B0euTsUl8qVUo6k-5gyCg3yXllen-HmXh76s1wLozlAw3z3Ab12tktMNW3O372PJWXj5y2Lr9W_pFSYDWBQRgoI1p3Sf7Tll3w8Cq7eZ9ngH2BbnO0ayKXF0gDGXDbtsTEyB8C0DiG9H3ivrA859ZppknDG0BBfuv4WYW6tT5aBFNKu0HDrlfx04YF5Q-qMyJvtf4D2dBmuSrU2O6RHsmlOearrlrQML6Ocr4QQ.hd0S8SIt_3girGLLPg83gw.9HUQ3ZDJTi1VbRnOEpGiqqrIYciBAwutIPjAg0sXW6PrmU0Hgn391AaOYem6teoFxvAuJOq8Q7FqUcZfZkBUbg.Gr8Z-IIJPtE6-B6DWm5X2Q] -18:11:48.007 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoicjItYiJ9.J02gRqcLOX4f8uzuMejrYHc4tIU-cPkATBbSTXlwnXkji7vAwTZ7J7WGLg9R329aZlp176F4p-Pm8v8DAZkpo8gzH1gDeDah7Vo9wIad8MJJy_1B0euTsUl8qVUo6k-5gyCg3yXllen-HmXh76s1wLozlAw3z3Ab12tktMNW3O372PJWXj5y2Lr9W_pFSYDWBQRgoI1p3Sf7Tll3w8Cq7eZ9ngH2BbnO0ayKXF0gDGXDbtsTEyB8C0DiG9H3ivrA859ZppknDG0BBfuv4WYW6tT5aBFNKu0HDrlfx04YF5Q-qMyJvtf4D2dBmuSrU2O6RHsmlOearrlrQML6Ocr4QQ.hd0S8SIt_3girGLLPg83gw.9HUQ3ZDJTi1VbRnOEpGiqqrIYciBAwutIPjAg0sXW6PrmU0Hgn391AaOYem6teoFxvAuJOq8Q7FqUcZfZkBUbg.Gr8Z-IIJPtE6-B6DWm5X2Q Additional details: [[20] Missing Integrity Protection] -18:11:48.048 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no encryption but the JWT Consumer is configured to require it: eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk Additional details: [[19] No encryption.] -18:11:48.049 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no encryption but the JWT Consumer is configured to require it: eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk Additional details: [[19] No encryption.] -18:11:48.053 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value.] -18:11:48.054 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] doesn't contain an acceptable identifier. Expected example.org as an aud value.] -18:11:48.054 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] doesn't contain an acceptable identifier. Expected one of [example.org, nada, nope] as an aud value.] -18:11:48.055 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[7] No Audience (aud) claim present.] -18:11:48.055 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[7] No Audience (aud) claim present.] -18:11:48.056 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", "usa.org", "ca.ca"]}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com, usa.org, ca.ca] doesn't contain an acceptable identifier. Expected example.org as an aud value.] -18:11:48.056 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", "usa.org", "ca.ca"]}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com, usa.org, ca.ca] doesn't contain an acceptable identifier. Expected one of [example.org, some.other.junk] as an aud value.] -18:11:48.062 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", 47, false]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The array value of the 'aud' claim contains non string values (47 - class java.lang.Long cannot be cast to class java.lang.String (java.lang.Long and java.lang.String are in module java.base of loader 'bootstrap'))] -18:11:48.063 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":20475}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'aud' claim is not an array of strings or a single string value.] -18:11:48.063 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":{"aud":"example.org"}}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'aud' claim is not an array of strings or a single string value.] -18:11:48.074 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.JwtConsumerTest$4: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:919); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:913); ...omitted...] -18:11:48.075 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.JwtConsumerTest$4: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:919); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:913); ...omitted...] -18:11:48.080 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"name":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[14] No Subject (sub) claim is present.] -18:11:48.081 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":724729}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'sub' claim is not the expected type (724729 - Cannot cast java.lang.Long to java.lang.String)] -18:11:48.081 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":{"values":["one", "2"]}}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'sub' claim is not the expected type ({values=[one, 2]} - Cannot cast org.jose4j.json.JsonUtil$DupeKeyDisallowingLinkedHashMap to java.lang.String)] -18:11:48.115 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits).): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJhY2MiLCJjdHkiOiJKV1QifQ.KrukndaF2sHb3Y0r311rrYmCrXco-99ZIQ3iLjvCVbbow5MppRTK4DPJUShcndfcIVIFXMYSLGvIJwf39yZRJJ_EvBFnqhOUeCAsUHLGO1yxoQ619jmSh4bCaIicLYeivKaVSQN4Ezc5fvg-Nnv6TBIIgHuWMDU2Ztd96DJRokc.wMg2Eb8izCOUnACqdrcPQA.quFKSN7xQoMJzaYFBVwykQZ8zB3hpW8HtK7pm-4Ggzorno_K-eBQ7fXjRmJ1Jw-kCcmUa8flpnQqpL9jurtlz7DC1ABe0vm2ZkHoJluB6QeSr60Y9rP7kyy_rd3blXT_7t6Wgowo8MumXrrUUxxEQJgXvCmKbd-Rw9sK5jAHEug3zztLXHOX0O0QoxDzTJOsSRtodsu7bTJa-ADvPmK9e0Xp06NRqvx7WuJGKlq3cwQ.DL6yaCdiOUcViN-eZVIwOA] -18:11:48.476 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1729447848,"sub":"s","nbf":1729447728}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1729447908 -> Oct 20, 2024, 6:11:48?PM GMT} is on or after the Expiration Time (exp=NumericDate{1729447848 -> Oct 20, 2024, 6:10:48?PM GMT}) claim value.] -18:11:48.479 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1729447848,"sub":"s"}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1729447908 -> Oct 20, 2024, 6:11:48?PM GMT} is on or after the Expiration Time (exp=NumericDate{1729447848 -> Oct 20, 2024, 6:10:48?PM GMT}) claim value.] -18:11:48.483 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1729449108,"sub":"s","nbf":1729448148}) rejected due to invalid claims or other invalid content. Additional details: [[6] The JWT is not yet valid as the evaluation time NumericDate{1729447908 -> Oct 20, 2024, 6:11:48?PM GMT} is before the Not Before (nbf=NumericDate{1729448148 -> Oct 20, 2024, 6:15:48?PM GMT}) claim time.] -18:11:48.487 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 128 bits): JsonWebSignature{"kid":"esc","alg":"HS256"}->eyJraWQiOiJlc2MiLCJhbGciOiJIUzI1NiJ9.eyJhdWQiOiJhIiwiaXNzIjoiaSIsImV4cCI6MTQzMjMyNTQ5Niwic3ViIjoicyIsIm5iZiI6MTQzMjMyNDgzNn0.16LpzAZyBcokZ4aUaXHn5yN0xQ1zpmLyJVFHu6nH1zY] -18:11:48.512 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] 9223372036854775808 is unreasonable for a NumericDate] -18:11:48.534 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":25113002000004770000,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] 25113002000004770000 is unreasonable for a NumericDate] -18:11:48.557 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775809,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] -9223372036854775809 is unreasonable for a NumericDate] -18:11:48.579 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-77261600013501300000000,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] -77261600013501300000000 is unreasonable for a NumericDate] -18:11:48.601 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{9223372036854775807} is more than 2147483647 second(s) ahead of now NumericDate{9223372036854775 -> Aug 17, 292278994, 7:12:55?AM GMT}.] -18:11:48.643 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775 = 9214148664817921033 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] -18:11:48.686 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775807 = 1 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] -18:11:48.728 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775807 = 1 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] -18:11:48.750 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{9223372036854775807} is more than 10 second(s) ahead of now NumericDate{0 -> Jan 1, 1970, 12:00:00?AM GMT} (even when providing 2147483647 seconds of leeway to account for clock skew).] -18:11:48.788 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 2147483647 = 9223372034707292161 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] -18:11:49.324 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[-76717] You can go blind issuing tokens to yourself...] -18:11:49.325 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[-76717] You can go blind issuing tokens to yourself...] -18:11:49.665 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1729447849,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1729447909 -> Oct 20, 2024, 6:11:49?PM GMT} is on or after the Expiration Time (exp=NumericDate{1729447849 -> Oct 20, 2024, 6:10:49?PM GMT}) claim value.] -18:11:49.681 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[15] Subject (sub) claim value (d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea) doesn't match expected value of NOOOOOOOOOOOOOOOOPE] -18:11:49.688 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [R-RufjSDVGCGfdTmIobf2Q] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value.] -18:11:49.691 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [R-RufjSDVGCGfdTmIobf2Q] doesn't contain an acceptable identifier. Expected one of [no, nope, no way jose] as an aud value.] -18:11:49.693 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject", "iss":"issuer", "aud":"audience"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [audience] doesn't contain an acceptable identifier. Expected nope as an aud value., [12] Issuer (iss) claim value (issuer) doesn't match expected value of no way, [13] The JWT ID (jti) claim is not present.] -18:11:49.861 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1729448509,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [AUD] doesn't contain an acceptable identifier. Expected nope as an aud value.] -18:11:49.863 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1729448509,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (ISS) doesn't match expected value of no way] -18:11:49.868 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1729448509,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [AUD] doesn't contain an acceptable identifier. Expected nope as an aud value., [12] Issuer (iss) claim value (ISS) doesn't match expected value of no way, [5] The Expiration Time (exp=NumericDate{1729448509 -> Oct 20, 2024, 6:21:49?PM GMT}) claim value cannot be more than 5 minutes in the future relative to the evaluation time NumericDate{1729447909 -> Oct 20, 2024, 6:11:49?PM GMT}.] -18:11:49.873 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJleHAiOjE3Mjk0NDg1MDksImlzcyI6IklTUyIsImF1ZCI6IkFVRCIsInN1YiI6IlNVQiJ9.NGns23fwIfHwxj0tDsFcFuzrlZYopHMWm5gaUzZyNdAwfLU3n_idriThNBjcA2Y68-3cw6IJs9sGmPlNVmXOtEG5n5DrjjmMLCpoeBvLmKW_sCPM35Dx62ZCoi4_QlfZvOVoSfzR9i7_9QwAmpRiPYBFLC3SVH2exH3Cr3FKIKqADeOf3yo86w22JaftSRcpA0I1wVOGvCvrw2EfO1nFuhl5g7Wp1Jl1aRnmYPo9v656Dq_zfmdNY8W9yGeuNXnpPTx4gXeQ2GbXS95vBzansM769TPtNaEC_kaQxzYMdPmc1MkAwqFcw6RQ6Qfv4JUwKs19XGwAuWLN8vT6djTODw] -18:11:50.043 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.KHTreKSlRo8RYUTOTmPYApP6dbNIkl4dzJX15Otbnj6KHpTvYeQAk07XA3RlXpARlZLl8eKABl-Z0jt4FREo966GizZrXxi0TehG1UjeWOW1GWOuEgCaZMhoT5y6A0QN1ow6fNmbLdWLSWiF-OhzurHv6pH0GHxygkYek_d42Ak9_KsSNHuP82UdhGEX1pHe7LkId9Pd-bwD1pCWzHAepVTUb5Q0spdehn4w8aj4_9wAob5wGVh4YjkRhf4DYWvWlZF83HL2GxURbcgQFKKY7p-pCc1yzMActvQD6ateIAulOkVTs0iKzHocpU8DQ9MiHiTajN6KxGndPqY4P8GNlQ.pvCoxtjF6pET2oA-dcHpwg.sstOXX6Tp4BgVczcNBUcy3aydjj_fJJNU3k49si_WvLD3FEgndV5ASgguvP_M6sPhNjI8jH_C0eQGuX8pOdB8Q.q3Z6WKfojqPghTKQJCtexg Additional details: [[10] Missing signature.] -18:11:50.050 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[17] You can go blind issuing tokens to yourself...] -18:11:50.050 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[17] You can go blind issuing tokens to yourself...] -18:11:50.096 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":-1239223372036854775808,"iat":1571322100,"exp":9223372036854775807,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] -1239223372036854775808 is unreasonable for a NumericDate] -18:11:50.118 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":1571322100,"iat":12345678900000000000,"exp":12345678900000000009,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] 12345678900000000009 is unreasonable for a NumericDate] -18:11:50.139 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":1571322100,"iat":1571322111,"exp":157132210009188371766311111,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] 157132210009188371766311111 is unreasonable for a NumericDate] -18:11:50.162 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{9223372036854775807}) claim value cannot be more than 2147483647 minutes in the future relative to the evaluation time NumericDate{9223371903710789693} (even when providing 2147483647 seconds of leeway to account for clock skew).] -18:11:50.186 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":-1,"exp":9223372036854775802,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow adding: 9223372036854775792 + 30 = -9223372036854775794 at org.jose4j.lang.Maths.add(Maths.java:13); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:143); ...omitted...] -18:11:50.211 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1572322100,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854774808 - 6000 = 9223372036854770808 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:113); ...omitted...] -18:11:50.234 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":-9223372036854775798,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775798 - 65 = 9223372036854775753 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:131); ...omitted...] -18:11:50.257 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: 9223372036854775807 - -10 = -9223372036854775799 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:131); ...omitted...] -18:11:50.262 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=QsGX3JhHP1Pwy4zQ8Ha9FQ): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..zWNzKpA-QA0BboVl02nz-A.eyJpc3MiOiJtZSIsImF1ZCI6Im1lIiwiZXhwIjoxNDIwMjMxNjA2LCJuYW1lIjoidmFsdWUifQ.QsGX3JhHP1Pwy4zQ8Ha9FQ] -18:11:50.263 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=QsGX3JhHP1Pwy4zQ8Ha9FQ): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..zWNzKpA-QA0BboVl02nz-A.u1D7JCpDFeRl69G1L-h3IRrmcOXiWLnhr23ugO2kkDqKVNcO1YQ4Xvl9Sag4aYOnkqUbqe6Wdz8KK3d9q178tA.QsGX3JhHP1Pwy4zQ8Ha9FQ] -18:11:50.367 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.g_hEwksO1Ax8Qn7HoN-BVeBoa8FXe0kpyk_XdcSmxvcM5_P296JXXtoHISr_DD_MqewaQSH4dZOQHoUgKLeFly-9RI11TG-_Ge1bZFazBPwKC5lJ6OLANLMd0QSL4fYEb9ERe-epKYE3xb2jfY1AltHqBO-PM6j23Guj2yDKnFv6WO72tteVzm_2n17SBFvhDuR9a2nHTE67pe0XGBUS_TK7ecA-iVq5COeVdJR4U4VZGGlxRGPLRHvolVLEHx6DYyLpw30Ay9R6d68YCLi9FYTq3hIXPK_-dmPlOUlKvPr1GgJzRoeC9G5qCvdcHWsqJGTO_z3Wfo5zsqwkxruxwA.UmVkbW9uZCBXQSA5ODA1Mg.VwHERHPvCNcHHpTjkoigx3_ExK0Qc71RMEParpatm0X_qpg-w8kozSjfNIPPXiTBBLXR65CIPkFqz4l1Ae9w_uowKiwyi9acgVztAi-pSL8GQSXnaamh9kX1mdh3M_TT-FZGQFQsFhu0Z72gJKGdfGE-OE7hS1zuBD5oEUfk0Dmb0VzWEzpxxiSSBbBAzP10l56pPfAtrjEYw-7ygeMkwBl6Z_mLS6w6xUgKlvW6ULmkV-uLC4FUiyKECK4e3WZYKw1bpgIqGYsw2v_grHjszJZ-_I5uM-9RA8ycX9KqPRp9gc6pXmoU_-27ATs9XCvrZXUtK2902AUzqpeEUJYjWWxSNsS-r1TJ1I-FMJ4XyAiGrfmo9hQPcNBYxPz3GQb28Y5CLSQfNgKSGt0A4isp1hBUXBHAndgtcslt7ZoQJaKe_nNJgNliWtWpJ_ebuOpEl8jdhehdccnRMIwAmU1n7SPkmhIl1HlSOpvcvDfhUN5wuqU955vOBvfkBOh5A11UzBuo2WlgZ6hYi9-e3w29bR0C2-pp3jbqxEDw3iWaf2dc5b-LnR0FEYXvI_tYk5rd_J9N0mg0tQ6RbpxNEMNoA9QWk5lgdPvbh9BaO195abQ.AVO9iT5AV4CzvDJCdhSFlQ] -18:11:50.369 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.g_hEwksO1Ax8Qn7HoN-BVeBoa8FXe0kpyk_XdcSmxvcM5_P296JXXtoHISr_DD_MqewaQSH4dZOQHoUgKLeFly-9RI11TG-_Ge1bZFazBPwKC5lJ6OLANLMd0QSL4fYEb9ERe-epKYE3xb2jfY1AltHqBO-PM6j23Guj2yDKnFv6WO72tteVzm_2n17SBFvhDuR9a2nHTE67pe0XGBUS_TK7ecA-iVq5COeVdJR4U4VZGGlxRGPLRHvolVLEHx6DYyLpw30Ay9R6d68YCLi9FYTq3hIXPK_-dmPlOUlKvPr1GgJzRoeC9G5qCvdcHWsqJGTO_z3Wfo5zsqwkxruxwA.UmVkbW9uZCBXQSA5ODA1Mg.VwHERHPvCNcHHpTjkoigx3_ExK0Qc71RMEParpatm0X_qpg-w8kozSjfNIPPXiTBBLXR65CIPkFqz4l1Ae9w_uowKiwyi9acgVztAi-pSL8GQSXnaamh9kX1mdh3M_TT-FZGQFQsFhu0Z72gJKGdfGE-OE7hS1zuBD5oEUfk0Dmb0VzWEzpxxiSSBbBAzP10l56pPfAtrjEYw-7ygeMkwBl6Z_mLS6w6xUgKlvW6ULmkV-uLC4FUiyKECK4e3WZYKw1bpgIqGYsw2v_grHjszJZ-_I5uM-9RA8ycX9KqPRp9gc6pXmoU_-27ATs9XCvrZXUtK2902AUzqpeEUJYjWWxSNsS-r1TJ1I-FMJ4XyAiGrfmo9hQPcNBYxPz3GQb28Y5CLSQfNgKSGt0A4isp1hBUXBHAndgtcslt7ZoQJaKe_nNJgNliWtWpJ_ebuOpEl8jdhehdccnRMIwAmU1n7SPkmhIl1HlSOpvcvDfhUN5wuqU955vOBvfkBOh5A11UzBuo2WlgZ6hYi9-e3w29bR0C2-pp3jbqxEDw3iWaf2dc5b-LnR0FEYXvI_tYk5rd_J9N0mg0tQ6RbpxNEMNoA9QWk5lgdPvbh9BaO195abQ.AVO9iT5AV4CzvDJCdhSFlQ] -18:11:50.369 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidKeyException: Key cannot be null): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.cC4hiUPoj9Eetdgtv3hF80EGrhuB__dzERat0XF9g2VtQgr9PJbu3XOiZj5RZmh7AAuHIm4Bh-0Qc_lF5YKt_O8W2Fp5jujGbds9uJdbF9CUAr7t1dnZcAcQjbKBYNX4BAynRFdiuB--f_nZLgrnbyTyWzO75vRK5h6xBArLIARNPvkSjtQBMHlb1L07Qe7K0GarZRmB_eSN9383LcOLn6_dO--xi12jzDwusC-eOkHWEsqtFZESc6BfI7noOPqvhJ1phCnvWh6IeYI2w9QOYEUipUTI8np6LbgGY9Fs98rqVt5AXLIhWkWywlVmtVrBp0igcN_IoypGlUPQGe77Rw] -18:11:50.370 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.g_hEwksO1Ax8Qn7HoN-BVeBoa8FXe0kpyk_XdcSmxvcM5_P296JXXtoHISr_DD_MqewaQSH4dZOQHoUgKLeFly-9RI11TG-_Ge1bZFazBPwKC5lJ6OLANLMd0QSL4fYEb9ERe-epKYE3xb2jfY1AltHqBO-PM6j23Guj2yDKnFv6WO72tteVzm_2n17SBFvhDuR9a2nHTE67pe0XGBUS_TK7ecA-iVq5COeVdJR4U4VZGGlxRGPLRHvolVLEHx6DYyLpw30Ay9R6d68YCLi9FYTq3hIXPK_-dmPlOUlKvPr1GgJzRoeC9G5qCvdcHWsqJGTO_z3Wfo5zsqwkxruxwA.UmVkbW9uZCBXQSA5ODA1Mg.VwHERHPvCNcHHpTjkoigx3_ExK0Qc71RMEParpatm0X_qpg-w8kozSjfNIPPXiTBBLXR65CIPkFqz4l1Ae9w_uowKiwyi9acgVztAi-pSL8GQSXnaamh9kX1mdh3M_TT-FZGQFQsFhu0Z72gJKGdfGE-OE7hS1zuBD5oEUfk0Dmb0VzWEzpxxiSSBbBAzP10l56pPfAtrjEYw-7ygeMkwBl6Z_mLS6w6xUgKlvW6ULmkV-uLC4FUiyKECK4e3WZYKw1bpgIqGYsw2v_grHjszJZ-_I5uM-9RA8ycX9KqPRp9gc6pXmoU_-27ATs9XCvrZXUtK2902AUzqpeEUJYjWWxSNsS-r1TJ1I-FMJ4XyAiGrfmo9hQPcNBYxPz3GQb28Y5CLSQfNgKSGt0A4isp1hBUXBHAndgtcslt7ZoQJaKe_nNJgNliWtWpJ_ebuOpEl8jdhehdccnRMIwAmU1n7SPkmhIl1HlSOpvcvDfhUN5wuqU955vOBvfkBOh5A11UzBuo2WlgZ6hYi9-e3w29bR0C2-pp3jbqxEDw3iWaf2dc5b-LnR0FEYXvI_tYk5rd_J9N0mg0tQ6RbpxNEMNoA9QWk5lgdPvbh9BaO195abQ.AVO9iT5AV4CzvDJCdhSFlQ] -18:11:50.373 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.cC4hiUPoj9Eetdgtv3hF80EGrhuB__dzERat0XF9g2VtQgr9PJbu3XOiZj5RZmh7AAuHIm4Bh-0Qc_lF5YKt_O8W2Fp5jujGbds9uJdbF9CUAr7t1dnZcAcQjbKBYNX4BAynRFdiuB--f_nZLgrnbyTyWzO75vRK5h6xBArLIARNPvkSjtQBMHlb1L07Qe7K0GarZRmB_eSN9383LcOLn6_dO--xi12jzDwusC-eOkHWEsqtFZESc6BfI7noOPqvhJ1phCnvWh6IeYI2w9QOYEUipUTI8np6LbgGY9Fs98rqVt5AXLIhWkWywlVmtVrBp0igcN_IoypGlUPQGe77Rw] -18:11:50.375 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JWT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"129ffs904","iss":"I?m sorry, this is our family?s first kidnapping.","aud":"ap.io/","exp":1702498218}] -18:11:50.376 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"jwt"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"1234","iss":"abcd","aud":"https://example.com/as","iat":1702497918,"exp":1702498218}] -18:11:50.377 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JWT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"0","iss":"ctyortyp","aud":"audiencia","exp":1702498218}] -18:11:50.378 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JWT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"2","iss":"ctyortyp","aud":"to.whom.it.may.concern","exp":1702499888}] -18:11:50.378 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JwT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"42","iss":"ctyortyp","aud":"to.whom.it.may.concern...","exp":1702599888}] -JWT Claims Set:{exp=1729448210, sub=subject, iss=issuer} -18:11:50.387 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[2] No Expiration Time (exp) claim present.] -18:11:50.388 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[3] No Issued At (iat) claim present.] -18:11:50.388 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[4] No Not Before (nbf) claim present.] -18:11:50.390 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value.] -18:11:50.392 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value.] -18:11:50.394 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value (even when providing 1 seconds of leeway to account for clock skew).] -18:11:50.396 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value (even when providing 2 seconds of leeway to account for clock skew).] -18:11:50.399 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602065 -> May 2, 2015, 9:27:45?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value.] -18:11:50.401 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602065 -> May 2, 2015, 9:27:45?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value (even when providing 60 seconds of leeway to account for clock skew).] -18:11:50.403 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[6] The JWT is not yet valid as the evaluation time NumericDate{1430601999 -> May 2, 2015, 9:26:39?PM GMT} is before the Not Before (nbf=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim time.] -18:11:50.406 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430603000, "iat":1430602060, "exp":1430602600 }) rejected due to invalid claims or other invalid content. Additional details: [[17] The Expiration Time (exp=NumericDate{1430602600 -> May 2, 2015, 9:36:40?PM GMT}) claim value cannot be before the Not Before (nbf=NumericDate{1430603000 -> May 2, 2015, 9:43:20?PM GMT}) claim value.] -18:11:50.408 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430602000, "iat":1430602660, "exp":1430602600 }) rejected due to invalid claims or other invalid content. Additional details: [[17] The Expiration Time (exp=NumericDate{1430602600 -> May 2, 2015, 9:36:40?PM GMT}) claim value cannot be before the Issued At (iat=NumericDate{1430602660 -> May 2, 2015, 9:37:40?PM GMT}) claim value.] -18:11:50.410 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430607201}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{1430607201 -> May 2, 2015, 10:53:21?PM GMT}) claim value cannot be more than 90 minutes in the future relative to the evaluation time NumericDate{1430600000 -> May 2, 2015, 8:53:20?PM GMT}.] -18:11:50.412 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430607201}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{1430607201 -> May 2, 2015, 10:53:21?PM GMT}) claim value cannot be more than 120 minutes in the future relative to the evaluation time NumericDate{1430600000 -> May 2, 2015, 8:53:20?PM GMT}.] -18:11:50.416 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: This VerificationKeyResolver always throws this exception.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJzdWIiOiJtZSIsImV4cCI6MTcyOTQ0ODIxMCwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.] -18:11:50.418 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJzdWIiOiJtZSIsImV4cCI6MTcyOTQ0ODIxMCwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.] -18:11:50.968 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Can't do it!): JsonWebSignature{"typ":"JWT", +18:22:22.667 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322039,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{1571322039 -> Oct 17, 2019, 2:20:39?PM GMT} is more than 60 second(s) in the past.] +18:22:22.768 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1570321001,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{1570321001 -> Oct 6, 2019, 12:16:41?AM GMT} is more than 60 second(s) in the past.] +18:22:22.879 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":12345,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{12345 -> Jan 1, 1970, 3:25:45?AM GMT} is more than 60 second(s) in the past.] +18:22:22.981 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":0,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{0 -> Jan 1, 1970, 12:00:00?AM GMT} is more than 60 second(s) in the past.] +18:22:23.083 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-938763,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{-938763 -> Dec 21, 1969, 3:13:57?AM GMT} is more than 60 second(s) in the past.] +18:22:23.187 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-2147483736,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{-2147483736 -> Dec 13, 1901, 8:44:24?PM GMT} is more than 60 second(s) in the past.] +18:22:23.290 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322101,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322101 -> Oct 17, 2019, 2:21:41?PM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] +18:22:23.392 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322177,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322177 -> Oct 17, 2019, 2:22:57?PM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] +18:22:23.495 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":2147483647,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{2147483647 -> Jan 19, 2038, 3:14:07?AM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] +18:22:23.598 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":7700000007,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{7700000007 -> Jan 2, 2214, 8:53:27?AM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] +18:22:23.869 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571321979,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{1571321979 -> Oct 17, 2019, 2:19:39?PM GMT} is more than 120 second(s) in the past.] +18:22:24.101 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322111,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322111 -> Oct 17, 2019, 2:21:51?PM GMT} is more than 10 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] +18:22:24.245 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"issuer.example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (issuer.example.com) doesn't match expected value of nope.example.com] +18:22:24.247 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] +18:22:24.251 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":["issuer1", "other.one", "meh"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'iss' claim is not the expected type ([issuer1, other.one, meh] - Cannot cast java.util.ArrayList to java.lang.String)] +18:22:24.253 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":["issuer1", "nope.not"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'iss' claim is not the expected type ([issuer1, nope.not] - Cannot cast java.util.ArrayList to java.lang.String)] +18:22:24.256 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https://accounts.google.com"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (https://accounts.google.com) doesn't match expected value of one of [nope.google.com, https://fake.google.com]] +18:22:24.259 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"x"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (x) doesn't match expected value of one of [a, b, c, d, e]] +18:22:24.262 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] +18:22:24.263 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] +18:22:24.265 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] +18:22:24.267 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] +18:22:24.280 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] +18:22:24.281 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] +18:22:24.285 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] +18:22:24.287 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] +18:22:24.312 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: JWS Plaintext (alg=none) must not use a key.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] +18:22:24.313 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: JWS Plaintext (alg=none) must not use a key.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] +18:22:24.316 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] +18:22:24.318 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] +18:22:42.858 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiUk5ndXliQWY2YXJmRzVXVUhwVnhrblZHdkpVS0hUdXRyMENVOXVmUEUtVSIsInkiOiIwaTdPbkhuVk1pT09ualBEeUVwUzFBamNFV29fWHJFWWthRkVMNGZ6dUs0IiwiY3J2IjoiUC0yNTYifX0.XbdNfaAOYq70YOfZ7cCPHQe7QtfSdsyU9iuco_-zaWI_QQETb0ak6w.k_jUuMTUXkus4RdGaq8KiQ.cPND5vtITk3MMXNIh65wEB0TV3cbyAexMYIf0Amis-Z1_zCgvQo_oMVzEkZ2Adm5w_caGMtjc4X6TcceCrKotg.1j_KNvbUVzzQBCthCYhh5A Additional details: [[20] Missing Integrity Protection] +18:22:42.965 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImtpZCI6ImVjMiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJseHBDcXhxNWZGcmFuaV9IU2hSTTZOcUZVZ2lQQ2s3RVlUMzlkREJURWlVIiwieSI6ImtjWFBoUkpISXhzS0c0TUNGdmtSb0E4SGJmOTh6bFBOaFpDc2YydWJlSFUiLCJjcnYiOiJQLTI1NiJ9fQ..yIKA-Wi8K80rX33KoiB7kQ.LigcWS84zEY-0d54kz9mPKRbpjvult-ISae5l0qB2fo1iNQdHLHD9Cw--tonk5H5sbLAQ6dUvRjefO0I6AqC1w.t9_PnDXQu4_-bMjJyryV6g Additional details: [[20] Missing Integrity Protection] +18:22:43.085 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiaWFYMnpkbVVOM05LVS1pY1VoVWRSbXNzbGMwOGRiNkhURU5LTTFyd19HdyIsInkiOiJuaFczVTRGLW9QeXlGc2JVNDhFRzVraGlQaWl5Mi14UmlfbGlET0Z0WXNJIiwiY3J2IjoiUC0yNTYifX0.RFieO8xltth_IYZ-fbbdoK3F8kfL3hmCeMcgVkVMRG_qNjfQFdVPg8U2iGcjn8e78HLx9PH3lsbciX_ODePTRWkAtrkRuuwy.Wl7Ie_wi9rxNTeCsYA4KAA.u3zNqSM76Ox-KirZj9910ohKLIrNT_QGlh7EEgxhbA5IKmlXygnu531Y05kDHiOcV1e0m7NJLD2paVsXGBX1Tg.LiPNgxugYZGl346B5OU0oGisk4PYwmE6vIRABjYe0Fk Additional details: [[20] Missing Integrity Protection] +18:22:43.212 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiSnBNVjB3Vjg5eDd4Z1hrMVVCdE82UjBVVGN5c25vTnRWN3hMdC0xS0F3RSIsInkiOiJGbzZzQzB1RTRkczYwYm95YTFXMGhCV095eFB0TG94VEtVbUJ6b3dpeXQ0IiwiY3J2IjoiUC0yNTYifX0.f3c-EkD1yDknx2oF2pwLu6jwZDBt4AJqz5ggdolYvrarOS0v0r5FiR8DVCtcW1RR_2UKGD8icck.Q6RyiibuI4Er464P-NvoVQ.cYbJvanz6jCyEKdzBO2u5bTMCEW2hYF7PNbqe9XHXx8PxN4OpL5_JxYF0WAdi7e4BsTEHv-yi366B4bWX1bEwg.RxYV_MA3OKuy5NG5PDWKeVybXiQMDLPV Additional details: [[20] Missing Integrity Protection] +18:22:43.459 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJyMi1iIn0.thltjCj6M-X4Y18RxqY0prfWtxqJEJVi32kX3nXggqDpx7bWkOv7M6Cah_R30yTBun82e33cC4Qo_F3wPTMk18FPpXTgVF4rc4TrUXu9TEfKthBchG01ulXnIh3NYnErOzQucQXVtyiHbP5uVVYl9VOEquqCTPPp2xewXVzKLTNKG-5OVVyS2HEZ03z2LErWPwjy39JG4cKfyYRK8aZanKk9ZxXhFA6ZtDG2VeWnpdF4fMueAbMrL9dBnMHfoVGsFm7Dk5lPeMnLUw-LBKgglEpFGappkCxf9kX7kDQtIjsF8pd6J6TqPrUchmvR_CbHjxtBQLap2y8cSsRbmXL3BQ.InUqNdBFFwwJhS92KStNBA.2I6A0d1LB6_aGKc0CC-ftv51l457FSkhM2Q8cOtuw9MNvVLHuVGrO8Bm8nMFg2Toyx9kIHUcRXphpUvuVJOUXQ.puiu4pUSdXPizakI95jMjQ Additional details: [[20] Missing Integrity Protection] +18:22:43.630 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJraWQiOiJyMi1iIn0.MEmyWWYVyFSxtlJlpYloHoNao7hDAxO3LVWaJcs3BWYFlP5j8Qd6lVol4Pza1LNtgH5GmxIX4bFrpCdglSxwlHb1MNQexVrfrgb4V2FMO_V-4NeZAY9AFFIsxjAN61T3-g5c_1ux9U0DeYAJz_cEpOcPXGzn53iiP53t3htBYCr587bEC3EN4qxpStTcBm-lAgJlrXML1o2vUDgsAB5NUpnB4a5PHZ6fOuEL2yypkvbLi-xvFfCBQfCIT6Feo16yGJVQAbpjfSaAD_pqK7kAmzrqQdXBWG0Hdz_5frfsqIosSNrm9mtXgCvfyZ_zEbzj6yQ9LM2jD-urX_x5dZNCnQ.0B0JzeWCEKCC7k9kQO5eAw._Cp7il3lN5zhli9UHU--On3U7xKLy7jclWA2OyLVGbppy55SvLBEbnsosSm2ervbx6znbjio-zQJIKaUsucKLQ.g1NvFHJhRGbLEVEzhkgrcBZsrqNDBA9j Additional details: [[20] Missing Integrity Protection] +18:22:43.790 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJraWQiOiJyMi1iIn0.iLclycHYPHKQZ42f_5fjWEliCO_k47OAqJxHtDeyQ6UXQlQXw-hL6AwGhNssHQFN3JgFa8OY92-nOQr-Vd3zWDpvzt-0lbkQJp_CGYtr0NnbiqUSTLXpq_-r_GmVsmHcJCDBVDJYKlbj27haO1O-p3tNv5eAPHHPJw5e6-BQtOwQPlXKnkPXMpIB-UbGBc4kFLrkErM1uUxY7soZblCmU7FYbFb4LpZBN96mYcE-N1bRbA8uJk35tOK7bEAK_xOGOSDrCLLp9DvFDrbeezoo_pbrwD2y4EGo2SxzT5bxKG58B7lLH5MHDeEcoMTTCodpW5i9H_oDuA6Ac8qn9uVtvA.ZVp7NX1iKtKcjQEwGyXe3g.I0M2APrGnNxFh1ht8g10kZxR2jnQf4HqgbnekNW__ZhUFhBHAWRY_VTrd6yd5zGNeHSyoGjVVymUnxmMsJxkzQ.Pf-JH5_bu8nckuhJbaNOaM71XQc2wAsvKkpEFv4GjbM Additional details: [[20] Missing Integrity Protection] +18:22:43.801 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"HS256","kid":"r2"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec5, x=AH7JrjTkbPLPTri6vH8uox-zWhiUy3WEqZq482khXoUg_SBN-rIqOVxjQ5UiowWVN-qZJhT_X2FCKUVdCpLsnaJG, y=AD-wDuf9MN_9JKrEx_QTP7AwJwrQSZ1xfVnwUlqpLaZkL8_dSgUHOZHZyDHjskd4KvdbhpGrZm9y92JATp43iBRS, crv=P-521}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=512bits}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec2, x=kc0d96j_jEkk7mV4iNc3Vlqf2a04KXGO7a3o_Ejwk3k, y=GeIPRC5isRX1kpfgq4gpFOKQlVQbK3lDMAjG9Yi0tYs, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, n=pRYzdVlyNCEENCGEvPAQicaKj-OqiE9s6O4KCW1QrzHQuNROv0-ckWnt0bUWbNRWNRigbyIMGg1NFJu6hUyM2MNE0P5FIYPBibQ1J6OxroBydRGYp_Xr1jNuOfAuuyHVfuJt2LCW24NRx9tpzFXCUlDx6Bjpw5FOi7KbAGV9kh6jb7_gh8p7_ol3ZGowkHNhyZb41rbPSMezcT0uwWlMEbSJ_0qPPKJQcINvQe8jl75LKNqAjJVypfHka47zO5pamS_iGxwAWAI-_igONJ40ZeeyGJLUcjKooEaeYPhU_mTh8rWR_f0_fYsJZXhoQKbW5572gnfaz6k74UUhVQOPdw, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec3, x=t0FLiKU9Oaq97XHNAoYqprHUpT7tBogZqYgOupzuEBu1cMNfDhFI5PEv4bORDYFn, y=vQt5RmeqzYImJ4IS7vsUXGWEgOLjX3uTUuP0AWsLnmbpT6CwW__XHncuGp9oNtBw, crv=P-384}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=128bits}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2-b, n=uBsV8ozE0cTJOn4SfUsKGUttaz9w40yB5HqcdKRvGEKLFcV96mHNDwA7-t0_CJLzd28NTCmkM08dT5ngo0Hf5dGz6g59UZbNcsJ_W9BUSZRLJeaKPWh0Z_VRtQ0q_aLoEN28gJris4JmwV5vHKmsaH1gr10V66tv5jWSLKvRP6hrQH-n662H3975NhGuNewITqFGXEtPfhB72sLWsoRTT1F944I9rJP0yhQQh729rMCjez9azAVFAxIlp4tk4inzoXPmZhv-bsoiTGMJqd8WoRwNfIFGYbAY--l6bAfs9tPSd9ebar_kAEZtHNhTyDj6IQVp4jptoKqq-hq-OfMcUw, e=AQAB}]): JsonWebSignature{"alg":"HS256","kid":"r2"}->eyJhbGciOiJIUzI1NiIsImtpZCI6InIyIn0.eyJhdWQiOiJhIiwiaXNzIjoiaSIsImV4cCI6MTcyOTQ0OTE2MSwic3ViIjoicyJ9.wHpu0T3VDnNqAZRRuEEf4QcI2DW1txi9Vf1ux9Y7gmk] +18:22:43.818 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoicjItYiJ9.F2WMZ28NhbTuTLjlasWaF_8n0mXvesxrywvcnBoizkW435p18DH50tTC54nKfHOviNLIq-H29Y4N5a4IAAm3CC6QDa2XkqrKtVPXyqyinthNMi-40uSL1bYwZTXWXtXyB1trSo_pkjIAm6d4hUFT189MhM4_XYDabrW6elogpggc0PtmTDbAS_woZPmWV_6AE4IvMMZOYIhERTrAG1bpRmaOx9UgZ32XkNlwjcsz4XQsc_3xlPA5JxE43OVohB7Kk0T34nbgH2r6VgKFJ3K838bkbgZ4pkHPZ3e5_0M5w4iCcCXrmmc2Q1SJbnPQca8QbsMQ5tG0GhGx5FMv03F7Lg.K4zPGgw_UIcxi8mC5T6CyQ.aCOsQs2FopaEa9S7cYCZvobYpm8-Ll0g4rcAMQjMyZOh7BfHMtzchUJCrx0dN-VcbCK6R4I4wtCoG1XtG7wZXQ.oExI6_EzZHDHhMpD_NZDlw] +18:22:43.960 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoicjItYiJ9.F2WMZ28NhbTuTLjlasWaF_8n0mXvesxrywvcnBoizkW435p18DH50tTC54nKfHOviNLIq-H29Y4N5a4IAAm3CC6QDa2XkqrKtVPXyqyinthNMi-40uSL1bYwZTXWXtXyB1trSo_pkjIAm6d4hUFT189MhM4_XYDabrW6elogpggc0PtmTDbAS_woZPmWV_6AE4IvMMZOYIhERTrAG1bpRmaOx9UgZ32XkNlwjcsz4XQsc_3xlPA5JxE43OVohB7Kk0T34nbgH2r6VgKFJ3K838bkbgZ4pkHPZ3e5_0M5w4iCcCXrmmc2Q1SJbnPQca8QbsMQ5tG0GhGx5FMv03F7Lg.K4zPGgw_UIcxi8mC5T6CyQ.aCOsQs2FopaEa9S7cYCZvobYpm8-Ll0g4rcAMQjMyZOh7BfHMtzchUJCrx0dN-VcbCK6R4I4wtCoG1XtG7wZXQ.oExI6_EzZHDHhMpD_NZDlw Additional details: [[20] Missing Integrity Protection] +18:22:44.058 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no encryption but the JWT Consumer is configured to require it: eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk Additional details: [[19] No encryption.] +18:22:44.059 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no encryption but the JWT Consumer is configured to require it: eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk Additional details: [[19] No encryption.] +18:22:44.066 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value.] +18:22:44.068 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] doesn't contain an acceptable identifier. Expected example.org as an aud value.] +18:22:44.069 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] doesn't contain an acceptable identifier. Expected one of [example.org, nada, nope] as an aud value.] +18:22:44.071 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[7] No Audience (aud) claim present.] +18:22:44.073 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[7] No Audience (aud) claim present.] +18:22:44.075 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", "usa.org", "ca.ca"]}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com, usa.org, ca.ca] doesn't contain an acceptable identifier. Expected example.org as an aud value.] +18:22:44.077 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", "usa.org", "ca.ca"]}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com, usa.org, ca.ca] doesn't contain an acceptable identifier. Expected one of [example.org, some.other.junk] as an aud value.] +18:22:44.081 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", 47, false]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The array value of the 'aud' claim contains non string values (47 - class java.lang.Long cannot be cast to class java.lang.String (java.lang.Long and java.lang.String are in module java.base of loader 'bootstrap'))] +18:22:44.083 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":20475}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'aud' claim is not an array of strings or a single string value.] +18:22:44.086 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":{"aud":"example.org"}}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'aud' claim is not an array of strings or a single string value.] +18:22:44.107 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.JwtConsumerTest$4: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:919); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:913); ...omitted...] +18:22:44.110 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.JwtConsumerTest$4: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:919); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:913); ...omitted...] +18:22:44.118 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"name":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[14] No Subject (sub) claim is present.] +18:22:44.120 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":724729}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'sub' claim is not the expected type (724729 - Cannot cast java.lang.Long to java.lang.String)] +18:22:44.122 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":{"values":["one", "2"]}}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'sub' claim is not the expected type ({values=[one, 2]} - Cannot cast org.jose4j.json.JsonUtil$DupeKeyDisallowingLinkedHashMap to java.lang.String)] +18:22:44.196 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits).): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJhY2MiLCJjdHkiOiJKV1QifQ.KrukndaF2sHb3Y0r311rrYmCrXco-99ZIQ3iLjvCVbbow5MppRTK4DPJUShcndfcIVIFXMYSLGvIJwf39yZRJJ_EvBFnqhOUeCAsUHLGO1yxoQ619jmSh4bCaIicLYeivKaVSQN4Ezc5fvg-Nnv6TBIIgHuWMDU2Ztd96DJRokc.wMg2Eb8izCOUnACqdrcPQA.quFKSN7xQoMJzaYFBVwykQZ8zB3hpW8HtK7pm-4Ggzorno_K-eBQ7fXjRmJ1Jw-kCcmUa8flpnQqpL9jurtlz7DC1ABe0vm2ZkHoJluB6QeSr60Y9rP7kyy_rd3blXT_7t6Wgowo8MumXrrUUxxEQJgXvCmKbd-Rw9sK5jAHEug3zztLXHOX0O0QoxDzTJOsSRtodsu7bTJa-ADvPmK9e0Xp06NRqvx7WuJGKlq3cwQ.DL6yaCdiOUcViN-eZVIwOA] +18:22:44.945 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1729448504,"sub":"s","nbf":1729448384}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1729448564 -> Oct 20, 2024, 6:22:44?PM GMT} is on or after the Expiration Time (exp=NumericDate{1729448504 -> Oct 20, 2024, 6:21:44?PM GMT}) claim value.] +18:22:44.955 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1729448504,"sub":"s"}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1729448564 -> Oct 20, 2024, 6:22:44?PM GMT} is on or after the Expiration Time (exp=NumericDate{1729448504 -> Oct 20, 2024, 6:21:44?PM GMT}) claim value.] +18:22:44.969 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1729449764,"sub":"s","nbf":1729448804}) rejected due to invalid claims or other invalid content. Additional details: [[6] The JWT is not yet valid as the evaluation time NumericDate{1729448564 -> Oct 20, 2024, 6:22:44?PM GMT} is before the Not Before (nbf=NumericDate{1729448804 -> Oct 20, 2024, 6:26:44?PM GMT}) claim time.] +18:22:44.986 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 128 bits): JsonWebSignature{"kid":"esc","alg":"HS256"}->eyJraWQiOiJlc2MiLCJhbGciOiJIUzI1NiJ9.eyJhdWQiOiJhIiwiaXNzIjoiaSIsImV4cCI6MTQzMjMyNTQ5Niwic3ViIjoicyIsIm5iZiI6MTQzMjMyNDgzNn0.16LpzAZyBcokZ4aUaXHn5yN0xQ1zpmLyJVFHu6nH1zY] +18:22:45.045 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] 9223372036854775808 is unreasonable for a NumericDate] +18:22:45.093 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":25113002000004770000,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] 25113002000004770000 is unreasonable for a NumericDate] +18:22:45.142 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775809,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] -9223372036854775809 is unreasonable for a NumericDate] +18:22:45.191 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-77261600013501300000000,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] -77261600013501300000000 is unreasonable for a NumericDate] +18:22:45.246 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{9223372036854775807} is more than 2147483647 second(s) ahead of now NumericDate{9223372036854775 -> Aug 17, 292278994, 7:12:55?AM GMT}.] +18:22:45.351 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775 = 9214148664817921033 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] +18:22:45.452 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775807 = 1 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] +18:22:45.552 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775807 = 1 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] +18:22:45.606 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{9223372036854775807} is more than 10 second(s) ahead of now NumericDate{0 -> Jan 1, 1970, 12:00:00?AM GMT} (even when providing 2147483647 seconds of leeway to account for clock skew).] +18:22:45.656 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 2147483647 = 9223372034707292161 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] +18:22:47.526 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[-76717] You can go blind issuing tokens to yourself...] +18:22:47.527 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[-76717] You can go blind issuing tokens to yourself...] +18:22:48.487 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1729448507,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1729448568 -> Oct 20, 2024, 6:22:48?PM GMT} is on or after the Expiration Time (exp=NumericDate{1729448507 -> Oct 20, 2024, 6:21:47?PM GMT}) claim value.] +18:22:48.551 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[15] Subject (sub) claim value (d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea) doesn't match expected value of NOOOOOOOOOOOOOOOOPE] +18:22:48.575 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [R-RufjSDVGCGfdTmIobf2Q] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value.] +18:22:48.588 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [R-RufjSDVGCGfdTmIobf2Q] doesn't contain an acceptable identifier. Expected one of [no, nope, no way jose] as an aud value.] +18:22:48.596 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject", "iss":"issuer", "aud":"audience"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [audience] doesn't contain an acceptable identifier. Expected nope as an aud value., [12] Issuer (iss) claim value (issuer) doesn't match expected value of no way, [13] The JWT ID (jti) claim is not present.] +18:22:49.069 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1729449168,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [AUD] doesn't contain an acceptable identifier. Expected nope as an aud value.] +18:22:49.078 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1729449168,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (ISS) doesn't match expected value of no way] +18:22:49.092 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1729449168,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [AUD] doesn't contain an acceptable identifier. Expected nope as an aud value., [12] Issuer (iss) claim value (ISS) doesn't match expected value of no way, [5] The Expiration Time (exp=NumericDate{1729449168 -> Oct 20, 2024, 6:32:48?PM GMT}) claim value cannot be more than 5 minutes in the future relative to the evaluation time NumericDate{1729448569 -> Oct 20, 2024, 6:22:49?PM GMT}.] +18:22:49.108 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJleHAiOjE3Mjk0NDkxNjgsImlzcyI6IklTUyIsImF1ZCI6IkFVRCIsInN1YiI6IlNVQiJ9.NGns23fwIfHwxj0tDsFcFuzrlZYopHMWm5gaUzZyNdAwfLU3n_idriThNBjcA2Y68-3cw6IJs9sGmPlNVmXOtEG5n5DrjjmMLCpoeBvLmKW_sCPM35Dx62ZCoi4_QlfZvOVoSfzR9i7_9QwAmpRiPYBFLC3SVH2exH3Cr3FKIKqADeOf3yo86w22JaftSRcpA0I1wVOGvCvrw2EfO1nFuhl5g7Wp1Jl1aRnmYPo9v656Dq_zfmdNY8W9yGeuNXnpPTx4gXeQ2GbXS95vBzansM769TPtNaEC_kaQxzYMdPmc1MkAwqFcw6RQ6Qfv4JUwKs19XGwAuWLN8vT6djTODw] +18:22:49.590 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.Tg_XHvp73Takp4Oj9heo01h3YnOLOSDBhvUXw6qPF8T3WYdr3I2HumEUHKjgERVpJ_xo2PmigiO9ZRr_ujh0Pa163Ei4O62PElUYsYUsx9ONIRGZ7Fxcv8NhviGJ4VRrD8Xi55cV0zODFvPqjArDd7N1_FOIptwbDvGw6XIBRZF_dEKZ7Q2wdqU0FQl4UitoazTWunyH400vdRy4azqAJH_l2mPpOUz_enNvtIfkXURgW_X_8jw8VKfQXOXg0XB2GEn-vRlyeOF89t2aaWjWR8rXoxW2j40LBAGVbxck6mC8bEp6bkmhOzoBu-DnM2kygtiHb7OwoSImAIYdC9HKcg.re8OmVKClsfwypz5t_a17Q.VoUsCVhUUYpAZItXrZQbGguioBmhzLxshKtKwt2x7P21nLSCqBmuCFBLM-I_flHWYI5j00Tx8Rl3kliFB-hFTg.EJXEhNvW9rW_Sc6d_E6Qig Additional details: [[10] Missing signature.] +18:22:49.612 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[17] You can go blind issuing tokens to yourself...] +18:22:49.614 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[17] You can go blind issuing tokens to yourself...] +18:22:49.713 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":-1239223372036854775808,"iat":1571322100,"exp":9223372036854775807,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] -1239223372036854775808 is unreasonable for a NumericDate] +18:22:49.757 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":1571322100,"iat":12345678900000000000,"exp":12345678900000000009,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] 12345678900000000009 is unreasonable for a NumericDate] +18:22:49.804 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":1571322100,"iat":1571322111,"exp":157132210009188371766311111,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] 157132210009188371766311111 is unreasonable for a NumericDate] +18:22:49.848 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{9223372036854775807}) claim value cannot be more than 2147483647 minutes in the future relative to the evaluation time NumericDate{9223371903710789693} (even when providing 2147483647 seconds of leeway to account for clock skew).] +18:22:49.894 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":-1,"exp":9223372036854775802,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow adding: 9223372036854775792 + 30 = -9223372036854775794 at org.jose4j.lang.Maths.add(Maths.java:13); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:143); ...omitted...] +18:22:49.940 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1572322100,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854774808 - 6000 = 9223372036854770808 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:113); ...omitted...] +18:22:49.984 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":-9223372036854775798,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775798 - 65 = 9223372036854775753 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:131); ...omitted...] +18:22:50.029 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: 9223372036854775807 - -10 = -9223372036854775799 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:131); ...omitted...] +18:22:50.043 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=QsGX3JhHP1Pwy4zQ8Ha9FQ): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..zWNzKpA-QA0BboVl02nz-A.eyJpc3MiOiJtZSIsImF1ZCI6Im1lIiwiZXhwIjoxNDIwMjMxNjA2LCJuYW1lIjoidmFsdWUifQ.QsGX3JhHP1Pwy4zQ8Ha9FQ] +18:22:50.047 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=QsGX3JhHP1Pwy4zQ8Ha9FQ): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..zWNzKpA-QA0BboVl02nz-A.u1D7JCpDFeRl69G1L-h3IRrmcOXiWLnhr23ugO2kkDqKVNcO1YQ4Xvl9Sag4aYOnkqUbqe6Wdz8KK3d9q178tA.QsGX3JhHP1Pwy4zQ8Ha9FQ] +18:22:50.338 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.g_hEwksO1Ax8Qn7HoN-BVeBoa8FXe0kpyk_XdcSmxvcM5_P296JXXtoHISr_DD_MqewaQSH4dZOQHoUgKLeFly-9RI11TG-_Ge1bZFazBPwKC5lJ6OLANLMd0QSL4fYEb9ERe-epKYE3xb2jfY1AltHqBO-PM6j23Guj2yDKnFv6WO72tteVzm_2n17SBFvhDuR9a2nHTE67pe0XGBUS_TK7ecA-iVq5COeVdJR4U4VZGGlxRGPLRHvolVLEHx6DYyLpw30Ay9R6d68YCLi9FYTq3hIXPK_-dmPlOUlKvPr1GgJzRoeC9G5qCvdcHWsqJGTO_z3Wfo5zsqwkxruxwA.UmVkbW9uZCBXQSA5ODA1Mg.VwHERHPvCNcHHpTjkoigx3_ExK0Qc71RMEParpatm0X_qpg-w8kozSjfNIPPXiTBBLXR65CIPkFqz4l1Ae9w_uowKiwyi9acgVztAi-pSL8GQSXnaamh9kX1mdh3M_TT-FZGQFQsFhu0Z72gJKGdfGE-OE7hS1zuBD5oEUfk0Dmb0VzWEzpxxiSSBbBAzP10l56pPfAtrjEYw-7ygeMkwBl6Z_mLS6w6xUgKlvW6ULmkV-uLC4FUiyKECK4e3WZYKw1bpgIqGYsw2v_grHjszJZ-_I5uM-9RA8ycX9KqPRp9gc6pXmoU_-27ATs9XCvrZXUtK2902AUzqpeEUJYjWWxSNsS-r1TJ1I-FMJ4XyAiGrfmo9hQPcNBYxPz3GQb28Y5CLSQfNgKSGt0A4isp1hBUXBHAndgtcslt7ZoQJaKe_nNJgNliWtWpJ_ebuOpEl8jdhehdccnRMIwAmU1n7SPkmhIl1HlSOpvcvDfhUN5wuqU955vOBvfkBOh5A11UzBuo2WlgZ6hYi9-e3w29bR0C2-pp3jbqxEDw3iWaf2dc5b-LnR0FEYXvI_tYk5rd_J9N0mg0tQ6RbpxNEMNoA9QWk5lgdPvbh9BaO195abQ.AVO9iT5AV4CzvDJCdhSFlQ] +18:22:50.343 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.g_hEwksO1Ax8Qn7HoN-BVeBoa8FXe0kpyk_XdcSmxvcM5_P296JXXtoHISr_DD_MqewaQSH4dZOQHoUgKLeFly-9RI11TG-_Ge1bZFazBPwKC5lJ6OLANLMd0QSL4fYEb9ERe-epKYE3xb2jfY1AltHqBO-PM6j23Guj2yDKnFv6WO72tteVzm_2n17SBFvhDuR9a2nHTE67pe0XGBUS_TK7ecA-iVq5COeVdJR4U4VZGGlxRGPLRHvolVLEHx6DYyLpw30Ay9R6d68YCLi9FYTq3hIXPK_-dmPlOUlKvPr1GgJzRoeC9G5qCvdcHWsqJGTO_z3Wfo5zsqwkxruxwA.UmVkbW9uZCBXQSA5ODA1Mg.VwHERHPvCNcHHpTjkoigx3_ExK0Qc71RMEParpatm0X_qpg-w8kozSjfNIPPXiTBBLXR65CIPkFqz4l1Ae9w_uowKiwyi9acgVztAi-pSL8GQSXnaamh9kX1mdh3M_TT-FZGQFQsFhu0Z72gJKGdfGE-OE7hS1zuBD5oEUfk0Dmb0VzWEzpxxiSSBbBAzP10l56pPfAtrjEYw-7ygeMkwBl6Z_mLS6w6xUgKlvW6ULmkV-uLC4FUiyKECK4e3WZYKw1bpgIqGYsw2v_grHjszJZ-_I5uM-9RA8ycX9KqPRp9gc6pXmoU_-27ATs9XCvrZXUtK2902AUzqpeEUJYjWWxSNsS-r1TJ1I-FMJ4XyAiGrfmo9hQPcNBYxPz3GQb28Y5CLSQfNgKSGt0A4isp1hBUXBHAndgtcslt7ZoQJaKe_nNJgNliWtWpJ_ebuOpEl8jdhehdccnRMIwAmU1n7SPkmhIl1HlSOpvcvDfhUN5wuqU955vOBvfkBOh5A11UzBuo2WlgZ6hYi9-e3w29bR0C2-pp3jbqxEDw3iWaf2dc5b-LnR0FEYXvI_tYk5rd_J9N0mg0tQ6RbpxNEMNoA9QWk5lgdPvbh9BaO195abQ.AVO9iT5AV4CzvDJCdhSFlQ] +18:22:50.345 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidKeyException: Key cannot be null): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.cC4hiUPoj9Eetdgtv3hF80EGrhuB__dzERat0XF9g2VtQgr9PJbu3XOiZj5RZmh7AAuHIm4Bh-0Qc_lF5YKt_O8W2Fp5jujGbds9uJdbF9CUAr7t1dnZcAcQjbKBYNX4BAynRFdiuB--f_nZLgrnbyTyWzO75vRK5h6xBArLIARNPvkSjtQBMHlb1L07Qe7K0GarZRmB_eSN9383LcOLn6_dO--xi12jzDwusC-eOkHWEsqtFZESc6BfI7noOPqvhJ1phCnvWh6IeYI2w9QOYEUipUTI8np6LbgGY9Fs98rqVt5AXLIhWkWywlVmtVrBp0igcN_IoypGlUPQGe77Rw] +18:22:50.348 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.g_hEwksO1Ax8Qn7HoN-BVeBoa8FXe0kpyk_XdcSmxvcM5_P296JXXtoHISr_DD_MqewaQSH4dZOQHoUgKLeFly-9RI11TG-_Ge1bZFazBPwKC5lJ6OLANLMd0QSL4fYEb9ERe-epKYE3xb2jfY1AltHqBO-PM6j23Guj2yDKnFv6WO72tteVzm_2n17SBFvhDuR9a2nHTE67pe0XGBUS_TK7ecA-iVq5COeVdJR4U4VZGGlxRGPLRHvolVLEHx6DYyLpw30Ay9R6d68YCLi9FYTq3hIXPK_-dmPlOUlKvPr1GgJzRoeC9G5qCvdcHWsqJGTO_z3Wfo5zsqwkxruxwA.UmVkbW9uZCBXQSA5ODA1Mg.VwHERHPvCNcHHpTjkoigx3_ExK0Qc71RMEParpatm0X_qpg-w8kozSjfNIPPXiTBBLXR65CIPkFqz4l1Ae9w_uowKiwyi9acgVztAi-pSL8GQSXnaamh9kX1mdh3M_TT-FZGQFQsFhu0Z72gJKGdfGE-OE7hS1zuBD5oEUfk0Dmb0VzWEzpxxiSSBbBAzP10l56pPfAtrjEYw-7ygeMkwBl6Z_mLS6w6xUgKlvW6ULmkV-uLC4FUiyKECK4e3WZYKw1bpgIqGYsw2v_grHjszJZ-_I5uM-9RA8ycX9KqPRp9gc6pXmoU_-27ATs9XCvrZXUtK2902AUzqpeEUJYjWWxSNsS-r1TJ1I-FMJ4XyAiGrfmo9hQPcNBYxPz3GQb28Y5CLSQfNgKSGt0A4isp1hBUXBHAndgtcslt7ZoQJaKe_nNJgNliWtWpJ_ebuOpEl8jdhehdccnRMIwAmU1n7SPkmhIl1HlSOpvcvDfhUN5wuqU955vOBvfkBOh5A11UzBuo2WlgZ6hYi9-e3w29bR0C2-pp3jbqxEDw3iWaf2dc5b-LnR0FEYXvI_tYk5rd_J9N0mg0tQ6RbpxNEMNoA9QWk5lgdPvbh9BaO195abQ.AVO9iT5AV4CzvDJCdhSFlQ] +18:22:50.354 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.cC4hiUPoj9Eetdgtv3hF80EGrhuB__dzERat0XF9g2VtQgr9PJbu3XOiZj5RZmh7AAuHIm4Bh-0Qc_lF5YKt_O8W2Fp5jujGbds9uJdbF9CUAr7t1dnZcAcQjbKBYNX4BAynRFdiuB--f_nZLgrnbyTyWzO75vRK5h6xBArLIARNPvkSjtQBMHlb1L07Qe7K0GarZRmB_eSN9383LcOLn6_dO--xi12jzDwusC-eOkHWEsqtFZESc6BfI7noOPqvhJ1phCnvWh6IeYI2w9QOYEUipUTI8np6LbgGY9Fs98rqVt5AXLIhWkWywlVmtVrBp0igcN_IoypGlUPQGe77Rw] +18:22:50.362 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JWT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"129ffs904","iss":"I?m sorry, this is our family?s first kidnapping.","aud":"ap.io/","exp":1702498218}] +18:22:50.365 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"jwt"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"1234","iss":"abcd","aud":"https://example.com/as","iat":1702497918,"exp":1702498218}] +18:22:50.368 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JWT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"0","iss":"ctyortyp","aud":"audiencia","exp":1702498218}] +18:22:50.371 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JWT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"2","iss":"ctyortyp","aud":"to.whom.it.may.concern","exp":1702499888}] +18:22:50.373 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JwT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"42","iss":"ctyortyp","aud":"to.whom.it.may.concern...","exp":1702599888}] +JWT Claims Set:{exp=1729448870, sub=subject, iss=issuer} +18:22:50.403 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[2] No Expiration Time (exp) claim present.] +18:22:50.405 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[3] No Issued At (iat) claim present.] +18:22:50.406 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[4] No Not Before (nbf) claim present.] +18:22:50.412 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value.] +18:22:50.419 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value.] +18:22:50.424 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value (even when providing 1 seconds of leeway to account for clock skew).] +18:22:50.430 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value (even when providing 2 seconds of leeway to account for clock skew).] +18:22:50.435 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602065 -> May 2, 2015, 9:27:45?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value.] +18:22:50.441 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602065 -> May 2, 2015, 9:27:45?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value (even when providing 60 seconds of leeway to account for clock skew).] +18:22:50.447 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[6] The JWT is not yet valid as the evaluation time NumericDate{1430601999 -> May 2, 2015, 9:26:39?PM GMT} is before the Not Before (nbf=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim time.] +18:22:50.454 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430603000, "iat":1430602060, "exp":1430602600 }) rejected due to invalid claims or other invalid content. Additional details: [[17] The Expiration Time (exp=NumericDate{1430602600 -> May 2, 2015, 9:36:40?PM GMT}) claim value cannot be before the Not Before (nbf=NumericDate{1430603000 -> May 2, 2015, 9:43:20?PM GMT}) claim value.] +18:22:50.460 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430602000, "iat":1430602660, "exp":1430602600 }) rejected due to invalid claims or other invalid content. Additional details: [[17] The Expiration Time (exp=NumericDate{1430602600 -> May 2, 2015, 9:36:40?PM GMT}) claim value cannot be before the Issued At (iat=NumericDate{1430602660 -> May 2, 2015, 9:37:40?PM GMT}) claim value.] +18:22:50.466 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430607201}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{1430607201 -> May 2, 2015, 10:53:21?PM GMT}) claim value cannot be more than 90 minutes in the future relative to the evaluation time NumericDate{1430600000 -> May 2, 2015, 8:53:20?PM GMT}.] +18:22:50.471 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430607201}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{1430607201 -> May 2, 2015, 10:53:21?PM GMT}) claim value cannot be more than 120 minutes in the future relative to the evaluation time NumericDate{1430600000 -> May 2, 2015, 8:53:20?PM GMT}.] +18:22:50.484 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: This VerificationKeyResolver always throws this exception.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJzdWIiOiJtZSIsImV4cCI6MTcyOTQ0ODg3MCwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.] +18:22:50.487 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJzdWIiOiJtZSIsImV4cCI6MTcyOTQ0ODg3MCwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.] +18:22:51.911 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Can't do it!): JsonWebSignature{"typ":"JWT", "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -18:11:50.968 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Can't do it!): JsonWebSignature{"typ":"JWT", +18:22:51.913 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Can't do it!): JsonWebSignature{"typ":"JWT", "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -18:11:50.970 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unexpected exception encountered while processing JOSE object (java.lang.IllegalArgumentException: Stuff happens...): JsonWebSignature{"typ":"JWT", +18:22:51.919 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unexpected exception encountered while processing JOSE object (java.lang.IllegalArgumentException: Stuff happens...): JsonWebSignature{"typ":"JWT", "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -18:11:50.970 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unexpected exception encountered while processing JOSE object (java.lang.IllegalArgumentException: Stuff happens...): JsonWebSignature{"typ":"JWT", +18:22:51.920 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unexpected exception encountered while processing JOSE object (java.lang.IllegalArgumentException: Stuff happens...): JsonWebSignature{"typ":"JWT", "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -18:11:50.975 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:862); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:856); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...] -18:11:50.976 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:862); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:856); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...] -18:11:51.025 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[10] Missing signature.] -18:11:51.025 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[10] Missing signature.] -18:11:51.067 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[20] Missing Integrity Protection] -18:11:51.068 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[20] Missing Integrity Protection] -18:11:51.160 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -18:11:51.161 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -18:11:51.164 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -18:11:51.165 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -18:11:51.165 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -18:11:51.166 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -18:11:51.166 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -18:11:51.167 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -18:11:51.167 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -18:11:51.168 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -18:11:51.168 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -18:11:51.169 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -18:11:51.172 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -18:11:51.173 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -18:11:51.220 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: Unable to parse what was expected to be the JWT Claim Set JSON: "eyJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MjAyMTkwOTcsIm1lc3NhZ2UiOiJlaCJ9.ADXjpouiqbRqymN-NJ84HjU0ZZUmAajlb43Vzb6yTolFU9dTAcL6XhBAy5cwlPaS_3VT4Ce2CMpgruihmaftHA" Additional details: [[16] Invalid JSON.] -JWT Claims Set:{sub=me, aud=a, iss=i, exp=1729448511} -eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJjdHkiOiJqd3QiLCJjcml0IjpbImZha2UuYmxhaCJdfQ.FPrfYnck17JWtyPIiQsbtQRJqNBbxHC-X5Niy3h7WPf8AaAPfbHmpadhq7JGjlxLwQj9eUbqXVhIm_-9niHx3I49aq8LVR1JbJhSUw5arhWs_9-10WnjawZfeFuKS0DOne3gF53V-SKbBNzsrQR4AJjM9bLBWQ2YleNQBpdpODRwJ6nRDc7aQLUkwKp0GtLKh01UDNoj1roXVW6z9BnV31ZE3nj3HN39E1MdM5bFNTms_CDLB2SKCNoyR6TJNl03tkdOGpptlU7RpRJwukKGDjXEuHfi2oXEqa_5J0nLJf1SfHmHpDViAkYKTjE0buBQ_zQ9OssNcY3MNaSkF4JR8g.nGMuxZnb5cAzQGwjEYse9g.XuV87m7Ox6ITooADc3g8I32nJGZlq7HibXzahZneCRnKyJfXMG-kPHv8jnPaqaoSC1iSQEiwkYkvyU9tvv1-BeauP5kgMyRaszllE84YdSYKt2ve-AMgVV4xg2-1axmtDrfPuu_m-HWJOjtG23xqICOJpLfghQd2p5cUMP9SeRv4r4WZzhrxZFwZY0kQkWw9Rjc2wzaHZhipQRso-SvV2mvufRkB3hZYYWC3VfbgpnPF1f6XYFyqCLEpq50EBCj030A1arEBPALtg0b3CSOE0g.zqtleXXOwzd3FqyWZeOuBQ -18:11:51.284 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: Unrecognized header 'fake.blah' marked as critical.): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJjdHkiOiJqd3QiLCJjcml0IjpbImZha2UuYmxhaCJdfQ.FPrfYnck17JWtyPIiQsbtQRJqNBbxHC-X5Niy3h7WPf8AaAPfbHmpadhq7JGjlxLwQj9eUbqXVhIm_-9niHx3I49aq8LVR1JbJhSUw5arhWs_9-10WnjawZfeFuKS0DOne3gF53V-SKbBNzsrQR4AJjM9bLBWQ2YleNQBpdpODRwJ6nRDc7aQLUkwKp0GtLKh01UDNoj1roXVW6z9BnV31ZE3nj3HN39E1MdM5bFNTms_CDLB2SKCNoyR6TJNl03tkdOGpptlU7RpRJwukKGDjXEuHfi2oXEqa_5J0nLJf1SfHmHpDViAkYKTjE0buBQ_zQ9OssNcY3MNaSkF4JR8g.nGMuxZnb5cAzQGwjEYse9g.XuV87m7Ox6ITooADc3g8I32nJGZlq7HibXzahZneCRnKyJfXMG-kPHv8jnPaqaoSC1iSQEiwkYkvyU9tvv1-BeauP5kgMyRaszllE84YdSYKt2ve-AMgVV4xg2-1axmtDrfPuu_m-HWJOjtG23xqICOJpLfghQd2p5cUMP9SeRv4r4WZzhrxZFwZY0kQkWw9Rjc2wzaHZhipQRso-SvV2mvufRkB3hZYYWC3VfbgpnPF1f6XYFyqCLEpq50EBCj030A1arEBPALtg0b3CSOE0g.zqtleXXOwzd3FqyWZeOuBQ] -18:11:51.477 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1432327195,"sub":"s","nbf":1432326535}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [a] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value., [1] The JWT is no longer valid - the evaluation time NumericDate{1729447911 -> Oct 20, 2024, 6:11:51?PM GMT} is on or after the Expiration Time (exp=NumericDate{1432327195 -> May 22, 2015, 8:39:55?PM GMT}) claim value.] -18:11:51.480 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1432327195,"sub":"s","nbf":1432326535}) rejected due to invalid claims or other invalid content. Additional details: [[17] i isn't okay as an issuer] -18:11:51.482 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notjti":"lbZ_mLS6w3xBSlvW6ULmkV-uLCk"}) rejected due to invalid claims or other invalid content. Additional details: [[13] The JWT ID (jti) claim is not present.] -18:11:51.483 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"jti":55581529751992}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'jti' claim is not the expected type (55581529751992 - Cannot cast java.lang.Long to java.lang.String)] -18:11:51.484 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"jti":["S0w3XbslvW6ULmk0", "5iLSQfNgcSGt7A4is"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'jti' claim is not the expected type ([S0w3XbslvW6ULmk0, 5iLSQfNgcSGt7A4is] - Cannot cast java.util.ArrayList to java.lang.String)] -18:11:51.767 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1729448511,"nbf":1729447611,"jti":"3x1c32HYkxtvNUJ0BBi4xg"}) rejected due to invalid claims or other invalid content. Additional details: [[21] No typ header parameter present in the innermost JWS/JWE] -18:11:52.037 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1729448511,"nbf":1729447611,"jti":"3x1c32HYkxtvNUJ0BBi4xg"}) rejected due to invalid claims or other invalid content. Additional details: [[21] No typ header parameter present in the innermost JWS/JWE] -18:11:52.354 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1729448511,"nbf":1729447611,"jti":"3x1c32HYkxtvNUJ0BBi4xg"}) rejected due to invalid claims or other invalid content. Additional details: [[22] Invalid typ header parameter value 'at+jwt'. Expecting 'application/secevent+jwt' or just 'secevent+jwt'.] -18:11:52.571 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1729448511,"nbf":1729447611,"jti":"3x1c32HYkxtvNUJ0BBi4xg"}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.TypeValidator: java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.lang.String (java.util.ArrayList and java.lang.String are in module java.base of loader 'bootstrap') at org.jose4j.lang.JsonHelp.getString(JsonHelp.java:31); org.jose4j.jwx.Headers.getStringHeaderValue(Headers.java:78); org.jose4j.jwx.JsonWebStructure.getHeader(JsonWebStructure.java:153); org.jose4j.jwt.consumer.TypeValidator.validate(TypeValidator.java:37); ...omitted...] -18:11:52.624 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1729448511,"nbf":1729447611,"jti":"3x1c32HYkxtvNUJ0BBi4xg"}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.TypeValidator: java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.lang.String (java.util.ArrayList and java.lang.String are in module java.base of loader 'bootstrap') at org.jose4j.lang.JsonHelp.getString(JsonHelp.java:31); org.jose4j.jwx.Headers.getStringHeaderValue(Headers.java:78); org.jose4j.jwx.JsonWebStructure.getHeader(JsonWebStructure.java:153); org.jose4j.jwt.consumer.TypeValidator.validate(TypeValidator.java:37); ...omitted...] -18:11:52.842 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1729448511,"nbf":1729447611,"jti":"3x1c32HYkxtvNUJ0BBi4xg"}) rejected due to invalid claims or other invalid content. Additional details: [[22] typ header parameter value '' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: cannot have empty part] -18:11:52.893 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1729448511,"nbf":1729447611,"jti":"3x1c32HYkxtvNUJ0BBi4xg"}) rejected due to invalid claims or other invalid content. Additional details: [[22] typ header parameter value '' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: cannot have empty part] -[INFO] Tests run: 49, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 12.798 s - in org.jose4j.jwt.consumer.JwtConsumerTest -[INFO] Running org.jose4j.jwt.consumer.TypeValidatorTest -18:11:52.900 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.901 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.901 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.901 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.902 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.902 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.902 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.902 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.903 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.903 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.903 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.903 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.903 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.904 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.904 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.904 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.904 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.904 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.905 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.905 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.905 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.906 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.906 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.906 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.906 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.906 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.906 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.907 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.907 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.907 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.907 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.908 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.908 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.908 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.908 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.909 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.909 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.909 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.909 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.909 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.909 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.910 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.910 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.910 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.910 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.911 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.911 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.911 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.911 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.912 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.912 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.912 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.912 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.912 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.913 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.913 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -18:11:52.915 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type 'application/noway)' isn't a valid media type in this context. -18:11:52.915 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '/' isn't a valid media type in this context. -18:11:52.915 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '/dpop+jwt' isn't a valid media type in this context. -18:11:52.915 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '' isn't a valid media type in this context. -18:11:52.916 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type -18:11:52.916 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type -18:11:52.916 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type -18:11:52.917 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.918 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.918 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.918 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.918 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.918 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.919 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.919 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.919 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -18:11:52.919 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -18:11:52.920 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE -18:11:52.920 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.920 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.920 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.921 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.921 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.921 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.921 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.921 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.922 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -18:11:52.922 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -18:11:52.922 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.922 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.923 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.923 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.923 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.923 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.923 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.924 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.924 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -18:11:52.924 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -18:11:52.924 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE -18:11:52.924 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.925 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.925 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.925 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.925 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.925 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.926 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.926 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.926 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -18:11:52.926 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -18:11:52.927 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.927 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.927 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.927 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.927 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.928 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.928 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.928 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.928 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -18:11:52.928 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -18:11:52.929 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE -18:11:52.929 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.929 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.929 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.929 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.930 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.930 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.930 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.930 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.930 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -18:11:52.931 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -18:11:52.931 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.931 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.931 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.932 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.932 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.932 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.932 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.932 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.933 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -18:11:52.933 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -18:11:52.933 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE -18:11:52.933 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.933 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.934 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.934 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.934 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.934 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.934 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.935 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -18:11:52.935 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -18:11:52.935 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.048 s - in org.jose4j.jwt.consumer.TypeValidatorTest +18:22:51.937 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:862); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:856); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...] +18:22:51.940 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:862); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:856); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...] +18:22:52.049 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[10] Missing signature.] +18:22:52.051 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[10] Missing signature.] +18:22:52.136 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[20] Missing Integrity Protection] +18:22:52.138 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[20] Missing Integrity Protection] +18:22:52.378 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +18:22:52.380 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +18:22:52.389 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +18:22:52.391 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +18:22:52.394 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +18:22:52.395 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +18:22:52.399 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +18:22:52.401 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +18:22:52.403 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +18:22:52.404 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +18:22:52.408 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +18:22:52.410 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +18:22:52.421 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +18:22:52.423 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +18:22:52.523 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: Unable to parse what was expected to be the JWT Claim Set JSON: "eyJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MjAyMTkwOTcsIm1lc3NhZ2UiOiJlaCJ9.ADXjpouiqbRqymN-NJ84HjU0ZZUmAajlb43Vzb6yTolFU9dTAcL6XhBAy5cwlPaS_3VT4Ce2CMpgruihmaftHA" Additional details: [[16] Invalid JSON.] +JWT Claims Set:{sub=me, aud=a, iss=i, exp=1729449172} +eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJjdHkiOiJqd3QiLCJjcml0IjpbImZha2UuYmxhaCJdfQ.BmrPCwP-siAozzQ58om_u6-icVUTmtY1aa9Q4apB79ayhG5IpO4HeNbobhUZ9oLky4If1QJchrTLF5QKRSXKPo9-Fgpp8UQQkowt_fFyZxdgxXJtZNMYwE2XSd9eVztx8k1hwnU12z5lC2tnEG-JcL-RNaRfo4Xkw5N_FEZWZs5mBxLo0OIbMPBlZBnxqTIGcMiuBdeJYF2OpRAwJmTWFIsV7-063l2ZMam3Y5SHBiQvp7nDaIWKO9uvOb5oDgKA8N2AZCrFqYshWFxZWRjMSgzuiGaaB5Z-yUJvutzbak_8LXQJEPPC91xMwKkAPBrCvQklXddhfa2d2Cf67ff8YQ.gOTs8hCWNICXplHodkkhRQ.W8Nm-2YAYjIfvzB0k1jUCwxOlITQM5EEgHRAf9VF98JUTYyFLehcM6LYuCwSc8c1iaOz24MqkmG25amrWvcTmxSpAzhk62CIADBWVM24W6jTAxFA30OgIImveLxNJXgwtFt-4kqY0PT8gXvY6zYRUcg1aumAnEZJasl1FwZBnjWfCbeHGEUJMnRbepWOUkMXvzLXvvh-pmlzi4IAp2xDjCkEYlxRHAt1UpQSRItdchd668bOL6qI0TCGWAYXS5O8NJoP-aSgIhnQGTej3SYsGA.TmwSufPZKM5vIU_2iv7JhA +18:22:52.659 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: Unrecognized header 'fake.blah' marked as critical.): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJjdHkiOiJqd3QiLCJjcml0IjpbImZha2UuYmxhaCJdfQ.BmrPCwP-siAozzQ58om_u6-icVUTmtY1aa9Q4apB79ayhG5IpO4HeNbobhUZ9oLky4If1QJchrTLF5QKRSXKPo9-Fgpp8UQQkowt_fFyZxdgxXJtZNMYwE2XSd9eVztx8k1hwnU12z5lC2tnEG-JcL-RNaRfo4Xkw5N_FEZWZs5mBxLo0OIbMPBlZBnxqTIGcMiuBdeJYF2OpRAwJmTWFIsV7-063l2ZMam3Y5SHBiQvp7nDaIWKO9uvOb5oDgKA8N2AZCrFqYshWFxZWRjMSgzuiGaaB5Z-yUJvutzbak_8LXQJEPPC91xMwKkAPBrCvQklXddhfa2d2Cf67ff8YQ.gOTs8hCWNICXplHodkkhRQ.W8Nm-2YAYjIfvzB0k1jUCwxOlITQM5EEgHRAf9VF98JUTYyFLehcM6LYuCwSc8c1iaOz24MqkmG25amrWvcTmxSpAzhk62CIADBWVM24W6jTAxFA30OgIImveLxNJXgwtFt-4kqY0PT8gXvY6zYRUcg1aumAnEZJasl1FwZBnjWfCbeHGEUJMnRbepWOUkMXvzLXvvh-pmlzi4IAp2xDjCkEYlxRHAt1UpQSRItdchd668bOL6qI0TCGWAYXS5O8NJoP-aSgIhnQGTej3SYsGA.TmwSufPZKM5vIU_2iv7JhA] +18:22:53.188 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1432327195,"sub":"s","nbf":1432326535}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [a] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value., [1] The JWT is no longer valid - the evaluation time NumericDate{1729448573 -> Oct 20, 2024, 6:22:53?PM GMT} is on or after the Expiration Time (exp=NumericDate{1432327195 -> May 22, 2015, 8:39:55?PM GMT}) claim value.] +18:22:53.196 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1432327195,"sub":"s","nbf":1432326535}) rejected due to invalid claims or other invalid content. Additional details: [[17] i isn't okay as an issuer] +18:22:53.204 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notjti":"lbZ_mLS6w3xBSlvW6ULmkV-uLCk"}) rejected due to invalid claims or other invalid content. Additional details: [[13] The JWT ID (jti) claim is not present.] +18:22:53.207 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"jti":55581529751992}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'jti' claim is not the expected type (55581529751992 - Cannot cast java.lang.Long to java.lang.String)] +18:22:53.209 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"jti":["S0w3XbslvW6ULmk0", "5iLSQfNgcSGt7A4is"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'jti' claim is not the expected type ([S0w3XbslvW6ULmk0, 5iLSQfNgcSGt7A4is] - Cannot cast java.util.ArrayList to java.lang.String)] +18:22:53.974 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1729449173,"nbf":1729448273,"jti":"xCmFq89Lvnr0md9dBFgAUA"}) rejected due to invalid claims or other invalid content. Additional details: [[21] No typ header parameter present in the innermost JWS/JWE] +18:22:54.715 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1729449173,"nbf":1729448273,"jti":"xCmFq89Lvnr0md9dBFgAUA"}) rejected due to invalid claims or other invalid content. Additional details: [[21] No typ header parameter present in the innermost JWS/JWE] +18:22:55.593 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1729449173,"nbf":1729448273,"jti":"xCmFq89Lvnr0md9dBFgAUA"}) rejected due to invalid claims or other invalid content. Additional details: [[22] Invalid typ header parameter value 'at+jwt'. Expecting 'application/secevent+jwt' or just 'secevent+jwt'.] +18:22:56.195 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1729449173,"nbf":1729448273,"jti":"xCmFq89Lvnr0md9dBFgAUA"}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.TypeValidator: java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.lang.String (java.util.ArrayList and java.lang.String are in module java.base of loader 'bootstrap') at org.jose4j.lang.JsonHelp.getString(JsonHelp.java:31); org.jose4j.jwx.Headers.getStringHeaderValue(Headers.java:78); org.jose4j.jwx.JsonWebStructure.getHeader(JsonWebStructure.java:153); org.jose4j.jwt.consumer.TypeValidator.validate(TypeValidator.java:37); ...omitted...] +18:22:56.335 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1729449173,"nbf":1729448273,"jti":"xCmFq89Lvnr0md9dBFgAUA"}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.TypeValidator: java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.lang.String (java.util.ArrayList and java.lang.String are in module java.base of loader 'bootstrap') at org.jose4j.lang.JsonHelp.getString(JsonHelp.java:31); org.jose4j.jwx.Headers.getStringHeaderValue(Headers.java:78); org.jose4j.jwx.JsonWebStructure.getHeader(JsonWebStructure.java:153); org.jose4j.jwt.consumer.TypeValidator.validate(TypeValidator.java:37); ...omitted...] +18:22:56.936 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1729449173,"nbf":1729448273,"jti":"xCmFq89Lvnr0md9dBFgAUA"}) rejected due to invalid claims or other invalid content. Additional details: [[22] typ header parameter value '' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: cannot have empty part] +18:22:57.077 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1729449173,"nbf":1729448273,"jti":"xCmFq89Lvnr0md9dBFgAUA"}) rejected due to invalid claims or other invalid content. Additional details: [[22] typ header parameter value '' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: cannot have empty part] +[INFO] Tests run: 49, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 36.572 s - in org.jose4j.jwt.consumer.JwtConsumerTest +[INFO] Running org.jose4j.jwt.consumer.JwksVerificationKeyResolverUsingJwtConsumerTest +18:22:57.119 DEBUG o.j.j.c.JwksVerificationKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"HS512","kid":"nope"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=uno}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=two}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=trois}]): JsonWebSignature{"alg":"HS512","kid":"nope"}->eyJhbGciOiJIUzUxMiIsImtpZCI6Im5vcGUifQ.eyJpc3MiOiJGUk9NIiwiYXVkIjoiVE8iLCJleHAiOjE0MjQyMTg2NzksInN1YiI6IkFCT1VUIn0.lZOnt-l4wIUl667laxBjZgyTZsebfitsKT1yBrEQ-DognQiqEafQaVrFTaV3dJrZDvgDqAKL9FzxOHfdBg8NXw] +18:22:57.205 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.uIRIFrhftV39qJNOdaL8LwrK1prIJIHsP7Gn6jJAVbE2Mx4IkwGzBXDLKMulM1IvKElmSyK_KBg8afywcxoApA] +18:22:57.238 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.21eYfC_ZNf1FQ1Dtvj4rUiM9jYPgf1zJfeE_b2fclgu36KAN141ICqVjNxQqlK_7Wbct_FDxgyHvej_LEigb2Q] +18:22:57.270 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTEyNywiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.UE4B0IVPRip-3TDKhNAadCuj_Bf5PlEAn9K94Zd7mP25WNZwxDbQpDElZTZSp-3ngPqQyPGj27emYRHhOnFSAQ] +18:22:57.275 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES384"}->eyJhbGciOiJFUzM4NCJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTIzMSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.NyRtG_eFmMLQ0XkW5kvdSpzYsm6P5M3U8EBFKIhD-jw8E7FOYw9PZ3_o1PWuLWH3XeArZMW7-bAIVxo2bHqJsSUtB6Tf0NWPtCpUF2c1vbuRXEXkGrCUmc4sKyOBjimC] +18:22:57.279 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.pgBu9S8g7MC2BN9YNlWD9JhjzWbQVjqpmErW4hMFncKD8bUidIbMBJSI3URXvnMJrLrAC5eB2gb6DccF_txQaqX1X81JbTSdQ44_P1W-1uIIkfIXUvM6OXv48W-CPm8xGuetQ1ayHgU_1ljtdkbdUHZ6irgaeIrFMgZX0Jdb9Eydnfhwvno2oGk3y6ruq2KgKABIdzgvJXfwdOFGn1z0CxwQSVDkFRLsMsBljTwfTd0v3G8OXT8WRMZMGVyAgtKVu3XJyrPNntVqrzdgQQma6S06Y9J9V9t0AlgEAn2B4TqMxYcu1Tjr7bBL_v83zEXhbdcFBYLfJg-LY5wE6rA-dA] +18:22:57.550 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTEyNywiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.UE4B0IVPRip-3TDKhNAadCuj_Bf5PlEAn9K94Zd7mP25WNZwxDbQpDElZTZSp-3ngPqQyPGj27emYRHhOnFSAQ] +18:22:57.555 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES384"}->eyJhbGciOiJFUzM4NCJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTIzMSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.NyRtG_eFmMLQ0XkW5kvdSpzYsm6P5M3U8EBFKIhD-jw8E7FOYw9PZ3_o1PWuLWH3XeArZMW7-bAIVxo2bHqJsSUtB6Tf0NWPtCpUF2c1vbuRXEXkGrCUmc4sKyOBjimC] +18:22:57.608 DEBUG o.j.j.c.JwksVerificationKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"8a10l"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00r, use=sig, x=AZkOsR09YQeFcD6rhINHWAaAr8DMx9ndFzum50o5KLLUjqF7opKI7TxR5LP_4uUvG2jojF57xxWVwWi2otdETeI-, y=AadJxOSpjf_4VxRjTT_FdAtFX8Pw-CBpaoX-OQPPQ8o0kOrj5nzIltwnEORDldLFIkQQzgTXMzBnWyQurVHU5pUF, crv=P-521}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00q, use=sig, x=3n74sKXRbaBNw9qOGslnl-WcNCdC75cWo_UquiGUFKdDM3hudthywE5y0R6d2Li8, y=YbZ_0lregvTboKmUX7VE7eknQC1yETKUdHzt_YMX4zbTyOxgZL6A38AVfY8Q8HWd, crv=P-384}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00p, use=sig, x=S-EbFKVG-7pXjdgM9SPPw8rN3V8-2uX4bNg4y8R7EhA, y=KTtyNGz9B9_QrkFf7mP90YiH6F40fAYfqpzQh8HG7tc, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=8a00o, use=sig, n=kM-83p_Qaq-1FuxLHH6Y7jQeBT5MK9iHGB75Blnit8rMIcsns72Ls1uhEYiyB3_icK7ibLr2_AHiIl7MnJBY2cCquuwiTccDM5AYUccdypliSlVeAL0MBa_0xfpvBJw8fB45wX6kJKftbQI8xjvFhqSIuGNyQOzFXnJ_mCBOLv-6Nzn79qWxh47mQ7NJk2wSYdFDsz0NNGjBA2VQ9U6weqL1viZ1sbzXr-bJWCjjEYmKC5k0sjGGXJuvMPEqBY2q68kFXD3kiuslQ3tNS1j4d-IraadxpNVtedQ44-xM7MC-WFm2f5eO0LmJRzyipGNPkTer66q6MSEESguyhsoLNQ, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00n, use=sig, x=ADoTal4nAvVCgicprEBBFOzNKUKVJl1Ph8sISl3Z3tz7TJZlQB485LJ3xil-EmWvqW1-sKFl7dY2YtrGUZvjGp0O, y=AXVB58hIK7buMZmRgDU4hrGvcVQLXa-77_F755OKIkuWP5IJ6GdjFvaRHfIbbHMp-whqjmRrlwfYPN1xmyCGSzpT, crv=P-521}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00m, use=sig, x=5Y4xK9IBGJq5-E6QAVdpiqZb9Z-_tro_rX9TAUdWD3jiVS5N-blEnu5zWzoUoiJk, y=ZDFGBLBbiuvHLMOJ3DoOSRLU94uu5y3s03__HaaaLU04Efc4nGdY3vhTQ4kxEqVj, crv=P-384}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00l, use=sig, x=CWzKLukg4yQzi4oM-2m9M-ClxbU4e6P9G_HRn9A0edI, y=UB1OL_eziV6lA5J0PiAuzoKQU_YbXojbjh0sfxtVlOU, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=8a00k, use=sig, n=ux8LdF-7g3X1BlqglZUw36mqjd9P0JWfWxJYvR6pCFSyqLrETc-fL9_lTG3orohkGnEPe7G-BO65ldF44pYEe3eZzcEuEFtiO5W4_Jap1Z430vdYgC_nZtENIJDWlsGM9ev-cOld7By-8l3-wAyuspOKZijWtx6K57VLajyUHBSmbUtaeCwHQOGyMOV1V-cskbTO2u_HrLOLLkSv9oZrznAwpx_paFHy-aAsdFhb7EiBzwqqHQButo3aT3DsR69gbW_Nmrf6tfkril6B3ePKV4od_5jowa6V3765K6v2L4NER7fuZ2hJVbIc0eJXY8tL3NlkBnjnmQ8DBWQR81Ayhw, e=AQAB}]): JsonWebSignature{"alg":"ES256","kid":"8a10l"}->eyJhbGciOiJFUzI1NiIsImtpZCI6IjhhMTBsIn0.eyJzdWIiOiJoYWlsaWUiLCJhdWQiOiJhIiwianRpIjoiRmUwZ1h1UGpmcHoxSHEzdzRaaUZIQiIsImlzcyI6Imh0dHBzOlwvXC9sb2NhbGhvc3Q6OTAzMSIsImlhdCI6MTQyMTA5Mzg1OSwiZXhwIjoxNDIxMDk0NDU5LCJub25jZSI6ImZmcyIsImFjciI6InVybjpvYXNpczpuYW1lczp0YzpTQU1MOjIuMDphYzpjbGFzc2VzOlBhc3N3b3JkIiwiYXV0aF90aW1lIjoxNDIxMDkzMzc2fQ.gzJQZRErEHI_v6z6dZboTPzL7p9_wXrMJIWnYZFEENgq3E1InbrZuQM3wB-mJ5r33kwMibJY7Qi4y-jvk0IYqQ] +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.417 s - in org.jose4j.jwt.consumer.JwksVerificationKeyResolverUsingJwtConsumerTest [INFO] Running org.jose4j.jwt.consumer.JwksDecryptionKeyResolverUsingJwtConsumerTest -18:11:52.956 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=hLjzihUNRXp64G6TPRicQw). -18:11:52.958 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=9PM6hnPWwK-FAYzZBq3Rjg). -18:11:52.959 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=9PM6hnPWwK-FAYzZBq3Rjg). -18:11:52.991 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=gph3ac00dMBMryg9iyw73A). -18:11:52.991 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=gph3ac00dMBMryg9iyw73A). -18:11:52.992 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=gph3ac00dMBMryg9iyw73A). -18:11:52.994 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=bcMQRz0gMpRAn4lSdb438Q). -18:11:52.995 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=bcMQRz0gMpRAn4lSdb438Q). -18:11:52.996 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=bcMQRz0gMpRAn4lSdb438Q). -18:11:52.996 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=bcMQRz0gMpRAn4lSdb438Q). -18:11:52.998 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=uMBY9z3XVbU03u4FmDPhDw). -18:11:52.999 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=uMBY9z3XVbU03u4FmDPhDw). -18:11:53.000 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=uMBY9z3XVbU03u4FmDPhDw). -18:11:53.000 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=uMBY9z3XVbU03u4FmDPhDw). -18:11:53.001 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=5) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=uMBY9z3XVbU03u4FmDPhDw). -18:11:53.005 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=mpnWwW-5a-iCYFtPZ5pvSg). -18:11:53.005 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=mpnWwW-5a-iCYFtPZ5pvSg). -18:11:53.006 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=mpnWwW-5a-iCYFtPZ5pvSg). -18:11:53.007 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=mpnWwW-5a-iCYFtPZ5pvSg). -18:11:53.007 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=5) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=mpnWwW-5a-iCYFtPZ5pvSg). -18:11:53.008 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=6) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=mpnWwW-5a-iCYFtPZ5pvSg). -18:11:53.009 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256"} using attempted decryption to disambiguate from filtered candidate JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=1}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=2}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=3}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=4}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=5}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=6}]) selecting from keys: [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=1}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=2}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=3}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=4}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=5}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=6}]): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..rw0_FRXeL77gWNs6szWSZg.oPh-jiIKHfghu9UKnJmG9ID6fZzRw2zxOfx0xUEGjxQ.mpnWwW-5a-iCYFtPZ5pvSg] -18:11:53.800 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). -18:11:53.957 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). -18:11:53.959 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Message is larger than modulus). -18:11:54.036 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=e1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch; caused by: javax.crypto.AEADBadTagException: Tag mismatch). -18:11:54.394 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). -18:11:54.541 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). -18:11:54.952 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). -18:11:55.435 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). -18:11:55.582 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). -18:11:55.583 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). -18:11:55.585 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). -18:11:55.587 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"RSA-OAEP","enc":"A128GCM"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"RSA-OAEP","enc":"A128GCM"} using attempted decryption to disambiguate from filtered candidate JWKs [org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r3, use=enc, n=pkTznDIyNrI9wvfoFqv3yZpHv5PBeSXxdvOIKtsrKTSXxgDqjfn3jS4CiZidUjW1TzwwkYRZYU3Ei-M7qecudUs1QFdoBUNyd7V_X-ueToD1K-JvQCCrb74bzQWHVfsb2bRfuLw3Tyw3JwnWU3Q-P7OP08INyitwFw9Oz5DvKovtuOyAh3-CT8eSXcPMy2LQTt7WW8h2YeMq1EvndAc67ohiz-q3u2Qqwbbyv-p237mL_90JLE4xMBnLNey4FDjtXbXIq8T8QbvGyn4Dc67ZxH4-izAxi_siA_3z0H7oTYRaeNL4JuNqhoB0R4CgThfofdGVGZVWPyyowzSI-7nxbMHYNNse96wDnbTTKC8pP-qDjExRYjzm4iNueaMzzcq3wAIpR5z2tZp1oULOo43R0kcXC51sKrenJWnqIaIj_WsENRAWWHsrh5IycgySWyytaGVgQHaeBagYJHzRcrhWk10e81M8oMtdPPL1MLS0bbU3CTpDcacr4KyAKAL8sVi7-M2UVqvtWkEZCJ9q1cgOFwcp0t8ZKOpw9OgVeyo-P8HoDpfeXM_WecqNuHSRBlJGbAIfKErBiAUAKFmdEKyHtuUi-Ni6cEwDgjrSxX3apxG_41POrZjZBuuV6FYBcR1wqnTr8k-_z49Kv8ZGF3yszgcV3IQ4qK3-M_qqypnEai8, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e1, use=enc, x=zw4_6TARtwAsHFDw4Q1gr65t6BMl6lXOmmOMA3R0q58, y=O0Gb45b83A8FRe-DH_xJ4H0dsaQVskZMT_RBIKaSGOc, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r4, use=enc, n=srRMqzPSg5CoMyaY5YErUQBRJkn0QhkzSiIIPA6dow3MnhR2_1S-D4aNHdet29Yc6qs9Qh6HIirMWcp2FPaKfaIZaJ-Q_-9gVyPDWlKHp9jSTeSetDCxm401e8XxNMjluGqb-3uQWE9W0Ka7IlDXXW1KhLYZ75xDaP5Y1c2n84uMRMKwylNCKQv0KlHIRDhsPfHx82khTGUb1XMqom7FWO8Ii4whRr7Glw0JiXj8ANHGozVTP-EVkZqFRJmwLG-ndyvsJOclEwwrXYqklFloU7WUwZQ5M08F-g-6XlSNHtaDcFagUUQKXG8zSb6GqXtEfhrs0mwI1D66b3txAf_76w9phkwlHp0Ab_lLuJLAr0j_ACtXbyxUQvHOV8QXmBuSwl7dVqAXFXGBQNGRtdewjPYgzmS4l_SzjgvC8jRTd-xzSof_gIIbSrKEtMnIoKhMCexyYGXkEzfv7aZH92_ZDGa9Cszlyqd3TJrDjj75zrkztc3coMOgbIVHoet_Ptmx, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r1, use=enc, n=lFZ04QwtWu_hHgqlry40DuIhVZyl6ci6FzyLfkeHLH8xfCDLR-rvslxX-Ub3teVnPjZYdUFlZztuDo5kOFsF7TvUQMJhx00VZ6qugm-4LDSJ93ioGuo37vNDjMYBs0dEw_xV38e_m_Jo-oTJZN8xfZFroiR0cRNzac2e98lPa-TCxtOCuVp8Q8ro1Y6nC_1g51iY3nZXHfELX4vUxSh-4z7I0VkzCREQNYx-iKWw6MqEl2qG2mohiwlRexphf-1--8RuJ7FgubewzFv6dP_vCO9cYGi2qB0Gw6b9u8Jb60JYM7xLT3wGTQNfepiXQWESbVorxYiwZODP7d0tteD-eQ, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, use=enc, n=yzFYB2Nqp5Wb34XQUBGRR33tp1jPVds46D3xwmTXPqjsbr4LMQqPWghtN_qE2bHldPJ9RJUk-i3UxnTAwR1bKLaCj6Aip_blZ4z_wK6IUIkJZk2nPD75YyhTpE9CqoI26lL2KBjMj3gn3cIxHi22BdGshppUbaf-ogH18LQ1bStM63uiflX44ud7GT4JVGaBczoad_cr-R1hs4kWZNdJrzBh7aPxebYnbAVd2CTeyXGYr_GIiq_sgtaBBISGoggruY5r-fva3R4YnhoTnmNeFOLDb99bzDPHbWhyjJ5nqBx7yaw1mT9uBnWno-h423bAT81TvXOJ2ogZ-jsYigx6xw, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e2, use=enc, x=A47oP1eLgWo7NsiKGV2Q983D3oNxLnRDlgtEi7HCtSI, y=4CjFGXRHDmm3g_cSB2YZPYsnxorc4tAEJRD35wBu0ys, crv=P-256}]) selecting from keys: [org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r3, use=enc, n=pkTznDIyNrI9wvfoFqv3yZpHv5PBeSXxdvOIKtsrKTSXxgDqjfn3jS4CiZidUjW1TzwwkYRZYU3Ei-M7qecudUs1QFdoBUNyd7V_X-ueToD1K-JvQCCrb74bzQWHVfsb2bRfuLw3Tyw3JwnWU3Q-P7OP08INyitwFw9Oz5DvKovtuOyAh3-CT8eSXcPMy2LQTt7WW8h2YeMq1EvndAc67ohiz-q3u2Qqwbbyv-p237mL_90JLE4xMBnLNey4FDjtXbXIq8T8QbvGyn4Dc67ZxH4-izAxi_siA_3z0H7oTYRaeNL4JuNqhoB0R4CgThfofdGVGZVWPyyowzSI-7nxbMHYNNse96wDnbTTKC8pP-qDjExRYjzm4iNueaMzzcq3wAIpR5z2tZp1oULOo43R0kcXC51sKrenJWnqIaIj_WsENRAWWHsrh5IycgySWyytaGVgQHaeBagYJHzRcrhWk10e81M8oMtdPPL1MLS0bbU3CTpDcacr4KyAKAL8sVi7-M2UVqvtWkEZCJ9q1cgOFwcp0t8ZKOpw9OgVeyo-P8HoDpfeXM_WecqNuHSRBlJGbAIfKErBiAUAKFmdEKyHtuUi-Ni6cEwDgjrSxX3apxG_41POrZjZBuuV6FYBcR1wqnTr8k-_z49Kv8ZGF3yszgcV3IQ4qK3-M_qqypnEai8, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e1, use=enc, x=zw4_6TARtwAsHFDw4Q1gr65t6BMl6lXOmmOMA3R0q58, y=O0Gb45b83A8FRe-DH_xJ4H0dsaQVskZMT_RBIKaSGOc, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r4, use=enc, n=srRMqzPSg5CoMyaY5YErUQBRJkn0QhkzSiIIPA6dow3MnhR2_1S-D4aNHdet29Yc6qs9Qh6HIirMWcp2FPaKfaIZaJ-Q_-9gVyPDWlKHp9jSTeSetDCxm401e8XxNMjluGqb-3uQWE9W0Ka7IlDXXW1KhLYZ75xDaP5Y1c2n84uMRMKwylNCKQv0KlHIRDhsPfHx82khTGUb1XMqom7FWO8Ii4whRr7Glw0JiXj8ANHGozVTP-EVkZqFRJmwLG-ndyvsJOclEwwrXYqklFloU7WUwZQ5M08F-g-6XlSNHtaDcFagUUQKXG8zSb6GqXtEfhrs0mwI1D66b3txAf_76w9phkwlHp0Ab_lLuJLAr0j_ACtXbyxUQvHOV8QXmBuSwl7dVqAXFXGBQNGRtdewjPYgzmS4l_SzjgvC8jRTd-xzSof_gIIbSrKEtMnIoKhMCexyYGXkEzfv7aZH92_ZDGa9Cszlyqd3TJrDjj75zrkztc3coMOgbIVHoet_Ptmx, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r1, use=enc, n=lFZ04QwtWu_hHgqlry40DuIhVZyl6ci6FzyLfkeHLH8xfCDLR-rvslxX-Ub3teVnPjZYdUFlZztuDo5kOFsF7TvUQMJhx00VZ6qugm-4LDSJ93ioGuo37vNDjMYBs0dEw_xV38e_m_Jo-oTJZN8xfZFroiR0cRNzac2e98lPa-TCxtOCuVp8Q8ro1Y6nC_1g51iY3nZXHfELX4vUxSh-4z7I0VkzCREQNYx-iKWw6MqEl2qG2mohiwlRexphf-1--8RuJ7FgubewzFv6dP_vCO9cYGi2qB0Gw6b9u8Jb60JYM7xLT3wGTQNfepiXQWESbVorxYiwZODP7d0tteD-eQ, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, use=enc, n=yzFYB2Nqp5Wb34XQUBGRR33tp1jPVds46D3xwmTXPqjsbr4LMQqPWghtN_qE2bHldPJ9RJUk-i3UxnTAwR1bKLaCj6Aip_blZ4z_wK6IUIkJZk2nPD75YyhTpE9CqoI26lL2KBjMj3gn3cIxHi22BdGshppUbaf-ogH18LQ1bStM63uiflX44ud7GT4JVGaBczoad_cr-R1hs4kWZNdJrzBh7aPxebYnbAVd2CTeyXGYr_GIiq_sgtaBBISGoggruY5r-fva3R4YnhoTnmNeFOLDb99bzDPHbWhyjJ5nqBx7yaw1mT9uBnWno-h423bAT81TvXOJ2ogZ-jsYigx6xw, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e2, use=enc, x=A47oP1eLgWo7NsiKGV2Q983D3oNxLnRDlgtEi7HCtSI, y=4CjFGXRHDmm3g_cSB2YZPYsnxorc4tAEJRD35wBu0ys, crv=P-256}]): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhHQ00ifQ.Ac5pGgt-UTQYOQBO4Z-sABTVhrSr70xjotF0FMXWFqUB4iyoihdLRBTnrpjTb6o-orOqA6EMsv6oDZZelSn3J5Ul-cJSPibXuehlX9VQkZv4NDhP38sUeuXNp0IDtNcJeX2tFI2t6W2uFrCYwIkvh8f8bKHR_yUZslFBWAXRwLX9H2PjyQLXhir3hM1SAOKrQQVjaoPOum1n-3F6p_fh8gZYaxVJiJ2Yq9kdqVwY1wjsEq5sq8JN3j8szfE1GBVYHQhdn2I96bpX9OI97ma-XDIZwmQRgHT1mMByhbTG1SzQiIOc4CXGp5b5zER8j55MVZYB0L3iPYVEELY5YjWULc8XTUeSkejvH3ENuckqBoMijx3vb3N3XUFvY1IW6l0DecXEbv87ead-qSRoCNWKsZKtNX457jhtl9xXO0lrjT5kB_D9z_0SbT2X7ffsZ4vMGBbzsII-Ip_cWwl8xYXxwy9OGVsiRt1F0q1JgtNS35lNP9hZvDJksWPo77ebqXEw.ocPwwRIpGacR3VO1.-XXqFCYM6zkOTl3j.hOTzs7STvZrH3Agtm4DoNg] -18:11:55.841 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=Hzbvc__4g2nqIaYoYkc__w): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoiZGV1eCJ9..JruwzL7TaQ1Fub8Hw6yYmQ.b4B9F3kerVHvyGB5zb40lkTqxulLbMhwFi-qvPfFwwbuyPVPf5s7TeT3i3MLRs0-l_1hP5bPxIEEnOEOBbqTGwO1TWuBn_lQsR8XpQRp6t4H0eaXZsnBqOa3MeEtmGpo.Hzbvc__4g2nqIaYoYkc___] -18:11:55.843 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256","kid":"deux"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=one}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=two}]): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoiZGV1eCJ9..JruwzL7TaQ1Fub8Hw6yYmQ.b4B9F3kerVHvyGB5zb40lkTqxulLbMhwFi-qvPfFwwbuyPVPf5s7TeT3i3MLRs0-l_1hP5bPxIEEnOEOBbqTGwO1TWuBn_lQsR8XpQRp6t4H0eaXZsnBqOa3MeEtmGpo.Hzbvc--4g2nqIaYoYkc2pQ] -[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 2.842 s - in org.jose4j.jwt.consumer.JwksDecryptionKeyResolverUsingJwtConsumerTest +18:22:57.680 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=gjuXF4E_dnbE3S_gpJyIYg). +18:22:57.687 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=vqXTwY0oz-lYMTam5TXczw). +18:22:57.690 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=vqXTwY0oz-lYMTam5TXczw). +18:22:57.697 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=cUv9ZBg5EVzMYrZl3WqfQA). +18:22:57.700 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=cUv9ZBg5EVzMYrZl3WqfQA). +18:22:57.703 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=cUv9ZBg5EVzMYrZl3WqfQA). +18:22:57.709 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=fWPBjkC9GYmDTzDx4stnhg). +18:22:57.711 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=fWPBjkC9GYmDTzDx4stnhg). +18:22:57.714 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=fWPBjkC9GYmDTzDx4stnhg). +18:22:57.717 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=fWPBjkC9GYmDTzDx4stnhg). +18:22:57.724 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=5D32p7Ft7CGHFByxN2vFOg). +18:22:57.726 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=5D32p7Ft7CGHFByxN2vFOg). +18:22:57.728 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=5D32p7Ft7CGHFByxN2vFOg). +18:22:57.732 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=5D32p7Ft7CGHFByxN2vFOg). +18:22:57.736 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=5) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=5D32p7Ft7CGHFByxN2vFOg). +18:22:57.746 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=7noFqJue0Lpy2smRG1a9oQ). +18:22:57.747 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=7noFqJue0Lpy2smRG1a9oQ). +18:22:57.750 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=7noFqJue0Lpy2smRG1a9oQ). +18:22:57.752 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=7noFqJue0Lpy2smRG1a9oQ). +18:22:57.754 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=5) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=7noFqJue0Lpy2smRG1a9oQ). +18:22:57.756 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=6) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=7noFqJue0Lpy2smRG1a9oQ). +18:22:57.759 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256"} using attempted decryption to disambiguate from filtered candidate JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=1}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=2}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=3}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=4}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=5}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=6}]) selecting from keys: [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=1}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=2}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=3}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=4}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=5}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=6}]): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..hQm4Plrt9fB1ELDwamhNpg.Fy5sOIbM6iXFJKk3rM_ANyUUwl5XRYnY7zCXokYxoOM.7noFqJue0Lpy2smRG1a9oQ] +18:22:58.089 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). +18:22:58.093 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). +18:22:59.516 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). +18:23:00.076 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). +18:23:00.080 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Message is larger than modulus). +18:23:00.997 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). +18:23:01.595 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=e1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch; caused by: javax.crypto.AEADBadTagException: Tag mismatch). +18:23:02.038 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). +18:23:02.041 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). +18:23:02.954 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). +18:23:02.957 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). +18:23:02.963 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"RSA-OAEP","enc":"A128GCM"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"RSA-OAEP","enc":"A128GCM"} using attempted decryption to disambiguate from filtered candidate JWKs [org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r4, use=enc, n=srRMqzPSg5CoMyaY5YErUQBRJkn0QhkzSiIIPA6dow3MnhR2_1S-D4aNHdet29Yc6qs9Qh6HIirMWcp2FPaKfaIZaJ-Q_-9gVyPDWlKHp9jSTeSetDCxm401e8XxNMjluGqb-3uQWE9W0Ka7IlDXXW1KhLYZ75xDaP5Y1c2n84uMRMKwylNCKQv0KlHIRDhsPfHx82khTGUb1XMqom7FWO8Ii4whRr7Glw0JiXj8ANHGozVTP-EVkZqFRJmwLG-ndyvsJOclEwwrXYqklFloU7WUwZQ5M08F-g-6XlSNHtaDcFagUUQKXG8zSb6GqXtEfhrs0mwI1D66b3txAf_76w9phkwlHp0Ab_lLuJLAr0j_ACtXbyxUQvHOV8QXmBuSwl7dVqAXFXGBQNGRtdewjPYgzmS4l_SzjgvC8jRTd-xzSof_gIIbSrKEtMnIoKhMCexyYGXkEzfv7aZH92_ZDGa9Cszlyqd3TJrDjj75zrkztc3coMOgbIVHoet_Ptmx, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r1, use=enc, n=lFZ04QwtWu_hHgqlry40DuIhVZyl6ci6FzyLfkeHLH8xfCDLR-rvslxX-Ub3teVnPjZYdUFlZztuDo5kOFsF7TvUQMJhx00VZ6qugm-4LDSJ93ioGuo37vNDjMYBs0dEw_xV38e_m_Jo-oTJZN8xfZFroiR0cRNzac2e98lPa-TCxtOCuVp8Q8ro1Y6nC_1g51iY3nZXHfELX4vUxSh-4z7I0VkzCREQNYx-iKWw6MqEl2qG2mohiwlRexphf-1--8RuJ7FgubewzFv6dP_vCO9cYGi2qB0Gw6b9u8Jb60JYM7xLT3wGTQNfepiXQWESbVorxYiwZODP7d0tteD-eQ, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e1, use=enc, x=zw4_6TARtwAsHFDw4Q1gr65t6BMl6lXOmmOMA3R0q58, y=O0Gb45b83A8FRe-DH_xJ4H0dsaQVskZMT_RBIKaSGOc, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e2, use=enc, x=A47oP1eLgWo7NsiKGV2Q983D3oNxLnRDlgtEi7HCtSI, y=4CjFGXRHDmm3g_cSB2YZPYsnxorc4tAEJRD35wBu0ys, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r3, use=enc, n=pkTznDIyNrI9wvfoFqv3yZpHv5PBeSXxdvOIKtsrKTSXxgDqjfn3jS4CiZidUjW1TzwwkYRZYU3Ei-M7qecudUs1QFdoBUNyd7V_X-ueToD1K-JvQCCrb74bzQWHVfsb2bRfuLw3Tyw3JwnWU3Q-P7OP08INyitwFw9Oz5DvKovtuOyAh3-CT8eSXcPMy2LQTt7WW8h2YeMq1EvndAc67ohiz-q3u2Qqwbbyv-p237mL_90JLE4xMBnLNey4FDjtXbXIq8T8QbvGyn4Dc67ZxH4-izAxi_siA_3z0H7oTYRaeNL4JuNqhoB0R4CgThfofdGVGZVWPyyowzSI-7nxbMHYNNse96wDnbTTKC8pP-qDjExRYjzm4iNueaMzzcq3wAIpR5z2tZp1oULOo43R0kcXC51sKrenJWnqIaIj_WsENRAWWHsrh5IycgySWyytaGVgQHaeBagYJHzRcrhWk10e81M8oMtdPPL1MLS0bbU3CTpDcacr4KyAKAL8sVi7-M2UVqvtWkEZCJ9q1cgOFwcp0t8ZKOpw9OgVeyo-P8HoDpfeXM_WecqNuHSRBlJGbAIfKErBiAUAKFmdEKyHtuUi-Ni6cEwDgjrSxX3apxG_41POrZjZBuuV6FYBcR1wqnTr8k-_z49Kv8ZGF3yszgcV3IQ4qK3-M_qqypnEai8, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, use=enc, n=yzFYB2Nqp5Wb34XQUBGRR33tp1jPVds46D3xwmTXPqjsbr4LMQqPWghtN_qE2bHldPJ9RJUk-i3UxnTAwR1bKLaCj6Aip_blZ4z_wK6IUIkJZk2nPD75YyhTpE9CqoI26lL2KBjMj3gn3cIxHi22BdGshppUbaf-ogH18LQ1bStM63uiflX44ud7GT4JVGaBczoad_cr-R1hs4kWZNdJrzBh7aPxebYnbAVd2CTeyXGYr_GIiq_sgtaBBISGoggruY5r-fva3R4YnhoTnmNeFOLDb99bzDPHbWhyjJ5nqBx7yaw1mT9uBnWno-h423bAT81TvXOJ2ogZ-jsYigx6xw, e=AQAB}]) selecting from keys: [org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r4, use=enc, n=srRMqzPSg5CoMyaY5YErUQBRJkn0QhkzSiIIPA6dow3MnhR2_1S-D4aNHdet29Yc6qs9Qh6HIirMWcp2FPaKfaIZaJ-Q_-9gVyPDWlKHp9jSTeSetDCxm401e8XxNMjluGqb-3uQWE9W0Ka7IlDXXW1KhLYZ75xDaP5Y1c2n84uMRMKwylNCKQv0KlHIRDhsPfHx82khTGUb1XMqom7FWO8Ii4whRr7Glw0JiXj8ANHGozVTP-EVkZqFRJmwLG-ndyvsJOclEwwrXYqklFloU7WUwZQ5M08F-g-6XlSNHtaDcFagUUQKXG8zSb6GqXtEfhrs0mwI1D66b3txAf_76w9phkwlHp0Ab_lLuJLAr0j_ACtXbyxUQvHOV8QXmBuSwl7dVqAXFXGBQNGRtdewjPYgzmS4l_SzjgvC8jRTd-xzSof_gIIbSrKEtMnIoKhMCexyYGXkEzfv7aZH92_ZDGa9Cszlyqd3TJrDjj75zrkztc3coMOgbIVHoet_Ptmx, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r1, use=enc, n=lFZ04QwtWu_hHgqlry40DuIhVZyl6ci6FzyLfkeHLH8xfCDLR-rvslxX-Ub3teVnPjZYdUFlZztuDo5kOFsF7TvUQMJhx00VZ6qugm-4LDSJ93ioGuo37vNDjMYBs0dEw_xV38e_m_Jo-oTJZN8xfZFroiR0cRNzac2e98lPa-TCxtOCuVp8Q8ro1Y6nC_1g51iY3nZXHfELX4vUxSh-4z7I0VkzCREQNYx-iKWw6MqEl2qG2mohiwlRexphf-1--8RuJ7FgubewzFv6dP_vCO9cYGi2qB0Gw6b9u8Jb60JYM7xLT3wGTQNfepiXQWESbVorxYiwZODP7d0tteD-eQ, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e1, use=enc, x=zw4_6TARtwAsHFDw4Q1gr65t6BMl6lXOmmOMA3R0q58, y=O0Gb45b83A8FRe-DH_xJ4H0dsaQVskZMT_RBIKaSGOc, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e2, use=enc, x=A47oP1eLgWo7NsiKGV2Q983D3oNxLnRDlgtEi7HCtSI, y=4CjFGXRHDmm3g_cSB2YZPYsnxorc4tAEJRD35wBu0ys, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r3, use=enc, n=pkTznDIyNrI9wvfoFqv3yZpHv5PBeSXxdvOIKtsrKTSXxgDqjfn3jS4CiZidUjW1TzwwkYRZYU3Ei-M7qecudUs1QFdoBUNyd7V_X-ueToD1K-JvQCCrb74bzQWHVfsb2bRfuLw3Tyw3JwnWU3Q-P7OP08INyitwFw9Oz5DvKovtuOyAh3-CT8eSXcPMy2LQTt7WW8h2YeMq1EvndAc67ohiz-q3u2Qqwbbyv-p237mL_90JLE4xMBnLNey4FDjtXbXIq8T8QbvGyn4Dc67ZxH4-izAxi_siA_3z0H7oTYRaeNL4JuNqhoB0R4CgThfofdGVGZVWPyyowzSI-7nxbMHYNNse96wDnbTTKC8pP-qDjExRYjzm4iNueaMzzcq3wAIpR5z2tZp1oULOo43R0kcXC51sKrenJWnqIaIj_WsENRAWWHsrh5IycgySWyytaGVgQHaeBagYJHzRcrhWk10e81M8oMtdPPL1MLS0bbU3CTpDcacr4KyAKAL8sVi7-M2UVqvtWkEZCJ9q1cgOFwcp0t8ZKOpw9OgVeyo-P8HoDpfeXM_WecqNuHSRBlJGbAIfKErBiAUAKFmdEKyHtuUi-Ni6cEwDgjrSxX3apxG_41POrZjZBuuV6FYBcR1wqnTr8k-_z49Kv8ZGF3yszgcV3IQ4qK3-M_qqypnEai8, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, use=enc, n=yzFYB2Nqp5Wb34XQUBGRR33tp1jPVds46D3xwmTXPqjsbr4LMQqPWghtN_qE2bHldPJ9RJUk-i3UxnTAwR1bKLaCj6Aip_blZ4z_wK6IUIkJZk2nPD75YyhTpE9CqoI26lL2KBjMj3gn3cIxHi22BdGshppUbaf-ogH18LQ1bStM63uiflX44ud7GT4JVGaBczoad_cr-R1hs4kWZNdJrzBh7aPxebYnbAVd2CTeyXGYr_GIiq_sgtaBBISGoggruY5r-fva3R4YnhoTnmNeFOLDb99bzDPHbWhyjJ5nqBx7yaw1mT9uBnWno-h423bAT81TvXOJ2ogZ-jsYigx6xw, e=AQAB}]): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhHQ00ifQ.Ac5pGgt-UTQYOQBO4Z-sABTVhrSr70xjotF0FMXWFqUB4iyoihdLRBTnrpjTb6o-orOqA6EMsv6oDZZelSn3J5Ul-cJSPibXuehlX9VQkZv4NDhP38sUeuXNp0IDtNcJeX2tFI2t6W2uFrCYwIkvh8f8bKHR_yUZslFBWAXRwLX9H2PjyQLXhir3hM1SAOKrQQVjaoPOum1n-3F6p_fh8gZYaxVJiJ2Yq9kdqVwY1wjsEq5sq8JN3j8szfE1GBVYHQhdn2I96bpX9OI97ma-XDIZwmQRgHT1mMByhbTG1SzQiIOc4CXGp5b5zER8j55MVZYB0L3iPYVEELY5YjWULc8XTUeSkejvH3ENuckqBoMijx3vb3N3XUFvY1IW6l0DecXEbv87ead-qSRoCNWKsZKtNX457jhtl9xXO0lrjT5kB_D9z_0SbT2X7ffsZ4vMGBbzsII-Ip_cWwl8xYXxwy9OGVsiRt1F0q1JgtNS35lNP9hZvDJksWPo77ebqXEw.ocPwwRIpGacR3VO1.-XXqFCYM6zkOTl3j.hOTzs7STvZrH3Agtm4DoNg] +18:23:03.559 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=Hzbvc__4g2nqIaYoYkc__w): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoiZGV1eCJ9..JruwzL7TaQ1Fub8Hw6yYmQ.b4B9F3kerVHvyGB5zb40lkTqxulLbMhwFi-qvPfFwwbuyPVPf5s7TeT3i3MLRs0-l_1hP5bPxIEEnOEOBbqTGwO1TWuBn_lQsR8XpQRp6t4H0eaXZsnBqOa3MeEtmGpo.Hzbvc__4g2nqIaYoYkc___] +18:23:03.563 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256","kid":"deux"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=one}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=two}]): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoiZGV1eCJ9..JruwzL7TaQ1Fub8Hw6yYmQ.b4B9F3kerVHvyGB5zb40lkTqxulLbMhwFi-qvPfFwwbuyPVPf5s7TeT3i3MLRs0-l_1hP5bPxIEEnOEOBbqTGwO1TWuBn_lQsR8XpQRp6t4H0eaXZsnBqOa3MeEtmGpo.Hzbvc--4g2nqIaYoYkc2pQ] +[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 5.9 s - in org.jose4j.jwt.consumer.JwksDecryptionKeyResolverUsingJwtConsumerTest [INFO] Running org.jose4j.jwt.consumer.X509VerificationKeyResolverInJwtConsumerTest -18:11:55.909 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=iHQKuSGeWUGYZCg4_RGJSIC0NDQ vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, Zb1HT7ryCRAAj2wcQ8hWbzaqX1s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, W8aO-BD2jx9KMzQjhZ85ukJA5Zg] x5t#S256=qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE].): JsonWebSignature{"x5t#S256":"qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE","x5t":"iHQKuSGeWUGYZCg4_RGJSIC0NDQ","alg":"ES256"}->eyJ4NXQjUzI1NiI6InFTX2JYTlNfSklYQ3JuUmdha2I2b3RFS3Utd0xlb3R6N0tBWjN4UVVPcUUiLCJ4NXQiOiJpSFFLdVNHZVdVR1laQ2c0X1JHSlNJQzBORFEiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTc2MSwic3ViIjoiYWJvdXQifQ.04qPYooLJN2G0q0LYVepaydszTuhY7jKjqi5IGkNBAWZ-IBlW_pWzkurR1MkO48SbJQK2swmy7Ogfihi1ClAlA] -18:11:55.911 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=iHQKuSGeWUGYZCg4_RGJSIC0NDQ vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, Zb1HT7ryCRAAj2wcQ8hWbzaqX1s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, W8aO-BD2jx9KMzQjhZ85ukJA5Zg] x5t#S256=qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE].): JsonWebSignature{"x5t#S256":"qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE","x5t":"iHQKuSGeWUGYZCg4_RGJSIC0NDQ","alg":"ES256"}->eyJ4NXQjUzI1NiI6InFTX2JYTlNfSklYQ3JuUmdha2I2b3RFS3Utd0xlb3R6N0tBWjN4UVVPcUUiLCJ4NXQiOiJpSFFLdVNHZVdVR1laQ2c0X1JHSlNJQzBORFEiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTc2MSwic3ViIjoiYWJvdXQifQ.04qPYooLJN2G0q0LYVepaydszTuhY7jKjqi5IGkNBAWZ-IBlW_pWzkurR1MkO48SbJQK2swmy7Ogfihi1ClAlA] -18:11:55.916 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Neither the x5t header nor the x5t#S256 header are present in the JWS.): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] -18:11:55.916 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Neither the x5t header nor the x5t#S256 header are present in the JWS.): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] -18:11:55.921 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -18:11:55.922 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -18:11:55.928 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -18:11:55.929 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -18:11:55.957 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -18:11:55.960 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -18:11:55.969 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to verify the signature with any of the provided keys - SHA-1 thumbs of provided certificates: [ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y].): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] -18:11:55.974 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to verify the signature with any of the provided keys - SHA-1 thumbs of provided certificates: [ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y].): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] -18:11:56.013 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t#S256=FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE].): JsonWebSignature{"x5t#S256":"FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE","alg":"ES256"}->eyJ4NXQjUzI1NiI6IkZTcU90QjV2UHFaNGtqWXAwOUZqQnBrbVhIMFZxRURtLXdFY1Rjb3g2RUUiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTUzOSwic3ViIjoiYWJvdXQifQ.9Nj3UG8N9u7Eyu0wupR-eVS4Mf0ItwwHBZzwLcY2KUCJeWoPRPT7zC4MqMbHfLj6PzFi09iC3q3PniSJwmWJTA] -18:11:56.013 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t#S256=FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE].): JsonWebSignature{"x5t#S256":"FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE","alg":"ES256"}->eyJ4NXQjUzI1NiI6IkZTcU90QjV2UHFaNGtqWXAwOUZqQnBrbVhIMFZxRURtLXdFY1Rjb3g2RUUiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTUzOSwic3ViIjoiYWJvdXQifQ.9Nj3UG8N9u7Eyu0wupR-eVS4Mf0ItwwHBZzwLcY2KUCJeWoPRPT7zC4MqMbHfLj6PzFi09iC3q3PniSJwmWJTA] -18:11:56.033 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=Zb1HT7ryCRAAj2wcQ8hWbzaqX1s vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, iHQKuSGeWUGYZCg4_RGJSIC0NDQ, W8aO-BD2jx9KMzQjhZ85ukJA5Zg].): JsonWebSignature{"x5t":"Zb1HT7ryCRAAj2wcQ8hWbzaqX1s","alg":"RS256"}->eyJ4NXQiOiJaYjFIVDdyeUNSQUFqMndjUThoV2J6YXFYMXMiLCJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5NjI1Nywic3ViIjoiYWJvdXQifQ.RidDM9z0OJkfV2mwxABtEh2Gr_BCFbTuetOTV_dmnFofarBK7VDPPdsdAhtIs3u7WQq9guoo6H3AUGfj4mTFKX3axi2TsaYRKM9wSoRjxFO7ednGcRGx8bnSerqqrbBuM9ZUUt93sIXuneJHYRKlh0Tt9mCXISv1H4OMEueXOJhck-JPgLPfLDqIPa8t93SULKTQtLvs8KEby2uJOL8vIy-a-lFp9irCWwTnd0QRidpuLAPLr428LPNPycEVqD2TpY7y_xaQJh49oqoq_AmQCmIn3CpZLDLqD1wpEPxLQyd1vbvgQ583y2XJ95_QufjbRd2Oshv3Z3JxpIm9Yie6yQ] -18:11:56.034 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=Zb1HT7ryCRAAj2wcQ8hWbzaqX1s vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, iHQKuSGeWUGYZCg4_RGJSIC0NDQ, W8aO-BD2jx9KMzQjhZ85ukJA5Zg].): JsonWebSignature{"x5t":"Zb1HT7ryCRAAj2wcQ8hWbzaqX1s","alg":"RS256"}->eyJ4NXQiOiJaYjFIVDdyeUNSQUFqMndjUThoV2J6YXFYMXMiLCJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5NjI1Nywic3ViIjoiYWJvdXQifQ.RidDM9z0OJkfV2mwxABtEh2Gr_BCFbTuetOTV_dmnFofarBK7VDPPdsdAhtIs3u7WQq9guoo6H3AUGfj4mTFKX3axi2TsaYRKM9wSoRjxFO7ednGcRGx8bnSerqqrbBuM9ZUUt93sIXuneJHYRKlh0Tt9mCXISv1H4OMEueXOJhck-JPgLPfLDqIPa8t93SULKTQtLvs8KEby2uJOL8vIy-a-lFp9irCWwTnd0QRidpuLAPLr428LPNPycEVqD2TpY7y_xaQJh49oqoq_AmQCmIn3CpZLDLqD1wpEPxLQyd1vbvgQ583y2XJ95_QufjbRd2Oshv3Z3JxpIm9Yie6yQ] -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.135 s - in org.jose4j.jwt.consumer.X509VerificationKeyResolverInJwtConsumerTest -[INFO] Running org.jose4j.jwt.consumer.ExamplesFromOpenIdConnectTest -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.045 s - in org.jose4j.jwt.consumer.ExamplesFromOpenIdConnectTest -[INFO] Running org.jose4j.jwt.consumer.JwksVerificationKeyResolverUsingJwtConsumerTest -18:11:56.106 DEBUG o.j.j.c.JwksVerificationKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"HS512","kid":"nope"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=uno}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=two}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=trois}]): JsonWebSignature{"alg":"HS512","kid":"nope"}->eyJhbGciOiJIUzUxMiIsImtpZCI6Im5vcGUifQ.eyJpc3MiOiJGUk9NIiwiYXVkIjoiVE8iLCJleHAiOjE0MjQyMTg2NzksInN1YiI6IkFCT1VUIn0.lZOnt-l4wIUl667laxBjZgyTZsebfitsKT1yBrEQ-DognQiqEafQaVrFTaV3dJrZDvgDqAKL9FzxOHfdBg8NXw] -18:11:56.147 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.uIRIFrhftV39qJNOdaL8LwrK1prIJIHsP7Gn6jJAVbE2Mx4IkwGzBXDLKMulM1IvKElmSyK_KBg8afywcxoApA] -18:11:56.165 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.21eYfC_ZNf1FQ1Dtvj4rUiM9jYPgf1zJfeE_b2fclgu36KAN141ICqVjNxQqlK_7Wbct_FDxgyHvej_LEigb2Q] -18:11:56.182 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTEyNywiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.UE4B0IVPRip-3TDKhNAadCuj_Bf5PlEAn9K94Zd7mP25WNZwxDbQpDElZTZSp-3ngPqQyPGj27emYRHhOnFSAQ] -18:11:56.184 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES384"}->eyJhbGciOiJFUzM4NCJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTIzMSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.NyRtG_eFmMLQ0XkW5kvdSpzYsm6P5M3U8EBFKIhD-jw8E7FOYw9PZ3_o1PWuLWH3XeArZMW7-bAIVxo2bHqJsSUtB6Tf0NWPtCpUF2c1vbuRXEXkGrCUmc4sKyOBjimC] -18:11:56.186 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.pgBu9S8g7MC2BN9YNlWD9JhjzWbQVjqpmErW4hMFncKD8bUidIbMBJSI3URXvnMJrLrAC5eB2gb6DccF_txQaqX1X81JbTSdQ44_P1W-1uIIkfIXUvM6OXv48W-CPm8xGuetQ1ayHgU_1ljtdkbdUHZ6irgaeIrFMgZX0Jdb9Eydnfhwvno2oGk3y6ruq2KgKABIdzgvJXfwdOFGn1z0CxwQSVDkFRLsMsBljTwfTd0v3G8OXT8WRMZMGVyAgtKVu3XJyrPNntVqrzdgQQma6S06Y9J9V9t0AlgEAn2B4TqMxYcu1Tjr7bBL_v83zEXhbdcFBYLfJg-LY5wE6rA-dA] -18:11:56.335 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTEyNywiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.UE4B0IVPRip-3TDKhNAadCuj_Bf5PlEAn9K94Zd7mP25WNZwxDbQpDElZTZSp-3ngPqQyPGj27emYRHhOnFSAQ] -18:11:56.337 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES384"}->eyJhbGciOiJFUzM4NCJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTIzMSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.NyRtG_eFmMLQ0XkW5kvdSpzYsm6P5M3U8EBFKIhD-jw8E7FOYw9PZ3_o1PWuLWH3XeArZMW7-bAIVxo2bHqJsSUtB6Tf0NWPtCpUF2c1vbuRXEXkGrCUmc4sKyOBjimC] -18:11:56.363 DEBUG o.j.j.c.JwksVerificationKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"8a10l"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00r, use=sig, x=AZkOsR09YQeFcD6rhINHWAaAr8DMx9ndFzum50o5KLLUjqF7opKI7TxR5LP_4uUvG2jojF57xxWVwWi2otdETeI-, y=AadJxOSpjf_4VxRjTT_FdAtFX8Pw-CBpaoX-OQPPQ8o0kOrj5nzIltwnEORDldLFIkQQzgTXMzBnWyQurVHU5pUF, crv=P-521}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00q, use=sig, x=3n74sKXRbaBNw9qOGslnl-WcNCdC75cWo_UquiGUFKdDM3hudthywE5y0R6d2Li8, y=YbZ_0lregvTboKmUX7VE7eknQC1yETKUdHzt_YMX4zbTyOxgZL6A38AVfY8Q8HWd, crv=P-384}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00p, use=sig, x=S-EbFKVG-7pXjdgM9SPPw8rN3V8-2uX4bNg4y8R7EhA, y=KTtyNGz9B9_QrkFf7mP90YiH6F40fAYfqpzQh8HG7tc, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=8a00o, use=sig, n=kM-83p_Qaq-1FuxLHH6Y7jQeBT5MK9iHGB75Blnit8rMIcsns72Ls1uhEYiyB3_icK7ibLr2_AHiIl7MnJBY2cCquuwiTccDM5AYUccdypliSlVeAL0MBa_0xfpvBJw8fB45wX6kJKftbQI8xjvFhqSIuGNyQOzFXnJ_mCBOLv-6Nzn79qWxh47mQ7NJk2wSYdFDsz0NNGjBA2VQ9U6weqL1viZ1sbzXr-bJWCjjEYmKC5k0sjGGXJuvMPEqBY2q68kFXD3kiuslQ3tNS1j4d-IraadxpNVtedQ44-xM7MC-WFm2f5eO0LmJRzyipGNPkTer66q6MSEESguyhsoLNQ, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00n, use=sig, x=ADoTal4nAvVCgicprEBBFOzNKUKVJl1Ph8sISl3Z3tz7TJZlQB485LJ3xil-EmWvqW1-sKFl7dY2YtrGUZvjGp0O, y=AXVB58hIK7buMZmRgDU4hrGvcVQLXa-77_F755OKIkuWP5IJ6GdjFvaRHfIbbHMp-whqjmRrlwfYPN1xmyCGSzpT, crv=P-521}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00m, use=sig, x=5Y4xK9IBGJq5-E6QAVdpiqZb9Z-_tro_rX9TAUdWD3jiVS5N-blEnu5zWzoUoiJk, y=ZDFGBLBbiuvHLMOJ3DoOSRLU94uu5y3s03__HaaaLU04Efc4nGdY3vhTQ4kxEqVj, crv=P-384}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00l, use=sig, x=CWzKLukg4yQzi4oM-2m9M-ClxbU4e6P9G_HRn9A0edI, y=UB1OL_eziV6lA5J0PiAuzoKQU_YbXojbjh0sfxtVlOU, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=8a00k, use=sig, n=ux8LdF-7g3X1BlqglZUw36mqjd9P0JWfWxJYvR6pCFSyqLrETc-fL9_lTG3orohkGnEPe7G-BO65ldF44pYEe3eZzcEuEFtiO5W4_Jap1Z430vdYgC_nZtENIJDWlsGM9ev-cOld7By-8l3-wAyuspOKZijWtx6K57VLajyUHBSmbUtaeCwHQOGyMOV1V-cskbTO2u_HrLOLLkSv9oZrznAwpx_paFHy-aAsdFhb7EiBzwqqHQButo3aT3DsR69gbW_Nmrf6tfkril6B3ePKV4od_5jowa6V3765K6v2L4NER7fuZ2hJVbIc0eJXY8tL3NlkBnjnmQ8DBWQR81Ayhw, e=AQAB}]): JsonWebSignature{"alg":"ES256","kid":"8a10l"}->eyJhbGciOiJFUzI1NiIsImtpZCI6IjhhMTBsIn0.eyJzdWIiOiJoYWlsaWUiLCJhdWQiOiJhIiwianRpIjoiRmUwZ1h1UGpmcHoxSHEzdzRaaUZIQiIsImlzcyI6Imh0dHBzOlwvXC9sb2NhbGhvc3Q6OTAzMSIsImlhdCI6MTQyMTA5Mzg1OSwiZXhwIjoxNDIxMDk0NDU5LCJub25jZSI6ImZmcyIsImFjciI6InVybjpvYXNpczpuYW1lczp0YzpTQU1MOjIuMDphYzpjbGFzc2VzOlBhc3N3b3JkIiwiYXV0aF90aW1lIjoxNDIxMDkzMzc2fQ.gzJQZRErEHI_v6z6dZboTPzL7p9_wXrMJIWnYZFEENgq3E1InbrZuQM3wB-mJ5r33kwMibJY7Qi4y-jvk0IYqQ] -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.241 s - in org.jose4j.jwt.consumer.JwksVerificationKeyResolverUsingJwtConsumerTest +18:23:03.696 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=iHQKuSGeWUGYZCg4_RGJSIC0NDQ vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, Zb1HT7ryCRAAj2wcQ8hWbzaqX1s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, W8aO-BD2jx9KMzQjhZ85ukJA5Zg] x5t#S256=qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE].): JsonWebSignature{"x5t#S256":"qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE","x5t":"iHQKuSGeWUGYZCg4_RGJSIC0NDQ","alg":"ES256"}->eyJ4NXQjUzI1NiI6InFTX2JYTlNfSklYQ3JuUmdha2I2b3RFS3Utd0xlb3R6N0tBWjN4UVVPcUUiLCJ4NXQiOiJpSFFLdVNHZVdVR1laQ2c0X1JHSlNJQzBORFEiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTc2MSwic3ViIjoiYWJvdXQifQ.04qPYooLJN2G0q0LYVepaydszTuhY7jKjqi5IGkNBAWZ-IBlW_pWzkurR1MkO48SbJQK2swmy7Ogfihi1ClAlA] +18:23:03.698 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=iHQKuSGeWUGYZCg4_RGJSIC0NDQ vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, Zb1HT7ryCRAAj2wcQ8hWbzaqX1s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, W8aO-BD2jx9KMzQjhZ85ukJA5Zg] x5t#S256=qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE].): JsonWebSignature{"x5t#S256":"qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE","x5t":"iHQKuSGeWUGYZCg4_RGJSIC0NDQ","alg":"ES256"}->eyJ4NXQjUzI1NiI6InFTX2JYTlNfSklYQ3JuUmdha2I2b3RFS3Utd0xlb3R6N0tBWjN4UVVPcUUiLCJ4NXQiOiJpSFFLdVNHZVdVR1laQ2c0X1JHSlNJQzBORFEiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTc2MSwic3ViIjoiYWJvdXQifQ.04qPYooLJN2G0q0LYVepaydszTuhY7jKjqi5IGkNBAWZ-IBlW_pWzkurR1MkO48SbJQK2swmy7Ogfihi1ClAlA] +18:23:03.707 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Neither the x5t header nor the x5t#S256 header are present in the JWS.): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] +18:23:03.709 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Neither the x5t header nor the x5t#S256 header are present in the JWS.): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] +18:23:03.715 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +18:23:03.718 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +18:23:03.729 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +18:23:03.730 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +18:23:03.797 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +18:23:03.804 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +18:23:03.822 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to verify the signature with any of the provided keys - SHA-1 thumbs of provided certificates: [ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y].): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] +18:23:03.833 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to verify the signature with any of the provided keys - SHA-1 thumbs of provided certificates: [ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y].): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] +18:23:03.901 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t#S256=FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE].): JsonWebSignature{"x5t#S256":"FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE","alg":"ES256"}->eyJ4NXQjUzI1NiI6IkZTcU90QjV2UHFaNGtqWXAwOUZqQnBrbVhIMFZxRURtLXdFY1Rjb3g2RUUiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTUzOSwic3ViIjoiYWJvdXQifQ.9Nj3UG8N9u7Eyu0wupR-eVS4Mf0ItwwHBZzwLcY2KUCJeWoPRPT7zC4MqMbHfLj6PzFi09iC3q3PniSJwmWJTA] +18:23:03.903 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t#S256=FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE].): JsonWebSignature{"x5t#S256":"FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE","alg":"ES256"}->eyJ4NXQjUzI1NiI6IkZTcU90QjV2UHFaNGtqWXAwOUZqQnBrbVhIMFZxRURtLXdFY1Rjb3g2RUUiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTUzOSwic3ViIjoiYWJvdXQifQ.9Nj3UG8N9u7Eyu0wupR-eVS4Mf0ItwwHBZzwLcY2KUCJeWoPRPT7zC4MqMbHfLj6PzFi09iC3q3PniSJwmWJTA] +18:23:03.947 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=Zb1HT7ryCRAAj2wcQ8hWbzaqX1s vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, iHQKuSGeWUGYZCg4_RGJSIC0NDQ, W8aO-BD2jx9KMzQjhZ85ukJA5Zg].): JsonWebSignature{"x5t":"Zb1HT7ryCRAAj2wcQ8hWbzaqX1s","alg":"RS256"}->eyJ4NXQiOiJaYjFIVDdyeUNSQUFqMndjUThoV2J6YXFYMXMiLCJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5NjI1Nywic3ViIjoiYWJvdXQifQ.RidDM9z0OJkfV2mwxABtEh2Gr_BCFbTuetOTV_dmnFofarBK7VDPPdsdAhtIs3u7WQq9guoo6H3AUGfj4mTFKX3axi2TsaYRKM9wSoRjxFO7ednGcRGx8bnSerqqrbBuM9ZUUt93sIXuneJHYRKlh0Tt9mCXISv1H4OMEueXOJhck-JPgLPfLDqIPa8t93SULKTQtLvs8KEby2uJOL8vIy-a-lFp9irCWwTnd0QRidpuLAPLr428LPNPycEVqD2TpY7y_xaQJh49oqoq_AmQCmIn3CpZLDLqD1wpEPxLQyd1vbvgQ583y2XJ95_QufjbRd2Oshv3Z3JxpIm9Yie6yQ] +18:23:03.949 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=Zb1HT7ryCRAAj2wcQ8hWbzaqX1s vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, iHQKuSGeWUGYZCg4_RGJSIC0NDQ, W8aO-BD2jx9KMzQjhZ85ukJA5Zg].): JsonWebSignature{"x5t":"Zb1HT7ryCRAAj2wcQ8hWbzaqX1s","alg":"RS256"}->eyJ4NXQiOiJaYjFIVDdyeUNSQUFqMndjUThoV2J6YXFYMXMiLCJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5NjI1Nywic3ViIjoiYWJvdXQifQ.RidDM9z0OJkfV2mwxABtEh2Gr_BCFbTuetOTV_dmnFofarBK7VDPPdsdAhtIs3u7WQq9guoo6H3AUGfj4mTFKX3axi2TsaYRKM9wSoRjxFO7ednGcRGx8bnSerqqrbBuM9ZUUt93sIXuneJHYRKlh0Tt9mCXISv1H4OMEueXOJhck-JPgLPfLDqIPa8t93SULKTQtLvs8KEby2uJOL8vIy-a-lFp9irCWwTnd0QRidpuLAPLr428LPNPycEVqD2TpY7y_xaQJh49oqoq_AmQCmIn3CpZLDLqD1wpEPxLQyd1vbvgQ583y2XJ95_QufjbRd2Oshv3Z3JxpIm9Yie6yQ] +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.338 s - in org.jose4j.jwt.consumer.X509VerificationKeyResolverInJwtConsumerTest [INFO] Running org.jose4j.jwt.consumer.GoogsTooSmallKeyJwtConsumerTest -18:11:56.385 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits).): JsonWebSignature{"alg":"RS256","kid":"76fd32aec7e0f8c190dda8b9dd85e7cf5ad33c43"}->eyJhbGciOiJSUzI1NiIsImtpZCI6Ijc2ZmQzMmFlYzdlMGY4YzE5MGRkYThiOWRkODVlN2NmNWFkMzNjNDMifQ.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_aWQ9QUl0T2F3bGIxSEhFZFJJZW00d2Z1MXFNY1BUdWZvUDZzTi11ZVVrIiwiaWF0IjoxNDMxNjEyMjM4LCJleHAiOjE0MzE2MTU4Mzh9.RRMVpR9WJrkddegS4uKNT7rTov-LvRQ9sCtGo_SXrqkNbLZgArSJcmmHHxoQDsVWUjl2ZNG-7ZjDRuMu-POJLR4GHpwmQ8gttAEeywkiW4in5pUOb21AdgH29HDwG2mY6iVavsASHRutK747gURRlpt3wUJOJk00T9W2N0fVsTE] -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s - in org.jose4j.jwt.consumer.GoogsTooSmallKeyJwtConsumerTest +18:23:04.014 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits).): JsonWebSignature{"alg":"RS256","kid":"76fd32aec7e0f8c190dda8b9dd85e7cf5ad33c43"}->eyJhbGciOiJSUzI1NiIsImtpZCI6Ijc2ZmQzMmFlYzdlMGY4YzE5MGRkYThiOWRkODVlN2NmNWFkMzNjNDMifQ.eyJpc3MiOiJhY2NvdW50cy5nb29nbGUuY29tIiwic3ViIjoiMTE2MzA4NDA4MzE0NjYxNDc4MTMyIiwiYXpwIjoiODIyNzM3NTU1NDI5LWV2dmtkMDBvdHFyNWdsMTEwbmZhcGlzamZvZWEzNmpmLmFwcHMuZ29vZ2xldXNlcmNvbnRlbnQuY29tIiwiZW1haWwiOiJqa3Rlc3QxQG1hcml0aW1lc291cmNlLmNhIiwiYXRfaGFzaCI6Im85bUZjZUx6QV9ZMnhmNEJqVmdOQmciLCJlbWFpbF92ZXJpZmllZCI6dHJ1ZSwiYXVkIjoiODIyNzM3NTU1NDI5LWV2dmtkMDBvdHFyNWdsMTEwbmZhcGlzamZvZWEzNmpmLmFwcHMuZ29vZ2xldXNlcmNvbnRlbnQuY29tIiwiaGQiOiJtYXJpdGltZXNvdXJjZS5jYSIsIm9wZW5pZF9pZCI6Imh0dHBzOi8vd3d3Lmdvb2dsZS5jb20vYWNjb3VudHMvbzgvaWQ_aWQ9QUl0T2F3bGIxSEhFZFJJZW00d2Z1MXFNY1BUdWZvUDZzTi11ZVVrIiwiaWF0IjoxNDMxNjEyMjM4LCJleHAiOjE0MzE2MTU4Mzh9.RRMVpR9WJrkddegS4uKNT7rTov-LvRQ9sCtGo_SXrqkNbLZgArSJcmmHHxoQDsVWUjl2ZNG-7ZjDRuMu-POJLR4GHpwmQ8gttAEeywkiW4in5pUOb21AdgH29HDwG2mY6iVavsASHRutK747gURRlpt3wUJOJk00T9W2N0fVsTE] +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.021 s - in org.jose4j.jwt.consumer.GoogsTooSmallKeyJwtConsumerTest [INFO] Running org.jose4j.jwt.JwtClaimsTest -[INFO] Tests run: 38, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.052 s - in org.jose4j.jwt.JwtClaimsTest -[INFO] Running org.jose4j.http.GetTest -[WARNING] Tests run: 1, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0 s - in org.jose4j.http.GetTest -[INFO] Running org.jose4j.jws.EcdsaUsingShaEdgesTest -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 3.694 s - in org.jose4j.jws.EcdsaUsingShaEdgesTest -[INFO] Running org.jose4j.jws.DetachedContentTest -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.11 s - in org.jose4j.jws.DetachedContentTest -[INFO] Running org.jose4j.jws.HmacShaTest -18:12:00.357 DEBUG org.jose4j.jws.JwsTestSupport - HS256 eyJhbGciOiJIUzI1NiJ9.c29tZSBjb250ZW50IHRoYXQgaXMgdGhlIHBheWxvYWQ.qGO7O7W2ECVl6uO7lfsXDgEF-EUEti0i-a_AimulIRA -18:12:00.361 DEBUG org.jose4j.jws.JwsTestSupport - HS256 eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJodHRwczovL2p3dC1pZHAuZXhhbXBsZS5jb20iLAogICAgInBybiI6Im1haWx0bzptaWtlQGV4YW1wbGUuY29tIiwKICAgICJhdWQiOiJodHRwczovL2p3dC1ycC5leGFtcGxlLm5ldCIsCiAgICAiaWF0IjoxMzAwODE1NzgwLAogICAgImV4cCI6MTMwMDgxOTM4MCwKICAgICJodHRwOi8vY2xhaW1zLmV4YW1wbGUuY29tL21lbWJlciI6dHJ1ZX0.ZhkLsRIwT5xHXNgOpdFJ_7q5kqLd6sMiOOEV6kxTNCo -18:12:00.366 DEBUG org.jose4j.jws.JwsTestSupport - HS384 eyJhbGciOiJIUzM4NCJ9.eyJtZWgiOiJtZWgifQ.fptKQJmGN3fBP_FiQzdAGdmx-Q5iWjQvJrLfdmFnebxbQuzOmzejBrzYh4MyS01a -18:12:00.372 DEBUG org.jose4j.jws.JwsTestSupport - HS384 eyJhbGciOiJIUzM4NCJ9.TG9va2luZyBnb29kLCBCaWxseSBSYXkh.wtlqZW8_eLF3hjMZT9c_kzg133b2b_JsR44bHGshc4w_BEUJApKerwEw9cltL8w9 -18:12:00.378 DEBUG org.jose4j.jws.JwsTestSupport - HS512 eyJhbGciOiJIUzUxMiJ9.RmVlbGluZyBnb29kLCBMb3VpcyE.i4SAIaVYY4gxhqJxMvw3FKsar5RBCxzadaK2YT3HeeguWgJMLpDMu9cK1WxetjYmce49ZQmTxmB5nTbE_IgKHQ -18:12:00.384 DEBUG org.jose4j.jws.JwsTestSupport - HS512 eyJhbGciOiJIUzUxMiJ9.eyJtZWgiOiJtZWh2YWx1ZSJ9.NeB669dYkPmqgLqgd_sVqwIfCvb4XN-K67gpMJR93wfw_DylpxB1ell2opHM-E5P9jNKE2GYxTxwcI68Z2CTxw -18:12:00.394 DEBUG org.jose4j.jws.HmacShaTest - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 72 bits -18:12:00.396 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 384 bits for HS384) or larger MUST be used with the HMAC SHA algorithms but this key is only 376 bits -18:12:00.398 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 384 bits for HS384) or larger MUST be used with the HMAC SHA algorithms but this key is only 376 bits -18:12:00.400 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 512 bits for HS512) or larger MUST be used with the HMAC SHA algorithms but this key is only 504 bits -18:12:00.402 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 512 bits for HS512) or larger MUST be used with the HMAC SHA algorithms but this key is only 504 bits -18:12:00.404 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 8 bits -18:12:00.405 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 248 bits -18:12:00.409 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 248 bits -[INFO] Tests run: 16, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.071 s - in org.jose4j.jws.HmacShaTest -[INFO] Running org.jose4j.jws.JwsUnencodedPayloadOptionTest -18:12:00.752 DEBUG o.j.j.JwsUnencodedPayloadOptionTest - Expected exception because JWS Compact Serialization with unencoded non-detached payloads cannot have period ('.') characters : org.jose4j.lang.JoseException: per https://tools.ietf.org/html/rfc7797#section-5.2 when using the JWS Compact Serialization, unencoded non-detached payloads using period ('.') characters would cause parsing errors; such payloads MUST NOT be used with the JWS Compact Serialization. -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.313 s - in org.jose4j.jws.JwsUnencodedPayloadOptionTest -[INFO] Running org.jose4j.jws.RsaUsingShaTest -18:12:06.316 DEBUG org.jose4j.jws.JwsTestSupport - RS256 eyJhbGciOiJSUzI1NiJ9.UEFZTE9BRCEhIQ.BhDMIFzeRtUvl9GWpKCOOwHGFcLQO3KMAN5MO9Ur-w2dC5OivFT4JKjLxNubp18mc-AHCdlrI9Cnos_ws905EKRexe5-JWPh_xyhtR_VZKbUM-m_ww9p_PjvnmGMbNhzlwYDZd2P-Jso4g9jbAAslK70Elya_JjujVc4LHb4L0kAFWf9VsZNayprlw2MfuQXSGQtcVtRiLG8xTM5wiRYCOrXFE5g__Vmuhswz_156mE8kdfF3nrfWULIuQysTwfuyiQ_92c9oCRcuoU1AtHsoIKgHtLy8E5x5qoLWETYM6nppJutnggQkZhHwB1cQBpZSvQ3OUeOEZjCVXBP2NoT6Q -18:12:06.537 DEBUG org.jose4j.jws.JwsTestSupport - RS384 eyJhbGciOiJSUzM4NCJ9.UEFZTE9BRCEh.CFLMWZMTemSwhn0cpskITfu2vnnSR-_RhvAqZaONKgOOFY1rJ1yqv4p1B1BPE59Xe7fN9HomPRScB-h7b2wuZjwpB0X7MoNLmu455iAOgdnRWZiLsVBVqHulXj3M39x2iqdZ8I3RKqPN2sLudxvKBEPJpe7kjHWM5Qt6bxSMLGwDbFQ2O7Z-jbUOe_sXGCOyj0Xc7sJYPGiBtwPom0hpczai3FFz93hsWwNMJQCyE9ZIZmsCGr8nqVJOaPjdSg5y9YgqbW5Vt2urXVakMCgPV9kS-APDpYa5hbIGXMG5QgdWbaqE6wTqyxECZ9Kbi0fM6GlsHu31qVf2ZyyKyEz2eA -18:12:06.757 DEBUG org.jose4j.jws.JwsTestSupport - RS512 eyJhbGciOiJSUzUxMiJ9.UEFZTE9BRCE.IBt4dzeel5qsiqFoJ6hu3YPvRkA3GjMqzAtkLAikc5vFJGJAv4QHmLNerEZKQmye3AdXM7EcupfMJ53Dns3-rSfWQOeUZuogdHaKhkxqGQOPzfV1Rvlue3pYmAecE7BsZN6LIdAyIm7M_hWQM9tTpwWZM1rlk6kR2wnLi9qGaVqwm7sXFT-_SWoR7DNRJDokr9_2PU-iqL8dAeRWYUN2cEeFTrCnXoWB-9xY0918RJgQAdP_0mGXnbBl0seyy6ES1SwYX8BBFivC9RnGU5gjpNkInMRcRxPhPVfYATFIBWCf0frrl9dCRtHd7aL7sCSbQV2TfEAaI1m7qAMwHU0yDA -18:12:07.504 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -18:12:07.505 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -18:12:07.506 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -18:12:07.506 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -18:12:07.507 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -18:12:07.507 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -18:12:07.508 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -18:12:07.508 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -18:12:07.509 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -18:12:07.510 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -18:12:07.510 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -18:12:07.511 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -18:12:07.511 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -18:12:07.512 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -18:12:07.512 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA384withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -18:12:07.513 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA384withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -18:12:07.513 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -18:12:07.514 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -18:12:07.514 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -18:12:07.515 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -18:12:07.515 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -18:12:07.515 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -18:12:07.516 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -18:12:07.517 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA512withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -18:12:07.517 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA512withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -18:12:07.518 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -18:12:07.518 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 6.746 s - in org.jose4j.jws.RsaUsingShaTest -[INFO] Running org.jose4j.jws.MaintainEncodedPayloadAndHeaderTest -18:12:07.527 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", - "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9X.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -18:12:07.530 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", - "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9===.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -18:12:07.536 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", - "alg":"HS256"}->!!!!eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.006 s - in org.jose4j.jws.MaintainEncodedPayloadAndHeaderTest -[INFO] Running org.jose4j.jws.JwsPlaintextTest -18:12:07.561 DEBUG org.jose4j.jws.JwsPlaintextTest - {"auth_time":1339613248,"exp":1339613548,"iss":"https:\/\/example.com","aud":"a","jti":"jIA8qa35AroV6iP2q4wRAl","user_id":"john","iat":1339613248,"acr":3} -[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.012 s - in org.jose4j.jws.JwsPlaintextTest -[INFO] Running org.jose4j.jws.EcdsaUsingShaAlgorithmTest -[0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 2] -[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.586 s - in org.jose4j.jws.EcdsaUsingShaAlgorithmTest -[INFO] Running org.jose4j.jws.JwsUsingHmacSha256ExampleTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.014 s - in org.jose4j.jws.JwsUsingHmacSha256ExampleTest -[INFO] Running org.jose4j.jws.PublicKeyAsHmacKeyTest -18:12:08.253 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:12:08.254 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:12:08.254 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:12:08.255 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:12:08.255 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:12:08.256 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:12:08.261 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:12:08.311 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:12:08.313 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:12:08.315 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:12:08.818 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -18:12:08.829 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:12:08.831 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:12:08.833 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:12:08.852 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:12:08.864 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:12:08.875 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:12:08.876 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -18:12:08.886 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:12:08.889 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:12:09.071 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:12:09.072 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:12:09.085 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:12:09.086 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:12:09.086 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:12:09.110 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:12:09.134 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:12:09.183 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:12:09.207 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:12:09.208 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:12:09.208 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:12:09.209 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:12:09.259 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:12:09.263 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:12:09.267 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:12:09.268 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:12:09.268 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:12:09.268 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:12:09.268 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:12:09.271 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:12:09.275 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:12:09.278 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:12:09.278 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:12:09.279 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:09.279 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@15a12ae registered for zip algorithm DEF -18:12:09.279 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:12:09.279 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 1025ms -18:12:09.285 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. -18:12:09.286 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:12:09.286 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:12:09.286 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:12:09.287 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:12:09.287 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:12:09.287 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:12:09.288 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:12:09.288 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:12:09.288 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:12:09.289 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:12:09.290 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@125bf5b -18:12:09.291 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -18:12:09.291 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:12:09.291 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:12:09.291 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:12:09.293 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:12:09.295 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:12:09.297 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:12:09.297 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -18:12:09.298 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:12:09.298 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:12:09.301 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:12:09.301 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:12:09.302 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:12:09.302 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:12:09.303 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:12:09.307 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:12:09.311 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:12:09.316 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:12:09.320 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:12:09.321 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:12:09.321 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:12:09.321 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:12:09.322 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:12:09.324 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:12:09.325 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:12:09.325 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:12:09.326 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:12:09.326 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:12:09.326 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:12:09.327 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:12:09.328 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:12:09.329 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:12:09.329 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:12:09.330 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:09.330 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@174d36a registered for zip algorithm DEF -18:12:09.330 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:12:09.330 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 44ms -18:12:09.396 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:12:09.396 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:12:09.396 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:12:09.397 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:12:09.398 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:12:09.398 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:12:09.398 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:12:09.399 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:12:09.399 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:12:09.400 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:12:09.463 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -18:12:09.464 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:12:09.464 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:12:09.465 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:12:09.473 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:12:09.482 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:12:09.490 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:12:09.490 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -18:12:09.491 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:12:09.492 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:12:09.498 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:12:09.499 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:12:09.500 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:12:09.500 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:12:09.500 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:12:09.522 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:12:09.544 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:12:09.566 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:12:09.619 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:12:09.619 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:12:09.620 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:12:09.620 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:12:09.624 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:12:09.627 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:12:09.630 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:12:09.630 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:12:09.630 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:12:09.631 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:12:09.631 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:12:09.634 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:12:09.636 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:12:09.640 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:12:09.640 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:12:09.640 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:09.640 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@1a5b70d registered for zip algorithm DEF -18:12:09.640 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:12:09.641 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 245ms -18:12:09.643 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. -18:12:09.643 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:12:09.644 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:12:09.644 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:12:09.644 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:12:09.644 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:12:09.644 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:12:09.645 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:12:09.645 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:12:09.645 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:12:09.646 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:12:09.647 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@125bf5b -18:12:09.647 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -18:12:09.647 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:12:09.648 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:12:09.648 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:12:09.650 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:12:09.652 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:12:09.654 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:12:09.654 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -18:12:09.654 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:12:09.655 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:12:09.658 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:12:09.658 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:12:09.659 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:12:09.659 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:12:09.660 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:12:09.664 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:12:09.669 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:12:09.673 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:12:09.678 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:12:09.679 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:12:09.679 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:12:09.680 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:12:09.681 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:12:09.682 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:12:09.683 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:12:09.683 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:12:09.684 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:12:09.684 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:12:09.684 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:12:09.685 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:12:09.686 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:12:09.689 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:12:09.690 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:12:09.690 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:09.690 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@45193b registered for zip algorithm DEF -18:12:09.690 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:12:09.690 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 46ms -18:12:09.747 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:12:09.748 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:12:09.748 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:12:09.749 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:12:09.749 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:12:09.750 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:12:09.750 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:12:09.751 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:12:09.751 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:12:09.752 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:12:09.794 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -18:12:09.795 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:12:09.795 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:12:09.796 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:12:09.804 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:12:09.812 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:12:09.820 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:12:09.820 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -18:12:09.821 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:12:09.822 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:12:09.828 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:12:09.829 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:12:09.830 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:12:09.830 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:12:09.830 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:12:09.851 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:12:09.873 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:12:09.895 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:12:09.944 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:12:09.944 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:12:09.945 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:12:09.946 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:12:09.949 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:12:09.952 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:12:09.955 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:12:09.955 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:12:09.956 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:12:09.956 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:12:09.956 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:12:09.959 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:12:09.962 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:12:09.965 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:12:09.965 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:12:09.966 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:09.966 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@6d5d29 registered for zip algorithm DEF -18:12:09.966 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:12:09.966 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 218ms -18:12:09.968 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. -18:12:09.969 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:12:09.969 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:12:09.970 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:12:09.970 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:12:09.970 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:12:09.970 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:12:09.971 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:12:09.971 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:12:09.971 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:12:09.971 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:12:09.972 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@125bf5b -18:12:09.973 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -18:12:09.973 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:12:09.974 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:12:09.974 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:12:09.975 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:12:09.977 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:12:09.979 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:12:09.979 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -18:12:09.980 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:12:09.980 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:12:09.983 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:12:09.983 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:12:09.984 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:12:09.984 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:12:09.984 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:12:09.989 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:12:09.993 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:12:09.998 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:12:10.002 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:12:10.003 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:12:10.003 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:12:10.003 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:12:10.005 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:12:10.006 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:12:10.007 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:12:10.007 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:12:10.007 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:12:10.008 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:12:10.008 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:12:10.009 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:12:10.010 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:12:10.011 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:12:10.011 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:12:10.012 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:10.012 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@530d1e registered for zip algorithm DEF -18:12:10.012 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:12:10.012 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 42ms -18:12:10.069 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:12:10.069 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:12:10.070 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:12:10.070 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:12:10.071 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:12:10.071 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:12:10.071 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:12:10.072 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:12:10.072 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:12:10.072 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:12:10.098 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -18:12:10.099 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:12:10.100 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:12:10.100 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:12:10.108 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:12:10.115 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:12:10.122 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:12:10.122 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -18:12:10.123 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:12:10.124 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:12:10.130 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:12:10.130 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:12:10.131 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:12:10.132 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:12:10.132 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:12:10.152 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:12:10.173 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:12:10.194 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:12:10.214 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:12:10.215 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:12:10.216 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:12:10.216 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:12:10.219 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:12:10.222 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:12:10.224 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:12:10.224 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:12:10.225 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:12:10.225 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:12:10.225 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:12:10.227 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:12:10.230 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:12:10.233 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:12:10.233 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:12:10.233 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:10.233 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@5ee75e registered for zip algorithm DEF -18:12:10.234 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:12:10.234 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 164ms -18:12:10.236 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. -18:12:10.237 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:12:10.237 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:12:10.237 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:12:10.238 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:12:10.238 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:12:10.238 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:12:10.238 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:12:10.239 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:12:10.239 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:12:10.239 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:12:10.240 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@125bf5b -18:12:10.241 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -18:12:10.241 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:12:10.241 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:12:10.242 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:12:10.244 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:12:10.245 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:12:10.248 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:12:10.248 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -18:12:10.249 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:12:10.249 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:12:10.253 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:12:10.254 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:12:10.255 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:12:10.255 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:12:10.256 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:12:10.260 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:12:10.264 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:12:10.268 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:12:10.273 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:12:10.273 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:12:10.274 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:12:10.274 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:12:10.275 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:12:10.276 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:12:10.277 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:12:10.278 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:12:10.278 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:12:10.278 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:12:10.279 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:12:10.280 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:12:10.281 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:12:10.283 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:12:10.283 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:12:10.283 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:10.283 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@a12036 registered for zip algorithm DEF -18:12:10.284 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:12:10.284 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 47ms -18:12:10.453 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. -18:12:10.454 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. -18:12:10.490 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. -18:12:10.491 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 2.278 s - in org.jose4j.jws.PublicKeyAsHmacKeyTest -[INFO] Running org.jose4j.jws.ChangingKeyTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jws.ChangingKeyTest -[INFO] Running org.jose4j.jws.CritHeaderTest -18:12:10.511 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'nope' marked as critical. -18:12:10.528 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: crit header value not an array (class java.lang.String). -18:12:10.528 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: crit header value not an array (class java.lang.Boolean). -18:12:10.530 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'http://example.com/UNDEFINED' marked as critical. -18:12:10.532 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'urn:example.com:nope' marked as critical. -18:12:10.548 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'urn:example.com:nope' marked as critical. -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.036 s - in org.jose4j.jws.CritHeaderTest -[INFO] Running org.jose4j.jws.EdDsaTest -18:12:10.680 DEBUG org.jose4j.jws.EdDsaAlgorithm - Problem verifying EdDSA signature: java.security.SignatureException: Invalid point -18:12:10.751 DEBUG org.jose4j.jws.JwsTestSupport - EdDSA eyJhbGciOiJFZERTQSJ9.TGl0dGxlIEVk.pJgR0oNkg5R2XABZSLWOBX0VJo7JC7tjFkp2F3NN_ErwICtaG1l-7cJ7UcfgxOyQifiWxGWi_UwtM4MkbJNxBg -18:12:11.597 DEBUG org.jose4j.jws.JwsTestSupport - EdDSA eyJhbGciOiJFZERTQSJ9.QmlnIEVk.81taVYZtor23UtbsrZZTceky_Dr_eIi_9POovQSjJNNdTMrD2VEYcOkN0NEKumJ4mMO6g6fJKxsAGCNMlX_iy3IRPLiFYKSJpjcquvfPRsvXSPpUwPRMbWicWaBj775GDIfKPuf2KKrpDlNUzepDxAkA -18:12:12.369 DEBUG org.jose4j.jws.JwsTestSupport - EdDSA eyJhbGciOiJFZERTQSJ9.Q291c2luIEVkZGll.6nJh52H9RDS7S2D2ZSscanH7-Ci9dh7nvBm1petVuGMRgVD5xahcAK6S5M3b3gy8exbyWEnX0coM7LiumUtTBQ -18:12:12.486 DEBUG org.jose4j.jws.EdDsaAlgorithm - Problem verifying EdDSA signature: java.security.SignatureException: signature length invalid -18:12:12.579 DEBUG org.jose4j.jws.EdDsaAlgorithm - Problem verifying EdDSA signature: java.security.SignatureException: signature length invalid -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 2.006 s - in org.jose4j.jws.EdDsaTest -[INFO] Running org.jose4j.jws.JwsPayloadVariationsTest -18:12:12.971 DEBUG o.j.jws.JwsPayloadVariationsTest - Expected: org.jose4j.lang.IntegrityException: JWS signature is invalid. -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.355 s - in org.jose4j.jws.JwsPayloadVariationsTest -[INFO] Running org.jose4j.jws.JwsCryptoPrimitiveTest -18:12:12.978 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getSignature(): Signature object: SHA256withECDSA -18:12:12.999 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getSignature(): Signature object: SHA256withRSA -18:12:13.166 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getMac(): javax.crypto.Mac@1ff34c6 -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.186 s - in org.jose4j.jws.JwsCryptoPrimitiveTest -[INFO] Running org.jose4j.jws.JwsUsingRsaSha256ExampleTest -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.18 s - in org.jose4j.jws.JwsUsingRsaSha256ExampleTest -[INFO] Running org.jose4j.jws.RsaPssTest -18:12:13.363 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS -18:12:13.528 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS -18:12:13.694 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS -18:12:13.901 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS -18:12:14.067 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS -18:12:14.233 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS -18:12:14.436 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:12:14.437 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:12:14.437 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:12:14.438 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:12:14.438 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:12:14.438 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:12:14.439 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:12:14.439 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:12:14.440 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:12:14.440 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:12:14.461 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -18:12:14.462 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:12:14.462 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:12:14.463 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:12:14.470 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:12:14.477 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:12:14.484 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:12:14.485 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -18:12:14.486 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:12:14.487 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:12:14.492 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:12:14.492 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:12:14.493 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:12:14.493 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:12:14.494 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:12:14.514 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:12:14.534 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:12:14.556 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:12:14.592 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:12:14.592 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:12:14.592 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:12:14.593 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:12:14.596 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:12:14.599 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:12:14.601 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:12:14.601 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:12:14.602 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:12:14.602 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:12:14.602 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:12:14.605 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:12:14.608 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:12:14.610 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:12:14.610 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:12:14.611 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:14.611 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@6f8b8b registered for zip algorithm DEF -18:12:14.611 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:12:14.611 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 174ms -18:12:14.785 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS -18:12:14.954 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@4ca3f6):Signature object: SHA256withRSAandMGF1 -18:12:15.119 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS -18:12:15.286 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@2c13a8):Signature object: SHA384withRSAandMGF1 -18:12:15.450 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS -18:12:15.616 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@b7550d):Signature object: SHA512withRSAandMGF1 -18:12:15.780 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:12:15.780 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:12:15.781 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:12:15.781 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:12:15.781 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:12:15.781 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:12:15.782 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:12:15.782 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:12:15.782 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:12:15.782 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:12:15.784 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@125bf5b -18:12:15.784 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -18:12:15.784 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:12:15.784 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:12:15.785 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:12:15.787 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:12:15.788 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:12:15.790 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:12:15.790 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -18:12:15.791 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:12:15.791 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:12:15.794 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:12:15.794 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:12:15.795 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:12:15.795 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:12:15.795 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:12:15.800 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:12:15.804 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:12:15.809 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:12:15.814 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:12:15.814 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:12:15.815 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:12:15.815 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:12:15.816 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:12:15.817 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:12:15.818 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:12:15.819 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:12:15.819 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:12:15.819 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:12:15.819 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:12:15.820 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:12:15.821 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:12:15.822 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:12:15.822 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:12:15.823 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:15.823 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@541c15 registered for zip algorithm DEF -18:12:15.823 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:12:15.823 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 42ms -18:12:15.860 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:12:15.861 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:12:15.861 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:12:15.862 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:12:15.862 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:12:15.862 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:12:15.863 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:12:15.863 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:12:15.863 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:12:15.864 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:12:15.884 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -18:12:15.885 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:12:15.885 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:12:15.885 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:12:15.893 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|SHA256withRSAandMGF1) registered for alg algorithm PS256 -18:12:15.901 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|SHA384withRSAandMGF1) registered for alg algorithm PS384 -18:12:15.908 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|SHA512withRSAandMGF1) registered for alg algorithm PS512 -18:12:15.909 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -18:12:15.910 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:12:15.910 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:12:15.915 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:12:15.916 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:12:15.916 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:12:15.917 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:12:15.917 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:12:15.937 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:12:15.958 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:12:15.978 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:12:15.999 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:12:16.000 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:12:16.000 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:12:16.001 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:12:16.004 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:12:16.006 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:12:16.009 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:12:16.009 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:12:16.009 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:12:16.010 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:12:16.010 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:12:16.012 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:12:16.015 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:12:16.017 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:12:16.018 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:12:16.018 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:16.018 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@12a0c8 registered for zip algorithm DEF -18:12:16.018 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:12:16.018 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 157ms -18:12:16.019 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA256withRSAandMGF1 -18:12:16.185 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA384withRSAandMGF1 -18:12:16.349 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA512withRSAandMGF1 -18:12:16.513 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:12:16.514 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:12:16.514 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:12:16.514 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:12:16.515 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:12:16.515 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:12:16.515 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:12:16.515 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:12:16.516 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:12:16.516 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:12:16.517 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@125bf5b -18:12:16.517 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -18:12:16.518 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:12:16.518 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:12:16.518 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:12:16.520 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:12:16.522 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:12:16.523 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:12:16.524 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -18:12:16.524 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:12:16.525 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:12:16.528 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:12:16.528 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:12:16.528 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:12:16.528 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:12:16.529 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:12:16.533 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:12:16.537 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:12:16.541 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:12:16.545 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:12:16.546 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:12:16.546 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:12:16.546 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:12:16.547 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:12:16.548 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:12:16.550 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:12:16.550 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:12:16.550 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:12:16.551 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:12:16.551 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:12:16.552 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:12:16.553 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:12:16.554 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:12:16.554 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:12:16.554 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:16.554 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@7aa82b registered for zip algorithm DEF -18:12:16.554 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:12:16.555 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 41ms -18:12:16.726 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:12:16.726 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:12:16.726 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:12:16.727 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:12:16.727 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:12:16.727 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:12:16.728 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:12:16.728 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:12:16.728 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:12:16.729 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:12:16.748 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -18:12:16.749 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:12:16.749 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:12:16.750 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:12:16.757 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:12:16.764 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:12:16.771 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:12:16.771 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -18:12:16.772 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:12:16.773 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:12:16.777 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:12:16.778 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:12:16.779 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:12:16.779 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:12:16.779 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:12:16.799 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:12:16.819 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:12:16.839 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:12:16.860 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:12:16.861 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:12:16.861 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:12:16.862 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:12:16.865 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:12:16.867 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:12:16.869 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:12:16.870 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:12:16.870 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:12:16.870 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:12:16.870 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:12:16.873 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:12:16.875 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:12:16.877 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:12:16.878 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:12:16.878 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:16.878 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@16b0ae6 registered for zip algorithm DEF -18:12:16.878 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:12:16.878 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 152ms -18:12:16.943 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:12:16.943 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:12:16.944 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:12:16.944 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:12:16.944 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:12:16.944 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:12:16.945 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:12:16.945 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:12:16.945 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:12:16.945 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:12:16.946 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@125bf5b -18:12:16.947 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -18:12:16.947 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:12:16.947 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:12:16.947 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:12:16.949 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:12:16.951 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:12:16.952 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:12:16.953 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -18:12:16.953 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:12:16.953 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:12:16.956 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:12:16.957 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:12:16.957 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:12:16.957 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:12:16.958 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:12:16.962 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:12:16.966 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:12:16.970 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:12:16.974 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:12:16.975 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:12:16.975 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:12:16.975 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:12:16.976 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:12:16.977 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:12:16.979 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:12:16.980 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:12:16.980 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:12:16.980 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:12:16.981 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:12:16.981 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:12:16.982 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:12:16.983 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:12:16.984 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:12:16.984 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:16.984 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@55f7ea registered for zip algorithm DEF -18:12:16.984 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:12:16.984 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 40ms -18:12:17.050 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:12:17.051 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:12:17.051 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:12:17.051 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:12:17.052 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:12:17.052 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:12:17.052 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:12:17.053 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:12:17.053 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:12:17.054 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:12:17.071 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -18:12:17.072 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:12:17.073 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:12:17.073 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:12:17.080 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|SHA256withRSAandMGF1) registered for alg algorithm PS256 -18:12:17.087 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|SHA384withRSAandMGF1) registered for alg algorithm PS384 -18:12:17.094 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|SHA512withRSAandMGF1) registered for alg algorithm PS512 -18:12:17.095 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -18:12:17.096 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:12:17.096 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:12:17.101 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:12:17.101 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:12:17.102 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:12:17.102 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:12:17.103 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:12:17.123 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:12:17.143 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:12:17.163 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:12:17.184 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:12:17.184 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:12:17.185 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:12:17.185 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:12:17.188 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:12:17.191 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:12:17.193 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:12:17.194 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:12:17.194 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:12:17.194 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:12:17.194 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:12:17.197 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:12:17.199 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:12:17.202 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:12:17.202 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:12:17.202 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:17.202 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@1a87e37 registered for zip algorithm DEF -18:12:17.202 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:12:17.203 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 152ms -18:12:17.267 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:12:17.267 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:12:17.268 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:12:17.268 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:12:17.268 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:12:17.268 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:12:17.269 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:12:17.269 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:12:17.269 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:12:17.269 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:12:17.270 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@125bf5b -18:12:17.271 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -18:12:17.271 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:12:17.271 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:12:17.271 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:12:17.273 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:12:17.275 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:12:17.278 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:12:17.278 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -18:12:17.278 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:12:17.280 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:12:17.283 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:12:17.283 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:12:17.284 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:12:17.284 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:12:17.284 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:12:17.288 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:12:17.292 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:12:17.297 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:12:17.301 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:12:17.301 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:12:17.302 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:12:17.302 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:12:17.303 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:12:17.304 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:12:17.305 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:12:17.305 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:12:17.306 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:12:17.306 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:12:17.306 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:12:17.307 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:12:17.308 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:12:17.309 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:12:17.309 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:12:17.309 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:17.309 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@1ad977d registered for zip algorithm DEF -18:12:17.310 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:12:17.310 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 42ms -18:12:17.439 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:12:17.439 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:12:17.440 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:12:17.440 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:12:17.440 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:12:17.441 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:12:17.441 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:12:17.441 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:12:17.442 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:12:17.442 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:12:17.459 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -18:12:17.460 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:12:17.461 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:12:17.461 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:12:17.469 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:12:17.475 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:12:17.482 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:12:17.483 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -18:12:17.484 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:12:17.485 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:12:17.489 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:12:17.490 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:12:17.490 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:12:17.491 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:12:17.491 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:12:17.511 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:12:17.532 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:12:17.553 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:12:17.573 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:12:17.574 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:12:17.574 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:12:17.575 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:12:17.578 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:12:17.580 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:12:17.583 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:12:17.583 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:12:17.583 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:12:17.584 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:12:17.584 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:12:17.586 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:12:17.589 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:12:17.591 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:12:17.591 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:12:17.592 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:17.592 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@1b25825 registered for zip algorithm DEF -18:12:17.592 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:12:17.592 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 152ms -18:12:17.612 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:12:17.612 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:12:17.612 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:12:17.612 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:12:17.613 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:12:17.613 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:12:17.613 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:12:17.613 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:12:17.613 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:12:17.614 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:12:17.615 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@125bf5b -18:12:17.615 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -18:12:17.615 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:12:17.615 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:12:17.616 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:12:17.617 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:12:17.619 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:12:17.620 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:12:17.621 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -18:12:17.621 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:12:17.622 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:12:17.625 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:12:17.625 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:12:17.625 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:12:17.625 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:12:17.626 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:12:17.630 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:12:17.634 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:12:17.638 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:12:17.642 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:12:17.643 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:12:17.643 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:12:17.643 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:12:17.644 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:12:17.645 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:12:17.646 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:12:17.647 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:12:17.647 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:12:17.647 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:12:17.647 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:12:17.648 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:12:17.649 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:12:17.650 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:12:17.650 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:12:17.650 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:17.651 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@25ced registered for zip algorithm DEF -18:12:17.651 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:12:17.651 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 39ms -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 4.289 s - in org.jose4j.jws.RsaPssTest -[INFO] Running org.jose4j.jws.JwsUsingEcdsaP256Sha256ExampleTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.022 s - in org.jose4j.jws.JwsUsingEcdsaP256Sha256ExampleTest -[INFO] Running org.jose4j.jws.EcdsaUsingShaTest -18:12:17.896 DEBUG org.jose4j.jws.JwsTestSupport - ES384 eyJhbGciOiJFUzM4NCJ9.VGhlIHVtbGF1dCAoL8uIyoptbGHKinQvIFVVTS1sb3d0KSByZWZlcnMgdG8gYSBzb3VuZCBzaGlmdC4.Jgxxd6pyuf__AmOD3XURmT4QA0h_Tr8dZUkyk5IlsKzVrm6zsCjoT19PzRoEaWsoAN0VNmaRIzgvPvgayYlGg0BlANk2HffO5iNSiwjQQZjl66i8EZ6os94WqzfbKttu -18:12:18.776 DEBUG org.jose4j.jws.JwsTestSupport - ES512 eyJhbGciOiJFUzUxMiJ9.Pz8_Pz8.AOK64n0Do-BlIx8rFRfWucCY-3EsDiqcmxSVz917x5Lkm6iD7yTnpd5z9w7siZnXpUWEVMKeDt6RmLonT1eSHrWRAFy9JGsn_o9t5gwUHfpU9S8xhmQnUEb_mcZte1igLBFsaueAf_e5eJqssEMCtmCJSBMS72p2yusW15xwP_H_WHdh -18:12:19.622 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -18:12:19.623 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -18:12:19.624 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -18:12:19.624 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA256withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl -18:12:19.625 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -18:12:19.625 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -18:12:19.626 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -18:12:19.626 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -18:12:19.626 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -18:12:19.627 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA384withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl -18:12:19.627 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -18:12:19.628 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -18:12:19.628 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -18:12:19.629 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -18:12:19.629 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -18:12:19.630 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA512withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl -18:12:19.630 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -18:12:19.631 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -18:12:19.631 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES256/SHA256withECDSA expects a key using P-256 but was P-521 -18:12:19.632 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES384/SHA384withECDSA expects a key using P-384 but was P-521 -18:12:19.632 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES384/SHA384withECDSA expects a key using P-384 but was P-256 -18:12:19.632 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES512/SHA512withECDSA expects a key using P-521 but was P-256 -18:12:19.817 DEBUG org.jose4j.jws.JwsTestSupport - ES512 eyJhbGciOiJFUzUxMiJ9.dG91Y2jDnw.AVG8m1FtSP7dqfmZdEyvsjI2DX0IHkOH6jtK3vnIsVHhcS4iWlkzsTrNja0V3nAG11vxGIUzyyFD3hEWyJ7D9BCzAe0wm82JA0iIA4SAKjlDjbIl3IekLaNS_Bh8omEfLglCj19g0UwUuDqBO_x9h0QEKL61j_Dj6_IQ3lDOXm1Xq37L -18:12:20.674 DEBUG org.jose4j.jws.JwsTestSupport - ES256 eyJhbGciOiJFUzI1NiJ9.UEFZTE9BRCEhIQ.RMj1ngiw2Mp4ZBDLBuEvYaocFN9Pdj2DWkOXQB1VOfWxgBxgq8j6zUgdc3b3zsg-Pb3ihRAo5jPfwushXpHi3Q -18:12:20.792 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:12:20.792 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:12:20.792 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:12:20.793 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:12:20.793 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:12:20.794 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:12:20.794 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:12:20.794 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:12:20.795 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:12:20.795 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:12:20.812 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -18:12:20.813 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:12:20.814 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:12:20.814 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:12:20.822 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:12:20.829 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:12:20.836 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:12:20.837 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -18:12:20.838 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:12:20.838 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:12:20.843 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:12:20.844 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:12:20.844 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:12:20.845 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:12:20.845 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:12:20.865 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:12:20.886 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:12:20.906 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:12:20.926 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:12:20.927 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:12:20.927 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:12:20.928 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:12:20.931 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:12:20.933 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:12:20.937 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:12:20.937 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:12:20.938 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:12:20.938 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:12:20.938 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:12:20.940 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:12:20.943 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:12:20.945 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:12:20.945 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:12:20.945 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:20.946 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@1459491 registered for zip algorithm DEF -18:12:20.946 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:12:20.946 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 154ms -18:12:21.032 DEBUG org.jose4j.jws.JwsTestSupport - ES256K eyJhbGciOiJFUzI1NksifQ.aw.ap0uQefpThBM_TfMjdbSeq-0UlM6Wj4h_vsLCSV59VFVBCNhbAzOODArtwWGqIOxjIXgWIT9BTI5uHVI1JHnlQ -18:12:21.080 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:12:21.081 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:12:21.081 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:12:21.082 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:12:21.082 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:12:21.082 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:12:21.082 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:12:21.083 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:12:21.083 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:12:21.083 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:12:21.084 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@125bf5b -18:12:21.084 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -18:12:21.085 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:12:21.085 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:12:21.085 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:12:21.087 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:12:21.089 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:12:21.090 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:12:21.091 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -18:12:21.091 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:12:21.092 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:12:21.095 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:12:21.095 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:12:21.095 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:12:21.096 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:12:21.096 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:12:21.100 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:12:21.104 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:12:21.109 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:12:21.113 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:12:21.113 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:12:21.114 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:12:21.114 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:12:21.115 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:12:21.116 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:12:21.117 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:12:21.117 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:12:21.118 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:12:21.118 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:12:21.118 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:12:21.119 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:12:21.120 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:12:21.121 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:12:21.121 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:12:21.121 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:21.121 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@1c9e76b registered for zip algorithm DEF -18:12:21.122 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:12:21.122 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 41ms -18:12:21.132 DEBUG org.jose4j.jws.JwsTestSupport - ES256 eyJhbGciOiJFUzI1NiJ9.c29tZXRoaW5nIGhlcmU.l1w-EkOfqmO_mLpnBVmYXDYzinBhiIikacMzIuDVgHrtKWRiSem4BPU3BR5NYNrnphxf8ClB6RAMQYfC45LImQ -18:12:21.235 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:12:21.235 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:12:21.235 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:12:21.236 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:12:21.236 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:12:21.237 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:12:21.237 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:12:21.237 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:12:21.238 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:12:21.238 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:12:21.253 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -18:12:21.254 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:12:21.255 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:12:21.255 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:12:21.263 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:12:21.270 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:12:21.278 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:12:21.278 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -18:12:21.279 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:12:21.280 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:12:21.284 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:12:21.284 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:12:21.285 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:12:21.285 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:12:21.285 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:12:21.306 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:12:21.359 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:12:21.379 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:12:21.399 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:12:21.400 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:12:21.400 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:12:21.400 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:12:21.403 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:12:21.405 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:12:21.408 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:12:21.408 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:12:21.408 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:12:21.409 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:12:21.409 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:12:21.413 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:12:21.415 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:12:21.418 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:12:21.418 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:12:21.418 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:21.418 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@1f5fd58 registered for zip algorithm DEF -18:12:21.418 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:12:21.419 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 184ms -18:12:21.430 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:12:21.431 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:12:21.431 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:12:21.432 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:12:21.432 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:12:21.432 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:12:21.432 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:12:21.432 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:12:21.433 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:12:21.433 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:12:21.434 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@125bf5b -18:12:21.435 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -18:12:21.435 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:12:21.435 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:12:21.435 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:12:21.437 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:12:21.439 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:12:21.440 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:12:21.441 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -18:12:21.441 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:12:21.442 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:12:21.445 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:12:21.445 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:12:21.446 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:12:21.446 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:12:21.446 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:12:21.450 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:12:21.455 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:12:21.459 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:12:21.463 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:12:21.464 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:12:21.464 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:12:21.464 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:12:21.465 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:12:21.466 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:12:21.467 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:12:21.468 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:12:21.468 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:12:21.468 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:12:21.468 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:12:21.469 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:12:21.470 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:12:21.471 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:12:21.471 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:12:21.471 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:21.472 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@1b70343 registered for zip algorithm DEF -18:12:21.472 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:12:21.472 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 41ms -[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 3.783 s - in org.jose4j.jws.EcdsaUsingShaTest -[INFO] Running org.jose4j.jws.GetPayloadTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jws.GetPayloadTest -[INFO] Running org.jose4j.jws.JwsUsingEcdsaP521Sha512ExampleTest -Payload -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.36 s - in org.jose4j.jws.JwsUsingEcdsaP521Sha512ExampleTest -[INFO] Running org.jose4j.jca.ProviderContextTest -18:12:21.901 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:12:21.902 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21, BC version 1.77] security providers installed)... -18:12:21.902 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:12:21.902 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:12:21.902 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:12:21.902 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:12:21.903 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:12:21.903 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:12:21.903 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:12:21.903 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:12:21.905 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@125bf5b -18:12:21.905 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -18:12:21.905 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:12:21.906 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:12:21.906 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:12:21.914 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:12:21.921 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:12:21.928 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:12:21.929 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -18:12:21.930 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:12:21.930 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:12:21.933 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:12:21.934 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:12:21.934 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:12:21.934 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:12:21.935 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:12:21.956 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:12:21.977 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:12:21.999 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:12:22.019 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:12:22.020 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:12:22.020 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:12:22.021 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:12:22.022 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:12:22.023 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:12:22.024 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:12:22.024 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:12:22.024 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:12:22.024 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:12:22.024 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:12:22.025 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:12:22.026 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:12:22.027 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:12:22.027 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:12:22.028 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:22.028 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@bcd0c0 registered for zip algorithm DEF -18:12:22.028 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:12:22.028 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 126ms -18:12:22.366 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:12:22.366 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:12:22.367 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:12:22.367 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:12:22.367 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:12:22.367 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:12:22.367 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:12:22.368 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:12:22.368 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:12:22.368 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:12:22.369 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@125bf5b -18:12:22.370 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -18:12:22.370 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:12:22.370 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:12:22.370 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:12:22.372 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:12:22.374 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:12:22.375 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:12:22.376 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -18:12:22.376 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:12:22.377 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:12:22.380 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:12:22.380 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:12:22.381 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:12:22.381 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:12:22.382 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:12:22.386 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:12:22.390 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:12:22.412 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:12:22.417 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:12:22.417 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:12:22.418 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:12:22.418 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:12:22.419 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:12:22.420 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:12:22.421 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:12:22.421 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:12:22.421 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:12:22.421 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:12:22.422 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:12:22.422 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:12:22.423 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:12:22.424 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:12:22.424 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:12:22.424 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:22.425 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@78a2eb registered for zip algorithm DEF -18:12:22.425 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:12:22.425 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 59ms -18:12:22.508 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:12:22.508 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21, BC version 1.77] security providers installed)... -18:12:22.509 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:12:22.509 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:12:22.509 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:12:22.510 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:12:22.510 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:12:22.510 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:12:22.510 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:12:22.510 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:12:22.512 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@125bf5b -18:12:22.512 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -18:12:22.512 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:12:22.512 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:12:22.512 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:12:22.519 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:12:22.526 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:12:22.534 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:12:22.534 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -18:12:22.535 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:12:22.535 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:12:22.538 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:12:22.538 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:12:22.539 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:12:22.539 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:12:22.539 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:12:22.560 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:12:22.581 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:12:22.601 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:12:22.622 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:12:22.622 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:12:22.623 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:12:22.623 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:12:22.624 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:12:22.625 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:12:22.626 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:12:22.626 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:12:22.627 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:12:22.627 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:12:22.627 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:12:22.628 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:12:22.629 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:12:22.630 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:12:22.630 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:12:22.630 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:22.630 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@ebfd03 registered for zip algorithm DEF -18:12:22.630 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:12:22.630 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 121ms -18:12:22.641 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:12:22.641 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:12:22.641 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:12:22.641 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:12:22.642 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:12:22.642 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:12:22.642 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:12:22.642 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:12:22.642 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:12:22.643 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:12:22.644 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@125bf5b -18:12:22.644 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -18:12:22.644 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:12:22.644 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:12:22.645 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:12:22.647 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:12:22.648 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:12:22.650 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:12:22.651 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -18:12:22.651 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:12:22.651 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:12:22.654 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:12:22.654 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:12:22.655 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:12:22.655 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:12:22.655 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:12:22.659 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:12:22.663 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:12:22.668 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:12:22.672 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:12:22.672 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:12:22.673 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:12:22.673 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:12:22.674 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:12:22.675 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:12:22.676 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:12:22.676 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:12:22.676 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:12:22.676 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:12:22.676 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:12:22.677 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:12:22.678 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:12:22.679 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:12:22.679 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:12:22.679 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:22.680 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@107730f registered for zip algorithm DEF -18:12:22.680 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:12:22.680 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 39ms -[INFO] Tests run: 12, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.617 s - in org.jose4j.jca.ProviderContextTest -[INFO] Running org.jose4j.lang.ByteUtilTest -18:12:23.507 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (2147483647) for converting to bit length -18:12:23.507 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-2147483648) for converting to bit length -18:12:23.508 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (268435456) for converting to bit length -18:12:23.508 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870929) for converting to bit length -18:12:23.508 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870920) for converting to bit length -18:12:23.508 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870928) for converting to bit length -18:12:23.508 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-1) for converting to bit length -18:12:23.508 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-536870928) for converting to bit length -[INFO] Tests run: 31, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.026 s - in org.jose4j.lang.ByteUtilTest -[INFO] Running org.jose4j.lang.MathsTest -[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s - in org.jose4j.lang.MathsTest -[INFO] Running org.jose4j.lang.JsonHelpTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.lang.JsonHelpTest -[INFO] Running org.jose4j.json.JsonUtilTest -{"char array":["a","\\","\""],"some object":"java.lang.Object@4b2d8f","nested":{"chars":["\"","m","e","h"]},"nested also":{"obj":"java.util.Random@1cfda20"}} -18:12:23.562 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.util.Map (java.util.ArrayList and java.util.Map are in module java.base of loader 'bootstrap') -18:12:23.562 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.Boolean cannot be cast to class java.util.Map (java.lang.Boolean and java.util.Map are in module java.base of loader 'bootstrap') -18:12:23.563 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.String cannot be cast to class java.util.Map (java.lang.String and java.util.Map are in module java.base of loader 'bootstrap') -18:12:23.563 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.Long cannot be cast to class java.util.Map (java.lang.Long and java.util.Map are in module java.base of loader 'bootstrap') -18:12:23.563 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Parsing returned null -[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.json.JsonUtilTest -[INFO] Running org.jose4j.cookbook.JoseCookbookTest -[INFO] Tests run: 22, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 3.11 s - in org.jose4j.cookbook.JoseCookbookTest +[INFO] Tests run: 38, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.208 s - in org.jose4j.jwt.JwtClaimsTest [INFO] Running org.jose4j.zip.DeflateRFC1951CompressionAlgorithmTest -18:12:26.773 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:28.189 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithmTest - Expected exception because this tests going over the max allowed size of decompressed data org.jose4j.lang.JoseException: Maximum allowed size of decompressed data exceeded (which is 204800 bytes but configurable with the org.jose4j.zip.decompress-max-bytes system property) -18:12:28.191 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:28.192 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:12:28.194 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.477 s - in org.jose4j.zip.DeflateRFC1951CompressionAlgorithmTest -[INFO] Running org.jose4j.keys.EllipticCurvesTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.135 s - in org.jose4j.keys.EllipticCurvesTest -[INFO] Running org.jose4j.keys.resolvers.EmbeddedJwkVerificationKeyResolverTest -18:12:28.366 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: No jwk in JWS header): JsonWebSignature{"typ":"dpop+jwt","alg":"ES256"}->eyJ0eXAiOiJkcG9wK2p3dCIsImFsZyI6IkVTMjU2In0.eyJqdGkiOiItQndDM3lFU2MwNGFjYzc3bFRjMjZ4IiwiaHRtIjoiUE9TVCIsImh0dSI6Imh0dHBzOi8vc2VydmVyLmV4YW1wbGUuY29tL3Rva2VuIiwiaWF0IjoxNTYyMjYyNjE2fQ.DlWrKDQE15d6lN14J525P877gT_pmYYKFwpFmUvs3uQ96wTHV-4ZdnozfXVmlHmpgF5DA_3Ld8x5iyS7MrOjhw] -18:12:28.369 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Problem processing jwk from JWS header (jwk header contains a private key, which it most definitely should not.)): JsonWebSignature{"alg":"ES256","typ":"dpop+jwt","jwk":{"kty":"EC","x":"76nY8PkSVA80iOPq3UEGnocuOGhQjGOkcPpbyWpsWmg","y":"00LZB2IcOxErkNZwcQX_dmudk-atORMKjDBTsUeMvoU","crv":"P-256","d":"IIbXpUbIHemOAreeQ_LM2akq7y66DcYluvgydOritJU"}}->eyJhbGciOiJFUzI1NiIsInR5cCI6ImRwb3Arand0IiwiandrIjp7Imt0eSI6IkVDIiwieCI6Ijc2blk4UGtTVkE4MGlPUHEzVUVHbm9jdU9HaFFqR09rY1BwYnlXcHNXbWciLCJ5IjoiMDBMWkIySWNPeEVya05ad2NRWF9kbXVkay1hdE9STUtqREJUc1VlTXZvVSIsImNydiI6IlAtMjU2IiwiZCI6IklJYlhwVWJJSGVtT0FyZWVRX0xNMmFrcTd5NjZEY1lsdXZneWRPcml0SlUifX0.eyJqdGkiOiJiYzc4OSIsImh0bSI6IkdFVCIsImh0dSI6Imh0dHBzOi8vYXBpLmV4YW1wbGUuY29tIiwiaWF0IjoxNjQ3OTU5MTMyfQ.-GKT4h58oZzS4LGk8b44Dh4GoJ9Y2extHUOr_LzbFIibO_XXfanPZ8ePZkXd8s7cuQyFKagePUVCdu1T2UKbTQ] -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.077 s - in org.jose4j.keys.resolvers.EmbeddedJwkVerificationKeyResolverTest -[INFO] Running org.jose4j.keys.resolvers.HttpsJwksVerificationKeyResolverTest -18:12:30.366 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -18:12:30.374 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} due to an unexpected exception (java.io.IOException: https://www.example.org/says 'no GET for you!') while obtaining or using keys from JWKS endpoint at https://www.example.org/ -18:12:30.382 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -18:12:30.383 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -18:12:30.384 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Sun Oct 20 19:12:30 GMT 2024 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] -18:12:30.457 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] -18:12:30.457 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -18:12:30.459 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -18:12:30.460 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Sun Oct 20 19:12:30 GMT 2024 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] -18:12:30.549 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] -18:12:30.550 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -18:12:30.552 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -18:12:30.552 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Sun Oct 20 19:12:30 GMT 2024 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] -18:12:30.597 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] obtained from https://www.example.org/ -18:12:30.598 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES384"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] -18:12:30.598 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -18:12:30.600 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -18:12:30.601 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Sun Oct 20 19:12:30 GMT 2024 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] -18:12:30.602 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] obtained from https://www.example.org/ -18:12:30.605 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -18:12:30.606 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -18:12:30.606 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Sun Oct 20 19:12:30 GMT 2024 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k1, x=1u9oeAkLQJcAnrv_m4fupf-lF43yFqmNjMsrukKDhEE, y=RG0cyWzinUl8NpfVVw2DqfH6zRqU_yF6aL1swssNv4E, crv=P-256}] -18:12:30.607 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256","kid":"k2"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k1, x=1u9oeAkLQJcAnrv_m4fupf-lF43yFqmNjMsrukKDhEE, y=RG0cyWzinUl8NpfVVw2DqfH6zRqU_yF6aL1swssNv4E, crv=P-256}] -18:12:30.607 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -18:12:30.608 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -18:12:30.608 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Sun Oct 20 19:12:30 GMT 2024 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] -18:12:30.609 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] -18:12:30.609 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -18:12:30.610 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -18:12:30.611 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Sun Oct 20 19:12:30 GMT 2024 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] -18:12:30.611 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] obtained from https://www.example.org/ -18:12:30.614 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://abc.bfe.xyz/ -18:12:30.616 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://abc.bfe.xyz/ -18:12:30.617 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://abc.bfe.xyz/ will be cached for 3600 seconds until about Sun Oct 20 19:12:30 GMT 2024 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] -18:12:30.647 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - We expected an exception out of the CustomHttpsJwksVerificationKeyResolver: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: There are multiple keys in the referenced JWK Set document, but the kid value was not provided in the JOSE Header.) while obtaining or using keys from JWKS endpoint at https://abc.bfe.xyz/ -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 2.207 s - in org.jose4j.keys.resolvers.HttpsJwksVerificationKeyResolverTest -[INFO] Running org.jose4j.keys.BigEndianBigIntegerTest -[INFO] Tests run: 19, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.216 s - in org.jose4j.keys.BigEndianBigIntegerTest -[INFO] Running org.jose4j.keys.KeyPairUtilTest -18:12:31.951 DEBUG org.jose4j.keys.KeyPairUtilTest - The following JWT and public key should be (and were on 11/11/15) usable and produce a valid result at jwt.io (related to http://stackoverflow.com/questions/32744172): -eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJtZWgiLCJleHAiOjE3Mjk0NDkxNTEsImp0aSI6Ii1DSWpZNHcxRUUtbUgxWHUtWENIRnciLCJhdWQiOiJ5b3UiLCJpc3MiOiJtZSJ9.bvtMR3E6MnS5t5bNmxmhkSIdIICWKDSTtGizTLsHEfSrl1xqcEYA_Qzm2icfg_ija0M8xlNtKRhwakEXztMs1lDI8hr3_-pH-B9zXpWo__1aPJHrECv4PgOlRr2kGV4EBTSA7TjgQSUdY9BC702RezRB7gjdB39SN39c7OeA8sB9q1QJjfPbpj1W1Ks8ILGTIGD539eR5sm4nvoqWDt1bYP5wnlhdjg0waTaQJ7tCAU4JCYOZoV2oekkySSpaRtDBwh48HZXDU4JyWQ4x2UHhd8uPBCcTOd3FljBsSMw4hIQ9mq8IDw2g_VeTbwL1O1qgG3XH-W6T6JJqLu8UJ78PQ ------BEGIN PUBLIC KEY----- -MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAoahUIoWw0K0usKNuOR6H -4wkf4oBUXHTxRvgb48E+BVvxkeDNjbC4he8rUWcJoZmds2h7M70imEVhRU5djINX -tqllXI4DFqcI1DgjT9LewND8MW2Krf3Spsk/ZkoFnilakGygTwpZ3uesH+PFABNI -UYpOiN15dsQRkgr0vEhxN92i2asbOenSZeyaxziK72UwxrrKoExv6kc5twXTq4h+ -QChLOln0/mtUZwfsRaMStPs6mS6XrgxnxbWhojf663tuEQueGC+FCMfra36C9knD -FGzKsNa7LZK2djYgyD3JR/MB/4NUJW/TqOQtwHYbxevoJArm+L5StowjzGy+/bq6 -GwIDAQAB ------END PUBLIC KEY----- -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.064 s - in org.jose4j.keys.KeyPairUtilTest -[INFO] Running org.jose4j.keys.X509UtilTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.039 s - in org.jose4j.keys.X509UtilTest +18:23:04.945 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:23:09.319 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithmTest - Expected exception because this tests going over the max allowed size of decompressed data org.jose4j.lang.JoseException: Maximum allowed size of decompressed data exceeded (which is 204800 bytes but configurable with the org.jose4j.zip.decompress-max-bytes system property) +18:23:09.324 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:23:09.329 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:23:09.334 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 4.995 s - in org.jose4j.zip.DeflateRFC1951CompressionAlgorithmTest [INFO] Running org.jose4j.examples.ExamplesTest -eyJhbGciOiJFUzI1NiJ9.VGhpcyBpcyBzb21lIHRleHQgdGhhdCBpcyB0byBiZSBzaWduZWQu.iiWyRXYFmLi1DtYZ73xK1sWFBKQN4fNn5INJKfbM-8Ri5Cb4PtDVPJOT1SQ0OWnMIOPL3IR8d1pxzXB30lmGTQ +eyJhbGciOiJFUzI1NiJ9.VGhpcyBpcyBzb21lIHRleHQgdGhhdCBpcyB0byBiZSBzaWduZWQu.HPwuQqT17AIF5-Hxs9D35c1fShemcb2acdjArGEN_0nVNoM0_OhNs3wp5kdHxXA_jDOvNVx0NtF4du0g8V36VQ JWS Signature is valid: true JWS payload: PAYLOAD! -Serialized Encrypted JWE: eyJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.px9jAQJR9DW5OXzyX0f-NXtY1WRGS2JGsiGU6OwZpsX9NNBT6vxNmA.ZdBXRvlozgJHnD2J5Kg0XA.KpMlQ6dUOfZ0X652JuIifQ.1sHySM-gR-6FrNySjPSCFA +Serialized Encrypted JWE: eyJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.-yRM5Yqds2ykQc94s4XFoN4UDC0s_kqGEJ1SSWbbe9nC-tWHZ5zGsg.4I1bM0iwosgCKw4lEJtXhA.S-YTe9tyimuShgDpuurWCQ.TRfZezD_PvqDJDI8uGBePw Payload: Hello World! JWS Signature is valid: true JWS payload: This is some text that is to be signed. -JWT: eyJraWQiOiJrMSIsImFsZyI6IlJTMjU2In0.eyJpc3MiOiJJc3N1ZXIiLCJhdWQiOiJBdWRpZW5jZSIsImV4cCI6MTcyOTQ0ODU1NCwianRpIjoiZkZUcjBpT2VlSHFqWVFsc3RGMjd5dyIsImlhdCI6MTcyOTQ0Nzk1NCwibmJmIjoxNzI5NDQ3ODM0LCJzdWIiOiJzdWJqZWN0IiwiZW1haWwiOiJtYWlsQGV4YW1wbGUuY29tIiwiZ3JvdXBzIjpbImdyb3VwLW9uZSIsIm90aGVyLWdyb3VwIiwiZ3JvdXAtdGhyZWUiXX0.RYLneMt7e1-RhPvyjV77VwGMOyyxby3N5InLCDo1DyTdZ3cIfNXgcz1LWhvkzG5IdEeaH472X0MmfvleKC6YTNNPS6K8lSkLqWflk6tljL4KGcPozoD8uBM3GfysJ8zr6Mpu4vzgpA1XDCHT0S07rIAvhuBVnA2PUyL8qltnBE2uzV_t2G8iB2Agjr7vtqd15VPuQr5wnmDKSqZBZ81z1dyvrH1nAXhVanhuLrFttfm5nWnt-2FGoVDER6oZgy2V5V06vP6oPVKBsj4eqnimj3svQr0Q7zcaIkWHa1oscH9l5DkMhuwuq13FlbrRT-O5CwdgaN8MoarQmdcYetycZw -JWT validation succeeded! JWT Claims Set:{iss=Issuer, aud=Audience, exp=1729448554, jti=fFTr0iOeeHqjYQlstF27yw, iat=1729447954, nbf=1729447834, sub=subject, email=mail@example.com, groups=[group-one, other-group, group-three]} -JWT: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJyZWNlaXZlcidzIGtleSIsImN0eSI6IkpXVCIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJtRXhBeWQwaV8xdGJRRUNUMlg1c2NBVGM5aEplN1NwNWVFc0w4cHByd1JvIiwieSI6Ims1LVBwQ0hCRnRiZWNSU3E0YWw4TFdqUE9STHo3VG5fMWZPdU5SeVJseVEiLCJjcnYiOiJQLTI1NiJ9fQ.qC1HZTHdrti52b_7Lgfl19G1kQWtUe_nppvRUpnIsbD_u5hI6zfYOQ.zCYL-3tKE3Mrld_YrzHqQw.UMfQlxRJ5ayjQGOfNNqUUj7SlUvBYpMXxmBG1zXHOBqmyUSB_1wDwwtDb_TEsQEqJZf4kSk27LXoTLn6CvOX9SgKLFxMSC6rYUPfKbcaNl05_vsxUVdoMMC-V00Lli99RL-ktm83_IzOjtzFpoBcMOPMI3vo04NdvM53hOOvJfJZ6AK1RGiY4pB_W3-t-57x1gwLguogpKEArMg3cTsFamRbdgYceKEIptNcry0PGk1EfjiO-pk0Zr22bivap6-ctokhZ6keGlFznmNXr1fEGuTJpwlyGikAWrWX79L-ooYZqkEertGL17KnOkEn1yD96dptzBXIuso5yckjHOsLTSozZEAHQ-JfdCZr7r7uC84KQfhKGDhAr1IaE-a19fxRGZSlWVDOSX3EWwsLrg1AIB1Uix6iJaOxwMotlG4eQuIaRjiKvidPX8nbl12-5m5FIgUjlOpWF106fAk4w5Y1wvssVKVqKV__-xhdbt35I2KM7BaAqGoetkSxc9RUUa5LeYOf9QRXdznr-mkiEkEVZghGm_rE8A3KXdSypEX6CN8.nCUCa1TN7YjuA1NQnpiyvw -JWT validation succeeded! JWT Claims Set:{iss=sender, aud=receiver, exp=1729448554, jti=YWV29bSfyO4uxwlueqWXKA, iat=1729447954, nbf=1729447834, sub=subject, email=mail@example.com, groups=[group-1, other-group, group-3]} -JWE compact serialization: eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..U4raAHZfn_8ENMUrfXEt-w.CJpK9D8VE7X5nufWZPihwDcRR6KL2IUIx8Jj1BQ3Flykxh2Hg1CQHDz_j_MbmKHdU8wcuJQ8grCV7cTTqWehaA.Y6BiDaU67LjN3k0988O9aQ +JWT: eyJraWQiOiJrMSIsImFsZyI6IlJTMjU2In0.eyJpc3MiOiJJc3N1ZXIiLCJhdWQiOiJBdWRpZW5jZSIsImV4cCI6MTcyOTQ0OTIwNSwianRpIjoiRF9zTV9RcXhZOExYT2pJZEJJdXgzUSIsImlhdCI6MTcyOTQ0ODYwNSwibmJmIjoxNzI5NDQ4NDg1LCJzdWIiOiJzdWJqZWN0IiwiZW1haWwiOiJtYWlsQGV4YW1wbGUuY29tIiwiZ3JvdXBzIjpbImdyb3VwLW9uZSIsIm90aGVyLWdyb3VwIiwiZ3JvdXAtdGhyZWUiXX0.DNzDjmL83EfrIe7J1WKgyh0EIEvj-SBwwVSETzo7oz5ED45AxO7N8x44Af4Fh9I4OQ986KCL5fZvjNfsZbOexVN-aBtm4jLq8g1FygEdp2xZzHnVN3wJmPQPCGC4MDBQk6iq0aviE-BD9jPRg5tGg5ONl4rmxEWBtWuf6028Tm1Xs3nV1c7tq7ck0A41EZKBOHAqocvi8WybeBUQ9asqnYjoGpCS5zkRvFaqE65RqLhs2_JnOgTHOBDRnuvfUqYH-oxs8ZI78wQluw7U-qCgP5Oj4izQ22MA_TbhwV_W3lCJ-7dkeWntNf32J89_heKtujmNZlpKZyYkrFXnRmWt5A +JWT validation succeeded! JWT Claims Set:{iss=Issuer, aud=Audience, exp=1729449205, jti=D_sM_QqxY8LXOjIdBIux3Q, iat=1729448605, nbf=1729448485, sub=subject, email=mail@example.com, groups=[group-one, other-group, group-three]} +JWT: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJyZWNlaXZlcidzIGtleSIsImN0eSI6IkpXVCIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJHYXRHQk5oTDVHTnlUaTB6YWdzRTlUN3ZWcUpIWThNWkdpbm5jczUyVlVrIiwieSI6IkVBeW1hV1lmUTlDZUJ3dHdSM2l4RHJPRi1aMzhJcFJRanZZc01mb3NUZFUiLCJjcnYiOiJQLTI1NiJ9fQ.jHuM6g4cP9tIteXIFULlniB_mYT7yushPnLJGYGlzuKx9xOa9mWpxQ.28jrIk9k7ubeeHiBH1TjMw.b7npQOGaRHvoaMUbJeVOkgRCuHgOSdoOlGRU2x2kDIcYzLwae3t_ezI1H9JhqAkMLyLYrXEOXv3x1xdEf033TxjtxhU-T-ruHRXFgWw_7ro-if2Vii6ZKEg4xK5_W1ZCEngCvxVvQ8tdfOjw9mo6oYZGjA-YnCbOn_hTbyGgDbI2_Ssfbbmwo5vbPjZ1nTX1cdQM3BhE_e-RisC2n_9nFzVNDIiUVMYRDZY-ccYvkuOPhtqEjw8NBNQunsZMTLHssXCTgqNxiQwLXFEHyYd7bjpw3lHn-r0VA77MkoR3qjQfX51eG2d-8fSFmvl2_7GI6k6Kq-mKCyHGGBCnQWY3RfDFSTgG6S-9VUDdLSGZuWMnA3daxddHNO0LgU1J4ZhhpD6mk1wkqGXOmGWrqBqhjKKZ7S9gbC77TPhoPGWh1GmkmP29ZBqKkKkuegeEohw-5RytMk0ty_U4MlOYQSZrF65Tpw7VNAmrGz80sRQFpM4WyW1Y0_ujGf8-2mOqREMJVijYXfukwFohhWgQOLvoK81zDij9BN6boPulc15qIVU.MME9cQlNeHuNJ0Lb9drp8A +JWT validation succeeded! JWT Claims Set:{iss=sender, aud=receiver, exp=1729449205, jti=4gyz-7kdziHl4kRPtmKuug, iat=1729448605, nbf=1729448485, sub=subject, email=mail@example.com, groups=[group-1, other-group, group-3]} +JWE compact serialization: eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..mybXcbhTiIrnkEhRUVsEcw.kFC4i1DU19KcV8ZzK12W0oLChpEm2Bh9ofU7Oo5mZJHbrDPlXTKjawW4ikzeVQm5tsaK8o7lJz4AM9PF-s3-iQ.z73gJfy3qYd5f5ghrVsqFg plaintext: Well, as of this moment, they're on DOUBLE SECRET PROBATION! -eyJhbGciOiJFUzI1NiIsImtpZCI6ImV4YW1wbGUiLCJiNjQiOmZhbHNlLCJjcml0IjpbImI2NCJdfQ..nmnZlPwiPWBnhaiVhyaImOObgCj90NSa3n-WnKYFUoFcGWTYD4jqHYN6Myrt9sqiSGAzGpw1tX4ky4WZ3_SuvQ +eyJhbGciOiJFUzI1NiIsImtpZCI6ImV4YW1wbGUiLCJiNjQiOmZhbHNlLCJjcml0IjpbImI2NCJdfQ..06Y_RQ5yKugVxnl-_dA6BV_40j7FRsMsI7dI8DbaS3KkuIIT3XebD5N5vpPBz0PmGh-ceDOIwQOb92igQU76qw this is the content that will be signed JWS Signature is valid: true -JWT: eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImtpZCI6InJlY2VpdmVyIGtleSIsImN0eSI6IkpXVCIsImVwayI6eyJrdHkiOiJPS1AiLCJjcnYiOiJYMjU1MTkiLCJ4IjoidFAxWV9kSlpxVGV5c2gtYVBlV2RuMnlJOHBWbm9VQmdtUUtBQkk4aUxnNCJ9fQ..PWFa79VvSkBreOxahDmtJQ.02EZPOzv-OBL-sAx1UwexJTSA_2DYR_L8iRLbH3Fy4TeNm6sb1aNZCxbNsrcHSrH17ksEd6N9i7By6nCCc4ztMhEfbGqja36D1fu1O0nqXasWft5lSfYJh_pDBLrs4GmyNG-Oh1fmtnmkv2XNklZ1dAqgUCTBmj0PJa3uC3-FLA0ql7dqGPYu5BByBz4UUxnJaus4sYOQWFdXQhAdqGXL5IR7c0mmGDfQFmE1SEvk6ZJ4jZpjjZBslNK8WHC6WGrrlpq-efN7OxhqUC6TpANY7ryOrd2GF4YzAKB4QTuDVDQbLE_9KCRxm_p9k1Fv9fZBC9X3sYFeFaMiPYwgtpgYjIScfdwQnTIgZ8smZXK2PXfbRbckcjBLWdkfSw8iob8HPrWJjMIEmNs0vmF21cGFnghYwhdlxk5tOm6EpINQvtigS6D0EdXOQViO7DXirqwthO9UEi5H4sMTDLKnccfyfeT6vEkCG8NxVh8PPCsK91eMKkVPHLm4fcjL-n3-7WkzUZHpKWwmb57KleR91d5NT7yjMcvTbvB-QwiYzp4QrAShz5S5ofpGgIh3bsx3k4mhzDJdt-eDrcaBq397zviMOlgb8cokeUxGXLkfaRYzzHFoG58cs3f2PfZf6En9T9X5a0jx0MmtTjoeNTClT5bf0WZu8pIvTG7ybEe2Bh0bYQ2bPbYEdtc1Am0wmcbdWVRmG7AIsZrkoWC24ke1R7L-A.R8ftAQtjshvR3IYTJevDWg -JWT validation succeeded! {"iss":"sender","aud":"receiver","exp":1729448555,"jti":"IQgUZT23TP1bqcOi3duRDw","iat":1729447955,"nbf":1729447835,"sub":"subject","email":"mail@example.com","groups":["group-1","other-group","group-3"],"address":{"street_address":"123 Main St","locality":"Anytown","region":"Anystate","country":"US"}} -[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 3.025 s - in org.jose4j.examples.ExamplesTest -[INFO] Running org.jose4j.jwe.EcdhKeyAgreementAlgorithmTest -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.344 s - in org.jose4j.jwe.EcdhKeyAgreementAlgorithmTest -[INFO] Running org.jose4j.jwe.JsonWebEncryptionTest -[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.224 s - in org.jose4j.jwe.JsonWebEncryptionTest -[INFO] Running org.jose4j.jwe.Aes128CbcHmacSha256ContentEncryptionAlgorithmTest -[WARNING] Tests run: 4, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0 s - in org.jose4j.jwe.Aes128CbcHmacSha256ContentEncryptionAlgorithmTest +JWT: eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImtpZCI6InJlY2VpdmVyIGtleSIsImN0eSI6IkpXVCIsImVwayI6eyJrdHkiOiJPS1AiLCJjcnYiOiJYMjU1MTkiLCJ4IjoiVzZVblprNDNTa0tILUtTMkxWRE44ZmZWakpGNnQ2MXlUSUF1TDkybGdXYyJ9fQ..nJZKylqEUw4bjKT9wnvu7A.VoXDfgpKOfg7qSQ1Ns9mBAGUOne87OEU8NIjUY2TR0HScE6R6_bZG_yUaFoxTbqbqnFeFTVYgtsGMJtjJ6RnSkblKNR-p347-O60wfa2fr9Ky4HBNvPm6P8sWgSXKW6WALb39HugJH_wZN5W-vAS8BUAmrOsxW8BfAbyeOtRU1PdeMr60MvJtmu8KRrgFWmWT5onAqO8WH0m0nQPl_VwREVTt0WYUJF0HuJ6YQtFR90bQF7aV3XmHsUosAbNcwsRp3SZD2oXvlOJ9DhQgh9sje2aNr9qUDFXzmJNhMgeNvtItv0VsNmmAHp32l6ZIsvUKtKVyZd-VrQBrjP8FqHm2fvOhqOayr8iOE1gR8Zu8m3RVfU9Ibk4TQ5mfczylS-f7Z-Zyx6ZbkQfhp6CoogA1FTztsxWOl1eVqQA19Yhzeq_6QmDPfxPZA2AjjC_yL4BVvH_Bmu7l5LTOEYNlmtelMxOVvk8jb7ME9Kl8AxxvHBSpvHyN_Q6ZZ2nizIHVkSlwY7LpmHwnwC3FLusSURHQOVp7mIy3LW10492qDW-VgjUuaXo6_LGRi2CWUAjvFFAFCpGKtsMxU7pVvzn8sjzo_6TKaHMwNRs2v061eCRY02TFo1Ioqr-SJ2P-VAkIc9v-BJpys2J-gmuLdhf87Or_ZIj3WWwtlM_0x5AV5jsxDw1M3ONvjiO1mENjaDLNmOUWm2VvT-cFA5vfTi54mbtvg.4XgJdacWaB8VQN8AVXDEWA +JWT validation succeeded! {"iss":"sender","aud":"receiver","exp":1729449206,"jti":"TswCSZhwHcMBz8vNdwIp7Q","iat":1729448606,"nbf":1729448486,"sub":"subject","email":"mail@example.com","groups":["group-1","other-group","group-3"],"address":{"street_address":"123 Main St","locality":"Anytown","region":"Anystate","country":"US"}} +[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 17.042 s - in org.jose4j.examples.ExamplesTest +[INFO] Running org.jose4j.jwx.CompactSerializerTest +[INFO] Tests run: 11, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.053 s - in org.jose4j.jwx.CompactSerializerTest +[INFO] Running org.jose4j.jwx.HeadersTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.jwx.HeadersTest +[INFO] Running org.jose4j.jwx.JsonWebStructureTest +[INFO] Tests run: 12, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.061 s - in org.jose4j.jwx.JsonWebStructureTest +[INFO] Running org.jose4j.lang.JsonHelpTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s - in org.jose4j.lang.JsonHelpTest +[INFO] Running org.jose4j.lang.ByteUtilTest +18:23:26.812 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (2147483647) for converting to bit length +18:23:26.813 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-2147483648) for converting to bit length +18:23:26.814 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (268435456) for converting to bit length +18:23:26.815 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870929) for converting to bit length +18:23:26.816 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870920) for converting to bit length +18:23:26.817 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870928) for converting to bit length +18:23:26.818 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-1) for converting to bit length +18:23:26.819 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-536870928) for converting to bit length +[INFO] Tests run: 31, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.086 s - in org.jose4j.lang.ByteUtilTest +[INFO] Running org.jose4j.lang.MathsTest +[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s - in org.jose4j.lang.MathsTest +[INFO] Running org.jose4j.base64url.internal.apache.commons.codec.binary.Base64Test +[INFO] Tests run: 47, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.465 s - in org.jose4j.base64url.internal.apache.commons.codec.binary.Base64Test +[INFO] Running org.jose4j.http.GetTest +[WARNING] Tests run: 1, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.002 s - in org.jose4j.http.GetTest +[INFO] Running org.jose4j.jca.ProviderContextTest +18:23:27.715 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:23:27.716 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21, BC version 1.77] security providers installed)... +18:23:27.717 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:23:27.719 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:23:27.720 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:23:27.721 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:23:27.722 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:23:27.723 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:23:27.724 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:23:27.725 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:23:27.729 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@1d5509a +18:23:27.730 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +18:23:27.731 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:23:27.732 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:23:27.733 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:23:27.762 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:23:27.790 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:23:27.818 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:23:27.819 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +18:23:27.821 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:23:27.823 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:23:27.832 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:23:27.833 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:23:27.835 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:23:27.836 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:23:27.838 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:23:27.916 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:23:27.995 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:23:28.066 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:23:28.134 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:23:28.136 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:23:28.138 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:23:28.139 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:23:28.144 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:23:28.147 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:23:28.151 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:23:28.152 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:23:28.154 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:23:28.155 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:23:28.156 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:23:28.161 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:23:28.165 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:23:28.168 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:23:28.169 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:23:28.170 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:23:28.171 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@d7d6fb registered for zip algorithm DEF +18:23:28.172 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:23:28.173 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 456ms +18:23:29.301 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:23:29.302 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:23:29.303 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:23:29.304 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:23:29.304 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:23:29.305 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:23:29.306 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:23:29.308 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:23:29.309 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:23:29.310 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:23:29.315 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@1d5509a +18:23:29.315 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +18:23:29.316 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:23:29.317 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:23:29.317 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:23:29.323 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:23:29.328 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:23:29.333 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:23:29.334 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +18:23:29.336 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:23:29.337 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:23:29.346 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:23:29.347 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:23:29.348 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:23:29.349 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:23:29.351 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:23:29.362 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:23:29.375 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:23:29.386 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:23:29.398 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:23:29.399 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:23:29.401 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:23:29.403 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:23:29.406 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:23:29.410 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:23:29.413 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:23:29.414 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:23:29.415 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:23:29.416 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:23:29.417 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:23:29.421 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:23:29.424 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:23:29.427 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:23:29.428 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:23:29.429 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:23:29.430 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@16f416f registered for zip algorithm DEF +18:23:29.431 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:23:29.432 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 129ms +18:23:29.728 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:23:29.729 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21, BC version 1.77] security providers installed)... +18:23:29.730 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:23:29.732 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:23:29.733 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:23:29.734 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:23:29.735 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:23:29.736 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:23:29.737 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:23:29.738 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:23:29.742 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@1d5509a +18:23:29.743 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +18:23:29.743 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:23:29.744 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:23:29.745 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:23:29.765 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:23:29.785 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:23:29.806 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:23:29.807 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +18:23:29.808 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:23:29.810 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:23:29.819 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:23:29.820 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:23:29.822 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:23:29.823 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:23:29.825 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:23:29.882 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:23:29.939 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:23:29.996 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:23:30.053 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:23:30.054 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:23:30.056 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:23:30.057 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:23:30.060 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:23:30.063 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:23:30.066 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:23:30.067 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:23:30.068 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:23:30.069 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:23:30.070 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:23:30.073 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:23:30.077 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:23:30.079 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:23:30.080 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:23:30.081 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:23:30.082 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@1286fb6 registered for zip algorithm DEF +18:23:30.083 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:23:30.084 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 354ms +18:23:30.122 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:23:30.123 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:23:30.124 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:23:30.125 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:23:30.127 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:23:30.127 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:23:30.128 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:23:30.129 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:23:30.130 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:23:30.131 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:23:30.135 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@1d5509a +18:23:30.136 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +18:23:30.137 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:23:30.138 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:23:30.139 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:23:30.144 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:23:30.149 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:23:30.154 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:23:30.155 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +18:23:30.157 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:23:30.159 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:23:30.167 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:23:30.168 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:23:30.170 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:23:30.171 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:23:30.173 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:23:30.185 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:23:30.197 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:23:30.209 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:23:30.222 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:23:30.223 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:23:30.225 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:23:30.226 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:23:30.229 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:23:30.234 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:23:30.238 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:23:30.239 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:23:30.241 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:23:30.242 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:23:30.244 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:23:30.248 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:23:30.252 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:23:30.256 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:23:30.258 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:23:30.259 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:23:30.260 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@b77ea8 registered for zip algorithm DEF +18:23:30.262 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:23:30.263 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 139ms +[INFO] Tests run: 12, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 4.509 s - in org.jose4j.jca.ProviderContextTest +[INFO] Running org.jose4j.jwe.NegativeJweWrappingTest +18:23:32.406 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap/decrypt failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:383); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:475); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted... +18:23:32.409 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ +18:23:32.546 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap/decrypt failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:383); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:475); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted... +18:23:32.547 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ +18:23:32.679 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed. +18:23:32.810 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed. +18:23:32.942 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=FlleGhb7Jp-VlWS1wonqsA +18:23:33.074 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ +18:23:33.204 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.InvalidKeyException: 256 bit content encryption key is not the correct size for the A192CBC-HS384 content encryption algorithm (384). +eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.aTvYzVlejU5m3KeqldR0X2gzZoBMIbyAKkFehxGv8hwirHNzq_pORN47QpxG0PNYesYBBx66PBjpOup7AxAlvWjt0VYQlWHh5-Qoafa2ZogW1ImffxpwcjV6w7R6Sn2I5fsgrhylnelnLwZVymPNqH2Tt3w8ND-vxtE6eELpnhV-BTVo4JuUVDqGZlJquqA5EJ3IQJ1tDpZVGiCpxbg27PMUXFo4PEZOsq4nbGjjIoVZ6WIhqQ4_ZBaVTv0d4n_WIhzMFYbiaHjUnUexjrB7Br2miYYxNfY8QzYZhsYyVuArpe5ClpNoE3sgfQV7PJXXgSD15O0WRnwHjFUdg8FhCg.3qJUAfpoVQkLPT_WirPS3g.jAt3k8cxY52kgtL9_Nyebe52f1o9GdCyPShvc_hi420BOgI3WSrfhs0URdNByd2y802ZMd4K_P-q_y0QV01M_1Khmfk5B06keB32qB0DOeo.3bJnGiwAdmi7YHfU1JL7aw +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.054 s - in org.jose4j.jwe.NegativeJweWrappingTest +[INFO] Running org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithmTest +eyJhbGciOiJQQkVTMi1IUzI1NitBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwicDJjIjo2NTUzNiwicDJzIjoiWFl0RVdQUjl5eUV4enBETCJ9.2UJDzhKLbWLLWjrLyWSuL5bqDRNonRyjnwgeOGoTZXAPX4sBPtg6UA.vKL9-gHapCYNHWfo9SlZYA.VegU-wE_MEP6Dxlhs4Ngfg.WJ5XWK3GTtR6m-ERr0JrNw +18:24:24.815 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'PBES2-HS512+A256KW' is a blocked algorithm.): eyJhbGciOiJQQkVTMi1IUzUxMitBMjU2S1ciLCJwMnMiOiI4UTFTemluYXNSM3hjaFl6NlpaY0hBIiwicDJjIjoyMTQ3NDgzNjQ3LCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.YKbKLsEoyw_JoNvhtuHo9aaeRNSEhhAW2OVHcuF_HLqS0n6hA_fgCA.VBiCzVHNoLiR3F4V82uoTQ.23i-Tb1AV4n0WKVSSgcQrdg6GRqsUKxjruHXYsTHAJLZ2nsnGIX86vMXqIi6IRsfywCRFzLxEcZBRnTvG3nhzPk0GDD7FMyXhUHpDjEYCNA_XOmzg8yZR9oyjo6lTF6si4q9FZ2EhzgFQCLO_6h5EVg3vR75_hkBsnuoqoM3dwejXBtIodN84PeqMb6asmas_dpSsz7H10fC5ni9xIz424givB1YLldF6exVmL93R3fOoOJbmk2GBQZL_SEGllv2cQsBgeprARsaQ7Bq99tT80coH8ItBjgV08AtzXFFsx9qKvC982KLKdPQMTlVJKkqtV4Ru5LEVpBZXBnZrtViSOgyg6AiuwaS-rCrcD_ePOGSuxvgtrokAKYPqmXUeRdjFJwafkYEkiuDCV9vWGAi1DH2xTafhJwcmywIyzi4BqRpmdn_N-zl5tuJYyuvKhjKv6ihbsV_k1hJGPGAxJ6wUpmwC4PTQ2izEm0TuSE8oMKdTw8V3kobXZ77ulMwDs4p.ALTKwxvAefeL-32NY7eTAQ] +18:24:24.818 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: PBES2 iteration count (p2c=2147483647) cannot be more than 2499999 to avoid excessive resource utilization.): eyJhbGciOiJQQkVTMi1IUzUxMitBMjU2S1ciLCJwMnMiOiI4UTFTemluYXNSM3hjaFl6NlpaY0hBIiwicDJjIjoyMTQ3NDgzNjQ3LCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.YKbKLsEoyw_JoNvhtuHo9aaeRNSEhhAW2OVHcuF_HLqS0n6hA_fgCA.VBiCzVHNoLiR3F4V82uoTQ.23i-Tb1AV4n0WKVSSgcQrdg6GRqsUKxjruHXYsTHAJLZ2nsnGIX86vMXqIi6IRsfywCRFzLxEcZBRnTvG3nhzPk0GDD7FMyXhUHpDjEYCNA_XOmzg8yZR9oyjo6lTF6si4q9FZ2EhzgFQCLO_6h5EVg3vR75_hkBsnuoqoM3dwejXBtIodN84PeqMb6asmas_dpSsz7H10fC5ni9xIz424givB1YLldF6exVmL93R3fOoOJbmk2GBQZL_SEGllv2cQsBgeprARsaQ7Bq99tT80coH8ItBjgV08AtzXFFsx9qKvC982KLKdPQMTlVJKkqtV4Ru5LEVpBZXBnZrtViSOgyg6AiuwaS-rCrcD_ePOGSuxvgtrokAKYPqmXUeRdjFJwafkYEkiuDCV9vWGAi1DH2xTafhJwcmywIyzi4BqRpmdn_N-zl5tuJYyuvKhjKv6ihbsV_k1hJGPGAxJ6wUpmwC4PTQ2izEm0TuSE8oMKdTw8V3kobXZ77ulMwDs4p.ALTKwxvAefeL-32NY7eTAQ] +18:24:24.820 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'PBES2-HS512+A256KW' is a blocked algorithm.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTNTEyK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJwMnMiOiJGbVE0aDY1aUFlZEs0SUFyIn0._P2Mbn0nvqRZVCaEaLnKQkMFwGNmEVbm8Ffnb5uIas0iAt5wcWC3T7rdTwyliWW11YnhpaiXH0WRalAsIUyaVHC4Ku1j9bVP.Tg2KOblqWEF9iC71O-WgBw.OCjt9WYrTFMIst7XBZ8HeA.YRqs3_nMchYr39AJYquQs8-PrZa2NGuqshOvtLfWSvE] +18:24:24.822 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: PBES2 iteration count (p2c=2500000) cannot be more than 2499999 to avoid excessive resource utilization.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTNTEyK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJwMnMiOiJGbVE0aDY1aUFlZEs0SUFyIn0._P2Mbn0nvqRZVCaEaLnKQkMFwGNmEVbm8Ffnb5uIas0iAt5wcWC3T7rdTwyliWW11YnhpaiXH0WRalAsIUyaVHC4Ku1j9bVP.Tg2KOblqWEF9iC71O-WgBw.OCjt9WYrTFMIst7XBZ8HeA.YRqs3_nMchYr39AJYquQs8-PrZa2NGuqshOvtLfWSvE] +18:24:24.824 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'PBES2-HS384+A192KW' is a blocked algorithm.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTMzg0K0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJwMnMiOiJneXBKYzJFVXNtbmNqTUtqIn0.RYXJhCW2m4Pa5XPUPVVQVJRg8z-jj-zyXoa-Q1JzdfjO2tvrELM7Ko3qhkv2WcUAw3ZagzIeNjY.FhNCr7zjUt0fA6KotCbdUw.DMYLybjcrOX9cfwdWaORLg.QCGY9clkv4sz1rZeexg2dUx4ViH-BeL7 +] +18:24:24.826 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: PBES2 iteration count (p2c=2500000) cannot be more than 2499999 to avoid excessive resource utilization.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTMzg0K0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJwMnMiOiJneXBKYzJFVXNtbmNqTUtqIn0.RYXJhCW2m4Pa5XPUPVVQVJRg8z-jj-zyXoa-Q1JzdfjO2tvrELM7Ko3qhkv2WcUAw3ZagzIeNjY.FhNCr7zjUt0fA6KotCbdUw.DMYLybjcrOX9cfwdWaORLg.QCGY9clkv4sz1rZeexg2dUx4ViH-BeL7 +] +[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 51.577 s - in org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithmTest [INFO] Running org.jose4j.jwe.RsaOaepKeyManagementAlgorithmTest -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.245 s - in org.jose4j.jwe.RsaOaepKeyManagementAlgorithmTest -[INFO] Running org.jose4j.jwe.GeneralJweTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwe.GeneralJweTest -[INFO] Running org.jose4j.jwe.kdf.Pbkdf2JwkExampleTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.021 s - in org.jose4j.jwe.kdf.Pbkdf2JwkExampleTest +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.779 s - in org.jose4j.jwe.RsaOaepKeyManagementAlgorithmTest +[INFO] Running org.jose4j.jwe.Pbes2ExampleEncryptedRSAPrivateKeyJwkAppendixCTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.227 s - in org.jose4j.jwe.Pbes2ExampleEncryptedRSAPrivateKeyJwkAppendixCTest +[INFO] Running org.jose4j.jwe.InvalidCurveTest +18:24:25.915 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key is equal to 26 mod 113 +18:24:25.917 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w +18:24:25.920 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as expected: org.jose4j.lang.InvalidKeyException: epk is invalid for P-256 +18:24:25.920 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key is equal to 2446 mod 2447 +18:24:25.921 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w +18:24:25.924 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as expected: org.jose4j.lang.InvalidKeyException: epk is invalid for P-256 +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.006 s - in org.jose4j.jwe.InvalidCurveTest +[INFO] Running org.jose4j.jwe.Rsa1_5KeyManagementAlgorithmTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.298 s - in org.jose4j.jwe.Rsa1_5KeyManagementAlgorithmTest +[INFO] Running org.jose4j.jwe.ZipTest +eyJ6aXAiOiJERUYiLCJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..l4jqCtklIdH-os2bLPMDEw.xNtsw6CLvbxsLfaDSvbw2mTAKQ46IkAoaX7MQLCXaBNM7RS0ur64Nolpe8iNo7yMxQBWzMWnvj9zHiRuAkshTA.kAVPPWnZa8BUc-EuQ7hBcw +eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..Mbz9ZYIUdRj_zYQts-y5vw.pQGGV4hz03OpBmpYcpYs0zYu9nWBIrMlic7nP-5o2zJDhCG9iJPhmRen14paZvT9DDVxd4QMdIxCEPE6mlmwG7Mt6--KPQ2yR5aerIX-b10MHcNKo66pWiiD3Y3D7ERi7ABnLZsG8IM70AbSdEWHMkGlUNkHRQGA1MayvH7Ej2OGHSOYeOMXxYP3yJXyzmR3DVvRRdLa2A32_GCF_T-dtDdwoQgRMc56j3eShjo6KYgtXfFChTZaFQs9So_VgGTaalVEkrZIs--j19t8Fyfa6cC59h735uCZc5vNcqu4CSG2mTJPBlRiC3tG4Cc4UeniZd5jDVZ6Q7kaijs_iKsrf8xciqIS1CmSUGdTL8G-Lv7uQ17I7BLC__6U3hlbOJ3d.2Hh7zchXb2DFA71X25cGHg +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.043 s - in org.jose4j.jwe.ZipTest +[INFO] Running org.jose4j.jwe.CritHeaderTest +18:24:26.333 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'so.crit' marked as critical. +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.jwe.CritHeaderTest [INFO] Running org.jose4j.jwe.kdf.Pbkdf2MoreTest -[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.013 s - in org.jose4j.jwe.kdf.Pbkdf2MoreTest -[INFO] Running org.jose4j.jwe.kdf.Pbkdf2CompareToJavaSecretKeyFactorySha1Test -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.067 s - in org.jose4j.jwe.kdf.Pbkdf2CompareToJavaSecretKeyFactorySha1Test +[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.063 s - in org.jose4j.jwe.kdf.Pbkdf2MoreTest +[INFO] Running org.jose4j.jwe.kdf.Pbkdf2JwkExampleTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.088 s - in org.jose4j.jwe.kdf.Pbkdf2JwkExampleTest [INFO] Running org.jose4j.jwe.kdf.ConcatKeyDerivationFunctionTest Sq8rGLm4rEtzScmnSsY5r1n-AqBl_iBU8FxN80Uc0S0 LfkHot2nGTVlmfxbgxQfMg -[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.012 s - in org.jose4j.jwe.kdf.ConcatKeyDerivationFunctionTest +[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.045 s - in org.jose4j.jwe.kdf.ConcatKeyDerivationFunctionTest +[INFO] Running org.jose4j.jwe.kdf.Pbkdf2CompareToJavaSecretKeyFactorySha1Test +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.197 s - in org.jose4j.jwe.kdf.Pbkdf2CompareToJavaSecretKeyFactorySha1Test [INFO] Running org.jose4j.jwe.kdf.Rfc6070Pbkdf2TestVectorsTest -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.087 s - in org.jose4j.jwe.kdf.Rfc6070Pbkdf2TestVectorsTest -[INFO] Running org.jose4j.jwe.Aes256GcmContentEncryptionAlgorithmTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.041 s - in org.jose4j.jwe.Aes256GcmContentEncryptionAlgorithmTest -[INFO] Running org.jose4j.jwe.NegativeJweWrappingTest -18:12:36.344 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap/decrypt failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:383); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:475); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted... -18:12:36.345 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ -18:12:36.391 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap/decrypt failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:383); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:475); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted... -18:12:36.392 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ -18:12:36.438 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed. -18:12:36.484 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed. -18:12:36.530 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=FlleGhb7Jp-VlWS1wonqsA -18:12:36.576 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ -18:12:36.622 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.InvalidKeyException: 256 bit content encryption key is not the correct size for the A192CBC-HS384 content encryption algorithm (384). -eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.bCR2-0FUVaE2CH2W0YNaxI2Ud94QBYSPz9pIJga5vRHShCCAi3dBkt8iiKnHUs0B7WtB6JXOL894e_CGcx0A1Q733hWzUd_89dOFKMpfIlpDmZDG4YA56BEf6wPfBGnZUWHeSRRQ1wxb2ZJmG5wNpojwfjmJL6XTrtG7d7jhmvQqhbOqQp0YFJbFNoRiAhDHWQjwg90MBJInExra552Blm1UifSIlPScuCnGAynWn0R-cEU73npVe3iW3ITo-VeHOf5VnPMs_l7RsW0UWds5lB0hyPcU-9hkZbxNil2cPDwzZLqx4cPCJ6PLQ0BrI0swo9AWDDwYu0wsLnLXDG_llQ.jlPpwBSIASkbW8z3fJHiXw.2poUFOEw537Cyomfq9014AU3oeozhDNkKlaiQKpMYDu_ap5lKdrzV3nMyCPzjps-7wquGDyR9WD0mbSHfoU6EdydfM8ZQE27-AMsFOM6wkg.atbuIDy4d8iY8dF3GfD97g -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.372 s - in org.jose4j.jwe.NegativeJweWrappingTest -[INFO] Running org.jose4j.jwe.Pbes2ExampleEncryptedRSAPrivateKeyJwkAppendixCTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.076 s - in org.jose4j.jwe.Pbes2ExampleEncryptedRSAPrivateKeyJwkAppendixCTest -[INFO] Running org.jose4j.jwe.ZipTest -eyJ6aXAiOiJERUYiLCJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..A8z0yuK8WxznFP_dmLhL5w.jEajDQX-Sb5tF0D_nfzvrbf2MUC0TyOeoFuL2FJf7pjLgQ73xXsV3xuij34C7Dva9gU0TSgznwrv7sRyL-4-0g.acGNdST1poI6Vp2OloKEkw -eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..ir0gM1Zo46zJxFL_ZsPyaw.t63O9sh-eSutziANVJWHR7IeBEYZ6JIApG6Whf3Bl-K0IjUO2KECmgBL4sy0HonvP0E1-GAQeNSkhcdWsF9cPYZDs4wWA_ciXtS7zxriFON6hIbz3Cd4um3E2SXOFa6ScxsD8b6jbaYGmuFKSAwBEzp2RQ2nI1FkHX1m_Fv0bvhZroPywheckTTC0q0XNqwQVicFUWX4SoW15Ut3_ON6LKtigulnVs_D2PSkx0bI2eotmDo6aoKE49YZWnGEU8GnAdrn9TPybDkmfYowcSTEViQ9vANzMVWkMicpQgySnRv-WUE_mu2MDReFOl2XNJWVbU_ml34Uj8VXiKv8SBol_UGM-yDhvHi7yKaqvJcAmmIClXSolLtv1ZFwzwBOpD0x.ne-HWoN2oJOs-t1Bi71h9A -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.008 s - in org.jose4j.jwe.ZipTest -[INFO] Running org.jose4j.jwe.CritHeaderTest -18:12:36.734 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'so.crit' marked as critical. -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwe.CritHeaderTest -[INFO] Running org.jose4j.jwe.Aes128KeyWrapManagementAlgorithmTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwe.Aes128KeyWrapManagementAlgorithmTest +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.194 s - in org.jose4j.jwe.kdf.Rfc6070Pbkdf2TestVectorsTest +[INFO] Running org.jose4j.jwe.Aes128CbcHmacSha256ContentEncryptionAlgorithmTest +[WARNING] Tests run: 4, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.008 s - in org.jose4j.jwe.Aes128CbcHmacSha256ContentEncryptionAlgorithmTest +[INFO] Running org.jose4j.jwe.RsaKeyManagementMoreTest +18:24:27.252 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap/decrypt failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:383); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:475); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted... +18:24:27.255 DEBUG o.j.jwe.RsaKeyManagementMoreTest - org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch; caused by: javax.crypto.AEADBadTagException: Tag mismatch +18:24:27.386 DEBUG o.j.jwe.RsaKeyManagementMoreTest - org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch; caused by: javax.crypto.AEADBadTagException: Tag mismatch +18:24:38.743 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:24:38.744 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:24:38.746 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:24:38.748 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:24:38.749 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:24:38.751 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:24:38.759 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:24:38.788 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:24:38.793 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:24:38.799 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:24:39.736 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +18:24:39.738 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:24:39.742 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:24:39.747 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:24:39.784 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:24:39.808 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:24:39.828 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:24:39.829 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +18:24:39.852 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:24:39.860 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:24:40.451 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:24:40.452 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:24:40.481 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:24:40.483 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:24:40.484 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:24:40.539 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:24:40.593 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:24:40.652 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:24:40.708 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:24:40.709 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:24:40.711 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:24:40.712 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:24:40.833 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:24:40.851 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:24:40.867 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:24:40.869 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:24:40.870 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:24:40.871 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:24:40.872 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:24:40.889 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:24:40.906 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:24:40.923 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:24:40.924 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:24:40.926 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:24:40.927 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@12ab28e registered for zip algorithm DEF +18:24:40.927 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:24:40.928 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 2182ms +18:24:41.987 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:24:41.988 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:24:41.989 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:24:41.990 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:24:41.992 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:24:41.993 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:24:41.994 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:24:41.995 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:24:41.996 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:24:41.997 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:24:42.000 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@1d5509a +18:24:42.002 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +18:24:42.003 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:24:42.004 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:24:42.005 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:24:42.010 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:24:42.015 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:24:42.020 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:24:42.021 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +18:24:42.022 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:24:42.023 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:24:42.031 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:24:42.032 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:24:42.033 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:24:42.035 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:24:42.036 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:24:42.048 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:24:42.060 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:24:42.072 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:24:42.085 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:24:42.086 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:24:42.087 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:24:42.088 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:24:42.092 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:24:42.094 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:24:42.096 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:24:42.096 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:24:42.098 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:24:42.099 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:24:42.100 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:24:42.103 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:24:42.105 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:24:42.108 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:24:42.108 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:24:42.109 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:24:42.110 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@4ca3f6 registered for zip algorithm DEF +18:24:42.111 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:24:42.112 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 123ms +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 14.998 s - in org.jose4j.jwe.RsaKeyManagementMoreTest +[INFO] Running org.jose4j.jwe.JsonWebEncryptionTest +[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.742 s - in org.jose4j.jwe.JsonWebEncryptionTest [INFO] Running org.jose4j.jwe.NegativeJweKeyTest -18:12:36.767 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: 256 bit content encryption key is not the correct size for the A128GCM content encryption algorithm (128). -18:12:36.768 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided. -18:12:36.769 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided. -18:12:36.770 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided. -18:12:36.772 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided. -18:12:36.773 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided. -18:12:36.774 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided. -18:12:36.775 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 192 bit key was provided. -18:12:36.776 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 256 bit key was provided. -18:12:36.777 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 128 bit key was provided. -18:12:36.779 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 256 bit key was provided. -18:12:36.780 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 128 bit key was provided. -18:12:36.781 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 192 bit key was provided. -18:12:36.782 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided. -18:12:36.783 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided. -18:12:36.785 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided. -18:12:36.786 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -18:12:36.786 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -18:12:36.787 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -18:12:36.788 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 8 bit key was provided. -18:12:36.788 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 56 bit key was provided. -18:12:36.788 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 64 bit key was provided. -18:12:36.789 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 128 bit key was provided. -18:12:36.789 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 192 bit key was provided. -18:12:36.789 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 248 bit key was provided. -18:12:36.789 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided. -18:12:36.790 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided. -18:12:36.790 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided. -18:12:36.790 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 9744 bit key was provided. -18:12:36.790 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 2352 bit key was provided. -18:12:36.791 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 784 bit key was provided. -18:12:36.791 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 1264 bit key was provided. -18:12:36.792 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 8 bit key was provided. -18:12:36.792 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 56 bit key was provided. -18:12:36.792 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 64 bit key was provided. -18:12:36.793 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 128 bit key was provided. -18:12:36.793 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 192 bit key was provided. -18:12:36.793 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided. -18:12:36.793 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 376 bit key was provided. -18:12:36.793 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided. -18:12:36.794 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided. -18:12:36.794 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 9744 bit key was provided. -18:12:36.794 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 2352 bit key was provided. -18:12:36.794 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 784 bit key was provided. -18:12:36.795 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 1264 bit key was provided. -18:12:36.796 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 8 bit key was provided. -18:12:36.796 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 56 bit key was provided. -18:12:36.796 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 64 bit key was provided. -18:12:36.796 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 128 bit key was provided. -18:12:36.797 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 192 bit key was provided. -18:12:36.797 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided. -18:12:36.797 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided. -18:12:36.797 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 504 bit key was provided. -18:12:36.797 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided. -18:12:36.798 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 9744 bit key was provided. -18:12:36.798 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 2352 bit key was provided. -18:12:36.798 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 784 bit key was provided. -18:12:36.798 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 1264 bit key was provided. -18:12:36.799 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.PublicKey -18:12:36.800 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.PrivateKey -18:12:36.801 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. -18:12:36.801 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. -18:12:36.802 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. -18:12:36.803 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. -18:12:36.804 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An empty octet sequence is to be used as the JWE Encrypted Key value when utilizing direct encryption but this JWE has 40 octets in the encrypted key part. -18:12:36.806 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits +18:24:42.965 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: 256 bit content encryption key is not the correct size for the A128GCM content encryption algorithm (128). +18:24:42.970 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided. +18:24:42.975 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided. +18:24:42.980 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided. +18:24:42.985 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided. +18:24:42.989 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided. +18:24:42.994 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided. +18:24:42.999 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 192 bit key was provided. +18:24:43.003 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 256 bit key was provided. +18:24:43.008 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 128 bit key was provided. +18:24:43.012 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 256 bit key was provided. +18:24:43.016 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 128 bit key was provided. +18:24:43.021 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 192 bit key was provided. +18:24:43.026 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided. +18:24:43.032 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided. +18:24:43.037 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided. +18:24:43.045 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +18:24:43.046 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +18:24:43.047 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +18:24:43.053 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 8 bit key was provided. +18:24:43.055 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 56 bit key was provided. +18:24:43.056 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 64 bit key was provided. +18:24:43.057 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 128 bit key was provided. +18:24:43.059 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 192 bit key was provided. +18:24:43.060 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 248 bit key was provided. +18:24:43.062 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided. +18:24:43.063 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided. +18:24:43.065 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided. +18:24:43.066 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 9744 bit key was provided. +18:24:43.068 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 2352 bit key was provided. +18:24:43.070 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 784 bit key was provided. +18:24:43.071 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 1264 bit key was provided. +18:24:43.076 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 8 bit key was provided. +18:24:43.077 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 56 bit key was provided. +18:24:43.078 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 64 bit key was provided. +18:24:43.079 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 128 bit key was provided. +18:24:43.079 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 192 bit key was provided. +18:24:43.080 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided. +18:24:43.081 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 376 bit key was provided. +18:24:43.082 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided. +18:24:43.084 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided. +18:24:43.085 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 9744 bit key was provided. +18:24:43.087 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 2352 bit key was provided. +18:24:43.088 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 784 bit key was provided. +18:24:43.090 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 1264 bit key was provided. +18:24:43.095 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 8 bit key was provided. +18:24:43.096 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 56 bit key was provided. +18:24:43.098 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 64 bit key was provided. +18:24:43.099 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 128 bit key was provided. +18:24:43.101 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 192 bit key was provided. +18:24:43.103 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided. +18:24:43.104 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided. +18:24:43.106 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 504 bit key was provided. +18:24:43.107 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided. +18:24:43.108 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 9744 bit key was provided. +18:24:43.110 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 2352 bit key was provided. +18:24:43.111 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 784 bit key was provided. +18:24:43.112 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 1264 bit key was provided. +18:24:43.117 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.PublicKey +18:24:43.119 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.PrivateKey +18:24:43.125 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. +18:24:43.126 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. +18:24:43.131 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. +18:24:43.132 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. +18:24:43.138 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An empty octet sequence is to be used as the JWE Encrypted Key value when utilizing direct encryption but this JWE has 40 octets in the encrypted key part. +18:24:43.147 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -18:12:36.807 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -18:12:36.807 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key -18:12:36.807 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 -18:12:36.807 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null -18:12:36.808 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -18:12:36.808 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits +18:24:43.148 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +18:24:43.150 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key +18:24:43.152 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 +18:24:43.153 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null +18:24:43.154 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +18:24:43.158 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -18:12:36.809 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -18:12:36.809 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key -18:12:36.809 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 -18:12:36.809 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null -18:12:36.810 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -18:12:36.810 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits +18:24:43.160 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +18:24:43.161 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key +18:24:43.163 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 +18:24:43.164 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null +18:24:43.165 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +18:24:43.169 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -18:12:36.811 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -18:12:36.811 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key -18:12:36.811 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 -18:12:36.811 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null -18:12:36.812 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -18:12:36.812 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits +18:24:43.170 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +18:24:43.171 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key +18:24:43.172 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 +18:24:43.172 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null +18:24:43.174 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +18:24:43.177 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -18:12:36.813 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -18:12:36.813 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key -18:12:36.813 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 -18:12:36.813 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null -18:12:36.813 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -18:12:36.814 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun RSA public key, 2048 bits +18:24:43.179 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +18:24:43.180 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key +18:24:43.181 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 +18:24:43.182 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null +18:24:43.183 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +18:24:43.188 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -18:12:36.815 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -18:12:36.815 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given 128 bit AES key -18:12:36.848 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun EC public key, 256 bits +18:24:43.190 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +18:24:43.191 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given 128 bit AES key +18:24:43.295 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun EC public key, 256 bits public x coord: 57807358241436249728379122087876380298924820027722995515715270765240753673285 public y coord: 90436541859143682268950424386863654389577770182238183823381687388274600502701 - parameters: java.security.spec.ECParameterSpec@d0f2b4 -18:12:36.849 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: epk is invalid for P-521 -18:12:36.849 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -18:12:36.850 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun RSA public key, 2048 bits + parameters: java.security.spec.ECParameterSpec@1aa3ca5 +18:24:43.299 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: epk is invalid for P-521 +18:24:43.301 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +18:24:43.305 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -18:12:36.851 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -18:12:36.851 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given 128 bit AES key -18:12:36.852 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun EC public key, 256 bits +18:24:43.307 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +18:24:43.309 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given 128 bit AES key +18:24:43.312 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun EC public key, 256 bits public x coord: 57807358241436249728379122087876380298924820027722995515715270765240753673285 public y coord: 90436541859143682268950424386863654389577770182238183823381687388274600502701 - parameters: java.security.spec.ECParameterSpec@d0f2b4 -18:12:36.853 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: epk is invalid for P-521 -18:12:36.853 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -18:12:36.854 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun RSA public key, 2048 bits + parameters: java.security.spec.ECParameterSpec@1aa3ca5 +18:24:43.314 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: epk is invalid for P-521 +18:24:43.316 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +18:24:43.320 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -18:12:36.855 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -18:12:36.855 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given 128 bit AES key -18:12:36.856 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun EC public key, 256 bits +18:24:43.322 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +18:24:43.323 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given 128 bit AES key +18:24:43.326 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun EC public key, 256 bits public x coord: 57807358241436249728379122087876380298924820027722995515715270765240753673285 public y coord: 90436541859143682268950424386863654389577770182238183823381687388274600502701 - parameters: java.security.spec.ECParameterSpec@d0f2b4 -18:12:36.857 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: epk is invalid for P-521 -18:12:36.857 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -18:12:36.859 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.PublicKey -18:12:36.859 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Unable to encrypt (RSA/ECB/OAEPWithSHA-1AndMGF1Padding) the Content Encryption Key: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -18:12:36.860 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.ec.ECPrivateKeyImpl to java.security.PublicKey -18:12:36.861 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 8 bit key was provided. -18:12:36.861 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 40 bit key was provided. -18:12:36.861 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 136 bit key was provided. -18:12:36.862 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 192 bit key was provided. -18:12:36.862 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 256 bit key was provided. -18:12:36.862 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an RSA key was provided. -18:12:36.862 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an RSA key was provided. -18:12:36.862 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an EC key was provided. -18:12:36.863 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an EC key was provided. -18:12:36.864 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 8 bit key was provided. -18:12:36.864 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 40 bit key was provided. -18:12:36.864 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 128 bit key was provided. -18:12:36.864 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 184 bit key was provided. -18:12:36.865 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 256 bit key was provided. -18:12:36.865 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an RSA key was provided. -18:12:36.865 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an RSA key was provided. -18:12:36.865 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an EC key was provided. -18:12:36.866 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an EC key was provided. -18:12:36.867 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 8 bit key was provided. -18:12:36.867 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 40 bit key was provided. -18:12:36.867 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 128 bit key was provided. -18:12:36.867 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 192 bit key was provided. -18:12:36.868 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 248 bit key was provided. -18:12:36.868 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 264 bit key was provided. -18:12:36.868 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an RSA key was provided. -18:12:36.868 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an RSA key was provided. -18:12:36.868 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an EC key was provided. -18:12:36.869 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an EC key was provided. -[INFO] Tests run: 29, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.114 s - in org.jose4j.jwe.NegativeJweKeyTest -[INFO] Running org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithmTest -eyJhbGciOiJQQkVTMi1IUzI1NitBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwicDJjIjo2NTUzNiwicDJzIjoibk9CV0QzeTB5WUp1aHRMYyJ9.i9psFOLTAo943gzGbfNZpdLRPNKtlXxbdWwEe00hMhNDMU_LzGgCqg.vRsOOq3ni51Y6DPMkU-RGg.mCMmwup_aaKxxOHQ8GNoew.ACJowAjyo9K4fpsyxkijrg -18:12:58.963 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'PBES2-HS512+A256KW' is a blocked algorithm.): eyJhbGciOiJQQkVTMi1IUzUxMitBMjU2S1ciLCJwMnMiOiI4UTFTemluYXNSM3hjaFl6NlpaY0hBIiwicDJjIjoyMTQ3NDgzNjQ3LCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.YKbKLsEoyw_JoNvhtuHo9aaeRNSEhhAW2OVHcuF_HLqS0n6hA_fgCA.VBiCzVHNoLiR3F4V82uoTQ.23i-Tb1AV4n0WKVSSgcQrdg6GRqsUKxjruHXYsTHAJLZ2nsnGIX86vMXqIi6IRsfywCRFzLxEcZBRnTvG3nhzPk0GDD7FMyXhUHpDjEYCNA_XOmzg8yZR9oyjo6lTF6si4q9FZ2EhzgFQCLO_6h5EVg3vR75_hkBsnuoqoM3dwejXBtIodN84PeqMb6asmas_dpSsz7H10fC5ni9xIz424givB1YLldF6exVmL93R3fOoOJbmk2GBQZL_SEGllv2cQsBgeprARsaQ7Bq99tT80coH8ItBjgV08AtzXFFsx9qKvC982KLKdPQMTlVJKkqtV4Ru5LEVpBZXBnZrtViSOgyg6AiuwaS-rCrcD_ePOGSuxvgtrokAKYPqmXUeRdjFJwafkYEkiuDCV9vWGAi1DH2xTafhJwcmywIyzi4BqRpmdn_N-zl5tuJYyuvKhjKv6ihbsV_k1hJGPGAxJ6wUpmwC4PTQ2izEm0TuSE8oMKdTw8V3kobXZ77ulMwDs4p.ALTKwxvAefeL-32NY7eTAQ] -18:12:58.964 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: PBES2 iteration count (p2c=2147483647) cannot be more than 2499999 to avoid excessive resource utilization.): eyJhbGciOiJQQkVTMi1IUzUxMitBMjU2S1ciLCJwMnMiOiI4UTFTemluYXNSM3hjaFl6NlpaY0hBIiwicDJjIjoyMTQ3NDgzNjQ3LCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.YKbKLsEoyw_JoNvhtuHo9aaeRNSEhhAW2OVHcuF_HLqS0n6hA_fgCA.VBiCzVHNoLiR3F4V82uoTQ.23i-Tb1AV4n0WKVSSgcQrdg6GRqsUKxjruHXYsTHAJLZ2nsnGIX86vMXqIi6IRsfywCRFzLxEcZBRnTvG3nhzPk0GDD7FMyXhUHpDjEYCNA_XOmzg8yZR9oyjo6lTF6si4q9FZ2EhzgFQCLO_6h5EVg3vR75_hkBsnuoqoM3dwejXBtIodN84PeqMb6asmas_dpSsz7H10fC5ni9xIz424givB1YLldF6exVmL93R3fOoOJbmk2GBQZL_SEGllv2cQsBgeprARsaQ7Bq99tT80coH8ItBjgV08AtzXFFsx9qKvC982KLKdPQMTlVJKkqtV4Ru5LEVpBZXBnZrtViSOgyg6AiuwaS-rCrcD_ePOGSuxvgtrokAKYPqmXUeRdjFJwafkYEkiuDCV9vWGAi1DH2xTafhJwcmywIyzi4BqRpmdn_N-zl5tuJYyuvKhjKv6ihbsV_k1hJGPGAxJ6wUpmwC4PTQ2izEm0TuSE8oMKdTw8V3kobXZ77ulMwDs4p.ALTKwxvAefeL-32NY7eTAQ] -18:12:58.965 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'PBES2-HS512+A256KW' is a blocked algorithm.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTNTEyK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJwMnMiOiJGbVE0aDY1aUFlZEs0SUFyIn0._P2Mbn0nvqRZVCaEaLnKQkMFwGNmEVbm8Ffnb5uIas0iAt5wcWC3T7rdTwyliWW11YnhpaiXH0WRalAsIUyaVHC4Ku1j9bVP.Tg2KOblqWEF9iC71O-WgBw.OCjt9WYrTFMIst7XBZ8HeA.YRqs3_nMchYr39AJYquQs8-PrZa2NGuqshOvtLfWSvE] -18:12:58.965 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: PBES2 iteration count (p2c=2500000) cannot be more than 2499999 to avoid excessive resource utilization.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTNTEyK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJwMnMiOiJGbVE0aDY1aUFlZEs0SUFyIn0._P2Mbn0nvqRZVCaEaLnKQkMFwGNmEVbm8Ffnb5uIas0iAt5wcWC3T7rdTwyliWW11YnhpaiXH0WRalAsIUyaVHC4Ku1j9bVP.Tg2KOblqWEF9iC71O-WgBw.OCjt9WYrTFMIst7XBZ8HeA.YRqs3_nMchYr39AJYquQs8-PrZa2NGuqshOvtLfWSvE] -18:12:58.966 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'PBES2-HS384+A192KW' is a blocked algorithm.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTMzg0K0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJwMnMiOiJneXBKYzJFVXNtbmNqTUtqIn0.RYXJhCW2m4Pa5XPUPVVQVJRg8z-jj-zyXoa-Q1JzdfjO2tvrELM7Ko3qhkv2WcUAw3ZagzIeNjY.FhNCr7zjUt0fA6KotCbdUw.DMYLybjcrOX9cfwdWaORLg.QCGY9clkv4sz1rZeexg2dUx4ViH-BeL7 -] -18:12:58.966 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: PBES2 iteration count (p2c=2500000) cannot be more than 2499999 to avoid excessive resource utilization.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTMzg0K0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJwMnMiOiJneXBKYzJFVXNtbmNqTUtqIn0.RYXJhCW2m4Pa5XPUPVVQVJRg8z-jj-zyXoa-Q1JzdfjO2tvrELM7Ko3qhkv2WcUAw3ZagzIeNjY.FhNCr7zjUt0fA6KotCbdUw.DMYLybjcrOX9cfwdWaORLg.QCGY9clkv4sz1rZeexg2dUx4ViH-BeL7 -] -[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 22.082 s - in org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithmTest -[INFO] Running org.jose4j.jwe.InvalidCurveTest -18:12:58.972 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key is equal to 26 mod 113 -18:12:58.973 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w -18:12:58.974 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as expected: org.jose4j.lang.InvalidKeyException: epk is invalid for P-256 -18:12:58.974 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key is equal to 2446 mod 2447 -18:12:58.974 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w -18:12:58.975 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as expected: org.jose4j.lang.InvalidKeyException: epk is invalid for P-256 -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwe.InvalidCurveTest -[INFO] Running org.jose4j.jwe.RsaKeyManagementMoreTest -18:12:59.029 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap/decrypt failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:383); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:475); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted... -18:12:59.030 DEBUG o.j.jwe.RsaKeyManagementMoreTest - org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch; caused by: javax.crypto.AEADBadTagException: Tag mismatch -18:12:59.076 DEBUG o.j.jwe.RsaKeyManagementMoreTest - org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch; caused by: javax.crypto.AEADBadTagException: Tag mismatch -18:13:02.007 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:13:02.007 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:13:02.008 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:13:02.008 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:13:02.008 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:13:02.009 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:13:02.009 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:13:02.010 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:13:02.010 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:13:02.010 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:13:02.025 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -18:13:02.026 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:13:02.026 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:13:02.026 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:13:02.034 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:13:02.041 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:13:02.049 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:13:02.049 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -18:13:02.050 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:13:02.050 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:13:02.055 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:13:02.055 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:13:02.056 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:13:02.056 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:13:02.056 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:13:02.077 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:13:02.098 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:13:02.119 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:13:02.139 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:13:02.140 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:13:02.140 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:13:02.141 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:13:02.143 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:13:02.145 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:13:02.147 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:13:02.147 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:13:02.148 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:13:02.148 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:13:02.148 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:13:02.150 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:13:02.152 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:13:02.154 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:13:02.154 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:13:02.155 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:13:02.155 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@15bb2a2 registered for zip algorithm DEF -18:13:02.155 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:13:02.155 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 148ms -18:13:02.487 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:13:02.487 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:13:02.487 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:13:02.488 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:13:02.488 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:13:02.488 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:13:02.488 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:13:02.488 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:13:02.488 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:13:02.488 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:13:02.490 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@125bf5b -18:13:02.490 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -18:13:02.490 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:13:02.490 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:13:02.490 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:13:02.492 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:13:02.494 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:13:02.495 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:13:02.495 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -18:13:02.496 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:13:02.496 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:13:02.499 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:13:02.499 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:13:02.499 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:13:02.499 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:13:02.500 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:13:02.503 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:13:02.508 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:13:02.512 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:13:02.516 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:13:02.516 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:13:02.516 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:13:02.517 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:13:02.517 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:13:02.518 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:13:02.519 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:13:02.519 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:13:02.519 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:13:02.519 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:13:02.520 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:13:02.520 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:13:02.521 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:13:02.521 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:13:02.522 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:13:02.522 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:13:02.522 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@e3d262 registered for zip algorithm DEF -18:13:02.522 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:13:02.522 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 35ms -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.886 s - in org.jose4j.jwe.RsaKeyManagementMoreTest -[INFO] Running org.jose4j.jwe.Rsa1_5KeyManagementAlgorithmTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.094 s - in org.jose4j.jwe.Rsa1_5KeyManagementAlgorithmTest -[INFO] Running org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest -18:13:02.655 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZUZCQjh1RGU5aC0tcllnaFFOTTJ4ZG00T2FrN2VJbTBxQTRycTFxWkpZbyIsInkiOiJnVFhCQkFoeDVLR3NEbHJNV3NvREpnek5fX2dlRlVqSmVRWTg5TW05c2RNIiwiY3J2IjoiUC0yNTYifX0.ZLy1u9Ikzv4ny2LxSej8uLTu8FK5Vg_DV033p5JOheOv5C2VMa_Ljg.hZhe7kcUipXbMCzeGmVcog.02-S9aQxeOHS-_ZryanU3P24AgOvzmtFdmvSXAQegw3nQLoTfPD_I8GGhlME0obmgoWaX0xf3pgib-JMmKn6MA.VxkV_eDUU_KKLrerlkSCAw -18:13:02.699 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4Ijoib29PRWlmWXhuYUVPdnVqUmNkX1B5YmFZeDhHZ2tLOHM5U1lwalFGNzNtUSIsInkiOiJScVFUX3RFQ080X29yc3NtQ2ZSRWlJOTJ0RGVNZnhJOVRQVmF6cklBQllRIiwiY3J2IjoiUC0yNTYifX0.bbMlFjQ1zoGGe6V6B6yEdtrFmpKoNxb3hlnoYD564H_irK3HRkxPiL3lkb2q71QpEDrdiaKrODA.4RhZlKUFO6Ku5HKoWdPtOw.gvj9X_Wq_qp0rLhFw8VLI4rubvPUQL5psog96bayjpLQbBxFOOekmgCpzKqYo6fcPfF1gVfnA2AXVyW6ZTevLA.-dI6Y_1c8GnWJf5Wwa9QYuzkOXcN0KFo -18:13:02.743 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiOE43OWJkVkRhZGxVLThON0FnN2RmU2RQRHpJMi1uUzhZQkFkOFRndWh5OCIsInkiOiJMTEVnZ0JHNi14SUhNY1g1cVd2VFBKZndyYnNxcWVhcTZEdmxPNVRvZHFnIiwiY3J2IjoiUC0yNTYifX0.1vvfgxEug2CvvFmNizrDfWeeW3aIqt6-LcdXCZ93aLeDMZ2qkd8wzbZunS-0P0MzE_MdxJWldUZoVKwy1tWAy57eiDpQgorl.VZ3Ls-BaY-8tgh-zilEW4A.rIpGf9GIQp3MY9BQLxzh3axMfz7ead9bGxpjFVhRmheM8xYvWuMUTUZkQHc8d9KEY9krXGUk9rRccj473ybtgg.1pzKfU_AH2Iq_YGC3yBFvbBG4VpI7bwabta9s4m1hXs -18:13:02.788 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiQ2JVZGZhZlRFbGlNYWYxSWhCQng1eXFNMVpETHEyVG4zWXRFcnZSLV9RZyIsInkiOiJFei1UQzRCNEg1bWlSTm85UTZYaW9zc1RBdjdrMzZtc3RlU3NmRjhwMlZZIiwiY3J2IjoiUC0yNTYifX0.sMWGq0ib_RrtEYfdSp4VSLGkTnwh6Cy_u_sfcRqobrvfTrp0Hkt4Tg.j73C1lQ2CaEtgIR96tpj1g.QmBUjBOc3O_BdbOCUrDX8rLfLifOAr9U5XkP_p3U3s3KR7V8_6lFM7jCaISKJ55R8fO_9ZY3_RtzEbvFGuD8OQ.osIAk_m9CcWpYJfRr-CAYw -18:13:02.831 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZHFtVHFaVHk2YmZYaG5nUmhUWmNjSFlvMWFNVGJ6WDYtM2ZLWFdWZDAyNCIsInkiOiJsWnN5T010VUFCNV92UEFRQUhwanFkVVdxOUgtVHgxMERxb1JVNkhxM2VvIiwiY3J2IjoiUC0yNTYifX0.fvPm1R-VekZWWMKfzeOBpXeFZfgv_hLtiLOM4DIY7bTvOPeetLViaDYTDk92gVAPdtzH_mxisWs.Du5OhbLmazCJRq8D6f_QaA.pGgLGY_49jaGKVLQwBEJNIDU--0lhqtbaltvsjTbMMWS3OzIXgD9A8PXPjkQx0r5ou-oWIpPhDOFztpzFVg7WA.zdXbZmte6XYup3Nq5n68a5AcmlJ9qh09 -18:13:02.876 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiN01xQzQ0Q0RGeTlUNkRFS1VoYk9zM1RlUkJOcC11NVdaUFZZMGJSazdOOCIsInkiOiJCbFBRWGs5NVJ0dnJrYjFpX1ZhNlp2c1VyUklqb242QUlpSE9Hb1hJQ3pJIiwiY3J2IjoiUC0yNTYifX0.qEBPieacmqo3dnkU0iixGnwFljHLizFj_cY_eCQuXo1VyWDfyhVztAV3VXSGshF3rI_xe3If4HBplzS2hyYCQIMfkpYnYAxt.EflfHyZgCLlOkRa7J4JBxg.Wumq52kzcpv4YVsmdf2n410gvEiQV8PuK65xOgWaOB9i4NA-f6QXFvBCpjtdvysAK3iyOxlm0fJfcm9Ujpdwcw.PXwWDiXgGU9WazJkD0wmiQ6U19vTLueCHf04uABgxOI -18:13:02.921 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiV0lFNlNZUFlHaUFVR1FxeGZEZFNpOEgyQmRNeUhDdGVsVzJPRTJHWGlxZyIsInkiOiJiWTluTjZ5LVFZdW9UY0oyMzNiNlhxTm13aWt1cUlFSHN3bkRlcTFpV25jIiwiY3J2IjoiUC0yNTYifX0.ynIT_w5Wj9w1cxXH_PwFVmNVLsU-LDe_Rlb9HLE_MiIajyiergUPhw.wjrAHSR7yrS1LTR6KsoYvA.iTA25-2OBxE0OkyuuJ2EXuNMEWu12nS40eLghbHNhzQxzunWhYHRiZTxuLG0QSk5twVirMMHuYHFFU2Grah17A.-6f8pMV96uouQMh4uqGhQQ -18:13:02.966 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4Ijoic09tNWxLUXRrNW9DMGFxUm9OTWxQd19xbmtrTmpGU1JReFd2b3dDZUFLbyIsInkiOiJXZ1FnR095aUlGZUhPUWZnQ0psQlppbWhkM1F1ZWx2V1dMUVB2b290ZGd3IiwiY3J2IjoiUC0yNTYifX0.xuRV_-6PgKYVADtctUjkib3n7Rx5a_YbVG-IFImTJoisOKF-IfX6lo_nbpzotxTWVTCqzIjcVQc.5zOscYYzy0OgPwrc5gjNpQ.ssXhTKd-lmyBg42HgloGyaJS7dJIMfXyWjP9JOInUYzCWkHuingwBsbn_YL1SIccCrBFVtOppVkPrRlz97sJPg.Y1nlPRTClcPMy7CjHSqaqe90_FTxwb7M -18:13:03.012 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiQkJkbEdCeFRZbjRBa3RTbjdrZFNmbEFMOExYZ0h2cE9adWZpTGQ3eWJNbyIsInkiOiJtSFRQRk5UR3hqYk44S25XeW55UHo2TXZ1NjVaTDJMS0ZyQ2ZqWTQwa1pVIiwiY3J2IjoiUC0yNTYifX0.9_mnWcgSXclYsZhFNJzGF_aCRQp2DxLP-BRgIZfmGhpRyao1a0_DV_5yRRpJAM9Mc2jX99g2fkANNN7lRXj1rnqki3cqLVMF.ZjN3XuBsYMByRRLeBmqRpw.wtwKQathpgG-Nw7-YXYHCLZwG_9z4pi16jXFnboCe0ieHAMRdvfFJhws7IuOQHkrW5zPCwGMC17J_mR_DRj3qw._8DcXwsYqGSqePBn5cMkViNawbJUEI_dc_iI7ZXZKJ8 -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.403 s - in org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest + parameters: java.security.spec.ECParameterSpec@1aa3ca5 +18:24:43.329 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: epk is invalid for P-521 +18:24:43.331 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +18:24:43.335 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.PublicKey +18:24:43.338 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Unable to encrypt (RSA/ECB/OAEPWithSHA-1AndMGF1Padding) the Content Encryption Key: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +18:24:43.339 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.ec.ECPrivateKeyImpl to java.security.PublicKey +18:24:43.344 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 8 bit key was provided. +18:24:43.345 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 40 bit key was provided. +18:24:43.346 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 136 bit key was provided. +18:24:43.347 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 192 bit key was provided. +18:24:43.349 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 256 bit key was provided. +18:24:43.350 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an RSA key was provided. +18:24:43.351 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an RSA key was provided. +18:24:43.353 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an EC key was provided. +18:24:43.354 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an EC key was provided. +18:24:43.358 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 8 bit key was provided. +18:24:43.359 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 40 bit key was provided. +18:24:43.360 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 128 bit key was provided. +18:24:43.362 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 184 bit key was provided. +18:24:43.363 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 256 bit key was provided. +18:24:43.364 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an RSA key was provided. +18:24:43.365 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an RSA key was provided. +18:24:43.366 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an EC key was provided. +18:24:43.367 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an EC key was provided. +18:24:43.372 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 8 bit key was provided. +18:24:43.373 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 40 bit key was provided. +18:24:43.374 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 128 bit key was provided. +18:24:43.375 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 192 bit key was provided. +18:24:43.377 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 248 bit key was provided. +18:24:43.378 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 264 bit key was provided. +18:24:43.379 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an RSA key was provided. +18:24:43.380 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an RSA key was provided. +18:24:43.382 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an EC key was provided. +18:24:43.383 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an EC key was provided. +[INFO] Tests run: 29, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.474 s - in org.jose4j.jwe.NegativeJweKeyTest [INFO] Running org.jose4j.jwe.JweCryptoPrimitiveTest -18:13:03.042 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getCipher(): Cipher.RSA/ECB/OAEPWithSHA-1AndMGF1Padding, mode: key unwrapping, algorithm from: SunJCE -18:13:03.239 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@196e6d9 -18:13:03.284 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@1308740 -18:13:03.330 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@cc9fdf -18:13:03.343 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKey(): 256 bit AES key -18:13:03.345 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getCipher(): Cipher.AESWrap, mode: key unwrapping, algorithm from: SunJCE -18:13:04.361 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKey(): javax.crypto.spec.SecretKeySpec@fffe94e0 -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.321 s - in org.jose4j.jwe.JweCryptoPrimitiveTest +18:24:43.409 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getCipher(): Cipher.RSA/ECB/OAEPWithSHA-1AndMGF1Padding, mode: key unwrapping, algorithm from: SunJCE +18:24:43.943 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@1cf7d52 +18:24:44.036 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@3e4aff +18:24:44.125 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@12a4eed +18:24:44.150 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKey(): 256 bit AES key +18:24:44.159 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getCipher(): Cipher.AESWrap, mode: key unwrapping, algorithm from: SunJCE +18:24:47.460 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKey(): javax.crypto.spec.SecretKeySpec@fffe81e4 +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 4.028 s - in org.jose4j.jwe.JweCryptoPrimitiveTest +[INFO] Running org.jose4j.jwe.Aes256GcmContentEncryptionAlgorithmTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.101 s - in org.jose4j.jwe.Aes256GcmContentEncryptionAlgorithmTest +[INFO] Running org.jose4j.jwe.EcdhKeyAgreementAlgorithmTest +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.681 s - in org.jose4j.jwe.EcdhKeyAgreementAlgorithmTest [INFO] Running org.jose4j.jwe.XEcdhTest -{"kty":"OKP","crv":"X25519","x":"xoRvwfxi8BlVzKJrs05tgF9YYj2zvNI4d-wEaBtnnmM","d":"XLl8wycEJPd5xYYwhr4ya8oZpnkHXyj3yGfS7q5pVyI"} -eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJPS1AiLCJjcnYiOiJYMjU1MTkiLCJ4IjoiRmdpbDZLMnlNOU9tZFQybnU4akpzanJ1dGY1VER4eG9DRWllcnVCbnhYdyJ9fQ..WToj9OfetYKb9pNGXIzUgQ.KBsaK7hoSM9G7noTvER0MFndUt4kQFKX0R-07ahmzom9LpqT56oFbfiT0_yuMQxI.jLt8-oiXQVMlIADKGDiMeg -eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiT0tQIiwiY3J2IjoiWDQ0OCIsIngiOiJYWFFCVE5TTEZlaUM0M0VFVDVfOEVZcWRqMll4ak5ZVTRvVURfM3RHX20zRjRFRHRGOVlsNnZOd1dyU1ZyYnhQNlVoUmFwV29Xc0FBIn19.l_xyAS7zno22CGUPx4RVzOOd8XDHeCOP-LkuxO7AUYGfaZsqPrx46X6XKfHGjk_rM8P-kOoNuVXzh7plSN2KllNPsIrqNTUk.MS4iYB6t7fgNjHDfkRlLUA.MUdzws6mNEbFID36z_5QSUnvqsgtoBUnw_AT7MkOtjdhmx3Uglmr-ESMc8aZOrlh.2zqnj6S3aTi77vK8UEmNReJmY-Lor1_MSNS3WUJ61pY -[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.177 s - in org.jose4j.jwe.XEcdhTest -[INFO] Running org.jose4j.jwk.JsonWebKeyTest -[INFO] Tests run: 13, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.018 s - in org.jose4j.jwk.JsonWebKeyTest +{"kty":"OKP","crv":"X25519","x":"Ap6ui7BJfcKdZ2hAGsWPSxv9utIoqsp3VMisms_kIx0","d":"QfeD8M3diX_hK-Aby-iF2X08pNFHvC0ZTMG1O1V_HI4"} +eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJPS1AiLCJjcnYiOiJYMjU1MTkiLCJ4IjoiWXJpWkpGVFdDakUyVjBlUGFkZlhmZHFVYWtzeEpJajJHSTJCbFFIM0h5NCJ9fQ..7oiDQ7-_0jcjUJa_PdWZKg.6WlUAnT9Fvjz9oEORBA2lKaw07gBH6kTD21MSggCn1aabm2IqYYMhNDSrtSpwZ8u.AQmBtMOq8vOIXxI69UEJ_g +eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiT0tQIiwiY3J2IjoiWDQ0OCIsIngiOiJ3aXRfaEYtU0pVYWpmSVRQU1BBcnhCSERtZU9NeTF1UFlETVFuT3RyZ3QxUDJPamtJZS1VUDZyMFRzN0JkZ1BYdExhZUkwU0hjMWNBIn19.ZkD2eHUIYc8n08-JtkRth_qFzOZnU-rJcdtLV7c7REG5AH5a92vydnD4OA6S2QMtk9ZsCY8x5qPZmZQ78A9Bd5K0a0btntQW.F32R0bM0NiKDItqGmrWf0A.pihWHa28Y3H7Uatmg0fRVr5H93EC3pV48NwKs9Lv3qsOIEvq-AcZl1zkYrhpaoQu.fYNNWzP29TTAIaBvGHpJqwNGC1pXJgJEczADwMJ__es +[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.441 s - in org.jose4j.jwe.XEcdhTest +[INFO] Running org.jose4j.jwe.Aes128KeyWrapManagementAlgorithmTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.022 s - in org.jose4j.jwe.Aes128KeyWrapManagementAlgorithmTest +[INFO] Running org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest +18:24:50.920 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoidHNIRzJOajhyLVR2czNaZ21vYVY3aGpwMlpxZTVXTkFzQkxtaHJvZm1kTSIsInkiOiJmQnRWVUNvcXVnUmN6WTJ5RER0eXNWbzdtVno2di1ob1ViM1hEMWN0SWFVIiwiY3J2IjoiUC0yNTYifX0.nkVH9cOzLC65zCxwhX0qDtoW1J4Rnpq7AZNRxgAct3JfOfN6UygBKA.POwaZKOJ4SMZpxw8YOgIMg.hyWQBDn6X4Lf_aEepC5W1KqadQeYcCofObX_3Q7Amiw28izdfVA5RvXvay96mBP0Uf8GQ4yZ8LChKgNI2QMX1Q.ayLD7Iby4yuSWQs8gYeI7A +18:24:51.030 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiUXR2Znl5eTBrS2Jxa1MxeU9XeDdHOEtqbTZfVUpYZWZsYVhPSjYzdkttUSIsInkiOiJ4OFJOZ1FZYVNJeHVtVVFWX2kzUVIyLTZkN0V3LTB6NS1DXy1tVW5jbzZzIiwiY3J2IjoiUC0yNTYifX0.PZpTYKT0wo1iTbKsnEHJV5EA1OTly5L3pFDYs0pe9so-lXxAQh9grkTOFl5OG5DmC7Zz_5B1Fp0.WMRo6ELeenI1hW7LC6GyHg.zBjtrNOAqWna2NeRKqPz6yOeZhZ5JwDxQur_pLkcbXKnvO80T9m-MhjHrXLJ9ti2-msN9pyg-6MGAyZbZ7SwYg.W73mDtd9w2JfoWl4faYecr-Jd-H5YCbH +18:24:51.139 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoibkNSOVlVc3FLOW5IUzNZWTFLNExRZGVRdV93MHZQaDdTVTBYQUtqeURTTSIsInkiOiItVUpVdHpCc0FOOUR2WUJScWktZkZBZUtYN2puOEZGd05UTURYbjdhYTB3IiwiY3J2IjoiUC0yNTYifX0.xU4kWKvgE5E20za5Phqh9lh0KX8_q4-sES7ydzMq7s9BGRkyl8wD3FaF3yT5UiLwy4fV5x5ILuF_pZMBtZmTguDMo7P8Uv-5.crTu5axfXOFxMh8_i1hfHQ.STAGRkdSovIHrORvIkmWr2oXJ4nlrOP-QmCCoEbGrXhQAKTUFmSHqVQ4GEVliHts9ukOqrXwWyk6gb0dNUXXjQ.9Xc2f4FnJK70iewklkjnUYcxT173EvKkYQga_TokHeQ +18:24:51.251 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiQTJmR1ZnQkt5eElaVFdaUVFUNkFTUXc3SGoza3gtWUpRdlRzNTZOVFFRUSIsInkiOiJFaERVM1NXNUo2eEJVWnNsMGRNUmdHenlJMjJYQ3BnWHlnT01rV004MGo4IiwiY3J2IjoiUC0yNTYifX0.x4aILCL0bhfgqGkGkuXQ-df_QmwM3f2vcEdLv4cnUHtJjZ7Tkn-x8A.t_bzgYyW5OuVhlff3cTDpA.kGBYQLNEnnE8AqEbDxN9yOMiNbkMq0oe4x7GP5k5HhePDksGT5SKr_fKj8NnNlijCH1uoa2fiXXYJ82GDXA-dg.O8EqTA7X9DAm7MJtfUyg3A +18:24:51.366 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiR1B6NjBHOU8xcXVuTzh4dEM0RVhZN3JCNVI5bjF1ajdEWUhsX2l4X1hWayIsInkiOiIwN1N4NkJIM241ZURORjNOZWtTZkJSSDZHb2FkNlhFS3NnMjgxbjQwdlRNIiwiY3J2IjoiUC0yNTYifX0.ktsIcafzNZEtCEk_q84plU3gHcbesQuRrE0-Dbl_CWXESnSEv3eHNtMhUsEnm6dEXAXBXljMMSc.Gc7nik6THNapss4wMcPzQQ.f7BfzJFoXnUd5yxvQSt2L0Af9XAGkVB2hnpzywmZN2i2bV2b2IjPDxNfwYwjt-BJ2g8uExGHAQR4DjVJigD1Ww.A6bV9XvjBt3vMwMA1KAu7z4SKm3fAYNs +18:24:51.477 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiTmpRb0p1Qk4wMmZ1TkNId3JrbEl4Yl9KSEF4UXk5T2U1OF96VDg2cnhmayIsInkiOiJjMmZFSWZoNjBoVnhTMm5ITzhJNkVpcXRMTTg0ZENxck9uRUJvR1VkVG4wIiwiY3J2IjoiUC0yNTYifX0.fAPsUUESEL3BTvrM2uzEc60sSRKJBx9YXjSSgSxl2bUfRKnduEZLbpcT7ATmOnuNWHdPVHpGDHSD35ftdLXZdkVVIrohpRWn.XEgHMKeDH9gQh0NOzbnMgQ.EMCYLqjeXBMRFdgM_Z3xR0_uZfAgNed9jtl4cTdbByFDmQ5QsES36u2H5tqbIXOKfjK7IdPWrZwh67AMfTDfHw.NrSsnDz3lpP2tEI59pXwO5c17w38lNWxaJ6qY9dSxDM +18:24:51.585 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiNzZKQzhpQUlUVW82R0Q2bWtOMWhuc3laOXZxVF9jcWZYV2x0RGh6NWZiUSIsInkiOiJIV3gxcHEzRkQxdW1yRG9fRXFDeUxkN3BNTmJZRFc5a2lRcDBxN3hFTDJJIiwiY3J2IjoiUC0yNTYifX0.mZKw_xqQ1uft4weepKj8oN_GwBmDdWrM6v7kM5Fm-KANB1Wp62s37A.6WDJ2Afoi5V3kOg16tXoAg.LJCPC3jQcBAu8gFHSypJhsR6ch_wX-ucD_xk80rJkfPP7ezIWsIqUAj9zVz8fW5mdnE_wxjcLcin829KELMoMg.MuONLOLRYlCqWnDf0fnEXg +18:24:51.689 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiSG9NdTZiZ2tNcjVuanl6bGw5bjRzbGg2RG5vN0hfdDVhY2pNcDlRR3JIRSIsInkiOiJNVnlzc0Z5Q3p4YVdKVldrSVJFQ0MyQzAxOXpWUTJSaGhBWk1TRFhsVlY0IiwiY3J2IjoiUC0yNTYifX0.BeyBD6C7A_X-9UnnhQIXTrI9vpPYjEIMD6CoNb-DAFGrTOMwF3X7xqh4VYCkmznl8Cca67zZkgA.9itRlfixBbKE5eRPzW_wiw.tsIzI4eRcPoMgUAfz7MDfwhpE62KlUD3fxRUqUUXrOl1-AqZQv31QnpOsoNSzk_Z5AMgRZa7m-8wwTOQTnifpA.WPeS2vp47-GAy7kfD8Ka7wBPOfQcFtVI +18:24:51.795 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoidHROelAxVEdFZ0dTeDBkX2ZNU1gyOHZrblp1MUFKcmhPcWZTQTNfV0t6USIsInkiOiJUUXY5VnFzQnRWY2dTbk9KWHNQdlU4dTE4RkNra0IwdDN5U3owdDZvVzQ0IiwiY3J2IjoiUC0yNTYifX0.HFPVg4-DUkQ_SHmDCOEwM1Rr-KNFMVAqUVELjPfE-Jpi07FXL3efdrTTn2iK0DKBx6F5lYqtjY0oTAK4eDH0VDa7wRk8vH1h.Tf3mswI1yg88S1PPLfsjdg.4hmpxoJBwpDsuvrkcXE8n4wBb_CnCPjq8L2D_9yjA33WIqU1gpWe1gbzZxzhPeg_INthP-Uw-xYziAP17bVbrg.Y3cXD378OJ2glPlINS7gXoOavQ6UiZPC7d6rn9rxNjs +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.017 s - in org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest +[INFO] Running org.jose4j.jwe.GeneralJweTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s - in org.jose4j.jwe.GeneralJweTest +[INFO] Running org.jose4j.keys.BigEndianBigIntegerTest +[INFO] Tests run: 19, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 3.31 s - in org.jose4j.keys.BigEndianBigIntegerTest +[INFO] Running org.jose4j.keys.resolvers.EmbeddedJwkVerificationKeyResolverTest +18:24:55.262 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: No jwk in JWS header): JsonWebSignature{"typ":"dpop+jwt","alg":"ES256"}->eyJ0eXAiOiJkcG9wK2p3dCIsImFsZyI6IkVTMjU2In0.eyJqdGkiOiItQndDM3lFU2MwNGFjYzc3bFRjMjZ4IiwiaHRtIjoiUE9TVCIsImh0dSI6Imh0dHBzOi8vc2VydmVyLmV4YW1wbGUuY29tL3Rva2VuIiwiaWF0IjoxNTYyMjYyNjE2fQ.DlWrKDQE15d6lN14J525P877gT_pmYYKFwpFmUvs3uQ96wTHV-4ZdnozfXVmlHmpgF5DA_3Ld8x5iyS7MrOjhw] +18:24:55.269 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Problem processing jwk from JWS header (jwk header contains a private key, which it most definitely should not.)): JsonWebSignature{"alg":"ES256","typ":"dpop+jwt","jwk":{"kty":"EC","x":"76nY8PkSVA80iOPq3UEGnocuOGhQjGOkcPpbyWpsWmg","y":"00LZB2IcOxErkNZwcQX_dmudk-atORMKjDBTsUeMvoU","crv":"P-256","d":"IIbXpUbIHemOAreeQ_LM2akq7y66DcYluvgydOritJU"}}->eyJhbGciOiJFUzI1NiIsInR5cCI6ImRwb3Arand0IiwiandrIjp7Imt0eSI6IkVDIiwieCI6Ijc2blk4UGtTVkE4MGlPUHEzVUVHbm9jdU9HaFFqR09rY1BwYnlXcHNXbWciLCJ5IjoiMDBMWkIySWNPeEVya05ad2NRWF9kbXVkay1hdE9STUtqREJUc1VlTXZvVSIsImNydiI6IlAtMjU2IiwiZCI6IklJYlhwVWJJSGVtT0FyZWVRX0xNMmFrcTd5NjZEY1lsdXZneWRPcml0SlUifX0.eyJqdGkiOiJiYzc4OSIsImh0bSI6IkdFVCIsImh0dSI6Imh0dHBzOi8vYXBpLmV4YW1wbGUuY29tIiwiaWF0IjoxNjQ3OTU5MTMyfQ.-GKT4h58oZzS4LGk8b44Dh4GoJ9Y2extHUOr_LzbFIibO_XXfanPZ8ePZkXd8s7cuQyFKagePUVCdu1T2UKbTQ] +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.185 s - in org.jose4j.keys.resolvers.EmbeddedJwkVerificationKeyResolverTest +[INFO] Running org.jose4j.keys.resolvers.HttpsJwksVerificationKeyResolverTest +18:25:00.708 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +18:25:00.729 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} due to an unexpected exception (java.io.IOException: https://www.example.org/says 'no GET for you!') while obtaining or using keys from JWKS endpoint at https://www.example.org/ +18:25:00.748 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +18:25:00.752 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +18:25:00.753 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Sun Oct 20 19:25:00 GMT 2024 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] +18:25:00.926 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] +18:25:00.927 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +18:25:00.932 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +18:25:00.933 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Sun Oct 20 19:25:00 GMT 2024 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] +18:25:01.143 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] +18:25:01.145 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +18:25:01.150 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +18:25:01.151 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Sun Oct 20 19:25:01 GMT 2024 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] +18:25:01.250 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] obtained from https://www.example.org/ +18:25:01.252 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES384"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] +18:25:01.254 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +18:25:01.259 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +18:25:01.260 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Sun Oct 20 19:25:01 GMT 2024 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] +18:25:01.264 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] obtained from https://www.example.org/ +18:25:01.273 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +18:25:01.276 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +18:25:01.277 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Sun Oct 20 19:25:01 GMT 2024 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k1, x=1u9oeAkLQJcAnrv_m4fupf-lF43yFqmNjMsrukKDhEE, y=RG0cyWzinUl8NpfVVw2DqfH6zRqU_yF6aL1swssNv4E, crv=P-256}] +18:25:01.281 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256","kid":"k2"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k1, x=1u9oeAkLQJcAnrv_m4fupf-lF43yFqmNjMsrukKDhEE, y=RG0cyWzinUl8NpfVVw2DqfH6zRqU_yF6aL1swssNv4E, crv=P-256}] +18:25:01.282 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +18:25:01.285 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +18:25:01.286 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Sun Oct 20 19:25:01 GMT 2024 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] +18:25:01.289 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] +18:25:01.290 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +18:25:01.293 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +18:25:01.293 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Sun Oct 20 19:25:01 GMT 2024 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] +18:25:01.295 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] obtained from https://www.example.org/ +18:25:01.302 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://abc.bfe.xyz/ +18:25:01.305 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://abc.bfe.xyz/ +18:25:01.306 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://abc.bfe.xyz/ will be cached for 3600 seconds until about Sun Oct 20 19:25:01 GMT 2024 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] +18:25:01.373 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - We expected an exception out of the CustomHttpsJwksVerificationKeyResolver: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: There are multiple keys in the referenced JWK Set document, but the kid value was not provided in the JOSE Header.) while obtaining or using keys from JWKS endpoint at https://abc.bfe.xyz/ +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 5.918 s - in org.jose4j.keys.resolvers.HttpsJwksVerificationKeyResolverTest +[INFO] Running org.jose4j.keys.X509UtilTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.046 s - in org.jose4j.keys.X509UtilTest +[INFO] Running org.jose4j.keys.KeyPairUtilTest +18:25:01.604 DEBUG org.jose4j.keys.KeyPairUtilTest - The following JWT and public key should be (and were on 11/11/15) usable and produce a valid result at jwt.io (related to http://stackoverflow.com/questions/32744172): +eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJtZWgiLCJleHAiOjE3Mjk0NDk5MDEsImp0aSI6InNFSXNvX3liaEtyOG9LNDZuY2dwUmciLCJhdWQiOiJ5b3UiLCJpc3MiOiJtZSJ9.lklap-Iq_d_TCYD4d9TjrugbeuDO8krs4DXLfZbv9sEMouizDQmyRk8ZiI9DRzDR_1ruB1U_stJtJLit4nZH1jgYgPgzaJF897tqfhJoECKx5cKxG3u0TRIbXtZ7XskZqsQzdBhmQNij8RVT6gjwzOBzO8o0TFW8DLKY7NJeOlkD4ZFbrWve0fqqYnE2erjaxTVX8ZOgzquU9wWCFiMYdnLNj_jPQrrG5dXeK0I-8qjP8nUmcY02dg1T9hbnsRvbklXOOjYphul33tE4qZ9Bn10SZIuj_whw3RfRJtaqom9d6ecchVBJPl4rwK-4YnJ7TuCppzYJ3n6_tJzvQ8lxFg +-----BEGIN PUBLIC KEY----- +MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAoahUIoWw0K0usKNuOR6H +4wkf4oBUXHTxRvgb48E+BVvxkeDNjbC4he8rUWcJoZmds2h7M70imEVhRU5djINX +tqllXI4DFqcI1DgjT9LewND8MW2Krf3Spsk/ZkoFnilakGygTwpZ3uesH+PFABNI +UYpOiN15dsQRkgr0vEhxN92i2asbOenSZeyaxziK72UwxrrKoExv6kc5twXTq4h+ +QChLOln0/mtUZwfsRaMStPs6mS6XrgxnxbWhojf663tuEQueGC+FCMfra36C9knD +FGzKsNa7LZK2djYgyD3JR/MB/4NUJW/TqOQtwHYbxevoJArm+L5StowjzGy+/bq6 +GwIDAQAB +-----END PUBLIC KEY----- +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.138 s - in org.jose4j.keys.KeyPairUtilTest +[INFO] Running org.jose4j.keys.EllipticCurvesTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.4 s - in org.jose4j.keys.EllipticCurvesTest [INFO] Running org.jose4j.jwk.Rfc7638JwkThumbprintTest -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.jwk.Rfc7638JwkThumbprintTest -[INFO] Running org.jose4j.jwk.JsonWebKeySetAnotherTest -18:13:04.589 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Missing required 'y' parameter.). JWK params: {kty=EC, kid=this one shouldn't work 'cause there's no y, x=msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY, crv=P-256} and the full JWKS content: { "keys": [ { "kty": "EC", "kid": "96", "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg", "y": "y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4", "crv": "P-256" }, { "kty": "EC", "kid": "a9", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ", "crv": "P-256" }, { "kty": "EC", "kid": "this one shouldn't work 'cause there's no y", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "crv": "P-256" }, { "kty": "EC", "kid": "2d", "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw", "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4", "crv": "P-256" } ]}. -18:13:04.591 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Unknown key type algorithm: 'UNKNOWN'). JWK params: {kty=UNKNOWN, crv=whatever, x=11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo} and the full JWKS content: { "keys": [ { "kty": "EC", "kid": "96", "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg", "y": "y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4", "crv": "P-256" }, { "kty": "EC", "kid": "a9", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ", "crv": "P-256" }, { "kty":"UNKNOWN", "crv":"whatever", "x":"11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo" } { "kty": "EC", "kid": "2d", "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw", "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4", "crv": "P-256" } ]}. -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.JsonWebKeySetAnotherTest -[INFO] Running org.jose4j.jwk.X5cTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.X5cTest -[INFO] Running org.jose4j.jwk.OctetSequenceJsonWebKeyTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.OctetSequenceJsonWebKeyTest -[INFO] Running org.jose4j.jwk.RsaJwkGeneratorTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 5.719 s - in org.jose4j.jwk.RsaJwkGeneratorTest -[INFO] Running org.jose4j.jwk.DecryptionJwkSelectorTest -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.011 s - in org.jose4j.jwk.DecryptionJwkSelectorTest -[INFO] Running org.jose4j.jwk.JwkGlitchesInDeploymentTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.JwkGlitchesInDeploymentTest -[INFO] Running org.jose4j.jwk.VerificationJwkSelectorTest -18:13:10.411 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:13:10.411 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:13:10.411 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:13:10.412 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:13:10.412 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:13:10.412 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:13:10.413 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:13:10.413 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:13:10.413 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:13:10.414 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:13:10.425 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -18:13:10.426 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:13:10.426 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:13:10.427 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:13:10.434 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:13:10.441 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:13:10.448 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:13:10.448 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -18:13:10.449 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:13:10.450 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:13:10.454 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:13:10.454 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:13:10.455 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:13:10.455 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:13:10.455 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:13:10.476 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:13:10.497 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:13:10.518 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:13:10.538 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:13:10.539 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:13:10.539 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:13:10.539 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:13:10.542 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:13:10.544 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:13:10.545 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:13:10.546 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:13:10.546 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:13:10.546 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:13:10.546 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:13:10.548 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:13:10.550 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:13:10.552 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:13:10.553 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:13:10.553 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:13:10.553 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@20aab9 registered for zip algorithm DEF -18:13:10.553 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:13:10.553 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 142ms -18:13:10.558 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -18:13:10.559 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -18:13:10.559 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -18:13:10.559 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -18:13:10.559 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -18:13:10.560 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -18:13:10.560 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -18:13:10.560 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -18:13:10.560 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -18:13:10.560 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -18:13:10.561 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@125bf5b -18:13:10.562 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -18:13:10.562 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -18:13:10.562 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -18:13:10.562 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -18:13:10.564 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -18:13:10.565 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -18:13:10.567 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -18:13:10.567 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -18:13:10.567 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -18:13:10.568 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -18:13:10.570 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -18:13:10.570 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -18:13:10.571 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -18:13:10.571 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -18:13:10.571 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -18:13:10.575 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -18:13:10.579 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -18:13:10.583 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -18:13:10.587 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -18:13:10.588 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -18:13:10.588 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -18:13:10.588 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -18:13:10.589 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -18:13:10.590 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -18:13:10.590 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -18:13:10.590 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -18:13:10.591 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -18:13:10.591 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -18:13:10.591 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -18:13:10.592 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -18:13:10.592 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -18:13:10.593 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -18:13:10.593 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -18:13:10.593 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -18:13:10.593 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@40c151 registered for zip algorithm DEF -18:13:10.594 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -18:13:10.594 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 35ms -18:13:10.595 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Missing required 'kty' parameter.). JWK params: {alg=RSA, mod=4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w, exp=AQAB, user=sig} and the full JWKS content: {"keys":[{"alg":"RSA","mod":"4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w","exp":"AQAB","user":"sig"}]}. -18:13:10.750 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying RS512 signature: java.security.SignatureException: Bad signature length: got 512 but was expecting 256 -18:13:10.759 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying RS512 signature: java.security.SignatureException: Bad signature length: got 256 but was expecting 512 -[INFO] Tests run: 23, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.419 s - in org.jose4j.jwk.VerificationJwkSelectorTest -[INFO] Running org.jose4j.jwk.EcJwkGeneratorTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.128 s - in org.jose4j.jwk.EcJwkGeneratorTest -[INFO] Running org.jose4j.jwk.Rfc7638JwkThumbprintUriTest -[INFO] Tests run: 11, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.043 s - in org.jose4j.jwk.Rfc7638JwkThumbprintUriTest +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.018 s - in org.jose4j.jwk.Rfc7638JwkThumbprintTest +[INFO] Running org.jose4j.jwk.JsonWebKeyTest +[INFO] Tests run: 13, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.081 s - in org.jose4j.jwk.JsonWebKeyTest +[INFO] Running org.jose4j.jwk.RsaJsonWebKeyTest +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.022 s - in org.jose4j.jwk.RsaJsonWebKeyTest [INFO] Running org.jose4j.jwk.OctJwkGeneratorTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.OctJwkGeneratorTest -[INFO] Running org.jose4j.jwk.HttpsJwksTest -[WARNING] Tests run: 3, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.001 s - in org.jose4j.jwk.HttpsJwksTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.019 s - in org.jose4j.jwk.OctJwkGeneratorTest +[INFO] Running org.jose4j.jwk.VerificationJwkSelectorTest +18:25:02.462 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:25:02.463 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:25:02.464 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:25:02.466 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:25:02.467 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:25:02.469 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:25:02.470 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:25:02.471 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:25:02.473 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:25:02.474 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:25:02.603 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +18:25:02.605 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:25:02.606 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:25:02.608 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:25:02.628 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:25:02.649 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:25:02.670 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:25:02.671 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +18:25:02.674 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:25:02.676 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:25:02.691 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:25:02.692 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:25:02.694 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:25:02.696 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:25:02.697 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:25:02.754 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:25:02.811 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:25:02.913 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:25:02.967 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:25:02.969 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:25:02.970 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:25:02.972 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:25:02.980 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:25:02.989 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:25:02.997 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:25:02.998 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:25:02.999 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:25:03.000 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:25:03.001 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:25:03.009 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:25:03.017 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:25:03.026 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:25:03.027 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:25:03.027 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:25:03.028 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@8be356 registered for zip algorithm DEF +18:25:03.029 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:25:03.030 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 566ms +18:25:03.044 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:25:03.045 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:25:03.046 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:25:03.047 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:25:03.048 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:25:03.049 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:25:03.050 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:25:03.050 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:25:03.051 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:25:03.052 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:25:03.055 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@1d5509a +18:25:03.056 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +18:25:03.057 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:25:03.058 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:25:03.058 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:25:03.063 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:25:03.068 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:25:03.073 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:25:03.074 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +18:25:03.076 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:25:03.077 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:25:03.085 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:25:03.086 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:25:03.087 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:25:03.088 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:25:03.089 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:25:03.101 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:25:03.113 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:25:03.125 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:25:03.137 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:25:03.139 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:25:03.141 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:25:03.143 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:25:03.147 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:25:03.150 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:25:03.154 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:25:03.155 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:25:03.156 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:25:03.158 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:25:03.159 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:25:03.162 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:25:03.165 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:25:03.170 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:25:03.171 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:25:03.172 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:25:03.173 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@1ec8b24 registered for zip algorithm DEF +18:25:03.174 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:25:03.175 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 129ms +18:25:03.181 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Missing required 'kty' parameter.). JWK params: {alg=RSA, mod=4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w, exp=AQAB, user=sig} and the full JWKS content: {"keys":[{"alg":"RSA","mod":"4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w","exp":"AQAB","user":"sig"}]}. +18:25:03.540 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying RS512 signature: java.security.SignatureException: Bad signature length: got 512 but was expecting 256 +18:25:03.564 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying RS512 signature: java.security.SignatureException: Bad signature length: got 256 but was expecting 512 +[INFO] Tests run: 23, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.353 s - in org.jose4j.jwk.VerificationJwkSelectorTest +[INFO] Running org.jose4j.jwk.OctetSequenceJsonWebKeyTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.jwk.OctetSequenceJsonWebKeyTest [INFO] Running org.jose4j.jwk.EllipticCurveJsonWebKeyTest org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=AekpBQ8ST8a8VcfVOTNl353vSrDCLLJXmPk06wTjxrrjcBpXp5EOnYG_NjFZ6OvLFV1jSfS9tsz4qUxcWceqwQGk, y=ADSmRA43Z1DSNx_RvcLI87cdL07l6jQyyBXMoxVg_l2Th-x3S1WDhjDly79ajL4Kkd0AZMaZmh9ubmf63e3kyMj2, crv=P-521} -[INFO] Tests run: 7, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.EllipticCurveJsonWebKeyTest -[INFO] Running org.jose4j.jwk.RsaJsonWebKeyTest -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.jwk.RsaJsonWebKeyTest -[INFO] Running org.jose4j.jwk.JsonWebKeySetTest -18:13:11.047 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.InvalidKeyException: "NOPERS" is an unknown or unsupported value for the "crv" parameter.). JWK params: {kty=EC, crv=NOPERS, kid=iRTU, x=tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY, y=2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -18:13:11.048 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Boolean type but is required to be a String.). JWK params: {kty=false, x=GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY, y=Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -18:13:11.048 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'x' parameter was Array type but is required to be a String.). JWK params: {kty=EC, x=[IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, huh], y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -18:13:11.049 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Number type but is required to be a String.). JWK params: {kty=1, x=IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -18:13:11.049 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Number type but is required to be a String.). JWK params: {kty=885584955514411149933357445595595145885566661, x=IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -18:13:11.050 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Object type but is required to be a String.). JWK params: {kty={EC=EC}, x=riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM, y=izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -18:13:11.050 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Missing required 'kty' parameter.). JWK params: {kty=null, x=riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM, y=izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -[INFO] Tests run: 10, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.021 s - in org.jose4j.jwk.JsonWebKeySetTest +[INFO] Tests run: 7, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.009 s - in org.jose4j.jwk.EllipticCurveJsonWebKeyTest +[INFO] Running org.jose4j.jwk.EcJwkGeneratorTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.398 s - in org.jose4j.jwk.EcJwkGeneratorTest +[INFO] Running org.jose4j.jwk.JwkGlitchesInDeploymentTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.jwk.JwkGlitchesInDeploymentTest +[INFO] Running org.jose4j.jwk.RsaJwkGeneratorTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 10.417 s - in org.jose4j.jwk.RsaJwkGeneratorTest [INFO] Running org.jose4j.jwk.ExtraJwkParametersTest -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.ExtraJwkParametersTest +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.jwk.ExtraJwkParametersTest +[INFO] Running org.jose4j.jwk.Rfc7638JwkThumbprintUriTest +[INFO] Tests run: 11, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.129 s - in org.jose4j.jwk.Rfc7638JwkThumbprintUriTest +[INFO] Running org.jose4j.jwk.X5cTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.032 s - in org.jose4j.jwk.X5cTest +[INFO] Running org.jose4j.jwk.JsonWebKeySetAnotherTest +18:25:14.915 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Missing required 'y' parameter.). JWK params: {kty=EC, kid=this one shouldn't work 'cause there's no y, x=msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY, crv=P-256} and the full JWKS content: { "keys": [ { "kty": "EC", "kid": "96", "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg", "y": "y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4", "crv": "P-256" }, { "kty": "EC", "kid": "a9", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ", "crv": "P-256" }, { "kty": "EC", "kid": "this one shouldn't work 'cause there's no y", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "crv": "P-256" }, { "kty": "EC", "kid": "2d", "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw", "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4", "crv": "P-256" } ]}. +18:25:14.924 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Unknown key type algorithm: 'UNKNOWN'). JWK params: {kty=UNKNOWN, crv=whatever, x=11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo} and the full JWKS content: { "keys": [ { "kty": "EC", "kid": "96", "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg", "y": "y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4", "crv": "P-256" }, { "kty": "EC", "kid": "a9", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ", "crv": "P-256" }, { "kty":"UNKNOWN", "crv":"whatever", "x":"11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo" } { "kty": "EC", "kid": "2d", "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw", "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4", "crv": "P-256" } ]}. +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.006 s - in org.jose4j.jwk.JsonWebKeySetAnotherTest +[INFO] Running org.jose4j.jwk.JsonWebKeySetTest +18:25:15.012 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.InvalidKeyException: "NOPERS" is an unknown or unsupported value for the "crv" parameter.). JWK params: {kty=EC, crv=NOPERS, kid=iRTU, x=tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY, y=2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +18:25:15.015 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Boolean type but is required to be a String.). JWK params: {kty=false, x=GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY, y=Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +18:25:15.018 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'x' parameter was Array type but is required to be a String.). JWK params: {kty=EC, x=[IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, huh], y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +18:25:15.029 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Number type but is required to be a String.). JWK params: {kty=1, x=IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +18:25:15.031 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Number type but is required to be a String.). JWK params: {kty=885584955514411149933357445595595145885566661, x=IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +18:25:15.037 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Object type but is required to be a String.). JWK params: {kty={EC=EC}, x=riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM, y=izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +18:25:15.038 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Missing required 'kty' parameter.). JWK params: {kty=null, x=riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM, y=izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +[INFO] Tests run: 10, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.081 s - in org.jose4j.jwk.JsonWebKeySetTest +[INFO] Running org.jose4j.jwk.DecryptionJwkSelectorTest +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.045 s - in org.jose4j.jwk.DecryptionJwkSelectorTest +[INFO] Running org.jose4j.jwk.HttpsJwksTest +[WARNING] Tests run: 3, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.004 s - in org.jose4j.jwk.HttpsJwksTest +[INFO] Running org.jose4j.jws.ChangingKeyTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s - in org.jose4j.jws.ChangingKeyTest +[INFO] Running org.jose4j.jws.EdDsaTest +18:25:15.378 DEBUG org.jose4j.jws.EdDsaAlgorithm - Problem verifying EdDSA signature: java.security.SignatureException: Invalid point +18:25:15.473 DEBUG org.jose4j.jws.JwsTestSupport - EdDSA eyJhbGciOiJFZERTQSJ9.TGl0dGxlIEVk.7viynaiQ58SWre0ZQ5M3a8Mga68MzbltECyhf21a-oCCOUbGUO8m96XeT34gAdWXKc05MnKS_5ppQQMHLoxMAQ +18:25:16.276 DEBUG org.jose4j.jws.JwsTestSupport - EdDSA eyJhbGciOiJFZERTQSJ9.QmlnIEVk.iO507QqUYBYMiX_8IYPtluE1mRxykBcrIwULkmkrOnsvn_sVRKcAuq_hshUbHseYaLY_TuR9jFcAFGeEOMEQ0_pNNoiim8xFKYS70-SO6eQfM9hf-QOkn2KbeGPQsQhtvWttzeGwVK2SPvBtD30GQQcA +18:25:17.522 DEBUG org.jose4j.jws.JwsTestSupport - EdDSA eyJhbGciOiJFZERTQSJ9.Q291c2luIEVkZGll.dZCB2ylDRqmxXGVI-r5Sf1Ahz07Zig15GDgJQ8fbZ7WYuySQoddJpz10aFreW-h_hMzeWqYF7X_xFEyv5S62Ag +18:25:17.794 DEBUG org.jose4j.jws.EdDsaAlgorithm - Problem verifying EdDSA signature: java.security.SignatureException: signature length invalid +18:25:18.003 DEBUG org.jose4j.jws.EdDsaAlgorithm - Problem verifying EdDSA signature: java.security.SignatureException: signature length invalid +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 2.698 s - in org.jose4j.jws.EdDsaTest +[INFO] Running org.jose4j.jws.GetPayloadTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.jws.GetPayloadTest +[INFO] Running org.jose4j.jws.JwsUsingEcdsaP521Sha512ExampleTest +Payload +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.926 s - in org.jose4j.jws.JwsUsingEcdsaP521Sha512ExampleTest +[INFO] Running org.jose4j.jws.CritHeaderTest +18:25:19.005 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'nope' marked as critical. +18:25:19.037 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: crit header value not an array (class java.lang.String). +18:25:19.038 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: crit header value not an array (class java.lang.Boolean). +18:25:19.043 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'http://example.com/UNDEFINED' marked as critical. +18:25:19.048 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'urn:example.com:nope' marked as critical. +18:25:19.077 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'urn:example.com:nope' marked as critical. +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.103 s - in org.jose4j.jws.CritHeaderTest +[INFO] Running org.jose4j.jws.HmacShaTest +18:25:19.162 DEBUG org.jose4j.jws.JwsTestSupport - HS256 eyJhbGciOiJIUzI1NiJ9.c29tZSBjb250ZW50IHRoYXQgaXMgdGhlIHBheWxvYWQ.qGO7O7W2ECVl6uO7lfsXDgEF-EUEti0i-a_AimulIRA +18:25:19.172 DEBUG org.jose4j.jws.JwsTestSupport - HS256 eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJodHRwczovL2p3dC1pZHAuZXhhbXBsZS5jb20iLAogICAgInBybiI6Im1haWx0bzptaWtlQGV4YW1wbGUuY29tIiwKICAgICJhdWQiOiJodHRwczovL2p3dC1ycC5leGFtcGxlLm5ldCIsCiAgICAiaWF0IjoxMzAwODE1NzgwLAogICAgImV4cCI6MTMwMDgxOTM4MCwKICAgICJodHRwOi8vY2xhaW1zLmV4YW1wbGUuY29tL21lbWJlciI6dHJ1ZX0.ZhkLsRIwT5xHXNgOpdFJ_7q5kqLd6sMiOOEV6kxTNCo +18:25:19.182 DEBUG org.jose4j.jws.JwsTestSupport - HS384 eyJhbGciOiJIUzM4NCJ9.eyJtZWgiOiJtZWgifQ.fptKQJmGN3fBP_FiQzdAGdmx-Q5iWjQvJrLfdmFnebxbQuzOmzejBrzYh4MyS01a +18:25:19.194 DEBUG org.jose4j.jws.JwsTestSupport - HS384 eyJhbGciOiJIUzM4NCJ9.TG9va2luZyBnb29kLCBCaWxseSBSYXkh.wtlqZW8_eLF3hjMZT9c_kzg133b2b_JsR44bHGshc4w_BEUJApKerwEw9cltL8w9 +18:25:19.203 DEBUG org.jose4j.jws.JwsTestSupport - HS512 eyJhbGciOiJIUzUxMiJ9.RmVlbGluZyBnb29kLCBMb3VpcyE.i4SAIaVYY4gxhqJxMvw3FKsar5RBCxzadaK2YT3HeeguWgJMLpDMu9cK1WxetjYmce49ZQmTxmB5nTbE_IgKHQ +18:25:19.213 DEBUG org.jose4j.jws.JwsTestSupport - HS512 eyJhbGciOiJIUzUxMiJ9.eyJtZWgiOiJtZWh2YWx1ZSJ9.NeB669dYkPmqgLqgd_sVqwIfCvb4XN-K67gpMJR93wfw_DylpxB1ell2opHM-E5P9jNKE2GYxTxwcI68Z2CTxw +18:25:19.234 DEBUG org.jose4j.jws.HmacShaTest - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 72 bits +18:25:19.238 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 384 bits for HS384) or larger MUST be used with the HMAC SHA algorithms but this key is only 376 bits +18:25:19.243 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 384 bits for HS384) or larger MUST be used with the HMAC SHA algorithms but this key is only 376 bits +18:25:19.247 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 512 bits for HS512) or larger MUST be used with the HMAC SHA algorithms but this key is only 504 bits +18:25:19.251 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 512 bits for HS512) or larger MUST be used with the HMAC SHA algorithms but this key is only 504 bits +18:25:19.255 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 8 bits +18:25:19.259 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 248 bits +18:25:19.263 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 248 bits +[INFO] Tests run: 16, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.134 s - in org.jose4j.jws.HmacShaTest +[INFO] Running org.jose4j.jws.JwsUnencodedPayloadOptionTest +18:25:20.200 DEBUG o.j.j.JwsUnencodedPayloadOptionTest - Expected exception because JWS Compact Serialization with unencoded non-detached payloads cannot have period ('.') characters : org.jose4j.lang.JoseException: per https://tools.ietf.org/html/rfc7797#section-5.2 when using the JWS Compact Serialization, unencoded non-detached payloads using period ('.') characters would cause parsing errors; such payloads MUST NOT be used with the JWS Compact Serialization. +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.923 s - in org.jose4j.jws.JwsUnencodedPayloadOptionTest +[INFO] Running org.jose4j.jws.JwsPlaintextTest +18:25:20.265 DEBUG org.jose4j.jws.JwsPlaintextTest - {"auth_time":1339613248,"exp":1339613548,"iss":"https:\/\/example.com","aud":"a","jti":"jIA8qa35AroV6iP2q4wRAl","user_id":"john","iat":1339613248,"acr":3} +[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.023 s - in org.jose4j.jws.JwsPlaintextTest +[INFO] Running org.jose4j.jws.JwsPayloadVariationsTest +18:25:21.297 DEBUG o.j.jws.JwsPayloadVariationsTest - Expected: org.jose4j.lang.IntegrityException: JWS signature is invalid. +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.004 s - in org.jose4j.jws.JwsPayloadVariationsTest +[INFO] Running org.jose4j.jws.JwsUsingRsaSha256ExampleTest +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.484 s - in org.jose4j.jws.JwsUsingRsaSha256ExampleTest +[INFO] Running org.jose4j.jws.MaintainEncodedPayloadAndHeaderTest +18:25:21.826 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", + "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9X.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] +18:25:21.833 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", + "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9===.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] +18:25:21.850 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", + "alg":"HS256"}->!!!!eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.021 s - in org.jose4j.jws.MaintainEncodedPayloadAndHeaderTest +[INFO] Running org.jose4j.jws.RsaUsingShaTest +18:25:32.013 DEBUG org.jose4j.jws.JwsTestSupport - RS256 eyJhbGciOiJSUzI1NiJ9.UEFZTE9BRCEhIQ.YkhS5Y6NppEmBdiPGfwetCRrceNoxnHbY4vqES9Sg9vPk3VRi4Ft4aSth9fF5AskxVFIW1kyG5Uemqn6WLU7rRrFTZtzBFQSdIKJ9VJlY2yLML85S99mllweVpmMKnrOP3IqGhIqvZcuPkauP1WPGlhIHPwQIZ1O-ioWz5q_A-Ok_7TLV-_KcNkBt4V3P0FVSGB1UMB2usPOM7KqtlYTJ-z7HhcJkYgst12th3FvzMuSz89AeaHdpSaTaNeZWJ_eQ2CMq64ADY4xJRYzQXP6fsxgl735L8Tt022WKiytJ989z3dg5KCmEZb7z8TcXPCXWWknIdxxqVvHnUi0hvhWIQ +18:25:32.621 DEBUG org.jose4j.jws.JwsTestSupport - RS384 eyJhbGciOiJSUzM4NCJ9.UEFZTE9BRCEh.djTEmCjpx9FsDfTQ2gzqqwpFa61_q-HCMkeOA-a-Ik75rMCmaVefy2N8z62mogacBH8qPHFFiiZggDJi34fEACqzA7rV4o4ArnaXNAZn-rMGa7zgSWsaxITk7cu9HXCEoUbzmplPosnOJMyTNfwqeLOa-AyoM4vNuO9MZwFaOd5BhSrDL37sIecet_iv4H5Qsw28u4aBdOYpyqj3Qy1OeahYs3QpKd8oNyjLqU7-Q-NSSIXK2kr1vjXwFhpaGb9kC17Ctf15rLXFP3mwJ6nrmjGbqn6CUXEGZKHJujuWAhDiIikSDyMggobWG4DYLYPGjuv7KIE0MwWHSfq2jViuAw +18:25:33.226 DEBUG org.jose4j.jws.JwsTestSupport - RS512 eyJhbGciOiJSUzUxMiJ9.UEFZTE9BRCE.FcaBTwFfRaPAvrsyd9rZEGGPacd4nVM72sG8lVLcLZUvdC7fP69a4b-DzsIESm4krXB5101GaDmill30TMX4oJZ7nN1KVRjU-DUTeSR2WEjv82vtTadWCiLHQW38AwbSud4YxwShpKc-D0QjjdeihXNgYqFNZxcTxGKT3Sv2hLg_bgW2nUDr-ln8MMPR_jJJqGo1peSzYujzFZE6N2MDmDo-FdSwPrQAI0Xk-IlJLBalmiBvim7HdaDCpXN18m4TMXYsUc9WaEQdqW23KsdZ43__4yHZNXzUR5kUIGSQadgYmtTt1YLw-bdkYPvAyfI9X1vZZoosdFFdV-GSb7psKg +18:25:34.445 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +18:25:34.448 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +18:25:34.451 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +18:25:34.453 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +18:25:34.455 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +18:25:34.458 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +18:25:34.460 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +18:25:34.462 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +18:25:34.465 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +18:25:34.467 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +18:25:34.469 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +18:25:34.472 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +18:25:34.474 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +18:25:34.476 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +18:25:34.479 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA384withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +18:25:34.481 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA384withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +18:25:34.484 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +18:25:34.486 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +18:25:34.488 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +18:25:34.490 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +18:25:34.492 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +18:25:34.494 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +18:25:34.496 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +18:25:34.499 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA512withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +18:25:34.501 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA512withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +18:25:34.503 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +18:25:34.505 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 12.628 s - in org.jose4j.jws.RsaUsingShaTest +[INFO] Running org.jose4j.jws.JwsCryptoPrimitiveTest +18:25:34.520 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getSignature(): Signature object: SHA256withECDSA +18:25:34.557 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getSignature(): Signature object: SHA256withRSA +18:25:35.017 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getMac(): javax.crypto.Mac@1651a82 +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.493 s - in org.jose4j.jws.JwsCryptoPrimitiveTest +[INFO] Running org.jose4j.jws.EcdsaUsingShaAlgorithmTest +[0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 2] +[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.355 s - in org.jose4j.jws.EcdsaUsingShaAlgorithmTest +[INFO] Running org.jose4j.jws.JwsUsingHmacSha256ExampleTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s - in org.jose4j.jws.JwsUsingHmacSha256ExampleTest +[INFO] Running org.jose4j.jws.EcdsaUsingShaTest +18:25:36.948 DEBUG org.jose4j.jws.JwsTestSupport - ES384 eyJhbGciOiJFUzM4NCJ9.VGhlIHVtbGF1dCAoL8uIyoptbGHKinQvIFVVTS1sb3d0KSByZWZlcnMgdG8gYSBzb3VuZCBzaGlmdC4.fjXvug43V5EcgRGmWboPoVxplMfVDd2Rv-VXHjtzIFIkfnLn7AG0NmyO5nXQNx0W9EuzGOGYuUDe-HgQPnEw3uMg-e8PFBI14VnpL0tqhYBwNnZpsHAnUaTCIkZ0_UH9 +18:25:39.167 DEBUG org.jose4j.jws.JwsTestSupport - ES512 eyJhbGciOiJFUzUxMiJ9.Pz8_Pz8.ATs49Hknj8xooIFl05b1SYdJtDcpracL8-RrmbxziH6h8t753w4WPA1HaIPgopgne7TqsjY8N7qrr-q6O6gNKzZ8AYh9gwVqrBSkS61UpM9lV4GVUj0r-sanAglSHJZvPzC_j0aA4BMDEyV-VSbiAlfi3dran0BQppFQadWDBrPfXseA +18:25:41.265 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +18:25:41.266 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +18:25:41.267 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +18:25:41.268 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA256withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl +18:25:41.271 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +18:25:41.272 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +18:25:41.274 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +18:25:41.276 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +18:25:41.278 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +18:25:41.280 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA384withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl +18:25:41.282 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +18:25:41.283 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +18:25:41.284 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +18:25:41.285 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +18:25:41.287 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +18:25:41.289 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA512withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl +18:25:41.291 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +18:25:41.292 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +18:25:41.294 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES256/SHA256withECDSA expects a key using P-256 but was P-521 +18:25:41.296 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES384/SHA384withECDSA expects a key using P-384 but was P-521 +18:25:41.298 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES384/SHA384withECDSA expects a key using P-384 but was P-256 +18:25:41.299 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES512/SHA512withECDSA expects a key using P-521 but was P-256 +18:25:41.754 DEBUG org.jose4j.jws.JwsTestSupport - ES512 eyJhbGciOiJFUzUxMiJ9.dG91Y2jDnw.AHN7RynzqW2g22CFHhd4AKkYgQeX9W4OnpjGJoOCeUBW6TcxJxrSS_kBx7VwoaZfUgfdWAH32t6_gk4oHtt6SX04AXYYaF9Vtfst8gn_CvDDkrDBAYIb_BHnw8T-l0lP-wp2JtA7aOMGWXtSD2dZswoCCoCoZjbduDfOuWfbULuhseIG +18:25:43.789 DEBUG org.jose4j.jws.JwsTestSupport - ES256 eyJhbGciOiJFUzI1NiJ9.UEFZTE9BRCEhIQ.e9w8SIlrDgVyGOmq7eJ1Fwzo3Xp8XzXM0KjF-wnhhYjIHfiFaBZ5rZUHjde6kB-ZSo10_cjgdK8FT1osFiXPbw +18:25:44.063 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:25:44.064 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:25:44.065 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:25:44.068 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:25:44.069 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:25:44.070 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:25:44.072 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:25:44.073 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:25:44.075 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:25:44.076 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:25:44.159 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +18:25:44.161 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:25:44.162 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:25:44.163 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:25:44.183 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:25:44.202 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:25:44.222 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:25:44.223 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +18:25:44.226 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:25:44.228 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:25:44.245 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:25:44.246 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:25:44.248 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:25:44.250 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:25:44.252 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:25:44.307 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:25:44.363 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:25:44.418 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:25:44.475 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:25:44.476 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:25:44.478 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:25:44.479 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:25:44.488 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:25:44.495 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:25:44.503 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:25:44.504 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:25:44.506 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:25:44.507 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:25:44.508 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:25:44.515 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:25:44.523 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:25:44.531 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:25:44.532 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:25:44.533 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:25:44.534 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@1364212 registered for zip algorithm DEF +18:25:44.535 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:25:44.535 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 470ms +18:25:44.837 DEBUG org.jose4j.jws.JwsTestSupport - ES256K eyJhbGciOiJFUzI1NksifQ.aw.SMlGgCCUMBN6pskFFq4U12di8-FvPpSNW9Y5vIj_JLWcSlKzL3Kl9zNJtpBv_h-Ft91CwBhbm7BGIG44Me5PEw +18:25:45.068 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:25:45.069 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:25:45.070 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:25:45.071 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:25:45.071 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:25:45.071 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:25:45.072 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:25:45.073 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:25:45.074 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:25:45.076 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:25:45.079 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@1d5509a +18:25:45.080 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +18:25:45.081 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:25:45.082 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:25:45.083 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:25:45.088 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:25:45.093 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:25:45.098 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:25:45.098 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +18:25:45.099 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:25:45.100 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:25:45.108 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:25:45.109 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:25:45.110 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:25:45.110 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:25:45.111 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:25:45.123 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:25:45.134 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:25:45.146 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:25:45.158 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:25:45.160 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:25:45.160 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:25:45.162 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:25:45.165 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:25:45.167 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:25:45.169 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:25:45.170 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:25:45.171 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:25:45.172 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:25:45.174 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:25:45.176 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:25:45.178 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:25:45.180 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:25:45.180 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:25:45.182 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:25:45.183 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@13f73e7 registered for zip algorithm DEF +18:25:45.183 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:25:45.184 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 114ms +18:25:45.203 DEBUG org.jose4j.jws.JwsTestSupport - ES256 eyJhbGciOiJFUzI1NiJ9.c29tZXRoaW5nIGhlcmU.QZkszLiA_qYVPCgn19PJaUQCkKTA_tcCYlze6ZB-hawPfiYoJfXQ-tyd5FD55whrm7B7QtJqce13D9HeVIuxVw +18:25:45.433 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:25:45.434 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:25:45.435 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:25:45.436 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:25:45.436 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:25:45.438 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:25:45.440 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:25:45.442 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:25:45.444 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:25:45.445 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:25:45.528 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +18:25:45.529 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:25:45.531 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:25:45.532 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:25:45.552 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:25:45.571 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:25:45.590 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:25:45.591 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +18:25:45.593 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:25:45.595 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:25:45.610 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:25:45.611 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:25:45.613 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:25:45.614 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:25:45.616 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:25:45.671 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:25:45.727 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:25:45.786 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:25:45.843 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:25:45.844 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:25:45.846 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:25:45.848 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:25:45.856 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:25:45.864 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:25:45.873 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:25:45.874 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:25:45.875 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:25:45.876 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:25:45.877 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:25:45.885 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:25:45.893 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:25:45.901 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:25:45.902 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:25:45.903 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:25:45.903 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@19683c4 registered for zip algorithm DEF +18:25:45.904 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:25:45.905 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 471ms +18:25:45.960 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:25:45.961 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:25:45.962 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:25:45.963 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:25:45.964 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:25:45.965 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:25:45.966 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:25:45.967 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:25:45.968 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:25:45.968 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:25:45.971 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@1d5509a +18:25:45.972 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +18:25:45.973 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:25:45.974 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:25:45.975 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:25:45.979 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:25:45.984 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:25:45.988 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:25:45.990 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +18:25:45.991 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:25:45.993 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:25:46.002 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:25:46.002 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:25:46.004 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:25:46.005 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:25:46.006 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:25:46.021 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:25:46.034 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:25:46.047 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:25:46.060 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:25:46.062 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:25:46.063 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:25:46.065 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:25:46.068 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:25:46.071 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:25:46.075 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:25:46.076 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:25:46.077 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:25:46.078 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:25:46.079 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:25:46.081 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:25:46.083 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:25:46.086 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:25:46.087 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:25:46.087 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:25:46.088 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@1da615a registered for zip algorithm DEF +18:25:46.089 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:25:46.090 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 128ms +[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 9.64 s - in org.jose4j.jws.EcdsaUsingShaTest +[INFO] Running org.jose4j.jws.DetachedContentTest +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.178 s - in org.jose4j.jws.DetachedContentTest +[INFO] Running org.jose4j.jws.JwsUsingEcdsaP256Sha256ExampleTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.019 s - in org.jose4j.jws.JwsUsingEcdsaP256Sha256ExampleTest +[INFO] Running org.jose4j.jws.PublicKeyAsHmacKeyTest +18:25:46.472 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:25:46.473 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:25:46.475 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:25:46.476 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:25:46.478 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:25:46.479 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:25:46.481 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:25:46.483 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:25:46.484 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:25:46.486 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:25:46.542 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +18:25:46.543 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:25:46.545 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:25:46.547 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:25:46.568 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:25:46.588 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:25:46.608 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:25:46.609 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +18:25:46.612 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:25:46.614 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:25:46.630 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:25:46.631 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:25:46.634 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:25:46.635 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:25:46.637 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:25:46.695 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:25:46.753 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:25:46.866 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:25:46.922 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:25:46.924 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:25:46.926 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:25:46.928 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:25:46.937 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:25:46.945 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:25:46.953 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:25:46.954 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:25:46.955 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:25:46.956 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:25:46.957 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:25:46.965 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:25:46.972 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:25:46.980 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:25:46.981 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:25:46.982 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:25:46.983 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@cc9fdf registered for zip algorithm DEF +18:25:46.984 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:25:46.985 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 511ms +18:25:46.991 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. +18:25:46.992 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:25:46.993 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:25:46.994 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:25:46.995 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:25:46.996 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:25:46.997 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:25:46.998 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:25:46.999 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:25:47.000 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:25:47.001 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:25:47.004 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@1d5509a +18:25:47.005 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +18:25:47.006 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:25:47.007 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:25:47.008 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:25:47.013 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:25:47.018 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:25:47.023 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:25:47.023 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +18:25:47.025 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:25:47.026 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:25:47.033 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:25:47.034 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:25:47.035 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:25:47.037 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:25:47.038 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:25:47.049 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:25:47.061 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:25:47.073 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:25:47.087 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:25:47.088 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:25:47.089 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:25:47.091 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:25:47.094 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:25:47.098 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:25:47.102 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:25:47.103 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:25:47.105 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:25:47.106 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:25:47.108 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:25:47.111 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:25:47.114 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:25:47.117 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:25:47.118 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:25:47.119 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:25:47.120 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@5c2626 registered for zip algorithm DEF +18:25:47.121 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:25:47.122 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 128ms +18:25:47.235 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:25:47.236 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:25:47.238 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:25:47.239 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:25:47.240 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:25:47.241 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:25:47.242 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:25:47.243 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:25:47.244 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:25:47.246 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:25:47.288 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +18:25:47.290 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:25:47.291 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:25:47.293 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:25:47.313 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:25:47.332 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:25:47.351 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:25:47.352 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +18:25:47.355 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:25:47.357 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:25:47.372 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:25:47.373 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:25:47.375 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:25:47.376 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:25:47.377 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:25:47.433 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:25:47.487 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:25:47.542 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:25:47.596 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:25:47.597 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:25:47.599 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:25:47.600 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:25:47.606 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:25:47.612 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:25:47.618 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:25:47.619 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:25:47.620 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:25:47.621 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:25:47.621 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:25:47.627 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:25:47.633 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:25:47.639 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:25:47.640 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:25:47.641 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:25:47.642 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@1bf79da registered for zip algorithm DEF +18:25:47.643 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:25:47.643 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 406ms +18:25:47.647 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. +18:25:47.648 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:25:47.649 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:25:47.650 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:25:47.651 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:25:47.651 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:25:47.652 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:25:47.653 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:25:47.653 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:25:47.654 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:25:47.655 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:25:47.658 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@1d5509a +18:25:47.659 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +18:25:47.660 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:25:47.660 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:25:47.661 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:25:47.666 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:25:47.670 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:25:47.675 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:25:47.676 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +18:25:47.677 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:25:47.679 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:25:47.686 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:25:47.687 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:25:47.688 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:25:47.690 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:25:47.691 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:25:47.702 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:25:47.714 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:25:47.726 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:25:47.738 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:25:47.739 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:25:47.741 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:25:47.742 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:25:47.744 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:25:47.746 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:25:47.749 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:25:47.749 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:25:47.750 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:25:47.751 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:25:47.752 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:25:47.754 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:25:47.757 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:25:47.759 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:25:47.760 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:25:47.760 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:25:47.761 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@891add registered for zip algorithm DEF +18:25:47.761 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:25:47.762 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 112ms +18:25:47.870 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:25:47.872 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:25:47.872 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:25:47.874 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:25:47.875 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:25:47.876 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:25:47.877 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:25:47.879 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:25:47.880 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:25:47.882 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:25:47.917 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +18:25:47.919 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:25:47.920 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:25:47.922 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:25:47.941 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:25:47.961 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:25:47.980 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:25:47.981 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +18:25:47.984 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:25:47.986 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:25:47.999 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:25:48.000 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:25:48.002 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:25:48.003 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:25:48.004 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:25:48.060 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:25:48.116 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:25:48.174 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:25:48.231 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:25:48.233 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:25:48.234 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:25:48.236 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:25:48.242 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:25:48.248 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:25:48.253 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:25:48.254 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:25:48.255 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:25:48.256 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:25:48.256 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:25:48.262 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:25:48.267 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:25:48.273 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:25:48.273 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:25:48.274 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:25:48.274 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@174bac4 registered for zip algorithm DEF +18:25:48.275 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:25:48.275 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 403ms +18:25:48.279 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. +18:25:48.280 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:25:48.281 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:25:48.281 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:25:48.282 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:25:48.283 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:25:48.283 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:25:48.284 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:25:48.284 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:25:48.285 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:25:48.286 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:25:48.290 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@1d5509a +18:25:48.290 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +18:25:48.291 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:25:48.292 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:25:48.293 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:25:48.298 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:25:48.302 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:25:48.307 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:25:48.308 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +18:25:48.309 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:25:48.310 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:25:48.317 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:25:48.318 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:25:48.319 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:25:48.320 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:25:48.321 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:25:48.331 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:25:48.342 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:25:48.353 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:25:48.364 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:25:48.365 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:25:48.366 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:25:48.367 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:25:48.369 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:25:48.371 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:25:48.373 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:25:48.373 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:25:48.374 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:25:48.374 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:25:48.375 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:25:48.376 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:25:48.379 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:25:48.381 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:25:48.382 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:25:48.382 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:25:48.383 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@1f90645 registered for zip algorithm DEF +18:25:48.383 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:25:48.383 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 102ms +18:25:48.488 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:25:48.488 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:25:48.489 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:25:48.490 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:25:48.492 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:25:48.493 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:25:48.494 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:25:48.495 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:25:48.497 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:25:48.498 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:25:48.528 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +18:25:48.530 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:25:48.531 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:25:48.533 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:25:48.552 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:25:48.572 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:25:48.591 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:25:48.592 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +18:25:48.594 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:25:48.596 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:25:48.608 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:25:48.609 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:25:48.611 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:25:48.612 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:25:48.613 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:25:48.721 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:25:48.774 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:25:48.827 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:25:48.880 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:25:48.881 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:25:48.882 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:25:48.883 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:25:48.890 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:25:48.895 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:25:48.901 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:25:48.902 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:25:48.903 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:25:48.904 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:25:48.904 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:25:48.910 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:25:48.915 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:25:48.921 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:25:48.921 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:25:48.922 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:25:48.923 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@20aab9 registered for zip algorithm DEF +18:25:48.923 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:25:48.924 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 435ms +18:25:48.928 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. +18:25:48.929 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:25:48.929 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:25:48.930 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:25:48.931 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:25:48.932 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:25:48.932 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:25:48.933 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:25:48.934 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:25:48.934 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:25:48.935 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:25:48.938 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@1d5509a +18:25:48.939 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +18:25:48.939 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:25:48.940 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:25:48.940 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:25:48.946 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:25:48.950 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:25:48.955 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:25:48.956 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +18:25:48.957 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:25:48.958 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:25:48.965 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:25:48.966 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:25:48.967 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:25:48.968 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:25:48.969 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:25:48.980 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:25:48.992 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:25:49.003 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:25:49.015 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:25:49.016 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:25:49.018 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:25:49.019 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:25:49.021 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:25:49.023 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:25:49.025 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:25:49.026 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:25:49.026 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:25:49.027 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:25:49.028 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:25:49.030 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:25:49.032 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:25:49.034 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:25:49.035 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:25:49.036 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:25:49.036 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@17c4456 registered for zip algorithm DEF +18:25:49.037 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:25:49.037 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 107ms +18:25:49.501 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. +18:25:49.504 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. +18:25:49.539 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. +18:25:49.542 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 3.174 s - in org.jose4j.jws.PublicKeyAsHmacKeyTest +[INFO] Running org.jose4j.jws.EcdsaUsingShaEdgesTest +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 5.577 s - in org.jose4j.jws.EcdsaUsingShaEdgesTest +[INFO] Running org.jose4j.jws.RsaPssTest +18:25:55.162 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS +18:25:55.615 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS +18:25:56.070 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS +18:25:56.614 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS +18:25:57.070 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS +18:25:57.521 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS +18:25:58.065 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:25:58.067 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:25:58.067 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:25:58.068 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:25:58.069 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:25:58.070 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:25:58.071 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:25:58.072 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:25:58.073 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:25:58.074 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:25:58.104 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +18:25:58.106 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:25:58.107 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:25:58.108 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:25:58.128 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:25:58.147 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:25:58.166 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:25:58.168 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +18:25:58.170 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:25:58.172 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:25:58.184 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:25:58.184 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:25:58.187 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:25:58.188 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:25:58.189 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:25:58.245 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:25:58.300 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:25:58.354 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:25:58.410 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:25:58.411 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:25:58.411 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:25:58.412 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:25:58.418 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:25:58.423 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:25:58.429 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:25:58.430 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:25:58.431 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:25:58.431 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:25:58.432 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:25:58.438 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:25:58.443 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:25:58.449 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:25:58.450 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:25:58.450 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:25:58.451 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@fc097e registered for zip algorithm DEF +18:25:58.451 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:25:58.451 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 384ms +18:25:58.920 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS +18:25:59.378 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@1c6d27a):Signature object: SHA256withRSAandMGF1 +18:25:59.831 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS +18:26:00.291 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@1ace0b1):Signature object: SHA384withRSAandMGF1 +18:26:00.745 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS +18:26:01.200 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@59e45e):Signature object: SHA512withRSAandMGF1 +18:26:01.655 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:26:01.656 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:26:01.657 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:26:01.658 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:26:01.659 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:26:01.659 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:26:01.660 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:26:01.660 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:26:01.662 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:26:01.662 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:26:01.665 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@1d5509a +18:26:01.666 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +18:26:01.667 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:26:01.667 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:26:01.668 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:26:01.672 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:26:01.676 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:26:01.681 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:26:01.682 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +18:26:01.683 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:26:01.683 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:26:01.690 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:26:01.691 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:26:01.691 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:26:01.692 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:26:01.692 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:26:01.703 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:26:01.714 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:26:01.725 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:26:01.736 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:26:01.737 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:26:01.738 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:26:01.739 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:26:01.740 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:26:01.742 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:26:01.744 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:26:01.744 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:26:01.745 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:26:01.746 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:26:01.747 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:26:01.750 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:26:01.752 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:26:01.755 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:26:01.756 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:26:01.757 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:26:01.758 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@ec7116 registered for zip algorithm DEF +18:26:01.759 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:26:01.759 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 102ms +18:26:01.854 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:26:01.855 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:26:01.857 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:26:01.858 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:26:01.859 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:26:01.860 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:26:01.861 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:26:01.863 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:26:01.864 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:26:01.865 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:26:01.892 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +18:26:01.894 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:26:01.895 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:26:01.896 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:26:01.915 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|SHA256withRSAandMGF1) registered for alg algorithm PS256 +18:26:01.935 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|SHA384withRSAandMGF1) registered for alg algorithm PS384 +18:26:01.955 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|SHA512withRSAandMGF1) registered for alg algorithm PS512 +18:26:01.957 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +18:26:01.959 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:26:01.960 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:26:01.972 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:26:01.973 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:26:01.975 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:26:01.975 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:26:01.976 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:26:02.102 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:26:02.157 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:26:02.209 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:26:02.261 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:26:02.262 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:26:02.262 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:26:02.263 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:26:02.269 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:26:02.275 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:26:02.283 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:26:02.283 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:26:02.284 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:26:02.284 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:26:02.285 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:26:02.291 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:26:02.297 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:26:02.302 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:26:02.303 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:26:02.304 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:26:02.304 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@78cea registered for zip algorithm DEF +18:26:02.304 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:26:02.305 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 449ms +18:26:02.307 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA256withRSAandMGF1 +18:26:02.764 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA384withRSAandMGF1 +18:26:03.221 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA512withRSAandMGF1 +18:26:03.674 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:26:03.675 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:26:03.675 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:26:03.676 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:26:03.676 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:26:03.676 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:26:03.677 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:26:03.677 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:26:03.678 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:26:03.678 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:26:03.681 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@1d5509a +18:26:03.682 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +18:26:03.682 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:26:03.683 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:26:03.683 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:26:03.688 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:26:03.693 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:26:03.698 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:26:03.699 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +18:26:03.699 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:26:03.700 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:26:03.707 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:26:03.708 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:26:03.708 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:26:03.710 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:26:03.711 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:26:03.722 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:26:03.734 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:26:03.746 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:26:03.757 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:26:03.758 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:26:03.759 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:26:03.760 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:26:03.762 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:26:03.764 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:26:03.766 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:26:03.767 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:26:03.768 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:26:03.769 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:26:03.770 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:26:03.772 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:26:03.774 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:26:03.776 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:26:03.777 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:26:03.778 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:26:03.778 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@eb1e registered for zip algorithm DEF +18:26:03.779 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:26:03.779 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 104ms +18:26:04.144 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:26:04.145 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:26:04.146 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:26:04.147 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:26:04.148 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:26:04.149 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:26:04.149 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:26:04.150 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:26:04.151 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:26:04.152 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:26:04.176 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +18:26:04.177 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:26:04.179 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:26:04.180 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:26:04.200 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:26:04.219 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:26:04.240 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:26:04.241 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +18:26:04.244 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:26:04.246 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:26:04.258 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:26:04.259 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:26:04.261 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:26:04.262 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:26:04.263 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:26:04.318 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:26:04.372 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:26:04.426 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:26:04.480 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:26:04.481 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:26:04.482 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:26:04.483 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:26:04.490 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:26:04.495 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:26:04.499 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:26:04.500 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:26:04.500 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:26:04.501 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:26:04.502 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:26:04.506 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:26:04.510 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:26:04.515 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:26:04.515 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:26:04.516 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:26:04.516 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@2a4417 registered for zip algorithm DEF +18:26:04.516 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:26:04.517 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 371ms +18:26:04.682 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:26:04.682 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:26:04.683 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:26:04.684 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:26:04.685 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:26:04.685 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:26:04.686 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:26:04.686 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:26:04.687 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:26:04.687 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:26:04.690 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@1d5509a +18:26:04.690 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +18:26:04.691 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:26:04.692 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:26:04.692 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:26:04.697 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:26:04.702 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:26:04.706 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:26:04.707 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +18:26:04.708 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:26:04.710 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:26:04.716 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:26:04.717 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:26:04.718 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:26:04.719 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:26:04.720 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:26:04.731 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:26:04.742 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:26:04.753 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:26:04.765 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:26:04.766 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:26:04.767 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:26:04.768 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:26:04.770 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:26:04.772 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:26:04.774 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:26:04.775 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:26:04.776 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:26:04.776 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:26:04.777 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:26:04.779 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:26:04.781 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:26:04.783 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:26:04.784 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:26:04.784 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:26:04.785 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@1f61afb registered for zip algorithm DEF +18:26:04.785 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:26:04.786 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 103ms +18:26:04.876 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:26:04.877 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:26:04.877 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:26:04.878 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:26:04.879 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:26:04.880 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:26:04.881 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:26:04.882 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:26:04.883 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:26:04.884 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:26:04.905 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +18:26:04.906 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:26:04.907 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:26:04.908 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:26:04.927 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|SHA256withRSAandMGF1) registered for alg algorithm PS256 +18:26:04.946 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|SHA384withRSAandMGF1) registered for alg algorithm PS384 +18:26:04.964 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|SHA512withRSAandMGF1) registered for alg algorithm PS512 +18:26:04.965 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +18:26:04.967 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:26:04.969 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:26:04.978 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:26:04.979 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:26:04.980 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:26:04.981 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:26:04.982 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:26:05.035 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:26:05.090 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:26:05.144 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:26:05.245 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:26:05.246 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:26:05.247 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:26:05.248 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:26:05.253 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:26:05.257 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:26:05.261 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:26:05.262 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:26:05.263 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:26:05.263 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:26:05.264 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:26:05.268 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:26:05.272 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:26:05.276 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:26:05.277 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:26:05.278 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:26:05.278 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@1f39d06 registered for zip algorithm DEF +18:26:05.278 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:26:05.279 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 402ms +18:26:05.431 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:26:05.432 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:26:05.433 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:26:05.434 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:26:05.434 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:26:05.435 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:26:05.436 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:26:05.436 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:26:05.437 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:26:05.437 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:26:05.440 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@1d5509a +18:26:05.441 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +18:26:05.441 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:26:05.442 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:26:05.443 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:26:05.447 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:26:05.452 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:26:05.457 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:26:05.457 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +18:26:05.458 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:26:05.459 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:26:05.467 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:26:05.467 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:26:05.468 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:26:05.469 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:26:05.470 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:26:05.481 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:26:05.492 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:26:05.504 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:26:05.515 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:26:05.516 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:26:05.517 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:26:05.518 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:26:05.520 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:26:05.522 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:26:05.523 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:26:05.524 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:26:05.525 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:26:05.525 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:26:05.526 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:26:05.528 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:26:05.529 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:26:05.531 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:26:05.532 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:26:05.532 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:26:05.533 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@217d41 registered for zip algorithm DEF +18:26:05.533 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:26:05.534 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 100ms +18:26:05.800 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:26:05.801 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [BC version 1.77, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:26:05.801 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:26:05.803 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:26:05.804 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:26:05.806 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:26:05.807 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:26:05.808 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:26:05.809 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:26:05.810 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:26:05.829 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +18:26:05.830 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:26:05.832 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:26:05.833 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:26:05.851 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:26:05.870 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:26:05.889 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:26:05.890 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +18:26:05.892 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:26:05.894 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:26:05.903 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:26:05.904 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:26:05.905 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:26:05.906 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:26:05.907 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:26:05.960 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:26:06.013 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:26:06.067 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:26:06.122 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:26:06.123 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:26:06.124 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:26:06.125 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:26:06.130 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:26:06.134 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:26:06.138 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:26:06.139 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:26:06.140 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:26:06.140 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:26:06.141 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:26:06.145 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:26:06.149 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:26:06.153 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:26:06.154 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:26:06.155 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:26:06.155 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@e95707 registered for zip algorithm DEF +18:26:06.155 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:26:06.156 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 355ms +18:26:06.202 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +18:26:06.203 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.5 from Debian at /usr/lib/jvm/java-21-openjdk-armhf with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +18:26:06.204 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +18:26:06.204 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +18:26:06.205 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +18:26:06.205 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +18:26:06.206 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +18:26:06.206 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +18:26:06.207 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +18:26:06.208 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +18:26:06.210 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@1d5509a +18:26:06.211 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +18:26:06.211 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +18:26:06.212 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +18:26:06.212 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +18:26:06.217 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +18:26:06.221 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +18:26:06.226 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +18:26:06.227 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +18:26:06.228 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +18:26:06.229 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +18:26:06.236 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +18:26:06.237 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +18:26:06.238 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +18:26:06.239 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +18:26:06.240 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +18:26:06.250 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +18:26:06.262 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +18:26:06.273 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +18:26:06.283 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +18:26:06.284 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +18:26:06.285 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +18:26:06.286 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +18:26:06.288 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +18:26:06.290 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +18:26:06.292 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +18:26:06.292 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +18:26:06.293 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +18:26:06.293 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +18:26:06.294 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +18:26:06.296 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +18:26:06.298 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +18:26:06.300 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +18:26:06.301 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +18:26:06.302 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +18:26:06.302 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@891fc8 registered for zip algorithm DEF +18:26:06.303 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +18:26:06.303 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 99ms +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 11.139 s - in org.jose4j.jws.RsaPssTest +[INFO] Running org.jose4j.cookbook.JoseCookbookTest +[INFO] Tests run: 22, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 7.178 s - in org.jose4j.cookbook.JoseCookbookTest [INFO] Running org.jose4j.jwa.AlgorithmConstraintsTest -[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s - in org.jose4j.jwa.AlgorithmConstraintsTest +[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s - in org.jose4j.jwa.AlgorithmConstraintsTest [INFO] Running org.jose4j.jwa.AlgorithmFactoryTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwa.AlgorithmFactoryTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s - in org.jose4j.jwa.AlgorithmFactoryTest +[INFO] Running org.jose4j.json.JsonUtilTest +{"char array":["a","\\","\""],"some object":"java.lang.Object@12c9b5c","nested":{"chars":["\"","m","e","h"]},"nested also":{"obj":"java.util.Random@320e34"}} +18:26:13.588 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.util.Map (java.util.ArrayList and java.util.Map are in module java.base of loader 'bootstrap') +18:26:13.590 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.Boolean cannot be cast to class java.util.Map (java.lang.Boolean and java.util.Map are in module java.base of loader 'bootstrap') +18:26:13.591 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.String cannot be cast to class java.util.Map (java.lang.String and java.util.Map are in module java.base of loader 'bootstrap') +18:26:13.592 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.Long cannot be cast to class java.util.Map (java.lang.Long and java.util.Map are in module java.base of loader 'bootstrap') +18:26:13.593 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Parsing returned null +[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s - in org.jose4j.json.JsonUtilTest [INFO] [INFO] Results: [INFO] @@ -4541,8 +4577,8 @@ [INFO] ------------------------------------------------------------------------ [INFO] BUILD SUCCESS [INFO] ------------------------------------------------------------------------ -[INFO] Total time: 01:48 min -[INFO] Finished at: 2024-10-20T18:13:16Z +[INFO] Total time: 04:31 min +[INFO] Finished at: 2024-10-20T18:26:21Z [INFO] ------------------------------------------------------------------------ create-stamp debian/debhelper-build-stamp dh_prep @@ -4566,8 +4602,8 @@ [INFO] ------------------------------------------------------------------------ [INFO] BUILD SUCCESS [INFO] ------------------------------------------------------------------------ -[INFO] Total time: 3.579 s -[INFO] Finished at: 2024-10-20T18:13:25Z +[INFO] Total time: 9.284 s +[INFO] Finished at: 2024-10-20T18:26:43Z [INFO] ------------------------------------------------------------------------ mh_resolve_dependencies --non-interactive --offline --build -plibjose4j-java --base-directory=/build/reproducible-path/libjose4j-java-0.9.6 --non-explore Analysing pom.xml... @@ -4593,12 +4629,14 @@ dpkg-buildpackage: info: binary-only upload (no source included) dpkg-genchanges: info: including full source code in upload I: copying local configuration +I: user script /srv/workspace/pbuilder/1484/tmp/hooks/B01_cleanup starting +I: user script /srv/workspace/pbuilder/1484/tmp/hooks/B01_cleanup finished I: unmounting dev/ptmx filesystem I: unmounting dev/pts filesystem I: unmounting dev/shm filesystem I: unmounting proc filesystem I: unmounting sys filesystem I: cleaning the build env -I: removing directory /srv/workspace/pbuilder/23419 and its subdirectories -I: Current time: Sun Oct 20 06:13:40 -12 2024 -I: pbuilder-time-stamp: 1729448020 +I: removing directory /srv/workspace/pbuilder/1484 and its subdirectories +I: Current time: Mon Oct 21 08:27:29 +14 2024 +I: pbuilder-time-stamp: 1729448849